All of lore.kernel.org
 help / color / mirror / Atom feed
From: Nathan Chancellor <natechancellor@gmail.com>
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org,
	akpm@linux-foundation.org, linux@roeck-us.net,
	shuahkh@osg.samsung.com, patches@kernelci.org,
	ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org,
	stable@vger.kernel.org
Subject: Re: [PATCH 4.4 00/22] 4.4.111-stable review
Date: Mon, 8 Jan 2018 07:25:25 -0700	[thread overview]
Message-ID: <20180108142525.GA9564@flashbox> (raw)
In-Reply-To: <20180108125925.601688333@linuxfoundation.org>

On Mon, Jan 08, 2018 at 01:59:27PM +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.4.111 release.
> There are 22 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Wed Jan 10 12:59:14 UTC 2018.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
> 	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.111-rc1.gz
> or in the git tree and branch at:
>   git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
> and the diffstat can be found below.
> 
> thanks,
> 
> greg k-h
> 
> -------------
> Pseudo-Shortlog of commits:
> 
> Greg Kroah-Hartman <gregkh@linuxfoundation.org>
>     Linux 4.4.111-rc1
> 
> Borislav Petkov <bp@suse.de>
>     Map the vsyscall page with _PAGE_USER
> 
> Alexey Dobriyan <adobriyan@gmail.com>
>     proc: much faster /proc/vmstat
> 
> Libor Pechacek <lpechacek@suse.com>
>     module: Issue warnings when tainting kernel
> 
> Miroslav Benes <mbenes@suse.cz>
>     module: keep percpu symbols in module's symtab
> 
> Michal Marek <mmarek@suse.com>
>     genksyms: Handle string literals with spaces in reference files
> 
> Thomas Gleixner <tglx@linutronix.de>
>     x86/tlb: Drop the _GPL from the cpu_tlbstate export
> 
> Boris Brezillon <boris.brezillon@free-electrons.com>
>     mtd: nand: pxa3xx: Fix READOOB implementation
> 
> Helge Deller <deller@gmx.de>
>     parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
> 
> Tom Lendacky <thomas.lendacky@amd.com>
>     x86/microcode/AMD: Add support for fam17h microcode loading
> 
> Aaron Ma <aaron.ma@canonical.com>
>     Input: elantech - add new icbody type 15
> 
> Vineet Gupta <vgupta@synopsys.com>
>     ARC: uaccess: dont use "l" gcc inline asm constraint modifier
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
> 
> Thiago Rafael Becker <thiago.becker@gmail.com>
>     kernel: make groups_sort calling a responsibility group_info allocators
> 
> David Howells <dhowells@redhat.com>
>     fscache: Fix the default for fscache_maybe_release_page()
> 
> Stefan Brüns <stefan.bruens@rwth-aachen.de>
>     sunxi-rsb: Include OF based modalias in device uevent
> 
> Eric Biggers <ebiggers@google.com>
>     crypto: pcrypt - fix freeing pcrypt instances
> 
> Eric Biggers <ebiggers@google.com>
>     crypto: chacha20poly1305 - validate the digest size
> 
> Jan Engelhardt <jengelh@inai.de>
>     crypto: n2 - cure use after free
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/acct.c: fix the acct->needcheck check in check_free_space()
> 
> Andrey Ryabinin <aryabinin@virtuozzo.com>
>     x86/kasan: Write protect kasan zero shadow
> 
> 
> -------------
> 
> Diffstat:
> 
>  Makefile                              |  4 ++--
>  arch/arc/include/asm/uaccess.h        |  5 +++--
>  arch/parisc/include/asm/ldcw.h        |  2 ++
>  arch/parisc/kernel/entry.S            | 13 +++++++++++--
>  arch/parisc/kernel/pacache.S          |  9 +++++++--
>  arch/s390/kernel/compat_linux.c       |  1 +
>  arch/x86/entry/vsyscall/vsyscall_64.c |  5 +++++
>  arch/x86/include/asm/vsyscall.h       |  2 ++
>  arch/x86/kernel/cpu/microcode/amd.c   |  4 ++++
>  arch/x86/mm/init.c                    |  2 +-
>  arch/x86/mm/kaiser.c                  | 34 ++++++++++++++++++++++++++++++----
>  arch/x86/mm/kasan_init_64.c           | 10 ++++++++--
>  crypto/chacha20poly1305.c             |  6 +++++-
>  crypto/pcrypt.c                       | 19 ++++++++++---------
>  drivers/bus/sunxi-rsb.c               |  1 +
>  drivers/crypto/n2_core.c              |  3 +++
>  drivers/input/mouse/elantech.c        |  2 +-
>  drivers/mtd/nand/pxa3xx_nand.c        |  1 +
>  fs/nfsd/auth.c                        |  3 +++
>  include/linux/cred.h                  |  1 +
>  include/linux/fscache.h               |  2 +-
>  kernel/acct.c                         |  2 +-
>  kernel/groups.c                       |  5 +++--
>  kernel/module.c                       | 26 +++++++++++++++++++++-----
>  kernel/signal.c                       | 18 ++++++++++--------
>  kernel/uid16.c                        |  1 +
>  mm/vmstat.c                           |  4 +++-
>  net/sunrpc/auth_gss/gss_rpc_xdr.c     |  1 +
>  net/sunrpc/auth_gss/svcauth_gss.c     |  1 +
>  net/sunrpc/svcauth_unix.c             |  2 ++
>  scripts/genksyms/genksyms.c           |  6 ++++--
>  31 files changed, 149 insertions(+), 46 deletions(-)
> 
>

Merged, compiled, and flashed onto my Pixel 2 XL and OnePlus 5.

No issues noticed in general usage or dmesg.

Thanks!
Nathan

WARNING: multiple messages have this Message-ID (diff)
From: Nathan Chancellor <natechancellor@gmail.com>
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org,
	akpm@linux-foundation.org, linux@roeck-us.net,
	shuahkh@osg.samsung.com, patches@kernelci.org,
	ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org,
	stable@vger.kernel.org
Subject: Re: [PATCH 4.4 00/22] 4.4.111-stable review
Date: Mon, 8 Jan 2018 07:25:25 -0700	[thread overview]
Message-ID: <20180108142525.GA9564@flashbox> (raw)
In-Reply-To: <20180108125925.601688333@linuxfoundation.org>

On Mon, Jan 08, 2018 at 01:59:27PM +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.4.111 release.
> There are 22 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Wed Jan 10 12:59:14 UTC 2018.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
> 	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.111-rc1.gz
> or in the git tree and branch at:
>   git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
> and the diffstat can be found below.
> 
> thanks,
> 
> greg k-h
> 
> -------------
> Pseudo-Shortlog of commits:
> 
> Greg Kroah-Hartman <gregkh@linuxfoundation.org>
>     Linux 4.4.111-rc1
> 
> Borislav Petkov <bp@suse.de>
>     Map the vsyscall page with _PAGE_USER
> 
> Alexey Dobriyan <adobriyan@gmail.com>
>     proc: much faster /proc/vmstat
> 
> Libor Pechacek <lpechacek@suse.com>
>     module: Issue warnings when tainting kernel
> 
> Miroslav Benes <mbenes@suse.cz>
>     module: keep percpu symbols in module's symtab
> 
> Michal Marek <mmarek@suse.com>
>     genksyms: Handle string literals with spaces in reference files
> 
> Thomas Gleixner <tglx@linutronix.de>
>     x86/tlb: Drop the _GPL from the cpu_tlbstate export
> 
> Boris Brezillon <boris.brezillon@free-electrons.com>
>     mtd: nand: pxa3xx: Fix READOOB implementation
> 
> Helge Deller <deller@gmx.de>
>     parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
> 
> Tom Lendacky <thomas.lendacky@amd.com>
>     x86/microcode/AMD: Add support for fam17h microcode loading
> 
> Aaron Ma <aaron.ma@canonical.com>
>     Input: elantech - add new icbody type 15
> 
> Vineet Gupta <vgupta@synopsys.com>
>     ARC: uaccess: dont use "l" gcc inline asm constraint modifier
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
> 
> Thiago Rafael Becker <thiago.becker@gmail.com>
>     kernel: make groups_sort calling a responsibility group_info allocators
> 
> David Howells <dhowells@redhat.com>
>     fscache: Fix the default for fscache_maybe_release_page()
> 
> Stefan Br�ns <stefan.bruens@rwth-aachen.de>
>     sunxi-rsb: Include OF based modalias in device uevent
> 
> Eric Biggers <ebiggers@google.com>
>     crypto: pcrypt - fix freeing pcrypt instances
> 
> Eric Biggers <ebiggers@google.com>
>     crypto: chacha20poly1305 - validate the digest size
> 
> Jan Engelhardt <jengelh@inai.de>
>     crypto: n2 - cure use after free
> 
> Oleg Nesterov <oleg@redhat.com>
>     kernel/acct.c: fix the acct->needcheck check in check_free_space()
> 
> Andrey Ryabinin <aryabinin@virtuozzo.com>
>     x86/kasan: Write protect kasan zero shadow
> 
> 
> -------------
> 
> Diffstat:
> 
>  Makefile                              |  4 ++--
>  arch/arc/include/asm/uaccess.h        |  5 +++--
>  arch/parisc/include/asm/ldcw.h        |  2 ++
>  arch/parisc/kernel/entry.S            | 13 +++++++++++--
>  arch/parisc/kernel/pacache.S          |  9 +++++++--
>  arch/s390/kernel/compat_linux.c       |  1 +
>  arch/x86/entry/vsyscall/vsyscall_64.c |  5 +++++
>  arch/x86/include/asm/vsyscall.h       |  2 ++
>  arch/x86/kernel/cpu/microcode/amd.c   |  4 ++++
>  arch/x86/mm/init.c                    |  2 +-
>  arch/x86/mm/kaiser.c                  | 34 ++++++++++++++++++++++++++++++----
>  arch/x86/mm/kasan_init_64.c           | 10 ++++++++--
>  crypto/chacha20poly1305.c             |  6 +++++-
>  crypto/pcrypt.c                       | 19 ++++++++++---------
>  drivers/bus/sunxi-rsb.c               |  1 +
>  drivers/crypto/n2_core.c              |  3 +++
>  drivers/input/mouse/elantech.c        |  2 +-
>  drivers/mtd/nand/pxa3xx_nand.c        |  1 +
>  fs/nfsd/auth.c                        |  3 +++
>  include/linux/cred.h                  |  1 +
>  include/linux/fscache.h               |  2 +-
>  kernel/acct.c                         |  2 +-
>  kernel/groups.c                       |  5 +++--
>  kernel/module.c                       | 26 +++++++++++++++++++++-----
>  kernel/signal.c                       | 18 ++++++++++--------
>  kernel/uid16.c                        |  1 +
>  mm/vmstat.c                           |  4 +++-
>  net/sunrpc/auth_gss/gss_rpc_xdr.c     |  1 +
>  net/sunrpc/auth_gss/svcauth_gss.c     |  1 +
>  net/sunrpc/svcauth_unix.c             |  2 ++
>  scripts/genksyms/genksyms.c           |  6 ++++--
>  31 files changed, 149 insertions(+), 46 deletions(-)
> 
>

Merged, compiled, and flashed onto my Pixel 2 XL and OnePlus 5.

No issues noticed in general usage or dmesg.

Thanks!
Nathan

  parent reply	other threads:[~2018-01-08 14:25 UTC|newest]

Thread overview: 40+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-01-08 12:59 [PATCH 4.4 00/22] 4.4.111-stable review Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 01/22] x86/kasan: Write protect kasan zero shadow Greg Kroah-Hartman
2018-01-08 12:59   ` Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 02/22] kernel/acct.c: fix the acct->needcheck check in check_free_space() Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 03/22] crypto: n2 - cure use after free Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 04/22] crypto: chacha20poly1305 - validate the digest size Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 05/22] crypto: pcrypt - fix freeing pcrypt instances Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 06/22] sunxi-rsb: Include OF based modalias in device uevent Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 07/22] fscache: Fix the default for fscache_maybe_release_page() Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 08/22] kernel: make groups_sort calling a responsibility group_info allocators Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 09/22] kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 10/22] kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 11/22] kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 12/22] ARC: uaccess: dont use "l" gcc inline asm constraint modifier Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 13/22] Input: elantech - add new icbody type 15 Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 14/22] x86/microcode/AMD: Add support for fam17h microcode loading Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 15/22] parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 16/22] mtd: nand: pxa3xx: Fix READOOB implementation Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 17/22] x86/tlb: Drop the _GPL from the cpu_tlbstate export Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 18/22] genksyms: Handle string literals with spaces in reference files Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 19/22] module: keep percpu symbols in modules symtab Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 20/22] module: Issue warnings when tainting kernel Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 21/22] proc: much faster /proc/vmstat Greg Kroah-Hartman
2018-01-08 12:59 ` [PATCH 4.4 22/22] Map the vsyscall page with _PAGE_USER Greg Kroah-Hartman
2018-01-08 14:25 ` Nathan Chancellor [this message]
2018-01-08 14:25   ` [PATCH 4.4 00/22] 4.4.111-stable review Nathan Chancellor
2018-01-08 16:32   ` Greg Kroah-Hartman
2018-01-08 15:21 ` 王金浦
2018-01-08 16:32   ` Greg Kroah-Hartman
2018-01-08 17:29 ` Christoph Biedl
2018-01-08 17:44   ` Borislav Petkov
2018-01-08 17:47 ` kernelci.org bot
2018-01-08 21:00 ` Shuah Khan
2018-01-08 23:29 ` Guenter Roeck
2018-01-09  9:13   ` Greg Kroah-Hartman
2018-01-09  9:23   ` Greg Kroah-Hartman
2018-01-09 13:50     ` Guenter Roeck
2018-01-09  9:51 ` Naresh Kamboju
2018-01-09 10:50   ` Greg Kroah-Hartman
2018-01-09 16:16 ` Guenter Roeck

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180108142525.GA9564@flashbox \
    --to=natechancellor@gmail.com \
    --cc=akpm@linux-foundation.org \
    --cc=ben.hutchings@codethink.co.uk \
    --cc=gregkh@linuxfoundation.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux@roeck-us.net \
    --cc=lkft-triage@lists.linaro.org \
    --cc=patches@kernelci.org \
    --cc=shuahkh@osg.samsung.com \
    --cc=stable@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.