All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	stable@vger.kernel.org, torvalds@linux-foundation.org,
	akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org,
	patches@kernelci.org, lkft-triage@lists.linaro.org,
	pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com,
	sudipm.mukherjee@gmail.com, slade@sladewatkins.com
Subject: [PATCH 5.10 000/148] 5.10.133-rc1 review
Date: Sat, 23 Jul 2022 11:53:32 +0200	[thread overview]
Message-ID: <20220723095224.302504400@linuxfoundation.org> (raw)

This is the start of the stable review cycle for the 5.10.133 release.
There are 148 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Mon, 25 Jul 2022 09:50:18 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.133-rc1.gz
or in the git tree and branch at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Linux 5.10.133-rc1

Arnaldo Carvalho de Melo <acme@redhat.com>
    tools headers: Remove broken definition of __LITTLE_ENDIAN

Arnaldo Carvalho de Melo <acme@redhat.com>
    tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in 'perf bench mem memcpy' - again

Vasily Gorbik <gor@linux.ibm.com>
    objtool: Fix elf_create_undef_symbol() endianness

Linus Torvalds <torvalds@linux-foundation.org>
    kvm: fix objtool relocation warning

Peter Zijlstra <peterz@infradead.org>
    x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds

Peter Zijlstra <peterz@infradead.org>
    um: Add missing apply_returns()

Kim Phillips <kim.phillips@amd.com>
    x86/bugs: Remove apostrophe typo

Arnaldo Carvalho de Melo <acme@redhat.com>
    tools headers cpufeatures: Sync with the kernel sources

Arnaldo Carvalho de Melo <acme@redhat.com>
    tools arch x86: Sync the msr-index.h copy with the kernel sources

Paolo Bonzini <pbonzini@redhat.com>
    KVM: emulate: do not adjust size of fastop and setcc subroutines

Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
    x86/kvm: fix FASTOP_SIZE when return thunks are enabled

Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
    efi/x86: use naked RET on mixed mode call wrapper

Nathan Chancellor <nathan@kernel.org>
    x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current

Jiri Slaby <jirislaby@kernel.org>
    x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit

Josh Poimboeuf <jpoimboe@redhat.com>
    x86/ftrace: Add UNWIND_HINT_FUNC annotation for ftrace_stub

Ben Hutchings <ben@decadent.org.uk>
    x86/xen: Fix initialisation in hypercall_page after rethunk

Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    x86, kvm: use proper ASM macros for kvm_vcpu_is_preempted

Borislav Petkov <bp@suse.de>
    tools/insn: Restore the relative include paths for cross building

Thomas Gleixner <tglx@linutronix.de>
    x86/static_call: Serialize __static_call_fixup() properly

Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
    x86/speculation: Disable RRSBA behavior

Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
    x86/kexec: Disable RET on kexec

Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
    x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported

Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
    x86/bugs: Add Cannon lake to RETBleed affected CPU list

Peter Zijlstra <peterz@infradead.org>
    x86/retbleed: Add fine grained Kconfig knobs

Andrew Cooper <andrew.cooper3@citrix.com>
    x86/cpu/amd: Enumerate BTC_NO

Peter Zijlstra <peterz@infradead.org>
    x86/common: Stamp out the stepping madness

Josh Poimboeuf <jpoimboe@kernel.org>
    x86/speculation: Fill RSB on vmexit for IBRS

Josh Poimboeuf <jpoimboe@kernel.org>
    KVM: VMX: Fix IBRS handling after vmexit

Josh Poimboeuf <jpoimboe@kernel.org>
    KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS

Josh Poimboeuf <jpoimboe@kernel.org>
    KVM: VMX: Convert launched argument to flags

Josh Poimboeuf <jpoimboe@kernel.org>
    KVM: VMX: Flatten __vmx_vcpu_run()

Josh Poimboeuf <jpoimboe@kernel.org>
    objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}

Josh Poimboeuf <jpoimboe@kernel.org>
    x86/speculation: Remove x86_spec_ctrl_mask

Josh Poimboeuf <jpoimboe@kernel.org>
    x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit

Josh Poimboeuf <jpoimboe@kernel.org>
    x86/speculation: Fix SPEC_CTRL write on SMT state change

Josh Poimboeuf <jpoimboe@kernel.org>
    x86/speculation: Fix firmware entry SPEC_CTRL handling

Josh Poimboeuf <jpoimboe@kernel.org>
    x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n

Peter Zijlstra <peterz@infradead.org>
    x86/cpu/amd: Add Spectral Chicken

Peter Zijlstra <peterz@infradead.org>
    objtool: Add entry UNRET validation

Josh Poimboeuf <jpoimboe@kernel.org>
    x86/bugs: Do IBPB fallback check only once

Peter Zijlstra <peterz@infradead.org>
    x86/bugs: Add retbleed=ibpb

Peter Zijlstra <peterz@infradead.org>
    x86/xen: Rename SYS* entry points

Peter Zijlstra <peterz@infradead.org>
    objtool: Update Retpoline validation

Peter Zijlstra <peterz@infradead.org>
    intel_idle: Disable IBRS during long idle

Peter Zijlstra <peterz@infradead.org>
    x86/bugs: Report Intel retbleed vulnerability

Peter Zijlstra <peterz@infradead.org>
    x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()

Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
    x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS

Peter Zijlstra <peterz@infradead.org>
    x86/bugs: Optimize SPEC_CTRL MSR writes

Peter Zijlstra <peterz@infradead.org>
    x86/entry: Add kernel IBRS implementation

Peter Zijlstra <peterz@infradead.org>
    x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value

Kim Phillips <kim.phillips@amd.com>
    x86/bugs: Enable STIBP for JMP2RET

Alexandre Chartre <alexandre.chartre@oracle.com>
    x86/bugs: Add AMD retbleed= boot parameter

Alexandre Chartre <alexandre.chartre@oracle.com>
    x86/bugs: Report AMD retbleed vulnerability

Peter Zijlstra <peterz@infradead.org>
    x86: Add magic AMD return-thunk

Peter Zijlstra <peterz@infradead.org>
    objtool: Treat .text.__x86.* as noinstr

Peter Zijlstra <peterz@infradead.org>
    x86: Use return-thunk in asm code

Kim Phillips <kim.phillips@amd.com>
    x86/sev: Avoid using __x86_return_thunk

Peter Zijlstra <peterz@infradead.org>
    x86/vsyscall_emu/64: Don't use RET in vsyscall emulation

Peter Zijlstra <peterz@infradead.org>
    x86/kvm: Fix SETcc emulation for return thunks

Peter Zijlstra <peterz@infradead.org>
    x86/bpf: Use alternative RET encoding

Peter Zijlstra <peterz@infradead.org>
    x86/ftrace: Use alternative RET encoding

Peter Zijlstra <peterz@infradead.org>
    x86,static_call: Use alternative RET encoding

Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
    objtool: skip non-text sections when adding return-thunk sites

Peter Zijlstra <peterz@infradead.org>
    x86,objtool: Create .return_sites

Peter Zijlstra <peterz@infradead.org>
    x86: Undo return-thunk damage

Peter Zijlstra <peterz@infradead.org>
    x86/retpoline: Use -mfunction-return

Ben Hutchings <ben@decadent.org.uk>
    Makefile: Set retpoline cflags based on CONFIG_CC_IS_{CLANG,GCC}

Peter Zijlstra <peterz@infradead.org>
    x86/retpoline: Swizzle retpoline thunk

Peter Zijlstra <peterz@infradead.org>
    x86/retpoline: Cleanup some #ifdefery

Peter Zijlstra <peterz@infradead.org>
    x86/cpufeatures: Move RETPOLINE flags to word 11

Peter Zijlstra <peterz@infradead.org>
    x86/kvm/vmx: Make noinstr clean

Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
    x86/realmode: build with -D__DISABLE_EXPORTS

Mikulas Patocka <mpatocka@redhat.com>
    objtool: Fix objtool regression on x32 systems

Peter Zijlstra <peterz@infradead.org>
    x86/entry: Remove skip_r11rcx

Peter Zijlstra <peterz@infradead.org>
    objtool: Fix symbol creation

Peter Zijlstra <peterz@infradead.org>
    objtool: Fix type of reloc::addend

Peter Zijlstra <peterz@infradead.org>
    objtool: Fix code relocs vs weak symbols

Peter Zijlstra <peterz@infradead.org>
    objtool: Fix SLS validation for kcov tail-call replacement

Peter Zijlstra <peterz@infradead.org>
    crypto: x86/poly1305 - Fixup SLS

Peter Zijlstra <peterz@infradead.org>
    objtool: Default ignore INT3 for unreachable

Borislav Petkov <bp@suse.de>
    kvm/emulate: Fix SETcc emulation function offsets with SLS

Arnaldo Carvalho de Melo <acme@redhat.com>
    tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in 'perf bench mem memcpy'

Peter Zijlstra <peterz@infradead.org>
    x86: Add straight-line-speculation mitigation

Peter Zijlstra <peterz@infradead.org>
    objtool: Add straight-line-speculation validation

Peter Zijlstra <peterz@infradead.org>
    x86/alternative: Relax text_poke_bp() constraint

Peter Zijlstra <peterz@infradead.org>
    x86: Prepare inline-asm for straight-line-speculation

Peter Zijlstra <peterz@infradead.org>
    x86: Prepare asm files for straight-line-speculation

Peter Zijlstra <peterz@infradead.org>
    x86/lib/atomic64_386_32: Rename things

Peter Zijlstra <peterz@infradead.org>
    bpf,x86: Respect X86_FEATURE_RETPOLINE*

Peter Zijlstra <peterz@infradead.org>
    bpf,x86: Simplify computing label offsets

Peter Zijlstra <peterz@infradead.org>
    x86/alternative: Add debug prints to apply_retpolines()

Peter Zijlstra <peterz@infradead.org>
    x86/alternative: Try inline spectre_v2=retpoline,amd

Peter Zijlstra <peterz@infradead.org>
    x86/alternative: Handle Jcc __x86_indirect_thunk_\reg

Peter Zijlstra <peterz@infradead.org>
    x86/alternative: Implement .retpoline_sites support

Peter Zijlstra <peterz@infradead.org>
    x86/retpoline: Create a retpoline thunk array

Peter Zijlstra <peterz@infradead.org>
    x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h

Peter Zijlstra <peterz@infradead.org>
    x86/asm: Fixup odd GEN-for-each-reg.h usage

Peter Zijlstra <peterz@infradead.org>
    x86/asm: Fix register order

Peter Zijlstra <peterz@infradead.org>
    x86/retpoline: Remove unused replacement symbols

Peter Zijlstra <peterz@infradead.org>
    objtool,x86: Replace alternatives with .retpoline_sites

Peter Zijlstra <peterz@infradead.org>
    objtool: Explicitly avoid self modifying code in .altinstr_replacement

Peter Zijlstra <peterz@infradead.org>
    objtool: Classify symbols

Peter Zijlstra <peterz@infradead.org>
    objtool: Handle __sanitize_cov*() tail calls

Peter Zijlstra <peterz@infradead.org>
    objtool: Introduce CFI hash

Joe Lawrence <joe.lawrence@redhat.com>
    objtool: Make .altinstructions section entry size consistent

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Remove reloc symbol type checks in get_alt_entry()

Linus Torvalds <torvalds@linux-foundation.org>
    objtool: print out the symbol type when complaining about it

Peter Zijlstra <peterz@infradead.org>
    objtool: Teach get_alt_entry() about more relocation types

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Don't make .altinstructions writable

Peter Zijlstra <peterz@infradead.org>
    objtool/x86: Ignore __x86_indirect_alt_* symbols

Peter Zijlstra <peterz@infradead.org>
    objtool: Only rewrite unconditional retpoline thunk calls

Peter Zijlstra <peterz@infradead.org>
    objtool: Fix .symtab_shndx handling for elf_create_undef_symbol()

Borislav Petkov <bp@suse.de>
    x86/alternative: Optimize single-byte NOPs at an arbitrary position

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Support asm jump tables

Peter Zijlstra <peterz@infradead.org>
    objtool/x86: Rewrite retpoline thunk calls

Peter Zijlstra <peterz@infradead.org>
    objtool: Skip magical retpoline .altinstr_replacement

Peter Zijlstra <peterz@infradead.org>
    objtool: Cache instruction relocs

Peter Zijlstra <peterz@infradead.org>
    objtool: Keep track of retpoline call sites

Peter Zijlstra <peterz@infradead.org>
    objtool: Add elf_create_undef_symbol()

Peter Zijlstra <peterz@infradead.org>
    objtool: Extract elf_symbol_add()

Peter Zijlstra <peterz@infradead.org>
    objtool: Extract elf_strtab_concat()

Peter Zijlstra <peterz@infradead.org>
    objtool: Create reloc sections implicitly

Peter Zijlstra <peterz@infradead.org>
    objtool: Add elf_create_reloc() helper

Peter Zijlstra <peterz@infradead.org>
    objtool: Rework the elf_rebuild_reloc_section() logic

Peter Zijlstra <peterz@infradead.org>
    objtool: Handle per arch retpoline naming

Peter Zijlstra <peterz@infradead.org>
    objtool: Correctly handle retpoline thunk calls

Peter Zijlstra <peterz@infradead.org>
    x86/retpoline: Simplify retpolines

Peter Zijlstra <peterz@infradead.org>
    x86/alternatives: Optimize optimize_nops()

Ben Hutchings <ben@decadent.org.uk>
    x86: Add insn_decode_kernel()

Borislav Petkov <bp@suse.de>
    x86/alternative: Use insn_decode()

Borislav Petkov <bp@suse.de>
    x86/insn-eval: Handle return values from the decoder

Borislav Petkov <bp@suse.de>
    x86/insn: Add an insn_decode() API

Borislav Petkov <bp@suse.de>
    x86/insn: Add a __ignore_sync_check__ marker

Borislav Petkov <bp@suse.de>
    x86/insn: Rename insn_decode() to insn_decode_from_regs()

Juergen Gross <jgross@suse.com>
    x86/alternative: Use ALTERNATIVE_TERNARY() in _static_cpu_has()

Juergen Gross <jgross@suse.com>
    x86/alternative: Support ALTERNATIVE_TERNARY

Juergen Gross <jgross@suse.com>
    x86/alternative: Support not-feature

Juergen Gross <jgross@suse.com>
    x86/alternative: Merge include files

Josh Poimboeuf <jpoimboe@redhat.com>
    x86/xen: Support objtool vmlinux.o validation in xen-head.S

Josh Poimboeuf <jpoimboe@redhat.com>
    x86/xen: Support objtool validation in xen-asm.S

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Combine UNWIND_HINT_RET_OFFSET and UNWIND_HINT_FUNC

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Assume only ELF functions do sibling calls

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Support retpoline jump detection for vmlinux.o

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Support stack layout changes in alternatives

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Add 'alt_group' struct

Josh Poimboeuf <jpoimboe@redhat.com>
    objtool: Refactor ORC section generation

Uros Bizjak <ubizjak@gmail.com>
    KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw

Uros Bizjak <ubizjak@gmail.com>
    KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S


-------------

Diffstat:

 Documentation/admin-guide/kernel-parameters.txt    |   25 +
 Makefile                                           |   25 +-
 arch/um/kernel/um_arch.c                           |    8 +
 arch/x86/Kconfig                                   |   91 +-
 arch/x86/Makefile                                  |    8 +-
 arch/x86/boot/compressed/efi_thunk_64.S            |    2 +-
 arch/x86/boot/compressed/head_64.S                 |    4 +-
 arch/x86/boot/compressed/mem_encrypt.S             |    4 +-
 arch/x86/crypto/aegis128-aesni-asm.S               |   48 +-
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S            |    2 +-
 arch/x86/crypto/aesni-intel_asm.S                  |   52 +-
 arch/x86/crypto/aesni-intel_avx-x86_64.S           |   40 +-
 arch/x86/crypto/blake2s-core.S                     |    4 +-
 arch/x86/crypto/blowfish-x86_64-asm_64.S           |   12 +-
 arch/x86/crypto/camellia-aesni-avx-asm_64.S        |   18 +-
 arch/x86/crypto/camellia-aesni-avx2-asm_64.S       |   18 +-
 arch/x86/crypto/camellia-x86_64-asm_64.S           |   12 +-
 arch/x86/crypto/cast5-avx-x86_64-asm_64.S          |   12 +-
 arch/x86/crypto/cast6-avx-x86_64-asm_64.S          |   16 +-
 arch/x86/crypto/chacha-avx2-x86_64.S               |    6 +-
 arch/x86/crypto/chacha-avx512vl-x86_64.S           |    6 +-
 arch/x86/crypto/chacha-ssse3-x86_64.S              |    8 +-
 arch/x86/crypto/crc32-pclmul_asm.S                 |    2 +-
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |    2 +-
 arch/x86/crypto/crct10dif-pcl-asm_64.S             |    2 +-
 arch/x86/crypto/des3_ede-asm_64.S                  |    4 +-
 arch/x86/crypto/ghash-clmulni-intel_asm.S          |    6 +-
 arch/x86/crypto/nh-avx2-x86_64.S                   |    2 +-
 arch/x86/crypto/nh-sse2-x86_64.S                   |    2 +-
 arch/x86/crypto/poly1305-x86_64-cryptogams.pl      |   38 +-
 arch/x86/crypto/serpent-avx-x86_64-asm_64.S        |   16 +-
 arch/x86/crypto/serpent-avx2-asm_64.S              |   16 +-
 arch/x86/crypto/serpent-sse2-i586-asm_32.S         |    6 +-
 arch/x86/crypto/serpent-sse2-x86_64-asm_64.S       |    6 +-
 arch/x86/crypto/sha1_avx2_x86_64_asm.S             |    2 +-
 arch/x86/crypto/sha1_ni_asm.S                      |    2 +-
 arch/x86/crypto/sha1_ssse3_asm.S                   |    2 +-
 arch/x86/crypto/sha256-avx-asm.S                   |    2 +-
 arch/x86/crypto/sha256-avx2-asm.S                  |    2 +-
 arch/x86/crypto/sha256-ssse3-asm.S                 |    2 +-
 arch/x86/crypto/sha256_ni_asm.S                    |    2 +-
 arch/x86/crypto/sha512-avx-asm.S                   |    2 +-
 arch/x86/crypto/sha512-avx2-asm.S                  |    2 +-
 arch/x86/crypto/sha512-ssse3-asm.S                 |    2 +-
 arch/x86/crypto/twofish-avx-x86_64-asm_64.S        |   16 +-
 arch/x86/crypto/twofish-i586-asm_32.S              |    4 +-
 arch/x86/crypto/twofish-x86_64-asm_64-3way.S       |    6 +-
 arch/x86/crypto/twofish-x86_64-asm_64.S            |    4 +-
 arch/x86/entry/Makefile                            |    2 +-
 arch/x86/entry/calling.h                           |   72 +-
 arch/x86/entry/entry.S                             |   22 +
 arch/x86/entry/entry_32.S                          |    6 +-
 arch/x86/entry/entry_64.S                          |   62 +-
 arch/x86/entry/entry_64_compat.S                   |   21 +-
 arch/x86/entry/thunk_32.S                          |    2 +-
 arch/x86/entry/thunk_64.S                          |    2 +-
 arch/x86/entry/vdso/Makefile                       |    1 +
 arch/x86/entry/vdso/vdso32/system_call.S           |    4 +-
 arch/x86/entry/vsyscall/vsyscall_emu_64.S          |    3 +
 arch/x86/include/asm/GEN-for-each-reg.h            |   14 +-
 arch/x86/include/asm/alternative-asm.h             |  114 --
 arch/x86/include/asm/alternative.h                 |  137 ++-
 arch/x86/include/asm/asm-prototypes.h              |   17 -
 arch/x86/include/asm/cpufeature.h                  |   41 +-
 arch/x86/include/asm/cpufeatures.h                 |   14 +-
 arch/x86/include/asm/disabled-features.h           |   21 +-
 arch/x86/include/asm/inat.h                        |    2 +-
 arch/x86/include/asm/insn-eval.h                   |    4 +-
 arch/x86/include/asm/insn.h                        |   28 +-
 arch/x86/include/asm/linkage.h                     |   22 +
 arch/x86/include/asm/msr-index.h                   |   13 +
 arch/x86/include/asm/nospec-branch.h               |  141 +--
 arch/x86/include/asm/paravirt.h                    |    2 +-
 arch/x86/include/asm/qspinlock_paravirt.h          |    4 +-
 arch/x86/include/asm/smap.h                        |    5 +-
 arch/x86/include/asm/static_call.h                 |   19 +-
 arch/x86/include/asm/unwind_hints.h                |   23 +-
 arch/x86/kernel/acpi/wakeup_32.S                   |    6 +-
 arch/x86/kernel/alternative.c                      |  406 ++++++-
 arch/x86/kernel/cpu/amd.c                          |   46 +-
 arch/x86/kernel/cpu/bugs.c                         |  475 ++++++--
 arch/x86/kernel/cpu/common.c                       |   61 +-
 arch/x86/kernel/cpu/cpu.h                          |    2 +
 arch/x86/kernel/cpu/hygon.c                        |    6 +
 arch/x86/kernel/cpu/scattered.c                    |    1 +
 arch/x86/kernel/ftrace.c                           |    7 +-
 arch/x86/kernel/ftrace_32.S                        |    6 +-
 arch/x86/kernel/ftrace_64.S                        |   13 +-
 arch/x86/kernel/head_32.S                          |    3 +-
 arch/x86/kernel/head_64.S                          |    5 +
 arch/x86/kernel/irqflags.S                         |    4 +-
 arch/x86/kernel/kprobes/core.c                     |    2 +-
 arch/x86/kernel/kvm.c                              |    2 +-
 arch/x86/kernel/module.c                           |   15 +-
 arch/x86/kernel/paravirt.c                         |    2 +-
 arch/x86/kernel/process.c                          |    2 +-
 arch/x86/kernel/relocate_kernel_32.S               |   15 +-
 arch/x86/kernel/relocate_kernel_64.S               |   13 +-
 arch/x86/kernel/sev-es.c                           |    2 +-
 arch/x86/kernel/sev_verify_cbit.S                  |    2 +-
 arch/x86/kernel/static_call.c                      |   52 +-
 arch/x86/kernel/umip.c                             |    2 +-
 arch/x86/kernel/verify_cpu.S                       |    4 +-
 arch/x86/kernel/vmlinux.lds.S                      |   23 +-
 arch/x86/kvm/emulate.c                             |   39 +-
 arch/x86/kvm/svm/vmenter.S                         |   11 +-
 arch/x86/kvm/vmx/nested.c                          |   32 +-
 arch/x86/kvm/vmx/run_flags.h                       |    8 +
 arch/x86/kvm/vmx/vmenter.S                         |  170 +--
 arch/x86/kvm/vmx/vmx.c                             |   78 +-
 arch/x86/kvm/vmx/vmx.h                             |    5 +
 arch/x86/kvm/x86.c                                 |    4 +-
 arch/x86/lib/atomic64_386_32.S                     |   88 +-
 arch/x86/lib/atomic64_cx8_32.S                     |   18 +-
 arch/x86/lib/checksum_32.S                         |    8 +-
 arch/x86/lib/clear_page_64.S                       |    6 +-
 arch/x86/lib/cmpxchg16b_emu.S                      |    4 +-
 arch/x86/lib/cmpxchg8b_emu.S                       |    4 +-
 arch/x86/lib/copy_mc_64.S                          |    6 +-
 arch/x86/lib/copy_page_64.S                        |    6 +-
 arch/x86/lib/copy_user_64.S                        |   14 +-
 arch/x86/lib/csum-copy_64.S                        |    2 +-
 arch/x86/lib/error-inject.c                        |    3 +-
 arch/x86/lib/getuser.S                             |   22 +-
 arch/x86/lib/hweight.S                             |    6 +-
 arch/x86/lib/inat.c                                |    2 +-
 arch/x86/lib/insn-eval.c                           |   40 +-
 arch/x86/lib/insn.c                                |  222 +++-
 arch/x86/lib/iomap_copy_64.S                       |    2 +-
 arch/x86/lib/memcpy_64.S                           |   14 +-
 arch/x86/lib/memmove_64.S                          |   11 +-
 arch/x86/lib/memset_64.S                           |    8 +-
 arch/x86/lib/msr-reg.S                             |    4 +-
 arch/x86/lib/putuser.S                             |    6 +-
 arch/x86/lib/retpoline.S                           |  118 +-
 arch/x86/math-emu/div_Xsig.S                       |    2 +-
 arch/x86/math-emu/div_small.S                      |    2 +-
 arch/x86/math-emu/mul_Xsig.S                       |    6 +-
 arch/x86/math-emu/polynom_Xsig.S                   |    2 +-
 arch/x86/math-emu/reg_norm.S                       |    6 +-
 arch/x86/math-emu/reg_round.S                      |    2 +-
 arch/x86/math-emu/reg_u_add.S                      |    2 +-
 arch/x86/math-emu/reg_u_div.S                      |    2 +-
 arch/x86/math-emu/reg_u_mul.S                      |    2 +-
 arch/x86/math-emu/reg_u_sub.S                      |    2 +-
 arch/x86/math-emu/round_Xsig.S                     |    4 +-
 arch/x86/math-emu/shr_Xsig.S                       |    8 +-
 arch/x86/math-emu/wm_shrx.S                        |   16 +-
 arch/x86/mm/mem_encrypt_boot.S                     |    6 +
 arch/x86/net/bpf_jit_comp.c                        |  185 ++--
 arch/x86/net/bpf_jit_comp32.c                      |   22 +-
 arch/x86/platform/efi/efi_stub_32.S                |    2 +-
 arch/x86/platform/efi/efi_stub_64.S                |    2 +-
 arch/x86/platform/efi/efi_thunk_64.S               |    5 +-
 arch/x86/platform/olpc/xo1-wakeup.S                |    6 +-
 arch/x86/power/hibernate_asm_32.S                  |    4 +-
 arch/x86/power/hibernate_asm_64.S                  |    4 +-
 arch/x86/um/checksum_32.S                          |    4 +-
 arch/x86/um/setjmp_32.S                            |    2 +-
 arch/x86/um/setjmp_64.S                            |    2 +-
 arch/x86/xen/Makefile                              |    1 -
 arch/x86/xen/setup.c                               |    6 +-
 arch/x86/xen/xen-asm.S                             |   43 +-
 arch/x86/xen/xen-head.S                            |    6 +-
 arch/x86/xen/xen-ops.h                             |    6 +-
 drivers/base/cpu.c                                 |    8 +
 drivers/idle/intel_idle.c                          |   43 +-
 include/linux/cpu.h                                |    2 +
 include/linux/kvm_host.h                           |    2 +-
 include/linux/objtool.h                            |   14 +-
 samples/ftrace/ftrace-direct-modify.c              |    4 +-
 samples/ftrace/ftrace-direct-too.c                 |    2 +-
 samples/ftrace/ftrace-direct.c                     |    2 +-
 scripts/Makefile.build                             |    6 +
 scripts/link-vmlinux.sh                            |    6 +
 security/Kconfig                                   |   11 -
 tools/arch/x86/include/asm/cpufeatures.h           |   12 +-
 tools/arch/x86/include/asm/disabled-features.h     |   21 +-
 tools/arch/x86/include/asm/inat.h                  |    2 +-
 tools/arch/x86/include/asm/insn.h                  |   28 +-
 tools/arch/x86/include/asm/msr-index.h             |   13 +
 tools/arch/x86/lib/inat.c                          |    2 +-
 tools/arch/x86/lib/insn.c                          |  222 +++-
 tools/arch/x86/lib/memcpy_64.S                     |   14 +-
 tools/arch/x86/lib/memset_64.S                     |    8 +-
 .../asm/{alternative-asm.h => alternative.h}       |    0
 tools/include/linux/kconfig.h                      |   67 ++
 tools/include/linux/objtool.h                      |   14 +-
 tools/objtool/Documentation/stack-validation.txt   |   16 +-
 tools/objtool/Makefile                             |    4 -
 tools/objtool/arch.h                               |   13 +-
 tools/objtool/arch/x86/decode.c                    |   58 +-
 tools/objtool/arch/x86/include/arch_special.h      |    2 +-
 tools/objtool/builtin-check.c                      |    6 +-
 tools/objtool/builtin-orc.c                        |    6 +-
 tools/objtool/builtin.h                            |    3 +-
 tools/objtool/cfi.h                                |    2 +
 tools/objtool/check.c                              | 1140 +++++++++++++++-----
 tools/objtool/check.h                              |   35 +-
 tools/objtool/elf.c                                |  435 ++++++--
 tools/objtool/elf.h                                |   22 +-
 tools/objtool/objtool.c                            |    2 +
 tools/objtool/objtool.h                            |    5 +-
 tools/objtool/orc_gen.c                            |  324 +++---
 tools/objtool/special.c                            |   22 +-
 tools/objtool/sync-check.sh                        |   17 +-
 tools/objtool/weak.c                               |    7 +-
 tools/perf/check-headers.sh                        |   15 +-
 208 files changed, 4602 insertions(+), 1926 deletions(-)



             reply	other threads:[~2022-07-23  9:57 UTC|newest]

Thread overview: 156+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-07-23  9:53 Greg Kroah-Hartman [this message]
2022-07-23  9:53 ` [PATCH 5.10 001/148] KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 002/148] KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 003/148] objtool: Refactor ORC section generation Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 004/148] objtool: Add alt_group struct Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 005/148] objtool: Support stack layout changes in alternatives Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 006/148] objtool: Support retpoline jump detection for vmlinux.o Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 007/148] objtool: Assume only ELF functions do sibling calls Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 008/148] objtool: Combine UNWIND_HINT_RET_OFFSET and UNWIND_HINT_FUNC Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 009/148] x86/xen: Support objtool validation in xen-asm.S Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 010/148] x86/xen: Support objtool vmlinux.o validation in xen-head.S Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 011/148] x86/alternative: Merge include files Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 012/148] x86/alternative: Support not-feature Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 013/148] x86/alternative: Support ALTERNATIVE_TERNARY Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 014/148] x86/alternative: Use ALTERNATIVE_TERNARY() in _static_cpu_has() Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 015/148] x86/insn: Rename insn_decode() to insn_decode_from_regs() Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 016/148] x86/insn: Add a __ignore_sync_check__ marker Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 017/148] x86/insn: Add an insn_decode() API Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 018/148] x86/insn-eval: Handle return values from the decoder Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 019/148] x86/alternative: Use insn_decode() Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 020/148] x86: Add insn_decode_kernel() Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 021/148] x86/alternatives: Optimize optimize_nops() Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 022/148] x86/retpoline: Simplify retpolines Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 023/148] objtool: Correctly handle retpoline thunk calls Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 024/148] objtool: Handle per arch retpoline naming Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 025/148] objtool: Rework the elf_rebuild_reloc_section() logic Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 026/148] objtool: Add elf_create_reloc() helper Greg Kroah-Hartman
2022-07-23  9:53 ` [PATCH 5.10 027/148] objtool: Create reloc sections implicitly Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 028/148] objtool: Extract elf_strtab_concat() Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 029/148] objtool: Extract elf_symbol_add() Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 030/148] objtool: Add elf_create_undef_symbol() Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 031/148] objtool: Keep track of retpoline call sites Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 032/148] objtool: Cache instruction relocs Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 033/148] objtool: Skip magical retpoline .altinstr_replacement Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 034/148] objtool/x86: Rewrite retpoline thunk calls Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 035/148] objtool: Support asm jump tables Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 036/148] x86/alternative: Optimize single-byte NOPs at an arbitrary position Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 037/148] objtool: Fix .symtab_shndx handling for elf_create_undef_symbol() Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 038/148] objtool: Only rewrite unconditional retpoline thunk calls Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 039/148] objtool/x86: Ignore __x86_indirect_alt_* symbols Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 040/148] objtool: Dont make .altinstructions writable Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 041/148] objtool: Teach get_alt_entry() about more relocation types Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 042/148] objtool: print out the symbol type when complaining about it Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 043/148] objtool: Remove reloc symbol type checks in get_alt_entry() Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 044/148] objtool: Make .altinstructions section entry size consistent Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 045/148] objtool: Introduce CFI hash Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 046/148] objtool: Handle __sanitize_cov*() tail calls Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 047/148] objtool: Classify symbols Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 048/148] objtool: Explicitly avoid self modifying code in .altinstr_replacement Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 049/148] objtool,x86: Replace alternatives with .retpoline_sites Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 050/148] x86/retpoline: Remove unused replacement symbols Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 051/148] x86/asm: Fix register order Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 052/148] x86/asm: Fixup odd GEN-for-each-reg.h usage Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 053/148] x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 054/148] x86/retpoline: Create a retpoline thunk array Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 055/148] x86/alternative: Implement .retpoline_sites support Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 056/148] x86/alternative: Handle Jcc __x86_indirect_thunk_\reg Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 057/148] x86/alternative: Try inline spectre_v2=retpoline,amd Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 058/148] x86/alternative: Add debug prints to apply_retpolines() Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 059/148] bpf,x86: Simplify computing label offsets Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 060/148] bpf,x86: Respect X86_FEATURE_RETPOLINE* Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 061/148] x86/lib/atomic64_386_32: Rename things Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 062/148] x86: Prepare asm files for straight-line-speculation Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 063/148] x86: Prepare inline-asm " Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 064/148] x86/alternative: Relax text_poke_bp() constraint Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 065/148] objtool: Add straight-line-speculation validation Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 066/148] x86: Add straight-line-speculation mitigation Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 067/148] tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in perf bench mem memcpy Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 068/148] kvm/emulate: Fix SETcc emulation function offsets with SLS Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 069/148] objtool: Default ignore INT3 for unreachable Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 070/148] crypto: x86/poly1305 - Fixup SLS Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 071/148] objtool: Fix SLS validation for kcov tail-call replacement Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 072/148] objtool: Fix code relocs vs weak symbols Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 073/148] objtool: Fix type of reloc::addend Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 074/148] objtool: Fix symbol creation Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 075/148] x86/entry: Remove skip_r11rcx Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 076/148] objtool: Fix objtool regression on x32 systems Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 077/148] x86/realmode: build with -D__DISABLE_EXPORTS Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 078/148] x86/kvm/vmx: Make noinstr clean Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 079/148] x86/cpufeatures: Move RETPOLINE flags to word 11 Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 080/148] x86/retpoline: Cleanup some #ifdefery Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 081/148] x86/retpoline: Swizzle retpoline thunk Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 082/148] Makefile: Set retpoline cflags based on CONFIG_CC_IS_{CLANG,GCC} Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 083/148] x86/retpoline: Use -mfunction-return Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 084/148] x86: Undo return-thunk damage Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 085/148] x86,objtool: Create .return_sites Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 086/148] objtool: skip non-text sections when adding return-thunk sites Greg Kroah-Hartman
2022-07-23  9:54 ` [PATCH 5.10 087/148] x86,static_call: Use alternative RET encoding Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 088/148] x86/ftrace: " Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 089/148] x86/bpf: " Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 090/148] x86/kvm: Fix SETcc emulation for return thunks Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 091/148] x86/vsyscall_emu/64: Dont use RET in vsyscall emulation Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 092/148] x86/sev: Avoid using __x86_return_thunk Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 093/148] x86: Use return-thunk in asm code Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 094/148] objtool: Treat .text.__x86.* as noinstr Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 095/148] x86: Add magic AMD return-thunk Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 096/148] x86/bugs: Report AMD retbleed vulnerability Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 097/148] x86/bugs: Add AMD retbleed= boot parameter Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 098/148] x86/bugs: Enable STIBP for JMP2RET Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 099/148] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 100/148] x86/entry: Add kernel IBRS implementation Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 101/148] x86/bugs: Optimize SPEC_CTRL MSR writes Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 102/148] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 103/148] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 104/148] x86/bugs: Report Intel retbleed vulnerability Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 105/148] intel_idle: Disable IBRS during long idle Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 106/148] objtool: Update Retpoline validation Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 107/148] x86/xen: Rename SYS* entry points Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 108/148] x86/bugs: Add retbleed=ibpb Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 109/148] x86/bugs: Do IBPB fallback check only once Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 110/148] objtool: Add entry UNRET validation Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 111/148] x86/cpu/amd: Add Spectral Chicken Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 112/148] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 113/148] x86/speculation: Fix firmware entry SPEC_CTRL handling Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 114/148] x86/speculation: Fix SPEC_CTRL write on SMT state change Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 115/148] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 116/148] x86/speculation: Remove x86_spec_ctrl_mask Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 117/148] objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 118/148] KVM: VMX: Flatten __vmx_vcpu_run() Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 119/148] KVM: VMX: Convert launched argument to flags Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 120/148] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 121/148] KVM: VMX: Fix IBRS handling after vmexit Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 122/148] x86/speculation: Fill RSB on vmexit for IBRS Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 123/148] x86/common: Stamp out the stepping madness Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 124/148] x86/cpu/amd: Enumerate BTC_NO Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 125/148] x86/retbleed: Add fine grained Kconfig knobs Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 126/148] x86/bugs: Add Cannon lake to RETBleed affected CPU list Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 127/148] x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 128/148] x86/kexec: Disable RET on kexec Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 129/148] x86/speculation: Disable RRSBA behavior Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 130/148] x86/static_call: Serialize __static_call_fixup() properly Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 131/148] tools/insn: Restore the relative include paths for cross building Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 132/148] x86, kvm: use proper ASM macros for kvm_vcpu_is_preempted Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 133/148] x86/xen: Fix initialisation in hypercall_page after rethunk Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 134/148] x86/ftrace: Add UNWIND_HINT_FUNC annotation for ftrace_stub Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 135/148] x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 136/148] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 137/148] efi/x86: use naked RET on mixed mode call wrapper Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 138/148] x86/kvm: fix FASTOP_SIZE when return thunks are enabled Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 139/148] KVM: emulate: do not adjust size of fastop and setcc subroutines Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 140/148] tools arch x86: Sync the msr-index.h copy with the kernel sources Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 141/148] tools headers cpufeatures: Sync " Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 142/148] x86/bugs: Remove apostrophe typo Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 143/148] um: Add missing apply_returns() Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 144/148] x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 145/148] kvm: fix objtool relocation warning Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 146/148] objtool: Fix elf_create_undef_symbol() endianness Greg Kroah-Hartman
2022-07-23  9:55 ` [PATCH 5.10 147/148] tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in perf bench mem memcpy - again Greg Kroah-Hartman
2022-07-23  9:56 ` [PATCH 5.10 148/148] tools headers: Remove broken definition of __LITTLE_ENDIAN Greg Kroah-Hartman
2022-07-23 14:12 ` [PATCH 5.10 000/148] 5.10.133-rc1 review Guenter Roeck
2022-07-23 18:03 ` Daniel Díaz
2022-07-24  4:49 ` Rudi Heitbaum
2022-07-24  8:06 ` Sudip Mukherjee (Codethink)
2022-07-25  8:03 ` Jon Hunter
2022-07-25 10:19 ` Pavel Machek
2022-07-25 17:15 ` Florian Fainelli

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220723095224.302504400@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=akpm@linux-foundation.org \
    --cc=f.fainelli@gmail.com \
    --cc=jonathanh@nvidia.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux@roeck-us.net \
    --cc=lkft-triage@lists.linaro.org \
    --cc=patches@kernelci.org \
    --cc=pavel@denx.de \
    --cc=shuah@kernel.org \
    --cc=slade@sladewatkins.com \
    --cc=stable@vger.kernel.org \
    --cc=sudipm.mukherjee@gmail.com \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.