[PATCH 4.4 00/20] 4.4.202-stable review

From: Greg Kroah-Hartman
Date: Fri Nov 15 2019 - 01:24:05 EST


This is the start of the stable review cycle for the 4.4.202 release.
There are 20 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sun, 17 Nov 2019 06:18:31 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.202-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Linux 4.4.202-rc1

Vineela Tummalapalli <vineela.tummalapalli@xxxxxxxxx>
x86/bugs: Add ITLB_MULTIHIT bug infrastructure

Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs

Michal Hocko <mhocko@xxxxxxxx>
x86/tsx: Add config options to set tsx=on|off|auto

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
x86/speculation/taa: Add documentation for TSX Async Abort

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
x86/tsx: Add "auto" option to the tsx= cmdline parameter

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
kvm/x86: Export MDS_NO=0 to guests when TSX is enabled

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
x86/speculation/taa: Add sysfs reporting for TSX Async Abort

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
x86/speculation/taa: Add mitigation for TSX Async Abort

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
x86/cpu: Add a helper function x86_read_arch_cap_msr()

Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
x86/msr: Add the IA32_TSX_CTRL MSR

Paolo Bonzini <pbonzini@xxxxxxxxxx>
KVM: x86: use Intel speculation bugs and features as derived in generic x86 code

Jim Mattson <jmattson@xxxxxxxxxx>
kvm: x86: IA32_ARCH_CAPABILITIES is always supported

Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts

Ben Hutchings <ben@xxxxxxxxxxxxxxx>
KVM: Introduce kvm_get_arch_capabilities()

Nicholas Piggin <npiggin@xxxxxxxxx>
powerpc/boot: Request no dynamic linker for boot wrapper

Nicholas Piggin <npiggin@xxxxxxxxx>
powerpc: Fix compiling a BE kernel with a powerpc64le toolchain

Michael Ellerman <mpe@xxxxxxxxxxxxxx>
powerpc/Makefile: Use cflags-y/aflags-y for setting endian options

Jonas Gorski <jonas.gorski@xxxxxxxxx>
MIPS: BCM63XX: fix switch core reset on BCM6368

Junaid Shahid <junaids@xxxxxxxxxx>
kvm: mmu: Don't read PDPTEs when paging is not enabled


-------------

Diffstat:

Documentation/ABI/testing/sysfs-devices-system-cpu | 2 +
Documentation/hw-vuln/tsx_async_abort.rst | 268 +++++++++++++++++++++
Documentation/kernel-parameters.txt | 62 +++++
Documentation/x86/tsx_async_abort.rst | 117 +++++++++
Makefile | 4 +-
arch/mips/bcm63xx/reset.c | 2 +-
arch/powerpc/Makefile | 31 ++-
arch/powerpc/boot/wrapper | 24 +-
arch/x86/Kconfig | 45 ++++
arch/x86/include/asm/cpufeatures.h | 2 +
arch/x86/include/asm/kvm_host.h | 2 +
arch/x86/include/asm/msr-index.h | 16 ++
arch/x86/include/asm/nospec-branch.h | 4 +-
arch/x86/include/asm/processor.h | 7 +
arch/x86/kernel/cpu/Makefile | 2 +-
arch/x86/kernel/cpu/bugs.c | 143 ++++++++++-
arch/x86/kernel/cpu/common.c | 93 ++++---
arch/x86/kernel/cpu/cpu.h | 18 ++
arch/x86/kernel/cpu/intel.c | 5 +
arch/x86/kernel/cpu/tsx.c | 140 +++++++++++
arch/x86/kvm/cpuid.c | 12 +
arch/x86/kvm/vmx.c | 15 --
arch/x86/kvm/x86.c | 53 +++-
drivers/base/cpu.c | 17 ++
include/linux/cpu.h | 5 +
25 files changed, 1019 insertions(+), 70 deletions(-)