This is the start of the stable review cycle for the 5.10.131 release.
There are 131 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.131-rc2.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <[email protected]>
Linux 5.10.131-rc2
Borislav Petkov <[email protected]>
tools/insn: Restore the relative include paths for cross building
Thomas Gleixner <[email protected]>
x86/static_call: Serialize __static_call_fixup() properly
Pawan Gupta <[email protected]>
x86/speculation: Disable RRSBA behavior
Konrad Rzeszutek Wilk <[email protected]>
x86/kexec: Disable RET on kexec
Thadeu Lima de Souza Cascardo <[email protected]>
x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
Pawan Gupta <[email protected]>
x86/bugs: Add Cannon lake to RETBleed affected CPU list
Peter Zijlstra <[email protected]>
x86/retbleed: Add fine grained Kconfig knobs
Andrew Cooper <[email protected]>
x86/cpu/amd: Enumerate BTC_NO
Peter Zijlstra <[email protected]>
x86/common: Stamp out the stepping madness
Josh Poimboeuf <[email protected]>
x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf <[email protected]>
KVM: VMX: Fix IBRS handling after vmexit
Josh Poimboeuf <[email protected]>
KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf <[email protected]>
KVM: VMX: Convert launched argument to flags
Josh Poimboeuf <[email protected]>
KVM: VMX: Flatten __vmx_vcpu_run()
Josh Poimboeuf <[email protected]>
objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}
Josh Poimboeuf <[email protected]>
x86/speculation: Remove x86_spec_ctrl_mask
Josh Poimboeuf <[email protected]>
x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
Josh Poimboeuf <[email protected]>
x86/speculation: Fix SPEC_CTRL write on SMT state change
Josh Poimboeuf <[email protected]>
x86/speculation: Fix firmware entry SPEC_CTRL handling
Josh Poimboeuf <[email protected]>
x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
Peter Zijlstra <[email protected]>
x86/cpu/amd: Add Spectral Chicken
Peter Zijlstra <[email protected]>
objtool: Add entry UNRET validation
Josh Poimboeuf <[email protected]>
x86/bugs: Do IBPB fallback check only once
Peter Zijlstra <[email protected]>
x86/bugs: Add retbleed=ibpb
Peter Zijlstra <[email protected]>
x86/xen: Rename SYS* entry points
Peter Zijlstra <[email protected]>
objtool: Update Retpoline validation
Peter Zijlstra <[email protected]>
intel_idle: Disable IBRS during long idle
Peter Zijlstra <[email protected]>
x86/bugs: Report Intel retbleed vulnerability
Peter Zijlstra <[email protected]>
x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
Pawan Gupta <[email protected]>
x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
Peter Zijlstra <[email protected]>
x86/bugs: Optimize SPEC_CTRL MSR writes
Peter Zijlstra <[email protected]>
x86/entry: Add kernel IBRS implementation
Peter Zijlstra <[email protected]>
x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
Kim Phillips <[email protected]>
x86/bugs: Enable STIBP for JMP2RET
Alexandre Chartre <[email protected]>
x86/bugs: Add AMD retbleed= boot parameter
Alexandre Chartre <[email protected]>
x86/bugs: Report AMD retbleed vulnerability
Peter Zijlstra <[email protected]>
x86: Add magic AMD return-thunk
Peter Zijlstra <[email protected]>
objtool: Treat .text.__x86.* as noinstr
Peter Zijlstra <[email protected]>
x86: Use return-thunk in asm code
Kim Phillips <[email protected]>
x86/sev: Avoid using __x86_return_thunk
Peter Zijlstra <[email protected]>
x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
Peter Zijlstra <[email protected]>
x86/kvm: Fix SETcc emulation for return thunks
Peter Zijlstra <[email protected]>
x86/bpf: Use alternative RET encoding
Peter Zijlstra <[email protected]>
x86/ftrace: Use alternative RET encoding
Peter Zijlstra <[email protected]>
x86,static_call: Use alternative RET encoding
Thadeu Lima de Souza Cascardo <[email protected]>
objtool: skip non-text sections when adding return-thunk sites
Peter Zijlstra <[email protected]>
x86,objtool: Create .return_sites
Peter Zijlstra <[email protected]>
x86: Undo return-thunk damage
Peter Zijlstra <[email protected]>
x86/retpoline: Use -mfunction-return
Ben Hutchings <[email protected]>
Makefile: Set retpoline cflags based on CONFIG_CC_IS_{CLANG,GCC}
Peter Zijlstra <[email protected]>
x86/retpoline: Swizzle retpoline thunk
Peter Zijlstra <[email protected]>
x86/retpoline: Cleanup some #ifdefery
Peter Zijlstra <[email protected]>
x86/cpufeatures: Move RETPOLINE flags to word 11
Peter Zijlstra <[email protected]>
x86/kvm/vmx: Make noinstr clean
Thadeu Lima de Souza Cascardo <[email protected]>
x86/realmode: build with -D__DISABLE_EXPORTS
Mikulas Patocka <[email protected]>
objtool: Fix objtool regression on x32 systems
Peter Zijlstra <[email protected]>
x86/entry: Remove skip_r11rcx
Peter Zijlstra <[email protected]>
objtool: Fix symbol creation
Peter Zijlstra <[email protected]>
objtool: Fix type of reloc::addend
Peter Zijlstra <[email protected]>
objtool: Fix code relocs vs weak symbols
Peter Zijlstra <[email protected]>
objtool: Fix SLS validation for kcov tail-call replacement
Peter Zijlstra <[email protected]>
crypto: x86/poly1305 - Fixup SLS
Peter Zijlstra <[email protected]>
objtool: Default ignore INT3 for unreachable
Borislav Petkov <[email protected]>
kvm/emulate: Fix SETcc emulation function offsets with SLS
Arnaldo Carvalho de Melo <[email protected]>
tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in 'perf bench mem memcpy'
Peter Zijlstra <[email protected]>
x86: Add straight-line-speculation mitigation
Peter Zijlstra <[email protected]>
objtool: Add straight-line-speculation validation
Peter Zijlstra <[email protected]>
x86/alternative: Relax text_poke_bp() constraint
Peter Zijlstra <[email protected]>
x86: Prepare inline-asm for straight-line-speculation
Peter Zijlstra <[email protected]>
x86: Prepare asm files for straight-line-speculation
Peter Zijlstra <[email protected]>
x86/lib/atomic64_386_32: Rename things
Peter Zijlstra <[email protected]>
bpf,x86: Respect X86_FEATURE_RETPOLINE*
Peter Zijlstra <[email protected]>
bpf,x86: Simplify computing label offsets
Peter Zijlstra <[email protected]>
x86/alternative: Add debug prints to apply_retpolines()
Peter Zijlstra <[email protected]>
x86/alternative: Try inline spectre_v2=retpoline,amd
Peter Zijlstra <[email protected]>
x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
Peter Zijlstra <[email protected]>
x86/alternative: Implement .retpoline_sites support
Peter Zijlstra <[email protected]>
x86/retpoline: Create a retpoline thunk array
Peter Zijlstra <[email protected]>
x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
Peter Zijlstra <[email protected]>
x86/asm: Fixup odd GEN-for-each-reg.h usage
Peter Zijlstra <[email protected]>
x86/asm: Fix register order
Peter Zijlstra <[email protected]>
x86/retpoline: Remove unused replacement symbols
Peter Zijlstra <[email protected]>
objtool,x86: Replace alternatives with .retpoline_sites
Peter Zijlstra <[email protected]>
objtool: Explicitly avoid self modifying code in .altinstr_replacement
Peter Zijlstra <[email protected]>
objtool: Classify symbols
Peter Zijlstra <[email protected]>
objtool: Handle __sanitize_cov*() tail calls
Peter Zijlstra <[email protected]>
objtool: Introduce CFI hash
Joe Lawrence <[email protected]>
objtool: Make .altinstructions section entry size consistent
Josh Poimboeuf <[email protected]>
objtool: Remove reloc symbol type checks in get_alt_entry()
Linus Torvalds <[email protected]>
objtool: print out the symbol type when complaining about it
Peter Zijlstra <[email protected]>
objtool: Teach get_alt_entry() about more relocation types
Josh Poimboeuf <[email protected]>
objtool: Don't make .altinstructions writable
Peter Zijlstra <[email protected]>
objtool/x86: Ignore __x86_indirect_alt_* symbols
Peter Zijlstra <[email protected]>
objtool: Only rewrite unconditional retpoline thunk calls
Peter Zijlstra <[email protected]>
objtool: Fix .symtab_shndx handling for elf_create_undef_symbol()
Borislav Petkov <[email protected]>
x86/alternative: Optimize single-byte NOPs at an arbitrary position
Josh Poimboeuf <[email protected]>
objtool: Support asm jump tables
Peter Zijlstra <[email protected]>
objtool/x86: Rewrite retpoline thunk calls
Peter Zijlstra <[email protected]>
objtool: Skip magical retpoline .altinstr_replacement
Peter Zijlstra <[email protected]>
objtool: Cache instruction relocs
Peter Zijlstra <[email protected]>
objtool: Keep track of retpoline call sites
Peter Zijlstra <[email protected]>
objtool: Add elf_create_undef_symbol()
Peter Zijlstra <[email protected]>
objtool: Extract elf_symbol_add()
Peter Zijlstra <[email protected]>
objtool: Extract elf_strtab_concat()
Peter Zijlstra <[email protected]>
objtool: Create reloc sections implicitly
Peter Zijlstra <[email protected]>
objtool: Add elf_create_reloc() helper
Peter Zijlstra <[email protected]>
objtool: Rework the elf_rebuild_reloc_section() logic
Peter Zijlstra <[email protected]>
objtool: Handle per arch retpoline naming
Peter Zijlstra <[email protected]>
objtool: Correctly handle retpoline thunk calls
Peter Zijlstra <[email protected]>
x86/retpoline: Simplify retpolines
Peter Zijlstra <[email protected]>
x86/alternatives: Optimize optimize_nops()
Ben Hutchings <[email protected]>
x86: Add insn_decode_kernel()
Borislav Petkov <[email protected]>
x86/alternative: Use insn_decode()
Borislav Petkov <[email protected]>
x86/insn-eval: Handle return values from the decoder
Borislav Petkov <[email protected]>
x86/insn: Add an insn_decode() API
Borislav Petkov <[email protected]>
x86/insn: Add a __ignore_sync_check__ marker
Borislav Petkov <[email protected]>
x86/insn: Rename insn_decode() to insn_decode_from_regs()
Juergen Gross <[email protected]>
x86/alternative: Use ALTERNATIVE_TERNARY() in _static_cpu_has()
Juergen Gross <[email protected]>
x86/alternative: Support ALTERNATIVE_TERNARY
Juergen Gross <[email protected]>
x86/alternative: Support not-feature
Juergen Gross <[email protected]>
x86/alternative: Merge include files
Josh Poimboeuf <[email protected]>
x86/xen: Support objtool vmlinux.o validation in xen-head.S
Josh Poimboeuf <[email protected]>
x86/xen: Support objtool validation in xen-asm.S
Josh Poimboeuf <[email protected]>
objtool: Combine UNWIND_HINT_RET_OFFSET and UNWIND_HINT_FUNC
Josh Poimboeuf <[email protected]>
objtool: Assume only ELF functions do sibling calls
Josh Poimboeuf <[email protected]>
objtool: Support retpoline jump detection for vmlinux.o
Josh Poimboeuf <[email protected]>
objtool: Support stack layout changes in alternatives
Josh Poimboeuf <[email protected]>
objtool: Add 'alt_group' struct
Josh Poimboeuf <[email protected]>
objtool: Refactor ORC section generation
Uros Bizjak <[email protected]>
KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
Uros Bizjak <[email protected]>
KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 25 +
Makefile | 24 +-
arch/um/kernel/um_arch.c | 4 +
arch/x86/Kconfig | 91 +-
arch/x86/Makefile | 8 +-
arch/x86/boot/compressed/efi_thunk_64.S | 2 +-
arch/x86/boot/compressed/head_64.S | 4 +-
arch/x86/boot/compressed/mem_encrypt.S | 4 +-
arch/x86/crypto/aegis128-aesni-asm.S | 48 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 2 +-
arch/x86/crypto/aesni-intel_asm.S | 52 +-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 40 +-
arch/x86/crypto/blake2s-core.S | 4 +-
arch/x86/crypto/blowfish-x86_64-asm_64.S | 12 +-
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 18 +-
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 18 +-
arch/x86/crypto/camellia-x86_64-asm_64.S | 12 +-
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 12 +-
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 16 +-
arch/x86/crypto/chacha-avx2-x86_64.S | 6 +-
arch/x86/crypto/chacha-avx512vl-x86_64.S | 6 +-
arch/x86/crypto/chacha-ssse3-x86_64.S | 8 +-
arch/x86/crypto/crc32-pclmul_asm.S | 2 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 2 +-
arch/x86/crypto/crct10dif-pcl-asm_64.S | 2 +-
arch/x86/crypto/des3_ede-asm_64.S | 4 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 6 +-
arch/x86/crypto/nh-avx2-x86_64.S | 2 +-
arch/x86/crypto/nh-sse2-x86_64.S | 2 +-
arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 38 +-
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 16 +-
arch/x86/crypto/serpent-avx2-asm_64.S | 16 +-
arch/x86/crypto/serpent-sse2-i586-asm_32.S | 6 +-
arch/x86/crypto/serpent-sse2-x86_64-asm_64.S | 6 +-
arch/x86/crypto/sha1_avx2_x86_64_asm.S | 2 +-
arch/x86/crypto/sha1_ni_asm.S | 2 +-
arch/x86/crypto/sha1_ssse3_asm.S | 2 +-
arch/x86/crypto/sha256-avx-asm.S | 2 +-
arch/x86/crypto/sha256-avx2-asm.S | 2 +-
arch/x86/crypto/sha256-ssse3-asm.S | 2 +-
arch/x86/crypto/sha256_ni_asm.S | 2 +-
arch/x86/crypto/sha512-avx-asm.S | 2 +-
arch/x86/crypto/sha512-avx2-asm.S | 2 +-
arch/x86/crypto/sha512-ssse3-asm.S | 2 +-
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 16 +-
arch/x86/crypto/twofish-i586-asm_32.S | 4 +-
arch/x86/crypto/twofish-x86_64-asm_64-3way.S | 6 +-
arch/x86/crypto/twofish-x86_64-asm_64.S | 4 +-
arch/x86/entry/Makefile | 2 +-
arch/x86/entry/calling.h | 72 +-
arch/x86/entry/entry.S | 22 +
arch/x86/entry/entry_32.S | 6 +-
arch/x86/entry/entry_64.S | 62 +-
arch/x86/entry/entry_64_compat.S | 21 +-
arch/x86/entry/thunk_32.S | 2 +-
arch/x86/entry/thunk_64.S | 2 +-
arch/x86/entry/vdso/Makefile | 1 +
arch/x86/entry/vdso/vdso32/system_call.S | 4 +-
arch/x86/entry/vsyscall/vsyscall_emu_64.S | 3 +
arch/x86/include/asm/GEN-for-each-reg.h | 14 +-
arch/x86/include/asm/alternative-asm.h | 114 ---
arch/x86/include/asm/alternative.h | 137 ++-
arch/x86/include/asm/asm-prototypes.h | 17 -
arch/x86/include/asm/cpufeature.h | 41 +-
arch/x86/include/asm/cpufeatures.h | 14 +-
arch/x86/include/asm/disabled-features.h | 21 +-
arch/x86/include/asm/inat.h | 2 +-
arch/x86/include/asm/insn-eval.h | 4 +-
arch/x86/include/asm/insn.h | 28 +-
arch/x86/include/asm/linkage.h | 22 +
arch/x86/include/asm/msr-index.h | 13 +
arch/x86/include/asm/nospec-branch.h | 140 +--
arch/x86/include/asm/paravirt.h | 2 +-
arch/x86/include/asm/qspinlock_paravirt.h | 4 +-
arch/x86/include/asm/smap.h | 5 +-
arch/x86/include/asm/static_call.h | 19 +-
arch/x86/include/asm/unwind_hints.h | 23 +-
arch/x86/kernel/acpi/wakeup_32.S | 6 +-
arch/x86/kernel/alternative.c | 406 +++++++-
arch/x86/kernel/cpu/amd.c | 46 +-
arch/x86/kernel/cpu/bugs.c | 475 +++++++--
arch/x86/kernel/cpu/common.c | 61 +-
arch/x86/kernel/cpu/cpu.h | 2 +
arch/x86/kernel/cpu/hygon.c | 6 +
arch/x86/kernel/cpu/scattered.c | 1 +
arch/x86/kernel/ftrace.c | 7 +-
arch/x86/kernel/ftrace_32.S | 6 +-
arch/x86/kernel/ftrace_64.S | 12 +-
arch/x86/kernel/head_32.S | 2 +-
arch/x86/kernel/head_64.S | 5 +
arch/x86/kernel/irqflags.S | 4 +-
arch/x86/kernel/kprobes/core.c | 2 +-
arch/x86/kernel/module.c | 15 +-
arch/x86/kernel/paravirt.c | 2 +-
arch/x86/kernel/process.c | 2 +-
arch/x86/kernel/relocate_kernel_32.S | 15 +-
arch/x86/kernel/relocate_kernel_64.S | 13 +-
arch/x86/kernel/sev-es.c | 2 +-
arch/x86/kernel/sev_verify_cbit.S | 2 +-
arch/x86/kernel/static_call.c | 52 +-
arch/x86/kernel/umip.c | 2 +-
arch/x86/kernel/verify_cpu.S | 4 +-
arch/x86/kernel/vmlinux.lds.S | 23 +-
arch/x86/kvm/emulate.c | 33 +-
arch/x86/kvm/svm/vmenter.S | 11 +-
arch/x86/kvm/vmx/nested.c | 32 +-
arch/x86/kvm/vmx/run_flags.h | 8 +
arch/x86/kvm/vmx/vmenter.S | 170 ++--
arch/x86/kvm/vmx/vmx.c | 78 +-
arch/x86/kvm/vmx/vmx.h | 5 +
arch/x86/kvm/x86.c | 4 +-
arch/x86/lib/atomic64_386_32.S | 88 +-
arch/x86/lib/atomic64_cx8_32.S | 18 +-
arch/x86/lib/checksum_32.S | 8 +-
arch/x86/lib/clear_page_64.S | 6 +-
arch/x86/lib/cmpxchg16b_emu.S | 4 +-
arch/x86/lib/cmpxchg8b_emu.S | 4 +-
arch/x86/lib/copy_mc_64.S | 6 +-
arch/x86/lib/copy_page_64.S | 6 +-
arch/x86/lib/copy_user_64.S | 14 +-
arch/x86/lib/csum-copy_64.S | 2 +-
arch/x86/lib/error-inject.c | 3 +-
arch/x86/lib/getuser.S | 22 +-
arch/x86/lib/hweight.S | 6 +-
arch/x86/lib/inat.c | 2 +-
arch/x86/lib/insn-eval.c | 40 +-
arch/x86/lib/insn.c | 222 ++++-
arch/x86/lib/iomap_copy_64.S | 2 +-
arch/x86/lib/memcpy_64.S | 14 +-
arch/x86/lib/memmove_64.S | 11 +-
arch/x86/lib/memset_64.S | 8 +-
arch/x86/lib/msr-reg.S | 4 +-
arch/x86/lib/putuser.S | 6 +-
arch/x86/lib/retpoline.S | 118 ++-
arch/x86/math-emu/div_Xsig.S | 2 +-
arch/x86/math-emu/div_small.S | 2 +-
arch/x86/math-emu/mul_Xsig.S | 6 +-
arch/x86/math-emu/polynom_Xsig.S | 2 +-
arch/x86/math-emu/reg_norm.S | 6 +-
arch/x86/math-emu/reg_round.S | 2 +-
arch/x86/math-emu/reg_u_add.S | 2 +-
arch/x86/math-emu/reg_u_div.S | 2 +-
arch/x86/math-emu/reg_u_mul.S | 2 +-
arch/x86/math-emu/reg_u_sub.S | 2 +-
arch/x86/math-emu/round_Xsig.S | 4 +-
arch/x86/math-emu/shr_Xsig.S | 8 +-
arch/x86/math-emu/wm_shrx.S | 16 +-
arch/x86/mm/mem_encrypt_boot.S | 6 +
arch/x86/net/bpf_jit_comp.c | 185 ++--
arch/x86/net/bpf_jit_comp32.c | 22 +-
arch/x86/platform/efi/efi_stub_32.S | 2 +-
arch/x86/platform/efi/efi_stub_64.S | 2 +-
arch/x86/platform/efi/efi_thunk_64.S | 2 +-
arch/x86/platform/olpc/xo1-wakeup.S | 6 +-
arch/x86/power/hibernate_asm_32.S | 4 +-
arch/x86/power/hibernate_asm_64.S | 4 +-
arch/x86/um/checksum_32.S | 4 +-
arch/x86/um/setjmp_32.S | 2 +-
arch/x86/um/setjmp_64.S | 2 +-
arch/x86/xen/Makefile | 1 -
arch/x86/xen/setup.c | 6 +-
arch/x86/xen/xen-asm.S | 43 +-
arch/x86/xen/xen-head.S | 6 +-
arch/x86/xen/xen-ops.h | 6 +-
drivers/base/cpu.c | 8 +
drivers/idle/intel_idle.c | 43 +-
include/linux/cpu.h | 2 +
include/linux/kvm_host.h | 2 +-
include/linux/objtool.h | 14 +-
samples/ftrace/ftrace-direct-modify.c | 4 +-
samples/ftrace/ftrace-direct-too.c | 2 +-
samples/ftrace/ftrace-direct.c | 2 +-
scripts/Makefile.build | 6 +
scripts/link-vmlinux.sh | 6 +
security/Kconfig | 11 -
tools/arch/x86/include/asm/inat.h | 2 +-
tools/arch/x86/include/asm/insn.h | 28 +-
tools/arch/x86/include/asm/msr-index.h | 9 +
tools/arch/x86/lib/inat.c | 2 +-
tools/arch/x86/lib/insn.c | 222 ++++-
tools/arch/x86/lib/memcpy_64.S | 12 +-
tools/arch/x86/lib/memset_64.S | 6 +-
tools/include/linux/kconfig.h | 73 ++
tools/include/linux/objtool.h | 14 +-
tools/objtool/Documentation/stack-validation.txt | 16 +-
tools/objtool/Makefile | 4 -
tools/objtool/arch.h | 13 +-
tools/objtool/arch/x86/decode.c | 58 +-
tools/objtool/arch/x86/include/arch_special.h | 2 +-
tools/objtool/builtin-check.c | 6 +-
tools/objtool/builtin-orc.c | 6 +-
tools/objtool/builtin.h | 3 +-
tools/objtool/cfi.h | 2 +
tools/objtool/check.c | 1140 +++++++++++++++++-----
tools/objtool/check.h | 35 +-
tools/objtool/elf.c | 434 ++++++--
tools/objtool/elf.h | 22 +-
tools/objtool/objtool.c | 2 +
tools/objtool/objtool.h | 5 +-
tools/objtool/orc_gen.c | 324 +++---
tools/objtool/special.c | 22 +-
tools/objtool/sync-check.sh | 17 +-
tools/objtool/weak.c | 7 +-
tools/perf/check-headers.sh | 15 +-
204 files changed, 4557 insertions(+), 1916 deletions(-)
On 7/13/22 06:10, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.131 release.
> There are 131 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000.
> Anything received after that time might be too late.
>
I see this in all branches, including mainline.
Building um:defconfig ... failed
--------------
Error log:
/opt/kernel/gcc-11.3.0-2.38-nolibc/x86_64-linux/bin/../lib/gcc/x86_64-linux/11.3.0/../../../../x86_64-linux/bin/ld: arch/x86/um/../kernel/module.o: in function `module_finalize':
arch/x86/um/../kernel/module.c:292: undefined reference to `apply_returns'
Guenter
On Wed, Jul 13, 2022 at 03:10:15PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.131 release.
> There are 131 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000.
> Anything received after that time might be too late.
>
All boots with efi32 bios crash. This seems to affect all stable release
candidates; so far I have seen it with v5.10.130-132-g6729599d99f and with
v5.18.11-62-g18f94637a014. Test results from mainline and from v5.15.54-rc1
are still pending.
[ 0.709966] kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
[ 0.709966] BUG: unable to handle page fault for address: 0000000021803b80
[ 0.709966] #PF: supervisor instruction fetch in kernel mode
[ 0.709966] #PF: error_code(0x0011) - permissions violation
[ 0.709966] PGD 175a063 P4D 175a063 PUD 175b063 PMD 1766063 PTE 8000000021803063
[ 0.709966] Oops: 0011 [#1] SMP PTI
[ 0.709966] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.131-rc2+ #1
[ 0.709966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[ 0.709966] RIP: 0010:0x21803b80
[ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56.
[ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046
[ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60
[ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038
[ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067
[ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030
[ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282
[ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000
[ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033
[ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0
[ 0.709966] Call Trace:
[ 0.709966] ? efi_set_virtual_address_map+0x87/0x160
[ 0.709966] ? efi_enter_virtual_mode+0x39a/0x3f5
[ 0.709966] ? start_kernel+0x4aa/0x544
[ 0.709966] ? secondary_startup_64_no_verify+0xc2/0xcb
[ 0.709966] Modules linked in:
[ 0.709966] CR2: 0000000021803b80
[ 0.709966] ---[ end trace 1b5f45b6ffd42130 ]---
[ 0.709966] RIP: 0010:0x21803b80
[ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56.
[ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046
[ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60
[ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038
[ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067
[ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030
[ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282
[ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000
[ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033
[ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0
[ 0.709966] Kernel panic - not syncing: Attempted to kill the idle task!
[ 0.709966] ACPI MEMORY or I/O RESET_REG.
Guenter
Hi Greg,
On Wed, Jul 13, 2022 at 03:10:15PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.131 release.
> There are 131 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000.
> Anything received after that time might be too late.
Build test (gcc version 11.3.1 20220706):
mips: 63 configs -> no failure
arm: 104 configs -> no failure
arm64: 3 configs -> no failure
x86_64: 4 configs -> no failure
alpha allmodconfig -> no failure
powerpc allmodconfig -> no failure
riscv allmodconfig -> no failure
s390 allmodconfig -> no failure
xtensa allmodconfig -> no failure
Boot test:
x86_64: Booted on my test laptop. No regression.
x86_64: Booted on qemu. No regression. [1]
arm64: Booted on rpi4b (4GB model). No regression. [2]
[1]. https://openqa.qa.codethink.co.uk/tests/1515
[2]. https://openqa.qa.codethink.co.uk/tests/1518
Tested-by: Sudip Mukherjee <[email protected]>
--
Regards
Sudip
On 7/13/22 06:10, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.131 release.
> There are 131 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.131-rc2.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
On ARCH_BRCMSTB using 32-bit and 64-bit ARM kernels:
Tested-by: Florian Fainelli <[email protected]>
--
Florian
On Wed, Jul 13, 2022 at 03:10:15PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.131 release.
> There are 131 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000.
> Anything received after that time might be too late.
>
Build results:
total: 163 pass: 162 fail: 1
Failed builds:
um:defconfig
Qemu test results:
total: 477 pass: 469 fail: 8
Failed tests:
x86_64:q35:SandyBridge:defconfig:smp4:net,ne2k_pci:efi32:mem1G:usb:hd
x86_64:q35:Conroe:defconfig:smp4:net,tulip:efi32:mem256:scsi[DC395]:hd
x86_64:q35:Skylake-Server:defconfig:smp4:net,e1000-82544gc:efi32:mem2G:scsi[53C895A]:hd
x86_64:q35:Opteron_G5:defconfig:smp4:net,i82559c:efi32:mem256:scsi[MEGASAS2]:hd
x86_64:pc:Opteron_G2:defconfig:smp:net,usb:efi32:mem2G:scsi[virtio-pci]:hd
x86_64:q35:Nehalem:defconfig:smp2:net,i82558a:efi32:mem1G:virtio:hd
x86_64:q35:Skylake-Client-IBRS:defconfig:preempt:smp2:net,i82558b:efi32:mem1G:sdhci:mmc:hd
x86_64:q35:Haswell-noTSX-IBRS:defconfig:nosmp:net,pcnet:efi32:mem2G:ata:hd
Build error:
/opt/kernel/gcc-11.3.0-2.38-nolibc/x86_64-linux/bin/../lib/gcc/x86_64-linux/11.3.0/../../../../x86_64-linux/bin/ld: arch/x86/um/../kernel/module.o: in function `module_finalize':
arch/x86/um/../kernel/module.c:283: undefined reference to `apply_returns'
Crash:
[ 0.709966] kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
[ 0.709966] BUG: unable to handle page fault for address: 0000000021803b80
[ 0.709966] #PF: supervisor instruction fetch in kernel mode
[ 0.709966] #PF: error_code(0x0011) - permissions violation
[ 0.709966] PGD 175a063 P4D 175a063 PUD 175b063 PMD 1766063 PTE 8000000021803063
[ 0.709966] Oops: 0011 [#1] SMP PTI
[ 0.709966] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.131-rc2+ #1
[ 0.709966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[ 0.709966] RIP: 0010:0x21803b80
[ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56.
[ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046
[ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60
[ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038
[ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067
[ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030
[ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282
[ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000
[ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033
[ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0
[ 0.709966] Call Trace:
[ 0.709966] ? efi_set_virtual_address_map+0x87/0x160
[ 0.709966] ? efi_enter_virtual_mode+0x39a/0x3f5
[ 0.709966] ? start_kernel+0x4aa/0x544
[ 0.709966] ? secondary_startup_64_no_verify+0xc2/0xcb
[ 0.709966] Modules linked in:
[ 0.709966] CR2: 0000000021803b80
[ 0.709966] ---[ end trace 1b5f45b6ffd42130 ]---
[ 0.709966] RIP: 0010:0x21803b80
[ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56.
[ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046
[ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60
[ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038
[ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067
[ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030
[ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282
[ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000
[ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033
[ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0
[ 0.709966] Kernel panic - not syncing: Attempted to kill the idle task!
This is the same for all stable release candidates, and is also seen
in the mainline kernel.
Guenter
On Wed, 13 Jul 2022 at 18:40, Greg Kroah-Hartman
<[email protected]> wrote:
>
> This is the start of the stable review cycle for the 5.10.131 release.
> There are 131 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.131-rc2.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
FYI,
With rc2 the perf build issues got fixed.
but we still see
Kernel panic on x86 while running kvm-unit-tests.
- Naresh