lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221005113210.255710920@linuxfoundation.org>
Date:   Wed,  5 Oct 2022 13:31:48 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        stable@...r.kernel.org, torvalds@...ux-foundation.org,
        akpm@...ux-foundation.org, linux@...ck-us.net, shuah@...nel.org,
        patches@...nelci.org, lkft-triage@...ts.linaro.org, pavel@...x.de,
        jonathanh@...dia.com, f.fainelli@...il.com,
        sudipm.mukherjee@...il.com, srw@...dewatkins.net
Subject: [PATCH 5.4 00/51] 5.4.217-rc1 review

This is the start of the stable review cycle for the 5.4.217 release.
There are 51 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Fri, 07 Oct 2022 11:31:56 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.217-rc1.gz
or in the git tree and branch at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 5.4.217-rc1

Shuah Khan <skhan@...uxfoundation.org>
    docs: update mediator information in CoC docs

Sami Tolvanen <samitolvanen@...gle.com>
    Makefile.extrawarn: Move -Wcast-function-type-strict to W=1

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Revert "drm/amdgpu: use dirty framebuffer helper"

YueHaibing <yuehaibing@...wei.com>
    xfs: remove unused variable 'done'

Darrick J. Wong <darrick.wong@...cle.com>
    xfs: fix uninitialized variable in xfs_attr3_leaf_inactive

Darrick J. Wong <darrick.wong@...cle.com>
    xfs: streamline xfs_attr3_leaf_inactive

Christoph Hellwig <hch@....de>
    xfs: move incore structures out of xfs_da_format.h

Darrick J. Wong <darrick.wong@...cle.com>
    xfs: fix memory corruption during remote attr value buffer invalidation

Darrick J. Wong <darrick.wong@...cle.com>
    xfs: refactor remote attr value buffer invalidation

Christoph Hellwig <hch@....de>
    xfs: fix IOCB_NOWAIT handling in xfs_file_dio_aio_read

Darrick J. Wong <darrick.wong@...cle.com>
    xfs: fix s_maxbytes computation on 32-bit kernels

Darrick J. Wong <darrick.wong@...cle.com>
    xfs: truncate should remove all blocks, not just to the end of the page cache

Darrick J. Wong <darrick.wong@...cle.com>
    xfs: introduce XFS_MAX_FILEOFF

Christoph Hellwig <hch@....de>
    xfs: fix misuse of the XFS_ATTR_INCOMPLETE flag

Daniel Sneddon <daniel.sneddon@...ux.intel.com>
    x86/speculation: Add RSB VM Exit protections

Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
    x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts

Nathan Chancellor <nathan@...nel.org>
    x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current

Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
    x86/speculation: Disable RRSBA behavior

Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
    x86/bugs: Add Cannon lake to RETBleed affected CPU list

Andrew Cooper <andrew.cooper3@...rix.com>
    x86/cpu/amd: Enumerate BTC_NO

Peter Zijlstra <peterz@...radead.org>
    x86/common: Stamp out the stepping madness

Josh Poimboeuf <jpoimboe@...nel.org>
    x86/speculation: Fill RSB on vmexit for IBRS

Josh Poimboeuf <jpoimboe@...nel.org>
    KVM: VMX: Fix IBRS handling after vmexit

Josh Poimboeuf <jpoimboe@...nel.org>
    KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS

Thadeu Lima de Souza Cascardo <cascardo@...onical.com>
    KVM: VMX: Convert launched argument to flags

Josh Poimboeuf <jpoimboe@...nel.org>
    KVM: VMX: Flatten __vmx_vcpu_run()

Uros Bizjak <ubizjak@...il.com>
    KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw

Uros Bizjak <ubizjak@...il.com>
    KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S

Josh Poimboeuf <jpoimboe@...nel.org>
    x86/speculation: Remove x86_spec_ctrl_mask

Josh Poimboeuf <jpoimboe@...nel.org>
    x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit

Josh Poimboeuf <jpoimboe@...nel.org>
    x86/speculation: Fix SPEC_CTRL write on SMT state change

Josh Poimboeuf <jpoimboe@...nel.org>
    x86/speculation: Fix firmware entry SPEC_CTRL handling

Josh Poimboeuf <jpoimboe@...nel.org>
    x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n

Peter Zijlstra <peterz@...radead.org>
    x86/speculation: Change FILL_RETURN_BUFFER to work with objtool

Peter Zijlstra <peterz@...radead.org>
    intel_idle: Disable IBRS during long idle

Peter Zijlstra <peterz@...radead.org>
    x86/bugs: Report Intel retbleed vulnerability

Peter Zijlstra <peterz@...radead.org>
    x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()

Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
    x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS

Peter Zijlstra <peterz@...radead.org>
    x86/bugs: Optimize SPEC_CTRL MSR writes

Peter Zijlstra <peterz@...radead.org>
    x86/entry: Add kernel IBRS implementation

Peter Zijlstra <peterz@...radead.org>
    x86/entry: Remove skip_r11rcx

Peter Zijlstra <peterz@...radead.org>
    x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value

Alexandre Chartre <alexandre.chartre@...cle.com>
    x86/bugs: Add AMD retbleed= boot parameter

Alexandre Chartre <alexandre.chartre@...cle.com>
    x86/bugs: Report AMD retbleed vulnerability

Peter Zijlstra <peterz@...radead.org>
    x86/cpufeatures: Move RETPOLINE flags to word 11

Peter Zijlstra <peterz@...radead.org>
    x86/kvm/vmx: Make noinstr clean

Mark Gross <mgross@...ux.intel.com>
    x86/cpu: Add a steppings field to struct x86_cpu_id

Thomas Gleixner <tglx@...utronix.de>
    x86/cpu: Add consistent CPU match macros

Thomas Gleixner <tglx@...utronix.de>
    x86/devicetable: Move x86 specific macro out of generic code

Thadeu Lima de Souza Cascardo <cascardo@...onical.com>
    Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"

Thadeu Lima de Souza Cascardo <cascardo@...onical.com>
    Revert "x86/speculation: Add RSB VM Exit protections"


-------------

Diffstat:

 Documentation/admin-guide/kernel-parameters.txt    |  13 +
 .../process/code-of-conduct-interpretation.rst     |   2 +-
 Makefile                                           |   4 +-
 arch/x86/entry/calling.h                           |  68 +++-
 arch/x86/entry/entry_32.S                          |   2 -
 arch/x86/entry/entry_64.S                          |  34 +-
 arch/x86/entry/entry_64_compat.S                   |  11 +-
 arch/x86/include/asm/cpu_device_id.h               | 132 +++++++-
 arch/x86/include/asm/cpufeatures.h                 |  13 +-
 arch/x86/include/asm/intel-family.h                |   6 +
 arch/x86/include/asm/msr-index.h                   |  10 +
 arch/x86/include/asm/nospec-branch.h               |  54 +--
 arch/x86/kernel/cpu/amd.c                          |  21 +-
 arch/x86/kernel/cpu/bugs.c                         | 365 ++++++++++++++++-----
 arch/x86/kernel/cpu/common.c                       |  61 ++--
 arch/x86/kernel/cpu/match.c                        |  13 +-
 arch/x86/kernel/cpu/scattered.c                    |   1 +
 arch/x86/kernel/process.c                          |   2 +-
 arch/x86/kvm/svm.c                                 |   1 +
 arch/x86/kvm/vmx/nested.c                          |  32 +-
 arch/x86/kvm/vmx/run_flags.h                       |   8 +
 arch/x86/kvm/vmx/vmenter.S                         | 161 +++++----
 arch/x86/kvm/vmx/vmx.c                             |  72 ++--
 arch/x86/kvm/vmx/vmx.h                             |   5 +
 arch/x86/kvm/x86.c                                 |   4 +-
 drivers/base/cpu.c                                 |   8 +
 drivers/cpufreq/acpi-cpufreq.c                     |   1 +
 drivers/cpufreq/amd_freq_sensitivity.c             |   1 +
 drivers/gpu/drm/amd/amdgpu/amdgpu_display.c        |   2 -
 drivers/idle/intel_idle.c                          |  43 ++-
 fs/xfs/libxfs/xfs_attr.c                           |   2 +-
 fs/xfs/libxfs/xfs_attr_leaf.c                      |   4 +-
 fs/xfs/libxfs/xfs_attr_leaf.h                      |  26 +-
 fs/xfs/libxfs/xfs_attr_remote.c                    |  85 +++--
 fs/xfs/libxfs/xfs_attr_remote.h                    |   2 +
 fs/xfs/libxfs/xfs_da_btree.h                       |  17 +-
 fs/xfs/libxfs/xfs_da_format.c                      |   1 +
 fs/xfs/libxfs/xfs_da_format.h                      |  59 ----
 fs/xfs/libxfs/xfs_dir2.h                           |   2 +
 fs/xfs/libxfs/xfs_dir2_priv.h                      |  19 ++
 fs/xfs/libxfs/xfs_format.h                         |   7 +
 fs/xfs/xfs_attr_inactive.c                         | 146 +++------
 fs/xfs/xfs_file.c                                  |   7 +-
 fs/xfs/xfs_inode.c                                 |  25 +-
 fs/xfs/xfs_reflink.c                               |   3 +-
 fs/xfs/xfs_super.c                                 |  48 ++-
 include/linux/cpu.h                                |   2 +
 include/linux/kvm_host.h                           |   2 +-
 include/linux/mod_devicetable.h                    |   4 +-
 scripts/Makefile.extrawarn                         |   1 +
 tools/arch/x86/include/asm/cpufeatures.h           |   2 +-
 51 files changed, 1056 insertions(+), 558 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ