Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp79470yba; Mon, 20 May 2019 05:20:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqxdxVocEh8es6PV2FlwoVCg3CSZJqj9ph6ZaVzZinHpzS94a6bOYLUTiCxJgCJXXnjf7Cik X-Received: by 2002:a62:414a:: with SMTP id o71mr81046910pfa.240.1558354847042; Mon, 20 May 2019 05:20:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558354847; cv=none; d=google.com; s=arc-20160816; b=ThNCAGaeqkUHc1BNzb9VZaCMEIckLTv3jcJgG/RqkvQzuvYKYIlFjpedCizcNbIkG9 t5j4rYve1B2MhFkijp3m1VJvy+OhXHOJoV+UVTje7CgomfsCtnF9mhNv3Bre007vSd2w arpuY3kIjEMtog9pV+dO7/KhhTgf9niBR/coAK4hmlbLSdUZzo1t/bPP2P9ozuKvMf8U +FwNyuEgyEBqadlmVFzJQXepTNb3fc9YlKQJg8NgM3Z45nL5pu4D5q2iWfptfCmwDUca vlc9CMB+IE8lD6QEfd+Hf5OITcaKKuJi0y4WxVGc2pfLWz9mNzW4+gKkYEXxob2hqaYW DzpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=RhuHfgq1ZELVL4dAOJO3TWc9xJ/4AUGTHS431exOQ5I=; b=AMj+K4Hgo0EkjvMKiBFfXB47aMnTINIn3VOmQ8A9YA0eJ5k7QgwPHwOKZwxNxMe3KZ 5KNnPlOZ4ui9VckHbn6JWJdGPzoewiNkMHp3J66WJcAYE5AQ3Qv9XZrqNEGWNTufK4J/ eN1dSy491sCWM4hOQWDROHTusMMhrSAqvoCd/px2/jWoNnrwCB6FpTWQ/CvSWdXpi6F7 ayrTyz1hlf3iWE67Jaw4DDwDfR94yLon8gQZhxc61IvsWwe5LzPlbIfK1WRQXfARfNSF vc3M+Hs1Ww3FQ+e+9e4fGpsaHNG9o03m/RC4bpj+fyslBnq1MtXKLFniiUJfhSc1p/dU WIcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uhNEl19i; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u28si18390526pga.131.2019.05.20.05.20.32; Mon, 20 May 2019 05:20:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uhNEl19i; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387463AbfETMRJ (ORCPT + 99 others); Mon, 20 May 2019 08:17:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:57918 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387446AbfETMRF (ORCPT ); Mon, 20 May 2019 08:17:05 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 372C0214DA; Mon, 20 May 2019 12:17:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558354624; bh=pMhJBov8FCnLw4exJBoL5XcFYktewII0T/VxOTtlouk=; h=From:To:Cc:Subject:Date:From; b=uhNEl19iJ3DKhAB6vjafMkn8H6iZ1nW+F4ldpqHu7597agDWnI4jlveJs8lPT7/9s nFl6hgntXufWSaf3vfPvkPykj4BvJecqM64CN/K+OCj40pMkdk2+DL9fssDhQrjKMs jnh651swNvIDjM1uc/Wng+l8ldwgQTavKiI10t2E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/44] 4.9.178-stable review Date: Mon, 20 May 2019 14:13:49 +0200 Message-Id: <20190520115230.720347034@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.178-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.178-rc1 X-KernelTest-Deadline: 2019-05-22T11:52+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.178 release. There are 44 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed 22 May 2019 11:50:58 AM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.178-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.178-rc1 Sean Christopherson KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes MichaƂ Wadowski ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug Lukas Czerner ext4: fix data corruption caused by overlapping unaligned and aligned IO Sriram Rajagopalan ext4: zero out the unused memory region in the extent tree block Jiufei Xue fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount Tejun Heo writeback: synchronize sync(2) against cgroup writeback membership switches Greg Kroah-Hartman fib_rules: fix error in backport of e9919a24d302 ("fib_rules: return 0...") Eric Biggers crypto: arm/aes-neonbs - don't access already-freed walk.iv Eric Biggers crypto: salsa20 - don't access already-freed walk.iv Eric Biggers crypto: gcm - fix incompatibility between "gcm" and "gcm_base" Wei Yongjun crypto: gcm - Fix error return code in crypto_gcm_create_common() Kamlakant Patel ipmi:ssif: compare block number correctly for multi-part return messages Coly Li bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() Liang Chen bcache: fix a race between cache register and cacheset unregister Filipe Manana Btrfs: do not start a transaction at iterate_extent_inodes() Debabrata Banerjee ext4: fix ext4_show_options for file systems w/o journal Kirill Tkhai ext4: actually request zeroing of inode table after grow Jiufei Xue jbd2: check superblock mapped prior to committing Sergei Trofimovich tty/vt: fix write/write race in ioctl(KDSKBSENT) handler Dmitry Osipenko mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values Steve Twiss mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L Shuning Zhang ocfs2: fix ocfs2 read inode data panic in ocfs2_iget Jiri Kosina mm/mincore.c: make mincore() more conservative Curtis Malainey ASoC: RT5677-SPI: Disable 16Bit SPI Transfers Jon Hunter ASoC: max98090: Fix restore of DAPM Muxes Kailang Yang ALSA: hda/realtek - EAPD turn on later Hui Wang ALSA: hda/hdmi - Consider eld_valid when reporting jack event Hui Wang ALSA: hda/hdmi - Read the pin sense from register when repolling Wenwen Wang ALSA: usb-audio: Fix a memory leak bug Eric Biggers crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() Eric Biggers crypto: crct10dif-generic - fix use via crypto_shash_digest() Daniel Axtens crypto: vmx - fix copy-paste error in CTR mode Eric Biggers crypto: chacha20poly1305 - set cra_name correctly Peter Zijlstra sched/x86: Save [ER]FLAGS on context switch Jean-Philippe Brucker arm64: Clear OSDLR_EL1 on CPU boot Vincenzo Frascino arm64: compat: Reduce address limit Gustavo A. R. Silva power: supply: axp288_charger: Fix unchecked return value Wen Yang ARM: exynos: Fix a leaked reference by adding missing of_node_put Josh Poimboeuf objtool: Fix function fallthrough detection Andy Lutomirski x86/speculation/mds: Improve CPU buffer clear documentation Andy Lutomirski x86/speculation/mds: Revert CPU buffer clear on double fault exit Dexuan Cui PCI: hv: Fix a memory leak in hv_eject_device_work() Waiman Long locking/rwsem: Prevent decrement of reader count before increment Sasha Levin net: core: another layer of lists, around PF_MEMALLOC skb handling ------------- Diffstat: Documentation/x86/mds.rst | 44 ++++------------------------ Makefile | 4 +-- arch/arm/crypto/aesbs-glue.c | 4 +++ arch/arm/mach-exynos/firmware.c | 1 + arch/arm/mach-exynos/suspend.c | 2 ++ arch/arm64/include/asm/processor.h | 8 ++++++ arch/arm64/kernel/debug-monitors.c | 1 + arch/x86/crypto/crct10dif-pclmul_glue.c | 13 ++++----- arch/x86/entry/entry_32.S | 2 ++ arch/x86/entry/entry_64.S | 2 ++ arch/x86/include/asm/switch_to.h | 1 + arch/x86/kernel/process_32.c | 7 +++++ arch/x86/kernel/process_64.c | 8 ++++++ arch/x86/kernel/traps.c | 8 ------ arch/x86/kvm/x86.c | 33 ++++++++++++++------- crypto/chacha20poly1305.c | 4 +-- crypto/crct10dif_generic.c | 11 +++---- crypto/gcm.c | 36 ++++++++--------------- crypto/salsa20_generic.c | 2 +- drivers/char/ipmi/ipmi_ssif.c | 6 +++- drivers/crypto/vmx/aesp8-ppc.pl | 4 +-- drivers/md/bcache/journal.c | 11 ++++--- drivers/md/bcache/super.c | 2 +- drivers/pci/host/pci-hyperv.c | 1 + drivers/power/supply/axp288_charger.c | 4 +++ drivers/tty/vt/keyboard.c | 33 +++++++++++++++++---- fs/btrfs/backref.c | 18 ++++++++---- fs/ext4/extents.c | 17 +++++++++-- fs/ext4/file.c | 7 +++++ fs/ext4/ioctl.c | 2 +- fs/ext4/super.c | 2 +- fs/fs-writeback.c | 51 +++++++++++++++++++++++++++++---- fs/jbd2/journal.c | 4 +++ fs/ocfs2/export.c | 30 ++++++++++++++++++- include/linux/backing-dev-defs.h | 1 + include/linux/list.h | 30 +++++++++++++++++++ include/linux/mfd/da9063/registers.h | 6 ++-- include/linux/mfd/max77620.h | 4 +-- kernel/locking/rwsem-xadd.c | 44 +++++++++++++++++++--------- mm/backing-dev.c | 1 + mm/mincore.c | 23 ++++++++++++++- net/core/fib_rules.c | 1 + sound/pci/hda/patch_hdmi.c | 11 +++++-- sound/pci/hda/patch_realtek.c | 5 ++-- sound/soc/codecs/max98090.c | 12 ++++---- sound/soc/codecs/rt5677-spi.c | 35 +++++++++++----------- sound/usb/mixer.c | 2 ++ tools/objtool/check.c | 3 +- 48 files changed, 379 insertions(+), 182 deletions(-)