kernel-5.18.11-100

* Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0]
- x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner)
- x86/speculation: Disable RRSBA behavior (Pawan Gupta)
- x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk)
- x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo)
- x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra)
- x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta)
- x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra)
- x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper)
- x86/common: Stamp out the stepping madness (Peter Zijlstra)
- KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf)
- x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf)
- KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf)
- KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf)
- KVM: VMX: Convert launched argument to flags (Josh Poimboeuf)
- KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf)
- objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf)
- x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf)
- x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf)
- x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf)
- x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf)
- x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf)
- x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra)
- objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo)
- x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf)
- x86/bugs: Add retbleed=ibpb (Peter Zijlstra)
- x86/xen: Add UNTRAIN_RET (Peter Zijlstra)
- x86/xen: Rename SYS* entry points (Peter Zijlstra)
- objtool: Update Retpoline validation (Peter Zijlstra)
- intel_idle: Disable IBRS during long idle (Peter Zijlstra)
- x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra)
- x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra)
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta)
- x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra)
- x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo)
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra)
- x86/bugs: Enable STIBP for JMP2RET (Kim Phillips)
- x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre)
- x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre)
- x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo)
- objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra)
- x86/entry: Avoid very early RET (Peter Zijlstra)
- x86: Use return-thunk in asm code (Peter Zijlstra)
- x86/sev: Avoid using __x86_return_thunk (Kim Phillips)
- x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra)
- x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra)
- x86/bpf: Use alternative RET encoding (Peter Zijlstra)
- x86/ftrace: Use alternative RET encoding (Peter Zijlstra)
- x86,static_call: Use alternative RET encoding (Peter Zijlstra)
- objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo)
- x86,objtool: Create .return_sites (Peter Zijlstra)
- x86: Undo return-thunk damage (Peter Zijlstra)
- x86/retpoline: Use -mfunction-return (Peter Zijlstra)
- x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra)
- x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra)
- x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra)
- x86/kvm/vmx: Make noinstr clean (Peter Zijlstra)
- x86/entry: Remove skip_r11rcx (Peter Zijlstra)
- x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan)
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan)
- x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan)
- x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan)
Resolves:

Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
This commit is contained in:
Justin M. Forbes 2022-07-12 17:26:55 -05:00
parent 668f7abcb7
commit da482b38ea
No known key found for this signature in database
GPG Key ID: B8FA7924A4B1C140
8 changed files with 4862 additions and 56 deletions

View File

@ -1,3 +1,186 @@
"https://gitlab.com/cki-project/kernel-ark/-/commit"/124840092adcbd2b256ecb6ec277d90a52e9ca35
124840092adcbd2b256ecb6ec277d90a52e9ca35 x86/static_call: Serialize __static_call_fixup() properly
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f1cd8d2d0cd2bcef47e57461e74ec0b2fe30a4c8
f1cd8d2d0cd2bcef47e57461e74ec0b2fe30a4c8 x86/speculation: Disable RRSBA behavior
"https://gitlab.com/cki-project/kernel-ark/-/commit"/4dc27302e00b50a59cd2cf9c6ecd9309771e169f
4dc27302e00b50a59cd2cf9c6ecd9309771e169f x86/kexec: Disable RET on kexec
"https://gitlab.com/cki-project/kernel-ark/-/commit"/0e261456ca23f6c04f914249b42486f209007085
0e261456ca23f6c04f914249b42486f209007085 x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
"https://gitlab.com/cki-project/kernel-ark/-/commit"/d95cf0fdf4171baa6d7bb99c4125c67aae648071
d95cf0fdf4171baa6d7bb99c4125c67aae648071 x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry
"https://gitlab.com/cki-project/kernel-ark/-/commit"/9411ab806d9eed3187da4d3d5855a0aef47fb8e6
9411ab806d9eed3187da4d3d5855a0aef47fb8e6 x86/bugs: Add Cannon lake to RETBleed affected CPU list
"https://gitlab.com/cki-project/kernel-ark/-/commit"/11d19d8eb5b01b5d167cb874fdc218ee09552e77
11d19d8eb5b01b5d167cb874fdc218ee09552e77 x86/retbleed: Add fine grained Kconfig knobs
"https://gitlab.com/cki-project/kernel-ark/-/commit"/d49c727bee53a6addd289dad312f4f5725ba852b
d49c727bee53a6addd289dad312f4f5725ba852b x86/cpu/amd: Enumerate BTC_NO
"https://gitlab.com/cki-project/kernel-ark/-/commit"/e76884511dd032c0c557783271922d62d9c588f9
e76884511dd032c0c557783271922d62d9c588f9 x86/common: Stamp out the stepping madness
"https://gitlab.com/cki-project/kernel-ark/-/commit"/3fdf6fdaf55ab629187ca1b9e35767e2ca77d6bb
3fdf6fdaf55ab629187ca1b9e35767e2ca77d6bb KVM: VMX: Prevent RSB underflow before vmenter
"https://gitlab.com/cki-project/kernel-ark/-/commit"/5405cabb27372d196f1fc368cfd3be5cdc9eeacf
5405cabb27372d196f1fc368cfd3be5cdc9eeacf x86/speculation: Fill RSB on vmexit for IBRS
"https://gitlab.com/cki-project/kernel-ark/-/commit"/654cc553e9456109c6ba66a797770f586a720935
654cc553e9456109c6ba66a797770f586a720935 KVM: VMX: Fix IBRS handling after vmexit
"https://gitlab.com/cki-project/kernel-ark/-/commit"/c54bc2089bc6b7c1f819b184a5713cabe28ce4e7
c54bc2089bc6b7c1f819b184a5713cabe28ce4e7 KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
"https://gitlab.com/cki-project/kernel-ark/-/commit"/2426e78b2e6c4f2d1bc2b41c6d2c6f420c24873b
2426e78b2e6c4f2d1bc2b41c6d2c6f420c24873b KVM: VMX: Convert launched argument to flags
"https://gitlab.com/cki-project/kernel-ark/-/commit"/5af28f4a99f36d4fce375de01466e6f175cd399b
5af28f4a99f36d4fce375de01466e6f175cd399b KVM: VMX: Flatten __vmx_vcpu_run()
"https://gitlab.com/cki-project/kernel-ark/-/commit"/ac8c93f3d2698a845768b758be8a2132b9f8a582
ac8c93f3d2698a845768b758be8a2132b9f8a582 objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}
"https://gitlab.com/cki-project/kernel-ark/-/commit"/78ef570693b0fda3b84644d9c65917afd66be35a
78ef570693b0fda3b84644d9c65917afd66be35a x86/speculation: Remove x86_spec_ctrl_mask
"https://gitlab.com/cki-project/kernel-ark/-/commit"/0dfa5101c58a48d54bc102b33378d0332404068f
0dfa5101c58a48d54bc102b33378d0332404068f x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
"https://gitlab.com/cki-project/kernel-ark/-/commit"/60d7d9c106f7642e0b0ebe2d5b458fe45d46a800
60d7d9c106f7642e0b0ebe2d5b458fe45d46a800 x86/speculation: Fix SPEC_CTRL write on SMT state change
"https://gitlab.com/cki-project/kernel-ark/-/commit"/06668635e3c237f50ff83638e53c09a99bc96567
06668635e3c237f50ff83638e53c09a99bc96567 x86/speculation: Fix firmware entry SPEC_CTRL handling
"https://gitlab.com/cki-project/kernel-ark/-/commit"/284c4e731495217963a407a40125f698fd127ba8
284c4e731495217963a407a40125f698fd127ba8 x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
"https://gitlab.com/cki-project/kernel-ark/-/commit"/9072ecef88a18bba73dd59c78d202c9966574aab
9072ecef88a18bba73dd59c78d202c9966574aab x86/cpu/amd: Add Spectral Chicken
"https://gitlab.com/cki-project/kernel-ark/-/commit"/1bb1b29681e50fbc2c13a89670764a76f41ea2b6
1bb1b29681e50fbc2c13a89670764a76f41ea2b6 objtool: Add entry UNRET validation
"https://gitlab.com/cki-project/kernel-ark/-/commit"/9234c57b23755b4de25d6fc0b6e294110a5f2287
9234c57b23755b4de25d6fc0b6e294110a5f2287 x86/bugs: Do IBPB fallback check only once
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f3aa67ca9cc86e5ce4c109105973b15547044c79
f3aa67ca9cc86e5ce4c109105973b15547044c79 x86/bugs: Add retbleed=ibpb
"https://gitlab.com/cki-project/kernel-ark/-/commit"/4327ea3494083f292f93a5c1dbfdc6ad7f24a0c6
4327ea3494083f292f93a5c1dbfdc6ad7f24a0c6 x86/xen: Add UNTRAIN_RET
"https://gitlab.com/cki-project/kernel-ark/-/commit"/847a4bc2368d59d95ec794a6810f0b0ca78976cc
847a4bc2368d59d95ec794a6810f0b0ca78976cc x86/xen: Rename SYS* entry points
"https://gitlab.com/cki-project/kernel-ark/-/commit"/07b81941724e3b2f8794c60ee606b9fbc73e465a
07b81941724e3b2f8794c60ee606b9fbc73e465a objtool: Update Retpoline validation
"https://gitlab.com/cki-project/kernel-ark/-/commit"/87046e111b3e21e97d9b48ea28101b8507de1c7b
87046e111b3e21e97d9b48ea28101b8507de1c7b intel_idle: Disable IBRS during long idle
"https://gitlab.com/cki-project/kernel-ark/-/commit"/0125965863f43cf6d02d3383bc62535fc616b1f5
0125965863f43cf6d02d3383bc62535fc616b1f5 x86/bugs: Report Intel retbleed vulnerability
"https://gitlab.com/cki-project/kernel-ark/-/commit"/6abb082c94b62af0b52ac7bbe0e018c69e320edb
6abb082c94b62af0b52ac7bbe0e018c69e320edb x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
"https://gitlab.com/cki-project/kernel-ark/-/commit"/784077d71eada3b1a29b21f6b447c375fcd015c1
784077d71eada3b1a29b21f6b447c375fcd015c1 x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
"https://gitlab.com/cki-project/kernel-ark/-/commit"/b6755754d19816815235c8fca8979856763afbc9
b6755754d19816815235c8fca8979856763afbc9 x86/bugs: Optimize SPEC_CTRL MSR writes
"https://gitlab.com/cki-project/kernel-ark/-/commit"/7bf4ec77d5295a12398892eb6d400b536bd46899
7bf4ec77d5295a12398892eb6d400b536bd46899 x86/entry: Add kernel IBRS implementation
"https://gitlab.com/cki-project/kernel-ark/-/commit"/934dc61b4bb06140e3e833bb959d940f4d9d745d
934dc61b4bb06140e3e833bb959d940f4d9d745d x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
"https://gitlab.com/cki-project/kernel-ark/-/commit"/08920a7bd3e3eb23e73f1723c3dd7b84be8a4ea2
08920a7bd3e3eb23e73f1723c3dd7b84be8a4ea2 x86/bugs: Enable STIBP for JMP2RET
"https://gitlab.com/cki-project/kernel-ark/-/commit"/e8e3d9b8841298ec8486687c4f3faddff9c2e3a3
e8e3d9b8841298ec8486687c4f3faddff9c2e3a3 x86/bugs: Add AMD retbleed= boot parameter
"https://gitlab.com/cki-project/kernel-ark/-/commit"/54b9f6b8610b35422f7e439b80429b07da44688b
54b9f6b8610b35422f7e439b80429b07da44688b x86/bugs: Report AMD retbleed vulnerability
"https://gitlab.com/cki-project/kernel-ark/-/commit"/98db9034780970f94cf0fd66f6c3371ce5bd1da0
98db9034780970f94cf0fd66f6c3371ce5bd1da0 x86: Add magic AMD return-thunk
"https://gitlab.com/cki-project/kernel-ark/-/commit"/a0e5b305e6692711272e1d253a456bf66c728edb
a0e5b305e6692711272e1d253a456bf66c728edb objtool: Treat .text.__x86.* as noinstr
"https://gitlab.com/cki-project/kernel-ark/-/commit"/480a54ea74a0364bfa4e404487f89a50d3721cf8
480a54ea74a0364bfa4e404487f89a50d3721cf8 x86/entry: Avoid very early RET
"https://gitlab.com/cki-project/kernel-ark/-/commit"/b881f755be2f276dca2ff2563d5cc4ae38561c51
b881f755be2f276dca2ff2563d5cc4ae38561c51 x86: Use return-thunk in asm code
"https://gitlab.com/cki-project/kernel-ark/-/commit"/9b9b256ca2665c776a56acd643e8e90d7c8ad1b4
9b9b256ca2665c776a56acd643e8e90d7c8ad1b4 x86/sev: Avoid using __x86_return_thunk
"https://gitlab.com/cki-project/kernel-ark/-/commit"/5aca0c5b86a52e2487c4d846ac08f20d5fb9ce11
5aca0c5b86a52e2487c4d846ac08f20d5fb9ce11 x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
"https://gitlab.com/cki-project/kernel-ark/-/commit"/b043bec99f6df6a105e8dfc3d3710cb723d1156a
b043bec99f6df6a105e8dfc3d3710cb723d1156a x86/kvm: Fix SETcc emulation for return thunks
"https://gitlab.com/cki-project/kernel-ark/-/commit"/35c1c7b56206a7c8c2c55fd38959a800ad45834d
35c1c7b56206a7c8c2c55fd38959a800ad45834d x86/bpf: Use alternative RET encoding
"https://gitlab.com/cki-project/kernel-ark/-/commit"/128a4c9d899643f8c42873fb59f81d37c9bbd76c
128a4c9d899643f8c42873fb59f81d37c9bbd76c x86/ftrace: Use alternative RET encoding
"https://gitlab.com/cki-project/kernel-ark/-/commit"/513a532d275fa88edcb1b95f42549c5ea186af5d
513a532d275fa88edcb1b95f42549c5ea186af5d x86,static_call: Use alternative RET encoding
"https://gitlab.com/cki-project/kernel-ark/-/commit"/51b38cc89fdf189a0f57dd5a16c34679cad642cd
51b38cc89fdf189a0f57dd5a16c34679cad642cd objtool: skip non-text sections when adding return-thunk sites
"https://gitlab.com/cki-project/kernel-ark/-/commit"/d848ebf0fea9eafccde938d87b17cfc785ad7e73
d848ebf0fea9eafccde938d87b17cfc785ad7e73 x86,objtool: Create .return_sites
"https://gitlab.com/cki-project/kernel-ark/-/commit"/d708480894fa6ae9914a905a68dae62a54dc766c
d708480894fa6ae9914a905a68dae62a54dc766c x86: Undo return-thunk damage
"https://gitlab.com/cki-project/kernel-ark/-/commit"/48017501b6f739ff3275c3f1cd8f67d09cd8e476
48017501b6f739ff3275c3f1cd8f67d09cd8e476 x86/retpoline: Use -mfunction-return
"https://gitlab.com/cki-project/kernel-ark/-/commit"/c185ac0fda3d1f08539610f8b57b60ad5741a2fd
c185ac0fda3d1f08539610f8b57b60ad5741a2fd x86/retpoline: Swizzle retpoline thunk
"https://gitlab.com/cki-project/kernel-ark/-/commit"/db12c81022a72fd8b8d0f040bc3389d223c676b4
db12c81022a72fd8b8d0f040bc3389d223c676b4 x86/retpoline: Cleanup some #ifdefery
"https://gitlab.com/cki-project/kernel-ark/-/commit"/de09dfb0a730fd86778c10ea8bcbe191732ce8a4
de09dfb0a730fd86778c10ea8bcbe191732ce8a4 x86/cpufeatures: Move RETPOLINE flags to word 11
"https://gitlab.com/cki-project/kernel-ark/-/commit"/5c52f2151e1fd6e6000e21ac608f44bf59f2128b
5c52f2151e1fd6e6000e21ac608f44bf59f2128b x86/kvm/vmx: Make noinstr clean
"https://gitlab.com/cki-project/kernel-ark/-/commit"/3ea5c419e079e9f665384cb20eb525a74b86c2b0
3ea5c419e079e9f665384cb20eb525a74b86c2b0 x86/entry: Remove skip_r11rcx
"https://gitlab.com/cki-project/kernel-ark/-/commit"/6ebde394accb03a251fb6b28faaa02faa87962f7
6ebde394accb03a251fb6b28faaa02faa87962f7 x86/entry: Don't call error_entry() for XENPV
"https://gitlab.com/cki-project/kernel-ark/-/commit"/29257405882fbacf0347ff711abf491bc09e495e
29257405882fbacf0347ff711abf491bc09e495e x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
"https://gitlab.com/cki-project/kernel-ark/-/commit"/d4880e98e5bee7ec35a9d5eebaf83f0c674e131b
d4880e98e5bee7ec35a9d5eebaf83f0c674e131b x86/entry: Switch the stack after error_entry() returns
"https://gitlab.com/cki-project/kernel-ark/-/commit"/26879111c5ca69517b620f9d9fe8b576dc3bdf87
26879111c5ca69517b620f9d9fe8b576dc3bdf87 x86/traps: Use pt_regs directly in fixup_bad_iret()
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f147438b42147e1cf44f1471dc2a4288486dd791
f147438b42147e1cf44f1471dc2a4288486dd791 netfilter: nf_tables: stricter validation of element data

View File

@ -1009,6 +1009,8 @@ CONFIG_CPU_FREQ_STAT=y
CONFIG_CPU_FREQ_THERMAL=y
CONFIG_CPU_FREQ=y
# CONFIG_CPU_HOTPLUG_STATE_CONTROL is not set
CONFIG_CPU_IBPB_ENTRY=y
CONFIG_CPU_IBRS_ENTRY=y
CONFIG_CPU_IDLE_GOV_HALTPOLL=y
# CONFIG_CPU_IDLE_GOV_LADDER is not set
# CONFIG_CPU_IDLE_GOV_TEO is not set
@ -1018,6 +1020,7 @@ CONFIG_CPU_LITTLE_ENDIAN=y
CONFIG_CPUMASK_OFFSTACK=y
CONFIG_CPUSETS=y
# CONFIG_CPU_THERMAL is not set
CONFIG_CPU_UNRET_ENTRY=y
# CONFIG_CRAMFS is not set
# CONFIG_CRAMFS_MTD is not set
CONFIG_CRASH_DUMP=y
@ -5235,6 +5238,7 @@ CONFIG_REMOTEPROC=y
# CONFIG_RESET_INTEL_GW is not set
# CONFIG_RESET_TI_SYSCON is not set
# CONFIG_RESOURCE_KUNIT_TEST is not set
CONFIG_RETHUNK=y
CONFIG_RETPOLINE=y
# CONFIG_RFD77402 is not set
# CONFIG_RFD_FTL is not set
@ -6613,6 +6617,7 @@ CONFIG_SPEAKUP_SYNTH_LTLK=m
CONFIG_SPEAKUP_SYNTH_SOFT=m
CONFIG_SPEAKUP_SYNTH_SPKOUT=m
CONFIG_SPEAKUP_SYNTH_TXPRT=m
CONFIG_SPECULATION_MITIGATIONS=y
CONFIG_SPI_ALTERA_CORE=m
CONFIG_SPI_ALTERA_DFL=m
# CONFIG_SPI_ALTERA is not set

View File

@ -818,6 +818,8 @@ CONFIG_CPU_FREQ_GOV_USERSPACE=y
CONFIG_CPU_FREQ_STAT=y
CONFIG_CPU_FREQ=y
# CONFIG_CPU_HOTPLUG_STATE_CONTROL is not set
CONFIG_CPU_IBPB_ENTRY=y
CONFIG_CPU_IBRS_ENTRY=y
CONFIG_CPU_IDLE_GOV_HALTPOLL=y
# CONFIG_CPU_IDLE_GOV_LADDER is not set
CONFIG_CPU_IDLE_GOV_MENU=y
@ -828,6 +830,7 @@ CONFIG_CPU_LITTLE_ENDIAN=y
CONFIG_CPUMASK_OFFSTACK=y
CONFIG_CPUSETS=y
# CONFIG_CPU_THERMAL is not set
CONFIG_CPU_UNRET_ENTRY=y
# CONFIG_CRAMFS is not set
# CONFIG_CRAMFS_MTD is not set
CONFIG_CRASH_DUMP=y
@ -4506,6 +4509,7 @@ CONFIG_RESET_CONTROLLER=y
# CONFIG_RESET_QCOM_PDC is not set
# CONFIG_RESET_TI_SYSCON is not set
# CONFIG_RESOURCE_KUNIT_TEST is not set
CONFIG_RETHUNK=y
CONFIG_RETPOLINE=y
# CONFIG_RFD77402 is not set
# CONFIG_RFD_FTL is not set
@ -5829,6 +5833,7 @@ CONFIG_SPEAKUP_SYNTH_LTLK=m
CONFIG_SPEAKUP_SYNTH_SOFT=m
CONFIG_SPEAKUP_SYNTH_SPKOUT=m
CONFIG_SPEAKUP_SYNTH_TXPRT=m
CONFIG_SPECULATION_MITIGATIONS=y
# CONFIG_SPI_ALTERA_CORE is not set
# CONFIG_SPI_ALTERA is not set
CONFIG_SPI_AMD=y

View File

@ -1008,6 +1008,8 @@ CONFIG_CPU_FREQ_STAT=y
CONFIG_CPU_FREQ_THERMAL=y
CONFIG_CPU_FREQ=y
# CONFIG_CPU_HOTPLUG_STATE_CONTROL is not set
CONFIG_CPU_IBPB_ENTRY=y
CONFIG_CPU_IBRS_ENTRY=y
CONFIG_CPU_IDLE_GOV_HALTPOLL=y
# CONFIG_CPU_IDLE_GOV_LADDER is not set
# CONFIG_CPU_IDLE_GOV_TEO is not set
@ -1017,6 +1019,7 @@ CONFIG_CPU_LITTLE_ENDIAN=y
CONFIG_CPUMASK_OFFSTACK=y
CONFIG_CPUSETS=y
# CONFIG_CPU_THERMAL is not set
CONFIG_CPU_UNRET_ENTRY=y
# CONFIG_CRAMFS is not set
# CONFIG_CRAMFS_MTD is not set
CONFIG_CRASH_DUMP=y
@ -5215,6 +5218,7 @@ CONFIG_REMOTEPROC=y
# CONFIG_RESET_INTEL_GW is not set
# CONFIG_RESET_TI_SYSCON is not set
# CONFIG_RESOURCE_KUNIT_TEST is not set
CONFIG_RETHUNK=y
CONFIG_RETPOLINE=y
# CONFIG_RFD77402 is not set
# CONFIG_RFD_FTL is not set
@ -6591,6 +6595,7 @@ CONFIG_SPEAKUP_SYNTH_LTLK=m
CONFIG_SPEAKUP_SYNTH_SOFT=m
CONFIG_SPEAKUP_SYNTH_SPKOUT=m
CONFIG_SPEAKUP_SYNTH_TXPRT=m
CONFIG_SPECULATION_MITIGATIONS=y
CONFIG_SPI_ALTERA_CORE=m
CONFIG_SPI_ALTERA_DFL=m
# CONFIG_SPI_ALTERA is not set

View File

@ -818,6 +818,8 @@ CONFIG_CPU_FREQ_GOV_USERSPACE=y
CONFIG_CPU_FREQ_STAT=y
CONFIG_CPU_FREQ=y
# CONFIG_CPU_HOTPLUG_STATE_CONTROL is not set
CONFIG_CPU_IBPB_ENTRY=y
CONFIG_CPU_IBRS_ENTRY=y
CONFIG_CPU_IDLE_GOV_HALTPOLL=y
# CONFIG_CPU_IDLE_GOV_LADDER is not set
CONFIG_CPU_IDLE_GOV_MENU=y
@ -828,6 +830,7 @@ CONFIG_CPU_LITTLE_ENDIAN=y
CONFIG_CPUMASK_OFFSTACK=y
CONFIG_CPUSETS=y
# CONFIG_CPU_THERMAL is not set
CONFIG_CPU_UNRET_ENTRY=y
# CONFIG_CRAMFS is not set
# CONFIG_CRAMFS_MTD is not set
CONFIG_CRASH_DUMP=y
@ -4484,6 +4487,7 @@ CONFIG_RESET_CONTROLLER=y
# CONFIG_RESET_QCOM_PDC is not set
# CONFIG_RESET_TI_SYSCON is not set
# CONFIG_RESOURCE_KUNIT_TEST is not set
CONFIG_RETHUNK=y
CONFIG_RETPOLINE=y
# CONFIG_RFD77402 is not set
# CONFIG_RFD_FTL is not set
@ -5805,6 +5809,7 @@ CONFIG_SPEAKUP_SYNTH_LTLK=m
CONFIG_SPEAKUP_SYNTH_SOFT=m
CONFIG_SPEAKUP_SYNTH_SPKOUT=m
CONFIG_SPEAKUP_SYNTH_TXPRT=m
CONFIG_SPECULATION_MITIGATIONS=y
# CONFIG_SPI_ALTERA_CORE is not set
# CONFIG_SPI_ALTERA is not set
CONFIG_SPI_AMD=y

View File

@ -122,11 +122,11 @@ Summary: The Linux kernel
# the --with-release option overrides this setting.)
%define debugbuildsenabled 1
# define buildid .local
%define specversion 5.18.10
%define specversion 5.18.11
%define patchversion 5.18
%define pkgrelease 100
%define kversion 5
%define tarfile_release 5.18.10
%define tarfile_release 5.18.11
# This is needed to do merge window version magic
%define patchlevel 18
# allow pkg_release to have configurable %%{?dist} tag
@ -3034,6 +3034,72 @@ fi
#
#
%changelog
* Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-100]
- Turn on configs for retbleed (Justin M. Forbes)
* Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0]
- x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner)
- x86/speculation: Disable RRSBA behavior (Pawan Gupta)
- x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk)
- x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo)
- x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra)
- x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta)
- x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra)
- x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper)
- x86/common: Stamp out the stepping madness (Peter Zijlstra)
- KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf)
- x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf)
- KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf)
- KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf)
- KVM: VMX: Convert launched argument to flags (Josh Poimboeuf)
- KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf)
- objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf)
- x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf)
- x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf)
- x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf)
- x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf)
- x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf)
- x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra)
- objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo)
- x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf)
- x86/bugs: Add retbleed=ibpb (Peter Zijlstra)
- x86/xen: Add UNTRAIN_RET (Peter Zijlstra)
- x86/xen: Rename SYS* entry points (Peter Zijlstra)
- objtool: Update Retpoline validation (Peter Zijlstra)
- intel_idle: Disable IBRS during long idle (Peter Zijlstra)
- x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra)
- x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra)
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta)
- x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra)
- x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo)
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra)
- x86/bugs: Enable STIBP for JMP2RET (Kim Phillips)
- x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre)
- x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre)
- x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo)
- objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra)
- x86/entry: Avoid very early RET (Peter Zijlstra)
- x86: Use return-thunk in asm code (Peter Zijlstra)
- x86/sev: Avoid using __x86_return_thunk (Kim Phillips)
- x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra)
- x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra)
- x86/bpf: Use alternative RET encoding (Peter Zijlstra)
- x86/ftrace: Use alternative RET encoding (Peter Zijlstra)
- x86,static_call: Use alternative RET encoding (Peter Zijlstra)
- objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo)
- x86,objtool: Create .return_sites (Peter Zijlstra)
- x86: Undo return-thunk damage (Peter Zijlstra)
- x86/retpoline: Use -mfunction-return (Peter Zijlstra)
- x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra)
- x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra)
- x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra)
- x86/kvm/vmx: Make noinstr clean (Peter Zijlstra)
- x86/entry: Remove skip_r11rcx (Peter Zijlstra)
- x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan)
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan)
- x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan)
- x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan)
* Thu Jul 07 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.10-0]
- netfilter: nf_tables: stricter validation of element data (Pablo Neira Ayuso)
- Revert "Revert "smb3: use netname when available on secondary channels"" (Justin M. Forbes)

File diff suppressed because it is too large Load Diff

View File

@ -1,3 +1,3 @@
SHA512 (linux-5.18.10.tar.xz) = 443ade4d54208697976ac6dfaa96f1a3d2ac21f1440d6414304161305aa5571aa93cee65f1adaae9163382dff3bbf4d712f04cfae5d57bbc61de4295ebbcaa88
SHA512 (kernel-abi-stablelists-5.18.10-100.tar.bz2) = 9f0614b7ee410aa5bec200e950e53ee072f7d009cbd8c11f05ee3fd3dff5e9e8c9e7a5141b614eda1963ce4b23444f3d7b48546edf88bc9959f5529afed6cf24
SHA512 (kernel-kabi-dw-5.18.10-100.tar.bz2) = 07a7a5f8bc318fdda6f6d8dac0df667dffadecc6db8def51cc92e246f1ad372668aa6a7d58054f9bd56010b3599de74b9406f3b83c1d23bc0de4b61bd703eda4
SHA512 (linux-5.18.11.tar.xz) = 86d9e65efe242e5bc612c28f1164211805f18dfef08266d4fe6a8d7d41fa42fa4e7be124778c31a792b4c59a523612906933f6fc84c0a0528825adcd559a989e
SHA512 (kernel-abi-stablelists-5.18.11-100.tar.bz2) = 76c21f305c08981f5b1bcc1a10d32e4ed2cc70dd675e5863617632951a56ca791b47cd521af3e2b11b9a20b9b4eaf47c97972e4d41ba25d150e04e4835ac879b
SHA512 (kernel-kabi-dw-5.18.11-100.tar.bz2) = 2cdaae4c18d710ae130e7ce660e8e69ac9f4da297039a844c1c6b6068ac0a7bcea4b9b58e884488ce1fb91c14e43165e25f271b0f5d5591db5e7eab9e578d0b2