[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230730093049.GBZMYtycNKuAuP1+wB@fat_crate.local>
Date: Sun, 30 Jul 2023 11:30:49 +0200
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v6.5-rc4
Hi Linus,
please pull a couple of urgent x86 fixes for 6.5.
Thx.
---
The following changes since commit fdf0eaf11452d72945af31804e2a1048ee1b574c:
Linux 6.5-rc2 (2023-07-16 15:10:37 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v6.5_rc4
for you to fetch changes up to fd470a8beed88440b160d690344fbae05a0b9b1b:
x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (2023-07-22 18:04:22 +0200)
----------------------------------------------------------------
- AMD's automatic IBRS doesn't enable cross-thread branch target
injection protection (STIBP) for user processes. Enable STIBP on such
systems.
- Do not delete (but put the ref instead) of AMD MCE error thresholding
sysfs kobjects when destroying them in order not to delete the kernfs
pointer prematurely
- Restore annotation in ret_from_fork_asm() in order to fix kthread
stack unwinding from being marked as unreliable and thus breaking
livepatching
----------------------------------------------------------------
Kim Phillips (1):
x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled
Peter Zijlstra (1):
x86: Fix kthread unwind
Yazen Ghannam (1):
x86/MCE/AMD: Decrement threshold_bank refcount when removing threshold blocks
Documentation/admin-guide/hw-vuln/spectre.rst | 11 +++++++----
arch/x86/entry/entry_64.S | 16 +++++++++++++++-
arch/x86/kernel/cpu/bugs.c | 15 +++++++++------
arch/x86/kernel/cpu/mce/amd.c | 4 ++--
4 files changed, 33 insertions(+), 13 deletions(-)
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
Powered by blists - more mailing lists