Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp214832ybi; Fri, 26 Jul 2019 08:34:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqw3VPJnx+DbKQVjUkt60CNYW2lBa7u+fC+BhEm0Fp9fA36NppVoqByDkW/i+jAsuT6FBoxO X-Received: by 2002:a17:90a:fa07:: with SMTP id cm7mr95793494pjb.138.1564155299534; Fri, 26 Jul 2019 08:34:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564155299; cv=none; d=google.com; s=arc-20160816; b=YIZIug8nm9vl8cHZCadhYi0NrMfNLt0Uo6OEyH9bZFh0dRPETZPrXdZ1ZDd6LK5iSF VG23bKDWS3S+bgylB0t5Qkmy60XVH/qI609RwC2pWpKZ+Ydb4TgMimIEZ0yFh6pZiJae bRNvLoEag/NAD9xHqr7lE2wVKq7ozrhWRIs9Ze73FMXYInG5MRN+/a9x4ORduZpTBLOU hrfIwJFUBsSn/DcKEPyA5oaxVNaeZrZJlt+kb6w4Xy1ifz3naflkfK3yWbnh3AdsB5fR UWrzAfbaUnf2Lizsa7i6VA2yHJFXGjbNyKZ2HTzcte6IaELCRX0qX3XPOuKVMASOJWeT pRMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=I8IYqQOhUJpWo5z90h1n1G8Qj1+4ipqJUTDl7Goc27E=; b=ubNp1nKQC7n8AgL2EADSDBcKn0HAVtv+WiWDzZFrGcg/96nTD+S4jZfznNHeJrPsss bzICWvyO/20O5LFMvIbaSy54LCRKIf0h2g5NCMn1fsjBm7KcRORJQYIzmwrzdOdXGnj9 CwhyN0JU6T1BByRd4d4t64qlx2jy63unyIDjxKPd+UurZ2sFAbE+GB6IjNtV5TpJIpZr NEzyxk9SRXnW0A+RZO7GlcaxJFRmMhbSxUWYSgNtxoLAy++rPhxijlgn1GVSx7TYW5pq zT/Stn13Gm0uPI008bDCT70KpXq3eC7TWNyR4HPh3s04YRyXnK89lbuBZ4pySnxytbrT HNOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vfzGe8al; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i24si24447673pgh.224.2019.07.26.08.34.44; Fri, 26 Jul 2019 08:34:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vfzGe8al; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389638AbfGZPdY (ORCPT + 99 others); Fri, 26 Jul 2019 11:33:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:48690 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389223AbfGZPdU (ORCPT ); Fri, 26 Jul 2019 11:33:20 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C411320644; Fri, 26 Jul 2019 15:33:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564155199; bh=h67+uXT6sbm9y238+F0NWa0H/3M1k6uwS2jIekTjE0E=; h=From:To:Cc:Subject:Date:From; b=vfzGe8alZCNTBkTIVlHWrL3yqpE2/yNn7kTE8yha/6vGUPC+nBcmf+iXBtJtoU+jx 1OYYpdQwqZk7/jUq+H5k3ipGRyH9WwAH/NYywHWL9KkPDCAjC5Y6VXiCsYW3h2h/pS 1Q0BKoUZY/Wc/yBxywpndS95ad52sQql0PvMCvWs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.19 00/50] 4.19.62-stable review Date: Fri, 26 Jul 2019 17:24:35 +0200 Message-Id: <20190726152300.760439618@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.62-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.19.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.19.62-rc1 X-KernelTest-Deadline: 2019-07-28T15:23+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.19.62 release. There are 50 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun 28 Jul 2019 03:21:13 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.62-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.19.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.19.62-rc1 Kuo-Hsin Yang mm: vmscan: scan anonymous pages on file refaults Jan Kiszka KVM: nVMX: Clear pending KVM_REQ_GET_VMCS12_PAGES when leaving nested Paolo Bonzini KVM: nVMX: do not use dangling shadow VMCS after guest reset Theodore Ts'o ext4: allow directory holes Ross Zwisler ext4: use jbd2_inode dirty range scoping Ross Zwisler jbd2: introduce jbd2_inode dirty range scoping Ross Zwisler mm: add filemap_fdatawait_range_keep_errors() Theodore Ts'o ext4: enforce the immutable flag on open files Darrick J. Wong ext4: don't allow any modifications to an immutable file Peter Zijlstra perf/core: Fix race between close() and fork() Alexander Shishkin perf/core: Fix exclusive events' grouping Paul Cercueil MIPS: lb60: Fix pin mappings Keerthy gpio: davinci: silence error prints in case of EPROBE_DEFER Chris Wilson dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc Jérôme Glisse dma-buf: balance refcount inbalance Nikolay Aleksandrov net: bridge: stp: don't cache eth dest pointer before skb pull Nikolay Aleksandrov net: bridge: don't cache ether dest pointer on input Nikolay Aleksandrov net: bridge: mcast: fix stale ipv6 hdr pointer when handling v6 query Nikolay Aleksandrov net: bridge: mcast: fix stale nsrcs pointer in igmp3/mld2 report handling Xin Long sctp: not bind the socket in sctp_connect Jakub Kicinski net/tls: make sure offload also gets the keys wiped Cong Wang net_sched: unset TCQ_F_CAN_BYPASS when adding filters Cong Wang netrom: hold sock when setting skb->destructor Cong Wang netrom: fix a memory leak in nr_rx_frame() Andreas Steinmetz macsec: fix checksumming after decryption Andreas Steinmetz macsec: fix use-after-free of skb during RX Aya Levin net/mlx5e: IPoIB, Add error path in mlx5_rdma_setup_rn Peter Kosyh vrf: make sure skb->data contains ip header to make routing Christoph Paasch tcp: Reset bytes_acked and bytes_received when disconnecting Eric Dumazet tcp: fix tcp_set_congestion_control() use from bpf hook Eric Dumazet tcp: be more careful in tcp_fragment() Takashi Iwai sky2: Disable MSI on ASUS P6T Marcelo Ricardo Leitner sctp: fix error handling on stream scheduler initialization David Howells rxrpc: Fix send on a connected, but unbound socket Heiner Kallweit r8169: fix issue with confused RX unit after PHY power-down on RTL8411b Yang Wei nfc: fix potential illegal memory access Jose Abreu net: stmmac: Re-work the queue selection for TSO packets Andrew Lunn net: phy: sfp: hwmon: Fix scaling of RX power John Hurley net: openvswitch: fix csum updates for MPLS actions Lorenzo Bianconi net: neigh: fix multiple neigh timer scheduling Florian Westphal net: make skb_dst_force return true when dst is refcounted Baruch Siach net: dsa: mv88e6xxx: wait after reset deactivation Justin Chen net: bcmgenet: use promisc for unsupported filters Ido Schimmel ipv6: Unlink sibling route in case of failure David Ahern ipv6: rt6_check should return NULL if 'from' is NULL Matteo Croce ipv4: don't set IPv6 only flags to IPv4 addresses Eric Dumazet igmp: fix memory leak in igmpv3_del_delrec() Haiyang Zhang hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() Taehee Yoo caif-hsi: fix possible deadlock in cfhsi_exit_module() Brian King bnx2x: Prevent load reordering in tx completion processing ------------- Diffstat: Makefile | 4 +- arch/mips/jz4740/board-qi_lb60.c | 16 +-- arch/x86/kvm/vmx.c | 10 +- drivers/dma-buf/dma-buf.c | 1 + drivers/dma-buf/reservation.c | 4 + drivers/gpio/gpio-davinci.c | 5 +- drivers/net/caif/caif_hsi.c | 2 +- drivers/net/dsa/mv88e6xxx/chip.c | 2 + drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c | 3 + drivers/net/ethernet/broadcom/genet/bcmgenet.c | 57 ++++----- drivers/net/ethernet/marvell/sky2.c | 7 ++ .../net/ethernet/mellanox/mlx5/core/ipoib/ipoib.c | 9 +- drivers/net/ethernet/realtek/r8169.c | 137 +++++++++++++++++++++ drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 29 +++-- drivers/net/hyperv/netvsc_drv.c | 1 - drivers/net/macsec.c | 6 +- drivers/net/phy/sfp.c | 2 +- drivers/net/vrf.c | 58 +++++---- fs/ext4/dir.c | 19 ++- fs/ext4/ext4_jbd2.h | 12 +- fs/ext4/file.c | 4 + fs/ext4/inode.c | 24 +++- fs/ext4/ioctl.c | 46 ++++++- fs/ext4/move_extent.c | 3 +- fs/ext4/namei.c | 45 +++++-- fs/jbd2/commit.c | 23 +++- fs/jbd2/journal.c | 4 + fs/jbd2/transaction.c | 49 ++++---- include/linux/fs.h | 2 + include/linux/jbd2.h | 22 ++++ include/linux/perf_event.h | 5 + include/net/dst.h | 5 +- include/net/tcp.h | 8 +- include/net/tls.h | 1 + kernel/events/core.c | 83 ++++++++++--- mm/filemap.c | 22 ++++ mm/vmscan.c | 6 +- net/bridge/br_input.c | 8 +- net/bridge/br_multicast.c | 32 ++--- net/bridge/br_stp_bpdu.c | 3 +- net/core/filter.c | 2 +- net/core/neighbour.c | 2 + net/ipv4/devinet.c | 8 ++ net/ipv4/igmp.c | 8 +- net/ipv4/tcp.c | 6 +- net/ipv4/tcp_cong.c | 6 +- net/ipv4/tcp_output.c | 13 +- net/ipv6/ip6_fib.c | 18 ++- net/ipv6/route.c | 2 +- net/netfilter/nf_queue.c | 6 +- net/netrom/af_netrom.c | 4 +- net/nfc/nci/data.c | 2 +- net/openvswitch/actions.c | 6 +- net/rxrpc/af_rxrpc.c | 4 +- net/sched/cls_api.c | 1 + net/sched/sch_fq_codel.c | 2 - net/sched/sch_sfq.c | 2 - net/sctp/socket.c | 20 +-- net/sctp/stream.c | 9 +- net/tls/tls_device.c | 2 +- net/tls/tls_main.c | 2 +- 61 files changed, 669 insertions(+), 235 deletions(-)