From patchwork Mon Jun 18 11:36:35 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juerg Haefliger X-Patchwork-Id: 930804 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 418TZp6GPCz9s19; Mon, 18 Jun 2018 21:36:50 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1fUsSe-0005kq-Fs; Mon, 18 Jun 2018 11:36:40 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1fUsSc-0005kk-CI for kernel-team@lists.ubuntu.com; Mon, 18 Jun 2018 11:36:38 +0000 Received: from mail-wm0-f70.google.com ([74.125.82.70]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1fUsSc-0008Bd-52 for kernel-team@lists.ubuntu.com; Mon, 18 Jun 2018 11:36:38 +0000 Received: by mail-wm0-f70.google.com with SMTP id g73-v6so5342622wmc.5 for ; Mon, 18 Jun 2018 04:36:38 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id; bh=67+ptXbOEOF+j+daOp4CNlJ/kWWhTgvD9Z2gx1wRumk=; b=TCAPgGGBkhn7NhmMKM/+NXUQSPWipErGhdfyzguC2YpeFzPVmC8WvIHT1O5pyhzjse 9YLEr4i1yhCzH4VBnY8xxnTcIrJvFVyDR+dAecpmW00aCPZNPUqiHsc4z0pvfRjtYIE2 YtOGGyBUHpxHwAQ8/fpZh2ZbyK6nhQLlXjiqSSNjlUq0TfBSov9w3i91FIhiuiOtzMQk d4AyY/9+z30n4YR7YqhIaH58haxFB3Sv4KoSCkgkPabczouI3hAPr1cBOCpI0c88EU7U J0rAIxtPfktLoONJ1ft3XTkfQyS9cP3+AVHmxl7GsKQU2at147mXJ1/FgFckeqs0d+UD GVaw== X-Gm-Message-State: APt69E0uyxu+wfMY6aaeOmJ5iyj84VKHjflA6ceFwzNbLR/EtzQPqXfr fz3KshCviQVAcxkLgFd7W/GAQFGQNvYozRcgENuJkToII5LP2TWhdckOfzU6jg1IXmgxqIQBDgp Twgq0bPq93UELEtPSvPVp/ERNXTOCAULTcG8fYF3X0w== X-Received: by 2002:aa7:c706:: with SMTP id i6-v6mr10770989edq.269.1529321797724; Mon, 18 Jun 2018 04:36:37 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLziB8g5GHL44YkZJ3fgFpx4P8xTF+R0qZ0BnYhOpKmQvkZ8ranJUi9yugevPShG2QlkmOCdA== X-Received: by 2002:aa7:c706:: with SMTP id i6-v6mr10770978edq.269.1529321797505; Mon, 18 Jun 2018 04:36:37 -0700 (PDT) Received: from localhost.localdomain ([81.221.205.149]) by smtp.gmail.com with ESMTPSA id c20-v6sm8717676ede.3.2018.06.18.04.36.36 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 18 Jun 2018 04:36:36 -0700 (PDT) From: Juerg Haefliger X-Google-Original-From: Juerg Haefliger To: kernel-team@lists.ubuntu.com Subject: [SRU][Xenial][PULL] Xenial update to 4.4.138 stable release (LP: #1777389) Date: Mon, 18 Jun 2018 13:36:35 +0200 Message-Id: <3d2632a8e9cb4118880d3519d7a450404271e0e8.1529321561.git.juergh@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/1777389 This is a pull request for the update of Xenial to upstream stable release 4.4.138. Skipped the following already-applied patches: * Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (applied as: UBUNTU: SAUCE: Input: elan_i2c - add ELAN0612 to the ACPI table) One patch required trival context adjustments, the rest applied cleanly. Compile-tested all supported architectures. Signed-off-by: Juerg Haefliger --- The following changes since commit 6cb271e7192fefc123a42ddaa063afa57a5a0986: Linux 4.4.137 (2018-06-15 09:06:26 +0200) are available in the Git repository at: git://git.launchpad.net/~juergh/+git/xenial-linux update-4.4.138 for you to fetch changes up to 3d2632a8e9cb4118880d3519d7a450404271e0e8: Linux 4.4.138 (2018-06-18 09:00:23 +0200) ---------------------------------------------------------------- Andy Lutomirski (6): x86/fpu: Default eagerfpu=on on all CPUs x86/fpu: Fix 'no387' regression x86/fpu: Hard-disable lazy FPU mode x86/fpu: Fix FNSAVE usage in eagerfpu mode x86/fpu: Fix math emulation in eager fpu mode x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code Borislav Petkov (2): x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros x86/fpu: Fix eager-FPU handling on legacy FPU machines Ethan Lee (1): Input: goodix - add new ACPI id for GPD Win 2 touch screen Gil Kupfer (1): vmw_balloon: fixing double free when batching mode is off Greg Kroah-Hartman (1): Linux 4.4.138 Juergen Gross (1): x86: Remove unused function cpu_has_ht_siblings() Kevin Easton (1): af_key: Always verify length of provided sadb_key Linus Torvalds (1): Clarify (and fix) MAX_LFS_FILESIZE macros Linus Walleij (1): gpio: No NULL owner Marek Szyprowski (1): serial: samsung: fix maxburst parameter for DMA transactions Michael Ellerman (1): crypto: vmx - Remove overly verbose printk from AES init routines Paolo Bonzini (3): KVM: x86: introduce linear_{read,write}_system KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access Yu-cheng Yu (1): x86/fpu: Revert ("x86/fpu: Disable AVX when eagerfpu is off") yu-cheng yu (3): x86/fpu: Fix early FPU command-line parsing x86/fpu: Disable MPX when eagerfpu is off x86/fpu: Disable AVX when eagerfpu is off Makefile | 2 +- arch/x86/crypto/chacha20_glue.c | 2 +- arch/x86/crypto/crc32c-intel_glue.c | 7 +- arch/x86/events/amd/core.c | 4 +- arch/x86/events/amd/uncore.c | 11 ++- arch/x86/include/asm/cmpxchg_32.h | 2 +- arch/x86/include/asm/cmpxchg_64.h | 2 +- arch/x86/include/asm/cpufeature.h | 37 +------- arch/x86/include/asm/cpufeatures.h | 2 +- arch/x86/include/asm/fpu/internal.h | 6 +- arch/x86/include/asm/fpu/xstate.h | 2 +- arch/x86/include/asm/kvm_emulate.h | 6 +- arch/x86/include/asm/smp.h | 9 -- arch/x86/include/asm/xor_32.h | 2 +- arch/x86/kernel/cpu/amd.c | 4 +- arch/x86/kernel/cpu/common.c | 4 +- arch/x86/kernel/cpu/intel.c | 3 +- arch/x86/kernel/cpu/intel_cacheinfo.c | 6 +- arch/x86/kernel/cpu/mtrr/generic.c | 2 +- arch/x86/kernel/cpu/mtrr/main.c | 2 +- arch/x86/kernel/fpu/core.c | 24 ++++- arch/x86/kernel/fpu/init.c | 169 +++++++++------------------------- arch/x86/kernel/fpu/xstate.c | 3 +- arch/x86/kernel/hw_breakpoint.c | 6 +- arch/x86/kernel/smpboot.c | 2 +- arch/x86/kernel/traps.c | 1 - arch/x86/kernel/vm86_32.c | 4 +- arch/x86/kvm/emulate.c | 72 +++++++-------- arch/x86/kvm/vmx.c | 23 ++--- arch/x86/kvm/x86.c | 51 +++++++--- arch/x86/kvm/x86.h | 4 +- arch/x86/mm/setup_nx.c | 4 +- drivers/char/hw_random/via-rng.c | 5 +- drivers/crypto/padlock-aes.c | 2 +- drivers/crypto/padlock-sha.c | 2 +- drivers/crypto/vmx/aes.c | 2 - drivers/crypto/vmx/aes_cbc.c | 2 - drivers/crypto/vmx/aes_ctr.c | 2 - drivers/crypto/vmx/ghash.c | 2 - drivers/gpio/gpiolib.c | 9 +- drivers/input/touchscreen/goodix.c | 1 + drivers/iommu/intel_irq_remapping.c | 2 +- drivers/misc/vmw_balloon.c | 23 ++--- drivers/tty/serial/samsung.c | 7 +- fs/btrfs/disk-io.c | 2 +- include/linux/fs.h | 4 +- net/key/af_key.c | 45 +++++++-- 47 files changed, 257 insertions(+), 331 deletions(-)