Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6279134imu; Mon, 21 Jan 2019 06:17:11 -0800 (PST) X-Google-Smtp-Source: ALg8bN4r5Mw9xTPUJ34PYznuPyCa33Jdzob59JJHVnD0KQSfMjG+Rm+mtXHoJghUjtwdDMyGcVbE X-Received: by 2002:a63:7219:: with SMTP id n25mr28325474pgc.324.1548080231805; Mon, 21 Jan 2019 06:17:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548080231; cv=none; d=google.com; s=arc-20160816; b=S0V60N7R0jr0e8fsESK22ps06PQzjdGzMmJ7ZYHA5tJ8/NgeJf3ivJK6o07NWaq4pY EAR4/pDNIL6PE3neDdKZ2u6uGqhW1vLOVcRzzF+v7aFyCtjspPfCajn/kd4/4ZLXmCD1 at0P5rzuPwztjpFj+hUnKN/H3N8DZhAKrtmifCkcx0xulZNWZH1t3mj7KHAL78w2nlfP 6SlS7t1DHpbOQd8X18HH84a5Q8F7ugqD6tRcRxOIMWxtmcMXHeXjp7V7EhPLrA82nxlX kcluS4jqVhQtOEiaoUS8LPZxVPKm6pK3PK8qv10XlsqRFh6PvoSfsFkTcmxCB3et8vUB Labw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=iPecwgCtFoYKEGHSKZuhz6cZzkgad463Mn6NeFO4luU=; b=Mcg7ENmz2uSzOUl5ujZ1GoDnMAw3cnVH9xR7WVi/bt68Suukx9It4cWIjyQuqfK33I BBYfJQiYgLl+Z2xF8tHrqbzyhP//oP582ZHm8cJJfCD5wLNKeb6iMqDUwi844ZAjxS0i vSsd4Ws2yhSe3SLNDeMYmFON5d20i5NrtXf4G5tJVVqDX6eKUAx2v+A20QyfFo0kt6ML cUsvPNkS8S77rvgHgdzhErEpU7UhODBUgcsGw2cFpf2OKVzTFWF7ZcqUUMsQtoLJ3/iO YPDr74mFMqAHayeomH+H3pM516girI4FB4eLtH8LOJPlVLselZ65ODvsFrKzBnKQOKqc iVFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AdzlGNNr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z22si12335329pfd.197.2019.01.21.06.16.56; Mon, 21 Jan 2019 06:17:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AdzlGNNr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730807AbfAUNvc (ORCPT + 99 others); Mon, 21 Jan 2019 08:51:32 -0500 Received: from mail.kernel.org ([198.145.29.99]:34414 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730770AbfAUNvb (ORCPT ); Mon, 21 Jan 2019 08:51:31 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3C10D20879; Mon, 21 Jan 2019 13:51:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548078689; bh=ex4GvMk1Kdn0XSe6PD529SU4Pkz/uikSlTkg/y7mCXo=; h=From:To:Cc:Subject:Date:From; b=AdzlGNNrbmgFixPDQxIQbJm8lCSsiFqtdylaQorB+Ok/8fRJQ+NLSZiolNwlKP87O 4uL2YFmranE+m5E7XAUJOvZqbN9xwaJ01Ea8x8BlijQ18IhGNAswIu829yYcDeN+Te tArn0PF6zGR/EtUQEhEGn6oGfntvU5iynv+GHvXg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.14 00/59] 4.14.95-stable review Date: Mon, 21 Jan 2019 14:43:25 +0100 Message-Id: <20190121122456.529172919@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.95-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.14.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.14.95-rc1 X-KernelTest-Deadline: 2019-01-23T12:25+00:00 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.14.95 release. There are 59 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed Jan 23 12:23:55 UTC 2019. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.95-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.14.95-rc1 Ivan Mironov drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock Jaegeuk Kim loop: drop caches if offset or block_size are changed Tetsuo Handa loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl() Jan Kara loop: Get rid of loop_index_mutex Jan Kara loop: Fold __loop_release into loop_release Tetsuo Handa block/loop: Use global lock for ioctl() operation. Tetsuo Handa block/loop: Don't grab "struct file" for vfs_getattr() operation. Ying Xue tipc: fix uninit-value in tipc_nl_compat_doit Ying Xue tipc: fix uninit-value in tipc_nl_compat_name_table_dump Ying Xue tipc: fix uninit-value in tipc_nl_compat_link_set Ying Xue tipc: fix uninit-value in tipc_nl_compat_bearer_enable Ying Xue tipc: fix uninit-value in tipc_nl_compat_link_reset_stats Xin Long sctp: allocate sctp_sockaddr_entry with kzalloc Jan Kara blockdev: Fix livelocks on loop device Stephen Smalley selinux: fix GPF on invalid policy Shakeel Butt netfilter: ebtables: account ebt_table_info to kmemcg J. Bruce Fields sunrpc: handle ENOMEM in rpcb_getport_async Hans Verkuil media: vb2: vb2_mmap: move lock up James Morris LSM: Check for NULL cred-security on free Willem de Bruijn bpf: in __bpf_redirect_no_mac pull mac only if present Hans Verkuil media: vivid: set min width/height to a value > 0 Hans Verkuil media: vivid: fix error handling of kthread_run Vlad Tsyrklevich omap2fb: Fix stack memory disclosure YunQiang Su Disable MSI also when pcie-octeon.pcie_disable on Ard Biesheuvel arm64: kaslr: ensure randomized quantities are clean to the PoC Kees Cook pstore/ram: Avoid allocation and leak of platform data Sakari Ailus media: v4l: ioctl: Validate num_planes for debug messages Jonathan Hunter mfd: tps6586x: Handle interrupts on suspend Julia Lawall OF: properties: add missing of_node_put Hauke Mehrtens MIPS: lantiq: Fix IPI interrupt handling Arnd Bergmann mips: fix n32 compat_ipc_parse_version Christophe Leroy crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK Christophe Leroy crypto: talitos - reorder code in talitos_edesc_alloc() Ivan Mironov scsi: sd: Fix cache_type_store() Stanley Chu scsi: core: Synchronize request queue PM status only on successful resume Kees Cook Yama: Check for pid death before checking ancestry Josef Bacik btrfs: wait on ordered extents on abort cleanup David Sterba Revert "btrfs: balance dirty metadata pages in btrfs_finish_ordered_io" Eric Biggers crypto: authenc - fix parsing key with misaligned rta_len Eric Biggers crypto: bcm - convert to use crypto_authenc_extractkeys() Harsh Jain crypto: authencesn - Avoid twice completion call in decrypt path Aymen Sghaier crypto: caam - fix zero-length buffer DMA mapping Willem de Bruijn ip: on queued skb use skb_header_pointer instead of pskb_may_pull Willem de Bruijn bonding: update nest level on unlink Jason Gunthorpe packet: Do not leak dev refcounts on error exit JianJhen Chen net: bridge: fix a bug on using a neighbour cache entry without checking its state Eric Dumazet ipv6: fix kernel-infoleak in ipv6_local_error() Mark Rutland arm64: Don't trap host pointer auth use to EL2 Mark Rutland arm64/kvm: consistently handle host HCR_EL2 flags Varun Prakash scsi: target: iscsi: cxgbit: fix csk leak Sasha Levin Revert "scsi: target: iscsi: cxgbit: fix csk leak" Xunlei Pang sched/fair: Fix bandwidth timer clock drift condition Ben Hutchings media: em28xx: Fix misplaced reset of dev->v4l::field_count Loic Poulain mmc: sdhci-msm: Disable CDR function on TX Oliver Hartkopp can: gw: ensure DLC boundaries after CAN frame modification Dmitry Safonov tty: Don't hold ldisc lock in tty_reopen() if ldisc present Dmitry Safonov tty: Simplify tty->count math in tty_reopen() Dmitry Safonov tty: Hold tty_ldisc_lock() during tty_reopen() Dmitry Safonov tty/ldsem: Wake up readers after timed out down_write() ------------- Diffstat: Makefile | 4 +- arch/arm64/include/asm/kvm_arm.h | 3 + arch/arm64/kernel/head.S | 5 +- arch/arm64/kernel/kaslr.c | 8 +- arch/arm64/kvm/hyp/switch.c | 2 +- arch/mips/Kconfig | 1 + arch/mips/lantiq/irq.c | 68 +---------- arch/mips/pci/msi-octeon.c | 4 +- crypto/authenc.c | 14 ++- crypto/authencesn.c | 2 +- drivers/block/loop.c | 140 ++++++++++++++--------- drivers/block/loop.h | 1 - drivers/crypto/Kconfig | 1 + drivers/crypto/bcm/cipher.c | 44 +++---- drivers/crypto/caam/caamhash.c | 15 ++- drivers/crypto/talitos.c | 27 ++--- drivers/gpu/drm/drm_fb_helper.c | 7 +- drivers/media/platform/vivid/vivid-kthread-cap.c | 5 +- drivers/media/platform/vivid/vivid-kthread-out.c | 5 +- drivers/media/platform/vivid/vivid-vid-common.c | 2 +- drivers/media/usb/em28xx/em28xx-video.c | 4 +- drivers/media/v4l2-core/v4l2-ioctl.c | 4 +- drivers/media/v4l2-core/videobuf2-core.c | 11 +- drivers/mfd/tps6586x.c | 24 ++++ drivers/mmc/host/sdhci-msm.c | 51 ++++++++- drivers/net/bonding/bond_main.c | 3 + drivers/of/property.c | 1 + drivers/scsi/scsi_pm.c | 26 +++-- drivers/scsi/sd.c | 6 + drivers/tty/tty_io.c | 22 ++-- drivers/tty/tty_ldsem.c | 10 ++ drivers/video/fbdev/omap2/omapfb/omapfb-ioctl.c | 2 + fs/block_dev.c | 28 +++-- fs/btrfs/disk-io.c | 8 ++ fs/btrfs/inode.c | 3 - fs/pstore/ram.c | 9 +- kernel/sched/fair.c | 14 ++- kernel/sched/sched.h | 4 +- net/bridge/br_netfilter_hooks.c | 2 +- net/bridge/netfilter/ebtables.c | 6 +- net/can/gw.c | 30 ++++- net/core/filter.c | 21 ++-- net/core/lwt_bpf.c | 1 + net/ipv4/ip_sockglue.c | 12 +- net/ipv6/datagram.c | 11 +- net/packet/af_packet.c | 4 +- net/sctp/ipv6.c | 5 +- net/sctp/protocol.c | 4 +- net/sunrpc/rpcb_clnt.c | 8 ++ net/tipc/netlink_compat.c | 50 +++++++- security/security.c | 7 ++ security/selinux/ss/policydb.c | 3 +- security/yama/yama_lsm.c | 4 +- 53 files changed, 472 insertions(+), 284 deletions(-)