Re: Linux 4.9.139

From: Rainer Fiebig
Date: Fri Nov 23 2018 - 03:54:19 EST


Am Freitag, 23. November 2018, 08:47:31 schrieb Greg KH:
> I'm announcing the release of the 4.9.139 kernel.
>
> All users of the 4.9 kernel series must upgrade.
>
> The updated 4.9.y git tree can be found at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
> linux-4.9.y and can be browsed at the normal kernel.org git web browser:
> http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
>
> thanks,
>
> greg k-h
>
Just *in case* this was an oversight: STIBP is still active in 4.9.139.

Not that I would mind because for my modest Core i3 that I mainly use for
office-work I don't see *any* difference in performance compared to 4.9.136
(no STIBP).

So long!

Rainer Fiebig

> ------------
>
> .gitignore | 1
> Kbuild | 25 ----
> Makefile | 27 +++-
> arch/arm/include/asm/assembler.h | 12 ++
> arch/arm/include/asm/barrier.h | 32 +++++
> arch/arm/include/asm/bugs.h | 6 -
> arch/arm/include/asm/cp15.h | 3
> arch/arm/include/asm/cputype.h | 8 +
> arch/arm/include/asm/kvm_asm.h | 2
> arch/arm/include/asm/kvm_host.h | 14 ++
> arch/arm/include/asm/kvm_mmu.h | 23 +++
> arch/arm/include/asm/proc-fns.h | 4
> arch/arm/include/asm/system_misc.h | 15 ++
> arch/arm/include/asm/thread_info.h | 4
> arch/arm/include/asm/uaccess.h | 26 +++-
> arch/arm/kernel/Makefile | 1
> arch/arm/kernel/bugs.c | 18 +++
> arch/arm/kernel/entry-common.S | 18 +--
> arch/arm/kernel/entry-header.S | 25 ++++
> arch/arm/kernel/signal.c | 55 +++++----
> arch/arm/kernel/smp.c | 4
> arch/arm/kernel/suspend.c | 2
> arch/arm/kernel/sys_oabi-compat.c | 8 -
> arch/arm/kvm/hyp/hyp-entry.S | 112 ++++++++++++++++++-
> arch/arm/lib/copy_from_user.S | 9 +
> arch/arm/mm/Kconfig | 23 +++
> arch/arm/mm/Makefile | 2
> arch/arm/mm/fault.c | 3
> arch/arm/mm/proc-macros.S | 3
> arch/arm/mm/proc-v7-2level.S | 6 -
> arch/arm/mm/proc-v7-bugs.c | 174
> ++++++++++++++++++++++++++++++ arch/arm/mm/proc-v7.S |
> 154 +++++++++++++++++++++----- arch/arm/vfp/vfpmodule.c |
> 17 +-
> arch/arm64/crypto/sha1-ce-core.S | 6 -
> arch/arm64/crypto/sha1-ce-glue.c | 11 -
> arch/arm64/crypto/sha2-ce-core.S | 6 -
> arch/arm64/crypto/sha2-ce-glue.c | 13 --
> arch/arm64/include/asm/efi.h | 3
> arch/arm64/include/asm/uaccess.h | 4
> arch/ia64/kernel/Makefile | 26 ----
> arch/x86/Makefile | 39 +++++-
> arch/x86/boot/string.c | 9 +
> arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 7 -
> drivers/firmware/efi/libstub/Makefile | 26 ++--
> drivers/firmware/efi/libstub/arm64-stub.c | 10 +
> drivers/net/ethernet/broadcom/tg3.c | 18 ++-
> drivers/net/usb/smsc95xx.c | 7 +
> drivers/xen/Makefile | 3
> include/linux/kbuild.h | 6 -
> include/linux/module.h | 4
> net/core/dev.c | 4
> net/core/flow_dissector.c | 4
> net/ipv4/inet_fragment.c | 28 ++--
> net/ipv4/ip_tunnel_core.c | 2
> net/ipv6/route.c | 7 -
> net/sctp/socket.c | 26 ----
> scripts/Kbuild.include | 18 ++-
> scripts/Makefile.build | 8 +
> scripts/Makefile.extrawarn | 1
> scripts/Makefile.host | 6 -
> scripts/Makefile.lib | 31 +++++
> scripts/mod/Makefile | 28 ----
> 62 files changed, 901 insertions(+), 296 deletions(-)
>
> Ard Biesheuvel (5):
> crypto: arm64/sha - avoid non-standard inline asm tricks
> efi/libstub/arm64: Use hidden attribute for struct screen_info
> reference efi/libstub/arm64: Force 'hidden' visibility for section markers
> efi/libstub: Preserve .debug sections after absolute relocation check
> efi/libstub/arm64: Set -fpie when building the EFI stub
>
> Arnd Bergmann (2):
> modules: mark __inittest/__exittest as __maybe_unused
> Kbuild: use -fshort-wchar globally
>
> Behan Webster (2):
> kbuild: Add better clang cross build support
> kbuild: use -Oz instead of -Os when using clang
>
> David Ahern (1):
> ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF
>
> Eric Dumazet (2):
> net-gro: reset skb->pkt_type in napi_reuse_skb()
> inet: frags: better deal with smp races
>
> Frieder Schrempf (1):
> usbnet: smsc95xx: disable carrier check while suspending
>
> Greg Kroah-Hartman (1):
> Linux 4.9.139
>
> Jeroen Hofstee (1):
> kbuild: fix asm-offset generation to work with clang
>
> Marc Zyngier (2):
> ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
> ARM: KVM: invalidate icache on guest exit for Cortex-A15
>
> Mark Charlebois (1):
> kbuild, LLVMLinux: Add -Werror to cc-option to support clang
>
> Mark Rutland (1):
> arm64: uaccess: suppress spurious clang warning
>
> Masahiro Yamada (2):
> kbuild: consolidate redundant sed script ASM offset generation
> kbuild: drop -Wno-unkanown-warning-option from clang options
>
> Matthias Kaehlcke (8):
> kbuild: Consolidate header generation from ASM offset information
> x86/kbuild: Use cc-option to enable -falign-{jumps/loops}
> kbuild: Add __cc-option macro
> x86/build: Use __cc-option for boot code compiler options
> x86/build: Specify stack alignment for clang
> kbuild: clang: Disable 'address-of-packed-member' warning
> x86/build: Fix stack alignment for CLang
> x86/build: Use cc-option to validate stack alignment parameter
>
> Michael Davidson (3):
> kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS
> crypto, x86: aesni - fix token pasting for clang
> x86/boot: #undef memcpy() et al in string.c
>
> Russell King (22):
> ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
> ARM: bugs: prepare processor bug infrastructure
> ARM: bugs: hook processor bug checking into SMP and suspend paths
> ARM: bugs: add support for per-processor bug checking
> ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
> ARM: spectre-v2: harden branch predictor on context switches
> ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
> ARM: spectre-v2: harden user aborts in kernel space
> ARM: spectre-v2: add firmware based hardening
> ARM: spectre-v2: warn about incorrect context switching functions
> ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
> ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
> ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
> ARM: spectre-v1: add speculation barrier (csdb) macros
> ARM: spectre-v1: add array_index_mask_nospec() implementation
> ARM: spectre-v1: fix syscall entry
> ARM: signal: copy registers using __copy_from_user()
> ARM: vfp: use __copy_from_user() when restoring VFP state
> ARM: oabi-compat: copy semops using __copy_from_user()
> ARM: use __inttype() in get_user()
> ARM: spectre-v1: use get_user() for __get_user()
> ARM: spectre-v1: mitigate user accesses
>
> Sabrina Dubroca (1):
> ip_tunnel: don't force DF when MTU is locked
>
> Siva Reddy Kallam (1):
> tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control
> paths
>
> VinÃcius Tinti (1):
> kbuild: Add support to generate LLVM assembly files
>
> Xin Long (1):
> sctp: not allow to set asoc prsctp_enable by sockopt
>
> ëìì (1):
> flow_dissector: do not dissect l4 ports for fragments

--
The truth always turns out to be simpler than you thought.
Richard Feynman

Attachment: signature.asc
Description: This is a digitally signed message part.