[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180213115042.GA2914@kroah.com>
Date: Tue, 13 Feb 2018 12:50:42 +0100
From: Greg KH <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.9.81
I'm announcing the release of the 4.9.81 kernel.
All users of the 4.9 kernel series must upgrade.
The updated 4.9.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.9.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Documentation/kernel-parameters.txt | 2
Documentation/speculation.txt | 90 ++
Makefile | 2
arch/powerpc/Kconfig | 1
arch/powerpc/include/asm/exception-64e.h | 6
arch/powerpc/include/asm/exception-64s.h | 53 +
arch/powerpc/include/asm/feature-fixups.h | 15
arch/powerpc/include/asm/hvcall.h | 17
arch/powerpc/include/asm/paca.h | 10
arch/powerpc/include/asm/plpar_wrappers.h | 14
arch/powerpc/include/asm/setup.h | 13
arch/powerpc/kernel/asm-offsets.c | 4
arch/powerpc/kernel/entry_64.S | 30
arch/powerpc/kernel/exceptions-64s.S | 108 ++
arch/powerpc/kernel/setup_64.c | 139 +++
arch/powerpc/kernel/vmlinux.lds.S | 9
arch/powerpc/lib/feature-fixups.c | 42 +
arch/powerpc/platforms/powernv/setup.c | 50 +
arch/powerpc/platforms/pseries/setup.c | 35
arch/x86/entry/common.c | 9
arch/x86/entry/entry_32.S | 3
arch/x86/entry/entry_64.S | 134 ---
arch/x86/entry/syscall_64.c | 7
arch/x86/events/intel/bts.c | 44 -
arch/x86/include/asm/asm-prototypes.h | 4
arch/x86/include/asm/asm.h | 4
arch/x86/include/asm/barrier.h | 28
arch/x86/include/asm/cpufeature.h | 7
arch/x86/include/asm/cpufeatures.h | 22
arch/x86/include/asm/disabled-features.h | 3
arch/x86/include/asm/intel-family.h | 7
arch/x86/include/asm/msr-index.h | 12
arch/x86/include/asm/msr.h | 3
arch/x86/include/asm/nospec-branch.h | 91 --
arch/x86/include/asm/pgalloc.h | 11
arch/x86/include/asm/pgtable.h | 6
arch/x86/include/asm/processor.h | 2
arch/x86/include/asm/required-features.h | 3
arch/x86/include/asm/syscall.h | 6
arch/x86/include/asm/thread_info.h | 3
arch/x86/include/asm/uaccess.h | 15
arch/x86/include/asm/uaccess_32.h | 12
arch/x86/include/asm/uaccess_64.h | 12
arch/x86/kernel/alternative.c | 14
arch/x86/kernel/cpu/bugs.c | 128 ++-
arch/x86/kernel/cpu/common.c | 70 +
arch/x86/kernel/cpu/intel.c | 66 +
arch/x86/kernel/cpu/microcode/core.c | 47 -
arch/x86/kernel/cpu/scattered.c | 2
arch/x86/kernel/process_64.c | 4
arch/x86/kernel/ptrace.c | 2
arch/x86/kernel/signal.c | 2
arch/x86/kernel/tboot.c | 10
arch/x86/kvm/cpuid.c | 21
arch/x86/kvm/cpuid.h | 31
arch/x86/kvm/emulate.c | 10
arch/x86/kvm/svm.c | 116 +++
arch/x86/kvm/vmx.c | 763 ++++++++++----------
arch/x86/kvm/x86.c | 1
arch/x86/lib/Makefile | 1
arch/x86/lib/getuser.S | 10
arch/x86/lib/retpoline.S | 57 +
arch/x86/lib/usercopy_32.c | 8
crypto/tcrypt.c | 6
drivers/auxdisplay/img-ascii-lcd.c | 4
drivers/gpu/drm/rcar-du/rcar_du_crtc.c | 55 +
drivers/gpu/drm/rcar-du/rcar_du_crtc.h | 8
drivers/media/platform/soc_camera/soc_scale_crop.c | 4
drivers/net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c | 18
drivers/net/ethernet/realtek/r8169.c | 4
drivers/net/usb/qmi_wwan.c | 1
drivers/net/wireless/broadcom/b43/main.c | 10
drivers/pinctrl/pxa/pinctrl-pxa2xx.c | 4
drivers/tty/serial/serial_core.c | 2
drivers/vhost/net.c | 1
include/linux/fdtable.h | 5
include/linux/init.h | 9
include/linux/module.h | 9
include/linux/nospec.h | 72 +
kernel/module.c | 11
net/core/sock_reuseport.c | 35
net/ipv4/igmp.c | 4
net/ipv4/tcp.c | 6
net/ipv4/tcp_bbr.c | 6
net/ipv6/af_inet6.c | 11
net/ipv6/ip6mr.c | 1
net/sched/cls_u32.c | 12
net/wireless/nl80211.c | 9
scripts/mod/modpost.c | 9
security/keys/encrypted-keys/encrypted.c | 31
sound/soc/codecs/pcm512x-spi.c | 4
sound/soc/generic/simple-card.c | 8
sound/soc/sh/rcar/ssi.c | 5
93 files changed, 2026 insertions(+), 789 deletions(-)
Andi Kleen (1):
module/retpoline: Warn about missing retpoline in module
Andy Lutomirski (3):
x86/entry/64: Remove the SYSCALL64 fast path
x86/entry/64: Push extra regs right away
x86/asm: Move 'status' from thread_struct to thread_info
Arnd Bergmann (1):
x86/pti: Mark constant arrays as __initconst
Ashok Raj (1):
KVM/x86: Add IBPB support
Borislav Petkov (5):
x86/microcode/AMD: Do not load when running on a hypervisor
x86/nospec: Fix header guards names
x86/bugs: Drop one "mitigation" from dmesg
x86/retpoline: Simplify vmexit_fill_RSB()
x86/microcode: Do the family check first
Chunhao Lin (1):
r8169: fix RTL8168EP take too long to complete driver initialization.
Colin Ian King (1):
x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
Dan Williams (12):
array_index_nospec: Sanitize speculative array de-references
x86: Implement array_index_mask_nospec
x86: Introduce barrier_nospec
x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
x86/get_user: Use pointer masking to limit speculation
x86/syscall: Sanitize syscall table de-references under speculation
vfs, fdtable: Prevent bounds-check bypass via speculative execution
nl80211: Sanitize array index in parse_txq_params
x86/spectre: Report get_user mitigation for spectre_v1
x86/kvm: Update spectre-v1 mitigation
Darren Kenny (1):
x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
Dave Hansen (1):
x86/pti: Make unpoison of pgd for trusted boot work for real
David Hildenbrand (2):
KVM: nVMX: kmap() can't fail
KVM: nVMX: vmx_complete_nested_posted_interrupt() can't fail
David Matlack (1):
KVM: nVMX: mark vmcs12 pages dirty on L2 exit
David Woodhouse (10):
x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
x86/cpufeatures: Add Intel feature bits for Speculation Control
x86/cpufeatures: Add AMD feature bits for Speculation Control
x86/msr: Add definitions for new speculation control MSRs
x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
x86/cpufeatures: Clean up Spectre v2 related CPUID flags
x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
x86/retpoline: Avoid retpolines for built-in __init functions
Dou Liyang (1):
x86/spectre: Check CONFIG_RETPOLINE in command line parser
Eric Biggers (1):
KEYS: encrypted: fix buffer overread in valid_master_desc()
Eric Dumazet (2):
net: igmp: add a missing rcu locking section
soreuseport: fix mem leak in reuseport_add_sock()
Greg Kroah-Hartman (1):
Linux 4.9.81
Hugh Dickins (2):
kaiser: fix intel_bts perf crashes
kaiser: allocate pgd with order 0 when pti=off
Jason Wang (1):
vhost_net: stop device during reset owner
Jesse Chan (4):
auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
media: soc_camera: soc_scale_crop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
Jim Mattson (1):
KVM: nVMX: Eliminate vmcs02 pool
Josh Poimboeuf (2):
x86/asm: Fix inline asm call constraints for GCC 4.4
x86/paravirt: Remove 'noreplace-paravirt' cmdline option
Julian Scheel (1):
ASoC: simple-card: Fix misleading error message
Junxiao Bi (1):
qlcnic: fix deadlock bug
KarimAllah Ahmed (4):
x86/spectre: Simplify spectre_v2 command line parsing
KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL
Kristian Evensen (1):
qmi_wwan: Add support for Quectel EP06
Kuninori Morimoto (2):
ASoC: rsnd: don't call free_irq() on Parent SSI
ASoC: rsnd: avoid duplicate free_irq()
Laurent Pinchart (2):
drm: rcar-du: Use the VBK interrupt for vblank events
drm: rcar-du: Fix race condition when disabling planes at CRTC stop
Li RongQing (1):
tcp: release sk_frag.page in tcp_disconnect
Mark Rutland (1):
Documentation: Document array_index_nospec
Martin KaFai Lau (1):
ipv6: Fix SO_REUSEPORT UDP socket with implicit sk_ipv6only
Michael Ellerman (4):
powerpc/64s: Add support for RFI flush of L1-D cache
powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti
powerpc/64s: Wire up cpu_show_meltdown()
powerpc/64s: Allow control of RFI flush via debugfs
Michael Neuling (2):
powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper
powerpc/pseries: Query hypervisor for RFI flush settings
Neal Cardwell (1):
tcp_bbr: fix pacing_gain to always be unity when using lt_bw
Nicholas Piggin (4):
powerpc/64: Add macros for annotating the destination of rfid/hrfid
powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL
powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL
powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL
Nikolay Aleksandrov (1):
ip6mr: fix stale iterator
Oliver O'Halloran (1):
powerpc/powernv: Check device-tree for RFI flush settings
Paolo Abeni (1):
cls_u32: add missing RCU annotation.
Paolo Bonzini (2):
KVM: VMX: introduce alloc_loaded_vmcs
KVM: VMX: make MSR bitmaps per-VCPU
Peter Zijlstra (2):
KVM: x86: Make indirect calls in emulator speculation safe
KVM: VMX: Make indirect call speculation safe
Robert Baronescu (1):
crypto: tcrypt - fix S/G table for test_aead_speed()
Sebastian Andrzej Siewior (1):
serial: core: mark port as initialized after successful IRQ change
Takashi Iwai (1):
b43: Add missing MODULE_FIRMWARE()
Thomas Gleixner (1):
x86/cpu/bugs: Make retpoline module warning conditional
Waiman Long (1):
x86/retpoline: Remove the esp/rsp thunk
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists