From patchwork Wed Sep 12 21:02:22 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefan Bader X-Patchwork-Id: 969204 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 429Z3t0Skcz9s9h; Thu, 13 Sep 2018 07:02:34 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1g0CHI-000745-Iq; Wed, 12 Sep 2018 21:02:24 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1g0CHH-00073r-A2 for kernel-team@lists.ubuntu.com; Wed, 12 Sep 2018 21:02:23 +0000 Received: from 1.general.smb.uk.vpn ([10.172.193.28] helo=canonical.com) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1g0CHH-0008C4-1L for kernel-team@lists.ubuntu.com; Wed, 12 Sep 2018 21:02:23 +0000 From: Stefan Bader To: kernel-team@lists.ubuntu.com Subject: [Xenial SRU] Xenial update to 4.4.148 stable release Date: Wed, 12 Sep 2018 23:02:22 +0200 Message-Id: <1536786142-21139-1-git-send-email-stefan.bader@canonical.com> X-Mailer: git-send-email 2.7.4 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" https://bugs.launchpad.net/ubuntu/xenial/+source/linux/+bug/1792174 This stable update contains L1TF/Foreshadow updates (or at least the start of them because I think there are a few fixups later). A few changes were missing and got applied now. The rest was skipped or synced (3 header files related to pagetable definitions). Those syncs did not change code (only moved things around or added comments). Details are recorded in the bug report and the commit messages of the SAUCE patches. -Stefan --- The following changes since commit 053074798bf39cafd3d60319809f7da166fbd57b: Linux 4.4.147 (2018-09-12 11:38:33 +0200) are available in the git repository at: git://git.launchpad.net/~smb/+git/linux-xenial stable-4.4 for you to fetch changes up to d729489723be7d46722112b515568ee845402d50: Linux 4.4.148 (2018-09-12 21:57:19 +0200) ---------------------------------------------------------------- Al Viro (3): root dentries need RCU-delayed freeing fix mntput/mntput race fix __legitimize_mnt()/mntput() race Andi Kleen (1): x86/mm/kmmio: Make the tracer robust against L1TF Andy Lutomirski (1): mm: Add vm_insert_pfn_prot() Bart Van Assche (1): scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled Dan Williams (1): mm: fix cache mode tracking in vm_insert_mixed() Greg Kroah-Hartman (1): Linux 4.4.148 Hans de Goede (1): ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices Helge Deller (1): parisc: Enable CONFIG_MLONGCALLS by default Jack Morgenstein (2): IB/core: Make testing MR flags for writability a static inline function IB/mlx4: Mark user MR as writable if actual virtual memory is writable John David Anglin (1): parisc: Define mb() and add memory barriers to assembler unlock sequences Juergen Gross (1): xen/netfront: don't cache skb_shinfo() Kees Cook (1): fork: unconditionally clear stack on fork Masami Hiramatsu (1): kprobes/x86: Fix %p uses in error messages Michael Mera (1): IB/ocrdma: fix out of bounds access to local buffer Naoya Horiguchi (1): mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 Nick Desaulniers (1): x86/irqflags: Provide a declaration for native_save_fl Oleksij Rempel (1): ARM: dts: imx6sx: fix irq for pcie bridge Stefan Bader (3): UBUNTU: SAUCE: Sync pgtable_64.h with upstream stable UBUNTU: SAUCE: Sync pgtable-3level.h with upstream stable UBUNTU: SAUCE: Sync pgtable.h with upstream stable Tadeusz Struk (1): tpm: fix race condition in tpm_common_write() Theodore Ts'o (1): ext4: fix check to prevent initializing reserved inodes Thomas Egerer (1): ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV Vlastimil Babka (1): x86/init: fix build with CONFIG_SWAP=n Makefile | 2 +- arch/arm/boot/dts/imx6sx.dtsi | 2 +- arch/parisc/Kconfig | 2 +- arch/parisc/include/asm/barrier.h | 32 ++++++++++++++++++ arch/parisc/kernel/entry.S | 2 ++ arch/parisc/kernel/pacache.S | 1 + arch/parisc/kernel/syscall.S | 4 +++ arch/x86/include/asm/irqflags.h | 2 ++ arch/x86/include/asm/pgtable-3level.h | 10 +++--- arch/x86/include/asm/pgtable.h | 32 +++++++++++------- arch/x86/include/asm/pgtable_64.h | 32 +++++++++++++++--- arch/x86/include/asm/pgtable_types.h | 10 +++--- arch/x86/kernel/kprobes/core.c | 4 +-- arch/x86/mm/init.c | 2 ++ arch/x86/mm/kmmio.c | 25 +++++++++------ drivers/acpi/acpi_lpss.c | 2 ++ drivers/char/tpm/tpm-dev.c | 43 ++++++++++++------------- drivers/infiniband/core/umem.c | 11 +------ drivers/infiniband/hw/mlx4/mr.c | 50 ++++++++++++++++++++++++----- drivers/infiniband/hw/ocrdma/ocrdma_stats.c | 2 +- drivers/net/xen-netfront.c | 8 ++--- drivers/scsi/sr.c | 29 ++++++++++++----- fs/dcache.c | 6 ++-- fs/ext4/ialloc.c | 5 ++- fs/ext4/super.c | 8 +---- fs/namespace.c | 28 ++++++++++++++-- include/linux/mm.h | 2 ++ include/linux/thread_info.h | 6 +--- include/rdma/ib_verbs.h | 14 ++++++++ mm/memory.c | 33 ++++++++++++++++--- net/ipv4/Kconfig | 1 + net/ipv6/Kconfig | 1 + 32 files changed, 293 insertions(+), 118 deletions(-) create mode 100644 arch/parisc/include/asm/barrier.h