Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp4262159ybf; Wed, 4 Mar 2020 00:11:51 -0800 (PST) X-Google-Smtp-Source: ADFU+vvR+YLB7ZW9o0tFYtI0FVwpby91z49il+FolyXOZfsrCHLkn2OsZw9A9O9QVySvDO4an30v X-Received: by 2002:aca:3542:: with SMTP id c63mr933361oia.135.1583309511583; Wed, 04 Mar 2020 00:11:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583309511; cv=none; d=google.com; s=arc-20160816; b=IyaqBEXDZo10B3h6axeDk8bzYXELwZST9xkw4+m1/i0VamwMwtDnbJDRDNdKWSAF6s C0720QWkHTwTaWLU6HZwtdeVDUVLtBE8PdfIDee0HXfKR4v9JkrUg6EZ3kWm4ZyY4Chg Jyy6jpLbewE9xwol0u8Rq63y09kZ0SMo1PLkbPUiC9uHRy6ycs0gbyenzow28VBDPDfQ INV4j8n27klLKbmIbqO32BffNZOH3JzjACXCey8Nzj9JLqiwQpZMK8ztKU9aQaM74aDm ZX2XMhQIqIh1CpW1/Ttd2wmEyzpxky33yukbo8LFt/FfZSvtCXDcLwcRizPe2YgBj9ni 5N0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=58u2StqxIfHsfhb7kXkR0srMdj37YOSHUsnj/VDyo44=; b=TWqGUdDzh1tvWvPbPWdQ7qOibqQle++nViC3AneXQ4yCXqvqDmKNPAHxQEIqrs7Hci HLI7oy5vveyPwJh2uoYAaTgFZc0kekwO4zoSVRrNmu3dBvL5JsN/8p6MWG0EfIISS4xE tFMNZPBkbLV612wZV7ja0sKhK2okWZL/Kj2/S3rnr2SuAq86snmdEWitenzS3nX470Y4 8iS8GS4DJWy/Ao3cOD3bm3H1Sz/h6LGUzm4ZYJCzfuOunG7crm477subH+ZDLr+YuMcc hj9/VrIn64OQwvUkSS4XNlvWRUCqaaLabhITyLW9DyBFwnSbNZEEBVrQ6+3A4ip8bcX0 GPtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VpaaCSJN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w10si696179ote.197.2020.03.04.00.11.39; Wed, 04 Mar 2020 00:11:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VpaaCSJN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728532AbgCDILb (ORCPT + 99 others); Wed, 4 Mar 2020 03:11:31 -0500 Received: from mail.kernel.org ([198.145.29.99]:50858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725283AbgCDILb (ORCPT ); Wed, 4 Mar 2020 03:11:31 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F408D2166E; Wed, 4 Mar 2020 08:11:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583309490; bh=w96FJLfkzr8JilQIZUTQAJsDJd9ZgFl/LK4eeVwZFIY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=VpaaCSJNRBLV4noydn2vaZqPfOkRg9eImCQLX78lOgC/PB2YrIn6tTQs5pjsq58CB yuWT5s1dG/arCGfmap8JKAR8gI+6f+YAGKeWwvvCAB+UXk584sRcVHhbwMI+SYe3Km 9AN0M7OdMyb30UDfPOsxlqzBpQHMKhw1ZXnmrxyg= Date: Wed, 4 Mar 2020 09:11:28 +0100 From: Greg Kroah-Hartman To: Naresh Kamboju Cc: open list , Shuah Khan , patches@kernelci.org, lkft-triage@lists.linaro.org, Ben Hutchings , linux- stable , Andrew Morton , Linus Torvalds , Guenter Roeck Subject: Re: [PATCH 5.5 000/176] 5.5.8-stable review Message-ID: <20200304081128.GC1401372@kroah.com> References: <20200303174304.593872177@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 04, 2020 at 12:43:42PM +0530, Naresh Kamboju wrote: > On Tue, 3 Mar 2020 at 23:16, Greg Kroah-Hartman > wrote: > > > > This is the start of the stable review cycle for the 5.5.8 release. > > There are 176 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Thu, 05 Mar 2020 17:42:06 +0000. > > Anything received after that time might be too late. > > > > The whole patch series can be found in one patch at: > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.5.8-rc1.gz > > or in the git tree and branch at: > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.5.y > > and the diffstat can be found below. > > > > thanks, > > > > greg k-h > > > > Results from Linaro’s test farm. > Regressions detected on x86_64 and i386. > > Test failure output: > CVE-2017-5715: VULN (IBRS+IBPB or retpoline+IBPB+RSB filling, is > needed to mitigate the vulnerability) > > Test description: > CVE-2017-5715 branch target injection (Spectre Variant 2) > > Impact: Kernel > Mitigation 1: new opcode via microcode update that should be used by > up to date compilers to protect the BTB (by flushing indirect branch > predictors) > Mitigation 2: introducing "retpoline" into compilers, and recompile > software/OS with it > Performance impact of the mitigation: high for mitigation 1, medium > for mitigation 2, depending on your CPU So these are regressions or just new tests? If regressions, can you do 'git bisect' to find the offending commit? Also, are you sure you have an updated microcode on these machines and a proper compiler for retpoline? thanks, greg k-h