Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp5761427imm; Mon, 23 Jul 2018 05:45:05 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc2T1Wql4ZHzpO1H/1ITPPbnqpAEegHynM+8zTuB0yOJQ8rJRQSSFTfPc3WRdbZ46jMT1mD X-Received: by 2002:a63:6b03:: with SMTP id g3-v6mr12177809pgc.57.1532349905204; Mon, 23 Jul 2018 05:45:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532349905; cv=none; d=google.com; s=arc-20160816; b=IY1QoXimR/Hfq1TGKw13JHdMmk73hT9Aupk3WlDBgE2KooQ0i93BKX0cEYQaai7j5e 5FM2LO2PmXrmFoLhqR1F0v37BxTCVKca/nSR2XWids7dGfrbpKMKBZVRsrm6yD3QREZV eXivMT3HlQoZRo1enBF44zIlkAK67fjO7ql45DwtoKxQalVtBc4fdueQLvu0/b+qRWlY SKxB2a0A3GnSj5/RPPiyNXXxVAv6lbu1bY5L+4h+wDR5NVuAbp2BeyBpm/uun0fvhmgi WX6nlJCR8gR9zvQodj/Wzbg7+pVRYwoThx9O6PDDFYbrXQNwBMMvq99mS/Kzz8uUHfjr CzxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from :arc-authentication-results; bh=pPrwSSDggA3tXP+cQ2O/Nl/1AE8Z8sgjjDJXDAS2knA=; b=IhPJnQXVE4MgwJmWaqyAgVYdOAX/vWz6EQUONlpW9PQpCKy15KDP0/10dfIi8xYd0S O9VRy2w3Feae01p2IJHo4ViTMH/TSeJYup0GlX1tW20bwqIIeG15zxCNF+NIThENMaT/ 7rrC+h89hR9IJhzph8QWsAW+dnw3tpLE1mPWgXZQIdok7upGZjAdGe30jQ8PHS4Bnj5G 2h8lWC1bXYD9quUKqlyNz8ZiSeb8GEWGQ3a0HxejK1Cu+bQe7SRhRtTbsGOFdkJ8Bpgq 9XZp5EMdfAgdn+79dNONoKnaQ1D7iN1uxZS7I8RQWjAWHxEkMxXeyCyMKoAAwETuAP7x obrw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9-v6si8844890pgm.659.2018.07.23.05.44.50; Mon, 23 Jul 2018 05:45:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388503AbeGWNor (ORCPT + 99 others); Mon, 23 Jul 2018 09:44:47 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:48726 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388283AbeGWNoq (ORCPT ); Mon, 23 Jul 2018 09:44:46 -0400 Received: from localhost (LFbn-1-12238-233.w90-92.abo.wanadoo.fr [90.92.53.233]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id AAADD40B; Mon, 23 Jul 2018 12:43:41 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.4 000/107] 4.4.144-stable review Date: Mon, 23 Jul 2018 14:40:54 +0200 Message-Id: <20180723122413.003644357@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 MIME-Version: 1.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.144-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.144-rc1 X-KernelTest-Deadline: 2018-07-25T12:24+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.4.144 release. There are 107 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed Jul 25 12:23:53 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.144-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.144-rc1 Sascha Hauer ubi: fastmap: Erase outdated anchor PEBs during attach Richard Weinberger ubi: Fix Fastmap's update_vol() Richard Weinberger ubi: Fix races around ubi_refill_pools() Richard Weinberger ubi: Be more paranoid while seaching for the most recent Fastmap Richard Weinberger ubi: Rework Fastmap attach base code Richard Weinberger ubi: Introduce vol_ignored() Lucas Stach clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 Alan Jenkins block: do not use interruptible wait anywhere Andy Lutomirski x86/cpu: Re-apply forced caps every time CPU caps are re-read Juergen Gross x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths Konrad Rzeszutek Wilk x86/bugs: Rename SSBD_NO to SSB_NO Thomas Gleixner x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG Thomas Gleixner x86/bugs: Rework spec_ctrl base and mask logic Thomas Gleixner x86/bugs: Remove x86_spec_ctrl_set() Thomas Gleixner x86/bugs: Expose x86_spec_ctrl_base directly Borislav Petkov x86/bugs: Unify x86_spec_ctrl_{set_guest, restore_host} Thomas Gleixner x86/speculation: Rework speculative_store_bypass_update() Tom Lendacky x86/speculation: Add virtualized speculative store bypass disable support Thomas Gleixner x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL Thomas Gleixner x86/speculation: Handle HT correctly on AMD Thomas Gleixner x86/cpufeatures: Add FEATURE_ZEN Borislav Petkov x86/cpu/AMD: Fix erratum 1076 (CPB bit) Thomas Gleixner x86/cpufeatures: Disentangle SSBD enumeration Thomas Gleixner x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS Borislav Petkov x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP Jim Mattson x86/cpu: Make alternative_msr_write work for 32-bit code Konrad Rzeszutek Wilk x86/bugs: Fix the parameters alignment and missing void Jiri Kosina x86/bugs: Make cpu_show_common() static Jiri Kosina x86/bugs: Fix __ssb_select_mitigation() return type Borislav Petkov Documentation/spec_ctrl: Do some minor cleanups Konrad Rzeszutek Wilk proc: Use underscores for SSBD in 'status' Konrad Rzeszutek Wilk x86/bugs: Rename _RDS to _SSBD Kees Cook x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass Thomas Gleixner seccomp: Move speculation migitation control to arch code Kees Cook seccomp: Add filter flag to opt-out of SSB mitigation Thomas Gleixner seccomp: Use PR_SPEC_FORCE_DISABLE Thomas Gleixner prctl: Add force disable speculation Kees Cook seccomp: Enable speculation flaw mitigations Kees Cook proc: Provide details on speculation flaw mitigations Kees Cook nospec: Allow getting/setting on non-current task Thomas Gleixner x86/speculation: Add prctl for Speculative Store Bypass mitigation Thomas Gleixner x86/process: Allow runtime control of Speculative Store Bypass Thomas Gleixner x86/process: Optimize TIF_NOTSC switch Kyle Huey x86/process: Correct and optimize TIF_BLOCKSTEP switch Kyle Huey x86/process: Optimize TIF checks in __switch_to_xtra() Thomas Gleixner prctl: Add speculation control prctls Thomas Gleixner x86/speculation: Create spec-ctrl.h to avoid include hell David Woodhouse x86/bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requested Konrad Rzeszutek Wilk x86/bugs: Whitelist allowed SPEC_CTRL MSR values Konrad Rzeszutek Wilk x86/bugs/intel: Set proper CPU features and setup RDS Konrad Rzeszutek Wilk x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation Konrad Rzeszutek Wilk x86/cpufeatures: Add X86_FEATURE_RDS Konrad Rzeszutek Wilk x86/bugs: Expose /sys/../spec_store_bypass Piotr Luc x86/cpu/intel: Add Knights Mill to Intel family Andy Shevchenko x86/cpu: Rename Merrifield2 to Moorefield Konrad Rzeszutek Wilk x86/bugs, KVM: Support the combination of guest and host IBRS Konrad Rzeszutek Wilk x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits Konrad Rzeszutek Wilk x86/bugs: Concentrate bug reporting into a separate function Konrad Rzeszutek Wilk x86/bugs: Concentrate bug detection into a separate function Linus Torvalds x86/nospec: Simplify alternative_msr_write() David Woodhouse x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under Xen Juergen Gross xen: set cpu capabilities from xen_start_kernel() Mickaël Salaün selftest/seccomp: Fix the seccomp(2) signature Mickaël Salaün selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC Alexander Sergeyev x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist Ingo Molnar x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP David Woodhouse x86/speculation: Use IBRS if available before calling into firmware Konrad Rzeszutek Wilk x86/spectre_v2: Don't check microcode versions when running under hypervisors Tim Chen x86/speculation: Use Indirect Branch Prediction Barrier in context switch Andy Lutomirski x86/mm: Give each mm TLB flush generation a unique ID Dave Hansen x86/mm: Factor out LDT init from context init Juergen Gross x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend Peter Zijlstra x86/speculation: Add dependency Dan Williams x86/speculation: Fix up array_index_nospec_mask() asm constraint Ingo Molnar x86/speculation: Clean up various Spectre related details David Woodhouse x86/speculation: Correct Speculation Control microcode blacklist again David Woodhouse x86/speculation: Update Speculation Control microcode blacklist Dan Williams x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface Denys Vlasenko x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs Arnd Bergmann x86/pti: Mark constant arrays as __initconst David Woodhouse x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel David Woodhouse x86/cpufeatures: Clean up Spectre v2 related CPUID flags David Woodhouse x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support David Woodhouse x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes David Woodhouse x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown David Woodhouse x86/msr: Add definitions for new speculation control MSRs David Woodhouse x86/cpufeatures: Add AMD feature bits for Speculation Control David Woodhouse x86/cpufeatures: Add Intel feature bits for Speculation Control David Woodhouse x86/cpufeatures: Add CPUID_7_EDX CPUID leaf Nick Desaulniers x86/paravirt: Make native_save_fl() extern inline Mathias Nyman xhci: Fix perceived dead host due to runtime suspend race with event handler Stefano Brivio skbuff: Unconditionally copy pfmemalloc in __skb_clone() Stefano Brivio net: Don't copy pfmemalloc flag in __copy_skb_header() Sanjeev Bansal tg3: Add higher cpu clock for 5762. Gustavo A. R. Silva ptp: fix missing break in switch Heiner Kallweit net: phy: fix flag masking in __set_phy_supported David Ahern net/ipv4: Set oif in fib_compute_spec_dst Davidlohr Bueso lib/rhashtable: consider param->min_size when setting initial table size Colin Ian King ipv6: fix useless rol32 call on hash Tyler Hicks ipv4: Return EINVAL when ping_group_range sysctl doesn't map to user ns Jing Xia mm: memcg: fix use after free in mem_cgroup_iter() Vineet Gupta ARC: mm: allow mprotect to make stack mappings executable Alexey Brodkin ARC: Fix CONFIG_SWAP Takashi Iwai ALSA: rawmidi: Change resized buffers atomically OGAWA Hirofumi fat: fix memory allocation failure handling of match_strdup() Dewet Thibaut x86/MCE: Remove min interval polling limitation Lan Tianyu KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel. ------------- Diffstat: Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + Documentation/kernel-parameters.txt | 45 +++ Documentation/spec_ctrl.txt | 94 +++++ Makefile | 4 +- arch/arc/include/asm/page.h | 2 +- arch/arc/include/asm/pgtable.h | 2 +- arch/x86/entry/entry_64_compat.S | 75 ++-- arch/x86/include/asm/apm.h | 6 + arch/x86/include/asm/barrier.h | 2 +- arch/x86/include/asm/cpufeature.h | 7 +- arch/x86/include/asm/cpufeatures.h | 37 +- arch/x86/include/asm/disabled-features.h | 3 +- arch/x86/include/asm/efi.h | 7 + arch/x86/include/asm/intel-family.h | 10 +- arch/x86/include/asm/irqflags.h | 2 +- arch/x86/include/asm/mmu.h | 15 +- arch/x86/include/asm/mmu_context.h | 25 +- arch/x86/include/asm/msr-index.h | 22 ++ arch/x86/include/asm/nospec-branch.h | 54 +++ arch/x86/include/asm/required-features.h | 3 +- arch/x86/include/asm/spec-ctrl.h | 80 ++++ arch/x86/include/asm/thread_info.h | 6 +- arch/x86/include/asm/tlbflush.h | 12 + arch/x86/kernel/Makefile | 1 + arch/x86/kernel/cpu/amd.c | 38 +- arch/x86/kernel/cpu/bugs.c | 427 +++++++++++++++++++-- arch/x86/kernel/cpu/common.c | 121 +++++- arch/x86/kernel/cpu/cpu.h | 3 + arch/x86/kernel/cpu/intel.c | 73 ++++ arch/x86/kernel/cpu/mcheck/mce.c | 3 - arch/x86/kernel/irqflags.S | 26 ++ arch/x86/kernel/ldt.c | 4 +- arch/x86/kernel/process.c | 224 +++++++++-- arch/x86/kernel/smpboot.c | 5 + arch/x86/kvm/svm.c | 2 +- arch/x86/kvm/vmx.c | 2 +- arch/x86/mm/tlb.c | 33 ++ arch/x86/platform/efi/efi_64.c | 3 + arch/x86/xen/enlighten.c | 16 +- arch/x86/xen/smp.c | 5 + arch/x86/xen/suspend.c | 16 + block/blk-core.c | 10 +- drivers/base/cpu.c | 8 + drivers/clk/tegra/clk-tegra30.c | 11 +- drivers/mtd/ubi/attach.c | 139 +++++-- drivers/mtd/ubi/eba.c | 4 +- drivers/mtd/ubi/fastmap-wl.c | 6 +- drivers/mtd/ubi/fastmap.c | 51 ++- drivers/mtd/ubi/ubi.h | 46 ++- drivers/mtd/ubi/wl.c | 114 ++++-- drivers/net/ethernet/broadcom/tg3.c | 9 + drivers/net/phy/phy_device.c | 7 +- drivers/ptp/ptp_chardev.c | 1 + drivers/usb/host/xhci.c | 40 +- drivers/usb/host/xhci.h | 4 + fs/fat/inode.c | 20 +- fs/proc/array.c | 26 ++ include/linux/cpu.h | 2 + include/linux/nospec.h | 10 + include/linux/sched.h | 9 + include/linux/seccomp.h | 3 +- include/linux/skbuff.h | 12 +- include/net/ipv6.h | 2 +- include/uapi/linux/prctl.h | 12 + include/uapi/linux/seccomp.h | 4 +- kernel/seccomp.c | 21 +- kernel/sys.c | 21 + lib/rhashtable.c | 17 +- mm/memcontrol.c | 2 +- net/core/skbuff.c | 1 + net/ipv4/fib_frontend.c | 1 + net/ipv4/sysctl_net_ipv4.c | 5 +- sound/core/rawmidi.c | 20 +- tools/testing/selftests/seccomp/seccomp_bpf.c | 98 ++++- virt/kvm/eventfd.c | 6 +- 75 files changed, 1982 insertions(+), 276 deletions(-)