[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180110091015.GA18514@kroah.com>
Date: Wed, 10 Jan 2018 10:10:16 +0100
From: Greg KH <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.4.111
I'm announcing the release of the 4.4.111 kernel.
All users of the 4.4 kernel series must upgrade.
The updated 4.4.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Makefile | 2 +-
arch/arc/include/asm/uaccess.h | 5 +++--
arch/parisc/include/asm/ldcw.h | 2 ++
arch/parisc/kernel/entry.S | 13 +++++++++++--
arch/parisc/kernel/pacache.S | 9 +++++++--
arch/s390/kernel/compat_linux.c | 1 +
arch/x86/entry/vdso/vma.c | 1 +
arch/x86/entry/vsyscall/vsyscall_64.c | 5 +++++
arch/x86/include/asm/vsyscall.h | 2 ++
arch/x86/kernel/cpu/microcode/amd.c | 4 ++++
arch/x86/mm/init.c | 2 +-
arch/x86/mm/kaiser.c | 34 ++++++++++++++++++++++++++++++----
arch/x86/mm/kasan_init_64.c | 10 ++++++++--
crypto/chacha20poly1305.c | 6 +++++-
crypto/pcrypt.c | 19 ++++++++++---------
drivers/bus/sunxi-rsb.c | 1 +
drivers/crypto/n2_core.c | 3 +++
drivers/input/mouse/elantech.c | 2 +-
fs/nfsd/auth.c | 3 +++
include/linux/cred.h | 1 +
include/linux/fscache.h | 2 +-
kernel/acct.c | 2 +-
kernel/groups.c | 5 +++--
kernel/module.c | 26 +++++++++++++++++++++-----
kernel/signal.c | 18 ++++++++++--------
kernel/uid16.c | 1 +
mm/vmstat.c | 4 +++-
net/sunrpc/auth_gss/gss_rpc_xdr.c | 1 +
net/sunrpc/auth_gss/svcauth_gss.c | 1 +
net/sunrpc/svcauth_unix.c | 2 ++
scripts/genksyms/genksyms.c | 6 ++++--
31 files changed, 148 insertions(+), 45 deletions(-)
Aaron Ma (1):
Input: elantech - add new icbody type 15
Alexey Dobriyan (1):
proc: much faster /proc/vmstat
Andrey Ryabinin (1):
x86/kasan: Write protect kasan zero shadow
Borislav Petkov (1):
Map the vsyscall page with _PAGE_USER
David Howells (1):
fscache: Fix the default for fscache_maybe_release_page()
Eric Biggers (2):
crypto: chacha20poly1305 - validate the digest size
crypto: pcrypt - fix freeing pcrypt instances
Greg Kroah-Hartman (2):
Fix build error in vma.c
Linux 4.4.111
Helge Deller (1):
parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
Jan Engelhardt (1):
crypto: n2 - cure use after free
Libor Pechacek (1):
module: Issue warnings when tainting kernel
Michal Marek (1):
genksyms: Handle string literals with spaces in reference files
Miroslav Benes (1):
module: keep percpu symbols in module's symtab
Oleg Nesterov (4):
kernel/acct.c: fix the acct->needcheck check in check_free_space()
kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals
kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()
Stefan BrĂ¼ns (1):
sunxi-rsb: Include OF based modalias in device uevent
Thiago Rafael Becker (1):
kernel: make groups_sort calling a responsibility group_info allocators
Thomas Gleixner (1):
x86/tlb: Drop the _GPL from the cpu_tlbstate export
Tom Lendacky (1):
x86/microcode/AMD: Add support for fam17h microcode loading
Vineet Gupta (1):
ARC: uaccess: dont use "l" gcc inline asm constraint modifier
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists