Received: by 10.223.176.5 with SMTP id f5csp2822272wra; Mon, 5 Feb 2018 10:25:16 -0800 (PST) X-Google-Smtp-Source: AH8x2276t87/yDX4D3lxehzOUm+BZ1Hc192OXFXUXrhQL0nfrhaNZ/u0ODS/iFeCRW9GNGcjVruv X-Received: by 2002:a17:902:50e:: with SMTP id 14-v6mr44114171plf.360.1517855116620; Mon, 05 Feb 2018 10:25:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517855116; cv=none; d=google.com; s=arc-20160816; b=XHvzZupAjUgDTwBnEuTtXLtCHEWctEhoAEj2YcrJ2cR+fjcNwQqXVrcxlYkGfrf7JM QXaXqqaMV5CTZax25uBZtfXcRi5l2ymmEdt/t8VWTcHW4XJJTEdi+QmIHdwb5Yg7xzaG 3Ob51u7X3WzLKefxbSxZXuMAChk7igQ9OvCnR9mzXgQP3txrXI43ZthvmQgmYlzykQeF vbopug03T26Z1YRk/umI8Ba263HeFxzp/ExatObL/bMVqhWytJp4OVlMn3Z5n2fu7bLt UtbB+YX5NTP6qxYWjTCtpJs89QfmLmyWDUpBmMt2Hwiw1AcqmsJY+34KVkS/gUkcd/64 tVSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:date:subject:cc:to :from:arc-authentication-results; bh=caiLz+TokZaJtp+3v1uBwQQ3Ct+8VACIru1qTlVIncE=; b=uOL3WtRmVqqNaJ//X8U2skZXdj/W4sp2lcEOZ02W17kFezy7B3Zl/PYBiM3xpqaTDI 0GHpG0zGckLMI+lCsdlsqX8CATaw3xI2qqniNMBrjvqHXz+/fndOJsqUePBPtg+yMsPM PdH04xt24w5NwHZlMOPrp5XMX4J0BL7XoCpZ+hcIHKEnvKEDVx6CcqgvVRBNLwLP58fl 4tTb8Oce/enYT60N5rIyCUmAA3ksQGwHU27cGjkm02rD0ctcWrJju1+X0Fj26mhN7Cco sfwnEy5JRorjVit2xqRyR/eGeLq/1qtonpKGrxMukXiDeouV2Bu4j1JYPzU05dwP5mHz doOw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u74si87667pfg.192.2018.02.05.10.25.02; Mon, 05 Feb 2018 10:25:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753393AbeBESXb (ORCPT + 99 others); Mon, 5 Feb 2018 13:23:31 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:50764 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752738AbeBESXZ (ORCPT ); Mon, 5 Feb 2018 13:23:25 -0500 Received: from localhost (unknown [104.132.1.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 386EEF7D; Mon, 5 Feb 2018 18:23:25 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuahkh@osg.samsung.com, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.14 00/64] 4.14.18-stable review Date: Mon, 5 Feb 2018 10:22:19 -0800 Message-Id: <20180205182138.571333346@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 User-Agent: quilt/0.65 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.18-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.14.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.14.18-rc1 X-KernelTest-Deadline: 2018-02-07T18:21+00:00 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.14.18 release. There are 64 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed Feb 7 18:21:22 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.18-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.14.18-rc1 Ian Abbott fpga: region: release of_parse_phandle nodes after use Sebastian Andrzej Siewior serial: core: mark port as initialized after successful IRQ change KarimAllah Ahmed KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL KarimAllah Ahmed KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL KarimAllah Ahmed KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES Ashok Raj KVM/x86: Add IBPB support KarimAllah Ahmed KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX Darren Kenny x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL Arnd Bergmann x86/pti: Mark constant arrays as __initconst KarimAllah Ahmed x86/spectre: Simplify spectre_v2 command line parsing David Woodhouse x86/retpoline: Avoid retpolines for built-in __init functions Dan Williams x86/kvm: Update spectre-v1 mitigation Paolo Bonzini KVM: VMX: make MSR bitmaps per-VCPU Josh Poimboeuf x86/paravirt: Remove 'noreplace-paravirt' cmdline option Tim Chen x86/speculation: Use Indirect Branch Prediction Barrier in context switch David Woodhouse x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel Colin Ian King x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" Dan Williams x86/spectre: Report get_user mitigation for spectre_v1 Dan Williams nl80211: Sanitize array index in parse_txq_params Dan Williams vfs, fdtable: Prevent bounds-check bypass via speculative execution Dan Williams x86/syscall: Sanitize syscall table de-references under speculation Dan Williams x86/get_user: Use pointer masking to limit speculation Dan Williams x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec Dan Williams x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} Dan Williams x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec Dan Williams x86: Introduce barrier_nospec Dan Williams x86: Implement array_index_mask_nospec Dan Williams array_index_nospec: Sanitize speculative array de-references Mark Rutland Documentation: Document array_index_nospec Andy Lutomirski x86/asm: Move 'status' from thread_struct to thread_info Andy Lutomirski x86/entry/64: Push extra regs right away Andy Lutomirski x86/entry/64: Remove the SYSCALL64 fast path Dou Liyang x86/spectre: Check CONFIG_RETPOLINE in command line parser William Grant x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP Josh Poimboeuf objtool: Warn on stripped section symbol Josh Poimboeuf objtool: Add support for alternatives at the end of a section Josh Poimboeuf objtool: Improve retpoline alternative handling Paolo Bonzini KVM: VMX: introduce alloc_loaded_vmcs Jim Mattson KVM: nVMX: Eliminate vmcs02 pool Jesse Chan ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE Jesse Chan pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE Linus Walleij iio: adc/accel: Fix up module licenses Jesse Chan auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE Borislav Petkov x86/speculation: Simplify indirect_branch_prediction_barrier() Borislav Petkov x86/retpoline: Simplify vmexit_fill_RSB() David Woodhouse x86/cpufeatures: Clean up Spectre v2 related CPUID flags Thomas Gleixner x86/cpu/bugs: Make retpoline module warning conditional Borislav Petkov x86/bugs: Drop one "mitigation" from dmesg Borislav Petkov x86/nospec: Fix header guards names Borislav Petkov x86/alternative: Print unadorned pointers David Woodhouse x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support David Woodhouse x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes David Woodhouse x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown David Woodhouse x86/msr: Add definitions for new speculation control MSRs David Woodhouse x86/cpufeatures: Add AMD feature bits for Speculation Control David Woodhouse x86/cpufeatures: Add Intel feature bits for Speculation Control David Woodhouse x86/cpufeatures: Add CPUID_7_EDX CPUID leaf Andi Kleen module/retpoline: Warn about missing retpoline in module Peter Zijlstra KVM: VMX: Make indirect call speculation safe Peter Zijlstra KVM: x86: Make indirect calls in emulator speculation safe Waiman Long x86/retpoline: Remove the esp/rsp thunk Michael Ellerman powerpc/64s: Allow control of RFI flush via debugfs Michael Ellerman powerpc/64s: Wire up cpu_show_meltdown() Liu, Changcheng scripts/faddr2line: fix CROSS_COMPILE unset error ------------- Diffstat: Documentation/admin-guide/kernel-parameters.txt | 2 - Documentation/speculation.txt | 90 ++++ Makefile | 4 +- arch/powerpc/Kconfig | 1 + arch/powerpc/kernel/setup_64.c | 38 ++ arch/x86/entry/common.c | 9 +- arch/x86/entry/entry_32.S | 3 +- arch/x86/entry/entry_64.S | 130 +---- arch/x86/entry/syscall_64.c | 7 +- arch/x86/include/asm/asm-prototypes.h | 4 +- arch/x86/include/asm/barrier.h | 28 + arch/x86/include/asm/cpufeature.h | 7 +- arch/x86/include/asm/cpufeatures.h | 22 +- arch/x86/include/asm/disabled-features.h | 3 +- arch/x86/include/asm/fixmap.h | 6 +- arch/x86/include/asm/msr-index.h | 12 + arch/x86/include/asm/msr.h | 3 +- arch/x86/include/asm/nospec-branch.h | 86 +-- arch/x86/include/asm/pgtable_32_types.h | 5 +- arch/x86/include/asm/processor.h | 5 +- arch/x86/include/asm/required-features.h | 3 +- arch/x86/include/asm/syscall.h | 6 +- arch/x86/include/asm/thread_info.h | 3 +- arch/x86/include/asm/tlbflush.h | 2 + arch/x86/include/asm/uaccess.h | 15 +- arch/x86/include/asm/uaccess_32.h | 6 +- arch/x86/include/asm/uaccess_64.h | 12 +- arch/x86/kernel/alternative.c | 28 +- arch/x86/kernel/cpu/bugs.c | 134 +++-- arch/x86/kernel/cpu/common.c | 70 ++- arch/x86/kernel/cpu/intel.c | 66 +++ arch/x86/kernel/cpu/scattered.c | 2 - arch/x86/kernel/process_64.c | 4 +- arch/x86/kernel/ptrace.c | 2 +- arch/x86/kernel/signal.c | 2 +- arch/x86/kvm/cpuid.c | 22 +- arch/x86/kvm/cpuid.h | 1 + arch/x86/kvm/emulate.c | 9 +- arch/x86/kvm/svm.c | 116 +++++ arch/x86/kvm/vmx.c | 660 ++++++++++++++---------- arch/x86/kvm/x86.c | 1 + arch/x86/lib/Makefile | 1 + arch/x86/lib/getuser.S | 10 + arch/x86/lib/retpoline.S | 57 +- arch/x86/lib/usercopy_32.c | 8 +- arch/x86/mm/tlb.c | 33 +- drivers/auxdisplay/img-ascii-lcd.c | 4 + drivers/fpga/fpga-region.c | 13 +- drivers/iio/accel/kxsd9-i2c.c | 3 + drivers/iio/adc/qcom-vadc-common.c | 4 + drivers/pinctrl/pxa/pinctrl-pxa2xx.c | 4 + drivers/tty/serial/serial_core.c | 2 + include/linux/fdtable.h | 5 +- include/linux/init.h | 9 +- include/linux/module.h | 9 + include/linux/nospec.h | 72 +++ kernel/module.c | 11 + net/wireless/nl80211.c | 9 +- scripts/faddr2line | 8 +- scripts/mod/modpost.c | 9 + sound/soc/codecs/pcm512x-spi.c | 4 + tools/objtool/check.c | 89 ++-- tools/objtool/orc_gen.c | 5 + 63 files changed, 1355 insertions(+), 643 deletions(-)