~ubuntu-kernel/ubuntu/+source/linux/+git/unstable:master-5.1

Last commit made on 2019-05-14
Get this branch:
git clone -b master-5.1 https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/unstable
Members of Ubuntu Kernel Repositories can upload to this branch. Log in for directions.

Branch merges

Branch information

Recent commits

0b25e6e... by Seth Forshee

UBUNTU: Ubuntu-5.1.0-2.2

Signed-off-by: Seth Forshee <email address hidden>

8193c63... by Seth Forshee

UBUNTU: [Packaging] resync git-ubuntu-log

BugLink: http://bugs.launchpad.net/bugs/1786013
Signed-off-by: Seth Forshee <email address hidden>

3f06411... by Seth Forshee

UBUNTU: update dkms package versions

Signed-off-by: Seth Forshee <email address hidden>

2f28467... by Greg Kroah-Hartman <email address hidden>

Linux 5.1.2

BugLink: https://bugs.launchpad.net/bugs/1829050

Signed-off-by: Seth Forshee <email address hidden>

0b2be17... by Josh Poimboeuf

x86/speculation/mds: Fix documentation typo

BugLink: https://bugs.launchpad.net/bugs/1829050

commit 95310e348a321b45fb746c176961d4da72344282 upstream

Fix a minor typo in the MDS documentation: "eanbled" -> "enabled".

Reported-by: Jeff Bastian <email address hidden>
Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

66f413f... by Tyler Hicks

Documentation: Correct the possible MDS sysfs values

BugLink: https://bugs.launchpad.net/bugs/1829050

commit ea01668f9f43021b28b3f4d5ffad50106a1e1301 upstream

Adjust the last two rows in the table that display possible values when
MDS mitigation is enabled. They both were slightly innacurate.

In addition, convert the table of possible values and their descriptions
to a list-table. The simple table format uses the top border of equals
signs to determine cell width which resulted in the first column being
far too wide in comparison to the second column that contained the
majority of the text.

Signed-off-by: Tyler Hicks <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

2c72cec... by speck for Pawan Gupta <email address hidden>

x86/mds: Add MDSUM variant to the MDS documentation

BugLink: https://bugs.launchpad.net/bugs/1829050

commit e672f8bf71c66253197e503f75c771dd28ada4a0 upstream

Updated the documentation for a new CVE-2019-11091 Microarchitectural Data
Sampling Uncacheable Memory (MDSUM) which is a variant of
Microarchitectural Data Sampling (MDS). MDS is a family of side channel
attacks on internal buffers in Intel CPUs.

MDSUM is a special case of MSBDS, MFBDS and MLPDS. An uncacheable load from
memory that takes a fault or assist can leave data in a microarchitectural
structure that may later be observed using one of the same methods used by
MSBDS, MFBDS or MLPDS. There are no new code changes expected for MDSUM.
The existing mitigation for MDS applies to MDSUM as well.

Signed-off-by: Pawan Gupta <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Reviewed-by: Tyler Hicks <email address hidden>
Reviewed-by: Jon Masters <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

3fde88a... by Josh Poimboeuf

x86/speculation/mds: Add 'mitigations=' support for MDS

BugLink: https://bugs.launchpad.net/bugs/1829050

commit 5c14068f87d04adc73ba3f41c2a303d3c3d1fa12 upstream

Add MDS to the new 'mitigations=' cmdline option.

Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

096745c... by Josh Poimboeuf

s390/speculation: Support 'mitigations=' cmdline option

BugLink: https://bugs.launchpad.net/bugs/1829050

commit 0336e04a6520bdaefdb0769d2a70084fa52e81ed upstream

Configure s390 runtime CPU speculation bug mitigations in accordance
with the 'mitigations=' cmdline option. This affects Spectre v1 and
Spectre v2.

The default behavior is unchanged.

Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Tested-by: Jiri Kosina <email address hidden> (on x86)
Reviewed-by: Jiri Kosina <email address hidden>
Cc: Borislav Petkov <email address hidden>
Cc: "H . Peter Anvin" <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Peter Zijlstra <email address hidden>
Cc: Jiri Kosina <email address hidden>
Cc: Waiman Long <email address hidden>
Cc: Andrea Arcangeli <email address hidden>
Cc: Jon Masters <email address hidden>
Cc: Benjamin Herrenschmidt <email address hidden>
Cc: Paul Mackerras <email address hidden>
Cc: Michael Ellerman <email address hidden>
Cc: <email address hidden>
Cc: Martin Schwidefsky <email address hidden>
Cc: Heiko Carstens <email address hidden>
Cc: <email address hidden>
Cc: Catalin Marinas <email address hidden>
Cc: Will Deacon <email address hidden>
Cc: <email address hidden>
Cc: <email address hidden>
Cc: Greg Kroah-Hartman <email address hidden>
Cc: Tyler Hicks <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: Randy Dunlap <email address hidden>
Cc: Steven Price <email address hidden>
Cc: Phil Auld <email address hidden>
Link: https://lkml.kernel.org/r/<email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

63a651f... by Josh Poimboeuf

powerpc/speculation: Support 'mitigations=' cmdline option

BugLink: https://bugs.launchpad.net/bugs/1829050

commit 782e69efb3dfed6e8360bc612e8c7827a901a8f9 upstream

Configure powerpc CPU runtime speculation bug mitigations in accordance
with the 'mitigations=' cmdline option. This affects Meltdown, Spectre
v1, Spectre v2, and Speculative Store Bypass.

The default behavior is unchanged.

Signed-off-by: Josh Poimboeuf <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Tested-by: Jiri Kosina <email address hidden> (on x86)
Reviewed-by: Jiri Kosina <email address hidden>
Cc: Borislav Petkov <email address hidden>
Cc: "H . Peter Anvin" <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Peter Zijlstra <email address hidden>
Cc: Jiri Kosina <email address hidden>
Cc: Waiman Long <email address hidden>
Cc: Andrea Arcangeli <email address hidden>
Cc: Jon Masters <email address hidden>
Cc: Benjamin Herrenschmidt <email address hidden>
Cc: Paul Mackerras <email address hidden>
Cc: Michael Ellerman <email address hidden>
Cc: <email address hidden>
Cc: Martin Schwidefsky <email address hidden>
Cc: Heiko Carstens <email address hidden>
Cc: <email address hidden>
Cc: Catalin Marinas <email address hidden>
Cc: Will Deacon <email address hidden>
Cc: <email address hidden>
Cc: <email address hidden>
Cc: Greg Kroah-Hartman <email address hidden>
Cc: Tyler Hicks <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: Randy Dunlap <email address hidden>
Cc: Steven Price <email address hidden>
Cc: Phil Auld <email address hidden>
Link: https://lkml.kernel.org/r/<email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>