On 2018-03-04 7:34 PM, Armin Kuster wrote:
This series includes the lsb runqemu kvm boot issue [ Yocto #12570 ],
Spectre v1 and misc bug fixes 4.4 backports.

The following changes since commit 1368b7448d693cedb384f6e0b9a0237adb1b8259:

   kaiser: x86: Fix NMI handling (2018-02-22 12:18:09 -0800)

are available in the git repository at:

   https://github.com/MontaVista-OpenSourceTechnology/linux-nonlts-secfix 
linux-4.1.y-lts

I'm getting conflicts when I try and merge this into linux-yocto-4.1 standard/base

yow-bashfiel-d4 [/home/bruc...to-4.1.git]> git merge   linux-4.1.y-lts
Auto-merging mm/vmstat.c
Auto-merging mm/mmap.c
Auto-merging kernel/module.c
Auto-merging include/linux/cred.h
Auto-merging arch/x86/mm/kaiser.c
CONFLICT (add/add): Merge conflict in arch/x86/mm/kaiser.c
Auto-merging arch/x86/mm/init.c
Auto-merging arch/x86/lib/checksum_32.S
Auto-merging arch/x86/kvm/x86.c
Auto-merging arch/x86/kvm/vmx.c
Auto-merging arch/x86/kernel/entry_64.S
CONFLICT (content): Merge conflict in arch/x86/kernel/entry_64.S
Auto-merging arch/x86/kernel/entry_32.S
Auto-merging arch/x86/kernel/cpu/common.c
Removing arch/x86/kernel/cpu/bugs_64.c
Auto-merging arch/x86/kernel/cpu/bugs.c
Auto-merging arch/x86/include/uapi/asm/msr-index.h
Auto-merging arch/x86/include/asm/processor.h
Auto-merging arch/x86/include/asm/kaiser.h
CONFLICT (add/add): Merge conflict in arch/x86/include/asm/kaiser.h
Auto-merging arch/x86/include/asm/cpufeature.h
Auto-merging arch/x86/Makefile
Auto-merging Documentation/kernel-parameters.txt
CONFLICT (content): Merge conflict in Documentation/kernel-parameters.txt
Recorded preimage for 'Documentation/kernel-parameters.txt'
Recorded preimage for 'arch/x86/include/asm/kaiser.h'
Recorded preimage for 'arch/x86/kernel/entry_64.S'
Recorded preimage for 'arch/x86/mm/kaiser.c'
Automatic merge failed; fix conflicts and then commit the result.
yow-bashfiel-d4 [/home/bruc...to-4.1.git]>

Judging by the conflicts, it looks like the first round of Meltdown
fixes are being merged twice .. i.e. git isn't picking them up as the
same commits.

In case I'm doing something odd (I'm merging a LOT of kernel changes
today). Can you look at this and see if you see the same thing ?

Bruce


for you to fetch changes up to ee7eeb3742f1a024b30ebcf98525871cad5a328c:

   x86/vdso: Get pvclock data from the vvar VMA instead of the fixmap 
(2018-03-01 15:14:04 -0800)

----------------------------------------------------------------
Adam Borowski (1):
       x86/kbuild: enable modversions for symbols exported from asm

Al Viro (1):
       EXPORT_SYMBOL() for asm

Alexey Dobriyan (1):
       proc: much faster /proc/vmstat

Andi Kleen (3):
       x86/retpoline/irq32: Convert assembler indirect jumps
       module: Add retpoline tag to VERMAGIC
       x86/retpoline: Optimize inline assembler for vmexit_fill_RSB

Andrew Honig (1):
       KVM: x86: Add memory barrier on vmcs field lookup

Andrey Ryabinin (7):
       mm/page-writeback: fix dirty_ratelimit calculation
       x86/asm: Use register variable to get stack pointer value
       x86/kasan: Add message about KASAN being initialized
       x86/kasan, mm: Introduce generic kasan_populate_zero_shadow()
       x86/kasan: Fix boot with KASAN=y and PROFILE_ANNOTATED_BRANCHES=y
       x86/kasan: Clear kasan_zero_page after TLB flush
       x86/kasan: Write protect kasan zero shadow

Andy Lutomirski (8):
       x86/cpu: Factor out application of forced CPU caps
       selftests/x86: Add test_vsyscall
       x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
       x86/asm: Make asm/alternative.h safe from assembly
       x86/asm: Re-add parts of the manual CFI infrastructure
       x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels
       x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader
       x86/vdso: Get pvclock data from the vvar VMA instead of the fixmap

Ani Sinha (1):
       sysrq: Fix warning in sysrq generated crash.

Arnd Bergmann (1):
       gcov: disable for COMPILE_TEST

Ben Hutchings (2):
       x86/microcode/intel: Fix BDW late-loading revision check
       vsyscall: Fix permissions for emulate mode with KAISER/PTI

Borislav Petkov (3):
       Map the vsyscall page with _PAGE_USER
       x86/cpu: Merge bugs.c and bugs_64.c
       x86/alternatives: Fix optimize_nops() checking

Dave Hansen (3):
       x86/Documentation: Add PTI description
       x86/cpu/intel: Introduce macros for Intel family numbers
       x86/pti: Make unpoison of pgd for trusted boot work for real

David Woodhouse (13):
       x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
       sysfs/cpu: Fix typos in vulnerability documentation
       x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
       x86/retpoline: Add initial retpoline support
       x86/spectre: Add boot time option to select Spectre v2 mitigation
       x86/retpoline/crypto: Convert crypto assembler indirect jumps
       x86/retpoline/entry: Convert entry assembler indirect jumps
       x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
       x86/retpoline/hyperv: Convert assembler indirect jumps
       x86/retpoline/xen: Convert Xen hypercall indirect jumps
       x86/retpoline/checksum32: Convert assembler indirect jumps
       x86/retpoline: Fill return stack buffer on vmexit
       x86/retpoline: Fill RSB on context switch for affected CPUs

Eric Biggers (1):
       x86/kaiser: fix build error with KASAN && !FUNCTION_GRAPH_TRACER

Hugh Dickins (2):
       kaiser: fix intel_bts perf crashes
       kaiser: fix compile error without vsyscall

Jeff Layton (1):
       locks: don't check for race with close when setting OFD lock

Jia Zhang (1):
       x86/microcode/intel: Extend BDW late-loading with a revision check

Jim Mattson (1):
       kvm: vmx: Scrub hardware GPRs at VM-exit

Joe Lawrence (1):
       pipe: avoid round_pipe_size() nr_pages overflow on 32-bit

Joonsoo Kim (2):
       mm/compaction: fix invalid free_pfn and compact_cached_free_pfn
       mm/compaction: pass only pageblock aligned range to pageblock_pfn_to_page

Lepton Wu (1):
       kaiser: Set _PAGE_NX only if supported

Li Jinyue (1):
       futex: Prevent overflow by strengthen input validation

Libor Pechacek (1):
       module: Issue warnings when tainting kernel

Liran Alon (3):
       KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure
       KVM: x86: Don't re-execute instruction when not passing CR2 value
       KVM: nVMX: Fix races when sending nested PI while dest enters/leaves L2

Maciej W. Rozycki (7):
       MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the 
task
       MIPS: Factor out NT_PRFPREG regset access helpers
       MIPS: Guard against any partial write attempt with PTRACE_SETREGSET
       MIPS: Consistently handle buffer counter with PTRACE_SETREGSET
       MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA
       MIPS: Also verify sizeof `elf_fpreg_t' with PTRACE_SETREGSET
       MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses

Marc Zyngier (1):
       arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls

Masahiro Yamada (1):
       kconfig.h: use __is_defined() to check if MODULE is defined

Masami Hiramatsu (3):
       retpoline: Introduce start/end markers of indirect thunk
       kprobes/x86: Blacklist indirect thunk functions for kprobes
       kprobes/x86: Disable optimizing on the function jumps to indirect thunk

Michal Hocko (1):
       mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack

Michal Marek (1):
       genksyms: Handle string literals with spaces in reference files

Miroslav Benes (1):
       module: keep percpu symbols in module's symtab

Nicholas Piggin (1):
       kbuild: modversions for EXPORT_SYMBOL() for asm

Oleg Nesterov (4):
       kernel/acct.c: fix the acct->needcheck check in check_free_space()
       kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
       kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from 
!sig_kernel_only() signals
       kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in 
complete_signal()

Pavel Tatashin (1):
       x86/pti/efi: broken conversion from efi to kernel page table

Thiago Rafael Becker (1):
       kernel: make groups_sort calling a responsibility group_info allocators

Thomas Gleixner (8):
       x86/tlb: Drop the _GPL from the cpu_tlbstate export
       x86/cpufeatures: Make CPU bugs sticky
       x86/cpufeatures: Add X86_BUG_CPU_INSECURE
       x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN
       sysfs/cpu: Add vulnerability folder
       x86/cpu: Implement CPU vulnerabilites sysfs functions
       x86/retpoline: Remove compile time warning
       x86/mce: Make machine check speculation protected

Tom Lendacky (5):
       x86/microcode/AMD: Add support for fam17h microcode loading
       x86/cpu/AMD: Make LFENCE a serializing instruction
       x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC
       x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
       x86/cpu, x86/pti: Do not enable PTI on AMD processors

Vlastimil Babka (1):
       fs/select: add vmalloc fallback for select(2)

Wanpeng Li (2):
       KVM: X86: Fix operand/address-size during instruction decoding
       KVM: VMX: Fix rflags cache during vCPU reset

zhenwei.pi (1):
       x86/pti: Document fix wrong index

  Documentation/ABI/testing/sysfs-devices-system-cpu |  16 +
  Documentation/kernel-parameters.txt                |  49 +-
  Documentation/x86/pti.txt                          | 186 ++++++++
  arch/arm64/kvm/handle_exit.c                       |   4 +-
  arch/mips/kernel/process.c                         |  12 +
  arch/mips/kernel/ptrace.c                          | 147 ++++--
  arch/s390/kernel/compat_linux.c                    |   1 +
  arch/x86/Kconfig                                   |  14 +
  arch/x86/Makefile                                  |  18 +-
  arch/x86/crypto/aesni-intel_asm.S                  |   5 +-
  arch/x86/crypto/camellia-aesni-avx-asm_64.S        |   3 +-
  arch/x86/crypto/camellia-aesni-avx2-asm_64.S       |   3 +-
  arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |   3 +-
  arch/x86/include/asm/alternative.h                 |   8 +-
  arch/x86/include/asm/asm-prototypes.h              |  41 ++
  arch/x86/include/asm/asm.h                         |  11 +
  arch/x86/include/asm/cpufeature.h                  |   8 +
  arch/x86/include/asm/dwarf2.h                      | 170 +++++++
  arch/x86/include/asm/intel-family.h                |  68 +++
  arch/x86/include/asm/kaiser.h                      |  10 +
  arch/x86/include/asm/kvm_host.h                    |   3 +-
  arch/x86/include/asm/nospec-branch.h               | 198 ++++++++
  arch/x86/include/asm/processor.h                   |   6 +-
  arch/x86/include/asm/pvclock.h                     |   9 +
  arch/x86/include/asm/switch_to.h                   |  38 ++
  arch/x86/include/asm/thread_info.h                 |  11 -
  arch/x86/include/asm/traps.h                       |   1 +
  arch/x86/include/asm/vdso.h                        |   1 +
  arch/x86/include/asm/vsyscall.h                    |   3 +
  arch/x86/include/asm/xen/hypercall.h               |   5 +-
  arch/x86/include/uapi/asm/msr-index.h              |   3 +
  arch/x86/kernel/alternative.c                      |   7 +-
  arch/x86/kernel/cpu/Makefile                       |   4 +-
  arch/x86/kernel/cpu/amd.c                          |  28 +-
  arch/x86/kernel/cpu/bugs.c                         | 255 ++++++++++-
  arch/x86/kernel/cpu/bugs_64.c                      |  33 --
  arch/x86/kernel/cpu/common.c                       |  45 +-
  arch/x86/kernel/cpu/mcheck/mce.c                   |   5 +
  arch/x86/kernel/cpu/microcode/amd.c                |   4 +
  arch/x86/kernel/cpu/microcode/intel.c              |  13 +-
  arch/x86/kernel/cpu/perf_event_intel_bts.c         |  44 +-
  arch/x86/kernel/entry_32.S                         |  11 +-
  arch/x86/kernel/entry_64.S                         |  16 +-
  arch/x86/kernel/head64.c                           |   1 +
  arch/x86/kernel/irq_32.c                           |  15 +-
  arch/x86/kernel/kprobes/opt.c                      |  23 +-
  arch/x86/kernel/kvmclock.c                         |   5 +
  arch/x86/kernel/mcount_64.S                        |  13 +-
  arch/x86/kernel/tboot.c                            |  10 +
  arch/x86/kernel/traps.c                            |   2 +-
  arch/x86/kernel/vmlinux.lds.S                      |   7 +
  arch/x86/kernel/vsyscall_64.c                      |  14 +-
  arch/x86/kvm/emulate.c                             |   7 +
  arch/x86/kvm/svm.c                                 |  23 +
  arch/x86/kvm/vmx.c                                 |  39 +-
  arch/x86/kvm/x86.c                                 |   2 +-
  arch/x86/lib/Makefile                              |   1 +
  arch/x86/lib/checksum_32.S                         |   7 +-
  arch/x86/lib/retpoline.S                           |  49 ++
  arch/x86/mm/init.c                                 |   2 +-
  arch/x86/mm/kaiser.c                               |  38 +-
  arch/x86/mm/kasan_init_64.c                        | 142 +-----
  arch/x86/realmode/init.c                           |   4 +-
  arch/x86/realmode/rm/trampoline_64.S               |   3 +-
  arch/x86/vdso/vclock_gettime.c                     | 101 +++--
  arch/x86/vdso/vdso-layout.lds.S                    |   3 +-
  arch/x86/vdso/vdso2c.c                             |   3 +
  arch/x86/vdso/vma.c                                |  13 +
  drivers/base/Kconfig                               |   3 +
  drivers/base/cpu.c                                 |  48 ++
  drivers/hv/hv.c                                    |  11 +-
  drivers/tty/sysrq.c                                |   6 +
  fs/locks.c                                         |  16 +-
  fs/nfsd/auth.c                                     |   3 +
  fs/pipe.c                                          |  18 +-
  fs/select.c                                        |  14 +-
  include/asm-generic/asm-prototypes.h               |   7 +
  include/asm-generic/export.h                       |  94 ++++
  include/linux/cpu.h                                |   8 +
  include/linux/cred.h                               |   1 +
  include/linux/kasan.h                              |   9 +
  include/linux/kconfig.h                            |  11 +-
  include/linux/vermagic.h                           |   8 +-
  kernel/acct.c                                      |   2 +-
  kernel/futex.c                                     |   3 +
  kernel/gcov/Kconfig                                |   1 +
  kernel/groups.c                                    |   5 +-
  kernel/module.c                                    |  26 +-
  kernel/signal.c                                    |  18 +-
  kernel/uid16.c                                     |   1 +
  mm/compaction.c                                    |  51 ++-
  mm/kasan/Makefile                                  |   2 +-
  mm/kasan/kasan_init.c                              | 152 +++++++
  mm/mmap.c                                          |   6 +-
  mm/page-writeback.c                                |  11 +-
  mm/vmstat.c                                        |   4 +-
  net/sunrpc/auth_gss/gss_rpc_xdr.c                  |   1 +
  net/sunrpc/auth_gss/svcauth_gss.c                  |   1 +
  net/sunrpc/svcauth_unix.c                          |   2 +
  scripts/Makefile.build                             |  87 +++-
  scripts/genksyms/genksyms.c                        |   6 +-
  tools/testing/selftests/x86/Makefile               |   3 +-
  tools/testing/selftests/x86/test_vsyscall.c        | 500 +++++++++++++++++++++
  103 files changed, 2771 insertions(+), 415 deletions(-)
  create mode 100644 Documentation/x86/pti.txt
  create mode 100644 arch/x86/include/asm/asm-prototypes.h
  create mode 100644 arch/x86/include/asm/dwarf2.h
  create mode 100644 arch/x86/include/asm/intel-family.h
  create mode 100644 arch/x86/include/asm/nospec-branch.h
  delete mode 100644 arch/x86/kernel/cpu/bugs_64.c
  create mode 100644 arch/x86/lib/retpoline.S
  create mode 100644 include/asm-generic/asm-prototypes.h
  create mode 100644 include/asm-generic/export.h
  create mode 100644 mm/kasan/kasan_init.c
  create mode 100644 tools/testing/selftests/x86/test_vsyscall.c


--
_______________________________________________
linux-yocto mailing list
linux-yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/linux-yocto

Reply via email to