Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7375193yba; Thu, 2 May 2019 08:49:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSwMmRCpRYRDPOTJQRSJR8jfd6Ot6Q7lCDoERl9K4G6EjEi8KMsRO1oeccrxgUZDv9w0p5 X-Received: by 2002:a63:b507:: with SMTP id y7mr4672569pge.237.1556812147784; Thu, 02 May 2019 08:49:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556812147; cv=none; d=google.com; s=arc-20160816; b=bcEOraLQ7+scitCLJOAICDsnIfsiV98ngFuTT2SIVl2C/4+yGK3mlmjZPHf13I+YOv IpUjqtniim3RanDSGXLEb+6vmVBgMNwpVHZzWJAE8eaXOOsHr3z47Sy+GWEqyBwXw+w8 EMVtOjhfPYdSCyZg9cLY8B/3fUH9oBwwrnmLVsxrVYtXPXJttwZ0YiF9dnLz4AXHlO8h /RhTHbSFQyu23iFpk0kuJTrpvnnUtS5t2gx/N1gA1+SM98TOiU8UXoUewbDj+e9xmju+ u9K4RzMTJLVeSIu/l+opCnk0nIpc6r/SL2/ZSx9d21bVOusDkQskmiF810S1Z0xGsnGH DdUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=RmROZMAuiQkP0ys4cbhkKhGAXFgbKJxg5NmEcGgsxPM=; b=fMqva0jPH8nkgV0PFmTd6c7I34qR9YimxGvXfcCNzVpsifV7/kKibHXj5ml65ii+l6 813zf4Knn3u43CaQN1f3lkUtJ2jOU07ASzJFzr0X3Xg0p8y5hX+CkVIxxR3sdCnVrTGz kxnnQfQ5eV62JhDIrEvwD2ojZiKyKLidYOO5a5M2LCzXMDkWXc5dZMMukMpVqP8JGjAw fiXTgtvKsgM1mIKv3XOK59/ZjtkIaCt4h/9LD5gF/MMw3QOKTJoP5Sw+1gihLZGJI3To Yeu1E76fwkzuQDyBQe9vn5sYaHyOKOxDbv2O0XBYAY5ZvslWsJSxolhWnrjCyEc3TUZC G1nw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JCVQbU13; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w18si6299790pgj.14.2019.05.02.08.48.52; Thu, 02 May 2019 08:49:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JCVQbU13; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727342AbfEBPYi (ORCPT + 99 others); Thu, 2 May 2019 11:24:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:40490 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726724AbfEBPYd (ORCPT ); Thu, 2 May 2019 11:24:33 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 681AD2081C; Thu, 2 May 2019 15:24:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556810672; bh=pNq2zG5a9+DQsbrtbJTsG7RWBEVT2XZYHnx+IdeFdbI=; h=From:To:Cc:Subject:Date:From; b=JCVQbU13DO4c5L+qrXzgt4VozjSAML5b0ICMpGXVdQrBiBrZm8VEVQwY/wSe9e9A9 st4sIr4sh3c7B1ZOJLeiDUKm4bDQC2ID9ww+glM2q/vd40DFRzbxVTXrqzqwmhI6y9 TMef3DirT6mvz0dyPzhDA/WLqA9Wb+45mRnl5qHU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.14 00/49] 4.14.116-stable review Date: Thu, 2 May 2019 17:20:37 +0200 Message-Id: <20190502143323.397051088@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.116-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.14.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.14.116-rc1 X-KernelTest-Deadline: 2019-05-04T14:33+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.14.116 release. There are 49 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat 04 May 2019 02:32:06 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.116-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.14.116-rc1 Kangjie Lu leds: pca9532: fix a potential NULL pointer dereference Andrei Vagin ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK Joerg Roedel iommu/amd: Reserve exclusion range in iova-domain Changbin Du kconfig/[mn]conf: handle backspace (^H) key Geert Uytterhoeven gpio: of: Fix of_gpiochip_add() error path raymond pang libata: fix using DMA buffers on stack Steffen Maier scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN Al Viro ceph: fix use-after-free on symlink traversal Mukesh Ojha usb: u132-hcd: fix resource leak Aditya Pakki usb: usb251xb: fix to avoid potential NULL pointer dereference Kangjie Lu scsi: qla4xxx: fix a potential NULL pointer dereference Jean-Philippe Brucker drm/meson: Uninstall IRQ handler Jean-Philippe Brucker drm/meson: Fix invalid pointer in meson_drv_unbind() Kangjie Lu gpio: aspeed: fix a potential NULL pointer dereference Wen Yang net: ethernet: ti: fix possible object reference leak Wen Yang net: ibm: fix possible object reference leak Wen Yang net: xilinx: fix possible object reference leak Trond Myklebust NFS: Fix a typo in nfs_init_timeout_values() Masanari Iida ARM: dts: imx6qdl: Fix typo in imx6qdl-icore-rqs.dtsi Davide Caratti net/sched: don't dereference a->goto_chain to read the chain index Harini Katakam net: macb: Add null check for PCLK and HCLK Aditya Pakki staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc Dan Carpenter staging: rtl8712: uninitialized memory in read_bbreg_hdl() Aditya Pakki staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference Aditya Pakki staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc Lukas Wunner net: ks8851: Set initial carrier state to down Lukas Wunner net: ks8851: Delay requesting IRQ until opened Lukas Wunner net: ks8851: Reassert reset pin if chip ID check fails Lukas Wunner net: ks8851: Dequeue RX packets explicitly Marco Felsch ARM: dts: pfla02: increase phy reset duration Guido Kiener usb: gadget: net2272: Fix net2272_dequeue() Guido Kiener usb: gadget: net2280: Fix net2280_dequeue() Guido Kiener usb: gadget: net2280: Fix overrun of OUT messages Marc Zyngier KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots Petr Štetiar serial: ar933x_uart: Fix build failure with disabled console Mao Wenan sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() Julian Wiedmann s390/qeth: fix race when initializing the IP address table Xin Long netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING Pablo Neira Ayuso netfilter: nft_set_rbtree: check for inactive element after flag mismatch Aditya Pakki qlcnic: Avoid potential NULL pointer dereference Martin Schwidefsky s390: limit brk randomization to 32MB Helen Koike ARM: dts: bcm283x: Fix hdmi hpd gpio pull Matthew Wilcox fs: prevent page refcount overflow in pipe_buf_get Linus Torvalds mm: prevent get_user_pages() from overflowing page refcount Linus Torvalds mm: add 'try_get_page()' helper function Linus Torvalds mm: make page ref count overflow check tighter and more explicit Gustavo A. R. Silva usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set Alexander Kappner usbnet: ipheth: prevent TX queue timeouts when device not ready Paulo Alcantara selinux: use kernel linux/socket.h for genheaders and mdp ------------- Diffstat: Makefile | 4 +- arch/arm/boot/dts/bcm2835-rpi-b-rev2.dts | 2 +- arch/arm/boot/dts/imx6qdl-icore-rqs.dtsi | 4 +- arch/arm/boot/dts/imx6qdl-phytec-pfla02.dtsi | 1 + arch/s390/include/asm/elf.h | 11 ++++-- drivers/ata/libata-zpodd.c | 34 +++++++++++----- drivers/gpio/gpio-aspeed.c | 2 + drivers/gpio/gpiolib-of.c | 8 +++- drivers/gpu/drm/meson/meson_drv.c | 9 +++-- drivers/iommu/amd_iommu.c | 9 +++-- drivers/iommu/amd_iommu_init.c | 7 ++-- drivers/iommu/amd_iommu_types.h | 2 + drivers/leds/leds-pca9532.c | 8 +++- drivers/net/ethernet/cadence/macb_main.c | 10 ++++- drivers/net/ethernet/ibm/ehea/ehea_main.c | 1 + drivers/net/ethernet/micrel/ks8851.c | 36 ++++++++--------- .../net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c | 2 + drivers/net/ethernet/ti/netcp_ethss.c | 8 +++- drivers/net/ethernet/xilinx/xilinx_axienet_main.c | 2 + drivers/net/usb/ipheth.c | 33 +++++++++++----- drivers/s390/net/qeth_l3_main.c | 4 +- drivers/s390/scsi/zfcp_fc.c | 21 ++++++++-- drivers/scsi/qla4xxx/ql4_os.c | 2 + drivers/staging/rtl8188eu/core/rtw_xmit.c | 9 ++++- drivers/staging/rtl8188eu/include/rtw_xmit.h | 2 +- drivers/staging/rtl8712/rtl8712_cmd.c | 10 +---- drivers/staging/rtl8712/rtl8712_cmd.h | 2 +- drivers/staging/rtl8723bs/core/rtw_xmit.c | 14 +++---- drivers/staging/rtl8723bs/include/rtw_xmit.h | 2 +- drivers/staging/rtlwifi/phydm/rtl_phydm.c | 2 + drivers/staging/rtlwifi/rtl8822be/fw.c | 2 + drivers/tty/serial/ar933x_uart.c | 24 ++++-------- drivers/tty/serial/sc16is7xx.c | 12 +++++- drivers/usb/gadget/udc/net2272.c | 1 + drivers/usb/gadget/udc/net2280.c | 8 ++-- drivers/usb/host/u132-hcd.c | 3 ++ drivers/usb/misc/usb251xb.c | 2 +- fs/ceph/inode.c | 2 +- fs/fuse/dev.c | 12 +++--- fs/nfs/client.c | 2 +- fs/pipe.c | 4 +- fs/splice.c | 12 +++++- include/linux/mm.h | 15 +++++++- include/linux/pipe_fs_i.h | 10 +++-- include/linux/sched/signal.h | 18 +++++++++ include/net/tc_act/tc_gact.h | 2 +- kernel/ptrace.c | 15 +++++++- kernel/trace/trace.c | 6 ++- mm/gup.c | 45 ++++++++++++++++------ mm/hugetlb.c | 13 +++++++ net/bridge/br_netfilter_hooks.c | 1 + net/bridge/br_netfilter_ipv6.c | 2 + net/netfilter/nft_set_rbtree.c | 7 ++-- scripts/kconfig/lxdialog/inputbox.c | 3 +- scripts/kconfig/nconf.c | 2 +- scripts/kconfig/nconf.gui.c | 3 +- scripts/selinux/genheaders/genheaders.c | 1 - scripts/selinux/mdp/mdp.c | 1 - security/selinux/include/classmap.h | 1 + virt/kvm/arm/vgic/vgic-its.c | 13 +++++-- 60 files changed, 347 insertions(+), 156 deletions(-)