From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5538AC433EF for ; Thu, 16 Jun 2022 03:29:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1358391AbiFPD3E (ORCPT ); Wed, 15 Jun 2022 23:29:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51702 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1350046AbiFPD3C (ORCPT ); Wed, 15 Jun 2022 23:29:02 -0400 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5539859314; Wed, 15 Jun 2022 20:29:02 -0700 (PDT) Received: from sequoia (162-237-133-238.lightspeed.rcsntx.sbcglobal.net [162.237.133.238]) by linux.microsoft.com (Postfix) with ESMTPSA id 2B1DC20C3274; Wed, 15 Jun 2022 20:29:01 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 2B1DC20C3274 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1655350142; bh=7jSOC8VzgCsTBmwkshQmXqH9l66nAl3pOVDxXncaRcg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=NJ8fX7QfMRhBXjwYnEXebBqMVzfaFOhhtloDr2PjXQW1ZhCFRIEPAeokFWBgXS8uF tgqs8x0vIX/jm1rkq48rclGw6pr4iURLIVi7rH0baVPcUXl2YR0kj1F4KDOQ0mOmZ5 jRrm7+5x0PmpXU4FTXD+iW2eVEl1Xyfq2L51p9cs= Date: Wed, 15 Jun 2022 22:28:58 -0500 From: Tyler Hicks To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, slade@sladewatkins.com Subject: Re: [PATCH 5.10 00/11] 5.10.123-rc1 review Message-ID: <20220616032858.GB396338@sequoia> References: <20220614183719.878453780@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220614183719.878453780@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-06-14 20:40:22, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 5.10.123 release. > There are 11 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu, 16 Jun 2022 18:37:02 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.123-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y > and the diffstat can be found below. > > thanks, > > greg k-h Hi Greg - I successfully tested this release candidate in x86_64 Hyper-V Azure VMs with speculation controls both enabled and disabled. Speculation controls are passed through to the guest and, of particular interest for this release candidate, set the FB_CLEAR bit in the IA32_ARCH_CAPABILITIES MSR. The FB_CLEAR bit's presence is accurately conveyed in the kernel log messages during boot and in the /sys/devices/system/cpu/vulnerabilities/mmio_stale_data file. I did a full LTP run in both scenarios (the results were the same) and also compared the results to a previous run against the v5.10.118 release (there were no regressions). Tested-by: Tyler Hicks Tyler