[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20180816171612.136242278@linuxfoundation.org>
Date: Thu, 16 Aug 2018 20:45:10 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
ben.hutchings@...ethink.co.uk, lkft-triage@...ts.linaro.org,
stable@...r.kernel.org
Subject: [PATCH 4.17 00/21] 4.17.16-stable review
This is the start of the stable review cycle for the 4.17.16 release.
There are 21 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat Aug 18 17:16:02 UTC 2018.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.17.16-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.17.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Linux 4.17.16-rc1
Toshi Kani <toshi.kani@....com>
x86/mm: Add TLB purge to free pmd/pte page interfaces
Chintan Pandya <cpandya@...eaurora.org>
ioremap: Update pgtable free interfaces with addr
Mark Salyzyn <salyzyn@...roid.com>
Bluetooth: hidp: buffer overflow in hidp_process_report
Eric Biggers <ebiggers@...gle.com>
crypto: skcipher - fix crash flushing dcache in error path
Eric Biggers <ebiggers@...gle.com>
crypto: skcipher - fix aligning block size in skcipher_copy_iv()
Eric Biggers <ebiggers@...gle.com>
crypto: ablkcipher - fix crash flushing dcache in error path
Eric Biggers <ebiggers@...gle.com>
crypto: blkcipher - fix crash flushing dcache in error path
Eric Biggers <ebiggers@...gle.com>
crypto: vmac - separate tfm and request context
Eric Biggers <ebiggers@...gle.com>
crypto: vmac - require a block cipher with 128-bit block size
Eric Biggers <ebiggers@...gle.com>
crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2()
Tom Lendacky <thomas.lendacky@....com>
crypto: ccp - Fix command completion detection race
Tom Lendacky <thomas.lendacky@....com>
crypto: ccp - Check for NULL PSP pointer at module unload
Gilad Ben-Yossef <gilad@...yossef.com>
crypto: ccree - fix iv handling
Hadar Gat <hadar.gat@....com>
crypto: ccree - fix finup
Randy Dunlap <rdunlap@...radead.org>
kbuild: verify that $DEPMOD is installed
Toshi Kani <toshi.kani@....com>
x86/mm: Disable ioremap free page handling on x86-PAE
M. Vefa Bicakci <m.v.b@...box.com>
xen/pv: Call get_cpu_address_sizes to set x86_virt/phys_bits
Dave Hansen <dave.hansen@...ux.intel.com>
x86/mm/pti: Clear Global bit more aggressively
Dou Liyang <douly.fnst@...fujitsu.com>
x86/platform/UV: Mark memblock related init code and data correctly
Guenter Roeck <linux@...ck-us.net>
x86: i8259: Add missing include file
Guenter Roeck <linux@...ck-us.net>
x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled
-------------
Diffstat:
Documentation/process/changes.rst | 19 +-
Makefile | 4 +-
arch/arm64/mm/mmu.c | 4 +-
.../crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S | 2 +-
arch/x86/include/asm/i8259.h | 1 +
arch/x86/kernel/apic/x2apic_uv_x.c | 4 +-
arch/x86/kernel/cpu/bugs.c | 3 +-
arch/x86/kernel/cpu/common.c | 2 +-
arch/x86/kernel/cpu/cpu.h | 1 +
arch/x86/mm/pageattr.c | 6 +
arch/x86/mm/pgtable.c | 61 ++-
arch/x86/mm/pti.c | 34 +-
arch/x86/xen/enlighten_pv.c | 3 +
crypto/ablkcipher.c | 57 ++-
crypto/blkcipher.c | 54 ++-
crypto/skcipher.c | 55 +--
crypto/vmac.c | 412 +++++++++------------
drivers/crypto/ccp/psp-dev.c | 7 +-
drivers/crypto/ccree/cc_cipher.c | 111 ++++--
drivers/crypto/ccree/cc_hash.c | 81 +---
include/asm-generic/pgtable.h | 8 +-
include/crypto/vmac.h | 63 ----
lib/ioremap.c | 4 +-
net/bluetooth/hidp/core.c | 4 +-
scripts/depmod.sh | 8 +-
25 files changed, 489 insertions(+), 519 deletions(-)
Powered by blists - more mailing lists