Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp170212imu; Wed, 21 Nov 2018 17:29:04 -0800 (PST) X-Google-Smtp-Source: AFSGD/X51tv58yZUwGUxRNoThCglYflSqK7ljHVRPEhtZ8VOiEnNXIUQuKOfEicgSiBOFbnW9SrH X-Received: by 2002:a65:4049:: with SMTP id h9mr8059805pgp.304.1542850143998; Wed, 21 Nov 2018 17:29:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542850143; cv=none; d=google.com; s=arc-20160816; b=OET4S9pj9MY1PPXudL1247MyLsxhd7eyjN+fh8xJUh2NdQ+BSzDJ5ZRhVL/gAjMF4k j/oErXtBtCQyt053TnfFRAbTwCZokogn2Aw2mRjcp0beAsxnl741rp1sh5QzPv3unzRc gL8p1W6ogKimp4kp7bQ/GMUl8BRLOxyav/4WH7erad3PAgotkK6tQGfJzcSACEawUTcO /+htbxj6bon+VvOlSTBNO2VGmUA6of05WvSlrsnO7c3S92ijKXh2CLaaACCmJy5+8x2p +0vBJeqgbJou8sfDw0R4blWt5ZM5dSrI7lbNynAcmTznl3AcMZcP/CR+D7sd4kIaI8nf L8Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=lo55HepowGyZzQ/F/VCFmdRPdZN0SVLtCogeg9heD18=; b=WPeAfgGyLErJObEwCFb5e0ddJo2BKIXHiBp4y8npkGCu4Y76obOTxGKzMskeo5H0uQ /cLn0bHlAaCot3vZmcWqlVAG27kUqVvVzbHaylnD5jo/De/ttBqmSsngYbmK0fYzVR7w p8yAM+GEAlF9Cy0Q8nHOuSI4M/14pEnP+yBxjVZuOfdfRTY4uZHi8xpS9PI9wB40NmVL jjv8VbqAm/Jx1rv6gIb0lXvNQvoF9c3R1u0ajtvJx7CIfwiMI08D8GEeNgzewCetrT2o 77f1d0+tHDiITJ8eCJfe69WDP63nswK31NAZ5G9Ns1tEXAPaOWOknrk4gXJkuwJYu1Ud 4Q/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UnNjxc31; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r18si14296941pls.115.2018.11.21.17.28.48; Wed, 21 Nov 2018 17:29:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UnNjxc31; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388843AbeKVFqZ (ORCPT + 99 others); Thu, 22 Nov 2018 00:46:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:41590 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388840AbeKVFqX (ORCPT ); Thu, 22 Nov 2018 00:46:23 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 697E2206BB; Wed, 21 Nov 2018 19:10:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542827449; bh=xot9d5D/JVwQjvSVMB73W5W70MCUxY4dQrS+GLKhCj8=; h=From:To:Cc:Subject:Date:From; b=UnNjxc31lpkflLw0mmMV+QLWjiAR+icgXxLvpoc+nEZZyH3hFgNLCLzsF6kMxjNjU 21hfN8jCZsqElnCfuDv1oIt8sRyLA44hHdHdvJJkgIPp+hR99JKQJ6ABVvWFw3o2+U vrBSTpSAZJHHIJm7GX+qR7FdFPYGWJgyQ+Cf4Lco= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/59] 4.9.139-stable review Date: Wed, 21 Nov 2018 20:06:15 +0100 Message-Id: <20181121183508.262873520@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 MIME-Version: 1.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.139-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.139-rc1 X-KernelTest-Deadline: 2018-11-23T18:35+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.139 release. There are 59 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri Nov 23 18:34:55 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.139-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.139-rc1 Russell King ARM: spectre-v1: mitigate user accesses Russell King ARM: spectre-v1: use get_user() for __get_user() Russell King ARM: use __inttype() in get_user() Russell King ARM: oabi-compat: copy semops using __copy_from_user() Russell King ARM: vfp: use __copy_from_user() when restoring VFP state Russell King ARM: signal: copy registers using __copy_from_user() Russell King ARM: spectre-v1: fix syscall entry Russell King ARM: spectre-v1: add array_index_mask_nospec() implementation Russell King ARM: spectre-v1: add speculation barrier (csdb) macros Russell King ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1 Russell King ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling Russell King ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 Marc Zyngier ARM: KVM: invalidate icache on guest exit for Cortex-A15 Marc Zyngier ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 Russell King ARM: spectre-v2: warn about incorrect context switching functions Russell King ARM: spectre-v2: add firmware based hardening Russell King ARM: spectre-v2: harden user aborts in kernel space Russell King ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit Russell King ARM: spectre-v2: harden branch predictor on context switches Russell King ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre Russell King ARM: bugs: add support for per-processor bug checking Russell King ARM: bugs: hook processor bug checking into SMP and suspend paths Russell King ARM: bugs: prepare processor bug infrastructure Russell King ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs Mark Rutland arm64: uaccess: suppress spurious clang warning Arnd Bergmann Kbuild: use -fshort-wchar globally Matthias Kaehlcke x86/build: Use cc-option to validate stack alignment parameter Matthias Kaehlcke x86/build: Fix stack alignment for CLang Ard Biesheuvel efi/libstub/arm64: Set -fpie when building the EFI stub Ard Biesheuvel efi/libstub: Preserve .debug sections after absolute relocation check Ard Biesheuvel efi/libstub/arm64: Force 'hidden' visibility for section markers Ard Biesheuvel efi/libstub/arm64: Use hidden attribute for struct screen_info reference Michael Davidson x86/boot: #undef memcpy() et al in string.c Ard Biesheuvel crypto: arm64/sha - avoid non-standard inline asm tricks Matthias Kaehlcke kbuild: clang: Disable 'address-of-packed-member' warning Matthias Kaehlcke x86/build: Specify stack alignment for clang Matthias Kaehlcke x86/build: Use __cc-option for boot code compiler options Matthias Kaehlcke kbuild: Add __cc-option macro Michael Davidson crypto, x86: aesni - fix token pasting for clang Matthias Kaehlcke x86/kbuild: Use cc-option to enable -falign-{jumps/loops} Arnd Bergmann modules: mark __inittest/__exittest as __maybe_unused Vinícius Tinti kbuild: Add support to generate LLVM assembly files Behan Webster kbuild: use -Oz instead of -Os when using clang Mark Charlebois kbuild, LLVMLinux: Add -Werror to cc-option to support clang Masahiro Yamada kbuild: drop -Wno-unknown-warning-option from clang options Jeroen Hofstee kbuild: fix asm-offset generation to work with clang Masahiro Yamada kbuild: consolidate redundant sed script ASM offset generation Matthias Kaehlcke kbuild: Consolidate header generation from ASM offset information Michael Davidson kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS Behan Webster kbuild: Add better clang cross build support David Ahern ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF Eric Dumazet inet: frags: better deal with smp races Frieder Schrempf usbnet: smsc95xx: disable carrier check while suspending Siva Reddy Kallam tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths Xin Long sctp: not allow to set asoc prsctp_enable by sockopt Eric Dumazet net-gro: reset skb->pkt_type in napi_reuse_skb() Sabrina Dubroca ip_tunnel: don't force DF when MTU is locked Michał Mirosław ibmvnic: fix accelerated VLAN handling 배석진 flow_dissector: do not dissect l4 ports for fragments ------------- Diffstat: .gitignore | 1 + Kbuild | 25 ----- Makefile | 29 +++-- arch/arm/include/asm/assembler.h | 12 +++ arch/arm/include/asm/barrier.h | 32 ++++++ arch/arm/include/asm/bugs.h | 6 +- arch/arm/include/asm/cp15.h | 3 + arch/arm/include/asm/cputype.h | 8 ++ arch/arm/include/asm/kvm_asm.h | 2 - arch/arm/include/asm/kvm_host.h | 14 ++- arch/arm/include/asm/kvm_mmu.h | 23 +++- arch/arm/include/asm/proc-fns.h | 4 + arch/arm/include/asm/system_misc.h | 15 +++ arch/arm/include/asm/thread_info.h | 4 +- arch/arm/include/asm/uaccess.h | 26 +++-- arch/arm/kernel/Makefile | 1 + arch/arm/kernel/bugs.c | 18 ++++ arch/arm/kernel/entry-common.S | 18 ++-- arch/arm/kernel/entry-header.S | 25 +++++ arch/arm/kernel/signal.c | 55 +++++----- arch/arm/kernel/smp.c | 4 + arch/arm/kernel/suspend.c | 2 + arch/arm/kernel/sys_oabi-compat.c | 8 +- arch/arm/kvm/hyp/hyp-entry.S | 112 ++++++++++++++++++- arch/arm/lib/copy_from_user.S | 9 ++ arch/arm/mm/Kconfig | 23 ++++ arch/arm/mm/Makefile | 2 +- arch/arm/mm/fault.c | 3 + arch/arm/mm/proc-macros.S | 3 +- arch/arm/mm/proc-v7-2level.S | 6 -- arch/arm/mm/proc-v7-bugs.c | 174 ++++++++++++++++++++++++++++++ arch/arm/mm/proc-v7.S | 154 ++++++++++++++++++++------ arch/arm/vfp/vfpmodule.c | 17 ++- arch/arm64/crypto/sha1-ce-core.S | 6 +- arch/arm64/crypto/sha1-ce-glue.c | 11 +- arch/arm64/crypto/sha2-ce-core.S | 6 +- arch/arm64/crypto/sha2-ce-glue.c | 13 +-- arch/arm64/include/asm/efi.h | 3 + arch/arm64/include/asm/uaccess.h | 4 +- arch/ia64/kernel/Makefile | 26 +---- arch/x86/Makefile | 39 +++++-- arch/x86/boot/string.c | 9 ++ arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 7 +- drivers/firmware/efi/libstub/Makefile | 26 +++-- drivers/firmware/efi/libstub/arm64-stub.c | 10 +- drivers/net/ethernet/broadcom/tg3.c | 18 +++- drivers/net/ethernet/ibm/ibmvnic.c | 2 +- drivers/net/usb/smsc95xx.c | 7 ++ drivers/xen/Makefile | 3 - include/linux/kbuild.h | 6 +- include/linux/module.h | 4 +- net/core/dev.c | 4 + net/core/flow_dissector.c | 4 +- net/ipv4/inet_fragment.c | 28 ++--- net/ipv4/ip_tunnel_core.c | 2 +- net/ipv6/route.c | 7 +- net/sctp/socket.c | 26 +---- scripts/Kbuild.include | 18 +++- scripts/Makefile.build | 8 ++ scripts/Makefile.extrawarn | 1 - scripts/Makefile.host | 6 -- scripts/Makefile.lib | 31 ++++++ scripts/mod/Makefile | 28 +---- 63 files changed, 903 insertions(+), 298 deletions(-)