Linux 4.9.176
From: Greg KH
Date: Tue May 14 2019 - 14:07:49 EST
I'm announcing the release of the 4.9.176 kernel.
All users of the 4.9 kernel series must upgrade.
The updated 4.9.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.9.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Documentation/ABI/testing/sysfs-devices-system-cpu | 4
Documentation/hw-vuln/index.rst | 13
Documentation/hw-vuln/l1tf.rst | 615 +++++++++++++++++++
Documentation/hw-vuln/mds.rst | 308 +++++++++
Documentation/index.rst | 19
Documentation/kernel-parameters.txt | 119 +++
Documentation/l1tf.rst | 610 -------------------
Documentation/spec_ctrl.txt | 9
Documentation/x86/conf.py | 10
Documentation/x86/index.rst | 8
Documentation/x86/mds.rst | 225 +++++++
Makefile | 2
arch/x86/Kconfig | 8
arch/x86/entry/common.c | 3
arch/x86/events/intel/core.c | 18
arch/x86/events/intel/cstate.c | 4
arch/x86/events/msr.c | 4
arch/x86/include/asm/cpufeatures.h | 11
arch/x86/include/asm/intel-family.h | 30
arch/x86/include/asm/irqflags.h | 4
arch/x86/include/asm/microcode_intel.h | 15
arch/x86/include/asm/msr-index.h | 40 -
arch/x86/include/asm/mwait.h | 7
arch/x86/include/asm/nospec-branch.h | 65 ++
arch/x86/include/asm/pgtable_64.h | 16
arch/x86/include/asm/processor.h | 6
arch/x86/include/asm/spec-ctrl.h | 20
arch/x86/include/asm/switch_to.h | 3
arch/x86/include/asm/thread_info.h | 20
arch/x86/include/asm/tlbflush.h | 8
arch/x86/include/uapi/asm/Kbuild | 1
arch/x86/include/uapi/asm/mce.h | 2
arch/x86/kernel/cpu/bugs.c | 657 +++++++++++++++++----
arch/x86/kernel/cpu/common.c | 139 ++--
arch/x86/kernel/cpu/intel.c | 11
arch/x86/kernel/cpu/mcheck/mce.c | 4
arch/x86/kernel/cpu/microcode/amd.c | 22
arch/x86/kernel/cpu/microcode/intel.c | 70 +-
arch/x86/kernel/nmi.c | 4
arch/x86/kernel/process.c | 101 ++-
arch/x86/kernel/process.h | 39 +
arch/x86/kernel/process_32.c | 9
arch/x86/kernel/process_64.c | 9
arch/x86/kernel/traps.c | 8
arch/x86/kernel/tsc.c | 2
arch/x86/kvm/cpuid.c | 13
arch/x86/kvm/cpuid.h | 2
arch/x86/kvm/svm.c | 2
arch/x86/kvm/vmx.c | 7
arch/x86/mm/init.c | 2
arch/x86/mm/kaiser.c | 4
arch/x86/mm/pgtable.c | 6
arch/x86/mm/tlb.c | 114 ++-
arch/x86/platform/atom/punit_atom_debug.c | 4
drivers/acpi/acpi_lpss.c | 2
drivers/base/cpu.c | 8
drivers/cpufreq/intel_pstate.c | 2
drivers/idle/intel_idle.c | 14
drivers/mmc/host/sdhci-acpi.c | 2
drivers/pci/pci-mid.c | 4
drivers/powercap/intel_rapl.c | 8
drivers/thermal/intel_soc_dts_thermal.c | 2
include/linux/bitops.h | 21
include/linux/bits.h | 26
include/linux/cpu.h | 26
include/linux/ptrace.h | 21
include/linux/sched.h | 9
include/linux/sched/smt.h | 20
include/uapi/linux/prctl.h | 1
kernel/cpu.c | 29
kernel/ptrace.c | 10
kernel/sched/core.c | 19
kernel/sched/sched.h | 1
tools/power/x86/turbostat/Makefile | 2
74 files changed, 2662 insertions(+), 1021 deletions(-)
Andi Kleen (3):
x86/speculation/mds: Add basic bug infrastructure for MDS
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
x86/cpu/bugs: Use __initconst for 'const' init data
Ashok Raj (1):
x86/microcode/intel: Check microcode revision before updating sibling threads
Ben Hutchings (2):
x86/cpufeatures: Hide AMD-specific speculation flags
sched: Add sched_smt_active()
Boris Ostrovsky (1):
x86/speculation/mds: Fix comment
Borislav Petkov (1):
x86/microcode/intel: Add a helper which gives the microcode revision
Dominik Brodowski (1):
x86/speculation: Simplify the CPU bug detection logic
Eduardo Habkost (1):
kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
Filippo Sironi (1):
x86/microcode: Update the new microcode revision unconditionally
Greg Kroah-Hartman (1):
Linux 4.9.176
Jiang Biao (1):
x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
Jiri Kosina (3):
x86/speculation: Apply IBPB more strictly to avoid cross-process data leak
x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
x86/speculation: Propagate information about RSB filling mitigation to sysfs
Josh Poimboeuf (7):
x86/speculation/mds: Add mds=full,nosmt cmdline option
x86/speculation: Move arch_smt_update() call to after mitigation decisions
x86/speculation/mds: Add SMT warning message
cpu/speculation: Add 'mitigations=' cmdline option
x86/speculation: Support 'mitigations=' cmdline option
x86/speculation/mds: Add 'mitigations=' support for MDS
x86/speculation/mds: Fix documentation typo
Konrad Rzeszutek Wilk (4):
x86/bugs: Add AMD's variant of SSB_NO
x86/bugs: Add AMD's SPEC_CTRL MSR usage
x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
Matthias Kaehlcke (1):
bitops: avoid integer overflow in GENMASK(_ULL)
Michal Hocko (1):
x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off
Nadav Amit (1):
x86/mm: Use WRITE_ONCE() when setting PTEs
Nicolas Dichtel (1):
x86: stop exporting msr-index.h to userland
Peter Zijlstra (1):
x86/cpu: Sanitize FAM6_ATOM naming
Prarit Bhargava (1):
x86/microcode: Make sure boot_cpu_data.microcode is up-to-date
Salvatore Bonaccorso (1):
Documentation/l1tf: Fix small spelling typo
Thomas Gleixner (31):
x86/speculation: Rename SSBD update functions
x86/Kconfig: Select SCHED_SMT if SMP enabled
x86/speculation: Rework SMT state change
x86/l1tf: Show actual SMT state
x86/speculation: Reorder the spec_v2 code
x86/speculation: Mark string arrays const correctly
x86/speculataion: Mark command line parser data __initdata
x86/speculation: Unify conditional spectre v2 print functions
x86/speculation: Add command line control for indirect branch speculation
x86/process: Consolidate and simplify switch_to_xtra() code
x86/speculation: Avoid __switch_to_xtra() calls
x86/speculation: Prepare for conditional IBPB in switch_mm()
x86/speculation: Split out TIF update
x86/speculation: Prepare arch_smt_update() for PRCTL mode
x86/speculation: Prevent stale SPEC_CTRL msr content
x86/speculation: Add prctl() control for indirect branch speculation
x86/speculation: Enable prctl mode for spectre_v2_user
x86/speculation: Add seccomp Spectre v2 user space protection mode
x86/speculation: Provide IBPB always command line options
x86/msr-index: Cleanup bit defines
x86/speculation: Consolidate CPU whitelists
x86/speculation/mds: Add BUG_MSBDS_ONLY
x86/speculation/mds: Add mds_clear_cpu_buffers()
x86/speculation/mds: Clear CPU buffers on exit to user
x86/kvm/vmx: Add MDS protection when L1D Flush is not active
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
x86/speculation/mds: Add mitigation control for MDS
x86/speculation/mds: Add sysfs reporting for MDS
x86/speculation/mds: Add mitigation mode VMWERV
Documentation: Move L1TF to separate directory
Documentation: Add MDS vulnerability documentation
Tim Chen (7):
x86/speculation: Update the TIF_SSBD comment
x86/speculation: Clean up spectre_v2_parse_cmdline()
x86/speculation: Remove unnecessary ret variable in cpu_show_common()
x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()
x86/speculation: Disable STIBP when enhanced IBRS is in use
x86/speculation: Reorganize speculation control MSRs update
x86/speculation: Prepare for per task indirect branch speculation control
Tom Lendacky (1):
x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
Tony Luck (1):
x86/MCE: Save microcode revision in machine check records
Tyler Hicks (1):
Documentation: Correct the possible MDS sysfs values
Will Deacon (1):
locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
speck for Pawan Gupta (1):
x86/mds: Add MDSUM variant to the MDS documentation
Attachment:
signature.asc
Description: PGP signature