From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org, akpm@linux-foundation.org,
torvalds@linux-foundation.org, stable@vger.kernel.org
Cc: lwn@lwn.net, jslaby@suse.cz,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Subject: Linux 6.1.44
Date: Tue, 8 Aug 2023 20:57:35 +0200 [thread overview]
Message-ID: <2023080822-repost-unfiled-2f01@gregkh> (raw)
-----------------
Note, PLEASE TEST this kernel if you are on the 6.1.y tree before using
it in a real workload. This was a quick release due to the obvious
security fixes in it, and as such, it has not had very much testing "in
the wild". Please let us know of any problems seen. Also note that the
user/kernel api for the new security mitigations might be changing over
time, so do not get used to them being fixed in stone just yet.
-----------------
I'm announcing the release of the 6.1.44 kernel.
All users of the 6.1 kernel series must upgrade.
The updated 6.1.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-6.1.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Documentation/ABI/testing/sysfs-devices-system-cpu | 13
Documentation/admin-guide/hw-vuln/gather_data_sampling.rst | 109 +++
Documentation/admin-guide/hw-vuln/index.rst | 2
Documentation/admin-guide/hw-vuln/srso.rst | 133 ++++
Documentation/admin-guide/kernel-parameters.txt | 58 +
Makefile | 2
arch/Kconfig | 3
arch/alpha/include/asm/bugs.h | 20
arch/arm/Kconfig | 1
arch/arm/include/asm/bugs.h | 4
arch/arm/kernel/bugs.c | 3
arch/ia64/Kconfig | 1
arch/ia64/include/asm/bugs.h | 20
arch/ia64/kernel/setup.c | 3
arch/loongarch/Kconfig | 1
arch/loongarch/kernel/setup.c | 6
arch/m68k/Kconfig | 1
arch/m68k/include/asm/bugs.h | 21
arch/m68k/kernel/setup_mm.c | 3
arch/mips/Kconfig | 1
arch/mips/include/asm/bugs.h | 17
arch/mips/kernel/setup.c | 13
arch/parisc/include/asm/bugs.h | 20
arch/powerpc/include/asm/bugs.h | 15
arch/sh/Kconfig | 1
arch/sh/include/asm/bugs.h | 74 --
arch/sh/include/asm/processor.h | 2
arch/sh/kernel/idle.c | 1
arch/sh/kernel/setup.c | 55 +
arch/sparc/Kconfig | 1
arch/sparc/include/asm/bugs.h | 18
arch/sparc/kernel/setup_32.c | 7
arch/um/Kconfig | 1
arch/um/include/asm/bugs.h | 7
arch/um/kernel/um_arch.c | 3
arch/x86/Kconfig | 27
arch/x86/include/asm/bugs.h | 2
arch/x86/include/asm/cpufeature.h | 7
arch/x86/include/asm/cpufeatures.h | 15
arch/x86/include/asm/disabled-features.h | 3
arch/x86/include/asm/fpu/api.h | 2
arch/x86/include/asm/mem_encrypt.h | 9
arch/x86/include/asm/msr-index.h | 12
arch/x86/include/asm/nospec-branch.h | 18
arch/x86/include/asm/processor.h | 2
arch/x86/include/asm/required-features.h | 3
arch/x86/include/asm/sigframe.h | 2
arch/x86/kernel/cpu/amd.c | 19
arch/x86/kernel/cpu/bugs.c | 388 +++++++++++--
arch/x86/kernel/cpu/common.c | 126 +++-
arch/x86/kernel/cpu/cpu.h | 2
arch/x86/kernel/fpu/init.c | 8
arch/x86/kernel/signal.c | 4
arch/x86/kernel/vmlinux.lds.S | 32 +
arch/x86/kvm/cpuid.c | 3
arch/x86/kvm/reverse_cpuid.h | 1
arch/x86/kvm/svm/svm.c | 4
arch/x86/kvm/svm/vmenter.S | 3
arch/x86/kvm/x86.c | 7
arch/x86/lib/retpoline.S | 83 ++
arch/x86/mm/init.c | 6
arch/x86/xen/smp_pv.c | 1
arch/xtensa/include/asm/bugs.h | 18
drivers/base/cpu.c | 16
drivers/net/xen-netback/netback.c | 15
include/asm-generic/bugs.h | 11
include/linux/cpu.h | 8
include/linux/sched/task.h | 2
init/main.c | 21
kernel/fork.c | 37 -
tools/arch/x86/include/asm/cpufeatures.h | 2
tools/objtool/arch/x86/decode.c | 5
72 files changed, 1152 insertions(+), 412 deletions(-)
Borislav Petkov (AMD) (8):
x86/bugs: Increase the x86 bugs vector size to two u32s
x86/srso: Add a Speculative RAS Overflow mitigation
x86/srso: Add IBPB_BRTYPE support
x86/srso: Add SRSO_NO support
x86/srso: Add IBPB
x86/srso: Add IBPB on VMEXIT
x86/srso: Add a forgotten NOENDBR annotation
x86/srso: Tie SBPB bit setting to microcode patch detection
Daniel Sneddon (4):
x86/speculation: Add Gather Data Sampling mitigation
x86/speculation: Add force option to GDS mitigation
x86/speculation: Add Kconfig option for GDS
KVM: Add GDS_NO support to KVM
Dave Hansen (1):
Documentation/x86: Fix backwards on/off logic about YMM support
Greg Kroah-Hartman (2):
x86: fix backwards merge of GDS/SRSO bit
Linux 6.1.44
Josh Poimboeuf (1):
x86/srso: Fix return thunks in generated code
Juergen Gross (2):
x86/xen: Fix secondary processors' FPU initialization
x86/mm: fix poking_init() for Xen PV guests
Kim Phillips (1):
x86/cpu, kvm: Add support for CPUID_80000021_EAX
Peter Zijlstra (3):
x86/mm: Use mm_alloc() in poking_init()
mm: Move mm_cachep initialization to mm_init()
x86/mm: Initialize text poking earlier
Ross Lagerwall (1):
xen/netback: Fix buffer overrun triggered by unusual packet
Thomas Gleixner (18):
init: Provide arch_cpu_finalize_init()
x86/cpu: Switch to arch_cpu_finalize_init()
ARM: cpu: Switch to arch_cpu_finalize_init()
ia64/cpu: Switch to arch_cpu_finalize_init()
loongarch/cpu: Switch to arch_cpu_finalize_init()
m68k/cpu: Switch to arch_cpu_finalize_init()
mips/cpu: Switch to arch_cpu_finalize_init()
sh/cpu: Switch to arch_cpu_finalize_init()
sparc/cpu: Switch to arch_cpu_finalize_init()
um/cpu: Switch to arch_cpu_finalize_init()
init: Remove check_bugs() leftovers
init: Invoke arch_cpu_finalize_init() earlier
init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
x86/init: Initialize signal frame size late
x86/fpu: Remove cpuinfo argument from init functions
x86/fpu: Mark init functions __init
x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
next reply other threads:[~2023-08-08 19:31 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-08-08 18:57 Greg Kroah-Hartman [this message]
2023-08-08 18:57 ` Linux 6.1.44 Greg Kroah-Hartman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2023080822-repost-unfiled-2f01@gregkh \
--to=gregkh@linuxfoundation.org \
--cc=akpm@linux-foundation.org \
--cc=jslaby@suse.cz \
--cc=linux-kernel@vger.kernel.org \
--cc=lwn@lwn.net \
--cc=stable@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).