Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp467297yba; Wed, 15 May 2019 04:38:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqxf3CHNZAgKaV5E1SvQu7K7GVsgGMhKa5AY/7RJYaiJhY7Peke53WUnEJ09FigEc5lyHCtd X-Received: by 2002:a62:b508:: with SMTP id y8mr46835487pfe.113.1557920286168; Wed, 15 May 2019 04:38:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557920286; cv=none; d=google.com; s=arc-20160816; b=TGz4BKNlMIoyviVxkBkrbl9dk0ZJcnrSrpN3gaZJfBsTWVSszoqFB78n5Y92XQjJC9 d47t32Cmu7PefaSIWKRgb0Y48mlbBePZ122VFFeD3+ihgr/+xc1sjiATHc9UF9SAugMz zDDh/1CSR8X43uwPzhy73LC4zVMeDpfCFoRU/2i4gRtWCm4hHFkjxkAO60KQ+aJ6ZPOG +cgl2asWSSEbUOpRTidJGIigA9yEl6rwlKkCpW8ldLIUKXx6gU8dceRk+fgRDpzteyfT 1QKYrlSA6bt7fbRTSWQPGSsFe3GANYbbK+kQ5PIsxtQWJUQh8WtGv+/MnIuI0XNZ1bAO 80gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=SZ1tr/xUSid+oheD/gQoVrA8ryi4LXrcRG39FmQiOko=; b=RXjWN4yEfy2vndQdcNsOvkdcLkvYj4UK00KkLEkt7JUCfUZYF4ywIkWCdbKnhn9eY/ JjlEaRKcoqR2rzArM/4uKJ/CQXzWFgP4fB2BMu6Thgex0fu03/xvgkDf2REPqTl/IDNv Gvnp7+SFNIFdOiCrxb6t6RFSn1YbBjPBGACRQc2fvzk5JQ9gu/1u/JLdiAUPASCQRZ7A YdA/88xCTSCOpVqPAveObE8vQCYnWDZP4/5yYmKUM9lVgaT6CAsW9J0EMe38T+8RBnMO TizfVzaNepIK9aHhRuGMFFRgSLvTCmE7CurICzNLtf2aiVNcYS+UmzB8VdpwLlYOahRq 8acA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nK2rExqt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j14si1794510pfh.232.2019.05.15.04.37.51; Wed, 15 May 2019 04:38:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nK2rExqt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733232AbfEOLdi (ORCPT + 99 others); Wed, 15 May 2019 07:33:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:45528 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732631AbfEOLdg (ORCPT ); Wed, 15 May 2019 07:33:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 30CCF2053B; Wed, 15 May 2019 11:33:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557920015; bh=mQ1M9iKm+r/Yja+DxRhbOUAGtqb3aU8QpacbQuVG+IE=; h=From:To:Cc:Subject:Date:From; b=nK2rExqtwImXRXlCqOOTO8vZnJkDYBKUFK4mLWR1jMNddh7dX+YonhIm0UO0WLYzo RfWvdUa6rO57AgmyzyqN12PRB8+JkwTId5C3BwNjpb/OpQIfHAruCNU+OtYLXisDN7 TFLV5w/eFqpl4/A4c1kjEo/YJXGtg9QzGzQrQ9B8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 5.1 00/46] 5.1.3-stable review Date: Wed, 15 May 2019 12:56:24 +0200 Message-Id: <20190515090616.670410738@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-5.1.3-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.1.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.1.3-rc1 X-KernelTest-Deadline: 2019-05-17T09:06+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 5.1.3 release. There are 46 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri 17 May 2019 09:04:22 AM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.3-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.1.3-rc1 Damien Le Moal f2fs: Fix use of number of devices Dexuan Cui PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary Dexuan Cui PCI: hv: Add hv_pci_remove_slots() when we unload the driver Dexuan Cui PCI: hv: Fix a memory leak in hv_eject_device_work() YueHaibing virtio_ring: Fix potential mem leak in virtqueue_add_indirect_packed Laurentiu Tudor powerpc/booke64: set RI in default MSR Russell Currey powerpc/powernv/idle: Restore IAMR after idle Rick Lindsley powerpc/book3s/64: check for NULL pointer in pgd_alloc() Dan Carpenter drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl Dan Carpenter drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl Paul Bolle isdn: bas_gigaset: use usb_fill_int_urb() properly Eric Dumazet flow_dissector: disable preemption around BPF calls Heiner Kallweit net: phy: fix phy_validate_pause Jason Wang tuntap: synchronize through tfiles array instead of tun->numqueues Jason Wang tuntap: fix dividing by zero in ebpf queue selection Oliver Neukum aqc111: fix double endianness swap on BE Oliver Neukum aqc111: fix writing to the phy on BE Oliver Neukum aqc111: fix endianness issue in aqc111_change_mtu Stephen Suryaputra vrf: sit mtu should not be updated when vrf netdev is the link Hangbin Liu vlan: disable SIOCSHWTSTAMP in container Parthasarathy Bhuvaragan tipc: fix hanging clients using poll with EPOLLOUT flag Paolo Abeni selinux: do not report error on connect(AF_UNSPEC) YueHaibing packet: Fix error path in packet_init Christophe Leroy net: ucc_geth - fix Oops when changing number of buffers in the ring Thomas Bogendoerfer net: seeq: fix crash caused by not set dev.parent Harini Katakam net: macb: Change interrupt and napi enable order in open Corentin Labbe net: ethernet: stmmac: dwmac-sun8i: enable support of unicast filtering YueHaibing net: dsa: Fix error cleanup path in dsa_init_module David Ahern ipv4: Fix raw socket lookup for local traffic Hangbin Liu fib_rules: return 0 directly if an exactly same rule exists when NLM_F_EXCL not supplied Laurentiu Tudor dpaa_eth: fix SG frame cleanup Tobin C. Harding bridge: Fix error path for kobject_init_and_add() Jarod Wilson bonding: fix arp_validate toggling in active-backup mode Nigel Croxon Don't jump to compute_result state from check_result state Gustavo A. R. Silva rtlwifi: rtl8723ae: Fix missing break in switch statement Petr Štetiar mwl8k: Fix rate_idx underflow Johan Hovold USB: serial: fix unthrottle races Hans de Goede virt: vbox: Sanity-check parameter types for hgcm-calls coming from userspace Andrea Parri kernfs: fix barrier usage in __kernfs_new_node() Wolfram Sang i2c: core: ratelimit 'transfer when suspended' errors Kees Cook selftests/seccomp: Handle namespace failures gracefully Lei YU hwmon: (occ) Fix extended status bits Stefan Wahren hwmon: (pwm-fan) Disable PWM if fetching cooling data fails Mario Limonciello platform/x86: dell-laptop: fix rfkill functionality Jiaxun Yang platform/x86: thinkpad_acpi: Disable Bluetooth for some machines Gustavo A. R. Silva platform/x86: sony-laptop: Fix unintentional fall-through ------------- Diffstat: Makefile | 4 +- arch/powerpc/include/asm/book3s/64/pgalloc.h | 3 + arch/powerpc/include/asm/reg_booke.h | 2 +- arch/powerpc/kernel/idle_book3s.S | 20 ++++++ drivers/hwmon/occ/sysfs.c | 8 +-- drivers/hwmon/pwm-fan.c | 2 +- drivers/i2c/i2c-core-base.c | 5 +- drivers/isdn/gigaset/bas-gigaset.c | 9 +-- drivers/md/raid5.c | 19 ++---- drivers/net/bonding/bond_options.c | 7 --- drivers/net/ethernet/cadence/macb_main.c | 6 +- drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 2 +- drivers/net/ethernet/freescale/ucc_geth_ethtool.c | 8 +-- drivers/net/ethernet/seeq/sgiseeq.c | 1 + drivers/net/ethernet/stmicro/stmmac/dwmac-sun8i.c | 2 + drivers/net/phy/phy_device.c | 11 ++-- drivers/net/tun.c | 14 ++++- drivers/net/usb/aqc111.c | 31 +++++++--- drivers/net/wireless/marvell/mwl8k.c | 13 ++-- .../net/wireless/realtek/rtlwifi/rtl8723ae/hw.c | 1 + drivers/pci/controller/pci-hyperv.c | 23 +++++++ drivers/platform/x86/dell-laptop.c | 6 +- drivers/platform/x86/sony-laptop.c | 8 ++- drivers/platform/x86/thinkpad_acpi.c | 72 +++++++++++++++++++++- drivers/usb/serial/generic.c | 39 +++++++++--- drivers/virt/fsl_hypervisor.c | 29 +++++---- drivers/virt/vboxguest/vboxguest_core.c | 31 ++++++++++ drivers/virtio/virtio_ring.c | 1 + fs/f2fs/data.c | 17 +++-- fs/f2fs/f2fs.h | 13 +++- fs/f2fs/file.c | 2 +- fs/f2fs/gc.c | 2 +- fs/f2fs/segment.c | 13 ++-- fs/kernfs/dir.c | 5 +- include/linux/i2c.h | 3 +- net/8021q/vlan_dev.c | 4 +- net/bridge/br_if.c | 13 ++-- net/core/fib_rules.c | 6 +- net/core/flow_dissector.c | 3 + net/dsa/dsa.c | 11 +++- net/ipv4/raw.c | 4 +- net/ipv6/sit.c | 2 +- net/packet/af_packet.c | 25 ++++++-- net/tipc/socket.c | 4 +- security/selinux/hooks.c | 8 +-- tools/testing/selftests/seccomp/seccomp_bpf.c | 43 +++++++------ 46 files changed, 399 insertions(+), 156 deletions(-)