From patchwork Tue Nov 13 16:11:27 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juerg Haefliger X-Patchwork-Id: 997276 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 42vXgX5dphz9s9G; Wed, 14 Nov 2018 03:11:36 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1gMbHo-0001JB-Ae; Tue, 13 Nov 2018 16:11:32 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1gMbHm-0001Iz-O3 for kernel-team@lists.ubuntu.com; Tue, 13 Nov 2018 16:11:30 +0000 Received: from mail-ed1-f72.google.com ([209.85.208.72]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1gMbHm-0002H0-Gh for kernel-team@lists.ubuntu.com; Tue, 13 Nov 2018 16:11:30 +0000 Received: by mail-ed1-f72.google.com with SMTP id f3-v6so6630560edt.11 for ; Tue, 13 Nov 2018 08:11:30 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=m2a/B8UOhs/urfZD6pBxfk6rmVXuTVnsoJZ1iCPGxkA=; b=rMaWnKBM4G+iliK5Za/KWBL/5XVU6zUg57xrYQmkae9EthHkzxlmVxW3uqUUUBd+A3 OSuMPauEsc9XxbphHvXExJd1fKBNqnmJjsFZ1seBlsOVQhRx3hV75Rsnni20UQDtmZat k4OYiMtvU9PhNR4ga993HJKQCzyi3mce5SWRq9hYbY8mqbDvZIYSmywkioHl865W2T2Z K7FU9l0QbSeTwECqCBG+91KHK/ujjb2672kPovVWSj9W/z/2SVjRloOmEURjuMRrNI+h JgN5ppsB0SQsrRd2/s/khyWN1gL9oOK1fwUx6OMi7JXgvGD3saWVUCK0vznv/msZhjmq ozfg== X-Gm-Message-State: AGRZ1gLC3Hnip3yyNJEltLFFV4dm5k8Fgc/2MRskTQ4S0me8uyqkcrN+ dVwwMLTCPA3zCT08A3xaiFcV9EpWlLBr5aUvx357FfVVo0Pju/7Q7iJ1Fy2Cdn+bXclAsn5iGPY yrisVqqVgLsOwmXHiTlfVQuZDfw+9duEYVewD4WQpnQ== X-Received: by 2002:a50:a985:: with SMTP id n5-v6mr16985816edc.120.1542125489951; Tue, 13 Nov 2018 08:11:29 -0800 (PST) X-Google-Smtp-Source: AJdET5c4kWVouuejaBBMzmcmdFg0k2WEHgy4zesJodpiOgx347uPHLR7WaChMN+FRh94T+I8+OrM6g== X-Received: by 2002:a50:a985:: with SMTP id n5-v6mr16985810edc.120.1542125489778; Tue, 13 Nov 2018 08:11:29 -0800 (PST) Received: from localhost.localdomain ([81.221.192.120]) by smtp.gmail.com with ESMTPSA id k13-v6sm440403ejk.50.2018.11.13.08.11.28 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 13 Nov 2018 08:11:29 -0800 (PST) From: Juerg Haefliger X-Google-Original-From: Juerg Haefliger To: kernel-team@lists.ubuntu.com Subject: [SRU][Trusty][PULL] Updates for CVE-2017-5753 Date: Tue, 13 Nov 2018 17:11:27 +0100 Message-Id: <20181113161127.14551-1-juergh@canonical.com> X-Mailer: git-send-email 2.19.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: juergh@canonical.com Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" CVE-2017-5753 This pull request contains fix(es) for the following CVE(s): CVE-2017-5753 Add Spectre v1 pointer masking in various places and some minor fixes to match upstream stable v4.9. Compile-tested all architectures. Signed-off-by: Juerg Haefliger Acked-by: Stefan Bader Acked-by: Kleber Sacilotto de Souza --- The following changes since commit 75136bbc88ff3f96baa790d65e2826f64e5d5772: drm: fix NULL pointer access by wrong ioctl (2018-11-07 22:47:19 -0500) are available in the Git repository at: git://git.launchpad.net/~juergh/+git/trusty-linux update-spectre-v1 for you to fetch changes up to d56fe24802964e8ba4eff3f4b2f7feab97d668ab: tty: vt_ioctl: fix potential Spectre v1 (2018-11-12 16:37:46 +0100) ---------------------------------------------------------------- Dan Williams (2): x86/spectre_v1: Disable compiler optimizations over array_index_mask_nospec() x86/speculation: Fix up array_index_nospec_mask() asm constraint Gustavo A. R. Silva (8): net: atm: Fix potential Spectre v1 atm: zatm: Fix potential Spectre v1 kernel/sys.c: fix potential Spectre v1 issue HID: hiddev: fix potential Spectre v1 atm: zatm: Fix potential Spectre v1 net: cxgb3_main: fix potential Spectre v1 misc: hmc6352: fix potential Spectre v1 tty: vt_ioctl: fix potential Spectre v1 Jeremy Cline (4): netlink: Fix spectre v1 gadget in netlink_create() net: socket: fix potential spectre v1 gadget in socketcall ext4: fix spectre gadget in ext4_mb_regular_allocator() fs/quota: Fix spectre gadget in do_quotactl John Garry (1): libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store() Peter Zijlstra (2): perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() Takashi Iwai (7): ALSA: opl3: Hardening for potential Spectre v1 ALSA: asihpi: Hardening for potential Spectre v1 ALSA: hdspm: Hardening for potential Spectre v1 ALSA: rme9652: Hardening for potential Spectre v1 ALSA: control: Hardening for potential Spectre v1 ALSA: seq: oss: Hardening for potential Spectre v1 ALSA: hda: Hardening for potential Spectre v1 arch/x86/include/asm/barrier.h | 4 +- arch/x86/kernel/cpu/perf_event.c | 8 ++- drivers/ata/libahci.c | 7 ++- drivers/atm/zatm.c | 5 ++ drivers/hid/usbhid/hiddev.c | 11 ++++ drivers/misc/hmc6352.c | 2 + drivers/net/ethernet/chelsio/cxgb3/cxgb3_main.c | 2 + drivers/tty/vt/vt_ioctl.c | 4 ++ fs/ext4/mballoc.c | 4 +- fs/quota/quota.c | 2 + include/sound/control.h | 7 ++- kernel/sys.c | 4 ++ net/atm/lec.c | 9 ++- net/netlink/af_netlink.c | 2 + net/socket.c | 2 + sound/core/seq/oss/seq_oss_event.c | 15 +++-- sound/core/seq/oss/seq_oss_midi.c | 2 + sound/core/seq/oss/seq_oss_synth.c | 75 ++++++++++++++----------- sound/core/seq/oss/seq_oss_synth.h | 3 +- sound/drivers/opl3/opl3_synth.c | 7 ++- sound/pci/asihpi/hpimsginit.c | 13 +++-- sound/pci/asihpi/hpioctl.c | 4 +- sound/pci/hda/hda_hwdep.c | 12 +++- sound/pci/rme9652/hdspm.c | 24 ++++---- sound/pci/rme9652/rme9652.c | 6 +- 25 files changed, 164 insertions(+), 70 deletions(-)