This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.133-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
------------- Pseudo-Shortlog of commits:
Greg Kroah-Hartman gregkh@linuxfoundation.org Linux 5.10.133-rc1
Arnaldo Carvalho de Melo acme@redhat.com tools headers: Remove broken definition of __LITTLE_ENDIAN
Arnaldo Carvalho de Melo acme@redhat.com tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in 'perf bench mem memcpy' - again
Vasily Gorbik gor@linux.ibm.com objtool: Fix elf_create_undef_symbol() endianness
Linus Torvalds torvalds@linux-foundation.org kvm: fix objtool relocation warning
Peter Zijlstra peterz@infradead.org x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds
Peter Zijlstra peterz@infradead.org um: Add missing apply_returns()
Kim Phillips kim.phillips@amd.com x86/bugs: Remove apostrophe typo
Arnaldo Carvalho de Melo acme@redhat.com tools headers cpufeatures: Sync with the kernel sources
Arnaldo Carvalho de Melo acme@redhat.com tools arch x86: Sync the msr-index.h copy with the kernel sources
Paolo Bonzini pbonzini@redhat.com KVM: emulate: do not adjust size of fastop and setcc subroutines
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/kvm: fix FASTOP_SIZE when return thunks are enabled
Thadeu Lima de Souza Cascardo cascardo@canonical.com efi/x86: use naked RET on mixed mode call wrapper
Nathan Chancellor nathan@kernel.org x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
Jiri Slaby jirislaby@kernel.org x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit
Josh Poimboeuf jpoimboe@redhat.com x86/ftrace: Add UNWIND_HINT_FUNC annotation for ftrace_stub
Ben Hutchings ben@decadent.org.uk x86/xen: Fix initialisation in hypercall_page after rethunk
Greg Kroah-Hartman gregkh@linuxfoundation.org x86, kvm: use proper ASM macros for kvm_vcpu_is_preempted
Borislav Petkov bp@suse.de tools/insn: Restore the relative include paths for cross building
Thomas Gleixner tglx@linutronix.de x86/static_call: Serialize __static_call_fixup() properly
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/speculation: Disable RRSBA behavior
Konrad Rzeszutek Wilk konrad.wilk@oracle.com x86/kexec: Disable RET on kexec
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/bugs: Add Cannon lake to RETBleed affected CPU list
Peter Zijlstra peterz@infradead.org x86/retbleed: Add fine grained Kconfig knobs
Andrew Cooper andrew.cooper3@citrix.com x86/cpu/amd: Enumerate BTC_NO
Peter Zijlstra peterz@infradead.org x86/common: Stamp out the stepping madness
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Fix IBRS handling after vmexit
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Convert launched argument to flags
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Flatten __vmx_vcpu_run()
Josh Poimboeuf jpoimboe@kernel.org objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Remove x86_spec_ctrl_mask
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix SPEC_CTRL write on SMT state change
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix firmware entry SPEC_CTRL handling
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
Peter Zijlstra peterz@infradead.org x86/cpu/amd: Add Spectral Chicken
Peter Zijlstra peterz@infradead.org objtool: Add entry UNRET validation
Josh Poimboeuf jpoimboe@kernel.org x86/bugs: Do IBPB fallback check only once
Peter Zijlstra peterz@infradead.org x86/bugs: Add retbleed=ibpb
Peter Zijlstra peterz@infradead.org x86/xen: Rename SYS* entry points
Peter Zijlstra peterz@infradead.org objtool: Update Retpoline validation
Peter Zijlstra peterz@infradead.org intel_idle: Disable IBRS during long idle
Peter Zijlstra peterz@infradead.org x86/bugs: Report Intel retbleed vulnerability
Peter Zijlstra peterz@infradead.org x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
Peter Zijlstra peterz@infradead.org x86/bugs: Optimize SPEC_CTRL MSR writes
Peter Zijlstra peterz@infradead.org x86/entry: Add kernel IBRS implementation
Peter Zijlstra peterz@infradead.org x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
Kim Phillips kim.phillips@amd.com x86/bugs: Enable STIBP for JMP2RET
Alexandre Chartre alexandre.chartre@oracle.com x86/bugs: Add AMD retbleed= boot parameter
Alexandre Chartre alexandre.chartre@oracle.com x86/bugs: Report AMD retbleed vulnerability
Peter Zijlstra peterz@infradead.org x86: Add magic AMD return-thunk
Peter Zijlstra peterz@infradead.org objtool: Treat .text.__x86.* as noinstr
Peter Zijlstra peterz@infradead.org x86: Use return-thunk in asm code
Kim Phillips kim.phillips@amd.com x86/sev: Avoid using __x86_return_thunk
Peter Zijlstra peterz@infradead.org x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
Peter Zijlstra peterz@infradead.org x86/kvm: Fix SETcc emulation for return thunks
Peter Zijlstra peterz@infradead.org x86/bpf: Use alternative RET encoding
Peter Zijlstra peterz@infradead.org x86/ftrace: Use alternative RET encoding
Peter Zijlstra peterz@infradead.org x86,static_call: Use alternative RET encoding
Thadeu Lima de Souza Cascardo cascardo@canonical.com objtool: skip non-text sections when adding return-thunk sites
Peter Zijlstra peterz@infradead.org x86,objtool: Create .return_sites
Peter Zijlstra peterz@infradead.org x86: Undo return-thunk damage
Peter Zijlstra peterz@infradead.org x86/retpoline: Use -mfunction-return
Ben Hutchings ben@decadent.org.uk Makefile: Set retpoline cflags based on CONFIG_CC_IS_{CLANG,GCC}
Peter Zijlstra peterz@infradead.org x86/retpoline: Swizzle retpoline thunk
Peter Zijlstra peterz@infradead.org x86/retpoline: Cleanup some #ifdefery
Peter Zijlstra peterz@infradead.org x86/cpufeatures: Move RETPOLINE flags to word 11
Peter Zijlstra peterz@infradead.org x86/kvm/vmx: Make noinstr clean
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/realmode: build with -D__DISABLE_EXPORTS
Mikulas Patocka mpatocka@redhat.com objtool: Fix objtool regression on x32 systems
Peter Zijlstra peterz@infradead.org x86/entry: Remove skip_r11rcx
Peter Zijlstra peterz@infradead.org objtool: Fix symbol creation
Peter Zijlstra peterz@infradead.org objtool: Fix type of reloc::addend
Peter Zijlstra peterz@infradead.org objtool: Fix code relocs vs weak symbols
Peter Zijlstra peterz@infradead.org objtool: Fix SLS validation for kcov tail-call replacement
Peter Zijlstra peterz@infradead.org crypto: x86/poly1305 - Fixup SLS
Peter Zijlstra peterz@infradead.org objtool: Default ignore INT3 for unreachable
Borislav Petkov bp@suse.de kvm/emulate: Fix SETcc emulation function offsets with SLS
Arnaldo Carvalho de Melo acme@redhat.com tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in 'perf bench mem memcpy'
Peter Zijlstra peterz@infradead.org x86: Add straight-line-speculation mitigation
Peter Zijlstra peterz@infradead.org objtool: Add straight-line-speculation validation
Peter Zijlstra peterz@infradead.org x86/alternative: Relax text_poke_bp() constraint
Peter Zijlstra peterz@infradead.org x86: Prepare inline-asm for straight-line-speculation
Peter Zijlstra peterz@infradead.org x86: Prepare asm files for straight-line-speculation
Peter Zijlstra peterz@infradead.org x86/lib/atomic64_386_32: Rename things
Peter Zijlstra peterz@infradead.org bpf,x86: Respect X86_FEATURE_RETPOLINE*
Peter Zijlstra peterz@infradead.org bpf,x86: Simplify computing label offsets
Peter Zijlstra peterz@infradead.org x86/alternative: Add debug prints to apply_retpolines()
Peter Zijlstra peterz@infradead.org x86/alternative: Try inline spectre_v2=retpoline,amd
Peter Zijlstra peterz@infradead.org x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
Peter Zijlstra peterz@infradead.org x86/alternative: Implement .retpoline_sites support
Peter Zijlstra peterz@infradead.org x86/retpoline: Create a retpoline thunk array
Peter Zijlstra peterz@infradead.org x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
Peter Zijlstra peterz@infradead.org x86/asm: Fixup odd GEN-for-each-reg.h usage
Peter Zijlstra peterz@infradead.org x86/asm: Fix register order
Peter Zijlstra peterz@infradead.org x86/retpoline: Remove unused replacement symbols
Peter Zijlstra peterz@infradead.org objtool,x86: Replace alternatives with .retpoline_sites
Peter Zijlstra peterz@infradead.org objtool: Explicitly avoid self modifying code in .altinstr_replacement
Peter Zijlstra peterz@infradead.org objtool: Classify symbols
Peter Zijlstra peterz@infradead.org objtool: Handle __sanitize_cov*() tail calls
Peter Zijlstra peterz@infradead.org objtool: Introduce CFI hash
Joe Lawrence joe.lawrence@redhat.com objtool: Make .altinstructions section entry size consistent
Josh Poimboeuf jpoimboe@redhat.com objtool: Remove reloc symbol type checks in get_alt_entry()
Linus Torvalds torvalds@linux-foundation.org objtool: print out the symbol type when complaining about it
Peter Zijlstra peterz@infradead.org objtool: Teach get_alt_entry() about more relocation types
Josh Poimboeuf jpoimboe@redhat.com objtool: Don't make .altinstructions writable
Peter Zijlstra peterz@infradead.org objtool/x86: Ignore __x86_indirect_alt_* symbols
Peter Zijlstra peterz@infradead.org objtool: Only rewrite unconditional retpoline thunk calls
Peter Zijlstra peterz@infradead.org objtool: Fix .symtab_shndx handling for elf_create_undef_symbol()
Borislav Petkov bp@suse.de x86/alternative: Optimize single-byte NOPs at an arbitrary position
Josh Poimboeuf jpoimboe@redhat.com objtool: Support asm jump tables
Peter Zijlstra peterz@infradead.org objtool/x86: Rewrite retpoline thunk calls
Peter Zijlstra peterz@infradead.org objtool: Skip magical retpoline .altinstr_replacement
Peter Zijlstra peterz@infradead.org objtool: Cache instruction relocs
Peter Zijlstra peterz@infradead.org objtool: Keep track of retpoline call sites
Peter Zijlstra peterz@infradead.org objtool: Add elf_create_undef_symbol()
Peter Zijlstra peterz@infradead.org objtool: Extract elf_symbol_add()
Peter Zijlstra peterz@infradead.org objtool: Extract elf_strtab_concat()
Peter Zijlstra peterz@infradead.org objtool: Create reloc sections implicitly
Peter Zijlstra peterz@infradead.org objtool: Add elf_create_reloc() helper
Peter Zijlstra peterz@infradead.org objtool: Rework the elf_rebuild_reloc_section() logic
Peter Zijlstra peterz@infradead.org objtool: Handle per arch retpoline naming
Peter Zijlstra peterz@infradead.org objtool: Correctly handle retpoline thunk calls
Peter Zijlstra peterz@infradead.org x86/retpoline: Simplify retpolines
Peter Zijlstra peterz@infradead.org x86/alternatives: Optimize optimize_nops()
Ben Hutchings ben@decadent.org.uk x86: Add insn_decode_kernel()
Borislav Petkov bp@suse.de x86/alternative: Use insn_decode()
Borislav Petkov bp@suse.de x86/insn-eval: Handle return values from the decoder
Borislav Petkov bp@suse.de x86/insn: Add an insn_decode() API
Borislav Petkov bp@suse.de x86/insn: Add a __ignore_sync_check__ marker
Borislav Petkov bp@suse.de x86/insn: Rename insn_decode() to insn_decode_from_regs()
Juergen Gross jgross@suse.com x86/alternative: Use ALTERNATIVE_TERNARY() in _static_cpu_has()
Juergen Gross jgross@suse.com x86/alternative: Support ALTERNATIVE_TERNARY
Juergen Gross jgross@suse.com x86/alternative: Support not-feature
Juergen Gross jgross@suse.com x86/alternative: Merge include files
Josh Poimboeuf jpoimboe@redhat.com x86/xen: Support objtool vmlinux.o validation in xen-head.S
Josh Poimboeuf jpoimboe@redhat.com x86/xen: Support objtool validation in xen-asm.S
Josh Poimboeuf jpoimboe@redhat.com objtool: Combine UNWIND_HINT_RET_OFFSET and UNWIND_HINT_FUNC
Josh Poimboeuf jpoimboe@redhat.com objtool: Assume only ELF functions do sibling calls
Josh Poimboeuf jpoimboe@redhat.com objtool: Support retpoline jump detection for vmlinux.o
Josh Poimboeuf jpoimboe@redhat.com objtool: Support stack layout changes in alternatives
Josh Poimboeuf jpoimboe@redhat.com objtool: Add 'alt_group' struct
Josh Poimboeuf jpoimboe@redhat.com objtool: Refactor ORC section generation
Uros Bizjak ubizjak@gmail.com KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
Uros Bizjak ubizjak@gmail.com KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 25 + Makefile | 25 +- arch/um/kernel/um_arch.c | 8 + arch/x86/Kconfig | 91 +- arch/x86/Makefile | 8 +- arch/x86/boot/compressed/efi_thunk_64.S | 2 +- arch/x86/boot/compressed/head_64.S | 4 +- arch/x86/boot/compressed/mem_encrypt.S | 4 +- arch/x86/crypto/aegis128-aesni-asm.S | 48 +- arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 2 +- arch/x86/crypto/aesni-intel_asm.S | 52 +- arch/x86/crypto/aesni-intel_avx-x86_64.S | 40 +- arch/x86/crypto/blake2s-core.S | 4 +- arch/x86/crypto/blowfish-x86_64-asm_64.S | 12 +- arch/x86/crypto/camellia-aesni-avx-asm_64.S | 18 +- arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 18 +- arch/x86/crypto/camellia-x86_64-asm_64.S | 12 +- arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 12 +- arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 16 +- arch/x86/crypto/chacha-avx2-x86_64.S | 6 +- arch/x86/crypto/chacha-avx512vl-x86_64.S | 6 +- arch/x86/crypto/chacha-ssse3-x86_64.S | 8 +- arch/x86/crypto/crc32-pclmul_asm.S | 2 +- arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 2 +- arch/x86/crypto/crct10dif-pcl-asm_64.S | 2 +- arch/x86/crypto/des3_ede-asm_64.S | 4 +- arch/x86/crypto/ghash-clmulni-intel_asm.S | 6 +- arch/x86/crypto/nh-avx2-x86_64.S | 2 +- arch/x86/crypto/nh-sse2-x86_64.S | 2 +- arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 38 +- arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 16 +- arch/x86/crypto/serpent-avx2-asm_64.S | 16 +- arch/x86/crypto/serpent-sse2-i586-asm_32.S | 6 +- arch/x86/crypto/serpent-sse2-x86_64-asm_64.S | 6 +- arch/x86/crypto/sha1_avx2_x86_64_asm.S | 2 +- arch/x86/crypto/sha1_ni_asm.S | 2 +- arch/x86/crypto/sha1_ssse3_asm.S | 2 +- arch/x86/crypto/sha256-avx-asm.S | 2 +- arch/x86/crypto/sha256-avx2-asm.S | 2 +- arch/x86/crypto/sha256-ssse3-asm.S | 2 +- arch/x86/crypto/sha256_ni_asm.S | 2 +- arch/x86/crypto/sha512-avx-asm.S | 2 +- arch/x86/crypto/sha512-avx2-asm.S | 2 +- arch/x86/crypto/sha512-ssse3-asm.S | 2 +- arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 16 +- arch/x86/crypto/twofish-i586-asm_32.S | 4 +- arch/x86/crypto/twofish-x86_64-asm_64-3way.S | 6 +- arch/x86/crypto/twofish-x86_64-asm_64.S | 4 +- arch/x86/entry/Makefile | 2 +- arch/x86/entry/calling.h | 72 +- arch/x86/entry/entry.S | 22 + arch/x86/entry/entry_32.S | 6 +- arch/x86/entry/entry_64.S | 62 +- arch/x86/entry/entry_64_compat.S | 21 +- arch/x86/entry/thunk_32.S | 2 +- arch/x86/entry/thunk_64.S | 2 +- arch/x86/entry/vdso/Makefile | 1 + arch/x86/entry/vdso/vdso32/system_call.S | 4 +- arch/x86/entry/vsyscall/vsyscall_emu_64.S | 3 + arch/x86/include/asm/GEN-for-each-reg.h | 14 +- arch/x86/include/asm/alternative-asm.h | 114 -- arch/x86/include/asm/alternative.h | 137 ++- arch/x86/include/asm/asm-prototypes.h | 17 - arch/x86/include/asm/cpufeature.h | 41 +- arch/x86/include/asm/cpufeatures.h | 14 +- arch/x86/include/asm/disabled-features.h | 21 +- arch/x86/include/asm/inat.h | 2 +- arch/x86/include/asm/insn-eval.h | 4 +- arch/x86/include/asm/insn.h | 28 +- arch/x86/include/asm/linkage.h | 22 + arch/x86/include/asm/msr-index.h | 13 + arch/x86/include/asm/nospec-branch.h | 141 +-- arch/x86/include/asm/paravirt.h | 2 +- arch/x86/include/asm/qspinlock_paravirt.h | 4 +- arch/x86/include/asm/smap.h | 5 +- arch/x86/include/asm/static_call.h | 19 +- arch/x86/include/asm/unwind_hints.h | 23 +- arch/x86/kernel/acpi/wakeup_32.S | 6 +- arch/x86/kernel/alternative.c | 406 ++++++- arch/x86/kernel/cpu/amd.c | 46 +- arch/x86/kernel/cpu/bugs.c | 475 ++++++-- arch/x86/kernel/cpu/common.c | 61 +- arch/x86/kernel/cpu/cpu.h | 2 + arch/x86/kernel/cpu/hygon.c | 6 + arch/x86/kernel/cpu/scattered.c | 1 + arch/x86/kernel/ftrace.c | 7 +- arch/x86/kernel/ftrace_32.S | 6 +- arch/x86/kernel/ftrace_64.S | 13 +- arch/x86/kernel/head_32.S | 3 +- arch/x86/kernel/head_64.S | 5 + arch/x86/kernel/irqflags.S | 4 +- arch/x86/kernel/kprobes/core.c | 2 +- arch/x86/kernel/kvm.c | 2 +- arch/x86/kernel/module.c | 15 +- arch/x86/kernel/paravirt.c | 2 +- arch/x86/kernel/process.c | 2 +- arch/x86/kernel/relocate_kernel_32.S | 15 +- arch/x86/kernel/relocate_kernel_64.S | 13 +- arch/x86/kernel/sev-es.c | 2 +- arch/x86/kernel/sev_verify_cbit.S | 2 +- arch/x86/kernel/static_call.c | 52 +- arch/x86/kernel/umip.c | 2 +- arch/x86/kernel/verify_cpu.S | 4 +- arch/x86/kernel/vmlinux.lds.S | 23 +- arch/x86/kvm/emulate.c | 39 +- arch/x86/kvm/svm/vmenter.S | 11 +- arch/x86/kvm/vmx/nested.c | 32 +- arch/x86/kvm/vmx/run_flags.h | 8 + arch/x86/kvm/vmx/vmenter.S | 170 +-- arch/x86/kvm/vmx/vmx.c | 78 +- arch/x86/kvm/vmx/vmx.h | 5 + arch/x86/kvm/x86.c | 4 +- arch/x86/lib/atomic64_386_32.S | 88 +- arch/x86/lib/atomic64_cx8_32.S | 18 +- arch/x86/lib/checksum_32.S | 8 +- arch/x86/lib/clear_page_64.S | 6 +- arch/x86/lib/cmpxchg16b_emu.S | 4 +- arch/x86/lib/cmpxchg8b_emu.S | 4 +- arch/x86/lib/copy_mc_64.S | 6 +- arch/x86/lib/copy_page_64.S | 6 +- arch/x86/lib/copy_user_64.S | 14 +- arch/x86/lib/csum-copy_64.S | 2 +- arch/x86/lib/error-inject.c | 3 +- arch/x86/lib/getuser.S | 22 +- arch/x86/lib/hweight.S | 6 +- arch/x86/lib/inat.c | 2 +- arch/x86/lib/insn-eval.c | 40 +- arch/x86/lib/insn.c | 222 +++- arch/x86/lib/iomap_copy_64.S | 2 +- arch/x86/lib/memcpy_64.S | 14 +- arch/x86/lib/memmove_64.S | 11 +- arch/x86/lib/memset_64.S | 8 +- arch/x86/lib/msr-reg.S | 4 +- arch/x86/lib/putuser.S | 6 +- arch/x86/lib/retpoline.S | 118 +- arch/x86/math-emu/div_Xsig.S | 2 +- arch/x86/math-emu/div_small.S | 2 +- arch/x86/math-emu/mul_Xsig.S | 6 +- arch/x86/math-emu/polynom_Xsig.S | 2 +- arch/x86/math-emu/reg_norm.S | 6 +- arch/x86/math-emu/reg_round.S | 2 +- arch/x86/math-emu/reg_u_add.S | 2 +- arch/x86/math-emu/reg_u_div.S | 2 +- arch/x86/math-emu/reg_u_mul.S | 2 +- arch/x86/math-emu/reg_u_sub.S | 2 +- arch/x86/math-emu/round_Xsig.S | 4 +- arch/x86/math-emu/shr_Xsig.S | 8 +- arch/x86/math-emu/wm_shrx.S | 16 +- arch/x86/mm/mem_encrypt_boot.S | 6 + arch/x86/net/bpf_jit_comp.c | 185 ++-- arch/x86/net/bpf_jit_comp32.c | 22 +- arch/x86/platform/efi/efi_stub_32.S | 2 +- arch/x86/platform/efi/efi_stub_64.S | 2 +- arch/x86/platform/efi/efi_thunk_64.S | 5 +- arch/x86/platform/olpc/xo1-wakeup.S | 6 +- arch/x86/power/hibernate_asm_32.S | 4 +- arch/x86/power/hibernate_asm_64.S | 4 +- arch/x86/um/checksum_32.S | 4 +- arch/x86/um/setjmp_32.S | 2 +- arch/x86/um/setjmp_64.S | 2 +- arch/x86/xen/Makefile | 1 - arch/x86/xen/setup.c | 6 +- arch/x86/xen/xen-asm.S | 43 +- arch/x86/xen/xen-head.S | 6 +- arch/x86/xen/xen-ops.h | 6 +- drivers/base/cpu.c | 8 + drivers/idle/intel_idle.c | 43 +- include/linux/cpu.h | 2 + include/linux/kvm_host.h | 2 +- include/linux/objtool.h | 14 +- samples/ftrace/ftrace-direct-modify.c | 4 +- samples/ftrace/ftrace-direct-too.c | 2 +- samples/ftrace/ftrace-direct.c | 2 +- scripts/Makefile.build | 6 + scripts/link-vmlinux.sh | 6 + security/Kconfig | 11 - tools/arch/x86/include/asm/cpufeatures.h | 12 +- tools/arch/x86/include/asm/disabled-features.h | 21 +- tools/arch/x86/include/asm/inat.h | 2 +- tools/arch/x86/include/asm/insn.h | 28 +- tools/arch/x86/include/asm/msr-index.h | 13 + tools/arch/x86/lib/inat.c | 2 +- tools/arch/x86/lib/insn.c | 222 +++- tools/arch/x86/lib/memcpy_64.S | 14 +- tools/arch/x86/lib/memset_64.S | 8 +- .../asm/{alternative-asm.h => alternative.h} | 0 tools/include/linux/kconfig.h | 67 ++ tools/include/linux/objtool.h | 14 +- tools/objtool/Documentation/stack-validation.txt | 16 +- tools/objtool/Makefile | 4 - tools/objtool/arch.h | 13 +- tools/objtool/arch/x86/decode.c | 58 +- tools/objtool/arch/x86/include/arch_special.h | 2 +- tools/objtool/builtin-check.c | 6 +- tools/objtool/builtin-orc.c | 6 +- tools/objtool/builtin.h | 3 +- tools/objtool/cfi.h | 2 + tools/objtool/check.c | 1140 +++++++++++++++----- tools/objtool/check.h | 35 +- tools/objtool/elf.c | 435 ++++++-- tools/objtool/elf.h | 22 +- tools/objtool/objtool.c | 2 + tools/objtool/objtool.h | 5 +- tools/objtool/orc_gen.c | 324 +++--- tools/objtool/special.c | 22 +- tools/objtool/sync-check.sh | 17 +- tools/objtool/weak.c | 7 +- tools/perf/check-headers.sh | 15 +- 208 files changed, 4602 insertions(+), 1926 deletions(-)
On Sat, Jul 23, 2022 at 11:53:32AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000. Anything received after that time might be too late.
Build results: total: 163 pass: 163 fail: 0 Qemu test results: total: 477 pass: 477 fail: 0
Tested-by: Guenter Roeck linux@roeck-us.net
Guenter
Hello!
On 23/07/22 04:53, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.133-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
Results from Linaro's test farm. No regressions on arm64, arm, x86_64, and i386.
Tested-by: Linux Kernel Functional Testing lkft@linaro.org
## Build * kernel: 5.10.133-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-5.10.y * git commit: 00d1152b116251d5f40936f24f9ef31f52eba544 * git describe: v5.10.132-149-g00d1152b1162 * test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.10.y/build/v5.10....
## No test regressions (compared to v5.10.132)
## No metric regressions (compared to v5.10.132)
## No test fixes (compared to v5.10.132)
## No metric fixes (compared to v5.10.132)
## Test result summary total: 138017, pass: 124391, fail: 610, skip: 12308, xfail: 708
## Build Summary * arc: 10 total, 10 passed, 0 failed * arm: 308 total, 308 passed, 0 failed * arm64: 62 total, 60 passed, 2 failed * i386: 52 total, 50 passed, 2 failed * mips: 45 total, 45 passed, 0 failed * parisc: 12 total, 12 passed, 0 failed * powerpc: 51 total, 51 passed, 0 failed * riscv: 27 total, 27 passed, 0 failed * s390: 21 total, 21 passed, 0 failed * sh: 24 total, 24 passed, 0 failed * sparc: 12 total, 12 passed, 0 failed * x86_64: 56 total, 54 passed, 2 failed
## Test suites summary * fwts * igt-gpu-tools * kunit * kvm-unit-tests * libgpiod * libhugetlbfs * log-parser-boot * log-parser-test * ltp-cap_bounds * ltp-commands * ltp-containers * ltp-controllers * ltp-cpuhotplug * ltp-crypto * ltp-cve * ltp-dio * ltp-fcntl-locktests * ltp-filecaps * ltp-fs * ltp-fs_bind * ltp-fs_perms_simple * ltp-fsx * ltp-hugetlb * ltp-io * ltp-ipc * ltp-math * ltp-mm * ltp-nptl * ltp-open-posix-tests * ltp-pty * ltp-sched * ltp-securebits * ltp-smoke * ltp-syscalls * ltp-tracing * network-basic-tests * packetdrill * perf * rcutorture * ssuite * v4l2-compliance * vdso
Greetings!
Daniel Díaz daniel.diaz@linaro.org
On Sat, Jul 23, 2022 at 11:53:32AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000. Anything received after that time might be too late.
Hi Greg,
5.10.133-rc1 tested.
Run tested on: - Intel Skylake x86_64 (nuc6 i5-6260U)
In addition - build tested for: - Allwinner A64 - Allwinner H3 - Allwinner H5 - Allwinner H6 - Rockchip RK3288 - Rockchip RK3328 - Rockchip RK3399pro
Logs from: Intel Skylake x86_64 (nuc6 i5-6260U) nuc6:~ # dmesg [ 0.000000] microcode: microcode updated early to revision 0xe2, date = 2020-07-14 [ 0.000000] Linux version 5.10.133-rc1 (docker@0dae7cb4c0f4) (x86_64-libreelec-linux-gnu-gcc-10.2.0 (GCC) 10.2.0, GNU ld (GNU Binutils) 2.35.1) #1 SMP Sat Jul 23 11:54:48 UTC 2022 [ 0.000000] DMI: /NUC6i5SYB, BIOS SYSKLi35.86A.0073.2020.0909.1625 09/09/2020 ... [ 0.243172] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 [ 0.243178] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 0.243181] Spectre V2 : Mitigation: IBRS [ 0.243182] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 0.243183] RETBleed: Mitigation: IBRS [ 0.243186] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 0.243188] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp [ 0.243196] MDS: Mitigation: Clear CPU buffers [ 0.243197] MMIO Stale Data: Mitigation: Clear CPU buffers [ 0.243201] SRBDS: Mitigation: Microcode ... [ 0.313120] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 0.313120] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_st... for more details.
nuc6:~ # lscpu | grep -e Vulnerability -e "Model name" Model name: Intel(R) Core(TM) i5-6260U CPU @ 1.80GHz Vulnerability Itlb multihit: Processor vulnerable Vulnerability L1tf: Mitigation; PTE Inversion Vulnerability Mds: Mitigation; Clear CPU buffers; SMT vulnerable Vulnerability Meltdown: Mitigation; PTI Vulnerability Mmio stale data: Mitigation; Clear CPU buffers; SMT vulnerable Vulnerability Retbleed: Mitigation; IBRS Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Vulnerability Spectre v2: Mitigation; IBRS, IBPB conditional, RSB filling Vulnerability Srbds: Mitigation; Microcode Vulnerability Tsx async abort: Not affected
Tested-by: Rudi Heitbaum rudi@heitbaum.com -- Rudi
Hi Greg,
On Sat, Jul 23, 2022 at 11:53:32AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000. Anything received after that time might be too late.
Build test (gcc version 11.3.1 20220706): mips: 63 configs -> no failure arm: 104 configs -> no failure arm64: 3 configs -> no failure x86_64: 4 configs -> no failure alpha allmodconfig -> no failure powerpc allmodconfig -> no failure riscv allmodconfig -> no failure s390 allmodconfig -> no failure xtensa allmodconfig -> no failure
Boot test: x86_64: Booted on my test laptop. No regression. x86_64: Booted on qemu. No regression. [1] arm64: Booted on rpi4b (4GB model). No regression. [2]
[1]. https://openqa.qa.codethink.co.uk/tests/1556 [2]. https://openqa.qa.codethink.co.uk/tests/1557
Tested-by: Sudip Mukherjee sudip.mukherjee@codethink.co.uk
-- Regards Sudip
On Sat, 23 Jul 2022 11:53:32 +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.133-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
All tests passing for Tegra ...
Test results for stable-v5.10: 10 builds: 10 pass, 0 fail 28 boots: 28 pass, 0 fail 75 tests: 75 pass, 0 fail
Linux version: 5.10.133-rc1-g00d1152b1162 Boards tested: tegra124-jetson-tk1, tegra186-p2771-0000, tegra194-p2972-0000, tegra194-p3509-0000+p3668-0000, tegra20-ventana, tegra210-p2371-2180, tegra210-p3450-0000, tegra30-cardhu-a04
Tested-by: Jon Hunter jonathanh@nvidia.com
Jon
Hi!
This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
These are the specualtion fixes, 00d1152b1162, AFAICT. There's little confusion as patches are not in queue/5.10.
CIP testing did not find any problems here:
https://gitlab.com/cip-project/cip-testing/linux-stable-rc-ci/-/tree/linux-5...
Tested-by: Pavel Machek (CIP) pavel@denx.de
Best regards, Pavel
On 7/23/22 02:53, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.133 release. There are 148 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.133-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
On ARCH_BRCMSTB using 32-bit and 64-bit ARM kernels, build tested on BMIPS_GENERIC:
Tested-by: Florian Fainelli f.fainelli@gmail.com