From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Cyrus-Session-Id: sloti22d1t05-1418482-1526941962-5-15411894808822181030 X-Sieve: CMU Sieve 3.0 X-Spam-known-sender: no X-Spam-score: 0.0 X-Spam-hits: BAYES_00 -1.9, HEADER_FROM_DIFFERENT_DOMAINS 0.248, MAILING_LIST_MULTI -1, RCVD_IN_DNSWL_HI -5, LANGUAGES en, BAYES_USED global, SA_VERSION 3.4.0 X-Spam-source: IP='209.132.180.67', Host='vger.kernel.org', Country='US', FromHeader='org', MailFrom='org' X-Spam-charsets: X-Resolved-to: greg@kroah.com X-Delivered-to: greg@kroah.com X-Mail-from: stable-owner@vger.kernel.org ARC-Seal: i=1; a=rsa-sha256; cv=none; d=messagingengine.com; s=fm2; t= 1526941961; b=fLkYNkBEqPz6vgTaXXJsstJ5Hlf6Dcl98Ox3T7y9hXjemjJvct 37cvD4z0Xk1eXhilYr+eJdDrsN8kQogvcacU6msHtIoH/pzDRFf1M4se2NL37Ffz N7mZ9PhHmfIsSy+xfZ6wjmxHMYjno4LtYmu+sisherGzt+7iQsTEC3txPMBH4Nre jp901iJXaDYISeTaNKV2o+58HCHSr86NjG6S8sVMHk9yXjFM529Y8mZaoyDBZgoB SNiGmFC9pADuTmWLwEa9WPnExOogsQMSsLlbkx/afuWnexA4LmEtWskssdr6O6d3 8NeFQ5oZjHrkIWy6DHqjxqcP4roHHH5ic1LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=from:to:cc:subject:date:message-id:sender :list-id; s=fm2; t=1526941961; bh=aseerEC4iFwQzyVx4ApVEh+be2cjuj W1eczqnf0/qw0=; b=lKevf9M67kHDMTy/e5D+7QP+HHJu5+lBqpKfy+DtxBL1fF wKs1taveLfiE3HE8CQNPEnTEJkNzyV4r8MaeH7VR4PBQ/SMS+4HStzHymSXtTwZf IXN1p9ryaRy3TJUCNvuxzgRXEl7SDpzNvXl/B7tt6O6UU2J4q3x/5LifQUtMGS4j qQ0/kN1bE2hVGosAMZi95YsGdDAUs0h6yNjwZzT6EJHJ8SIQiL4G8ze9ffABBdpG Ua7t78GKjZM2tU8I2LdVkS9VcgbNOoNtr+OGzi4lUDlghskaWM/AHxC8CQxFYc4D Z/WjE4ztHhW3wQiEv3n+GkwY/aKAreT97YpFClNw== ARC-Authentication-Results: i=1; mx3.messagingengine.com; arc=none (no signatures found); dkim=pass (1024-bit rsa key sha256) header.d=kernel.org header.i=@kernel.org header.b=bvSrQnGv x-bits=1024 x-keytype=rsa x-algorithm=sha256 x-selector=default; dmarc=none (p=none,has-list-id=yes,d=none) header.from=linuxfoundation.org; iprev=pass policy.iprev=209.132.180.67 (vger.kernel.org); spf=none smtp.mailfrom=stable-owner@vger.kernel.org smtp.helo=vger.kernel.org; x-aligned-from=fail; x-cm=none score=0; x-ptr=pass x-ptr-helo=vger.kernel.org x-ptr-lookup=vger.kernel.org; x-return-mx=pass smtp.domain=vger.kernel.org smtp.result=pass smtp_org.domain=kernel.org smtp_org.result=pass smtp_is_org_domain=no header.domain=linuxfoundation.org header.result=pass header_is_org_domain=yes; x-vs=clean score=0 state=0 Authentication-Results: mx3.messagingengine.com; arc=none (no signatures found); dkim=pass (1024-bit rsa key sha256) header.d=kernel.org header.i=@kernel.org header.b=bvSrQnGv x-bits=1024 x-keytype=rsa x-algorithm=sha256 x-selector=default; dmarc=none (p=none,has-list-id=yes,d=none) header.from=linuxfoundation.org; iprev=pass policy.iprev=209.132.180.67 (vger.kernel.org); spf=none smtp.mailfrom=stable-owner@vger.kernel.org smtp.helo=vger.kernel.org; x-aligned-from=fail; x-cm=none score=0; x-ptr=pass x-ptr-helo=vger.kernel.org x-ptr-lookup=vger.kernel.org; x-return-mx=pass smtp.domain=vger.kernel.org smtp.result=pass smtp_org.domain=kernel.org smtp_org.result=pass smtp_is_org_domain=no header.domain=linuxfoundation.org header.result=pass header_is_org_domain=yes; x-vs=clean score=0 state=0 X-ME-VSCategory: clean X-CM-Envelope: MS4wfL/ZCGceoZ2tqeukL7vJq882R9DbNtaX4UO7eOmAfQfRZAwFT54sy9B4Sgli2llkM9ZQEZUDmxq1S/JEdmhOkaT3oVH2DC5TrtfB1Pr8QMlCbdwZQZgH hDSrs475Grij+17SwKNwEVQxYI+zn67RFV3sZIWK9PPeGBOubqLunSJ8hmcNN9xMjHZQjk8VxhHMpY0ObmvQ3Klx1I8WwmSdbVZKH028tWxf4N0IrajrX5Lx X-CM-Analysis: v=2.3 cv=Tq3Iegfh c=1 sm=1 tr=0 a=UK1r566ZdBxH71SXbqIOeA==:117 a=UK1r566ZdBxH71SXbqIOeA==:17 a=ptgvbpQxxUAA:10 a=VUJBJC2UJ8kA:10 a=VwQbUJbxAAAA:8 a=ag1SF4gXAAAA:8 a=yPCof4ZbAAAA:8 a=zd2uoN0lAAAA:8 a=1XWaLZrsAAAA:8 a=cm27Pg_UAAAA:8 a=YEJRCRz9AAAA:8 a=pBOR-ozoAAAA:8 a=Z4Rwk6OoAAAA:8 a=SRrdq9N9AAAA:8 a=iox4zFpeAAAA:8 a=yMhMjlubAAAA:8 a=KKAkSRfTAAAA:8 a=QyXUC8HyAAAA:8 a=VnNF1IyMAAAA:8 a=pGLkceISAAAA:8 a=xjQjg--fAAAA:8 a=meVymXHHAAAA:8 a=MvuuwTCpAAAA:8 a=wMNdZWldAAAA:8 a=7CQSdrXTAAAA:8 a=20KFwNOVAAAA:8 a=J2zoVyZDAAAA:8 a=SkCQVwaT85xc1Xo6svsA:9 a=H-5dvzE59dzr-S90:21 a=BXfHnnpBqNbl0K_-:21 a=AjGcO6oz07-iQ99wixmX:22 a=Yupwre4RP9_Eg_Bd0iYG:22 a=xmb-EsYY8bH0VWELuYED:22 a=To4gpNYZFyF9PdtASVO2:22 a=HkZW87K1Qel5hWWM3VKY:22 a=WzC6qhA0u3u7Ye7llzcV:22 a=cvBusfyB2V15izCimMoJ:22 a=L4vkcYpMSA5nFlNZ2tk3:22 a=2JgSa4NbpEOStq-L5dxp:22 a=dVHiktpip_riXrfdqayU:22 a=FUarYpL4UH3yWsho8X8J:22 a=a-qgeE7W1pNrGK8U0ZQC:22 X-ME-CMScore: 0 X-ME-CMCategory: none Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752289AbeEUVOi (ORCPT ); Mon, 21 May 2018 17:14:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:58040 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751190AbeEUVOf (ORCPT ); Mon, 21 May 2018 17:14:35 -0400 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/87] 4.9.102-stable review Date: Mon, 21 May 2018 23:10:36 +0200 Message-Id: <20180521210420.222671977@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.102-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.102-rc1 X-KernelTest-Deadline: 2018-05-23T21:04+00:00 Sender: stable-owner@vger.kernel.org X-Mailing-List: stable@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-Mailing-List: linux-kernel@vger.kernel.org List-ID: This is the start of the stable review cycle for the 4.9.102 release. There are 87 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Tue May 22 21:03:57 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.102-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.102-rc1 Konrad Rzeszutek Wilk x86/bugs: Rename SSBD_NO to SSB_NO Tom Lendacky KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD Thomas Gleixner x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG Thomas Gleixner x86/bugs: Rework spec_ctrl base and mask logic Thomas Gleixner x86/bugs: Remove x86_spec_ctrl_set() Thomas Gleixner x86/bugs: Expose x86_spec_ctrl_base directly Borislav Petkov x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host} Thomas Gleixner x86/speculation: Rework speculative_store_bypass_update() Tom Lendacky x86/speculation: Add virtualized speculative store bypass disable support Thomas Gleixner x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL Thomas Gleixner x86/speculation: Handle HT correctly on AMD Thomas Gleixner x86/cpufeatures: Add FEATURE_ZEN Borislav Petkov x86/cpu/AMD: Fix erratum 1076 (CPB bit) Thomas Gleixner x86/cpufeatures: Disentangle SSBD enumeration Thomas Gleixner x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS Borislav Petkov x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP Thomas Gleixner KVM: SVM: Move spec control call after restore of GS Jim Mattson x86/cpu: Make alternative_msr_write work for 32-bit code Konrad Rzeszutek Wilk x86/bugs: Fix the parameters alignment and missing void Jiri Kosina x86/bugs: Make cpu_show_common() static Jiri Kosina x86/bugs: Fix __ssb_select_mitigation() return type Borislav Petkov Documentation/spec_ctrl: Do some minor cleanups Konrad Rzeszutek Wilk proc: Use underscores for SSBD in 'status' Konrad Rzeszutek Wilk x86/bugs: Rename _RDS to _SSBD Kees Cook x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass Thomas Gleixner seccomp: Move speculation migitation control to arch code Kees Cook seccomp: Add filter flag to opt-out of SSB mitigation Thomas Gleixner seccomp: Use PR_SPEC_FORCE_DISABLE Thomas Gleixner prctl: Add force disable speculation Kees Cook x86/bugs: Make boot modes __ro_after_init Kees Cook seccomp: Enable speculation flaw mitigations Kees Cook proc: Provide details on speculation flaw mitigations Kees Cook nospec: Allow getting/setting on non-current task Thomas Gleixner x86/speculation: Add prctl for Speculative Store Bypass mitigation Thomas Gleixner x86/process: Allow runtime control of Speculative Store Bypass Thomas Gleixner x86/process: Optimize TIF_NOTSC switch Kyle Huey x86/process: Correct and optimize TIF_BLOCKSTEP switch Kyle Huey x86/process: Optimize TIF checks in __switch_to_xtra() Thomas Gleixner prctl: Add speculation control prctls Thomas Gleixner x86/speculation: Create spec-ctrl.h to avoid include hell Konrad Rzeszutek Wilk x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest David Woodhouse x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested Konrad Rzeszutek Wilk x86/bugs: Whitelist allowed SPEC_CTRL MSR values Konrad Rzeszutek Wilk x86/bugs/intel: Set proper CPU features and setup RDS Konrad Rzeszutek Wilk x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation Konrad Rzeszutek Wilk x86/cpufeatures: Add X86_FEATURE_RDS Konrad Rzeszutek Wilk x86/bugs: Expose /sys/../spec_store_bypass Konrad Rzeszutek Wilk x86/bugs, KVM: Support the combination of guest and host IBRS Konrad Rzeszutek Wilk x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits Konrad Rzeszutek Wilk x86/bugs: Concentrate bug reporting into a separate function Konrad Rzeszutek Wilk x86/bugs: Concentrate bug detection into a separate function Linus Torvalds x86/nospec: Simplify alternative_msr_write() Liu Bo btrfs: fix reading stale metadata blocks after degraded raid1 mounts David Woodhouse x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under Xen Anand Jain btrfs: fix crash when trying to resume balance without the resume flag Filipe Manana Btrfs: fix xattr loss after power failure Masami Hiramatsu ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions Masami Hiramatsu ARM: 8770/1: kprobes: Prohibit probing on optimized_callback Masami Hiramatsu ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed Dexuan Cui tick/broadcast: Use for_each_cpu() specially on UP kernels Masami Hiramatsu ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr Ard Biesheuvel efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode Dave Hansen x86/pkeys: Do not special case protection key 0 Dave Hansen x86/pkeys: Override pkey when moving away from PROT_EXEC Martin Schwidefsky s390: remove indirect branch from do_softirq_own_stack Julian Wiedmann s390/qdio: don't release memory in qdio_setup_irq() Hendrik Brueckner s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero Julian Wiedmann s390/qdio: fix access to uninitialized qdio_q fields Pavel Tatashin mm: don't allow deferred pages with NEED_PER_CPU_KM Nicholas Piggin powerpc/powernv: Fix NVRAM sleep in invalid context when crashing Alexander Monakov i2c: designware: fix poll-after-enable regression Florian Westphal netfilter: nf_tables: can't fail after linking rule into active rule list Steven Rostedt (VMware) tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} Waiman Long signals: avoid unnecessary taking of sighand->siglock Benjamin Herrenschmidt powerpc: Don't preempt_disable() in show_cpuinfo() Andre Przywara KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock Kamal Dasu spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL Kamal Dasu spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master Andy Shevchenko spi: pxa2xx: Allow 64-bit DMA Wenwen Wang ALSA: control: fix a redundant-copy issue Hans de Goede ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist Federico Cuello ALSA: usb: mixer: volume quirk for CM102-A+/102S+ Shuah Khan (Samsung OSG) usbip: usbip_host: fix bad unlock balance during stub_probe() Shuah Khan (Samsung OSG) usbip: usbip_host: fix NULL-ptr deref and use-after-free errors Shuah Khan (Samsung OSG) usbip: usbip_host: run rebind from exit when module is removed Shuah Khan (Samsung OSG) usbip: usbip_host: delete device from busid_table after rebind Shuah Khan usbip: usbip_host: refine probe and disconnect debug msgs to be useful ------------- Diffstat: Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + Documentation/kernel-parameters.txt | 45 +++ Documentation/spec_ctrl.txt | 94 +++++ Makefile | 4 +- arch/arm/include/asm/assembler.h | 10 + arch/arm/include/asm/kvm_mmu.h | 16 + arch/arm/kernel/traps.c | 5 +- arch/arm/lib/getuser.S | 10 + arch/arm/probes/kprobes/opt-arm.c | 4 +- arch/arm64/include/asm/kvm_mmu.h | 16 + arch/powerpc/kernel/setup-common.c | 11 - arch/powerpc/platforms/powernv/opal-nvram.c | 14 +- arch/s390/kernel/irq.c | 5 +- arch/s390/kernel/perf_cpum_sf.c | 4 + arch/x86/boot/compressed/eboot.c | 6 +- arch/x86/include/asm/cpufeatures.h | 20 +- arch/x86/include/asm/kvm_host.h | 2 +- arch/x86/include/asm/mmu_context.h | 2 +- arch/x86/include/asm/msr-index.h | 10 + arch/x86/include/asm/nospec-branch.h | 43 ++- arch/x86/include/asm/pkeys.h | 18 +- arch/x86/include/asm/spec-ctrl.h | 80 +++++ arch/x86/include/asm/thread_info.h | 6 +- arch/x86/include/asm/tlbflush.h | 10 + arch/x86/kernel/cpu/amd.c | 38 +- arch/x86/kernel/cpu/bugs.c | 397 ++++++++++++++++++++- arch/x86/kernel/cpu/common.c | 77 +++- arch/x86/kernel/cpu/cpu.h | 3 + arch/x86/kernel/cpu/intel.c | 3 + arch/x86/kernel/process.c | 224 +++++++++--- arch/x86/kernel/smpboot.c | 5 + arch/x86/kvm/cpuid.c | 21 +- arch/x86/kvm/cpuid.h | 17 +- arch/x86/kvm/svm.c | 64 ++-- arch/x86/kvm/vmx.c | 33 +- arch/x86/kvm/x86.c | 13 +- arch/x86/mm/pkeys.c | 21 +- arch/x86/xen/enlighten.c | 4 +- arch/x86/xen/mmu.c | 4 - drivers/base/cpu.c | 8 + drivers/i2c/busses/i2c-designware-core.c | 5 +- drivers/s390/cio/qdio_setup.c | 12 +- drivers/spi/spi-bcm-qspi.c | 28 +- drivers/spi/spi-pxa2xx.h | 2 +- drivers/usb/usbip/stub.h | 2 + drivers/usb/usbip/stub_dev.c | 43 ++- drivers/usb/usbip/stub_main.c | 105 +++++- fs/btrfs/ctree.c | 6 +- fs/btrfs/tree-log.c | 7 + fs/btrfs/volumes.c | 9 + fs/proc/array.c | 27 +- include/linux/cpu.h | 2 + include/linux/efi.h | 8 +- include/linux/nospec.h | 10 + include/linux/sched.h | 9 + include/linux/seccomp.h | 3 +- include/linux/signal.h | 17 + include/trace/events/xen.h | 16 - include/uapi/linux/prctl.h | 12 + include/uapi/linux/seccomp.h | 4 +- kernel/seccomp.c | 21 +- kernel/signal.c | 7 + kernel/sys.c | 23 ++ kernel/time/tick-broadcast.c | 8 + mm/Kconfig | 1 + net/netfilter/nf_tables_api.c | 59 +-- sound/core/control_compat.c | 3 +- sound/pci/hda/hda_intel.c | 2 + sound/usb/mixer.c | 8 + tools/testing/selftests/seccomp/seccomp_bpf.c | 78 +++- virt/kvm/arm/vgic/vgic-its.c | 15 +- 71 files changed, 1611 insertions(+), 309 deletions(-)