[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20180122083910.299610926@linuxfoundation.org>
Date: Mon, 22 Jan 2018 09:39:52 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
linux@...ck-us.net, shuahkh@....samsung.com, patches@...nelci.org,
ben.hutchings@...ethink.co.uk, lkft-triage@...ts.linaro.org,
stable@...r.kernel.org
Subject: [PATCH 4.4 00/53] 4.4.113-stable review
This is the start of the stable review cycle for the 4.4.113 release.
There are 53 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Wed Jan 24 08:38:52 UTC 2018.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.113-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Linux 4.4.113-rc1
Andi Kleen <ak@...ux.intel.com>
x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
zhenwei.pi <zhenwei.pi@...runcloud.com>
x86/pti: Document fix wrong index
Masami Hiramatsu <mhiramat@...nel.org>
kprobes/x86: Disable optimizing on the function jumps to indirect thunk
Masami Hiramatsu <mhiramat@...nel.org>
kprobes/x86: Blacklist indirect thunk functions for kprobes
Masami Hiramatsu <mhiramat@...nel.org>
retpoline: Introduce start/end markers of indirect thunk
Thomas Gleixner <tglx@...utronix.de>
x86/mce: Make machine check speculation protected
Nicholas Piggin <npiggin@...il.com>
kbuild: modversions for EXPORT_SYMBOL() for asm
Tom Lendacky <thomas.lendacky@....com>
x86/cpu, x86/pti: Do not enable PTI on AMD processors
Marc Zyngier <marc.zyngier@....com>
arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls
Dennis Yang <dennisyang@...p.com>
dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6
Joe Thornber <thornber@...hat.com>
dm btree: fix serious bug in btree_split_beneath()
Xinyu Lin <xinyu0123@...il.com>
libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
Stephane Grosjean <s.grosjean@...k-system.com>
can: peak: fix potential bug in packet fragmentation
Thomas Petazzoni <thomas.petazzoni@...e-electrons.com>
ARM: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7
Arnd Bergmann <arnd@...db.de>
phy: work around 'phys' references to usb-nop-xceiv devices
Steven Rostedt (VMware) <rostedt@...dmis.org>
tracing: Fix converting enum's from the map in trace_event_eval_update()
Johan Hovold <johan@...nel.org>
Input: twl4030-vibra - fix sibling-node lookup
Johan Hovold <johan@...nel.org>
Input: twl6040-vibra - fix child-node lookup
H. Nikolaus Schaller <hns@...delico.com>
Input: twl6040-vibra - fix DT node memory management
Johan Hovold <johan@...nel.org>
Input: 88pm860x-ts - fix child-node lookup
Thomas Gleixner <tglx@...utronix.de>
x86/apic/vector: Fix off by one in error path
Joe Lawrence <joe.lawrence@...hat.com>
pipe: avoid round_pipe_size() nr_pages overflow on 32-bit
Andi Kleen <ak@...ux.intel.com>
module: Add retpoline tag to VERMAGIC
Tom Lendacky <thomas.lendacky@....com>
x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
Xunlei Pang <xlpang@...hat.com>
sched/deadline: Zero out positive runtime after throttling constrained tasks
Tomas Henzl <thenzl@...hat.com>
scsi: hpsa: fix volume offline state
Eric Biggers <ebiggers@...gle.com>
af_key: fix buffer overread in parse_exthdrs()
Eric Biggers <ebiggers@...gle.com>
af_key: fix buffer overread in verify_address_len()
Takashi Iwai <tiwai@...e.de>
ALSA: hda - Apply the existing quirk to iMac 14,1
Takashi Iwai <tiwai@...e.de>
ALSA: hda - Apply headphone noise quirk for another Dell XPS 13 variant
Takashi Iwai <tiwai@...e.de>
ALSA: pcm: Remove yet superfluous WARN_ON()
Li Jinyue <lijinyue@...wei.com>
futex: Prevent overflow by strengthen input validation
Hannes Reinecke <hare@...e.de>
scsi: sg: disable SET_FORCE_LOW_DMA
Thomas Gleixner <tglx@...utronix.de>
x86/retpoline: Remove compile time warning
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline: Fill return stack buffer on vmexit
Andi Kleen <ak@...ux.intel.com>
x86/retpoline/irq32: Convert assembler indirect jumps
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline/checksum32: Convert assembler indirect jumps
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline/xen: Convert Xen hypercall indirect jumps
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline/hyperv: Convert assembler indirect jumps
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline/entry: Convert entry assembler indirect jumps
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline/crypto: Convert crypto assembler indirect jumps
David Woodhouse <dwmw@...zon.co.uk>
x86/spectre: Add boot time option to select Spectre v2 mitigation
David Woodhouse <dwmw@...zon.co.uk>
x86/retpoline: Add initial retpoline support
Masahiro Yamada <yamada.masahiro@...ionext.com>
kconfig.h: use __is_defined() to check if MODULE is defined
Al Viro <viro@...iv.linux.org.uk>
EXPORT_SYMBOL() for asm
Andy Lutomirski <luto@...nel.org>
x86/asm: Make asm/alternative.h safe from assembly
Adam Borowski <kilobyte@...band.pl>
x86/kbuild: enable modversions for symbols exported from asm
Andrey Ryabinin <aryabinin@...tuozzo.com>
x86/asm: Use register variable to get stack pointer value
Andy Lutomirski <luto@...nel.org>
x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
Tom Lendacky <thomas.lendacky@....com>
x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC
Tom Lendacky <thomas.lendacky@....com>
x86/cpu/AMD: Make LFENCE a serializing instruction
Arnd Bergmann <arnd@...db.de>
gcov: disable for COMPILE_TEST
-------------
Diffstat:
Documentation/kernel-parameters.txt | 28 ++++
Documentation/x86/pti.txt | 2 +-
Makefile | 4 +-
arch/arm/boot/dts/kirkwood-openblocks_a7.dts | 10 +-
arch/arm64/kvm/handle_exit.c | 4 +-
arch/x86/Kconfig | 13 ++
arch/x86/Makefile | 8 ++
arch/x86/crypto/aesni-intel_asm.S | 5 +-
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 3 +-
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 3 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 3 +-
arch/x86/entry/entry_32.S | 11 +-
arch/x86/entry/entry_64.S | 16 ++-
arch/x86/include/asm/alternative.h | 4 +
arch/x86/include/asm/asm-prototypes.h | 41 ++++++
arch/x86/include/asm/asm.h | 11 ++
arch/x86/include/asm/cpufeature.h | 2 +
arch/x86/include/asm/msr-index.h | 3 +
arch/x86/include/asm/nospec-branch.h | 198 +++++++++++++++++++++++++++
arch/x86/include/asm/thread_info.h | 11 --
arch/x86/include/asm/traps.h | 1 +
arch/x86/include/asm/xen/hypercall.h | 5 +-
arch/x86/kernel/apic/vector.c | 7 +-
arch/x86/kernel/cpu/amd.c | 28 +++-
arch/x86/kernel/cpu/bugs.c | 166 ++++++++++++++++++++--
arch/x86/kernel/cpu/common.c | 12 +-
arch/x86/kernel/cpu/mcheck/mce.c | 5 +
arch/x86/kernel/irq_32.c | 15 +-
arch/x86/kernel/kprobes/opt.c | 23 +++-
arch/x86/kernel/mcount_64.S | 7 +-
arch/x86/kernel/traps.c | 2 +-
arch/x86/kernel/vmlinux.lds.S | 7 +
arch/x86/kvm/svm.c | 4 +
arch/x86/kvm/vmx.c | 4 +
arch/x86/lib/Makefile | 1 +
arch/x86/lib/checksum_32.S | 7 +-
arch/x86/lib/retpoline.S | 49 +++++++
drivers/ata/libata-core.c | 1 +
drivers/hv/hv.c | 11 +-
drivers/input/misc/twl4030-vibra.c | 6 +-
drivers/input/misc/twl6040-vibra.c | 2 +-
drivers/input/touchscreen/88pm860x-ts.c | 16 ++-
drivers/md/dm-thin-metadata.c | 6 +-
drivers/md/persistent-data/dm-btree.c | 19 +--
drivers/net/can/usb/peak_usb/pcan_usb_fd.c | 21 +--
drivers/phy/phy-core.c | 4 +
drivers/scsi/hpsa.c | 1 +
drivers/scsi/sg.c | 30 ++--
fs/pipe.c | 18 ++-
include/asm-generic/asm-prototypes.h | 7 +
include/asm-generic/export.h | 94 +++++++++++++
include/linux/kconfig.h | 11 +-
include/linux/vermagic.h | 8 +-
include/scsi/sg.h | 1 -
kernel/futex.c | 3 +
kernel/gcov/Kconfig | 1 +
kernel/sched/deadline.c | 2 +
kernel/trace/trace_events.c | 16 ++-
net/key/af_key.c | 8 ++
scripts/Makefile.build | 87 +++++++++++-
sound/core/pcm_lib.c | 1 -
sound/pci/hda/patch_cirrus.c | 1 +
sound/pci/hda/patch_realtek.c | 1 +
63 files changed, 960 insertions(+), 139 deletions(-)
Powered by blists - more mailing lists