lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1668382.GpLhWH2QsV@siriux>
Date:   Fri, 23 Nov 2018 09:55:47 +0100
From:   Rainer Fiebig <jrf@...lbox.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg KH <gregkh@...uxfoundation.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, stable@...r.kernel.org, lwn@....net,
        Jiri Slaby <jslaby@...e.cz>
Subject: Re: Linux 4.9.139

Am Freitag, 23. November 2018, 08:47:31 schrieb Greg KH:
> I'm announcing the release of the 4.9.139 kernel.
> 
> All users of the 4.9 kernel series must upgrade.
> 
> The updated 4.9.y git tree can be found at:
> 	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
> linux-4.9.y and can be browsed at the normal kernel.org git web browser:
> 	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
> 
> thanks,
> 
> greg k-h
> 
Just *in case* this was an oversight: STIBP is still active in 4.9.139.

Not that I would mind because for my modest Core i3 that I mainly use for 
office-work I don't see *any* difference in performance compared to 4.9.136 
(no STIBP).

So long!

Rainer Fiebig

> ------------
> 
>  .gitignore                                |    1
>  Kbuild                                    |   25 ----
>  Makefile                                  |   27 +++-
>  arch/arm/include/asm/assembler.h          |   12 ++
>  arch/arm/include/asm/barrier.h            |   32 +++++
>  arch/arm/include/asm/bugs.h               |    6 -
>  arch/arm/include/asm/cp15.h               |    3
>  arch/arm/include/asm/cputype.h            |    8 +
>  arch/arm/include/asm/kvm_asm.h            |    2
>  arch/arm/include/asm/kvm_host.h           |   14 ++
>  arch/arm/include/asm/kvm_mmu.h            |   23 +++
>  arch/arm/include/asm/proc-fns.h           |    4
>  arch/arm/include/asm/system_misc.h        |   15 ++
>  arch/arm/include/asm/thread_info.h        |    4
>  arch/arm/include/asm/uaccess.h            |   26 +++-
>  arch/arm/kernel/Makefile                  |    1
>  arch/arm/kernel/bugs.c                    |   18 +++
>  arch/arm/kernel/entry-common.S            |   18 +--
>  arch/arm/kernel/entry-header.S            |   25 ++++
>  arch/arm/kernel/signal.c                  |   55 +++++----
>  arch/arm/kernel/smp.c                     |    4
>  arch/arm/kernel/suspend.c                 |    2
>  arch/arm/kernel/sys_oabi-compat.c         |    8 -
>  arch/arm/kvm/hyp/hyp-entry.S              |  112 ++++++++++++++++++-
>  arch/arm/lib/copy_from_user.S             |    9 +
>  arch/arm/mm/Kconfig                       |   23 +++
>  arch/arm/mm/Makefile                      |    2
>  arch/arm/mm/fault.c                       |    3
>  arch/arm/mm/proc-macros.S                 |    3
>  arch/arm/mm/proc-v7-2level.S              |    6 -
>  arch/arm/mm/proc-v7-bugs.c                |  174
> ++++++++++++++++++++++++++++++ arch/arm/mm/proc-v7.S                     | 
> 154 +++++++++++++++++++++----- arch/arm/vfp/vfpmodule.c                  | 
>  17 +-
>  arch/arm64/crypto/sha1-ce-core.S          |    6 -
>  arch/arm64/crypto/sha1-ce-glue.c          |   11 -
>  arch/arm64/crypto/sha2-ce-core.S          |    6 -
>  arch/arm64/crypto/sha2-ce-glue.c          |   13 --
>  arch/arm64/include/asm/efi.h              |    3
>  arch/arm64/include/asm/uaccess.h          |    4
>  arch/ia64/kernel/Makefile                 |   26 ----
>  arch/x86/Makefile                         |   39 +++++-
>  arch/x86/boot/string.c                    |    9 +
>  arch/x86/crypto/aes_ctrby8_avx-x86_64.S   |    7 -
>  drivers/firmware/efi/libstub/Makefile     |   26 ++--
>  drivers/firmware/efi/libstub/arm64-stub.c |   10 +
>  drivers/net/ethernet/broadcom/tg3.c       |   18 ++-
>  drivers/net/usb/smsc95xx.c                |    7 +
>  drivers/xen/Makefile                      |    3
>  include/linux/kbuild.h                    |    6 -
>  include/linux/module.h                    |    4
>  net/core/dev.c                            |    4
>  net/core/flow_dissector.c                 |    4
>  net/ipv4/inet_fragment.c                  |   28 ++--
>  net/ipv4/ip_tunnel_core.c                 |    2
>  net/ipv6/route.c                          |    7 -
>  net/sctp/socket.c                         |   26 ----
>  scripts/Kbuild.include                    |   18 ++-
>  scripts/Makefile.build                    |    8 +
>  scripts/Makefile.extrawarn                |    1
>  scripts/Makefile.host                     |    6 -
>  scripts/Makefile.lib                      |   31 +++++
>  scripts/mod/Makefile                      |   28 ----
>  62 files changed, 901 insertions(+), 296 deletions(-)
> 
> Ard Biesheuvel (5):
>       crypto: arm64/sha - avoid non-standard inline asm tricks
>       efi/libstub/arm64: Use hidden attribute for struct screen_info
> reference efi/libstub/arm64: Force 'hidden' visibility for section markers
> efi/libstub: Preserve .debug sections after absolute relocation check
> efi/libstub/arm64: Set -fpie when building the EFI stub
> 
> Arnd Bergmann (2):
>       modules: mark __inittest/__exittest as __maybe_unused
>       Kbuild: use -fshort-wchar globally
> 
> Behan Webster (2):
>       kbuild: Add better clang cross build support
>       kbuild: use -Oz instead of -Os when using clang
> 
> David Ahern (1):
>       ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF
> 
> Eric Dumazet (2):
>       net-gro: reset skb->pkt_type in napi_reuse_skb()
>       inet: frags: better deal with smp races
> 
> Frieder Schrempf (1):
>       usbnet: smsc95xx: disable carrier check while suspending
> 
> Greg Kroah-Hartman (1):
>       Linux 4.9.139
> 
> Jeroen Hofstee (1):
>       kbuild: fix asm-offset generation to work with clang
> 
> Marc Zyngier (2):
>       ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
>       ARM: KVM: invalidate icache on guest exit for Cortex-A15
> 
> Mark Charlebois (1):
>       kbuild, LLVMLinux: Add -Werror to cc-option to support clang
> 
> Mark Rutland (1):
>       arm64: uaccess: suppress spurious clang warning
> 
> Masahiro Yamada (2):
>       kbuild: consolidate redundant sed script ASM offset generation
>       kbuild: drop -Wno-unkanown-warning-option from clang options
> 
> Matthias Kaehlcke (8):
>       kbuild: Consolidate header generation from ASM offset information
>       x86/kbuild: Use cc-option to enable -falign-{jumps/loops}
>       kbuild: Add __cc-option macro
>       x86/build: Use __cc-option for boot code compiler options
>       x86/build: Specify stack alignment for clang
>       kbuild: clang: Disable 'address-of-packed-member' warning
>       x86/build: Fix stack alignment for CLang
>       x86/build: Use cc-option to validate stack alignment parameter
> 
> Michael Davidson (3):
>       kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS
>       crypto, x86: aesni - fix token pasting for clang
>       x86/boot: #undef memcpy() et al in string.c
> 
> Russell King (22):
>       ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
>       ARM: bugs: prepare processor bug infrastructure
>       ARM: bugs: hook processor bug checking into SMP and suspend paths
>       ARM: bugs: add support for per-processor bug checking
>       ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
>       ARM: spectre-v2: harden branch predictor on context switches
>       ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
>       ARM: spectre-v2: harden user aborts in kernel space
>       ARM: spectre-v2: add firmware based hardening
>       ARM: spectre-v2: warn about incorrect context switching functions
>       ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
>       ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
>       ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
>       ARM: spectre-v1: add speculation barrier (csdb) macros
>       ARM: spectre-v1: add array_index_mask_nospec() implementation
>       ARM: spectre-v1: fix syscall entry
>       ARM: signal: copy registers using __copy_from_user()
>       ARM: vfp: use __copy_from_user() when restoring VFP state
>       ARM: oabi-compat: copy semops using __copy_from_user()
>       ARM: use __inttype() in get_user()
>       ARM: spectre-v1: use get_user() for __get_user()
>       ARM: spectre-v1: mitigate user accesses
> 
> Sabrina Dubroca (1):
>       ip_tunnel: don't force DF when MTU is locked
> 
> Siva Reddy Kallam (1):
>       tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control
> paths
> 
> Vinícius Tinti (1):
>       kbuild: Add support to generate LLVM assembly files
> 
> Xin Long (1):
>       sctp: not allow to set asoc prsctp_enable by sockopt
> 
> 배석진 (1):
>       flow_dissector: do not dissect l4 ports for fragments

-- 
The truth always turns out to be simpler than you thought.
Richard Feynman
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ