This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.131-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
------------- Pseudo-Shortlog of commits:
Greg Kroah-Hartman gregkh@linuxfoundation.org Linux 5.10.131-rc2
Borislav Petkov bp@suse.de tools/insn: Restore the relative include paths for cross building
Thomas Gleixner tglx@linutronix.de x86/static_call: Serialize __static_call_fixup() properly
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/speculation: Disable RRSBA behavior
Konrad Rzeszutek Wilk konrad.wilk@oracle.com x86/kexec: Disable RET on kexec
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/bugs: Add Cannon lake to RETBleed affected CPU list
Peter Zijlstra peterz@infradead.org x86/retbleed: Add fine grained Kconfig knobs
Andrew Cooper andrew.cooper3@citrix.com x86/cpu/amd: Enumerate BTC_NO
Peter Zijlstra peterz@infradead.org x86/common: Stamp out the stepping madness
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Fix IBRS handling after vmexit
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Convert launched argument to flags
Josh Poimboeuf jpoimboe@kernel.org KVM: VMX: Flatten __vmx_vcpu_run()
Josh Poimboeuf jpoimboe@kernel.org objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Remove x86_spec_ctrl_mask
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix SPEC_CTRL write on SMT state change
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix firmware entry SPEC_CTRL handling
Josh Poimboeuf jpoimboe@kernel.org x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
Peter Zijlstra peterz@infradead.org x86/cpu/amd: Add Spectral Chicken
Peter Zijlstra peterz@infradead.org objtool: Add entry UNRET validation
Josh Poimboeuf jpoimboe@kernel.org x86/bugs: Do IBPB fallback check only once
Peter Zijlstra peterz@infradead.org x86/bugs: Add retbleed=ibpb
Peter Zijlstra peterz@infradead.org x86/xen: Rename SYS* entry points
Peter Zijlstra peterz@infradead.org objtool: Update Retpoline validation
Peter Zijlstra peterz@infradead.org intel_idle: Disable IBRS during long idle
Peter Zijlstra peterz@infradead.org x86/bugs: Report Intel retbleed vulnerability
Peter Zijlstra peterz@infradead.org x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
Pawan Gupta pawan.kumar.gupta@linux.intel.com x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
Peter Zijlstra peterz@infradead.org x86/bugs: Optimize SPEC_CTRL MSR writes
Peter Zijlstra peterz@infradead.org x86/entry: Add kernel IBRS implementation
Peter Zijlstra peterz@infradead.org x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
Kim Phillips kim.phillips@amd.com x86/bugs: Enable STIBP for JMP2RET
Alexandre Chartre alexandre.chartre@oracle.com x86/bugs: Add AMD retbleed= boot parameter
Alexandre Chartre alexandre.chartre@oracle.com x86/bugs: Report AMD retbleed vulnerability
Peter Zijlstra peterz@infradead.org x86: Add magic AMD return-thunk
Peter Zijlstra peterz@infradead.org objtool: Treat .text.__x86.* as noinstr
Peter Zijlstra peterz@infradead.org x86: Use return-thunk in asm code
Kim Phillips kim.phillips@amd.com x86/sev: Avoid using __x86_return_thunk
Peter Zijlstra peterz@infradead.org x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
Peter Zijlstra peterz@infradead.org x86/kvm: Fix SETcc emulation for return thunks
Peter Zijlstra peterz@infradead.org x86/bpf: Use alternative RET encoding
Peter Zijlstra peterz@infradead.org x86/ftrace: Use alternative RET encoding
Peter Zijlstra peterz@infradead.org x86,static_call: Use alternative RET encoding
Thadeu Lima de Souza Cascardo cascardo@canonical.com objtool: skip non-text sections when adding return-thunk sites
Peter Zijlstra peterz@infradead.org x86,objtool: Create .return_sites
Peter Zijlstra peterz@infradead.org x86: Undo return-thunk damage
Peter Zijlstra peterz@infradead.org x86/retpoline: Use -mfunction-return
Ben Hutchings ben@decadent.org.uk Makefile: Set retpoline cflags based on CONFIG_CC_IS_{CLANG,GCC}
Peter Zijlstra peterz@infradead.org x86/retpoline: Swizzle retpoline thunk
Peter Zijlstra peterz@infradead.org x86/retpoline: Cleanup some #ifdefery
Peter Zijlstra peterz@infradead.org x86/cpufeatures: Move RETPOLINE flags to word 11
Peter Zijlstra peterz@infradead.org x86/kvm/vmx: Make noinstr clean
Thadeu Lima de Souza Cascardo cascardo@canonical.com x86/realmode: build with -D__DISABLE_EXPORTS
Mikulas Patocka mpatocka@redhat.com objtool: Fix objtool regression on x32 systems
Peter Zijlstra peterz@infradead.org x86/entry: Remove skip_r11rcx
Peter Zijlstra peterz@infradead.org objtool: Fix symbol creation
Peter Zijlstra peterz@infradead.org objtool: Fix type of reloc::addend
Peter Zijlstra peterz@infradead.org objtool: Fix code relocs vs weak symbols
Peter Zijlstra peterz@infradead.org objtool: Fix SLS validation for kcov tail-call replacement
Peter Zijlstra peterz@infradead.org crypto: x86/poly1305 - Fixup SLS
Peter Zijlstra peterz@infradead.org objtool: Default ignore INT3 for unreachable
Borislav Petkov bp@suse.de kvm/emulate: Fix SETcc emulation function offsets with SLS
Arnaldo Carvalho de Melo acme@redhat.com tools arch: Update arch/x86/lib/mem{cpy,set}_64.S copies used in 'perf bench mem memcpy'
Peter Zijlstra peterz@infradead.org x86: Add straight-line-speculation mitigation
Peter Zijlstra peterz@infradead.org objtool: Add straight-line-speculation validation
Peter Zijlstra peterz@infradead.org x86/alternative: Relax text_poke_bp() constraint
Peter Zijlstra peterz@infradead.org x86: Prepare inline-asm for straight-line-speculation
Peter Zijlstra peterz@infradead.org x86: Prepare asm files for straight-line-speculation
Peter Zijlstra peterz@infradead.org x86/lib/atomic64_386_32: Rename things
Peter Zijlstra peterz@infradead.org bpf,x86: Respect X86_FEATURE_RETPOLINE*
Peter Zijlstra peterz@infradead.org bpf,x86: Simplify computing label offsets
Peter Zijlstra peterz@infradead.org x86/alternative: Add debug prints to apply_retpolines()
Peter Zijlstra peterz@infradead.org x86/alternative: Try inline spectre_v2=retpoline,amd
Peter Zijlstra peterz@infradead.org x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
Peter Zijlstra peterz@infradead.org x86/alternative: Implement .retpoline_sites support
Peter Zijlstra peterz@infradead.org x86/retpoline: Create a retpoline thunk array
Peter Zijlstra peterz@infradead.org x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
Peter Zijlstra peterz@infradead.org x86/asm: Fixup odd GEN-for-each-reg.h usage
Peter Zijlstra peterz@infradead.org x86/asm: Fix register order
Peter Zijlstra peterz@infradead.org x86/retpoline: Remove unused replacement symbols
Peter Zijlstra peterz@infradead.org objtool,x86: Replace alternatives with .retpoline_sites
Peter Zijlstra peterz@infradead.org objtool: Explicitly avoid self modifying code in .altinstr_replacement
Peter Zijlstra peterz@infradead.org objtool: Classify symbols
Peter Zijlstra peterz@infradead.org objtool: Handle __sanitize_cov*() tail calls
Peter Zijlstra peterz@infradead.org objtool: Introduce CFI hash
Joe Lawrence joe.lawrence@redhat.com objtool: Make .altinstructions section entry size consistent
Josh Poimboeuf jpoimboe@redhat.com objtool: Remove reloc symbol type checks in get_alt_entry()
Linus Torvalds torvalds@linux-foundation.org objtool: print out the symbol type when complaining about it
Peter Zijlstra peterz@infradead.org objtool: Teach get_alt_entry() about more relocation types
Josh Poimboeuf jpoimboe@redhat.com objtool: Don't make .altinstructions writable
Peter Zijlstra peterz@infradead.org objtool/x86: Ignore __x86_indirect_alt_* symbols
Peter Zijlstra peterz@infradead.org objtool: Only rewrite unconditional retpoline thunk calls
Peter Zijlstra peterz@infradead.org objtool: Fix .symtab_shndx handling for elf_create_undef_symbol()
Borislav Petkov bp@suse.de x86/alternative: Optimize single-byte NOPs at an arbitrary position
Josh Poimboeuf jpoimboe@redhat.com objtool: Support asm jump tables
Peter Zijlstra peterz@infradead.org objtool/x86: Rewrite retpoline thunk calls
Peter Zijlstra peterz@infradead.org objtool: Skip magical retpoline .altinstr_replacement
Peter Zijlstra peterz@infradead.org objtool: Cache instruction relocs
Peter Zijlstra peterz@infradead.org objtool: Keep track of retpoline call sites
Peter Zijlstra peterz@infradead.org objtool: Add elf_create_undef_symbol()
Peter Zijlstra peterz@infradead.org objtool: Extract elf_symbol_add()
Peter Zijlstra peterz@infradead.org objtool: Extract elf_strtab_concat()
Peter Zijlstra peterz@infradead.org objtool: Create reloc sections implicitly
Peter Zijlstra peterz@infradead.org objtool: Add elf_create_reloc() helper
Peter Zijlstra peterz@infradead.org objtool: Rework the elf_rebuild_reloc_section() logic
Peter Zijlstra peterz@infradead.org objtool: Handle per arch retpoline naming
Peter Zijlstra peterz@infradead.org objtool: Correctly handle retpoline thunk calls
Peter Zijlstra peterz@infradead.org x86/retpoline: Simplify retpolines
Peter Zijlstra peterz@infradead.org x86/alternatives: Optimize optimize_nops()
Ben Hutchings ben@decadent.org.uk x86: Add insn_decode_kernel()
Borislav Petkov bp@suse.de x86/alternative: Use insn_decode()
Borislav Petkov bp@suse.de x86/insn-eval: Handle return values from the decoder
Borislav Petkov bp@suse.de x86/insn: Add an insn_decode() API
Borislav Petkov bp@suse.de x86/insn: Add a __ignore_sync_check__ marker
Borislav Petkov bp@suse.de x86/insn: Rename insn_decode() to insn_decode_from_regs()
Juergen Gross jgross@suse.com x86/alternative: Use ALTERNATIVE_TERNARY() in _static_cpu_has()
Juergen Gross jgross@suse.com x86/alternative: Support ALTERNATIVE_TERNARY
Juergen Gross jgross@suse.com x86/alternative: Support not-feature
Juergen Gross jgross@suse.com x86/alternative: Merge include files
Josh Poimboeuf jpoimboe@redhat.com x86/xen: Support objtool vmlinux.o validation in xen-head.S
Josh Poimboeuf jpoimboe@redhat.com x86/xen: Support objtool validation in xen-asm.S
Josh Poimboeuf jpoimboe@redhat.com objtool: Combine UNWIND_HINT_RET_OFFSET and UNWIND_HINT_FUNC
Josh Poimboeuf jpoimboe@redhat.com objtool: Assume only ELF functions do sibling calls
Josh Poimboeuf jpoimboe@redhat.com objtool: Support retpoline jump detection for vmlinux.o
Josh Poimboeuf jpoimboe@redhat.com objtool: Support stack layout changes in alternatives
Josh Poimboeuf jpoimboe@redhat.com objtool: Add 'alt_group' struct
Josh Poimboeuf jpoimboe@redhat.com objtool: Refactor ORC section generation
Uros Bizjak ubizjak@gmail.com KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
Uros Bizjak ubizjak@gmail.com KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 25 + Makefile | 24 +- arch/um/kernel/um_arch.c | 4 + arch/x86/Kconfig | 91 +- arch/x86/Makefile | 8 +- arch/x86/boot/compressed/efi_thunk_64.S | 2 +- arch/x86/boot/compressed/head_64.S | 4 +- arch/x86/boot/compressed/mem_encrypt.S | 4 +- arch/x86/crypto/aegis128-aesni-asm.S | 48 +- arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 2 +- arch/x86/crypto/aesni-intel_asm.S | 52 +- arch/x86/crypto/aesni-intel_avx-x86_64.S | 40 +- arch/x86/crypto/blake2s-core.S | 4 +- arch/x86/crypto/blowfish-x86_64-asm_64.S | 12 +- arch/x86/crypto/camellia-aesni-avx-asm_64.S | 18 +- arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 18 +- arch/x86/crypto/camellia-x86_64-asm_64.S | 12 +- arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 12 +- arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 16 +- arch/x86/crypto/chacha-avx2-x86_64.S | 6 +- arch/x86/crypto/chacha-avx512vl-x86_64.S | 6 +- arch/x86/crypto/chacha-ssse3-x86_64.S | 8 +- arch/x86/crypto/crc32-pclmul_asm.S | 2 +- arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 2 +- arch/x86/crypto/crct10dif-pcl-asm_64.S | 2 +- arch/x86/crypto/des3_ede-asm_64.S | 4 +- arch/x86/crypto/ghash-clmulni-intel_asm.S | 6 +- arch/x86/crypto/nh-avx2-x86_64.S | 2 +- arch/x86/crypto/nh-sse2-x86_64.S | 2 +- arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 38 +- arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 16 +- arch/x86/crypto/serpent-avx2-asm_64.S | 16 +- arch/x86/crypto/serpent-sse2-i586-asm_32.S | 6 +- arch/x86/crypto/serpent-sse2-x86_64-asm_64.S | 6 +- arch/x86/crypto/sha1_avx2_x86_64_asm.S | 2 +- arch/x86/crypto/sha1_ni_asm.S | 2 +- arch/x86/crypto/sha1_ssse3_asm.S | 2 +- arch/x86/crypto/sha256-avx-asm.S | 2 +- arch/x86/crypto/sha256-avx2-asm.S | 2 +- arch/x86/crypto/sha256-ssse3-asm.S | 2 +- arch/x86/crypto/sha256_ni_asm.S | 2 +- arch/x86/crypto/sha512-avx-asm.S | 2 +- arch/x86/crypto/sha512-avx2-asm.S | 2 +- arch/x86/crypto/sha512-ssse3-asm.S | 2 +- arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 16 +- arch/x86/crypto/twofish-i586-asm_32.S | 4 +- arch/x86/crypto/twofish-x86_64-asm_64-3way.S | 6 +- arch/x86/crypto/twofish-x86_64-asm_64.S | 4 +- arch/x86/entry/Makefile | 2 +- arch/x86/entry/calling.h | 72 +- arch/x86/entry/entry.S | 22 + arch/x86/entry/entry_32.S | 6 +- arch/x86/entry/entry_64.S | 62 +- arch/x86/entry/entry_64_compat.S | 21 +- arch/x86/entry/thunk_32.S | 2 +- arch/x86/entry/thunk_64.S | 2 +- arch/x86/entry/vdso/Makefile | 1 + arch/x86/entry/vdso/vdso32/system_call.S | 4 +- arch/x86/entry/vsyscall/vsyscall_emu_64.S | 3 + arch/x86/include/asm/GEN-for-each-reg.h | 14 +- arch/x86/include/asm/alternative-asm.h | 114 --- arch/x86/include/asm/alternative.h | 137 ++- arch/x86/include/asm/asm-prototypes.h | 17 - arch/x86/include/asm/cpufeature.h | 41 +- arch/x86/include/asm/cpufeatures.h | 14 +- arch/x86/include/asm/disabled-features.h | 21 +- arch/x86/include/asm/inat.h | 2 +- arch/x86/include/asm/insn-eval.h | 4 +- arch/x86/include/asm/insn.h | 28 +- arch/x86/include/asm/linkage.h | 22 + arch/x86/include/asm/msr-index.h | 13 + arch/x86/include/asm/nospec-branch.h | 140 +-- arch/x86/include/asm/paravirt.h | 2 +- arch/x86/include/asm/qspinlock_paravirt.h | 4 +- arch/x86/include/asm/smap.h | 5 +- arch/x86/include/asm/static_call.h | 19 +- arch/x86/include/asm/unwind_hints.h | 23 +- arch/x86/kernel/acpi/wakeup_32.S | 6 +- arch/x86/kernel/alternative.c | 406 +++++++- arch/x86/kernel/cpu/amd.c | 46 +- arch/x86/kernel/cpu/bugs.c | 475 +++++++-- arch/x86/kernel/cpu/common.c | 61 +- arch/x86/kernel/cpu/cpu.h | 2 + arch/x86/kernel/cpu/hygon.c | 6 + arch/x86/kernel/cpu/scattered.c | 1 + arch/x86/kernel/ftrace.c | 7 +- arch/x86/kernel/ftrace_32.S | 6 +- arch/x86/kernel/ftrace_64.S | 12 +- arch/x86/kernel/head_32.S | 2 +- arch/x86/kernel/head_64.S | 5 + arch/x86/kernel/irqflags.S | 4 +- arch/x86/kernel/kprobes/core.c | 2 +- arch/x86/kernel/module.c | 15 +- arch/x86/kernel/paravirt.c | 2 +- arch/x86/kernel/process.c | 2 +- arch/x86/kernel/relocate_kernel_32.S | 15 +- arch/x86/kernel/relocate_kernel_64.S | 13 +- arch/x86/kernel/sev-es.c | 2 +- arch/x86/kernel/sev_verify_cbit.S | 2 +- arch/x86/kernel/static_call.c | 52 +- arch/x86/kernel/umip.c | 2 +- arch/x86/kernel/verify_cpu.S | 4 +- arch/x86/kernel/vmlinux.lds.S | 23 +- arch/x86/kvm/emulate.c | 33 +- arch/x86/kvm/svm/vmenter.S | 11 +- arch/x86/kvm/vmx/nested.c | 32 +- arch/x86/kvm/vmx/run_flags.h | 8 + arch/x86/kvm/vmx/vmenter.S | 170 ++-- arch/x86/kvm/vmx/vmx.c | 78 +- arch/x86/kvm/vmx/vmx.h | 5 + arch/x86/kvm/x86.c | 4 +- arch/x86/lib/atomic64_386_32.S | 88 +- arch/x86/lib/atomic64_cx8_32.S | 18 +- arch/x86/lib/checksum_32.S | 8 +- arch/x86/lib/clear_page_64.S | 6 +- arch/x86/lib/cmpxchg16b_emu.S | 4 +- arch/x86/lib/cmpxchg8b_emu.S | 4 +- arch/x86/lib/copy_mc_64.S | 6 +- arch/x86/lib/copy_page_64.S | 6 +- arch/x86/lib/copy_user_64.S | 14 +- arch/x86/lib/csum-copy_64.S | 2 +- arch/x86/lib/error-inject.c | 3 +- arch/x86/lib/getuser.S | 22 +- arch/x86/lib/hweight.S | 6 +- arch/x86/lib/inat.c | 2 +- arch/x86/lib/insn-eval.c | 40 +- arch/x86/lib/insn.c | 222 ++++- arch/x86/lib/iomap_copy_64.S | 2 +- arch/x86/lib/memcpy_64.S | 14 +- arch/x86/lib/memmove_64.S | 11 +- arch/x86/lib/memset_64.S | 8 +- arch/x86/lib/msr-reg.S | 4 +- arch/x86/lib/putuser.S | 6 +- arch/x86/lib/retpoline.S | 118 ++- arch/x86/math-emu/div_Xsig.S | 2 +- arch/x86/math-emu/div_small.S | 2 +- arch/x86/math-emu/mul_Xsig.S | 6 +- arch/x86/math-emu/polynom_Xsig.S | 2 +- arch/x86/math-emu/reg_norm.S | 6 +- arch/x86/math-emu/reg_round.S | 2 +- arch/x86/math-emu/reg_u_add.S | 2 +- arch/x86/math-emu/reg_u_div.S | 2 +- arch/x86/math-emu/reg_u_mul.S | 2 +- arch/x86/math-emu/reg_u_sub.S | 2 +- arch/x86/math-emu/round_Xsig.S | 4 +- arch/x86/math-emu/shr_Xsig.S | 8 +- arch/x86/math-emu/wm_shrx.S | 16 +- arch/x86/mm/mem_encrypt_boot.S | 6 + arch/x86/net/bpf_jit_comp.c | 185 ++-- arch/x86/net/bpf_jit_comp32.c | 22 +- arch/x86/platform/efi/efi_stub_32.S | 2 +- arch/x86/platform/efi/efi_stub_64.S | 2 +- arch/x86/platform/efi/efi_thunk_64.S | 2 +- arch/x86/platform/olpc/xo1-wakeup.S | 6 +- arch/x86/power/hibernate_asm_32.S | 4 +- arch/x86/power/hibernate_asm_64.S | 4 +- arch/x86/um/checksum_32.S | 4 +- arch/x86/um/setjmp_32.S | 2 +- arch/x86/um/setjmp_64.S | 2 +- arch/x86/xen/Makefile | 1 - arch/x86/xen/setup.c | 6 +- arch/x86/xen/xen-asm.S | 43 +- arch/x86/xen/xen-head.S | 6 +- arch/x86/xen/xen-ops.h | 6 +- drivers/base/cpu.c | 8 + drivers/idle/intel_idle.c | 43 +- include/linux/cpu.h | 2 + include/linux/kvm_host.h | 2 +- include/linux/objtool.h | 14 +- samples/ftrace/ftrace-direct-modify.c | 4 +- samples/ftrace/ftrace-direct-too.c | 2 +- samples/ftrace/ftrace-direct.c | 2 +- scripts/Makefile.build | 6 + scripts/link-vmlinux.sh | 6 + security/Kconfig | 11 - tools/arch/x86/include/asm/inat.h | 2 +- tools/arch/x86/include/asm/insn.h | 28 +- tools/arch/x86/include/asm/msr-index.h | 9 + tools/arch/x86/lib/inat.c | 2 +- tools/arch/x86/lib/insn.c | 222 ++++- tools/arch/x86/lib/memcpy_64.S | 12 +- tools/arch/x86/lib/memset_64.S | 6 +- tools/include/linux/kconfig.h | 73 ++ tools/include/linux/objtool.h | 14 +- tools/objtool/Documentation/stack-validation.txt | 16 +- tools/objtool/Makefile | 4 - tools/objtool/arch.h | 13 +- tools/objtool/arch/x86/decode.c | 58 +- tools/objtool/arch/x86/include/arch_special.h | 2 +- tools/objtool/builtin-check.c | 6 +- tools/objtool/builtin-orc.c | 6 +- tools/objtool/builtin.h | 3 +- tools/objtool/cfi.h | 2 + tools/objtool/check.c | 1140 +++++++++++++++++----- tools/objtool/check.h | 35 +- tools/objtool/elf.c | 434 ++++++-- tools/objtool/elf.h | 22 +- tools/objtool/objtool.c | 2 + tools/objtool/objtool.h | 5 +- tools/objtool/orc_gen.c | 324 +++--- tools/objtool/special.c | 22 +- tools/objtool/sync-check.sh | 17 +- tools/objtool/weak.c | 7 +- tools/perf/check-headers.sh | 15 +- 204 files changed, 4557 insertions(+), 1916 deletions(-)
On 7/13/22 06:10, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
I see this in all branches, including mainline.
Building um:defconfig ... failed -------------- Error log: /opt/kernel/gcc-11.3.0-2.38-nolibc/x86_64-linux/bin/../lib/gcc/x86_64-linux/11.3.0/../../../../x86_64-linux/bin/ld: arch/x86/um/../kernel/module.o: in function `module_finalize': arch/x86/um/../kernel/module.c:292: undefined reference to `apply_returns'
Guenter
Hi Greg,
On Wed, Jul 13, 2022 at 03:10:15PM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
Build test (gcc version 11.3.1 20220706): mips: 63 configs -> no failure arm: 104 configs -> no failure arm64: 3 configs -> no failure x86_64: 4 configs -> no failure alpha allmodconfig -> no failure powerpc allmodconfig -> no failure riscv allmodconfig -> no failure s390 allmodconfig -> no failure xtensa allmodconfig -> no failure
Boot test: x86_64: Booted on my test laptop. No regression. x86_64: Booted on qemu. No regression. [1] arm64: Booted on rpi4b (4GB model). No regression. [2]
[1]. https://openqa.qa.codethink.co.uk/tests/1515 [2]. https://openqa.qa.codethink.co.uk/tests/1518
Tested-by: Sudip Mukherjee sudip.mukherjee@codethink.co.uk
-- Regards Sudip
On Wed, Jul 13, 2022 at 03:10:15PM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
All boots with efi32 bios crash. This seems to affect all stable release candidates; so far I have seen it with v5.10.130-132-g6729599d99f and with v5.18.11-62-g18f94637a014. Test results from mainline and from v5.15.54-rc1 are still pending.
[ 0.709966] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) [ 0.709966] BUG: unable to handle page fault for address: 0000000021803b80 [ 0.709966] #PF: supervisor instruction fetch in kernel mode [ 0.709966] #PF: error_code(0x0011) - permissions violation [ 0.709966] PGD 175a063 P4D 175a063 PUD 175b063 PMD 1766063 PTE 8000000021803063 [ 0.709966] Oops: 0011 [#1] SMP PTI [ 0.709966] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.131-rc2+ #1 [ 0.709966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 [ 0.709966] RIP: 0010:0x21803b80 [ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56. [ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046 [ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60 [ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038 [ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067 [ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030 [ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282 [ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000 [ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033 [ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0 [ 0.709966] Call Trace: [ 0.709966] ? efi_set_virtual_address_map+0x87/0x160 [ 0.709966] ? efi_enter_virtual_mode+0x39a/0x3f5 [ 0.709966] ? start_kernel+0x4aa/0x544 [ 0.709966] ? secondary_startup_64_no_verify+0xc2/0xcb [ 0.709966] Modules linked in: [ 0.709966] CR2: 0000000021803b80 [ 0.709966] ---[ end trace 1b5f45b6ffd42130 ]--- [ 0.709966] RIP: 0010:0x21803b80 [ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56. [ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046 [ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60 [ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038 [ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067 [ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030 [ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282 [ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000 [ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033 [ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0 [ 0.709966] Kernel panic - not syncing: Attempted to kill the idle task! [ 0.709966] ACPI MEMORY or I/O RESET_REG.
Guenter
On 7/13/22 06:10, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.131-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
On ARCH_BRCMSTB using 32-bit and 64-bit ARM kernels:
Tested-by: Florian Fainelli f.fainelli@gmail.com
On Wed, Jul 13, 2022 at 03:10:15PM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
Build results: total: 163 pass: 162 fail: 1 Failed builds: um:defconfig Qemu test results: total: 477 pass: 469 fail: 8 Failed tests: x86_64:q35:SandyBridge:defconfig:smp4:net,ne2k_pci:efi32:mem1G:usb:hd x86_64:q35:Conroe:defconfig:smp4:net,tulip:efi32:mem256:scsi[DC395]:hd x86_64:q35:Skylake-Server:defconfig:smp4:net,e1000-82544gc:efi32:mem2G:scsi[53C895A]:hd x86_64:q35:Opteron_G5:defconfig:smp4:net,i82559c:efi32:mem256:scsi[MEGASAS2]:hd x86_64:pc:Opteron_G2:defconfig:smp:net,usb:efi32:mem2G:scsi[virtio-pci]:hd x86_64:q35:Nehalem:defconfig:smp2:net,i82558a:efi32:mem1G:virtio:hd x86_64:q35:Skylake-Client-IBRS:defconfig:preempt:smp2:net,i82558b:efi32:mem1G:sdhci:mmc:hd x86_64:q35:Haswell-noTSX-IBRS:defconfig:nosmp:net,pcnet:efi32:mem2G:ata:hd
Build error:
/opt/kernel/gcc-11.3.0-2.38-nolibc/x86_64-linux/bin/../lib/gcc/x86_64-linux/11.3.0/../../../../x86_64-linux/bin/ld: arch/x86/um/../kernel/module.o: in function `module_finalize': arch/x86/um/../kernel/module.c:283: undefined reference to `apply_returns'
Crash:
[ 0.709966] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) [ 0.709966] BUG: unable to handle page fault for address: 0000000021803b80 [ 0.709966] #PF: supervisor instruction fetch in kernel mode [ 0.709966] #PF: error_code(0x0011) - permissions violation [ 0.709966] PGD 175a063 P4D 175a063 PUD 175b063 PMD 1766063 PTE 8000000021803063 [ 0.709966] Oops: 0011 [#1] SMP PTI [ 0.709966] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.131-rc2+ #1 [ 0.709966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 [ 0.709966] RIP: 0010:0x21803b80 [ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56. [ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046 [ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60 [ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038 [ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067 [ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030 [ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282 [ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000 [ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033 [ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0 [ 0.709966] Call Trace: [ 0.709966] ? efi_set_virtual_address_map+0x87/0x160 [ 0.709966] ? efi_enter_virtual_mode+0x39a/0x3f5 [ 0.709966] ? start_kernel+0x4aa/0x544 [ 0.709966] ? secondary_startup_64_no_verify+0xc2/0xcb [ 0.709966] Modules linked in: [ 0.709966] CR2: 0000000021803b80 [ 0.709966] ---[ end trace 1b5f45b6ffd42130 ]--- [ 0.709966] RIP: 0010:0x21803b80 [ 0.709966] Code: Unable to access opcode bytes at RIP 0x21803b56. [ 0.709966] RSP: 0018:ffffffffb9403e80 EFLAGS: 00000046 [ 0.709966] RAX: 0000000000000000 RBX: 0000000001798000 RCX: 00000000df24be60 [ 0.709966] RDX: 000000003feab058 RSI: 0000000000000600 RDI: 000000003fe7e038 [ 0.709966] RBP: 0000000000000600 R08: 0000000001798000 R09: 00000000229ed067 [ 0.709966] R10: 0000000000000000 R11: 00000000229ed067 R12: 0000000000000030 [ 0.709966] R13: 0000000000000001 R14: ffff9aca41790000 R15: 0000000000000282 [ 0.709966] FS: 0000000000000000(0000) GS:ffff9aca7f800000(0000) knlGS:0000000000000000 [ 0.709966] CS: 0010 DS: 0018 ES: 0018 CR0: 0000000080050033 [ 0.709966] CR2: 0000000021803b80 CR3: 0000000001758000 CR4: 00000000000406b0 [ 0.709966] Kernel panic - not syncing: Attempted to kill the idle task!
This is the same for all stable release candidates, and is also seen in the mainline kernel.
Guenter
On Wed, 13 Jul 2022 at 18:40, Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.131-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
FYI,
With rc2 the perf build issues got fixed.
but we still see Kernel panic on x86 while running kvm-unit-tests.
- Naresh
On 2022/7/13 21:10, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.131 release. There are 131 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Fri, 15 Jul 2022 09:47:55 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.131-rc... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below.
thanks,
greg k-h
Tested on arm64 and x86 for 5.10.131-rc2,
Kernel repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git Branch: linux-5.10.y Version: 5.10.131-rc2 Commit: 6729599d99f8543a9c2525f3fbaccabccc04ad09 Compiler: gcc version 7.3.0 (GCC)
arm64: -------------------------------------------------------------------- Testcase Result Summary: total: 9022 passed: 9022 failed: 0 timeout: 0 --------------------------------------------------------------------
x86: -------------------------------------------------------------------- Testcase Result Summary: total: 9022 passed: 9022 failed: 0 timeout: 0 --------------------------------------------------------------------
Tested-by: Hulk Robot hulkrobot@huawei.com
linux-stable-mirror@lists.linaro.org