stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org,
	Andrew Morton <akpm@linux-foundation.org>,
	torvalds@linux-foundation.org, stable@vger.kernel.org
Cc: lwn@lwn.net, Jiri Slaby <jslaby@suse.cz>
Subject: Linux 4.4.148
Date: Thu, 16 Aug 2018 12:16:11 +0200	[thread overview]
Message-ID: <20180816101611.GA10969@kroah.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 6817 bytes --]

I'm announcing the release of the 4.4.148 kernel.

All users of the 4.4 kernel series must upgrade.

The updated 4.4.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                                    |    2 
 arch/arm/boot/dts/imx6sx.dtsi               |    2 
 arch/parisc/Kconfig                         |    2 
 arch/parisc/include/asm/barrier.h           |   32 ++++++++++
 arch/parisc/kernel/entry.S                  |    2 
 arch/parisc/kernel/pacache.S                |    1 
 arch/parisc/kernel/syscall.S                |    4 +
 arch/x86/include/asm/cpufeatures.h          |   10 ++-
 arch/x86/include/asm/irqflags.h             |    2 
 arch/x86/include/asm/page_32_types.h        |    9 ++-
 arch/x86/include/asm/pgtable-2level.h       |   17 +++++
 arch/x86/include/asm/pgtable-3level.h       |   37 +++++++++++-
 arch/x86/include/asm/pgtable-invert.h       |   32 ++++++++++
 arch/x86/include/asm/pgtable.h              |   84 ++++++++++++++++++++++------
 arch/x86/include/asm/pgtable_64.h           |   54 +++++++++++++++---
 arch/x86/include/asm/pgtable_types.h        |   10 +--
 arch/x86/include/asm/processor.h            |    5 +
 arch/x86/kernel/cpu/bugs.c                  |   81 ++++++++++++++++-----------
 arch/x86/kernel/cpu/common.c                |   20 ++++++
 arch/x86/kernel/kprobes/core.c              |    4 -
 arch/x86/kernel/paravirt.c                  |   14 +++-
 arch/x86/kernel/setup.c                     |    6 ++
 arch/x86/mm/init.c                          |   25 ++++++++
 arch/x86/mm/kmmio.c                         |   25 +++++---
 arch/x86/mm/mmap.c                          |   21 +++++++
 arch/x86/mm/pageattr.c                      |    8 +-
 drivers/acpi/acpi_lpss.c                    |    2 
 drivers/base/cpu.c                          |    8 ++
 drivers/char/tpm/tpm-dev.c                  |   43 ++++++--------
 drivers/infiniband/core/umem.c              |   11 ---
 drivers/infiniband/hw/mlx4/mr.c             |   50 ++++++++++++++--
 drivers/infiniband/hw/ocrdma/ocrdma_stats.c |    2 
 drivers/net/xen-netfront.c                  |    8 +-
 drivers/scsi/sr.c                           |   29 +++++++--
 fs/dcache.c                                 |    6 +-
 fs/ext4/ialloc.c                            |    5 +
 fs/ext4/super.c                             |    8 --
 fs/namespace.c                              |   28 ++++++++-
 include/asm-generic/pgtable.h               |   12 ++++
 include/linux/cpu.h                         |    2 
 include/linux/mm.h                          |    2 
 include/linux/swapfile.h                    |    2 
 include/linux/thread_info.h                 |    6 --
 include/rdma/ib_verbs.h                     |   14 ++++
 mm/memory.c                                 |   62 +++++++++++++++++---
 mm/mprotect.c                               |   49 ++++++++++++++++
 mm/swapfile.c                               |   46 ++++++++++-----
 net/ipv4/Kconfig                            |    1 
 net/ipv6/Kconfig                            |    1 
 49 files changed, 715 insertions(+), 191 deletions(-)

Al Viro (3):
      root dentries need RCU-delayed freeing
      fix mntput/mntput race
      fix __legitimize_mnt()/mntput() race

Andi Kleen (10):
      x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT
      x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation
      x86/speculation/l1tf: Make sure the first page is always reserved
      x86/speculation/l1tf: Add sysfs reporting for l1tf
      x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings
      x86/speculation/l1tf: Limit swap file size to MAX_PA/2
      x86/speculation/l1tf: Invert all not present mappings
      x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert
      x86/mm/pat: Make set_memory_np() L1TF safe
      x86/mm/kmmio: Make the tracer robust against L1TF

Andy Lutomirski (1):
      mm: Add vm_insert_pfn_prot()

Bart Van Assche (1):
      scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled

Dan Williams (1):
      mm: fix cache mode tracking in vm_insert_mixed()

Dave Hansen (2):
      x86/mm: Move swap offset/type up in PTE to work around erratum
      x86/mm: Fix swap entry comment and macro

Greg Kroah-Hartman (1):
      Linux 4.4.148

Guenter Roeck (1):
      x86/speculation/l1tf: Fix up CPU feature flags

Hans de Goede (1):
      ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices

Helge Deller (1):
      parisc: Enable CONFIG_MLONGCALLS by default

Jack Morgenstein (2):
      IB/core: Make testing MR flags for writability a static inline function
      IB/mlx4: Mark user MR as writable if actual virtual memory is writable

Jiri Kosina (2):
      x86/speculation: Protect against userspace-userspace spectreRSB
      x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures

John David Anglin (1):
      parisc: Define mb() and add memory barriers to assembler unlock sequences

Juergen Gross (1):
      xen/netfront: don't cache skb_shinfo()

Kees Cook (1):
      fork: unconditionally clear stack on fork

Konrad Rzeszutek Wilk (2):
      x86/bugs: Move the l1tf function and define pr_fmt properly
      x86/cpufeatures: Add detection of L1D cache flush support.

Linus Torvalds (2):
      x86/speculation/l1tf: Change order of offset/type in swap entry
      x86/speculation/l1tf: Protect swap entries against L1TF

Masami Hiramatsu (1):
      kprobes/x86: Fix %p uses in error messages

Michael Mera (1):
      IB/ocrdma: fix out of bounds access to local buffer

Michal Hocko (1):
      x86/speculation/l1tf: Fix up pte->pfn conversion for PAE

Naoya Horiguchi (1):
      mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1

Nick Desaulniers (1):
      x86/irqflags: Provide a declaration for native_save_fl

Oleksij Rempel (1):
      ARM: dts: imx6sx: fix irq for pcie bridge

Peter Zijlstra (1):
      x86/paravirt: Fix spectre-v2 mitigations for paravirt guests

Tadeusz Struk (1):
      tpm: fix race condition in tpm_common_write()

Theodore Ts'o (1):
      ext4: fix check to prevent initializing reserved inodes

Thomas Egerer (1):
      ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV

Vlastimil Babka (3):
      x86/speculation/l1tf: Extend 64bit swap file size limit
      x86/speculation/l1tf: Protect PAE swap entries against L1TF
      x86/init: fix build with CONFIG_SWAP=n


[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

             reply	other threads:[~2018-08-16 13:13 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-08-16 10:16 Greg KH [this message]
2018-08-16 10:16 ` Linux 4.4.148 Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180816101611.GA10969@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=akpm@linux-foundation.org \
    --cc=jslaby@suse.cz \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lwn@lwn.net \
    --cc=stable@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).