Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp4125955ybc; Thu, 14 Nov 2019 22:26:35 -0800 (PST) X-Google-Smtp-Source: APXvYqyxj/+O6C12YsH+nlbhSVHhK4Pk3iI5E4p+6gZ/uVJ8sOfuLiczdq9KiYLIT6Ft1prkpRt/ X-Received: by 2002:a17:906:d9c4:: with SMTP id qk4mr11091827ejb.214.1573799195899; Thu, 14 Nov 2019 22:26:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573799195; cv=none; d=google.com; s=arc-20160816; b=U4HQ7B+NgAvhTDSAKDqrdnLlSKZwwR3vP+m700g51NHM5qsDG8niLiEnvM0jspJTao TewoOhl5/mPFbOzY+GkASWqdicxfDM7wZsMonVRq3W5gku8tbsdx00m2omE0lLOkEXAr lixSHRjsEPO1RhhkpiP1yFGmPCnaZiBd2zVqPGDGYXVlG5BYllzi0yOnV3V4X17AR9XD IEapL+wXbrHtPCPSZ61DcLTg2Rnv6R4r5NEerRqySYHNA2ZUdCqP80fC08jQE7tkDVs1 3fTvC52IvnYllFIt8Tnm7L4hPm39tB5vP8V4BcpQkLjOmJZQ4NJV7a9/rvgXgWZ0Wjus cSyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=QP4Wn3yt2rC8S6KupJTIPG3k7tlmS48Maug6G510R4I=; b=uRBg5nGOV0sMpZqXiVq0t0jC/d0nKzI5oaRoft7teHhhA4WznZLdBWs+l/UAjSlny8 g4b8p9KyulXJSFtfpBrrU62ebsZWqBtjeNzO6wN/MpBH7RpnNO/bZx0yLSYWoISqfEbf HKWRQZpbh8APuq+FH57rL/PJFMQV/3MrfJbdogaNaV66ljEApErOiokVBIsriC6eaZC1 RpDlOzlRq5WTfyqZwUwLeYqfMWQNUAUhKh7Z9Avx4GVYOPu0LRRYWFuIMIp7KP39snSj 6ySTROPIVQ4HYJk2N3CI6MahmtPsMRF4FSoIAbJap6pYb5yRMqKwvA1yFfTRYruNg00R TKTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AgwsMk63; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e22si6480796ede.163.2019.11.14.22.26.11; Thu, 14 Nov 2019 22:26:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AgwsMk63; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727508AbfKOGVy (ORCPT + 99 others); Fri, 15 Nov 2019 01:21:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:50896 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727494AbfKOGVx (ORCPT ); Fri, 15 Nov 2019 01:21:53 -0500 Received: from localhost (unknown [104.132.150.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F35C220728; Fri, 15 Nov 2019 06:21:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573798912; bh=4+nCz3LEl6kdoeHSXQYEjgSPf3SPhDIfUUjquwpozLY=; h=From:To:Cc:Subject:Date:From; b=AgwsMk63LYEgC47H2n50bnkdPqhS4A3JciDrg0tCdqYHLxJycAjFm4J2UHQ7Ddml7 EwA5JPRz6Cf1hueqmlFljWZluGdVaVw901gav9qEG+Dceim3Ll9de0S+Uw+t975Zl7 qjbAUU/gT4lzajVegNY7EJZhsLxWc1nofitauQVU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.4 00/20] 4.4.202-stable review Date: Fri, 15 Nov 2019 14:20:29 +0800 Message-Id: <20191115062006.854443935@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.202-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.202-rc1 X-KernelTest-Deadline: 2019-11-17T06:20+00:00 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.4.202 release. There are 20 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun, 17 Nov 2019 06:18:31 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.202-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.202-rc1 Vineela Tummalapalli x86/bugs: Add ITLB_MULTIHIT bug infrastructure Josh Poimboeuf x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs Michal Hocko x86/tsx: Add config options to set tsx=on|off|auto Pawan Gupta x86/speculation/taa: Add documentation for TSX Async Abort Pawan Gupta x86/tsx: Add "auto" option to the tsx= cmdline parameter Pawan Gupta kvm/x86: Export MDS_NO=0 to guests when TSX is enabled Pawan Gupta x86/speculation/taa: Add sysfs reporting for TSX Async Abort Pawan Gupta x86/speculation/taa: Add mitigation for TSX Async Abort Pawan Gupta x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default Pawan Gupta x86/cpu: Add a helper function x86_read_arch_cap_msr() Pawan Gupta x86/msr: Add the IA32_TSX_CTRL MSR Paolo Bonzini KVM: x86: use Intel speculation bugs and features as derived in generic x86 code Jim Mattson kvm: x86: IA32_ARCH_CAPABILITIES is always supported Sean Christopherson KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts Ben Hutchings KVM: Introduce kvm_get_arch_capabilities() Nicholas Piggin powerpc/boot: Request no dynamic linker for boot wrapper Nicholas Piggin powerpc: Fix compiling a BE kernel with a powerpc64le toolchain Michael Ellerman powerpc/Makefile: Use cflags-y/aflags-y for setting endian options Jonas Gorski MIPS: BCM63XX: fix switch core reset on BCM6368 Junaid Shahid kvm: mmu: Don't read PDPTEs when paging is not enabled ------------- Diffstat: Documentation/ABI/testing/sysfs-devices-system-cpu | 2 + Documentation/hw-vuln/tsx_async_abort.rst | 268 +++++++++++++++++++++ Documentation/kernel-parameters.txt | 62 +++++ Documentation/x86/tsx_async_abort.rst | 117 +++++++++ Makefile | 4 +- arch/mips/bcm63xx/reset.c | 2 +- arch/powerpc/Makefile | 31 ++- arch/powerpc/boot/wrapper | 24 +- arch/x86/Kconfig | 45 ++++ arch/x86/include/asm/cpufeatures.h | 2 + arch/x86/include/asm/kvm_host.h | 2 + arch/x86/include/asm/msr-index.h | 16 ++ arch/x86/include/asm/nospec-branch.h | 4 +- arch/x86/include/asm/processor.h | 7 + arch/x86/kernel/cpu/Makefile | 2 +- arch/x86/kernel/cpu/bugs.c | 143 ++++++++++- arch/x86/kernel/cpu/common.c | 93 ++++--- arch/x86/kernel/cpu/cpu.h | 18 ++ arch/x86/kernel/cpu/intel.c | 5 + arch/x86/kernel/cpu/tsx.c | 140 +++++++++++ arch/x86/kvm/cpuid.c | 12 + arch/x86/kvm/vmx.c | 15 -- arch/x86/kvm/x86.c | 53 +++- drivers/base/cpu.c | 17 ++ include/linux/cpu.h | 5 + 25 files changed, 1019 insertions(+), 70 deletions(-)