Received: by 10.223.176.5 with SMTP id f5csp2180804wra; Sun, 28 Jan 2018 14:20:03 -0800 (PST) X-Google-Smtp-Source: AH8x224pKy4y0BAJZEJ5dKz7Cjw8Y4cF440L4Z9dPK3GNpmHOKeR9Lryi4MInLs8mxZ2ChOINh7K X-Received: by 10.98.232.14 with SMTP id c14mr25398616pfi.215.1517178003566; Sun, 28 Jan 2018 14:20:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517178003; cv=none; d=google.com; s=arc-20160816; b=isnYUOP+/GqA0o8tpxrSDzOD3V0Kj5NUpzogQEBHIVik7RLM2RLhX2OrdrxoMkIg/z O7oKj6zsC1dKBYOc2GSeGwxFPDkLssRHLjaLH9jXMR8tD6mVQBJiyVN77CnOr5+p1FSi RCbSPbvzUrvdHPvp+62tpTlCi2rozjOZKnTLUgVhf48HIOXm9V8qWfe88abIj/H7VmyH JTEzQhFWVpOjN7F3Y2ThCXX2t5PED7yPTH7jUurLENEdtVROEvuQx3bcRDOKEKiypRAW biQ6EfRwNBTsXdIQ27SZvnECTz9VHArrKI/Rc8LuOPmZ1zCjk6hiVtuqoBadUGW39tAp y2gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:to:subject :message-id:date:from:mime-version:dkim-signature :arc-authentication-results; bh=Lv3FtReF1WjIOtjnyf2pF+VdSoP0ed9NNVLAeI2rWRs=; b=oU029MJl9Wl8H/4ehhwDXpjeB3KI9iwUiX17uIeCXeXj80+to2N5T+FpQpY5AX/9vA Gi7qRUeizWFX8trRGdVKDfA1CWb9X2hNz1Vpq0m7PHikjeAY2sf1TbQAjziS7dDPe2k6 w7joSg5pMfaIb5JxWyTjqnKPnIZjxMGDtkjx9tQJtCcWeX0t1O5iwzYH1wZmITbypWvW 6IeE8o6YC3QCP5R/ViOcF3OOwI4KIJy1qf5sAkh1897Y3QONNP6V0AWDLjnJq81qvm0E nhasL7ID1ld1c9a+rxamDlPFVqP8qzO+N5qQx6zxFjUyP8H2s39LUQwrkrKZZf4uht3b HSqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=gpeJig64; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9-v6si719747plo.697.2018.01.28.14.19.47; Sun, 28 Jan 2018 14:20:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=gpeJig64; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753147AbeA1Vww (ORCPT + 99 others); Sun, 28 Jan 2018 16:52:52 -0500 Received: from mail-it0-f41.google.com ([209.85.214.41]:33587 "EHLO mail-it0-f41.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752570AbeA1Vwv (ORCPT ); Sun, 28 Jan 2018 16:52:51 -0500 Received: by mail-it0-f41.google.com with SMTP id u12so3234270ite.0 for ; Sun, 28 Jan 2018 13:52:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:from:date:message-id:subject:to :content-transfer-encoding; bh=Lv3FtReF1WjIOtjnyf2pF+VdSoP0ed9NNVLAeI2rWRs=; b=gpeJig641PueRg+KXvRFqS9kEMoSPKbYFpCvlkvgUdT4e5Ylp5CNhefNO+kh7EDX8N rzK+4uehhVm1w2WZoO70uC1abLn7ONtlVyp2Iacnc2EyyF6uJi0yl7bgTNzJVblSl2KX ojqOyWl4wVNK6mmXnARwYwc4y+q2foWX/hMEq3sqh3JrqUfOTfvSd5cZjE1pE/uLs2Pn zwUZB7Xdj2a+jlymw3O5AWnnUXLvz4jc0G6sy8fh6uGtxwcdurrcbC7QUxWAorfNJZ04 Tot5a5spoBfwKZQOB/k8JA3+dWVWf7+HUPEbhVOpYYLeqHc9Uyvlcc48ey/wyootwxaF VwtQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:from:date:message-id:subject :to:content-transfer-encoding; bh=Lv3FtReF1WjIOtjnyf2pF+VdSoP0ed9NNVLAeI2rWRs=; b=iQgs+157evsjW/GYBY7sV4RzK45gZ+HCFy8AEUNiElmEm4B2QxV5Ow+K4nE6Asoc+o YCzy0KET3Hw7gkFfojPXjOh1+V9+2RLxdEr3KXJK0AB9dQY5lJBFQSSVQFnRem51RPJL KGvIQaleas0Fdh2iyOs+ZfYjcAlOmbNpBnQSG5Sqj46mMeYtSYQu8kJs/b6C1945oD4d olO7QcniYvsMy56YaX12QhrVuSZxl6T+OaXIYkpsNo7gJ9kY4aWvfVG9CP6rjXUq3kef M+ihaGXBSCW6fOvOv3GvpFn/gI1ITBkJaLP+HT2NDKct7h2M5NDn+7qSM+G5igRamx5W utxQ== X-Gm-Message-State: AKwxyteRrOyTjL0UQaTFyPQA0GHoKB4FDckhflqG9VRp8hHYm+dRKEtz QzpkWlXWfbngMHXOCEw3axJj6mvmcwAnAyH23b45GsmW X-Received: by 10.36.172.67 with SMTP id m3mr10430928iti.139.1517176369928; Sun, 28 Jan 2018 13:52:49 -0800 (PST) MIME-Version: 1.0 Received: by 10.107.59.196 with HTTP; Sun, 28 Jan 2018 13:52:49 -0800 (PST) From: Linus Torvalds Date: Sun, 28 Jan 2018 13:52:49 -0800 X-Google-Sender-Auth: tHz-tR1j2AKiDul6F_O1w8PJ3oA Message-ID: Subject: Linux 4.15 To: Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After a release cycle that was unusual in so many (bad) ways, this last week was really pleasant. Quiet and small, and no last-minute panics, just small fixes for various issues. I never got a feeling that I'd need to extend things by yet another week, and 4.15 looks fine to me. Half the changes in the last week were misc driver stuff (gpu, input, networking) with the other half being a mix of networking, core kernel and arch updates (mainly x86). But all of it is tiny. So at least we had one good week. This obviously was not a pleasant release cycle, with the whole meltdown/spectre thing coming in in the middle of the cycle and not really gelling with our normal release cycle. The extra two weeks were obviously mainly due to that whole timing issue. Also, it is worth pointing out that it's not like we're "done" with spectre/meltdown. There is more work pending (arm, spectre-v1, misc details), and perhaps equally importantly, to actually get the biggest fix for the indirect branch mitigations, you need not just the kernel updates, you need to have a compiler with support for the "retpoline" indirect branch model. You can do cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 and if you don't have a compiler that supports the retpoline mitigations, you'll get: Vulnerable: Minimal generic ASM retpoline because only the assembly code (not the C code) will have the retpoline mitigation. So keep that in mind. Anyway, while spectre/meltdown has obviously been the big news this release cycle, it's worth noting that we obviously had all the *normal* updates going on too, and the work everywhere else didn't just magically stop, even if some developers have been distracted by CPU issues. In the *big* picture, 4.15 looks perfectly normal, with two thirds of the full 4.15 patch being about drivers, and even the arch updates are dominated by the arm DTS diffs, not by CPU bug mitigation. So the news cycle notwithstanding, the bulk of the 4.15 work is all the regular plodding "boring" stuff. And I mean that in the best possible way. It may not be glamorous and get the headlines, but it's the bread and butter of kernel development, and is in many ways the really important stuff. Go forth and play with it, things actually look pretty good despite everyth= ing. And obviously this also means that the merge window for 4.16 is open. I already have a number of pull requests pending that I will start merging tomorrow. Hopefully we'll have a _normal_ and entirely boring release cycle for 4.16. Because boring really is good. Linus --- Aaron Ma (1): Input: trackpoint - force 3 buttons if 0 button is reported Alexey Kodanev (1): dccp: don't restart ccid2_hc_tx_rto_expire() if sk in closed state Andi Shyti (1): Input: stmfts,s6sy671 - add SPDX identifier Andy Lutomirski (2): x86/mm/64: Fix vmapped stack syncing on very-large-memory 4-level sys= tems x86/mm/64: Tighten up vmalloc_fault() sanity checks on 5-level kernel= s Aviad Yehezkel (1): xfrm: fix error flow in case of add state fails Ben Hutchings (2): nfsd: auth: Fix gid sorting when rootsquash enabled ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL Boris Brezillon (1): drm/vc4: Fix NULL pointer dereference in vc4_save_hang_state() Borislav Petkov (1): x86/microcode: Fix again accessing initrd after having been freed Christian Borntraeger (1): KVM: s390: add proper locking for CMMA migration bitmap Christian K=C3=B6nig (1): x86/PCI: Enable AMD 64-bit window on resume Corentin Labbe (1): sparc64: fix typo in CONFIG_CRYPTO_DES_SPARC64 =3D> CONFIG_CRYPTO_CAMELLIA_SPARC64 Dan Streetman (1): net: tcp: close sock if net namespace is exiting Dave Watson (1): tls: Correct length of scatterlist in tls_sw_sendpage David Ahern (1): net: vrf: Add support for sends to local broadcast address Dmitry Torokhov (1): Input: trackpoint - only expose supported controls for Elan, ALPS and= NXP Eric Anholt (1): drm/vc4: Flush the caches before the bin jobs, as well. Eric Dumazet (1): net: qdisc_pkt_len_init() should be more robust Felix Fietkau (1): net: igmp: fix source address check for IGMPv3 reports Francois Romieu (1): r8169: fix memory corruption on retrieval of hardware statistics. Greg Kroah-Hartman (1): Revert "module: Add retpoline tag to VERMAGIC" Guillaume Nault (1): pppoe: take ->needed_headroom of lower device into account on xmit Gustavo A. R. Silva (1): xfrm: fix boolean assignment in xfrm_get_type_offload H. Peter Anvin (1): x86: Mark hpa as a "Designated Reviewer" for the time being Ivan Mikhaylov (2): net/ibm/emac: add 8192 rx/tx fifo size net/ibm/emac: wrong bit is used for STA control register write Ivan Vecera (1): be2net: restore properly promisc mode after queues reconfiguration Jakub Kicinski (1): i40e: flower: check if TC offload is enabled on a netdev James Morris (1): MAINTAINERS: update email address for James Morris Jason Wang (2): vhost: use mutex_lock_nested() in vhost_dev_lock_vqs() vhost: do not try to access device IOTLB when not initialized Jia Zhang (1): x86/microcode/intel: Extend BDW late-loading further with LLC size ch= eck John Allen (3): ibmvnic: Modify buffer size and number of queues on failover ibmvnic: Revert to previous mtu when unsupported value requested ibmvnic: Allocate and request vpd in init_resources Josef Bacik (1): Btrfs: fix stale entries in readdir Josh Poimboeuf (2): x86/ftrace: Fix ORC unwinding from ftrace handlers x86/ftrace: Add one more ENDPROC annotation Kirill A. Shutemov (2): mm, page_vma_mapped: Drop faulty pointer arithmetics in check_pte() mm, page_vma_mapped: Introduce pfn_in_hpage() Kumar Sanghvi (2): cxgb4: set filter type to 1 for ETH_P_IPV6 cxgb4: fix endianness for vlan value in cxgb4_tc_flower Linus Torvalds (1): Linux 4.15 Lyude Paul (1): drm/nouveau: Move irq setup/teardown to pci ctor/dtor Mark Furneaux (1): Input: xpad - add support for PDP Xbox One controllers Martin Brandenburg (3): orangefs: use list_for_each_entry_safe in purge_waiting_ops orangefs: initialize op on loop restart in orangefs_devreq_read orangefs: fix deadlock; do not write i_size in read_iter Michal Kalderon (2): qed: Remove reserveration of dpi for kernel qed: Free reserved MR tid Neil Horman (1): vmxnet3: repair memory leak Nick Dyer (1): Revert "Input: synaptics_rmi4 - use devm_device_add_group() for attributes in F01" Nicolas Dichtel (1): net: don't call update_pmtu unconditionally Oliver Neukum (1): usbnet: silence an unnecessary warning Palmer Dabbelt (1): Update the RISC-V MAINTAINERS file Peter Zijlstra (6): futex: Fix OWNER_DEAD fixup sched/core: Fix cpu.max vs. cpuhotplug deadlock perf/core: Fix lock inversion between perf,trace,cpuhp perf/core: Fix another perf,trace,cpuhp lock inversion perf/core: Fix ctx::mutex deadlock perf/x86: Fix perf,x86,cpuhp deadlock Sowmini Varadhan (1): rds: tcp: compute m_ack_seq as offset from ->write_seq Stefan Hajnoczi (1): VSOCK: set POLLOUT | POLLWRNORM for TCP_CLOSING Steven Rostedt (VMware) (2): ftrace, orc, x86: Handle ftrace dynamically allocated trampolines tracing: Update stack trace skipping for ORC unwinder Talat Batheesh (1): net/mlx5e: Fix fixpoint divide exception in mlx5e_am_stats_compare Tejun Heo (1): locking/lockdep: Avoid triggering hardlockup from debug_show_all_lock= s() Thomas Gleixner (1): hrtimer: Reset hrtimer cpu base proper on CPU hotplug Tom Herbert (2): kcm: Only allow TCP sockets to be attached to a KCM mux kcm: Check if sk_user_data already set in kcm_attach Waiman Long (1): x86/retpoline: Remove the esp/rsp thunk Willem de Bruijn (1): gso: validate gso_type in GSO handlers Willy Tarreau (1): MAINTAINERS: clarify that only verified bugs should be submitted to security@ Wolfgang Bumiller (2): net: sched: em_nbyte: don't add the data offset twice net: sched: fix TCF_LAYER_LINK case in tcf_get_base_ptr Xiao Liang (1): perf/x86/amd/power: Do not load AMD power module on !AMD platforms Yossi Kuperman (2): xfrm: Add SA to hardware at the end of xfrm_state_construct() xfrm: Fix eth_hdr(skb)->h_proto to reflect inner IP version Yuval Mintz (1): mlxsw: spectrum_router: Don't log an error on missing neighbor