Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull spectre/meltdown updates from Thomas Gleixner: "The next round of updates related to melted spectrum: - The initial set of spectre V1 mitigations: - Array index speculation blocker and its usage for syscall, fdtable and the n180211 driver. - Speculation barrier and its usage in user access functions - Make indirect calls in KVM speculation safe - Blacklisting of known to be broken microcodes so IPBP/IBSR are not touched. - The initial IBPB support and its usage in context switch - The exposure of the new speculation MSRs to KVM guests. - A fix for a regression in x86/32 related to the cpu entry area - Proper whitelisting for known to be safe CPUs from the mitigations. - objtool fixes to deal proper with retpolines and alternatives - Exclude __init functions from retpolines which speeds up the boot process. - Removal of the syscall64 fast path and related cleanups and simplifications - Removal of the unpatched paravirt mode which is yet another source of indirect unproteced calls. - A new and undisputed version of the module mismatch warning - A couple of cleanup and correctness fixes all over the place Yet another step towards full mitigation. There are a few things still missing like the RBS underflow mitigation for Skylake and other small details, but that's being worked on. That said, I'm taking a belated christmas vacation for a week and hope that everything is magically solved when I'm back on Feb 12th" * 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (37 commits) KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES KVM/x86: Add IBPB support KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL x86/pti: Mark constant arrays as __initconst x86/spectre: Simplify spectre_v2 command line parsing x86/retpoline: Avoid retpolines for built-in __init functions x86/kvm: Update spectre-v1 mitigation KVM: VMX: make MSR bitmaps per-VCPU x86/paravirt: Remove 'noreplace-paravirt' cmdline option x86/speculation: Use Indirect Branch Prediction Barrier in context switch x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" x86/spectre: Report get_user mitigation for spectre_v1 nl80211: Sanitize array index in parse_txq_params vfs, fdtable: Prevent bounds-check bypass via speculative execution x86/syscall: Sanitize syscall table de-references under speculation x86/get_user: Use pointer masking to limit speculation ...
No related branches found
No related tags found
Showing
- Documentation/admin-guide/kernel-parameters.txt 0 additions, 2 deletionsDocumentation/admin-guide/kernel-parameters.txt
- Documentation/speculation.txt 90 additions, 0 deletionsDocumentation/speculation.txt
- arch/x86/entry/common.c 6 additions, 3 deletionsarch/x86/entry/common.c
- arch/x86/entry/entry_64.S 7 additions, 120 deletionsarch/x86/entry/entry_64.S
- arch/x86/entry/syscall_64.c 2 additions, 5 deletionsarch/x86/entry/syscall_64.c
- arch/x86/include/asm/barrier.h 28 additions, 0 deletionsarch/x86/include/asm/barrier.h
- arch/x86/include/asm/fixmap.h 4 additions, 2 deletionsarch/x86/include/asm/fixmap.h
- arch/x86/include/asm/msr.h 1 addition, 2 deletionsarch/x86/include/asm/msr.h
- arch/x86/include/asm/nospec-branch.h 1 addition, 1 deletionarch/x86/include/asm/nospec-branch.h
- arch/x86/include/asm/pgtable_32_types.h 3 additions, 2 deletionsarch/x86/include/asm/pgtable_32_types.h
- arch/x86/include/asm/processor.h 0 additions, 2 deletionsarch/x86/include/asm/processor.h
- arch/x86/include/asm/syscall.h 3 additions, 3 deletionsarch/x86/include/asm/syscall.h
- arch/x86/include/asm/thread_info.h 2 additions, 1 deletionarch/x86/include/asm/thread_info.h
- arch/x86/include/asm/tlbflush.h 2 additions, 0 deletionsarch/x86/include/asm/tlbflush.h
- arch/x86/include/asm/uaccess.h 12 additions, 3 deletionsarch/x86/include/asm/uaccess.h
- arch/x86/include/asm/uaccess_32.h 3 additions, 3 deletionsarch/x86/include/asm/uaccess_32.h
- arch/x86/include/asm/uaccess_64.h 6 additions, 6 deletionsarch/x86/include/asm/uaccess_64.h
- arch/x86/kernel/alternative.c 0 additions, 14 deletionsarch/x86/kernel/alternative.c
- arch/x86/kernel/cpu/bugs.c 61 additions, 35 deletionsarch/x86/kernel/cpu/bugs.c
- arch/x86/kernel/cpu/common.c 23 additions, 2 deletionsarch/x86/kernel/cpu/common.c
Loading
Please register or sign in to comment