Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp805490imm; Mon, 21 May 2018 14:50:19 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpZhQC/hkxq/JRbWxghIZdqX5A2RWuRHMeWt9L6kQhHmnJbDPkdn0kn8WtV46mruVH/tN18 X-Received: by 2002:a17:902:3103:: with SMTP id w3-v6mr21486085plb.37.1526939419361; Mon, 21 May 2018 14:50:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526939419; cv=none; d=google.com; s=arc-20160816; b=AyaPbailKdLydsGLMqmlh0GLivbnyzkj5idJyvXx7BmxUE6xsMz9eodY2D+ROlbNWx CIqXzIIfSTaZ7g/IhXKHjfqcJM4VGrvIKZ5+UPcVyJMo9LHwdB46uHOoq3JZKATDcGgA jmdNmYmroIaUKT1ZHhi5TuWx7Y3e1cIrqCdD6HOs11jC5D+uMbvUmUI/73RNzt81nfNF yXl2A8xKJ7b08H3/MQePsJiV76Ovex2Be9PnvRQS5EraiYkP1O/4UomB5+v9tf5qGyq8 KskH/nkJF8YxjgVSjWbbGo6LXXdkgA2vSxJZyww4P44vnZrBfXOdRLDNFbKH40FGOM85 QpFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:date:subject:cc:to :from:dkim-signature:arc-authentication-results; bh=ooV3fDZFTSM2TLfNm0O4Em5ZDXWmzFAP9dqeqlOfBKs=; b=f9//ByqUbK5upMWmsAyxf7Mp6Ei9LppxoEyqVQla+V0pa8Xt61F9cCEZaBEvzGuVNu qrfK+idpzAJBkG67jQcdlk4hpZqZ6vbpsBF38GhfmLxn30JIfayH9YBGawJBZou6W6QW 82jcIm/y3nBNjG330pl9ECNsGfdx+jlR1U2LIxPPboBEPgN4UkY2xKA5HHOPlH1xQgac WQSpFDFVjscsyv5utHeHnUV3cSaUErHg27yFHPX/Yf4XPDys7INpRpij1m+a25UwK4YY LsRmg1nGcXw/x9bC7than+LZLwINW2WO/k/VLw1WiYAtE4N018w9KVtiSIXUQm0kyMWQ MHqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ta0UpOf3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 203-v6si14904676pfz.160.2018.05.21.14.50.03; Mon, 21 May 2018 14:50:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ta0UpOf3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932289AbeEUVsT (ORCPT + 99 others); Mon, 21 May 2018 17:48:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:38418 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754191AbeEUVXf (ORCPT ); Mon, 21 May 2018 17:23:35 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AC38B20853; Mon, 21 May 2018 21:23:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526937815; bh=Xp3Xv5itRkQqzaiCgCbSS6XZa9F+GxEl8d17tPV2vZw=; h=From:To:Cc:Subject:Date:From; b=ta0UpOf3PMoqc3OYFGy5LijoaIOHzUFmmjQXB+X8XtT+ONtl88Q5dqtftX9ZbGsTT eh95/BoBVvkCWD4zK2Aumu4VS2kPXUpNxuTrZzFmW1fNZM5tYZVty6LZ1lNmD28Lw3 /HH+oqzstbQ529VPu9xaxuc7XE/iOc/FnkfpvNvc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.16 000/110] 4.16.11-stable review Date: Mon, 21 May 2018 23:10:57 +0200 Message-Id: <20180521210503.823249477@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.16.11-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.16.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.16.11-rc1 X-KernelTest-Deadline: 2018-05-23T21:05+00:00 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.16.11 release. There are 110 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Tue May 22 21:04:14 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.16.11-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.16.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.16.11-rc1 Alexei Starovoitov bpf: Prevent memory disambiguation attack Konrad Rzeszutek Wilk x86/bugs: Rename SSBD_NO to SSB_NO Tom Lendacky KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD Thomas Gleixner x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG Thomas Gleixner x86/bugs: Rework spec_ctrl base and mask logic Thomas Gleixner x86/bugs: Remove x86_spec_ctrl_set() Thomas Gleixner x86/bugs: Expose x86_spec_ctrl_base directly Borislav Petkov x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host} Thomas Gleixner x86/speculation: Rework speculative_store_bypass_update() Tom Lendacky x86/speculation: Add virtualized speculative store bypass disable support Thomas Gleixner x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL Thomas Gleixner x86/speculation: Handle HT correctly on AMD Thomas Gleixner x86/cpufeatures: Add FEATURE_ZEN Thomas Gleixner x86/cpufeatures: Disentangle SSBD enumeration Thomas Gleixner x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS Borislav Petkov x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP Thomas Gleixner KVM: SVM: Move spec control call after restore of GS Jim Mattson x86/cpu: Make alternative_msr_write work for 32-bit code Konrad Rzeszutek Wilk x86/bugs: Fix the parameters alignment and missing void Jiri Kosina x86/bugs: Make cpu_show_common() static Jiri Kosina x86/bugs: Fix __ssb_select_mitigation() return type Borislav Petkov Documentation/spec_ctrl: Do some minor cleanups Konrad Rzeszutek Wilk proc: Use underscores for SSBD in 'status' Konrad Rzeszutek Wilk x86/bugs: Rename _RDS to _SSBD Kees Cook x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass Thomas Gleixner seccomp: Move speculation migitation control to arch code Kees Cook seccomp: Add filter flag to opt-out of SSB mitigation Thomas Gleixner seccomp: Use PR_SPEC_FORCE_DISABLE Thomas Gleixner prctl: Add force disable speculation Kees Cook x86/bugs: Make boot modes __ro_after_init Kees Cook seccomp: Enable speculation flaw mitigations Kees Cook proc: Provide details on speculation flaw mitigations Kees Cook nospec: Allow getting/setting on non-current task Thomas Gleixner x86/speculation: Add prctl for Speculative Store Bypass mitigation Thomas Gleixner x86/process: Allow runtime control of Speculative Store Bypass Thomas Gleixner prctl: Add speculation control prctls Thomas Gleixner x86/speculation: Create spec-ctrl.h to avoid include hell Konrad Rzeszutek Wilk x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest Konrad Rzeszutek Wilk x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested Konrad Rzeszutek Wilk x86/bugs: Whitelist allowed SPEC_CTRL MSR values Konrad Rzeszutek Wilk x86/bugs/intel: Set proper CPU features and setup RDS Konrad Rzeszutek Wilk x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation Konrad Rzeszutek Wilk x86/cpufeatures: Add X86_FEATURE_RDS Konrad Rzeszutek Wilk x86/bugs: Expose /sys/../spec_store_bypass Konrad Rzeszutek Wilk x86/bugs, KVM: Support the combination of guest and host IBRS Konrad Rzeszutek Wilk x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits Konrad Rzeszutek Wilk x86/bugs: Concentrate bug reporting into a separate function Konrad Rzeszutek Wilk x86/bugs: Concentrate bug detection into a separate function Linus Torvalds x86/nospec: Simplify alternative_msr_write() Liu Bo btrfs: fix reading stale metadata blocks after degraded raid1 mounts Nikolay Borisov btrfs: Fix delalloc inodes invalidation during transaction abort Nikolay Borisov btrfs: Split btrfs_del_delalloc_inode into 2 functions Anand Jain btrfs: fix crash when trying to resume balance without the resume flag Misono Tomohiro btrfs: property: Set incompat flag if lzo/zstd compression is set Robbie Ko Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting Filipe Manana Btrfs: fix xattr loss after power failure Masami Hiramatsu ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions Masami Hiramatsu ARM: 8770/1: kprobes: Prohibit probing on optimized_callback Masami Hiramatsu ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed Dexuan Cui tick/broadcast: Use for_each_cpu() specially on UP kernels Dmitry Safonov x86/mm: Drop TS_COMPAT on 64-bit exec() syscall Thomas Gleixner x86/apic/x2apic: Initialize cluster ID properly Masami Hiramatsu ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr Ard Biesheuvel efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode Dave Hansen x86/pkeys: Do not special case protection key 0 Dave Hansen x86/pkeys: Override pkey when moving away from PROT_EXEC Coly Li bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n Martin Schwidefsky s390: remove indirect branch from do_softirq_own_stack Julian Wiedmann s390/qdio: don't release memory in qdio_setup_irq() Hendrik Brueckner s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero Julian Wiedmann s390/qdio: fix access to uninitialized qdio_q fields Michel Thierry drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk Pavel Tatashin mm: don't allow deferred pages with NEED_PER_CPU_KM Ross Zwisler radix tree: fix multi-order iteration race Matthew Wilcox lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly Miquel Raynal cpufreq: armada-37xx: driver relies on cpufreq-dt Haneen Mohammed drm: Match sysfs name in link removal to link creation Nicholas Piggin powerpc/powernv: Fix NVRAM sleep in invalid context when crashing Boris Brezillon mtd: rawnand: marvell: Fix read logic for layouts with ->nchunks > 2 Alexander Monakov i2c: designware: fix poll-after-enable regression Maxime Chevallier ARM64: dts: marvell: armada-cp110: Add mg_core_clk for ethernet node Maxime Chevallier ARM64: dts: marvell: armada-cp110: Add clocks for the xmdio node kbuild test robot netfilter: nf_tables: nf_tables_obj_lookup_byhandle() can be static Florian Westphal netfilter: nf_tables: can't fail after linking rule into active rule list Florian Westphal netfilter: nf_tables: free set name in error path Jann Horn tee: shm: fix use-after-free via temporarily dropped reference Guenter Roeck x86/amd_nb: Add support for Raven Ridge CPUs Steven Rostedt (VMware) vsprintf: Replace memory barrier with static_key for random_ptr_key update Steven Rostedt (VMware) tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} Halil Pasic vfio: ccw: fix cleanup if cp_prefetch fails Guenter Roeck hwmon: (k10temp) Use API function to access System Management Network Guenter Roeck hwmon: (k10temp) Fix reading critical temperature register Andre Przywara KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock Andre Przywara KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls Andre Przywara KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity Andre Przywara KVM: arm/arm64: Properly protect VGIC locks from IRQs Sean Christopherson KVM: vmx: update sec exec controls for UMIP iff emulating UMIP Kamal Dasu spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL Kamal Dasu spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master Andy Shevchenko spi: pxa2xx: Allow 64-bit DMA Wenwen Wang ALSA: control: fix a redundant-copy issue Hans de Goede ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist Jeremy Soller ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup Federico Cuello ALSA: usb: mixer: volume quirk for CM102-A+/102S+ Shuah Khan (Samsung OSG) usbip: usbip_host: fix bad unlock balance during stub_probe() Shuah Khan (Samsung OSG) usbip: usbip_host: fix NULL-ptr deref and use-after-free errors Shuah Khan (Samsung OSG) usbip: usbip_host: run rebind from exit when module is removed Shuah Khan (Samsung OSG) usbip: usbip_host: delete device from busid_table after rebind Shuah Khan usbip: usbip_host: refine probe and disconnect debug msgs to be useful Mathias Nyman xhci: Fix USB3 NULL pointer dereference at logical disconnect. ------------- Diffstat: Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + Documentation/admin-guide/kernel-parameters.txt | 45 +++ .../devicetree/bindings/net/marvell-pp2.txt | 9 +- Documentation/userspace-api/index.rst | 1 + Documentation/userspace-api/spec_ctrl.rst | 94 +++++ Makefile | 4 +- arch/arm/include/asm/assembler.h | 10 + arch/arm/include/asm/kvm_mmu.h | 16 + arch/arm/kernel/traps.c | 5 +- arch/arm/lib/getuser.S | 10 + arch/arm/probes/kprobes/opt-arm.c | 4 +- arch/arm64/boot/dts/marvell/armada-cp110.dtsi | 7 +- arch/arm64/include/asm/kvm_mmu.h | 16 + arch/powerpc/platforms/powernv/opal-nvram.c | 14 +- arch/s390/kernel/irq.c | 5 +- arch/s390/kernel/perf_cpum_sf.c | 4 + arch/x86/boot/compressed/eboot.c | 6 +- arch/x86/include/asm/cpufeatures.h | 20 +- arch/x86/include/asm/kvm_host.h | 2 +- arch/x86/include/asm/mmu_context.h | 2 +- arch/x86/include/asm/msr-index.h | 9 + arch/x86/include/asm/nospec-branch.h | 43 ++- arch/x86/include/asm/pkeys.h | 18 +- arch/x86/include/asm/spec-ctrl.h | 80 +++++ arch/x86/include/asm/thread_info.h | 4 +- arch/x86/kernel/amd_nb.c | 6 + arch/x86/kernel/apic/x2apic_cluster.c | 1 + arch/x86/kernel/cpu/amd.c | 22 ++ arch/x86/kernel/cpu/bugs.c | 397 ++++++++++++++++++++- arch/x86/kernel/cpu/common.c | 77 +++- arch/x86/kernel/cpu/cpu.h | 2 + arch/x86/kernel/cpu/intel.c | 3 + arch/x86/kernel/process.c | 146 ++++++++ arch/x86/kernel/process_64.c | 1 + arch/x86/kernel/smpboot.c | 5 + arch/x86/kvm/cpuid.c | 21 +- arch/x86/kvm/svm.c | 66 ++-- arch/x86/kvm/vmx.c | 60 ++-- arch/x86/kvm/x86.c | 13 +- arch/x86/mm/pkeys.c | 21 +- arch/x86/xen/mmu.c | 4 +- arch/x86/xen/mmu_pv.c | 4 +- drivers/base/cpu.c | 8 + drivers/cpufreq/Kconfig.arm | 2 +- drivers/gpu/drm/drm_drv.c | 2 +- drivers/gpu/drm/i915/i915_reg.h | 3 + drivers/gpu/drm/i915/intel_engine_cs.c | 4 + drivers/hwmon/Kconfig | 2 +- drivers/hwmon/k10temp.c | 51 ++- drivers/i2c/busses/i2c-designware-master.c | 5 +- drivers/md/bcache/debug.c | 3 + drivers/mtd/nand/marvell_nand.c | 8 +- drivers/s390/cio/qdio_setup.c | 12 +- drivers/s390/cio/vfio_ccw_cp.c | 13 +- drivers/spi/spi-bcm-qspi.c | 28 +- drivers/spi/spi-pxa2xx.h | 2 +- drivers/tee/tee_shm.c | 5 +- drivers/usb/host/xhci-hub.c | 2 +- drivers/usb/usbip/stub.h | 2 + drivers/usb/usbip/stub_dev.c | 43 ++- drivers/usb/usbip/stub_main.c | 105 +++++- fs/btrfs/ctree.c | 22 +- fs/btrfs/ctree.h | 2 + fs/btrfs/disk-io.c | 26 +- fs/btrfs/inode.c | 13 +- fs/btrfs/props.c | 12 +- fs/btrfs/tree-log.c | 7 + fs/btrfs/volumes.c | 9 + fs/proc/array.c | 25 ++ include/linux/bpf_verifier.h | 1 + include/linux/cpu.h | 2 + include/linux/efi.h | 8 +- include/linux/nospec.h | 10 + include/linux/sched.h | 10 +- include/linux/seccomp.h | 5 +- include/trace/events/xen.h | 16 - include/uapi/linux/prctl.h | 12 + include/uapi/linux/seccomp.h | 5 +- kernel/bpf/verifier.c | 59 ++- kernel/seccomp.c | 21 +- kernel/sys.c | 23 ++ kernel/time/tick-broadcast.c | 8 + lib/radix-tree.c | 6 +- lib/test_bitmap.c | 21 +- lib/vsprintf.c | 26 +- mm/Kconfig | 1 + net/netfilter/nf_tables_api.c | 75 ++-- sound/core/control_compat.c | 3 +- sound/pci/hda/hda_intel.c | 2 + sound/pci/hda/patch_realtek.c | 1 + sound/usb/mixer.c | 8 + tools/testing/selftests/seccomp/seccomp_bpf.c | 22 +- virt/kvm/arm/vgic/vgic-debug.c | 5 +- virt/kvm/arm/vgic/vgic-its.c | 34 +- virt/kvm/arm/vgic/vgic-v3.c | 4 +- virt/kvm/arm/vgic/vgic.c | 22 +- 96 files changed, 1731 insertions(+), 373 deletions(-)