[PATCH 4.9 00/59] 4.9.139-stable review
From: Greg Kroah-Hartman
Date: Wed Nov 21 2018 - 14:10:56 EST
This is the start of the stable review cycle for the 4.9.139 release.
There are 59 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Fri Nov 23 18:34:55 UTC 2018.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.139-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Linux 4.9.139-rc1
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v1: mitigate user accesses
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v1: use get_user() for __get_user()
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: use __inttype() in get_user()
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: oabi-compat: copy semops using __copy_from_user()
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: vfp: use __copy_from_user() when restoring VFP state
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: signal: copy registers using __copy_from_user()
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v1: fix syscall entry
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v1: add array_index_mask_nospec() implementation
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v1: add speculation barrier (csdb) macros
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
Marc Zyngier <marc.zyngier@xxxxxxx>
ARM: KVM: invalidate icache on guest exit for Cortex-A15
Marc Zyngier <marc.zyngier@xxxxxxx>
ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v2: warn about incorrect context switching functions
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v2: add firmware based hardening
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v2: harden user aborts in kernel space
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre-v2: harden branch predictor on context switches
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: bugs: add support for per-processor bug checking
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: bugs: hook processor bug checking into SMP and suspend paths
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: bugs: prepare processor bug infrastructure
Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
Mark Rutland <mark.rutland@xxxxxxx>
arm64: uaccess: suppress spurious clang warning
Arnd Bergmann <arnd@xxxxxxxx>
Kbuild: use -fshort-wchar globally
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
x86/build: Use cc-option to validate stack alignment parameter
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
x86/build: Fix stack alignment for CLang
Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
efi/libstub/arm64: Set -fpie when building the EFI stub
Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
efi/libstub: Preserve .debug sections after absolute relocation check
Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
efi/libstub/arm64: Force 'hidden' visibility for section markers
Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
efi/libstub/arm64: Use hidden attribute for struct screen_info reference
Michael Davidson <md@xxxxxxxxxx>
x86/boot: #undef memcpy() et al in string.c
Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
crypto: arm64/sha - avoid non-standard inline asm tricks
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
kbuild: clang: Disable 'address-of-packed-member' warning
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
x86/build: Specify stack alignment for clang
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
x86/build: Use __cc-option for boot code compiler options
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
kbuild: Add __cc-option macro
Michael Davidson <md@xxxxxxxxxx>
crypto, x86: aesni - fix token pasting for clang
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
x86/kbuild: Use cc-option to enable -falign-{jumps/loops}
Arnd Bergmann <arnd@xxxxxxxx>
modules: mark __inittest/__exittest as __maybe_unused
VinÃcius Tinti <viniciustinti@xxxxxxxxx>
kbuild: Add support to generate LLVM assembly files
Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
kbuild: use -Oz instead of -Os when using clang
Mark Charlebois <charlebm@xxxxxxxxx>
kbuild, LLVMLinux: Add -Werror to cc-option to support clang
Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
kbuild: drop -Wno-unknown-warning-option from clang options
Jeroen Hofstee <jeroen@xxxxxxxxxxxxx>
kbuild: fix asm-offset generation to work with clang
Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
kbuild: consolidate redundant sed script ASM offset generation
Matthias Kaehlcke <mka@xxxxxxxxxxxx>
kbuild: Consolidate header generation from ASM offset information
Michael Davidson <md@xxxxxxxxxx>
kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS
Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
kbuild: Add better clang cross build support
David Ahern <dsahern@xxxxxxxxx>
ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF
Eric Dumazet <edumazet@xxxxxxxxxx>
inet: frags: better deal with smp races
Frieder Schrempf <frieder.schrempf@xxxxxxxxxx>
usbnet: smsc95xx: disable carrier check while suspending
Siva Reddy Kallam <siva.kallam@xxxxxxxxxxxx>
tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths
Xin Long <lucien.xin@xxxxxxxxx>
sctp: not allow to set asoc prsctp_enable by sockopt
Eric Dumazet <edumazet@xxxxxxxxxx>
net-gro: reset skb->pkt_type in napi_reuse_skb()
Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
ip_tunnel: don't force DF when MTU is locked
MichaÅ MirosÅaw <mirq-linux@xxxxxxxxxxxx>
ibmvnic: fix accelerated VLAN handling
ëìì <soukjin.bae@xxxxxxxxxxx>
flow_dissector: do not dissect l4 ports for fragments
-------------
Diffstat:
.gitignore | 1 +
Kbuild | 25 -----
Makefile | 29 +++--
arch/arm/include/asm/assembler.h | 12 +++
arch/arm/include/asm/barrier.h | 32 ++++++
arch/arm/include/asm/bugs.h | 6 +-
arch/arm/include/asm/cp15.h | 3 +
arch/arm/include/asm/cputype.h | 8 ++
arch/arm/include/asm/kvm_asm.h | 2 -
arch/arm/include/asm/kvm_host.h | 14 ++-
arch/arm/include/asm/kvm_mmu.h | 23 +++-
arch/arm/include/asm/proc-fns.h | 4 +
arch/arm/include/asm/system_misc.h | 15 +++
arch/arm/include/asm/thread_info.h | 4 +-
arch/arm/include/asm/uaccess.h | 26 +++--
arch/arm/kernel/Makefile | 1 +
arch/arm/kernel/bugs.c | 18 ++++
arch/arm/kernel/entry-common.S | 18 ++--
arch/arm/kernel/entry-header.S | 25 +++++
arch/arm/kernel/signal.c | 55 +++++-----
arch/arm/kernel/smp.c | 4 +
arch/arm/kernel/suspend.c | 2 +
arch/arm/kernel/sys_oabi-compat.c | 8 +-
arch/arm/kvm/hyp/hyp-entry.S | 112 ++++++++++++++++++-
arch/arm/lib/copy_from_user.S | 9 ++
arch/arm/mm/Kconfig | 23 ++++
arch/arm/mm/Makefile | 2 +-
arch/arm/mm/fault.c | 3 +
arch/arm/mm/proc-macros.S | 3 +-
arch/arm/mm/proc-v7-2level.S | 6 --
arch/arm/mm/proc-v7-bugs.c | 174 ++++++++++++++++++++++++++++++
arch/arm/mm/proc-v7.S | 154 ++++++++++++++++++++------
arch/arm/vfp/vfpmodule.c | 17 ++-
arch/arm64/crypto/sha1-ce-core.S | 6 +-
arch/arm64/crypto/sha1-ce-glue.c | 11 +-
arch/arm64/crypto/sha2-ce-core.S | 6 +-
arch/arm64/crypto/sha2-ce-glue.c | 13 +--
arch/arm64/include/asm/efi.h | 3 +
arch/arm64/include/asm/uaccess.h | 4 +-
arch/ia64/kernel/Makefile | 26 +----
arch/x86/Makefile | 39 +++++--
arch/x86/boot/string.c | 9 ++
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 7 +-
drivers/firmware/efi/libstub/Makefile | 26 +++--
drivers/firmware/efi/libstub/arm64-stub.c | 10 +-
drivers/net/ethernet/broadcom/tg3.c | 18 +++-
drivers/net/ethernet/ibm/ibmvnic.c | 2 +-
drivers/net/usb/smsc95xx.c | 7 ++
drivers/xen/Makefile | 3 -
include/linux/kbuild.h | 6 +-
include/linux/module.h | 4 +-
net/core/dev.c | 4 +
net/core/flow_dissector.c | 4 +-
net/ipv4/inet_fragment.c | 28 ++---
net/ipv4/ip_tunnel_core.c | 2 +-
net/ipv6/route.c | 7 +-
net/sctp/socket.c | 26 +----
scripts/Kbuild.include | 18 +++-
scripts/Makefile.build | 8 ++
scripts/Makefile.extrawarn | 1 -
scripts/Makefile.host | 6 --
scripts/Makefile.lib | 31 ++++++
scripts/mod/Makefile | 28 +----
63 files changed, 903 insertions(+), 298 deletions(-)