Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp388477ybi; Fri, 26 Jul 2019 11:26:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqxVzA8K68QgfmFR/YXAD5CsYtYtsUcRhvDh/3NEvqOsae61NYuzzs+V5BP1mEqeAjJnoKSa X-Received: by 2002:a17:902:381:: with SMTP id d1mr95501747pld.331.1564165591225; Fri, 26 Jul 2019 11:26:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564165591; cv=none; d=google.com; s=arc-20160816; b=ool2IY4TwXEJEbrXPAH8tQGlo8tV2uSOV5tQYnzzb5w17tUOZGSwIs4IvAROZORtPO aExTZkfiy/V1sBCTlx5sgTjYF3IP4G4rruy8jSwCd+p5h/iQDL2/WmuKBOYkutTZFw5G 5GCfqzyA382b1RraXJmvc1zmCAXnkr75QSqux5tH77oX0QGPFt3rBPUR3C83Ve0+vxf+ 707IFg0pnRNBI9dSKdUrLGTTGzl+szADQjMJNuVBCVIFFvzWJOniZXz7houdGsYRIqFJ nfEb2VMVIoAyrhrgWhFdedRCgNl4I3WK01ZkClGAXH8QwYgRyCYyk7w2Kfa+484Fzi8u Ss6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=DEFqqQ5Iu71HcmGzUFl1iGJVCPdBqN+TcY8C/SOxuhI=; b=OpQ3aQROFX4VudZ57mWvtPv46HMzAuqR3eT7mdCho1l1V95Jt2Wh5W/VkRcDweyQYJ j1jDl70gSJre0YJ08e7lW9h4IeDhDxvNc7WfwwGKNZgoOSJRKcG/7B5eFxEqnsuKmmRj +S4u+W/jplppilx5P0O3D+sfvsCkIreItX4iCep4+N6BB+C+qFq97X5TEsFM8/5R87Nn CwPR9L9EptEsM5tfLTUoFOlA23aAT8994GMeUuC8owfw2Mt8jpdCJFLicjLbamLvk8rk +4IMD4VHRfmbjQ+LSDKisB+5UJoQmapE63+VQLXldAY8kp6Jh5/Ic6GspcZbiqaO5ax/ 5jGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wT0froce; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 188si21267895pfv.146.2019.07.26.11.26.16; Fri, 26 Jul 2019 11:26:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wT0froce; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388822AbfGZP3a (ORCPT + 99 others); Fri, 26 Jul 2019 11:29:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:44126 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388802AbfGZP32 (ORCPT ); Fri, 26 Jul 2019 11:29:28 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 78F0822CBD; Fri, 26 Jul 2019 15:29:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564154967; bh=KP4kL19oUn5lUt6gO3Ev0/T+mTO32QzgBIh7IS7sOK0=; h=From:To:Cc:Subject:Date:From; b=wT0frocer5nKFQ/yX+IOyCRPcgmRsxI9HApr9bfBCoUIxZANFvOab2VaFrPRSpf/E YPIqJvl46Sl1dnmltnN+UHdN/FDPZMGi2JlY3/Q/GMVhR3QNpL25707Rxt56c2+E/7 ASNssSqVcnHkocFat3uEgL8AFmQRvSQ9f7d2aZZM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 5.1 00/62] 5.1.21-stable review Date: Fri, 26 Jul 2019 17:24:12 +0200 Message-Id: <20190726152301.720139286@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-5.1.21-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.1.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.1.21-rc1 X-KernelTest-Deadline: 2019-07-28T15:23+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Note, this will be the LAST 5.1.y kernel release. Everyone should move to the 5.2.y series at this point in time. This is the start of the stable review cycle for the 5.1.21 release. There are 62 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun 28 Jul 2019 03:21:13 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.21-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.1.21-rc1 Kuo-Hsin Yang mm: vmscan: scan anonymous pages on file refaults Damien Le Moal block: Limit zone array allocation size Damien Le Moal sd_zbc: Fix report zones buffer allocation Paolo Bonzini Revert "kvm: x86: Use task structs fpu field for user" Jan Kiszka KVM: nVMX: Clear pending KVM_REQ_GET_VMCS12_PAGES when leaving nested Paolo Bonzini KVM: nVMX: do not use dangling shadow VMCS after guest reset Theodore Ts'o ext4: allow directory holes Ross Zwisler ext4: use jbd2_inode dirty range scoping Ross Zwisler jbd2: introduce jbd2_inode dirty range scoping Ross Zwisler mm: add filemap_fdatawait_range_keep_errors() Theodore Ts'o ext4: enforce the immutable flag on open files Darrick J. Wong ext4: don't allow any modifications to an immutable file Peter Zijlstra perf/core: Fix race between close() and fork() Alexander Shishkin perf/core: Fix exclusive events' grouping Song Liu perf script: Assume native_arch for pipe mode Paul Cercueil MIPS: lb60: Fix pin mappings Keerthy gpio: davinci: silence error prints in case of EPROBE_DEFER Nishka Dasgupta gpiolib: of: fix a memory leak in of_gpio_flags_quirks() Chris Wilson dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc Jérôme Glisse dma-buf: balance refcount inbalance Aya Levin net/mlx5e: Fix error flow in tx reporter diagnose Aya Levin net/mlx5e: Fix return value from timeout recover function Saeed Mahameed net/mlx5e: Rx, Fix checksum calculation for new hardware Eli Britstein net/mlx5e: Fix port tunnel GRE entropy control Jakub Kicinski net/tls: reject offload of TLS 1.3 Jakub Kicinski net/tls: fix poll ignoring partially copied records Frank de Brabander selftests: txring_overwrite: fix incorrect test of mmap() return value Cong Wang netrom: hold sock when setting skb->destructor Cong Wang netrom: fix a memory leak in nr_rx_frame() Andreas Steinmetz macsec: fix checksumming after decryption Andreas Steinmetz macsec: fix use-after-free of skb during RX Nikolay Aleksandrov net: bridge: stp: don't cache eth dest pointer before skb pull Nikolay Aleksandrov net: bridge: don't cache ether dest pointer on input Nikolay Aleksandrov net: bridge: mcast: fix stale ipv6 hdr pointer when handling v6 query Nikolay Aleksandrov net: bridge: mcast: fix stale nsrcs pointer in igmp3/mld2 report handling Aya Levin net/mlx5e: IPoIB, Add error path in mlx5_rdma_setup_rn Peter Kosyh vrf: make sure skb->data contains ip header to make routing Christoph Paasch tcp: Reset bytes_acked and bytes_received when disconnecting Eric Dumazet tcp: fix tcp_set_congestion_control() use from bpf hook Eric Dumazet tcp: be more careful in tcp_fragment() Takashi Iwai sky2: Disable MSI on ASUS P6T Xin Long sctp: not bind the socket in sctp_connect Marcelo Ricardo Leitner sctp: fix error handling on stream scheduler initialization David Howells rxrpc: Fix send on a connected, but unbound socket Heiner Kallweit r8169: fix issue with confused RX unit after PHY power-down on RTL8411b Yang Wei nfc: fix potential illegal memory access Jakub Kicinski net/tls: make sure offload also gets the keys wiped Jose Abreu net: stmmac: Re-work the queue selection for TSO packets Cong Wang net_sched: unset TCQ_F_CAN_BYPASS when adding filters Andrew Lunn net: phy: sfp: hwmon: Fix scaling of RX power John Hurley net: openvswitch: fix csum updates for MPLS actions Lorenzo Bianconi net: neigh: fix multiple neigh timer scheduling Florian Westphal net: make skb_dst_force return true when dst is refcounted Baruch Siach net: dsa: mv88e6xxx: wait after reset deactivation Justin Chen net: bcmgenet: use promisc for unsupported filters Ido Schimmel ipv6: Unlink sibling route in case of failure David Ahern ipv6: rt6_check should return NULL if 'from' is NULL Matteo Croce ipv4: don't set IPv6 only flags to IPv4 addresses Eric Dumazet igmp: fix memory leak in igmpv3_del_delrec() Haiyang Zhang hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() Taehee Yoo caif-hsi: fix possible deadlock in cfhsi_exit_module() Brian King bnx2x: Prevent load reordering in tx completion processing ------------- Diffstat: Makefile | 4 +- arch/mips/jz4740/board-qi_lb60.c | 16 +-- arch/x86/include/asm/kvm_host.h | 7 +- arch/x86/kvm/vmx/nested.c | 10 +- arch/x86/kvm/x86.c | 4 +- block/blk-zoned.c | 46 ++++--- drivers/dma-buf/dma-buf.c | 1 + drivers/dma-buf/reservation.c | 4 + drivers/gpio/gpio-davinci.c | 5 +- drivers/gpio/gpiolib-of.c | 1 + drivers/net/caif/caif_hsi.c | 2 +- drivers/net/dsa/mv88e6xxx/chip.c | 2 + drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c | 3 + drivers/net/ethernet/broadcom/genet/bcmgenet.c | 57 ++++----- drivers/net/ethernet/marvell/sky2.c | 7 ++ drivers/net/ethernet/mellanox/mlx5/core/en.h | 1 + .../ethernet/mellanox/mlx5/core/en/reporter_tx.c | 10 +- drivers/net/ethernet/mellanox/mlx5/core/en_main.c | 3 + drivers/net/ethernet/mellanox/mlx5/core/en_rx.c | 7 +- .../net/ethernet/mellanox/mlx5/core/ipoib/ipoib.c | 9 +- .../net/ethernet/mellanox/mlx5/core/lib/port_tun.c | 23 +--- drivers/net/ethernet/realtek/r8169.c | 137 +++++++++++++++++++++ drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 29 +++-- drivers/net/hyperv/netvsc_drv.c | 1 - drivers/net/macsec.c | 6 +- drivers/net/phy/sfp.c | 2 +- drivers/net/vrf.c | 58 +++++---- drivers/scsi/sd_zbc.c | 104 +++++++++++----- fs/ext4/dir.c | 19 ++- fs/ext4/ext4_jbd2.h | 12 +- fs/ext4/file.c | 4 + fs/ext4/inode.c | 24 +++- fs/ext4/ioctl.c | 46 ++++++- fs/ext4/move_extent.c | 3 +- fs/ext4/namei.c | 45 +++++-- fs/jbd2/commit.c | 23 +++- fs/jbd2/journal.c | 4 + fs/jbd2/transaction.c | 49 ++++---- include/linux/blkdev.h | 5 + include/linux/fs.h | 2 + include/linux/jbd2.h | 22 ++++ include/linux/mlx5/mlx5_ifc.h | 3 +- include/linux/perf_event.h | 5 + include/net/dst.h | 5 +- include/net/tcp.h | 8 +- include/net/tls.h | 1 + kernel/events/core.c | 83 ++++++++++--- mm/filemap.c | 22 ++++ mm/vmscan.c | 6 +- net/bridge/br_input.c | 8 +- net/bridge/br_multicast.c | 23 ++-- net/bridge/br_stp_bpdu.c | 3 +- net/core/filter.c | 2 +- net/core/neighbour.c | 2 + net/ipv4/devinet.c | 8 ++ net/ipv4/igmp.c | 8 +- net/ipv4/tcp.c | 6 +- net/ipv4/tcp_cong.c | 6 +- net/ipv4/tcp_output.c | 13 +- net/ipv6/ip6_fib.c | 18 ++- net/ipv6/route.c | 2 +- net/netfilter/nf_queue.c | 6 +- net/netrom/af_netrom.c | 4 +- net/nfc/nci/data.c | 2 +- net/openvswitch/actions.c | 6 +- net/rxrpc/af_rxrpc.c | 4 +- net/sched/cls_api.c | 1 + net/sched/sch_fq_codel.c | 2 - net/sched/sch_sfq.c | 2 - net/sctp/socket.c | 24 +--- net/sctp/stream.c | 9 +- net/tls/tls_device.c | 10 +- net/tls/tls_main.c | 4 +- net/tls/tls_sw.c | 3 +- tools/perf/builtin-script.c | 3 +- tools/testing/selftests/net/txring_overwrite.c | 2 +- 76 files changed, 816 insertions(+), 315 deletions(-)