Name: | kernel-doc |
---|---|
Version: | 3.10.0 |
Release: | 862.6.3.el7 |
Architecture: | noarch |
Group: | Documentation |
Size: | 50408615 |
License: | GPLv2 |
RPM: | kernel-doc-3.10.0-862.6.3.el7.noarch.rpm |
Source RPM: | kernel-3.10.0-862.6.3.el7.src.rpm |
Build Date: | Tue Jun 26 2018 |
Build Host: | x86-ol7-builder-03.US.ORACLE.com |
Vendor: | Oracle America |
URL: | http://www.kernel.org/ |
Summary: | Various documentation bits found in the kernel source |
Description: | This package contains documentation files from the kernel source. Various bits of information about the Linux kernel and the device drivers shipped with it are documented in these files. You'll want to install this package if you need a reference to the options that can be passed to Linux kernel modules at load time. |
- Oracle Linux certificates (Alexey Petrenko) - Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com) - Update x509.genkey [bug 24817676]
- [x86] always enable eager FPU by default on non-AMD processors (Paolo Bonzini) [1589051 1589048] {CVE-2018-3665} - [x86] bugs: Switch the selection of mitigation from CPU vendor to CPU features (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] bugs: Add AMD's SPEC_CTRL MSR usage (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] bugs: Add AMD's variant of SSB_NO (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Fix VM guest SSBD problems (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] spec_ctrl: Eliminate TIF_SSBD checks in IBRS on/off functions (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Disable SSBD update from scheduler if not user settable (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Make ssbd_enabled writtable (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Remove thread_info check in __wrmsr_on_cpu() (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Write per-thread SSBD state to spec_ctrl_pcp (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Add a read-only ssbd_enabled debugfs file (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] bugs/intel: Set proper CPU features and setup RDS (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] kvm: vmx: Emulate MSR_IA32_ARCH_CAPABILITIES (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] kvm: svm: Implement VIRT_SPEC_CTRL support for SSBD (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] bugs: Rework spec_ctrl base and mask logic (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Rework SPEC_CTRL update after late microcode loading (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Make sync_all_cpus_ibrs() write spec_ctrl_pcp value (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] bugs: Unify x86_spec_ctrl_{set_guest, restore_host} (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] speculation: Rework speculative_store_bypass_update() (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] speculation: Add virtualized speculative store bypass disable support (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] KVM: Rename KVM SPEC_CTRL MSR functions to match upstream (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] speculation: Handle HT correctly on AMD (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] cpufeatures: Add FEATURE_ZEN (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] cpufeatures: Disentangle SSBD enumeration (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] speculation: Use synthetic bits for IBRS/IBPB/STIBP (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [documentation] spec_ctrl: Do some minor cleanups (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] speculation: Make "seccomp" the default mode for Speculative Store Bypass (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] seccomp: Move speculation migitation control to arch code (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [kernel] seccomp: Add filter flag to opt-out of SSB mitigation (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [kernel] seccomp: Use PR_SPEC_FORCE_DISABLE (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] prctl: Add force disable speculation (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spectre_v2: No mitigation if CPU not affected and no command override (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] bug: Add X86_BUG_CPU_MELTDOWN and X86_BUG_SPECTRE_V[12] (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] pti: Rename CONFIG_KAISER to CONFIG_PAGE_TABLE_ISOLATION (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Sync up naming of SPEC_CTRL MSR bits with upstream (Waiman Long) [1584323 1584569] {CVE-2018-3639} - [x86] spec_ctrl: Sync up SSBD changes with upstream (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] microcode: Load microcode on all cpus (Prarit Bhargava) [1578047 1568249] - [x86] microcode: Fix CPU synchronization routine (Prarit Bhargava) [1578047 1568249] - [x86] microcode: Attempt late loading only when new microcode is present (Prarit Bhargava) [1578047 1568249] - [x86] microcode: Synchronize late microcode loading (Prarit Bhargava) [1578047 1568249] - [x86] microcode: Request microcode on the BSP (Prarit Bhargava) [1578047 1568249] - [x86] microcode: Do not upload microcode if CPUs are offline (Prarit Bhargava) [1578047 1568249] - [x86] microcode/intel: Writeback and invalidate caches before updating microcode (Prarit Bhargava) [1578047 1568249] - [x86] microcode/intel: Check microcode revision before updating sibling threads (Prarit Bhargava) [1578047 1568249] - [x86] microcode: Get rid of struct apply_microcode_ctx (Prarit Bhargava) [1578047 1568249] - [x86] cpu: Add a microcode loader callback (Prarit Bhargava) [1578047 1568249] - [x86] microcode: Propagate return value from updating functions (Prarit Bhargava) [1578047 1568249] - [x86] microcode/amd: Change load_microcode_amd()'s param to bool to fix preemptibility bug (Prarit Bhargava) [1578047 1568249] - [x86] microcode/intel: Add a helper which gives the microcode revision (Prarit Bhargava) [1578047 1568249] - [x86] cpu: Add native CPUID variants returning a single datum (Prarit Bhargava) [1578047 1568249] - [x86] microcode/amd: Move private inlines to .c and mark local functions static (Prarit Bhargava) [1578047 1568249] - [x86] microcode/intel: Simplify generic_load_microcode() (Prarit Bhargava) [1578047 1568249] - [x86] microcode/intel: Do not issue microcode updates messages on each CPU (Prarit Bhargava) [1578047 1568249] - [kernel] pidns: Don't have unshare(CLONE_NEWPID) imply CLONE_THREAD (Oleg Nesterov) [1578997 1577745] - [powerpc] 64s: Add support for a store forwarding barrier at kernel entry/exit (Mauricio Oliveira) [1581045 1581036] {CVE-2018-3639} - [powerpc] 64s: Move the data access exception out-of-line (Mauricio Oliveira) [1581045 1581036] {CVE-2018-3639}
- [netdrv] vmxnet3: use correct flag to indicate LRO feature (Neil Horman) [1567771 1558685] - [netdrv] vmxnet3: avoid xmit reset due to a race in vmxnet3 (Neil Horman) [1567771 1558685] - [kernel] ib/mlx5: Respect new UMR capabilities (Alaa Hleihel) [1579847 1573661] - [infiniband] ib/mlx5: Enable ECN capable bits for UD RoCE v2 QPs (Alaa Hleihel) [1579847 1573661] - [scsi] cdrom: do not call check_disk_change() inside cdrom_open() (Maurizio Lombardi) [1579834 1538362] - [hid] wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events (Benjamin Tissoires) [1579192 1551776] - [hid] wacom: generic: Recognize WACOM_HID_WD_PEN as a type of pen collection (Benjamin Tissoires) [1579192 1551776] - [hid] wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (Benjamin Tissoires) [1579191 1551783] - [fs] eventpoll: fix uninitialized variable in epoll_ctl (Paul Moore) [1578734 1553256] - [fs] nfs41: do not return ENOMEM on LAYOUTUNAVAILABLE (Scott Mayhew) [1578458 1574002] - [net] sock_diag: request _diag module only when the family or proto has been registered (Xin Long) [1578272 1544898] - [target] Re-add missing SCF_ACK_KREF assignment in (Mike Christie) [1578048 1561851] - [gpu] drm/nouveau: Fix deadlock in nv50_mstm_register_connector() (Lyude Paul) [1577792 1571927] - [netdrv] vmxnet3: segCnt can be 1 for LRO packets (Neil Horman) [1577790 1426680] - [s390] correct nospec auto detection init order (Hendrik Brueckner) [1577767 1558325] - [s390] add sysfs attributes for spectre (Hendrik Brueckner) [1577767 1558325] - [s390] report spectre mitigation via syslog (Hendrik Brueckner) [1577767 1558325] - [s390] add automatic detection of the spectre defense (Hendrik Brueckner) [1577767 1558325] - [s390] move nobp parameter functions to nospec-branch.c (Hendrik Brueckner) [1577767 1558325] - [s390] do not bypass BPENTER for interrupt system calls (Hendrik Brueckner) [1577767 1558325] - [s390] Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (Hendrik Brueckner) [1577767 1558325] - [s390] introduce execute-trampolines for branches (Hendrik Brueckner) [1577767 1558325] - [s390] run user space and KVM guests with modified branch prediction (Hendrik Brueckner) [1577767 1558325] - [s390] add optimized array_index_mask_nospec (Hendrik Brueckner) [1577767 1558325] - [s390] entry.s: fix spurious zeroing of r0 (Hendrik Brueckner) [1577767 1558325] - [s390] scrub registers on kernel entry and KVM exit (Hendrik Brueckner) [1577767 1558325] - [s390] align and prepare spectre mitigation for upstream commits (Hendrik Brueckner) [1577767 1558325] - [s390] alternative: use a copy of the facility bit mask (Hendrik Brueckner) [1577767 1558325] - [gpu] drm/amdgpu: Fix deadlock on runtime suspend (Lyude Paul) [1577760 1563957] - [gpu] drm/radeon: Fix deadlock on runtime suspend (Lyude Paul) [1577760 1563957] - [gpu] drm/nouveau: Fix deadlock on runtime suspend (Lyude Paul) [1577760 1563957] - [gpu] drm: Allow determining if current task is output poll worker (Lyude Paul) [1577760 1563957] - [gpu] workqueue: Allow retrieval of current task's work struct (1/5) (Lyude Paul) [1577760 1563957] - [md] dm: remove fmode_t argument from .prepare_ioctl hook (Mike Snitzer) [1576508 1562960] - [md] dm: hold DM table for duration of ioctl rather than use blkdev_get (Mike Snitzer) [1576508 1562960] - [scsi] iscsi: respond to netlink with unicast when appropriate (Chris Leech) [1576293 1330865] - [netdrv] i40e: fix incorrect UP-TC mapping (Stefan Assmann) [1574371 1558159] - [powerpc] System reset avoid interleaving oops using die synchronisation (Mauricio Oliveira) [1574366 1564126] - [powerpc] Do not send system reset request through the oops path (Mauricio Oliveira) [1574366 1564126] - [powerpc] crash: Remove the test for cpu_online in the IPI callback (Mauricio Oliveira) [1574366 1564126] - [sound] hda: Fix a wrong FIXUP for alc289 on Dell machines (Jaroslav Kysela) [1571581 1548969] - [sound] hda: Fix headset mic detection problem for two Dell machines (Jaroslav Kysela) [1571581 1548969] - [firmware] fw_cfg: write vmcoreinfo details (Marc-Andre Lureau) [1571369 1533367] - [kernel] crash: export paddr_vmcoreinfo_note() (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: add DMA register (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: add a public uapi header (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: handle fw_cfg_read_blob() error (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: remove inline from fw_cfg_read_blob() (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: fix sparse warnings around FW_CFG_FILE_DIR read (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: fix sparse warning reading FW_CFG_ID (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: fix sparse warnings with fw_cfg_file (Marc-Andre Lureau) [1571369 1533367] - [firmware] fw_cfg: fix sparse warnings in fw_cfg_sel_endianness() (Marc-Andre Lureau) [1571369 1533367] - [firmware] revert "fw_cfg: add DMA register" (Marc-Andre Lureau) [1571369 1533367] - [firmware] revert "fw_cfg: do DMA read operation" (Marc-Andre Lureau) [1571369 1533367] - [firmware] revert "fw_cfg: write vmcoreinfo details" (Marc-Andre Lureau) [1571369 1533367] - [infiniband] mlx5: Set the default active rate and width to QDR and 4X (Honggang Li) [1570536 1554535] - [x86] spec_ctrl: disable IBRS in idle, part 2 (Josh Poimboeuf) [1570532 1558668] - [x86] platform/uv: Fix critical UV MMR address error (Frank Ramsay) [1570520 1562945] - [powerpc] pseries: Restore default security feature flags on setup (Mauricio Oliveira) [1570518 1561787] - [powerpc] Move default security feature flags (Mauricio Oliveira) [1570518 1561787] - [powerpc] pseries: Fix clearing of security feature flags (Mauricio Oliveira) [1570518 1561787] - [powerpc] 64s: Wire up cpu_show_spectre_v2() (Mauricio Oliveira) [1570518 1561787] - [powerpc] 64s: Wire up cpu_show_spectre_v1() (Mauricio Oliveira) [1570518 1561787] - [powerpc] pseries: Use the security flags in pseries_setup_rfi_flush() (Mauricio Oliveira) [1570518 1561787] - [powerpc] powernv: Use the security flags in pnv_setup_rfi_flush() (Mauricio Oliveira) [1570518 1561787] - [powerpc] 64s: Enhance the information in cpu_show_meltdown() (Mauricio Oliveira) [1570518 1561787] - [powerpc] 64s: Move cpu_show_meltdown() (Mauricio Oliveira) [1570518 1561787] - [powerpc] powernv: Set or clear security feature flags (Mauricio Oliveira) [1570518 1561787] - [powerpc] pseries: Set or clear security feature flags (Mauricio Oliveira) [1570518 1561787] - [powerpc] Add security feature flags for Spectre/Meltdown (Mauricio Oliveira) [1570518 1561787] - [powerpc] pseries: Add new H_GET_CPU_CHARACTERISTICS flags (Mauricio Oliveira) [1570518 1561787] - [powerpc] lib: seq: Add seq_buf_printf() (Mauricio Oliveira) [1570518 1561787] - [powerpc] rfi-flush: Call setup_rfi_flush() after LPM migration (Mauricio Oliveira) [1570509 1561785] - [powerpc] rfi-flush: Differentiate enabled and patched flush types (Mauricio Oliveira) [1570509 1561785] - [powerpc] rfi-flush: Always enable fallback flush on pseries (Mauricio Oliveira) [1570509 1561785] - [powerpc] rfi-flush: Make it possible to call setup_rfi_flush() again (Mauricio Oliveira) [1570509 1561785] - [powerpc] rfi-flush: Move the logic to avoid a redo into the debugfs code (Mauricio Oliveira) [1570509 1561785] - [fs] vfs: Remove incorrect debugging WARN in prepend_path (Frank Sorenson) [1568322 1481732] - [fs] xfs: fix transaction allocation deadlock in IO path (Eric Sandeen) [1568320 1551111] - [md] support to split big bio (Ming Lei) [1568070 1557434] - [block] introduce bio_split2() and bio_pair2_release() (Ming Lei) [1568070 1557434] - [netdrv] qed: Free reserved MR tid (Harish Patil) [1568069 1554217] - [netdrv] qed: Free RoCE ILT Memory on rmmod qedr (Harish Patil) [1568069 1554217] - [net] sctp: use right member as the param of list_for_each_entry (Xin Long) [1565983 1483445] - [net] sctp: reset owner sk for data chunks on out queues when migrating a sock (Xin Long) [1565983 1483445] - [net] xfrm: policy: check policy direction value (Bruno Eduardo de Oliveira Meneguele) [1479419 1479421] {CVE-2017-11600} - [x86] spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] entry: Add missing "$" in IBRS macros (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [fs] proc: Use CamelCase for SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] bugs: Rename _RDS to _SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [kernel] seccomp: Enable speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [fs] proc: Provide details on speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] nospec: Allow getting/setting on non-current task (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [uapi] prctl: Add speculation control prctls (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] kvm/vmx: Expose SPEC_CTRL Bit(2) to the guest (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] bugs/amd: Add support to disable RDS on Fam[15, 16, 17]h if requested (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] bugs: Expose /sys/../spec_store_bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] bugs: Read SPEC_CTRL MSR during boot and re-use (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566904 1566905] {CVE-2018-3639} - [x86] cpufeatures: Make CPU bugs sticky (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [powerpc] msi: Fix race condition in tearing down MSI interrupts (David Milburn) [1570511 1549680]
- [x86] kpti/kexec: fix wrong page address in clear_page (Dave Young) [1573173 1571162] - [x86] kvm: fix icebp instruction handling (Paolo Bonzini) [1566849 1566845] {CVE-2018-1087} - [x86] entry/64: Don't use IST entry for #BP stack (Paolo Bonzini) [1567084 1567083] {CVE-2018-8897} - [kernel] perf/hwbp: Simplify the perf-hwbp code, fix documentation (Eugene Syromiatnikov) [1569878 1569874] {CVE-2018-1000199}
- [md] dm: fix dropped return code from dm_get_bdev_for_ioctl (Mike Snitzer) [1567746 1562962] - [crypto] aesni: Add support for 192 & 256 bit keys to AESNI RFC4106 (Bruno Eduardo de Oliveira Meneguele) [1570537 1568167]
- [x86] kexec/64: Clear control page after PGD init (Waiman Long) [1565700 1540061] - [x86] pti: Rework the UEFI data corruption fix (Waiman Long) [1565700 1540061] - [powerpc] tm: Flush TM only if CPU has TM feature (David Gibson) [1563773 1544676] {CVE-2018-1091} - [gpu] drm/i915/glk: IPC linetime watermark workaround for GLK (Lyude Paul) [1563711 1548651] - [x86] apic: Remove the (now) unused disable_IO_APIC() function (Baoquan He) [1563108 1521003] - [x86] apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (Baoquan He) [1563108 1521003] - [x86] apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (Baoquan He) [1563108 1521003] - [x86] apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (Baoquan He) [1563108 1521003] - [netdrv] i40e: Close client on suspend and restore client MSIx on resume (Stefan Assmann) [1563106 1538847] - [fs] nfs: Fix unstable write completion (Scott Mayhew) [1563103 1544647] - [x86] kvm: Fix device passthrough when SME is active (Suravee Suthikulpanit) [1563098 1557911] - [powerpc] powernv: Support firmware disable of RFI flush (Mauricio Oliveira) [1563096 1553927] - [powerpc] pseries: Support firmware disable of RFI flush (Mauricio Oliveira) [1563096 1553927] - [powerpc] pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper (Mauricio Oliveira) [1563096 1553927] - [nvme] fixup nvme_sysfs_delete() (David Milburn) [1563092 1543716] - [x86] smpboot: Fix uncore_pci_remove() indexing bug when hot-removing a physical CPU (Prarit Bhargava) [1563091 1527731] - [x86] tsc: Fix erroneous TSC rate on Skylake Xeon (Prarit Bhargava) [1563088 1466058] - [x86] tsc: Print tsc_khz, when it differs from cpu_khz (Prarit Bhargava) [1563088 1466058] - [x86] tsc: Future-proof native_calibrate_tsc() (Prarit Bhargava) [1563088 1466058] - [scsi] csiostor: add support for 32 bit port capabilities (Arjun Vynipadath) [1561906 1526163] - [netdrv] cxgb4/cxgbvf: Handle 32-bit fw port capabilities (Arjun Vynipadath) [1561906 1526163] - [netdrv] cxgb4vf: define get_fecparam ethtool callback (Arjun Vynipadath) [1561906 1526163] - [netdrv] cxgb4: ethtool forward error correction management support (Arjun Vynipadath) [1561906 1526163] - [netdrv] cxgb4: core hardware/firmware support for Forward Error Correction on a link (Arjun Vynipadath) [1561906 1526163] - [iscsi-target] Fix panic when adding second TCP connection to iSCSI session (Maurizio Lombardi) [1561900 1544670] - [crypto] chelsio: Fix src buffer dma length (Arjun Vynipadath) [1561899 1548047] - [crypto] chelsio: Move DMA un/mapping to chcr from lld cxgb4 driver (Arjun Vynipadath) [1561899 1548047] - [crypto] chelsio: Remove unused parameter (Arjun Vynipadath) [1561899 1548047] - [crypto] chelsio: Remove allocation of sg list to implement 2K limit of dsgl header (Arjun Vynipadath) [1561899 1548047] - [crypto] chelsio: introduce __skb_put_zero() (Arjun Vynipadath) [1561899 1548047] - [crypto] chelsio: make skb_put & friends return void pointers (Arjun Vynipadath) [1561899 1548047] - [gpu] drm/i915/cfl: Remove alpha support protection (Rob Clark) [1561897 1464911] - [gpu] drm/i915/cnl: Map VBT DDC Pin to BSpec DDC Pin (Rob Clark) [1561897 1464911] - [gpu] drm/i915: Add retries for LSPCON detection (Rob Clark) [1561897 1464911] - [gpu] drm/i915: Don't give up waiting on INVALID_MODE (Rob Clark) [1561897 1464911] - [nvme] pci: Fix EEH failure on ppc (Mauricio Oliveira) [1561894 1558499] - [net] netfilter: ebtables: fix erroneous reject of last rule (Florian Westphal) [1552366 1552370] {CVE-2018-1068} - [net] netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets (Florian Westphal) [1552366 1552370] {CVE-2018-1068} - [net] netfilter: bridge: ebt_among: add more missing match size checks (Florian Westphal) [1552366 1552370] {CVE-2018-1068} - [net] netfilter: bridge: ebt_among: add missing match size checks (Florian Westphal) [1552366 1552370] {CVE-2018-1068} - [net] ipsec: Fix aborted xfrm policy dump crash (Bruno Eduardo de Oliveira Meneguele) [1517292 1517290] {CVE-2017-16939}
- [netdrv] i40e: Fix attach VF to VM issue (Stefan Assmann) [1528123] - [netdrv] ixgbevf: Add check for ixgbe_mbox_api_13 to ixgbevf_probe when setting max_mtu (Ken Cox) [1556696] - [md] dm btree: fix serious bug in btree_split_beneath() (Mike Snitzer) [1557849] - [x86] pti: Disable PTI user page table update in EFI virtual mode (Waiman Long) [1540061]