This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.18.14-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.18.y and the diffstat can be found below.
thanks,
greg k-h
------------- Pseudo-Shortlog of commits:
Greg Kroah-Hartman gregkh@linuxfoundation.org Linux 5.18.14-rc1
Peter Zijlstra peterz@infradead.org um: Add missing apply_returns()
Kim Phillips kim.phillips@amd.com x86/bugs: Remove apostrophe typo
Arnaldo Carvalho de Melo acme@redhat.com tools headers cpufeatures: Sync with the kernel sources
Arnaldo Carvalho de Melo acme@redhat.com tools arch x86: Sync the msr-index.h copy with the kernel sources
Paolo Bonzini pbonzini@redhat.com KVM: emulate: do not adjust size of fastop and setcc subroutines
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/kvm: fix FASTOP_SIZE when return thunks are enabled
Thadeu Lima de Souza Cascardo cascardo@canonical.com efi/x86: use naked RET on mixed mode call wrapper
Nathan Chancellor nathan@kernel.org x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
Jiri Slaby jirislaby@kernel.org x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit
Thomas Gleixner tglx@linutronix.de x86/static_call: Serialize __static_call_fixup() properly
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/speculation: Disable RRSBA behavior
Konrad Rzeszutek Wilk konrad.wilk@oracle.com x86/kexec: Disable RET on kexec
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
Peter Zijlstra peterz@infradead.org x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/bugs: Add Cannon lake to RETBleed affected CPU list
Peter Zijlstra peterz@infradead.org x86/retbleed: Add fine grained Kconfig knobs
Andrew Cooper andrew.cooper3@citrix.com x86/cpu/amd: Enumerate BTC_NO
Peter Zijlstra peterz@infradead.org x86/common: Stamp out the stepping madness
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Prevent RSB underflow before vmenter
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Fix IBRS handling after vmexit
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Convert launched argument to flags
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Flatten __vmx_vcpu_run()
Josh Poimboeuf jpoimboe@kernel.org objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Remove x86_spec_ctrl_mask
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix SPEC_CTRL write on SMT state change
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix firmware entry SPEC_CTRL handling
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
Peter Zijlstra peterz@infradead.org x86/cpu/amd: Add Spectral Chicken
Thadeu Lima de Souza Cascardo cascardo@canonical.com objtool: Add entry UNRET validation
Josh Poimboeuf jpoimboe@kernel.org x86/bugs: Do IBPB fallback check only once
Peter Zijlstra peterz@infradead.org x86/bugs: Add retbleed=ibpb
Peter Zijlstra peterz@infradead.org x86/xen: Add UNTRAIN_RET
Peter Zijlstra peterz@infradead.org x86/xen: Rename SYS* entry points
Peter Zijlstra peterz@infradead.org objtool: Update Retpoline validation
Peter Zijlstra peterz@infradead.org intel_idle: Disable IBRS during long idle
Peter Zijlstra peterz@infradead.org x86/bugs: Report Intel retbleed vulnerability
Peter Zijlstra peterz@infradead.org x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
Peter Zijlstra peterz@infradead.org x86/bugs: Optimize SPEC_CTRL MSR writes
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/entry: Add kernel IBRS implementation
Peter Zijlstra peterz@infradead.org x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
Kim Phillips kim.phillips@amd.com x86/bugs: Enable STIBP for JMP2RET
Alexandre Chartre alexandre.chartre@oracle.com x86/bugs: Add AMD retbleed= boot parameter
Alexandre Chartre alexandre.chartre@oracle.com x86/bugs: Report AMD retbleed vulnerability
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86: Add magic AMD return-thunk
Peter Zijlstra peterz@infradead.org objtool: Treat .text.__x86.* as noinstr
Peter Zijlstra peterz@infradead.org x86/entry: Avoid very early RET
Peter Zijlstra peterz@infradead.org x86: Use return-thunk in asm code
Kim Phillips kim.phillips@amd.com x86/sev: Avoid using __x86_return_thunk
Peter Zijlstra peterz@infradead.org x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
Peter Zijlstra peterz@infradead.org x86/kvm: Fix SETcc emulation for return thunks
Peter Zijlstra peterz@infradead.org x86/bpf: Use alternative RET encoding
Peter Zijlstra peterz@infradead.org x86/ftrace: Use alternative RET encoding
Peter Zijlstra peterz@infradead.org x86,static_call: Use alternative RET encoding
Thadeu Lima de Souza Cascardo cascardo@canonical.com objtool: skip non-text sections when adding return-thunk sites
Peter Zijlstra peterz@infradead.org x86,objtool: Create .return_sites
Peter Zijlstra peterz@infradead.org x86: Undo return-thunk damage
Peter Zijlstra peterz@infradead.org x86/retpoline: Use -mfunction-return
Peter Zijlstra peterz@infradead.org x86/retpoline: Swizzle retpoline thunk
Peter Zijlstra peterz@infradead.org x86/retpoline: Cleanup some #ifdefery
Peter Zijlstra peterz@infradead.org x86/cpufeatures: Move RETPOLINE flags to word 11
Peter Zijlstra peterz@infradead.org x86/kvm/vmx: Make noinstr clean
Peter Zijlstra peterz@infradead.org x86/entry: Remove skip_r11rcx
Lai Jiangshan jiangshan.ljs@antgroup.com x86/entry: Don't call error_entry() for XENPV
Lai Jiangshan jiangshan.ljs@antgroup.com x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
Lai Jiangshan jiangshan.ljs@antgroup.com x86/entry: Switch the stack after error_entry() returns
Lai Jiangshan jiangshan.ljs@antgroup.com x86/traps: Use pt_regs directly in fixup_bad_iret()
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 25 ++ Makefile | 4 +- arch/um/kernel/um_arch.c | 4 + arch/x86/Kconfig | 103 +++-- arch/x86/Makefile | 6 + arch/x86/entry/Makefile | 2 +- arch/x86/entry/calling.h | 72 +++- arch/x86/entry/entry.S | 22 ++ arch/x86/entry/entry_32.S | 2 - arch/x86/entry/entry_64.S | 88 ++++- arch/x86/entry/entry_64_compat.S | 21 +- arch/x86/entry/vdso/Makefile | 1 + arch/x86/entry/vsyscall/vsyscall_emu_64.S | 9 +- arch/x86/include/asm/alternative.h | 1 + arch/x86/include/asm/cpufeatures.h | 12 +- arch/x86/include/asm/disabled-features.h | 21 +- arch/x86/include/asm/linkage.h | 8 + arch/x86/include/asm/msr-index.h | 13 + arch/x86/include/asm/nospec-branch.h | 69 +++- arch/x86/include/asm/static_call.h | 19 +- arch/x86/include/asm/traps.h | 2 +- arch/x86/include/asm/unwind_hints.h | 14 +- arch/x86/kernel/alternative.c | 69 ++++ arch/x86/kernel/asm-offsets.c | 6 + arch/x86/kernel/cpu/amd.c | 46 ++- arch/x86/kernel/cpu/bugs.c | 475 ++++++++++++++++++++---- arch/x86/kernel/cpu/common.c | 61 +-- arch/x86/kernel/cpu/cpu.h | 2 + arch/x86/kernel/cpu/hygon.c | 6 + arch/x86/kernel/cpu/scattered.c | 1 + arch/x86/kernel/ftrace.c | 7 +- arch/x86/kernel/head_32.S | 1 + arch/x86/kernel/head_64.S | 5 + arch/x86/kernel/module.c | 8 +- arch/x86/kernel/process.c | 2 +- arch/x86/kernel/relocate_kernel_32.S | 25 +- arch/x86/kernel/relocate_kernel_64.S | 23 +- arch/x86/kernel/static_call.c | 51 ++- arch/x86/kernel/traps.c | 19 +- arch/x86/kernel/vmlinux.lds.S | 9 +- arch/x86/kvm/emulate.c | 35 +- arch/x86/kvm/svm/vmenter.S | 18 + arch/x86/kvm/vmx/capabilities.h | 4 +- arch/x86/kvm/vmx/nested.c | 2 +- arch/x86/kvm/vmx/run_flags.h | 8 + arch/x86/kvm/vmx/vmenter.S | 194 ++++++---- arch/x86/kvm/vmx/vmx.c | 84 +++-- arch/x86/kvm/vmx/vmx.h | 10 +- arch/x86/kvm/vmx/vmx_ops.h | 2 +- arch/x86/kvm/x86.c | 4 +- arch/x86/lib/memmove_64.S | 7 +- arch/x86/lib/retpoline.S | 79 +++- arch/x86/mm/mem_encrypt_boot.S | 10 +- arch/x86/net/bpf_jit_comp.c | 26 +- arch/x86/platform/efi/efi_thunk_64.S | 5 +- arch/x86/xen/setup.c | 6 +- arch/x86/xen/xen-asm.S | 30 +- arch/x86/xen/xen-head.S | 1 + arch/x86/xen/xen-ops.h | 6 +- drivers/base/cpu.c | 8 + drivers/idle/intel_idle.c | 44 ++- include/linux/cpu.h | 2 + include/linux/kvm_host.h | 2 +- include/linux/objtool.h | 9 +- scripts/Makefile.build | 1 + scripts/link-vmlinux.sh | 3 + security/Kconfig | 11 - tools/arch/x86/include/asm/cpufeatures.h | 12 +- tools/arch/x86/include/asm/disabled-features.h | 21 +- tools/arch/x86/include/asm/msr-index.h | 13 + tools/include/linux/objtool.h | 9 +- tools/objtool/arch/x86/decode.c | 5 + tools/objtool/builtin-check.c | 4 +- tools/objtool/check.c | 331 ++++++++++++++++- tools/objtool/include/objtool/arch.h | 1 + tools/objtool/include/objtool/builtin.h | 2 +- tools/objtool/include/objtool/check.h | 24 +- tools/objtool/include/objtool/elf.h | 1 + tools/objtool/include/objtool/objtool.h | 1 + tools/objtool/objtool.c | 1 + 80 files changed, 1937 insertions(+), 433 deletions(-)
On 7/22/22 02:06, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.18.14-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.18.y and the diffstat can be found below.
thanks,
greg k-h
On ARCH_BRCMSTB using 32-bit and 64-bit ARM kernels, and built tested with BMIPS_GENERIC:
Tested-by: Florian Fainelli f.fainelli@gmail.com
On 7/22/22 2:06 AM, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.18.14-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.18.y and the diffstat can be found below.
thanks,
greg k-h
Built and booted successfully on RISC-V RV64 (HiFive Unmatched).
Tested-by: Ron Economos re@w6rz.net
On Fri, 22 Jul 2022 at 14:38, Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.18.14-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.18.y and the diffstat can be found below.
thanks,
greg k-h
Results from Linaro’s test farm. No regressions on arm64, arm, x86_64, and i386.
Tested-by: Linux Kernel Functional Testing lkft@linaro.org
## Build * kernel: 5.18.14-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-5.18.y * git commit: 4142b06492bc82bde362db55d6f29b0e2e509091 * git describe: v5.18.13-71-g4142b06492bc * test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.18.y/build/v5.18....
## Test Regressions (compared to v5.18.12) No test regressions found.
## Metric Regressions (compared to v5.18.12) No metric regressions found.
## Test Fixes (compared to v5.18.12) No test fixes found.
## Metric Fixes (compared to v5.18.12) No metric fixes found.
## Test result summary total: 131100, pass: 119324, fail: 970, skip: 10006, xfail: 800
## Build Summary * arc: 10 total, 10 passed, 0 failed * arm: 308 total, 308 passed, 0 failed * arm64: 62 total, 60 passed, 2 failed * i386: 52 total, 50 passed, 2 failed * mips: 45 total, 45 passed, 0 failed * parisc: 12 total, 12 passed, 0 failed * powerpc: 60 total, 54 passed, 6 failed * riscv: 27 total, 22 passed, 5 failed * s390: 18 total, 18 passed, 0 failed * sh: 24 total, 24 passed, 0 failed * sparc: 12 total, 12 passed, 0 failed * x86_64: 56 total, 54 passed, 2 failed
## Test suites summary * fwts * kselftest-android * kselftest-breakpoints * kselftest-capabilities * kselftest-cgroup * kselftest-clone3 * kselftest-core * kselftest-cpu-hotplug * kselftest-cpufreq * kselftest-drivers-dma-buf * kselftest-efivarfs * kselftest-filesystems * kselftest-filesystems-binderfs * kselftest-firmware * kselftest-fpu * kselftest-gpio * kselftest-ipc * kselftest-ir * kselftest-kcmp * kselftest-lib * kselftest-membarrier * kselftest-netfilter * kselftest-nsfs * kselftest-openat2 * kselftest-pid_namespace * kselftest-pidfd * kselftest-proc * kselftest-pstore * kselftest-rseq * kselftest-rtc * kselftest-seccomp * kselftest-sigaltstack * kselftest-size * kselftest-splice * kselftest-static_keys * kselftest-sync * kselftest-sysctl * kselftest-tc-testing * kselftest-timens * kselftest-timers * kselftest-tmpfs * kselftest-tpm2 * kselftest-user * kselftest-vm * kselftest-zram * kunit * kvm-unit-tests * libgpiod * libhugetlbfs * log-parser-boot * log-parser-test * ltp-cap_bounds * ltp-commands * ltp-containers * ltp-controllers * ltp-cpuhotplug * ltp-crypto * ltp-cve * ltp-dio * ltp-fcntl-locktests * ltp-filecaps * ltp-fs * ltp-fs_bind * ltp-fs_perms_simple * ltp-fsx * ltp-hugetlb * ltp-io * ltp-ipc * ltp-math * ltp-mm * ltp-nptl * ltp-open-posix-tests * ltp-pty * ltp-sched * ltp-securebits * ltp-smoke * ltp-syscalls * ltp-tracing * network-basic-tests * packetdrill * perf * perf/Zstd-perf.data-compression * rcutorture * ssuite * v4l2-compliance * vdso
-- Linaro LKFT https://lkft.linaro.org
On Fri, Jul 22, 2022 at 11:06:55AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
Build results: total: 154 pass: 154 fail: 0 Qemu test results: total: 489 pass: 489 fail: 0
Tested-by: Guenter Roeck linux@roeck-us.net
Guenter
On Fri, Jul 22, 2022 at 11:06:55AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Successfully cross-compiled for arm64 (bcm2711_defconfig, GCC 10.2.0) and powerpc (ps3_defconfig, GCC 12.1.0).
Tested-by: Bagas Sanjaya bagasdotme@gmail.com
On Fri, Jul 22, 2022 at 11:06:55AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
Hi Greg,
5.18.14-rc1 tested.
Run tested on: - Allwinner H6 (Tanix TX6) - Intel Tiger Lake x86_64 (nuc11 i7-1165G7)
In addition - build tested for: - Allwinner A64 - Allwinner H3 - Allwinner H5 - NXP iMX6 - NXP iMX8 - Qualcomm Dragonboard - Rockchip RK3288 - Rockchip RK3328 - Rockchip RK3399pro - Samsung Exynos
Tested-by: Rudi Heitbaum rudi@heitbaum.com -- Rudi
Hi Greg,
On Fri, Jul 22, 2022 at 11:06:55AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
Build test (gcc version 12.1.1 20220706): mips: 59 configs -> no failure arm: 99 configs -> no failure arm64: 3 configs -> no failure x86_64: 4 configs -> no failure alpha allmodconfig -> no failure csky allmodconfig -> no failure powerpc allmodconfig -> no failure riscv allmodconfig -> no failure s390 allmodconfig -> no failure xtensa allmodconfig -> no failure
Boot test: x86_64: Booted on my test laptop. No regression. x86_64: Booted on qemu. No regression. [1] arm64: Booted on rpi4b (4GB model). No regression. [2] mips: Booted on ci20 board. No regression. [3]
[1]. https://openqa.qa.codethink.co.uk/tests/1546 [2]. https://openqa.qa.codethink.co.uk/tests/1549 [3]. https://openqa.qa.codethink.co.uk/tests/1552
Tested-by: Sudip Mukherjee sudip.mukherjee@codethink.co.uk
-- Regards Sudip
On Fri, 22 Jul 2022 11:06:55 +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.18.14 release. There are 70 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sun, 24 Jul 2022 09:06:00 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.18.14-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.18.y and the diffstat can be found below.
thanks,
greg k-h
All tests passing for Tegra ...
Test results for stable-v5.18: 10 builds: 10 pass, 0 fail 28 boots: 28 pass, 0 fail 130 tests: 130 pass, 0 fail
Linux version: 5.18.14-rc1-g4142b06492bc Boards tested: tegra124-jetson-tk1, tegra186-p2771-0000, tegra194-p2972-0000, tegra194-p3509-0000+p3668-0000, tegra20-ventana, tegra210-p2371-2180, tegra210-p3450-0000, tegra30-cardhu-a04
Tested-by: Jon Hunter jonathanh@nvidia.com
Jon