Received: by 10.192.165.156 with SMTP id m28csp245485imm; Tue, 17 Apr 2018 09:26:06 -0700 (PDT) X-Google-Smtp-Source: AIpwx49izr/ieV1FNNpyfO02XrpGA5KLZ7SgGY2Rw4FaF/wqtUt3uaAeRpiDUKj8kzyQQ75HPzl6 X-Received: by 10.98.215.81 with SMTP id v17mr2620416pfl.8.1523982366373; Tue, 17 Apr 2018 09:26:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523982366; cv=none; d=google.com; s=arc-20160816; b=zNI8nol/SGbAMTZxFa5gvygPHpi9DyD4UX7WGY15jFVmcvzLw+K13I7QDMjKrwNG9i RMY2Z9fJa0ONwnlBcmjQXmRHLttZ0HdlgjQZsGQXXFpZ7/U15TTcZFoM8oMpuvFoO8K/ iZISvbWTHBOr8o4B+QbWao/QOrRsi/HweptfNiojB3bY2kaDTTWkh4aLvrbI4K3haHlm H5pF8GAYOvuKkjVz1QurXipUicVhFd/j1KNfTrg7QMpxt2H81I4lNIS6oe7IUy2eC6Xy Wkstc28LOOOkIdxJasRKE/ei0vadpK5uoH7fKFQMukKcksmltxXGVFBAngybe9kZjs9v wp7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:date:subject:cc:to :from:arc-authentication-results; bh=sdCXtLWcYDRYzJDwGV1ucmsO9UIqsM5nGrlmsTyEQog=; b=j6wyE8SXpmtMhZSQyzlKw+BqMvIFbEWhxxw0CBAW7pKlU5shoU80dm4ZBt38HOYU6t 79npqW1CD9IdQjXB73HtjIJqL5ENm/W1qS+l8y7hOUDOaomnA0o3+vRSXfZS0WQ+ZvA4 bBZkZrvGAzqt9F+1+SGUtyoJXyrAe8Sq13F+juW0E9qw4TCcWDbQeCKiOHDwHND4o9r6 WfzXpozq5Vz1x+TGEc9mH9zUrvGZdPdDUj/apVR1jmX3of9LebsR4w0VHb7lqb4AorbZ elYiLQk4qTFDXQxXmopXWwv9ScAkZzWZkaiGjVj0GMpw2fDGl1rjdTO96Ev/1wwnnz8v 7lQQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d19si11979777pgn.650.2018.04.17.09.25.51; Tue, 17 Apr 2018 09:26:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932103AbeDQQJ1 (ORCPT + 99 others); Tue, 17 Apr 2018 12:09:27 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:36100 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755629AbeDQQJZ (ORCPT ); Tue, 17 Apr 2018 12:09:25 -0400 Received: from localhost (unknown [46.44.180.42]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 16A90C98; Tue, 17 Apr 2018 16:09:24 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuahkh@osg.samsung.com, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/66] 4.9.95-stable review Date: Tue, 17 Apr 2018 17:58:33 +0200 Message-Id: <20180417155645.868055442@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.95-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.95-rc1 X-KernelTest-Deadline: 2018-04-19T15:56+00:00 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.95 release. There are 66 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu Apr 19 15:56:27 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.95-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.95-rc1 Phil Elwell lan78xx: Correctly indicate invalid OTP Stefan Hajnoczi vhost: fix vhost_vq_access_ok() log check Tejaswi Tanikella slip: Check if rstate is initialized before uncompressing Ka-Cheong Poon rds: MP-RDS may use an invalid c_path Bassem Boubaker cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN Marek Szyprowski hwmon: (ina2xx) Fix access to uninitialized mutex Sudhir Sreedharan rtl8187: Fix NULL pointer dereference in priv->conf_mutex Szymon Janc Bluetooth: Fix connection if directed advertising and privacy is used Al Viro getname_kernel() needs to make sure that ->name != ->iname in long case Vasily Gorbik s390/ipl: ensure loadparm valid flag is set Julian Wiedmann s390/qdio: don't merge ERROR output buffers Julian Wiedmann s390/qdio: don't retry EQBS after CCQ 96 Dan Williams nfit: fix region registration vs block-data-window ranges Tetsuo Handa block/loop: fix deadlock after loop_set_status Greg Kroah-Hartman Revert "perf tests: Decompress kernel module before objdump" Eric Biggers sunrpc: remove incorrect HMAC request initialization Mark Rutland arm64: Kill PSCI_GET_VERSION as a variant-2 workaround Mark Rutland arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support Mark Rutland arm/arm64: smccc: Implement SMCCC v1.1 inline primitive Mark Rutland arm/arm64: smccc: Make function identifiers an unsigned quantity Mark Rutland firmware/psci: Expose SMCCC version through psci_ops Mark Rutland firmware/psci: Expose PSCI conduit Mark Rutland arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling Mark Rutland arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support Mark Rutland arm/arm64: KVM: Turn kvm_psci_version into a static inline Mark Rutland arm64: KVM: Make PSCI_VERSION a fast path Mark Rutland arm/arm64: KVM: Advertise SMCCC v1.1 Mark Rutland arm/arm64: KVM: Implement PSCI 1.0 support Mark Rutland arm/arm64: KVM: Add smccc accessors to PSCI code Mark Rutland arm/arm64: KVM: Add PSCI_VERSION helper Mark Rutland arm/arm64: KVM: Consolidate the PSCI include files Mark Rutland arm64: KVM: Increment PC after handling an SMC trap Mark Rutland arm64: Branch predictor hardening for Cavium ThunderX2 Mark Rutland arm64: Implement branch predictor hardening for affected Cortex-A CPUs Mark Rutland arm64: cpu_errata: Allow an erratum to be match for all revisions of a core Mark Rutland arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75 Mark Rutland arm64: entry: Apply BP hardening for suspicious interrupts from EL0 Mark Rutland arm64: entry: Apply BP hardening for high-priority synchronous exceptions Mark Rutland arm64: KVM: Use per-CPU vector when BP hardening is enabled Mark Rutland mm: Introduce lm_alias Mark Rutland arm64: Move BP hardening to check_and_switch_context Mark Rutland arm64: Add skeleton to harden the branch predictor against aliasing attacks Mark Rutland arm64: Move post_ttbr_update_workaround to C code Mark Rutland arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro Mark Rutland drivers/firmware: Expose psci_get_version through psci_ops structure Mark Rutland arm64: cpufeature: Pass capability structure to ->enable callback Mark Rutland arm64: Run enable method for errata work arounds on late CPUs Mark Rutland arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early Mark Rutland arm64: uaccess: Mask __user pointers for __arch_{clear, copy_*}_user Mark Rutland arm64: uaccess: Don't bother eliding access_ok checks in __{get, put}_user Mark Rutland arm64: uaccess: Prevent speculative use of the current addr_limit Mark Rutland arm64: entry: Ensure branch through syscall table is bounded under speculation Mark Rutland arm64: Use pointer masking to limit uaccess speculation Mark Rutland arm64: Make USER_DS an inclusive limit Mark Rutland arm64: move TASK_* definitions to Mark Rutland arm64: Implement array_index_mask_nospec() Mark Rutland arm64: barrier: Add CSDB macros to control data-value prediction Arnd Bergmann radeon: hide pointless #warning when compile testing Prashant Bhole perf/core: Fix use-after-free in uprobe_perf_close() Adrian Hunter perf intel-pt: Fix timestamp following overflow Adrian Hunter perf intel-pt: Fix error recovery from missing TIP packet Adrian Hunter perf intel-pt: Fix sync_switch Adrian Hunter perf intel-pt: Fix overlap detection to identify consecutive buffers correctly Dexuan Cui Drivers: hv: vmbus: do not mark HV_PCIE as perf_device Helge Deller parisc: Fix out of array access in match_pci_device() Mauro Carvalho Chehab media: v4l2-compat-ioctl32: don't oops on overlay ------------- Diffstat: Makefile | 4 +- arch/arm/include/asm/kvm_host.h | 6 + arch/arm/include/asm/kvm_mmu.h | 10 + arch/arm/include/asm/kvm_psci.h | 27 - arch/arm/kvm/arm.c | 11 +- arch/arm/kvm/handle_exit.c | 4 +- arch/arm/kvm/psci.c | 143 +- arch/arm64/Kconfig | 17 + arch/arm64/crypto/sha256-core.S | 2061 ++++++++++++++++++++ arch/arm64/crypto/sha512-core.S | 1085 +++++++++++ arch/arm64/include/asm/assembler.h | 19 + arch/arm64/include/asm/barrier.h | 23 + arch/arm64/include/asm/cpucaps.h | 3 +- arch/arm64/include/asm/cputype.h | 6 + arch/arm64/include/asm/kvm_host.h | 5 + arch/arm64/include/asm/kvm_mmu.h | 38 + arch/arm64/include/asm/kvm_psci.h | 27 - arch/arm64/include/asm/memory.h | 15 - arch/arm64/include/asm/mmu.h | 39 + arch/arm64/include/asm/processor.h | 24 + arch/arm64/include/asm/sysreg.h | 2 + arch/arm64/include/asm/uaccess.h | 153 +- arch/arm64/kernel/Makefile | 4 + arch/arm64/kernel/arm64ksyms.c | 4 +- arch/arm64/kernel/bpi.S | 75 + arch/arm64/kernel/cpu_errata.c | 189 +- arch/arm64/kernel/cpufeature.c | 10 +- arch/arm64/kernel/entry.S | 25 +- arch/arm64/kvm/handle_exit.c | 16 +- arch/arm64/kvm/hyp/hyp-entry.S | 20 +- arch/arm64/kvm/hyp/switch.c | 5 +- arch/arm64/lib/clear_user.S | 6 +- arch/arm64/lib/copy_in_user.S | 4 +- arch/arm64/mm/context.c | 12 + arch/arm64/mm/fault.c | 34 +- arch/arm64/mm/proc.S | 7 +- arch/parisc/kernel/drivers.c | 4 + arch/s390/kernel/ipl.c | 1 + drivers/acpi/nfit/core.c | 22 +- drivers/block/loop.c | 12 +- drivers/firmware/psci.c | 57 +- drivers/gpu/drm/radeon/radeon_object.c | 3 +- drivers/hv/channel_mgmt.c | 2 +- drivers/hwmon/ina2xx.c | 3 +- drivers/media/v4l2-core/v4l2-compat-ioctl32.c | 4 +- drivers/net/slip/slhc.c | 5 + drivers/net/usb/cdc_ether.c | 6 + drivers/net/usb/lan78xx.c | 3 +- drivers/net/wireless/realtek/rtl818x/rtl8187/dev.c | 2 +- drivers/s390/cio/qdio_main.c | 42 +- drivers/vhost/vhost.c | 8 +- fs/namei.c | 3 +- include/kvm/arm_psci.h | 51 + include/linux/arm-smccc.h | 165 +- include/linux/mm.h | 4 + include/linux/psci.h | 14 + include/net/bluetooth/hci_core.h | 2 +- include/net/slhc_vj.h | 1 + include/uapi/linux/psci.h | 3 + kernel/events/core.c | 6 + net/bluetooth/hci_conn.c | 29 +- net/bluetooth/hci_event.c | 15 +- net/bluetooth/l2cap_core.c | 2 +- net/rds/send.c | 15 +- net/sunrpc/auth_gss/gss_krb5_crypto.c | 3 - tools/perf/tests/code-reading.c | 20 +- .../perf/util/intel-pt-decoder/intel-pt-decoder.c | 64 +- .../perf/util/intel-pt-decoder/intel-pt-decoder.h | 2 +- tools/perf/util/intel-pt.c | 37 +- 69 files changed, 4423 insertions(+), 320 deletions(-)