[linux-yocto] [Yocto kernel 4.1 pull request]
akuster808
akuster808 at gmail.com
Tue Mar 6 06:45:12 PST 2018
On 03/05/2018 10:51 AM, Bruce Ashfield wrote:
> On 2018-03-04 7:34 PM, Armin Kuster wrote:
>> This series includes the lsb runqemu kvm boot issue [ Yocto #12570 ],
>> Spectre v1 and misc bug fixes 4.4 backports.
>>
>> The following changes since commit
>> 1368b7448d693cedb384f6e0b9a0237adb1b8259:
>>
>> kaiser: x86: Fix NMI handling (2018-02-22 12:18:09 -0800)
>>
>> are available in the git repository at:
>>
>>
>> https://github.com/MontaVista-OpenSourceTechnology/linux-nonlts-secfix
>> linux-4.1.y-lts
>
> I'm getting conflicts when I try and merge this into linux-yocto-4.1
> standard/base
> yow-bashfiel-d4 [/home/bruc...to-4.1.git]> git merge linux-4.1.y-lts
I just noticed this. "git merge" wont work.
We had our metldown changes in before the sync to 4.1.49 so the order is
off. You will need to cherry-pick.
I doubled checked via:
git checkout standard/base
git fetch
https://github.com/MontaVista-OpenSourceTechnology/linux-nonlts-secfix
linux-4.1.y-lts
git cherry-pick 07369b8
git cherry-pick 07369b8..ee7eeb3
sorry for making things more complicated.
- armin
> Auto-merging mm/vmstat.c
> Auto-merging mm/mmap.c
> Auto-merging kernel/module.c
> Auto-merging include/linux/cred.h
> Auto-merging arch/x86/mm/kaiser.c
> CONFLICT (add/add): Merge conflict in arch/x86/mm/kaiser.c
> Auto-merging arch/x86/mm/init.c
> Auto-merging arch/x86/lib/checksum_32.S
> Auto-merging arch/x86/kvm/x86.c
> Auto-merging arch/x86/kvm/vmx.c
> Auto-merging arch/x86/kernel/entry_64.S
> CONFLICT (content): Merge conflict in arch/x86/kernel/entry_64.S
> Auto-merging arch/x86/kernel/entry_32.S
> Auto-merging arch/x86/kernel/cpu/common.c
> Removing arch/x86/kernel/cpu/bugs_64.c
> Auto-merging arch/x86/kernel/cpu/bugs.c
> Auto-merging arch/x86/include/uapi/asm/msr-index.h
> Auto-merging arch/x86/include/asm/processor.h
> Auto-merging arch/x86/include/asm/kaiser.h
> CONFLICT (add/add): Merge conflict in arch/x86/include/asm/kaiser.h
> Auto-merging arch/x86/include/asm/cpufeature.h
> Auto-merging arch/x86/Makefile
> Auto-merging Documentation/kernel-parameters.txt
> CONFLICT (content): Merge conflict in Documentation/kernel-parameters.txt
> Recorded preimage for 'Documentation/kernel-parameters.txt'
> Recorded preimage for 'arch/x86/include/asm/kaiser.h'
> Recorded preimage for 'arch/x86/kernel/entry_64.S'
> Recorded preimage for 'arch/x86/mm/kaiser.c'
> Automatic merge failed; fix conflicts and then commit the result.
> yow-bashfiel-d4 [/home/bruc...to-4.1.git]>
>
> Judging by the conflicts, it looks like the first round of Meltdown
> fixes are being merged twice .. i.e. git isn't picking them up as the
> same commits.
>
> In case I'm doing something odd (I'm merging a LOT of kernel changes
> today). Can you look at this and see if you see the same thing ?
>
> Bruce
>
>>
>> for you to fetch changes up to ee7eeb3742f1a024b30ebcf98525871cad5a328c:
>>
>> x86/vdso: Get pvclock data from the vvar VMA instead of the fixmap
>> (2018-03-01 15:14:04 -0800)
>>
>> ----------------------------------------------------------------
>> Adam Borowski (1):
>> x86/kbuild: enable modversions for symbols exported from asm
>>
>> Al Viro (1):
>> EXPORT_SYMBOL() for asm
>>
>> Alexey Dobriyan (1):
>> proc: much faster /proc/vmstat
>>
>> Andi Kleen (3):
>> x86/retpoline/irq32: Convert assembler indirect jumps
>> module: Add retpoline tag to VERMAGIC
>> x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
>>
>> Andrew Honig (1):
>> KVM: x86: Add memory barrier on vmcs field lookup
>>
>> Andrey Ryabinin (7):
>> mm/page-writeback: fix dirty_ratelimit calculation
>> x86/asm: Use register variable to get stack pointer value
>> x86/kasan: Add message about KASAN being initialized
>> x86/kasan, mm: Introduce generic kasan_populate_zero_shadow()
>> x86/kasan: Fix boot with KASAN=y and PROFILE_ANNOTATED_BRANCHES=y
>> x86/kasan: Clear kasan_zero_page after TLB flush
>> x86/kasan: Write protect kasan zero shadow
>>
>> Andy Lutomirski (8):
>> x86/cpu: Factor out application of forced CPU caps
>> selftests/x86: Add test_vsyscall
>> x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
>> x86/asm: Make asm/alternative.h safe from assembly
>> x86/asm: Re-add parts of the manual CFI infrastructure
>> x86/asm/32: Make sync_core() handle missing CPUID on all
>> 32-bit kernels
>> x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader
>> x86/vdso: Get pvclock data from the vvar VMA instead of the
>> fixmap
>>
>> Ani Sinha (1):
>> sysrq: Fix warning in sysrq generated crash.
>>
>> Arnd Bergmann (1):
>> gcov: disable for COMPILE_TEST
>>
>> Ben Hutchings (2):
>> x86/microcode/intel: Fix BDW late-loading revision check
>> vsyscall: Fix permissions for emulate mode with KAISER/PTI
>>
>> Borislav Petkov (3):
>> Map the vsyscall page with _PAGE_USER
>> x86/cpu: Merge bugs.c and bugs_64.c
>> x86/alternatives: Fix optimize_nops() checking
>>
>> Dave Hansen (3):
>> x86/Documentation: Add PTI description
>> x86/cpu/intel: Introduce macros for Intel family numbers
>> x86/pti: Make unpoison of pgd for trusted boot work for real
>>
>> David Woodhouse (13):
>> x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
>> sysfs/cpu: Fix typos in vulnerability documentation
>> x86/alternatives: Add missing '\n' at end of ALTERNATIVE
>> inline asm
>> x86/retpoline: Add initial retpoline support
>> x86/spectre: Add boot time option to select Spectre v2 mitigation
>> x86/retpoline/crypto: Convert crypto assembler indirect jumps
>> x86/retpoline/entry: Convert entry assembler indirect jumps
>> x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
>> x86/retpoline/hyperv: Convert assembler indirect jumps
>> x86/retpoline/xen: Convert Xen hypercall indirect jumps
>> x86/retpoline/checksum32: Convert assembler indirect jumps
>> x86/retpoline: Fill return stack buffer on vmexit
>> x86/retpoline: Fill RSB on context switch for affected CPUs
>>
>> Eric Biggers (1):
>> x86/kaiser: fix build error with KASAN && !FUNCTION_GRAPH_TRACER
>>
>> Hugh Dickins (2):
>> kaiser: fix intel_bts perf crashes
>> kaiser: fix compile error without vsyscall
>>
>> Jeff Layton (1):
>> locks: don't check for race with close when setting OFD lock
>>
>> Jia Zhang (1):
>> x86/microcode/intel: Extend BDW late-loading with a revision
>> check
>>
>> Jim Mattson (1):
>> kvm: vmx: Scrub hardware GPRs at VM-exit
>>
>> Joe Lawrence (1):
>> pipe: avoid round_pipe_size() nr_pages overflow on 32-bit
>>
>> Joonsoo Kim (2):
>> mm/compaction: fix invalid free_pfn and compact_cached_free_pfn
>> mm/compaction: pass only pageblock aligned range to
>> pageblock_pfn_to_page
>>
>> Lepton Wu (1):
>> kaiser: Set _PAGE_NX only if supported
>>
>> Li Jinyue (1):
>> futex: Prevent overflow by strengthen input validation
>>
>> Libor Pechacek (1):
>> module: Issue warnings when tainting kernel
>>
>> Liran Alon (3):
>> KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation
>> failure
>> KVM: x86: Don't re-execute instruction when not passing CR2 value
>> KVM: nVMX: Fix races when sending nested PI while dest
>> enters/leaves L2
>>
>> Maciej W. Rozycki (7):
>> MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the
>> ABI of the task
>> MIPS: Factor out NT_PRFPREG regset access helpers
>> MIPS: Guard against any partial write attempt with
>> PTRACE_SETREGSET
>> MIPS: Consistently handle buffer counter with PTRACE_SETREGSET
>> MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA
>> MIPS: Also verify sizeof `elf_fpreg_t' with PTRACE_SETREGSET
>> MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset
>> accesses
>>
>> Marc Zyngier (1):
>> arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls
>>
>> Masahiro Yamada (1):
>> kconfig.h: use __is_defined() to check if MODULE is defined
>>
>> Masami Hiramatsu (3):
>> retpoline: Introduce start/end markers of indirect thunk
>> kprobes/x86: Blacklist indirect thunk functions for kprobes
>> kprobes/x86: Disable optimizing on the function jumps to
>> indirect thunk
>>
>> Michal Hocko (1):
>> mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
>>
>> Michal Marek (1):
>> genksyms: Handle string literals with spaces in reference files
>>
>> Miroslav Benes (1):
>> module: keep percpu symbols in module's symtab
>>
>> Nicholas Piggin (1):
>> kbuild: modversions for EXPORT_SYMBOL() for asm
>>
>> Oleg Nesterov (4):
>> kernel/acct.c: fix the acct->needcheck check in
>> check_free_space()
>> kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks
>> from SIGKILL
>> kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from
>> !sig_kernel_only() signals
>> kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE
>> check in complete_signal()
>>
>> Pavel Tatashin (1):
>> x86/pti/efi: broken conversion from efi to kernel page table
>>
>> Thiago Rafael Becker (1):
>> kernel: make groups_sort calling a responsibility group_info
>> allocators
>>
>> Thomas Gleixner (8):
>> x86/tlb: Drop the _GPL from the cpu_tlbstate export
>> x86/cpufeatures: Make CPU bugs sticky
>> x86/cpufeatures: Add X86_BUG_CPU_INSECURE
>> x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN
>> sysfs/cpu: Add vulnerability folder
>> x86/cpu: Implement CPU vulnerabilites sysfs functions
>> x86/retpoline: Remove compile time warning
>> x86/mce: Make machine check speculation protected
>>
>> Tom Lendacky (5):
>> x86/microcode/AMD: Add support for fam17h microcode loading
>> x86/cpu/AMD: Make LFENCE a serializing instruction
>> x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC
>> x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
>> x86/cpu, x86/pti: Do not enable PTI on AMD processors
>>
>> Vlastimil Babka (1):
>> fs/select: add vmalloc fallback for select(2)
>>
>> Wanpeng Li (2):
>> KVM: X86: Fix operand/address-size during instruction decoding
>> KVM: VMX: Fix rflags cache during vCPU reset
>>
>> zhenwei.pi (1):
>> x86/pti: Document fix wrong index
>>
>> Documentation/ABI/testing/sysfs-devices-system-cpu | 16 +
>> Documentation/kernel-parameters.txt | 49 +-
>> Documentation/x86/pti.txt | 186 ++++++++
>> arch/arm64/kvm/handle_exit.c | 4 +-
>> arch/mips/kernel/process.c | 12 +
>> arch/mips/kernel/ptrace.c | 147 ++++--
>> arch/s390/kernel/compat_linux.c | 1 +
>> arch/x86/Kconfig | 14 +
>> arch/x86/Makefile | 18 +-
>> arch/x86/crypto/aesni-intel_asm.S | 5 +-
>> arch/x86/crypto/camellia-aesni-avx-asm_64.S | 3 +-
>> arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 3 +-
>> arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 3 +-
>> arch/x86/include/asm/alternative.h | 8 +-
>> arch/x86/include/asm/asm-prototypes.h | 41 ++
>> arch/x86/include/asm/asm.h | 11 +
>> arch/x86/include/asm/cpufeature.h | 8 +
>> arch/x86/include/asm/dwarf2.h | 170 +++++++
>> arch/x86/include/asm/intel-family.h | 68 +++
>> arch/x86/include/asm/kaiser.h | 10 +
>> arch/x86/include/asm/kvm_host.h | 3 +-
>> arch/x86/include/asm/nospec-branch.h | 198 ++++++++
>> arch/x86/include/asm/processor.h | 6 +-
>> arch/x86/include/asm/pvclock.h | 9 +
>> arch/x86/include/asm/switch_to.h | 38 ++
>> arch/x86/include/asm/thread_info.h | 11 -
>> arch/x86/include/asm/traps.h | 1 +
>> arch/x86/include/asm/vdso.h | 1 +
>> arch/x86/include/asm/vsyscall.h | 3 +
>> arch/x86/include/asm/xen/hypercall.h | 5 +-
>> arch/x86/include/uapi/asm/msr-index.h | 3 +
>> arch/x86/kernel/alternative.c | 7 +-
>> arch/x86/kernel/cpu/Makefile | 4 +-
>> arch/x86/kernel/cpu/amd.c | 28 +-
>> arch/x86/kernel/cpu/bugs.c | 255 ++++++++++-
>> arch/x86/kernel/cpu/bugs_64.c | 33 --
>> arch/x86/kernel/cpu/common.c | 45 +-
>> arch/x86/kernel/cpu/mcheck/mce.c | 5 +
>> arch/x86/kernel/cpu/microcode/amd.c | 4 +
>> arch/x86/kernel/cpu/microcode/intel.c | 13 +-
>> arch/x86/kernel/cpu/perf_event_intel_bts.c | 44 +-
>> arch/x86/kernel/entry_32.S | 11 +-
>> arch/x86/kernel/entry_64.S | 16 +-
>> arch/x86/kernel/head64.c | 1 +
>> arch/x86/kernel/irq_32.c | 15 +-
>> arch/x86/kernel/kprobes/opt.c | 23 +-
>> arch/x86/kernel/kvmclock.c | 5 +
>> arch/x86/kernel/mcount_64.S | 13 +-
>> arch/x86/kernel/tboot.c | 10 +
>> arch/x86/kernel/traps.c | 2 +-
>> arch/x86/kernel/vmlinux.lds.S | 7 +
>> arch/x86/kernel/vsyscall_64.c | 14 +-
>> arch/x86/kvm/emulate.c | 7 +
>> arch/x86/kvm/svm.c | 23 +
>> arch/x86/kvm/vmx.c | 39 +-
>> arch/x86/kvm/x86.c | 2 +-
>> arch/x86/lib/Makefile | 1 +
>> arch/x86/lib/checksum_32.S | 7 +-
>> arch/x86/lib/retpoline.S | 49 ++
>> arch/x86/mm/init.c | 2 +-
>> arch/x86/mm/kaiser.c | 38 +-
>> arch/x86/mm/kasan_init_64.c | 142 +-----
>> arch/x86/realmode/init.c | 4 +-
>> arch/x86/realmode/rm/trampoline_64.S | 3 +-
>> arch/x86/vdso/vclock_gettime.c | 101 +++--
>> arch/x86/vdso/vdso-layout.lds.S | 3 +-
>> arch/x86/vdso/vdso2c.c | 3 +
>> arch/x86/vdso/vma.c | 13 +
>> drivers/base/Kconfig | 3 +
>> drivers/base/cpu.c | 48 ++
>> drivers/hv/hv.c | 11 +-
>> drivers/tty/sysrq.c | 6 +
>> fs/locks.c | 16 +-
>> fs/nfsd/auth.c | 3 +
>> fs/pipe.c | 18 +-
>> fs/select.c | 14 +-
>> include/asm-generic/asm-prototypes.h | 7 +
>> include/asm-generic/export.h | 94 ++++
>> include/linux/cpu.h | 8 +
>> include/linux/cred.h | 1 +
>> include/linux/kasan.h | 9 +
>> include/linux/kconfig.h | 11 +-
>> include/linux/vermagic.h | 8 +-
>> kernel/acct.c | 2 +-
>> kernel/futex.c | 3 +
>> kernel/gcov/Kconfig | 1 +
>> kernel/groups.c | 5 +-
>> kernel/module.c | 26 +-
>> kernel/signal.c | 18 +-
>> kernel/uid16.c | 1 +
>> mm/compaction.c | 51 ++-
>> mm/kasan/Makefile | 2 +-
>> mm/kasan/kasan_init.c | 152 +++++++
>> mm/mmap.c | 6 +-
>> mm/page-writeback.c | 11 +-
>> mm/vmstat.c | 4 +-
>> net/sunrpc/auth_gss/gss_rpc_xdr.c | 1 +
>> net/sunrpc/auth_gss/svcauth_gss.c | 1 +
>> net/sunrpc/svcauth_unix.c | 2 +
>> scripts/Makefile.build | 87 +++-
>> scripts/genksyms/genksyms.c | 6 +-
>> tools/testing/selftests/x86/Makefile | 3 +-
>> tools/testing/selftests/x86/test_vsyscall.c | 500
>> +++++++++++++++++++++
>> 103 files changed, 2771 insertions(+), 415 deletions(-)
>> create mode 100644 Documentation/x86/pti.txt
>> create mode 100644 arch/x86/include/asm/asm-prototypes.h
>> create mode 100644 arch/x86/include/asm/dwarf2.h
>> create mode 100644 arch/x86/include/asm/intel-family.h
>> create mode 100644 arch/x86/include/asm/nospec-branch.h
>> delete mode 100644 arch/x86/kernel/cpu/bugs_64.c
>> create mode 100644 arch/x86/lib/retpoline.S
>> create mode 100644 include/asm-generic/asm-prototypes.h
>> create mode 100644 include/asm-generic/export.h
>> create mode 100644 mm/kasan/kasan_init.c
>> create mode 100644 tools/testing/selftests/x86/test_vsyscall.c
>>
>
More information about the linux-yocto
mailing list