[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20181121183508.262873520@linuxfoundation.org>
Date: Wed, 21 Nov 2018 20:06:15 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
ben.hutchings@...ethink.co.uk, lkft-triage@...ts.linaro.org,
stable@...r.kernel.org
Subject: [PATCH 4.9 00/59] 4.9.139-stable review
This is the start of the stable review cycle for the 4.9.139 release.
There are 59 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Fri Nov 23 18:34:55 UTC 2018.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.139-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Linux 4.9.139-rc1
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v1: mitigate user accesses
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v1: use get_user() for __get_user()
Russell King <rmk+kernel@...linux.org.uk>
ARM: use __inttype() in get_user()
Russell King <rmk+kernel@...linux.org.uk>
ARM: oabi-compat: copy semops using __copy_from_user()
Russell King <rmk+kernel@...linux.org.uk>
ARM: vfp: use __copy_from_user() when restoring VFP state
Russell King <rmk+kernel@...linux.org.uk>
ARM: signal: copy registers using __copy_from_user()
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v1: fix syscall entry
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v1: add array_index_mask_nospec() implementation
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v1: add speculation barrier (csdb) macros
Russell King <rmk+kernel@...linux.org.uk>
ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
Russell King <rmk+kernel@...linux.org.uk>
ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
Marc Zyngier <marc.zyngier@....com>
ARM: KVM: invalidate icache on guest exit for Cortex-A15
Marc Zyngier <marc.zyngier@....com>
ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v2: warn about incorrect context switching functions
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v2: add firmware based hardening
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v2: harden user aborts in kernel space
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre-v2: harden branch predictor on context switches
Russell King <rmk+kernel@...linux.org.uk>
ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
Russell King <rmk+kernel@...linux.org.uk>
ARM: bugs: add support for per-processor bug checking
Russell King <rmk+kernel@...linux.org.uk>
ARM: bugs: hook processor bug checking into SMP and suspend paths
Russell King <rmk+kernel@...linux.org.uk>
ARM: bugs: prepare processor bug infrastructure
Russell King <rmk+kernel@...linux.org.uk>
ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
Mark Rutland <mark.rutland@....com>
arm64: uaccess: suppress spurious clang warning
Arnd Bergmann <arnd@...db.de>
Kbuild: use -fshort-wchar globally
Matthias Kaehlcke <mka@...omium.org>
x86/build: Use cc-option to validate stack alignment parameter
Matthias Kaehlcke <mka@...omium.org>
x86/build: Fix stack alignment for CLang
Ard Biesheuvel <ard.biesheuvel@...aro.org>
efi/libstub/arm64: Set -fpie when building the EFI stub
Ard Biesheuvel <ard.biesheuvel@...aro.org>
efi/libstub: Preserve .debug sections after absolute relocation check
Ard Biesheuvel <ard.biesheuvel@...aro.org>
efi/libstub/arm64: Force 'hidden' visibility for section markers
Ard Biesheuvel <ard.biesheuvel@...aro.org>
efi/libstub/arm64: Use hidden attribute for struct screen_info reference
Michael Davidson <md@...gle.com>
x86/boot: #undef memcpy() et al in string.c
Ard Biesheuvel <ard.biesheuvel@...aro.org>
crypto: arm64/sha - avoid non-standard inline asm tricks
Matthias Kaehlcke <mka@...omium.org>
kbuild: clang: Disable 'address-of-packed-member' warning
Matthias Kaehlcke <mka@...omium.org>
x86/build: Specify stack alignment for clang
Matthias Kaehlcke <mka@...omium.org>
x86/build: Use __cc-option for boot code compiler options
Matthias Kaehlcke <mka@...omium.org>
kbuild: Add __cc-option macro
Michael Davidson <md@...gle.com>
crypto, x86: aesni - fix token pasting for clang
Matthias Kaehlcke <mka@...omium.org>
x86/kbuild: Use cc-option to enable -falign-{jumps/loops}
Arnd Bergmann <arnd@...db.de>
modules: mark __inittest/__exittest as __maybe_unused
Vinícius Tinti <viniciustinti@...il.com>
kbuild: Add support to generate LLVM assembly files
Behan Webster <behanw@...verseincode.com>
kbuild: use -Oz instead of -Os when using clang
Mark Charlebois <charlebm@...il.com>
kbuild, LLVMLinux: Add -Werror to cc-option to support clang
Masahiro Yamada <yamada.masahiro@...ionext.com>
kbuild: drop -Wno-unknown-warning-option from clang options
Jeroen Hofstee <jeroen@...pectrum.nl>
kbuild: fix asm-offset generation to work with clang
Masahiro Yamada <yamada.masahiro@...ionext.com>
kbuild: consolidate redundant sed script ASM offset generation
Matthias Kaehlcke <mka@...omium.org>
kbuild: Consolidate header generation from ASM offset information
Michael Davidson <md@...gle.com>
kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS
Behan Webster <behanw@...verseincode.com>
kbuild: Add better clang cross build support
David Ahern <dsahern@...il.com>
ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF
Eric Dumazet <edumazet@...gle.com>
inet: frags: better deal with smp races
Frieder Schrempf <frieder.schrempf@...tron.de>
usbnet: smsc95xx: disable carrier check while suspending
Siva Reddy Kallam <siva.kallam@...adcom.com>
tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths
Xin Long <lucien.xin@...il.com>
sctp: not allow to set asoc prsctp_enable by sockopt
Eric Dumazet <edumazet@...gle.com>
net-gro: reset skb->pkt_type in napi_reuse_skb()
Sabrina Dubroca <sd@...asysnail.net>
ip_tunnel: don't force DF when MTU is locked
Michał Mirosław <mirq-linux@...e.qmqm.pl>
ibmvnic: fix accelerated VLAN handling
배석진 <soukjin.bae@...sung.com>
flow_dissector: do not dissect l4 ports for fragments
-------------
Diffstat:
.gitignore | 1 +
Kbuild | 25 -----
Makefile | 29 +++--
arch/arm/include/asm/assembler.h | 12 +++
arch/arm/include/asm/barrier.h | 32 ++++++
arch/arm/include/asm/bugs.h | 6 +-
arch/arm/include/asm/cp15.h | 3 +
arch/arm/include/asm/cputype.h | 8 ++
arch/arm/include/asm/kvm_asm.h | 2 -
arch/arm/include/asm/kvm_host.h | 14 ++-
arch/arm/include/asm/kvm_mmu.h | 23 +++-
arch/arm/include/asm/proc-fns.h | 4 +
arch/arm/include/asm/system_misc.h | 15 +++
arch/arm/include/asm/thread_info.h | 4 +-
arch/arm/include/asm/uaccess.h | 26 +++--
arch/arm/kernel/Makefile | 1 +
arch/arm/kernel/bugs.c | 18 ++++
arch/arm/kernel/entry-common.S | 18 ++--
arch/arm/kernel/entry-header.S | 25 +++++
arch/arm/kernel/signal.c | 55 +++++-----
arch/arm/kernel/smp.c | 4 +
arch/arm/kernel/suspend.c | 2 +
arch/arm/kernel/sys_oabi-compat.c | 8 +-
arch/arm/kvm/hyp/hyp-entry.S | 112 ++++++++++++++++++-
arch/arm/lib/copy_from_user.S | 9 ++
arch/arm/mm/Kconfig | 23 ++++
arch/arm/mm/Makefile | 2 +-
arch/arm/mm/fault.c | 3 +
arch/arm/mm/proc-macros.S | 3 +-
arch/arm/mm/proc-v7-2level.S | 6 --
arch/arm/mm/proc-v7-bugs.c | 174 ++++++++++++++++++++++++++++++
arch/arm/mm/proc-v7.S | 154 ++++++++++++++++++++------
arch/arm/vfp/vfpmodule.c | 17 ++-
arch/arm64/crypto/sha1-ce-core.S | 6 +-
arch/arm64/crypto/sha1-ce-glue.c | 11 +-
arch/arm64/crypto/sha2-ce-core.S | 6 +-
arch/arm64/crypto/sha2-ce-glue.c | 13 +--
arch/arm64/include/asm/efi.h | 3 +
arch/arm64/include/asm/uaccess.h | 4 +-
arch/ia64/kernel/Makefile | 26 +----
arch/x86/Makefile | 39 +++++--
arch/x86/boot/string.c | 9 ++
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 7 +-
drivers/firmware/efi/libstub/Makefile | 26 +++--
drivers/firmware/efi/libstub/arm64-stub.c | 10 +-
drivers/net/ethernet/broadcom/tg3.c | 18 +++-
drivers/net/ethernet/ibm/ibmvnic.c | 2 +-
drivers/net/usb/smsc95xx.c | 7 ++
drivers/xen/Makefile | 3 -
include/linux/kbuild.h | 6 +-
include/linux/module.h | 4 +-
net/core/dev.c | 4 +
net/core/flow_dissector.c | 4 +-
net/ipv4/inet_fragment.c | 28 ++---
net/ipv4/ip_tunnel_core.c | 2 +-
net/ipv6/route.c | 7 +-
net/sctp/socket.c | 26 +----
scripts/Kbuild.include | 18 +++-
scripts/Makefile.build | 8 ++
scripts/Makefile.extrawarn | 1 -
scripts/Makefile.host | 6 --
scripts/Makefile.lib | 31 ++++++
scripts/mod/Makefile | 28 +----
63 files changed, 903 insertions(+), 298 deletions(-)
Powered by blists - more mailing lists