This is the start of the stable review cycle for the 4.4.202 release. There are 20 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun, 17 Nov 2019 06:18:31 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.202-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> Linux 4.4.202-rc1 Vineela Tummalapalli <vineela.tummalapalli@xxxxxxxxx> x86/bugs: Add ITLB_MULTIHIT bug infrastructure Josh Poimboeuf <jpoimboe@xxxxxxxxxx> x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs Michal Hocko <mhocko@xxxxxxxx> x86/tsx: Add config options to set tsx=on|off|auto Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> x86/speculation/taa: Add documentation for TSX Async Abort Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> x86/tsx: Add "auto" option to the tsx= cmdline parameter Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> kvm/x86: Export MDS_NO=0 to guests when TSX is enabled Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> x86/speculation/taa: Add sysfs reporting for TSX Async Abort Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> x86/speculation/taa: Add mitigation for TSX Async Abort Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> x86/cpu: Add a helper function x86_read_arch_cap_msr() Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx> x86/msr: Add the IA32_TSX_CTRL MSR Paolo Bonzini <pbonzini@xxxxxxxxxx> KVM: x86: use Intel speculation bugs and features as derived in generic x86 code Jim Mattson <jmattson@xxxxxxxxxx> kvm: x86: IA32_ARCH_CAPABILITIES is always supported Sean Christopherson <sean.j.christopherson@xxxxxxxxx> KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts Ben Hutchings <ben@xxxxxxxxxxxxxxx> KVM: Introduce kvm_get_arch_capabilities() Nicholas Piggin <npiggin@xxxxxxxxx> powerpc/boot: Request no dynamic linker for boot wrapper Nicholas Piggin <npiggin@xxxxxxxxx> powerpc: Fix compiling a BE kernel with a powerpc64le toolchain Michael Ellerman <mpe@xxxxxxxxxxxxxx> powerpc/Makefile: Use cflags-y/aflags-y for setting endian options Jonas Gorski <jonas.gorski@xxxxxxxxx> MIPS: BCM63XX: fix switch core reset on BCM6368 Junaid Shahid <junaids@xxxxxxxxxx> kvm: mmu: Don't read PDPTEs when paging is not enabled ------------- Diffstat: Documentation/ABI/testing/sysfs-devices-system-cpu | 2 + Documentation/hw-vuln/tsx_async_abort.rst | 268 +++++++++++++++++++++ Documentation/kernel-parameters.txt | 62 +++++ Documentation/x86/tsx_async_abort.rst | 117 +++++++++ Makefile | 4 +- arch/mips/bcm63xx/reset.c | 2 +- arch/powerpc/Makefile | 31 ++- arch/powerpc/boot/wrapper | 24 +- arch/x86/Kconfig | 45 ++++ arch/x86/include/asm/cpufeatures.h | 2 + arch/x86/include/asm/kvm_host.h | 2 + arch/x86/include/asm/msr-index.h | 16 ++ arch/x86/include/asm/nospec-branch.h | 4 +- arch/x86/include/asm/processor.h | 7 + arch/x86/kernel/cpu/Makefile | 2 +- arch/x86/kernel/cpu/bugs.c | 143 ++++++++++- arch/x86/kernel/cpu/common.c | 93 ++++--- arch/x86/kernel/cpu/cpu.h | 18 ++ arch/x86/kernel/cpu/intel.c | 5 + arch/x86/kernel/cpu/tsx.c | 140 +++++++++++ arch/x86/kvm/cpuid.c | 12 + arch/x86/kvm/vmx.c | 15 -- arch/x86/kvm/x86.c | 53 +++- drivers/base/cpu.c | 17 ++ include/linux/cpu.h | 5 + 25 files changed, 1019 insertions(+), 70 deletions(-)