Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp900742yba; Thu, 18 Apr 2019 11:28:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqwgMPB45xMQv8IkykFRcpCz4lOY8g64UFke7MrR260Zi+flwpfLrzMpGuiidRPanRHV5gTn X-Received: by 2002:a63:fa46:: with SMTP id g6mr88753363pgk.382.1555612098192; Thu, 18 Apr 2019 11:28:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555612098; cv=none; d=google.com; s=arc-20160816; b=OQf49TXgPJXp0dSj+W3DBENfT6eg+hmlD56kvKLSgimNfBEUVXLmIubM/zsayBxhhd 0tozSd5ZKfFXze1XXAwczkplZaexaFZ4EyUI3ErVjUEaK6B/P5kF7hkkGalWYmuWM+zo doxYslrNG8q1W6c7NCOn6FwnyZn+X8VamfQuIOM4w1GMwQf0xNF6Q/TEGSQPrKq0siGS bPOgZ9BZEkrmcM1JnDJDOjp+xYaZVjnd/raeSZBRF1xWSKAVX6YQz1FEQKVsuu3PyGFk A5zYh65q4BMO+HVD+0x0lPPij4nTc9YiW+U47Z8+ThlvLPTPIcvWN6aDSAmcu3XvgpuU QZhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=aJcCFgJu+1nVK/FwRt569CronV7WLJ3vYOlW2cLdDjA=; b=HXTvkAzD+6GuHdCMcHRW+43vqRADxqYCbepwYfswvPnRXFW/f6br/u6C8tCBPYCRgc BZFUa5lD4qdrn63lr+oKPi2rFSTCFpEowTgKDOaXUwmR0qRZhXvam7fNwXL4XCmSMnvf lYXvAmC4MZYcmMjB8Ny6Yi1g7XqhKRXXHTWzFcAYZ/j6l+d5iTFC0lpPcOJX3IIUbfip QatoYtkntEr4jBE4tVg84POuj0kMm3G69y5qZiLFxooVNQcNB7+fCJQUQBWlOAZ7AufB Y7/7anlEmtzf64CSIEEoIjpJsrJjzJMDWC5vAZFTR9e+UJF7pxeYkbK1paOtiEQjbml/ Nd0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VyC3tIyy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d3si2984909pfc.278.2019.04.18.11.28.02; Thu, 18 Apr 2019 11:28:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VyC3tIyy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2403765AbfDRSEj (ORCPT + 99 others); Thu, 18 Apr 2019 14:04:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:33618 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391125AbfDRSEg (ORCPT ); Thu, 18 Apr 2019 14:04:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A63D42186A; Thu, 18 Apr 2019 18:04:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610675; bh=HzyoNmteyvcvopUvJRAF7/G/ZXJKewH1CUXokZjApuc=; h=From:To:Cc:Subject:Date:From; b=VyC3tIyy4cNO0kZC2bgFM+25M134yFDsEiRh3tEk2wCbFnYigRFeddWQwJmqNsdkD b27/puFfMnREzXAflaP9LBTvXjKV+9pevPfC/oTQaesmmczY/bwGKbc3IoQVJtzCdG 8VQTIDhwMvVzdJjyt+r9t70OJob79AJw3zY7mqoc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.14 00/92] 4.14.113-stable review Date: Thu, 18 Apr 2019 19:56:18 +0200 Message-Id: <20190418160430.325165109@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.113-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.14.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.14.113-rc1 X-KernelTest-Deadline: 2019-04-20T16:04+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.14.113 release. There are 92 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat Apr 20 16:03:26 UTC 2019. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.113-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.14.113-rc1 Konstantin Khlebnikov mm: hide incomplete nr_indirectly_reclaimable in sysfs Lars Persson net: stmmac: Set dma ring length before enabling the DMA Arnaldo Carvalho de Melo tools include: Adopt linux/bits.h Balbir Singh bpf: Fix selftests are changes for CVE 2019-7308 Daniel Borkmann bpf: fix sanitation rewrite in case of non-pointers Xu Yu bpf: do not restore dst_reg when cur_state is freed Daniel Borkmann bpf: fix inner map masking to prevent oob under speculation Daniel Borkmann bpf: fix sanitation of alu op with pointer / scalar type from different paths Daniel Borkmann bpf: prevent out of bounds speculation on pointer arithmetic Daniel Borkmann bpf: fix check_map_access smin_value test when pointer contains offset Daniel Borkmann bpf: restrict unknown scalars of mixed signed bounds for unprivileged Daniel Borkmann bpf: restrict stack pointer arithmetic for unprivileged Daniel Borkmann bpf: restrict map value pointer arithmetic for unprivileged Daniel Borkmann bpf: enable access to ax register also from verifier rewrite Daniel Borkmann bpf: move tmp variable into ax register in interpreter Daniel Borkmann bpf: move {prev_,}insn_idx into verifier env Alexei Starovoitov bpf: fix stack state printing in verifier log Craig Gallek bpf: fix verifier NULL pointer dereference Alexei Starovoitov bpf: fix verifier memory leaks Alexei Starovoitov bpf: reduce verifier memory consumption Mikulas Patocka dm: disable CRYPTO_TFM_REQ_MAY_SLEEP to fix a GFP_KERNEL recursion deadlock Daniel Borkmann bpf: fix use after free in bpf_evict_inode Pi-Hsun Shih include/linux/swap.h: use offsetof() instead of custom __swapoffset macro Stanislaw Gruszka lib/div64.c: off by one in shift YueHaibing appletalk: Fix use-after-free in atalk_proc_exit Kevin Wang drm/amdkfd: use init_mqd function to allocate object for hid_mqd (CI) Yang Shi ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t Ilia Mirkin drm/nouveau/volt/gf117: fix speedo readout register Leo Yan coresight: cpu-debug: Support for CA73 CPUs Zhang Rui Revert "ACPI / EC: Remove old CLEAR_ON_RESUME quirk" Lars Persson crypto: axis - fix for recursive locking from bottom half Hsin-Yi, Wang drm/panel: panel-innolux: set display off in innolux_panel_unprepare Christophe Leroy lkdtm: Add tests for NULL pointer dereference Christophe Leroy lkdtm: Print real addresses Dmitry Osipenko soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() Julia Cartwright iommu/dmar: Fix buffer overflow during PCI bus notification Ard Biesheuvel crypto: sha512/arm - fix crash bug in Thumb2 build Ard Biesheuvel crypto: sha256/arm - fix crash bug in Thumb2 build Vitaly Kuznetsov kernel: hung_task.c: disable on suspend Steve French cifs: fallback to older infolevels on findfirst queryinfo retry ndesaulniers@google.com compiler.h: update definition of unreachable() Sean Christopherson KVM: nVMX: restore host state in nested_vmx_vmexit for VMFail Ronald Tschalär ACPI / SBS: Fix GPE storm on recent MacBookPro's Maciej Żenczykowski usbip: fix vhci_hcd controller counting Bartlomiej Zolnierkiewicz ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms Julian Sax HID: i2c-hid: override HID descriptors for certain devices Brad Love media: au0828: cannot kfree dev before usb disconnect Nathan Fontenot powerpc/pseries: Remove prrn_work workqueue Michal Simek serial: uartps: console_setup() can't be placed to init section Pablo Neira Ayuso netfilter: xt_cgroup: shrink size of v2 path Chao Yu f2fs: fix to do sanity check with current segment number Dinu-Razvan Chis-Serban 9p locks: add mount option for lock retry interval Gertjan Halkes 9p: do not trust pdu content for stat item size Siva Rebbagondla rsi: improve kernel thread handling to fix kernel panic Robert Jarzmik gpio: pxa: handle corner case of unprobed device Darrick J. Wong ext4: prohibit fstrim in norecovery mode Steve French fix incorrect error code mapping for OBJECTID_NOT_FOUND Nathan Chancellor x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error Lu Baolu iommu/vt-d: Check capability before disabling protected memory YueHaibing drm/nouveau/debugfs: Fix check of pm_runtime_get_sync failure Matthew Whitehead x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processors Aditya Pakki x86/hpet: Prevent potential NULL pointer dereference Jianguo Chen irqchip/mbigen: Don't clear eventid when freeing an MSI Changbin Du perf tests: Fix a memory leak in test__perf_evsel__tp_sched_test() Changbin Du perf tests: Fix memory leak by expr__find_other() in test__expr() Changbin Du perf tests: Fix a memory leak of cpu_map object in the openat_syscall_event_on_all_cpus test Arnaldo Carvalho de Melo perf evsel: Free evsel->counts in perf_evsel__exit() Changbin Du perf hist: Add missing map__put() in error case Changbin Du perf top: Fix error handling in cmd_top() Changbin Du perf build-id: Fix memory leak in print_sdt_events() Changbin Du perf config: Fix a memory leak in collect_config() Changbin Du perf config: Fix an error in the config template documentation Changbin Du perf list: Don't forget to drop the reference to the allocated thread_map David Arcari tools/power turbostat: return the exit status of a command Matteo Croce x86/mm: Don't leak kernel addresses Maurizio Lombardi scsi: iscsi: flush running unbind operations when removing a session Zhang Rui thermal/intel_powerclamp: fix truncated kthread name Matthew Garrett thermal/int340x_thermal: fix mode setting Matthew Garrett thermal/int340x_thermal: Add additional UUIDs Phil Elwell thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs Luc Van Oostenryck thermal/intel_powerclamp: fix __percpu declaration of worker_data Colin Ian King ALSA: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration Arnd Bergmann mmc: davinci: remove extraneous __init annotation Jack Morgenstein IB/mlx4: Fix race condition between catas error reset and aliasguid flows Andy Shevchenko auxdisplay: hd44780: Fix memory leak on ->remove() Kangjie Lu ALSA: sb8: add a check for request_region Kangjie Lu ALSA: echoaudio: add a check for ioremap_nocache Lukas Czerner ext4: report real fs size after failed resize Lukas Czerner ext4: add missing brelse() in add_new_gdb_meta_bg() Stephane Eranian perf/core: Restore mmap record type correctly Corentin Labbe arc: hsdk_defconfig: Enable CONFIG_BLK_DEV_RAM Eugeniy Paltsev ARC: u-boot args: check that magic number is correct ------------- Diffstat: Makefile | 4 +- arch/arc/configs/hsdk_defconfig | 1 + arch/arc/kernel/head.S | 1 + arch/arc/kernel/setup.c | 8 + arch/arm/crypto/sha256-armv4.pl | 3 +- arch/arm/crypto/sha256-core.S_shipped | 3 +- arch/arm/crypto/sha512-armv4.pl | 3 +- arch/arm/crypto/sha512-core.S_shipped | 3 +- arch/arm/kernel/patch.c | 6 +- arch/arm/plat-samsung/Kconfig | 2 +- arch/powerpc/kernel/rtasd.c | 17 +- arch/x86/kernel/cpu/cyrix.c | 14 +- arch/x86/kernel/hpet.c | 2 + arch/x86/kernel/hw_breakpoint.c | 1 + arch/x86/kernel/mpparse.c | 4 +- arch/x86/kvm/vmx.c | 173 ++++- drivers/acpi/ec.c | 53 ++ drivers/acpi/sbs.c | 8 +- drivers/auxdisplay/hd44780.c | 2 + drivers/base/node.c | 7 +- drivers/crypto/axis/artpec6_crypto.c | 28 +- drivers/gpio/gpio-pxa.c | 6 + drivers/gpu/drm/amd/amdkfd/kfd_mqd_manager_cik.c | 52 +- drivers/gpu/drm/nouveau/include/nvkm/subdev/volt.h | 1 + drivers/gpu/drm/nouveau/nouveau_debugfs.c | 2 +- drivers/gpu/drm/nouveau/nvkm/engine/device/base.c | 2 +- drivers/gpu/drm/nouveau/nvkm/subdev/volt/Kbuild | 1 + drivers/gpu/drm/nouveau/nvkm/subdev/volt/gf117.c | 60 ++ drivers/gpu/drm/panel/panel-innolux-p079zca.c | 11 +- drivers/hid/i2c-hid/Makefile | 3 + drivers/hid/i2c-hid/{i2c-hid.c => i2c-hid-core.c} | 56 +- drivers/hid/i2c-hid/i2c-hid-dmi-quirks.c | 376 ++++++++++ drivers/hid/i2c-hid/i2c-hid.h | 20 + drivers/hwtracing/coresight/coresight-cpu-debug.c | 4 + drivers/infiniband/hw/mlx4/alias_GUID.c | 2 +- drivers/iommu/dmar.c | 2 +- drivers/iommu/intel-iommu.c | 3 + drivers/irqchip/irq-mbigen.c | 3 + drivers/md/dm-crypt.c | 10 +- drivers/md/dm-integrity.c | 4 +- drivers/media/usb/au0828/au0828-core.c | 1 - drivers/misc/lkdtm.h | 2 + drivers/misc/lkdtm_core.c | 2 + drivers/misc/lkdtm_perms.c | 36 +- drivers/mmc/host/davinci_mmc.c | 2 +- drivers/net/ethernet/netronome/nfp/bpf/verifier.c | 9 +- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 6 +- drivers/net/wireless/rsi/rsi_common.h | 1 - drivers/scsi/scsi_transport_iscsi.c | 2 + drivers/soc/tegra/pmc.c | 8 +- drivers/thermal/broadcom/bcm2835_thermal.c | 9 +- drivers/thermal/int340x_thermal/int3400_thermal.c | 21 +- drivers/thermal/intel_powerclamp.c | 4 +- drivers/tty/serial/xilinx_uartps.c | 2 +- fs/9p/v9fs.c | 21 + fs/9p/v9fs.h | 1 + fs/9p/vfs_dir.c | 8 +- fs/9p/vfs_file.c | 6 +- fs/cifs/inode.c | 67 +- fs/cifs/smb2maperror.c | 3 +- fs/ext4/ioctl.c | 7 + fs/ext4/resize.c | 17 +- fs/f2fs/super.c | 34 +- include/linux/atalk.h | 2 +- include/linux/bpf_verifier.h | 29 +- include/linux/compiler.h | 5 +- include/linux/filter.h | 10 +- include/linux/swap.h | 4 +- include/uapi/linux/netfilter/xt_cgroup.h | 16 + kernel/bpf/core.c | 51 +- kernel/bpf/inode.c | 32 +- kernel/bpf/map_in_map.c | 17 +- kernel/bpf/verifier.c | 804 +++++++++++++++------ kernel/events/core.c | 2 + kernel/hung_task.c | 30 +- lib/div64.c | 4 +- net/9p/protocol.c | 3 +- net/appletalk/atalk_proc.c | 2 +- net/appletalk/ddp.c | 37 +- net/appletalk/sysctl_net_atalk.c | 5 +- net/netfilter/xt_cgroup.c | 72 ++ sound/drivers/opl3/opl3_voice.h | 2 +- sound/isa/sb/sb8.c | 4 + sound/pci/echoaudio/echoaudio.c | 5 + tools/include/linux/bitops.h | 7 +- tools/include/linux/bits.h | 26 + tools/perf/Documentation/perf-config.txt | 2 +- tools/perf/builtin-top.c | 5 +- tools/perf/check-headers.sh | 1 + tools/perf/tests/evsel-tp-sched.c | 1 + tools/perf/tests/expr.c | 5 +- tools/perf/tests/openat-syscall-all-cpus.c | 4 +- tools/perf/util/build-id.c | 1 + tools/perf/util/config.c | 3 +- tools/perf/util/evsel.c | 1 + tools/perf/util/hist.c | 4 +- tools/perf/util/parse-events.c | 2 + tools/power/x86/turbostat/turbostat.c | 3 + tools/testing/selftests/bpf/test_verifier.c | 6 + tools/usb/usbip/libsrc/vhci_driver.c | 2 +- 100 files changed, 1939 insertions(+), 500 deletions(-)