From: Ingo Molnar <mingo@kernel.org>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: linux-kernel@vger.kernel.org,
Thomas Gleixner <tglx@linutronix.de>,
Borislav Petkov <bp@alien8.de>, Andy Lutomirski <luto@kernel.org>,
Peter Zijlstra <a.p.zijlstra@chello.nl>,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
Andrew Morton <akpm@linux-foundation.org>
Subject: [GIT PULL] x86/pti changes for v4.20
Date: Tue, 23 Oct 2018 14:29:11 +0200 [thread overview]
Message-ID: <20181023122911.GA48335@gmail.com> (raw)
Linus,
Please pull the latest x86-pti-for-linus git tree from:
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86-pti-for-linus
# HEAD: bb4b3b7762735cdaba5a40fd94c9303d9ffa147a x86/speculation: Propagate information about RSB filling mitigation to sysfs
The main changes:
- Make the IBPB barrier more strict and add STIBP support (Jiri Kosina)
- Micro-optimize and clean up the entry code (Andy Lutomirski)
- ... plus misc other fixes.
Thanks,
Ingo
out-of-topic modifications in x86-pti-for-linus:
--------------------------------------------------
include/linux/ptrace.h # dbfe2953f63c: x86/speculation: Apply IBPB
kernel/cpu.c # 53c613fe6349: x86/speculation: Enable cros
kernel/ptrace.c # dbfe2953f63c: x86/speculation: Apply IBPB
------------------>
Andy Lutomirski (3):
x86/entry/64: Document idtentry
x86/entry/64: Use the TSS sp2 slot for SYSCALL/SYSRET scratch space
x86/pti/64: Remove the SYSCALL64 entry trampoline
Jiri Kosina (3):
x86/speculation: Apply IBPB more strictly to avoid cross-process data leak
x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
x86/speculation: Propagate information about RSB filling mitigation to sysfs
Zhenzhong Duan (1):
x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant
zhong jiang (1):
x86/CPU: Fix unused variable warning when !CONFIG_IA32_EMULATION
arch/x86/entry/entry_64.S | 117 +++++++++++++---------------------
arch/x86/include/asm/cpu_entry_area.h | 2 -
arch/x86/include/asm/nospec-branch.h | 17 +++--
arch/x86/include/asm/processor.h | 6 ++
arch/x86/include/asm/sections.h | 1 -
arch/x86/kernel/asm-offsets.c | 5 +-
arch/x86/kernel/cpu/bugs.c | 58 +++++++++++++++--
arch/x86/kernel/cpu/common.c | 16 +----
arch/x86/kernel/kprobes/core.c | 10 +--
arch/x86/kernel/process_64.c | 2 -
arch/x86/kernel/traps.c | 4 ++
arch/x86/kernel/vmlinux.lds.S | 10 ---
arch/x86/mm/cpu_entry_area.c | 36 -----------
arch/x86/mm/pti.c | 33 +++++++++-
arch/x86/mm/tlb.c | 31 +++++----
arch/x86/xen/xen-asm_64.S | 8 ++-
include/linux/ptrace.h | 21 +++++-
kernel/cpu.c | 11 +++-
kernel/ptrace.c | 10 +++
19 files changed, 222 insertions(+), 176 deletions(-)
reply other threads:[~2018-10-23 12:29 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20181023122911.GA48335@gmail.com \
--to=mingo@kernel.org \
--cc=a.p.zijlstra@chello.nl \
--cc=akpm@linux-foundation.org \
--cc=bp@alien8.de \
--cc=gregkh@linuxfoundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@kernel.org \
--cc=tglx@linutronix.de \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox