Linux/linux 3b78ce4Documentation/ABI/testing sysfs-devices-system-cpu, Documentation/admin-guide kernel-parameters.txt

Merge branch 'speck-v20' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip

Merge speculative store buffer bypass fixes from Thomas Gleixner:

 - rework of the SPEC_CTRL MSR management to accomodate the new fancy
   SSBD (Speculative Store Bypass Disable) bit handling.

 - the CPU bug and sysfs infrastructure for the exciting new Speculative
   Store Bypass 'feature'.

 - support for disabling SSB via LS_CFG MSR on AMD CPUs including
   Hyperthread synchronization on ZEN.

 - PRCTL support for dynamic runtime control of SSB

 - SECCOMP integration to automatically disable SSB for sandboxed
   processes with a filter flag for opt-out.

 - KVM integration to allow guests fiddling with SSBD including the new
   software MSR VIRT_SPEC_CTRL to handle the LS_CFG based oddities on
   AMD.

 - BPF protection against SSB

.. this is just the core and x86 side, other architecture support will
come separately.

* 'speck-v20' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (49 commits)
  bpf: Prevent memory disambiguation attack
  x86/bugs: Rename SSBD_NO to SSB_NO
  KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
  x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
  x86/bugs: Rework spec_ctrl base and mask logic
  x86/bugs: Remove x86_spec_ctrl_set()
  x86/bugs: Expose x86_spec_ctrl_base directly
  x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
  x86/speculation: Rework speculative_store_bypass_update()
  x86/speculation: Add virtualized speculative store bypass disable support
  x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
  x86/speculation: Handle HT correctly on AMD
  x86/cpufeatures: Add FEATURE_ZEN
  x86/cpufeatures: Disentangle SSBD enumeration
  x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
  x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
  KVM: SVM: Move spec control call after restore of GS
  x86/cpu: Make alternative_msr_write work for 32-bit code
  x86/bugs: Fix the parameters alignment and missing void
  x86/bugs: Make cpu_show_common() static
  ...
DeltaFile
+383-16arch/x86/kernel/cpu/bugs.c
+146-0arch/x86/kernel/process.c
+94-0Documentation/userspace-api/spec_ctrl.rst
+80-0arch/x86/include/asm/spec-ctrl.h
+61-16arch/x86/kernel/cpu/common.c
+44-22arch/x86/kvm/svm.c
+56-3kernel/bpf/verifier.c
+45-0Documentation/admin-guide/kernel-parameters.txt
+30-13arch/x86/include/asm/nospec-branch.h
+19-12arch/x86/kvm/vmx.c
+25-0fs/proc/array.c
+23-0kernel/sys.c
+19-3tools/testing/selftests/seccomp/seccomp_bpf.c
+22-0arch/x86/kernel/cpu/amd.c
+14-7arch/x86/kvm/cpuid.c
+15-6kernel/seccomp.c
+14-6arch/x86/include/asm/cpufeatures.h
+4-9arch/x86/kvm/x86.c
+12-0include/uapi/linux/prctl.h
+9-1include/linux/sched.h
+10-0include/linux/nospec.h
+9-0arch/x86/include/asm/msr-index.h
+8-0drivers/base/cpu.c
+5-0arch/x86/kernel/smpboot.c
+3-2include/linux/seccomp.h
+3-2include/uapi/linux/seccomp.h
+3-1arch/x86/include/asm/thread_info.h
+3-0arch/x86/kernel/cpu/intel.c
+1-1arch/x86/include/asm/kvm_host.h
+2-0arch/x86/kernel/cpu/cpu.h
+2-0include/linux/cpu.h
+1-0Documentation/userspace-api/index.rst
+1-0include/linux/bpf_verifier.h
+1-0Documentation/ABI/testing/sysfs-devices-system-cpu
+1,167-12034 files

UnifiedSplitRaw