Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966958AbeAOQjN (ORCPT + 1 other); Mon, 15 Jan 2018 11:39:13 -0500 Received: from mail-wm0-f65.google.com ([74.125.82.65]:33769 "EHLO mail-wm0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966302AbeAOQjJ (ORCPT ); Mon, 15 Jan 2018 11:39:09 -0500 X-Google-Smtp-Source: ACJfBovpGyBe1rq8EMhBtsrtMuV1C+E6TidewDzozTZlmxMqU4kmTEgfhO0Idk2JgANw7FqsEs7nyw== Date: Mon, 15 Jan 2018 09:39:04 -0700 From: Nathan Chancellor To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuahkh@osg.samsung.com, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 4.4 00/87] 4.4.112-stable review Message-ID: <20180115163904.GA311@flashbox> References: <20180115123349.252309699@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20180115123349.252309699@linuxfoundation.org> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Mon, Jan 15, 2018 at 01:33:59PM +0100, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.4.112 release. > There are 87 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed Jan 17 12:33:11 UTC 2018. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.112-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y > and the diffstat can be found below. > > thanks, > > greg k-h > > ------------- > Pseudo-Shortlog of commits: > > Greg Kroah-Hartman > Linux 4.4.112-rc1 > > Andy Lutomirski > selftests/x86: Add test_vsyscall > > David Woodhouse > x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm > > Borislav Petkov > x86/alternatives: Fix optimize_nops() checking > > David Woodhouse > sysfs/cpu: Fix typos in vulnerability documentation > > Thomas Gleixner > x86/cpu: Implement CPU vulnerabilites sysfs functions > > Thomas Gleixner > sysfs/cpu: Add vulnerability folder > > Dave Hansen > x86/Documentation: Add PTI description > > Benjamin Poirier > e1000e: Fix e1000_check_for_copper_link_ich8lan return value. > > Icenowy Zheng > uas: ignore UAS for Norelsys NS1068(X) chips > > Ben Seri > Bluetooth: Prevent stack info leak from the EFS element. > > Viktor Slavkovic > staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl > > Shuah Khan > usbip: remove kernel addresses from usb device and urb debug msgs > > Pete Zaitcev > USB: fix usbmon BUG trigger > > Stefan Agner > usb: misc: usb3503: make sure reset is low for at least 100us > > Christian Holl > USB: serial: cp210x: add new device ID ELV ALC 8xxx > > Diego Elio Petten? > USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ > > Nicholas Bellinger > target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK > > Nicholas Bellinger > iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref > > Daniel Borkmann > bpf, array: fix overflow in max_entries and undefined behavior in index_mask > > Alexei Starovoitov > bpf: prevent out-of-bounds speculation > > Alexei Starovoitov > bpf: adjust insn_aux_data when patching insns > > Alexei Starovoitov > bpf: refactor fixup_bpf_calls() > > Alexei Starovoitov > bpf: move fixup_bpf_calls() function > > Jakub Kicinski > bpf: don't (ab)use instructions to store state > > Daniel Borkmann > bpf: add bpf_patch_insn_single helper > > Lepton Wu > kaiser: Set _PAGE_NX only if supported > > Dan Carpenter > drm/vmwgfx: Potential off by one in vmw_view_add() > > Andrew Honig > KVM: x86: Add memory barrier on vmcs field lookup > > Jia Zhang > x86/microcode/intel: Extend BDW late-loading with a revision check > > Ilya Dryomov > rbd: set max_segments to USHRT_MAX > > Eric Biggers > crypto: algapi - fix NULL dereference in crypto_remove_spawns() > > Eric Dumazet > ipv6: fix possible mem leaks in ipv6_make_skb() > > Jerome Brunet > net: stmmac: enable EEE in MII, GMII or RGMII only > > Sergei Shtylyov > sh_eth: fix SH7757 GEther initialization > > Sergei Shtylyov > sh_eth: fix TSU resource handling > > Mohamed Ghannam > RDS: null pointer dereference in rds_atomic_free_op > > Mohamed Ghannam > RDS: Heap OOB write in rds_message_alloc_sgs() > > Andrii Vladyka > net: core: fix module type in sock_diag_bind > > Eli Cooper > ip6_tunnel: disable dst caching if tunnel is dual-stack > > Cong Wang > 8021q: fix a memory leak for VLAN 0 device > > Pavel Tatashin > x86/pti/efi: broken conversion from efi to kernel page table > > Greg Kroah-Hartman > Revert "userfaultfd: selftest: vm: allow to build in vm/ directory" > > Ben Hutchings > xhci: Fix ring leak in failure path of xhci_alloc_virt_device() > > Ani Sinha > sysrq: Fix warning in sysrq generated crash. > > Jiri Slaby > hwrng: core - sleep interruptible in read > > Jiri Kosina > x86/mm/pat, /dev/mem: Remove superfluous error message > > Eric Dumazet > cx82310_eth: use skb_cow_head() to deal with cloned skbs > > Eric Dumazet > smsc75xx: use skb_cow_head() to deal with cloned skbs > > Eric Dumazet > sr9700: use skb_cow_head() to deal with cloned skbs > > Eric Dumazet > lan78xx: use skb_cow_head() to deal with cloned skbs > > hayeswang > r8152: adjust ALDPS function > > hayeswang > r8152: use test_and_clear_bit > > hayeswang > r8152: fix the wake event > > Ulf Hansson > usb: musb: ux500: Fix NULL pointer dereference at system PM > > Oliver Neukum > usbvision fix overflow of interfaces array > > Davidlohr Bueso > locking/mutex: Allow next waiter lockless wakeup > > Jianyu Zhan > futex: Replace barrier() in unqueue_me() with READ_ONCE() > > Jeff Layton > locks: don't check for race with close when setting OFD lock > > Dan Streetman > zswap: don't param_set_charp while holding spinlock > > Dan Streetman > mm/zswap: use workqueue to destroy pool > > Andrey Ryabinin > mm/page-writeback: fix dirty_ratelimit calculation > > Joonsoo Kim > mm/compaction: pass only pageblock aligned range to pageblock_pfn_to_page > > Joonsoo Kim > mm/compaction: fix invalid free_pfn and compact_cached_free_pfn > > Vikas C Sajjan > x86/acpi: Reduce code duplication in mp_override_legacy_irq() > > Takashi Iwai > ALSA: aloop: Fix racy hw constraints adjustment > > Takashi Iwai > ALSA: aloop: Fix inconsistent format due to incomplete rule > > Takashi Iwai > ALSA: aloop: Release cable upon open error path > > Takashi Iwai > ALSA: pcm: Allow aborting mutex lock at OSS read/write loops > > Takashi Iwai > ALSA: pcm: Abort properly at pending signal in OSS read/write loops > > Takashi Iwai > ALSA: pcm: Add missing error checks in OSS emulation plugin builder > > Takashi Iwai > ALSA: pcm: Remove incorrect snd_BUG_ON() usages > > Jean-Philippe Brucker > iommu/arm-smmu-v3: Don't free page table ops twice > > Vikas C Sajjan > x86/acpi: Handle SCI interrupts above legacy space gracefully > > Andy Lutomirski > x86/vsdo: Fix build on PARAVIRT_CLOCK=y, KVM_GUEST=n > > Jim Mattson > kvm: vmx: Scrub hardware GPRs at VM-exit > > Andrey Ryabinin > net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y > > Maciej W. Rozycki > MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses > > Maciej W. Rozycki > MIPS: Also verify sizeof `elf_fpreg_t' with PTRACE_SETREGSET > > Maciej W. Rozycki > MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA > > Maciej W. Rozycki > MIPS: Consistently handle buffer counter with PTRACE_SETREGSET > > Maciej W. Rozycki > MIPS: Guard against any partial write attempt with PTRACE_SETREGSET > > Maciej W. Rozycki > MIPS: Factor out NT_PRFPREG regset access helpers > > Maciej W. Rozycki > MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task > > Bart Van Assche > IB/srpt: Disable RDMA access by the initiator > > Wolfgang Grandegger > can: gs_usb: fix return value of the "set_bittiming" callback > > Wanpeng Li > KVM: Fix stack-out-of-bounds read in write_mmio > > Suren Baghdasaryan > dm bufio: fix shrinker scans when (nr_to_scan < retain_target) > > > ------------- > > Diffstat: > > Documentation/ABI/testing/sysfs-devices-system-cpu | 16 + > Documentation/kernel-parameters.txt | 21 +- > Documentation/x86/pti.txt | 186 ++++++++ > Makefile | 4 +- > arch/arm/kvm/mmio.c | 6 +- > arch/mips/kernel/process.c | 12 + > arch/mips/kernel/ptrace.c | 147 ++++-- > arch/x86/Kconfig | 1 + > arch/x86/include/asm/alternative.h | 4 +- > arch/x86/include/asm/kaiser.h | 10 + > arch/x86/include/asm/pvclock.h | 2 +- > arch/x86/kernel/acpi/boot.c | 61 ++- > arch/x86/kernel/alternative.c | 7 +- > arch/x86/kernel/cpu/bugs.c | 29 ++ > arch/x86/kernel/cpu/microcode/intel.c | 14 +- > arch/x86/kvm/svm.c | 19 + > arch/x86/kvm/vmx.c | 26 +- > arch/x86/kvm/x86.c | 8 +- > arch/x86/mm/kaiser.c | 2 + > arch/x86/mm/pat.c | 5 +- > arch/x86/realmode/init.c | 4 +- > arch/x86/realmode/rm/trampoline_64.S | 3 +- > crypto/algapi.c | 12 + > drivers/base/Kconfig | 3 + > drivers/base/cpu.c | 48 ++ > drivers/block/rbd.c | 2 +- > drivers/char/hw_random/core.c | 6 +- > drivers/char/mem.c | 6 +- > drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c | 2 + > drivers/infiniband/ulp/srpt/ib_srpt.c | 3 +- > drivers/iommu/arm-smmu-v3.c | 8 +- > drivers/md/dm-bufio.c | 7 +- > drivers/media/usb/usbvision/usbvision-video.c | 7 + > drivers/net/can/usb/gs_usb.c | 2 +- > drivers/net/ethernet/intel/e1000e/ich8lan.c | 11 +- > drivers/net/ethernet/renesas/sh_eth.c | 29 +- > drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 6 + > drivers/net/usb/cx82310_eth.c | 7 +- > drivers/net/usb/lan78xx.c | 9 +- > drivers/net/usb/r8152.c | 132 +++--- > drivers/net/usb/smsc75xx.c | 8 +- > drivers/net/usb/sr9700.c | 9 +- > drivers/staging/android/ashmem.c | 2 + > drivers/target/iscsi/iscsi_target.c | 20 +- > drivers/target/target_core_tmr.c | 9 + > drivers/target/target_core_transport.c | 2 + > drivers/tty/sysrq.c | 6 + > drivers/usb/host/xhci-mem.c | 3 +- > drivers/usb/misc/usb3503.c | 2 + > drivers/usb/mon/mon_bin.c | 8 +- > drivers/usb/musb/ux500.c | 7 +- > drivers/usb/serial/cp210x.c | 2 + > drivers/usb/storage/unusual_uas.h | 7 + > drivers/usb/usbip/usbip_common.c | 17 +- > fs/locks.c | 16 +- > include/linux/bpf.h | 2 + > include/linux/cpu.h | 7 + > include/linux/filter.h | 3 + > include/linux/phy.h | 11 + > include/linux/sh_eth.h | 1 - > include/target/target_core_base.h | 1 + > include/trace/events/kvm.h | 7 +- > kernel/bpf/arraymap.c | 37 +- > kernel/bpf/core.c | 71 +++ > kernel/bpf/syscall.c | 54 --- > kernel/bpf/verifier.c | 217 ++++++--- > kernel/futex.c | 8 +- > kernel/locking/mutex.c | 5 +- > mm/compaction.c | 50 ++- > mm/page-writeback.c | 11 +- > mm/zswap.c | 24 +- > net/8021q/vlan.c | 7 +- > net/bluetooth/l2cap_core.c | 20 +- > net/core/sock_diag.c | 2 +- > net/ipv6/ip6_output.c | 4 +- > net/ipv6/ip6_tunnel.c | 9 +- > net/mac80211/debugfs.c | 7 +- > net/rds/rdma.c | 4 + > sound/core/oss/pcm_oss.c | 41 +- > sound/core/oss/pcm_plugin.c | 14 +- > sound/core/pcm_lib.c | 4 +- > sound/drivers/aloop.c | 98 ++-- > tools/testing/selftests/vm/Makefile | 4 - > tools/testing/selftests/x86/test_vsyscall.c | 500 +++++++++++++++++++++ > 84 files changed, 1758 insertions(+), 470 deletions(-) > > Merged, compiled, and flashed onto my Pixel 2 XL and OnePlus 5. No initial issues noticed in general usage or dmesg. Just as a heads up for any other Pixel 2 (XL) users, there will be a conflict in drivers/md/dm-bufio.c due to a Google backport. You can simply take the mainline version of the patch and substitute READ_ONCE for ACCESS_ONCE. I made a small video for thinking about these conflicts if anyone cares for it: https://youtu.be/yWvU8_0O66A OP5 merges in clean. Thanks! Nathan