linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org, akpm@linux-foundation.org,
	torvalds@linux-foundation.org, stable@vger.kernel.org
Cc: lwn@lwn.net, jslaby@suse.cz,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Subject: Linux 6.1.44
Date: Tue,  8 Aug 2023 20:57:35 +0200	[thread overview]
Message-ID: <2023080822-repost-unfiled-2f01@gregkh> (raw)


-----------------
Note, PLEASE TEST this kernel if you are on the 6.1.y tree before using
it in a real workload.  This was a quick release due to the obvious
security fixes in it, and as such, it has not had very much testing "in
the wild".  Please let us know of any problems seen.  Also note that the
user/kernel api for the new security mitigations might be changing over
time, so do not get used to them being fixed in stone just yet.
-----------------

I'm announcing the release of the 6.1.44 kernel.

All users of the 6.1 kernel series must upgrade.

The updated 6.1.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-6.1.y
and can be browsed at the normal kernel.org git web browser:
	https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Documentation/ABI/testing/sysfs-devices-system-cpu         |   13 
 Documentation/admin-guide/hw-vuln/gather_data_sampling.rst |  109 +++
 Documentation/admin-guide/hw-vuln/index.rst                |    2 
 Documentation/admin-guide/hw-vuln/srso.rst                 |  133 ++++
 Documentation/admin-guide/kernel-parameters.txt            |   58 +
 Makefile                                                   |    2 
 arch/Kconfig                                               |    3 
 arch/alpha/include/asm/bugs.h                              |   20 
 arch/arm/Kconfig                                           |    1 
 arch/arm/include/asm/bugs.h                                |    4 
 arch/arm/kernel/bugs.c                                     |    3 
 arch/ia64/Kconfig                                          |    1 
 arch/ia64/include/asm/bugs.h                               |   20 
 arch/ia64/kernel/setup.c                                   |    3 
 arch/loongarch/Kconfig                                     |    1 
 arch/loongarch/kernel/setup.c                              |    6 
 arch/m68k/Kconfig                                          |    1 
 arch/m68k/include/asm/bugs.h                               |   21 
 arch/m68k/kernel/setup_mm.c                                |    3 
 arch/mips/Kconfig                                          |    1 
 arch/mips/include/asm/bugs.h                               |   17 
 arch/mips/kernel/setup.c                                   |   13 
 arch/parisc/include/asm/bugs.h                             |   20 
 arch/powerpc/include/asm/bugs.h                            |   15 
 arch/sh/Kconfig                                            |    1 
 arch/sh/include/asm/bugs.h                                 |   74 --
 arch/sh/include/asm/processor.h                            |    2 
 arch/sh/kernel/idle.c                                      |    1 
 arch/sh/kernel/setup.c                                     |   55 +
 arch/sparc/Kconfig                                         |    1 
 arch/sparc/include/asm/bugs.h                              |   18 
 arch/sparc/kernel/setup_32.c                               |    7 
 arch/um/Kconfig                                            |    1 
 arch/um/include/asm/bugs.h                                 |    7 
 arch/um/kernel/um_arch.c                                   |    3 
 arch/x86/Kconfig                                           |   27 
 arch/x86/include/asm/bugs.h                                |    2 
 arch/x86/include/asm/cpufeature.h                          |    7 
 arch/x86/include/asm/cpufeatures.h                         |   15 
 arch/x86/include/asm/disabled-features.h                   |    3 
 arch/x86/include/asm/fpu/api.h                             |    2 
 arch/x86/include/asm/mem_encrypt.h                         |    9 
 arch/x86/include/asm/msr-index.h                           |   12 
 arch/x86/include/asm/nospec-branch.h                       |   18 
 arch/x86/include/asm/processor.h                           |    2 
 arch/x86/include/asm/required-features.h                   |    3 
 arch/x86/include/asm/sigframe.h                            |    2 
 arch/x86/kernel/cpu/amd.c                                  |   19 
 arch/x86/kernel/cpu/bugs.c                                 |  388 +++++++++++--
 arch/x86/kernel/cpu/common.c                               |  126 +++-
 arch/x86/kernel/cpu/cpu.h                                  |    2 
 arch/x86/kernel/fpu/init.c                                 |    8 
 arch/x86/kernel/signal.c                                   |    4 
 arch/x86/kernel/vmlinux.lds.S                              |   32 +
 arch/x86/kvm/cpuid.c                                       |    3 
 arch/x86/kvm/reverse_cpuid.h                               |    1 
 arch/x86/kvm/svm/svm.c                                     |    4 
 arch/x86/kvm/svm/vmenter.S                                 |    3 
 arch/x86/kvm/x86.c                                         |    7 
 arch/x86/lib/retpoline.S                                   |   83 ++
 arch/x86/mm/init.c                                         |    6 
 arch/x86/xen/smp_pv.c                                      |    1 
 arch/xtensa/include/asm/bugs.h                             |   18 
 drivers/base/cpu.c                                         |   16 
 drivers/net/xen-netback/netback.c                          |   15 
 include/asm-generic/bugs.h                                 |   11 
 include/linux/cpu.h                                        |    8 
 include/linux/sched/task.h                                 |    2 
 init/main.c                                                |   21 
 kernel/fork.c                                              |   37 -
 tools/arch/x86/include/asm/cpufeatures.h                   |    2 
 tools/objtool/arch/x86/decode.c                            |    5 
 72 files changed, 1152 insertions(+), 412 deletions(-)

Borislav Petkov (AMD) (8):
      x86/bugs: Increase the x86 bugs vector size to two u32s
      x86/srso: Add a Speculative RAS Overflow mitigation
      x86/srso: Add IBPB_BRTYPE support
      x86/srso: Add SRSO_NO support
      x86/srso: Add IBPB
      x86/srso: Add IBPB on VMEXIT
      x86/srso: Add a forgotten NOENDBR annotation
      x86/srso: Tie SBPB bit setting to microcode patch detection

Daniel Sneddon (4):
      x86/speculation: Add Gather Data Sampling mitigation
      x86/speculation: Add force option to GDS mitigation
      x86/speculation: Add Kconfig option for GDS
      KVM: Add GDS_NO support to KVM

Dave Hansen (1):
      Documentation/x86: Fix backwards on/off logic about YMM support

Greg Kroah-Hartman (2):
      x86: fix backwards merge of GDS/SRSO bit
      Linux 6.1.44

Josh Poimboeuf (1):
      x86/srso: Fix return thunks in generated code

Juergen Gross (2):
      x86/xen: Fix secondary processors' FPU initialization
      x86/mm: fix poking_init() for Xen PV guests

Kim Phillips (1):
      x86/cpu, kvm: Add support for CPUID_80000021_EAX

Peter Zijlstra (3):
      x86/mm: Use mm_alloc() in poking_init()
      mm: Move mm_cachep initialization to mm_init()
      x86/mm: Initialize text poking earlier

Ross Lagerwall (1):
      xen/netback: Fix buffer overrun triggered by unusual packet

Thomas Gleixner (18):
      init: Provide arch_cpu_finalize_init()
      x86/cpu: Switch to arch_cpu_finalize_init()
      ARM: cpu: Switch to arch_cpu_finalize_init()
      ia64/cpu: Switch to arch_cpu_finalize_init()
      loongarch/cpu: Switch to arch_cpu_finalize_init()
      m68k/cpu: Switch to arch_cpu_finalize_init()
      mips/cpu: Switch to arch_cpu_finalize_init()
      sh/cpu: Switch to arch_cpu_finalize_init()
      sparc/cpu: Switch to arch_cpu_finalize_init()
      um/cpu: Switch to arch_cpu_finalize_init()
      init: Remove check_bugs() leftovers
      init: Invoke arch_cpu_finalize_init() earlier
      init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
      x86/init: Initialize signal frame size late
      x86/fpu: Remove cpuinfo argument from init functions
      x86/fpu: Mark init functions __init
      x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
      x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build


             reply	other threads:[~2023-08-08 19:31 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-08-08 18:57 Greg Kroah-Hartman [this message]
2023-08-08 18:57 ` Linux 6.1.44 Greg Kroah-Hartman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2023080822-repost-unfiled-2f01@gregkh \
    --to=gregkh@linuxfoundation.org \
    --cc=akpm@linux-foundation.org \
    --cc=jslaby@suse.cz \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lwn@lwn.net \
    --cc=stable@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).