[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180816101429.GA10680@kroah.com>
Date: Thu, 16 Aug 2018 12:14:29 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.18.1
I'm announcing the release of the 4.18.1 kernel.
All users of the 4.18 kernel series must upgrade.
The updated 4.18.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.18.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Documentation/ABI/testing/sysfs-devices-system-cpu | 24
Documentation/admin-guide/index.rst | 9
Documentation/admin-guide/kernel-parameters.txt | 78 +
Documentation/admin-guide/l1tf.rst | 610 +++++++++++
Makefile | 2
arch/Kconfig | 3
arch/x86/Kconfig | 1
arch/x86/include/asm/apic.h | 9
arch/x86/include/asm/cpufeatures.h | 3
arch/x86/include/asm/dmi.h | 2
arch/x86/include/asm/hardirq.h | 26
arch/x86/include/asm/irqflags.h | 2
arch/x86/include/asm/kvm_host.h | 6
arch/x86/include/asm/msr-index.h | 7
arch/x86/include/asm/page_32_types.h | 9
arch/x86/include/asm/pgtable-2level.h | 17
arch/x86/include/asm/pgtable-3level.h | 37
arch/x86/include/asm/pgtable-invert.h | 32
arch/x86/include/asm/pgtable.h | 74 -
arch/x86/include/asm/pgtable_64.h | 38
arch/x86/include/asm/processor.h | 17
arch/x86/include/asm/topology.h | 6
arch/x86/include/asm/vmx.h | 11
arch/x86/kernel/apic/apic.c | 18
arch/x86/kernel/apic/io_apic.c | 1
arch/x86/kernel/apic/msi.c | 1
arch/x86/kernel/apic/vector.c | 1
arch/x86/kernel/cpu/amd.c | 51
arch/x86/kernel/cpu/bugs.c | 171 ++-
arch/x86/kernel/cpu/common.c | 56 -
arch/x86/kernel/cpu/cpu.h | 2
arch/x86/kernel/cpu/intel.c | 7
arch/x86/kernel/cpu/microcode/core.c | 16
arch/x86/kernel/cpu/topology.c | 41
arch/x86/kernel/fpu/core.c | 1
arch/x86/kernel/hpet.c | 1
arch/x86/kernel/i8259.c | 1
arch/x86/kernel/idt.c | 1
arch/x86/kernel/irq.c | 1
arch/x86/kernel/irq_32.c | 1
arch/x86/kernel/irq_64.c | 1
arch/x86/kernel/irqinit.c | 1
arch/x86/kernel/kprobes/core.c | 5
arch/x86/kernel/paravirt.c | 14
arch/x86/kernel/setup.c | 6
arch/x86/kernel/smp.c | 1
arch/x86/kernel/smpboot.c | 18
arch/x86/kernel/time.c | 1
arch/x86/kvm/mmu.c | 1
arch/x86/kvm/vmx.c | 455 ++++++--
arch/x86/kvm/x86.c | 34
arch/x86/mm/init.c | 25
arch/x86/mm/kmmio.c | 25
arch/x86/mm/mmap.c | 21
arch/x86/mm/pageattr.c | 8
arch/x86/mm/pti.c | 1
arch/x86/platform/intel-mid/device_libs/platform_mrfld_wdt.c | 1
arch/x86/platform/uv/tlb_uv.c | 1
arch/x86/xen/enlighten.c | 1
drivers/base/cpu.c | 8
drivers/gpu/drm/i915/i915_pmu.c | 1
drivers/gpu/drm/i915/intel_lpe_audio.c | 1
drivers/pci/controller/pci-hyperv.c | 1
include/asm-generic/pgtable.h | 12
include/linux/cpu.h | 21
include/linux/swapfile.h | 2
kernel/cpu.c | 282 ++++-
kernel/sched/core.c | 30
kernel/sched/fair.c | 1
kernel/smp.c | 2
mm/memory.c | 37
mm/mprotect.c | 49
mm/swapfile.c | 46
tools/arch/x86/include/asm/cpufeatures.h | 3
74 files changed, 2211 insertions(+), 299 deletions(-)
Abel Vesa (1):
cpu/hotplug: Non-SMP machines do not make use of booted_once
Andi Kleen (10):
x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT
x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation
x86/speculation/l1tf: Make sure the first page is always reserved
x86/speculation/l1tf: Add sysfs reporting for l1tf
x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings
x86/speculation/l1tf: Limit swap file size to MAX_PA/2
x86/speculation/l1tf: Invert all not present mappings
x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert
x86/mm/pat: Make set_memory_np() L1TF safe
x86/mm/kmmio: Make the tracer robust against L1TF
Borislav Petkov (2):
x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info
x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings
David Woodhouse (1):
tools headers: Synchronise x86 cpufeatures.h for L1TF additions
Greg Kroah-Hartman (1):
Linux 4.18.1
Jiri Kosina (4):
x86/speculation: Protect against userspace-userspace spectreRSB
cpu/hotplug: Expose SMT control init function
x86/bugs, kvm: Introduce boot-time control of L1TF mitigations
x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures
Josh Poimboeuf (2):
cpu/hotplug: detect SMT disabled by BIOS
x86/microcode: Allow late microcode loading with SMT disabled
Konrad Rzeszutek Wilk (9):
x86/bugs: Move the l1tf function and define pr_fmt properly
x86/cpufeatures: Add detection of L1D cache flush support.
x86/KVM: Warn user if KVM is loaded SMT and L1TF CPU bug being present
x86/KVM/VMX: Add module argument for L1TF mitigation
x86/KVM/VMX: Split the VMX MSR LOAD structures to have an host/guest numbers
x86/KVM/VMX: Add find_msr() helper function
x86/KVM/VMX: Separate the VMX AUTOLOAD guest/host number accounting
x86/KVM/VMX: Extend add_atomic_switch_msr() to allow VMENTER only MSRs
x86/KVM/VMX: Use MSR save list for IA32_FLUSH_CMD if required
Linus Torvalds (2):
x86/speculation/l1tf: Change order of offset/type in swap entry
x86/speculation/l1tf: Protect swap entries against L1TF
Masami Hiramatsu (1):
kprobes/x86: Fix %p uses in error messages
Michal Hocko (1):
x86/speculation/l1tf: Fix up pte->pfn conversion for PAE
Nick Desaulniers (1):
x86/irqflags: Provide a declaration for native_save_fl
Nicolai Stange (9):
x86/KVM/VMX: Initialize the vmx_l1d_flush_pages' content
x86/KVM/VMX: Don't set l1tf_flush_l1d to true from vmx_l1d_flush()
x86/KVM/VMX: Replace 'vmx_l1d_flush_always' with 'vmx_l1d_flush_cond'
x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush()
x86/irq: Demote irq_cpustat_t::__softirq_pending to u16
x86/KVM/VMX: Introduce per-host-cpu analogue of l1tf_flush_l1d
x86: Don't include linux/irq.h from asm/hardirq.h
x86/irq: Let interrupt handlers set kvm_cpu_l1tf_flush_l1d
x86/KVM/VMX: Don't set l1tf_flush_l1d from vmx_handle_external_intr()
Paolo Bonzini (6):
x86/KVM/VMX: Add L1D flush algorithm
x86/KVM/VMX: Add L1D MSR based flush
x86/KVM/VMX: Add L1D flush logic
x86/speculation: Simplify sysfs report of VMX L1TF vulnerability
x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry
KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry
Peter Zijlstra (2):
x86/paravirt: Fix spectre-v2 mitigations for paravirt guests
sched/smt: Update sched_smt_present at runtime
Thomas Gleixner (26):
x86/smp: Provide topology_is_primary_thread()
x86/topology: Provide topology_smt_supported()
cpu/hotplug: Make bringup/teardown of smp threads symmetric
cpu/hotplug: Split do_cpu_down()
cpu/hotplug: Provide knobs to control SMT
x86/cpu: Remove the pointless CPU printout
x86/cpu/AMD: Remove the pointless detect_ht() call
x86/cpu/common: Provide detect_ht_early()
x86/cpu/topology: Provide detect_extended_topology_early()
x86/cpu/intel: Evaluate smp_num_siblings early
x86/cpu/AMD: Evaluate smp_num_siblings early
x86/apic: Ignore secondary threads if nosmt=force
Revert "x86/apic: Ignore secondary threads if nosmt=force"
cpu/hotplug: Boot HT siblings at least once
cpu/hotplug: Online siblings when SMT control is turned on
x86/litf: Introduce vmx status variable
x86/kvm: Drop L1TF MSR list approach
x86/l1tf: Handle EPT disabled state proper
x86/kvm: Move l1tf setup function
x86/kvm: Add static key for flush always
x86/kvm: Serialize L1D flush parameter setter
x86/kvm: Allow runtime control of L1D flush
cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early
Documentation: Add section about CPU vulnerabilities
Documentation/l1tf: Remove Yonah processors from not vulnerable list
cpu/hotplug: Fix SMT supported evaluation
Tony Luck (1):
Documentation/l1tf: Fix typos
Vlastimil Babka (4):
x86/speculation/l1tf: Extend 64bit swap file size limit
x86/speculation/l1tf: Protect PAE swap entries against L1TF
x86/smp: fix non-SMP broken build due to redefinition of apic_id_is_primary_thread
x86/init: fix build with CONFIG_SWAP=n
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists