Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp2319198imw; Sun, 10 Jul 2022 03:33:51 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vOhQ7AoT7iUZu+rVGIXjdO+3fEc3Oq2fIvTCvOdRImS6h1qSjH0M6UJoq1zzFXHa34XD9e X-Received: by 2002:a63:a4f:0:b0:401:a0e0:1668 with SMTP id z15-20020a630a4f000000b00401a0e01668mr10870297pgk.21.1657449231019; Sun, 10 Jul 2022 03:33:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657449231; cv=none; d=google.com; s=arc-20160816; b=mCHxT+jtcVx46Ndxx+oh7EnFtF2+dArFTW3e48wd8CwrqMHbS4FewTMQjuo+aZgeUT Q7ybe6ZxOMocTs0V5ihTHj2qUoDOk4JwM9KjsOJPZSUyndLEJLxMgsrsZWsxI4v3nXiI +L+X7Hpg1Xf5Gb8FZ1lFV5OPiAoqAxRkI8Y0rcNCBgrqioAQpIoH/138f3J7M92Gjxsz jqzN0YtqLqkIA4FoZf9ilWH/Kr5E+5QsM9wsT5FlL9m2pDXgtIN18loWyE3QUrZj4YZ7 9hmdLjEtXuQsY1b6uyVjK3dVWh+0L9WfBmJrrKrACbZJzzH6SMHeZaChE4176ppNd0go WgLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature :dkim-signature; bh=9elos7vJtR/xFlEIjFrioFxIi9AoQZ1tt+FVTKRmUoY=; b=ZvCvEAB47WaQeItGg2cYRIGSM++XveyOhjxfm89M3w2yNv3OBZvaVfsdKofHK4rqcZ i1+gCWAdX10nEKrQDFyMM1hsn/w+mpvinSnVTDQXEF4I0qEYlJKM0mGsFf4ar/QQ5ifO vLVkg6KwLsEm7A3T8AvPrQV4qg3CoS3dpQgzLaopli50eeell4z3OfY9S5VFPOjo+1z8 nfTt8obutEKTnGtB9quqk+SZ51hWQc22hEJCYO41fkmk8j+sz4jjKW1rYwh6H+tByXNB PLuigRroIKu/LZiyIEizjNrY08N9YL2PtjgHtoQaS00Ox4d/O1ivGMHdCF1w5X5ByKnX BWHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=mQrm2gYs; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o2-20020a1709026b0200b0016bdac9b953si5331015plk.425.2022.07.10.03.33.36; Sun, 10 Jul 2022 03:33:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=mQrm2gYs; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229536AbiGJKTL (ORCPT + 99 others); Sun, 10 Jul 2022 06:19:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35662 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229476AbiGJKTJ (ORCPT ); Sun, 10 Jul 2022 06:19:09 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A0ADCDF62 for ; Sun, 10 Jul 2022 03:19:07 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 3BA8B1FE25; Sun, 10 Jul 2022 10:19:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1657448346; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=9elos7vJtR/xFlEIjFrioFxIi9AoQZ1tt+FVTKRmUoY=; b=mQrm2gYsBlfEd629FUdc5Gu52aFDoZ9HSvO5nyA/5zR37k3wTOc5yIHc/0hYfLziLlY+7p 0cHbLC3xwZchEv/OMwuk2pCRtqrkEX5vIj7qZVeoFXW/TonNYl0ZM+BrWTkdGe+vqYsNmf 5A6qeLRGMYJjT3r4GqqB+lJOb/NKqyQ= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1657448346; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=9elos7vJtR/xFlEIjFrioFxIi9AoQZ1tt+FVTKRmUoY=; b=J2DsACW6wS0jx+OGhxRqllJATPUUIj1LZ+fg+9acfmeX8LUY2MXkYDIWDHd3w4msdxkgHQ DzQtITERSMkIZBBQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 23DBC132FD; Sun, 10 Jul 2022 10:19:06 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id o629CJqnymL0HAAAMHmgww (envelope-from ); Sun, 10 Jul 2022 10:19:06 +0000 Date: Sun, 10 Jul 2022 12:19:00 +0200 From: Borislav Petkov To: Linus Torvalds Cc: x86-ml , lkml Subject: [GIT PULL] x86/urgent for v5.19-rc6 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, please pull a couple of urgent x86 fixes for 5.19. Thx. --- The following changes since commit 03c765b0e3b4cb5063276b086c76f7a612856a9a: Linux 5.19-rc4 (2022-06-26 14:22:10 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v5.19_rc6 for you to fetch changes up to cb8a4beac39b90cd60abbf9fd639a3357274e469: x86/boot: Fix the setup data types max limit (2022-07-10 11:17:40 +0200) ---------------------------------------------------------------- - Prepare for and clear .brk early in order to address XenPV guests failures where the hypervisor verifies page tables and uninitialized data in that range leads to bogus failures in those checks - Add any potential setup_data entries supplied at boot to the identity pagetable mappings to prevent kexec kernel boot failures. Usually, this is not a problem for the normal kernel as those mappings are part of the initially mapped 2M pages but if kexec gets to allocate the second kernel somewhere else, those setup_data entries need to be mapped there too. - Fix objtool not to discard text references from the __tracepoints section so that ENDBR validation still works - Correct the setup_data types limit as it is user-visible, before 5.19 releases ---------------------------------------------------------------- Borislav Petkov (1): x86/boot: Fix the setup data types max limit Juergen Gross (3): x86/xen: Use clear_bss() for Xen PV guests x86: Clear .brk area at early boot x86: Fix .brk attribute in linker script Michael Roth (1): x86/compressed/64: Add identity mappings for setup_data entries Peter Zijlstra (1): x86/ibt, objtool: Don't discard text references from tracepoint section arch/x86/boot/compressed/ident_map_64.c | 13 +++++++++++++ arch/x86/include/asm/setup.h | 3 +++ arch/x86/include/uapi/asm/bootparam.h | 2 +- arch/x86/kernel/head64.c | 4 +++- arch/x86/kernel/vmlinux.lds.S | 2 +- arch/x86/xen/enlighten_pv.c | 8 ++++++-- arch/x86/xen/xen-head.S | 10 +--------- tools/objtool/check.c | 3 +-- 8 files changed, 29 insertions(+), 16 deletions(-) -- Regards/Gruss, Boris. SUSE Software Solutions Germany GmbH GF: Ivo Totev, Andrew Myers, Andrew McDonald, Martje Boudien Moerman (HRB 36809, AG Nürnberg)