APPLIED: [PULL][xenial] Stable update to 4.4.111

Stefan Bader stefan.bader at canonical.com
Wed Feb 28 14:26:32 UTC 2018


On 25.01.2018 03:48, Khaled Elmously wrote:
> The following changes since commit cd843050650d765605a7db94c3619197439afe58:
> 
>   Linux 4.4.110 (2018-01-24 17:18:42 -0500)
> 
> are available in the git repository at:
> 
>   git+ssh://kmously@git.launchpad.net/~kmously/ubuntu/+source/linux/+git/xenial update-to-4.4.111
> 
> for you to fetch changes up to 96e8eec96913d917583bccb74bfd8d9f767f307e:
> 
>   Linux 4.4.111 (2018-01-24 20:26:14 -0500)
> 
> ----------------------------------------------------------------
> Aaron Ma (1):
>       Input: elantech - add new icbody type 15
> 
> Alexey Dobriyan (1):
>       proc: much faster /proc/vmstat
> 
> Andrey Ryabinin (1):
>       x86/kasan: Write protect kasan zero shadow
> 
> David Howells (1):
>       fscache: Fix the default for fscache_maybe_release_page()
> 
> Eric Biggers (2):
>       crypto: chacha20poly1305 - validate the digest size
>       crypto: pcrypt - fix freeing pcrypt instances
> 
> Greg Kroah-Hartman (2):
>       Fix build error in vma.c
>       Linux 4.4.111
> 
> Helge Deller (1):
>       parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
> 
> Jan Engelhardt (1):
>       crypto: n2 - cure use after free
> 
> Libor Pechacek (1):
>       module: Issue warnings when tainting kernel
> 
> Michal Marek (1):
>       genksyms: Handle string literals with spaces in reference files
> 
> Oleg Nesterov (4):
>       kernel/acct.c: fix the acct->needcheck check in check_free_space()
>       kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
>       kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals
>       kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()
> 
> Stefan BrĂ¼ns (1):
>       sunxi-rsb: Include OF based modalias in device uevent
> 
> Thiago Rafael Becker (1):
>       kernel: make groups_sort calling a responsibility group_info allocators
> 
> Vineet Gupta (1):
>       ARC: uaccess: dont use "l" gcc inline asm constraint modifier
> 
>  Makefile                          |  2 +-
>  arch/arc/include/asm/uaccess.h    |  5 +++--
>  arch/parisc/include/asm/ldcw.h    |  2 ++
>  arch/parisc/kernel/entry.S        | 13 +++++++++++--
>  arch/parisc/kernel/pacache.S      |  9 +++++++--
>  arch/s390/kernel/compat_linux.c   |  1 +
>  arch/x86/entry/vdso/vma.c         |  1 +
>  arch/x86/mm/kasan_init_64.c       | 10 ++++++++--
>  crypto/chacha20poly1305.c         |  6 +++++-
>  crypto/pcrypt.c                   | 19 ++++++++++---------
>  drivers/bus/sunxi-rsb.c           |  1 +
>  drivers/crypto/n2_core.c          |  3 +++
>  drivers/input/mouse/elantech.c    |  2 +-
>  fs/nfsd/auth.c                    |  3 +++
>  include/linux/cred.h              |  1 +
>  include/linux/fscache.h           |  2 +-
>  kernel/acct.c                     |  2 +-
>  kernel/groups.c                   |  5 +++--
>  kernel/module.c                   | 11 ++++++++++-
>  kernel/signal.c                   | 18 ++++++++++--------
>  kernel/uid16.c                    |  1 +
>  mm/vmstat.c                       |  4 +++-
>  net/sunrpc/auth_gss/gss_rpc_xdr.c |  1 +
>  net/sunrpc/auth_gss/svcauth_gss.c |  1 +
>  net/sunrpc/svcauth_unix.c         |  2 ++
>  scripts/genksyms/genksyms.c       |  6 ++++--
>  26 files changed, 95 insertions(+), 36 deletions(-)
> 
> 
Skipped at application time as already applied:
* Input: elantech - add new icbody type 15 (LP: #1733605)

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180228/54c341d0/attachment.sig>


More information about the kernel-team mailing list