Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp4048211ybe; Mon, 9 Sep 2019 03:24:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqx2UAHhtUTQG1zPJyAx26zt7d9qnQhR85IwYCZM1xsQEFyOg2MoZMKasfSVfO07yEO3GBA8 X-Received: by 2002:a17:906:185b:: with SMTP id w27mr18749528eje.203.1568024647245; Mon, 09 Sep 2019 03:24:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568024647; cv=none; d=google.com; s=arc-20160816; b=BkEvGKvjT3VtgCk+b8PJ3wJsD6C38hbdMsQcCmhIFWt6bybtCtTawEuwKijBYwOlsv u+3bDu0kBQ+rFZkljsEj2j//TWtzHb1i4blCGBgAWTqc0JMaJd71b+22/3zd+lkjHzYs 2eYCZXRHPr5oh0YXW8Olvd2T1qopM9G+Uqbsos+ygN6QSkTok8JaWxLP/1x4mS5Gh1YO S9jpE+f8ZNmhGExRqeWgEUjgaoymAKS/CkK65zyU2ueDXBzvdkuK1oHbZh4rk5Ngxi+B pl0rwWHN+WRyKMP0VDsYpNQ8qp+yDBhBZXtNm1nYrKp3ATfEaQNunhxun5RxSutAu4TW XDLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=m8tAT63s/NiDrqOjc3sJkkWINdRiHKJ8TyaQdWzMbdE=; b=0et0105Q6yp4AMFGZPNMtq3IcPJLW0+qxdr/mQPoZbO9A6pi4E8pJ9OJWmR6HUCe9z widXFg/5cXUk/CNKf6t9LV8N9Vfqtqer4hmY72P0DEBBLWggjSI+cOtisyw4xLrXWXPe ZYpiMhbKRuMDK8q/cy7kwZHlWQm5KQqlABUHNSt4AOgynnWHf3xue5S0lFsFzrQurlPA YgXOhfE562e+CCBkCmY8Qb8JojpjEDp88o4ow1bTlr8nElXuYhwrYGMBvU8oyBiPvl+D fDfNGpqiznNmQpaL6PpifXrEJ15SUKfB/JFuS16pYsW2pZmjbjJ6vwixrgv3sWXb6S+s uyuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mtUnfR8H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h13si8173129eda.63.2019.09.09.03.23.43; Mon, 09 Sep 2019 03:24:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mtUnfR8H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730971AbfIHMsU (ORCPT + 99 others); Sun, 8 Sep 2019 08:48:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:37170 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730919AbfIHMsM (ORCPT ); Sun, 8 Sep 2019 08:48:12 -0400 Received: from localhost (unknown [62.28.240.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3DB6D21920; Sun, 8 Sep 2019 12:48:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1567946891; bh=9E1kOCPBT1YAbEtLXU07iRBcfdGRUwZdEkgWYmYjFfY=; h=From:To:Cc:Subject:Date:From; b=mtUnfR8H00EGMHQwcxc8CBy29UsJGebpM8B2evE4rRXNpjtWxu0m/Zd2nf3kTcPvV yNAex7I7a3WJl3msjiIIgnOxCKHqaElILtGGu5pnG6wkZYsOZYfxdsDFI7/xrsqwNt ZVxaafbSAAiPPSmuwdB5835ulVQhNoAQNGYZVjBI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.19 00/57] 4.19.72-stable review Date: Sun, 8 Sep 2019 13:41:24 +0100 Message-Id: <20190908121125.608195329@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.72-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.19.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.19.72-rc1 X-KernelTest-Deadline: 2019-09-10T12:11+00:00 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.19.72 release. There are 57 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Tue 10 Sep 2019 12:09:36 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.72-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.19.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.19.72-rc1 Linus Torvalds Revert "x86/apic: Include the LDR when clearing out APIC registers" Luis Henriques libceph: allow ceph_buffer_put() to receive a NULL ceph_buffer Kirill A. Shutemov x86/boot/compressed/64: Fix missing initialization in find_trampoline_placement() Andre Przywara KVM: arm/arm64: VGIC: Properly initialise private IRQ affinity David Howells afs: Fix leak in afs_lookup_cell_rcu() Andrew Jones KVM: arm/arm64: Only skip MMIO insn once Luis Henriques ceph: fix buffer free while holding i_ceph_lock in fill_inode() Luis Henriques ceph: fix buffer free while holding i_ceph_lock in __ceph_build_xattrs_blob() Luis Henriques ceph: fix buffer free while holding i_ceph_lock in __ceph_setxattr() Vitaly Kuznetsov selftests/kvm: make platform_info_test pass on AMD Paolo Bonzini selftests: kvm: fix state save/load on processors without XSAVE Wenwen Wang infiniband: hfi1: fix memory leaks Wenwen Wang infiniband: hfi1: fix a memory leak bug Wenwen Wang IB/mlx4: Fix memory leaks Anton Eidelman nvme-multipath: fix possible I/O hang when paths are updated Vitaly Kuznetsov Tools: hv: kvp: eliminate 'may be used uninitialized' warning Dexuan Cui Input: hyperv-keyboard: Use in-place iterator API in the channel callback Kirill A. Shutemov x86/boot/compressed/64: Fix boot on machines with broken E820 table Benjamin Tissoires HID: cp2112: prevent sleeping function called from invalid context Andrea Righi kprobes: Fix potential deadlock in kprobe_optimizer() Tho Vu ravb: Fix use-after-free ravb_tstamp_skb Wenwen Wang wimax/i2400m: fix a memory leak bug Stephen Hemminger net: cavium: fix driver name Thomas Falcon ibmvnic: Unmap DMA address of TX descriptor buffers after use Wenwen Wang net: kalmia: fix memory leaks Wenwen Wang cx82310_eth: fix a memory leak bug Darrick J. Wong vfs: fix page locking deadlocks when deduping files Wenwen Wang lan78xx: Fix memory leaks Wenwen Wang net: myri10ge: fix memory leaks Wenwen Wang liquidio: add cleanup in octeon_setup_iq() Wenwen Wang cxgb4: fix a memory leak bug Dmitry Fomichev scsi: target: tcmu: avoid use-after-free after command timeout Bill Kuzeja scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure Alexandre Courbot drm/mediatek: set DMA max segment size Alexandre Courbot drm/mediatek: use correct device to import PRIME buffers Pablo Neira Ayuso netfilter: nft_flow_offload: skip tcp rst and fin packets YueHaibing gpio: Fix build error of function redefinition Thomas Falcon ibmveth: Convert multicast list size for little-endian system Fabian Henneke Bluetooth: hidp: Let hidp_send_message return number of queued bytes Matthias Kaehlcke Bluetooth: btqca: Add a short delay before downloading the NVM Nathan Chancellor net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx Dexuan Cui hv_netvsc: Fix a warning of suspicious RCU usage Jakub Kicinski tools: bpftool: fix error message (prog -> object) Pablo Neira Ayuso netfilter: nf_tables: use-after-free in failing rule with bound set Fuqian Huang net: tundra: tsi108: use spin_lock_irqsave instead of spin_lock_irq in IRQ context Martin Sperl spi: bcm2835aux: fix corruptions for longer spi transfers Martin Sperl spi: bcm2835aux: remove dangerous uncontrolled read of fifo Martin Sperl spi: bcm2835aux: unifying code between polling and interrupt driven code John S. Gruber x86/boot: Preserve boot_params.secure_boot from sanitizing Ka-Cheong Poon net/rds: Fix info leak in rds6_inc_info_copy() Eric Dumazet tcp: remove empty skb from write queue in error cases Willem de Bruijn tcp: inherit timestamp on mtu probe Chen-Yu Tsai net: stmmac: dwmac-rk: Don't fail if phy regulator is absent Cong Wang net_sched: fix a NULL pointer deref in ipt action Vlad Buslov net: sched: act_sample: fix psample group handling on overwrite Feng Sun net: fix skb use after free in netpoll Eric Dumazet mld: fix memory leak in mld_del_delrec() ------------- Diffstat: Makefile | 4 +- arch/x86/boot/compressed/pgtable_64.c | 13 +++-- arch/x86/include/asm/bootparam_utils.h | 1 + arch/x86/kernel/apic/apic.c | 4 -- drivers/bluetooth/btqca.c | 3 ++ drivers/gpu/drm/mediatek/mtk_drm_drv.c | 49 +++++++++++++++-- drivers/gpu/drm/mediatek/mtk_drm_drv.h | 2 + drivers/hid/hid-cp2112.c | 8 ++- drivers/infiniband/hw/hfi1/fault.c | 12 +++-- drivers/infiniband/hw/mlx4/mad.c | 4 +- drivers/input/serio/hyperv-keyboard.c | 35 +++--------- drivers/net/ethernet/cavium/common/cavium_ptp.c | 2 +- .../net/ethernet/cavium/liquidio/request_manager.c | 4 +- drivers/net/ethernet/chelsio/cxgb4/cxgb4_debugfs.c | 4 +- drivers/net/ethernet/ibm/ibmveth.c | 9 ++-- drivers/net/ethernet/ibm/ibmvnic.c | 11 +--- drivers/net/ethernet/myricom/myri10ge/myri10ge.c | 2 +- drivers/net/ethernet/renesas/ravb_main.c | 8 ++- drivers/net/ethernet/stmicro/stmmac/dwmac-rk.c | 6 +-- drivers/net/ethernet/toshiba/tc35815.c | 2 +- drivers/net/ethernet/tundra/tsi108_eth.c | 5 +- drivers/net/hyperv/netvsc_drv.c | 9 +++- drivers/net/usb/cx82310_eth.c | 3 +- drivers/net/usb/kalmia.c | 6 +-- drivers/net/usb/lan78xx.c | 8 +-- drivers/net/wimax/i2400m/fw.c | 4 +- drivers/nvme/host/multipath.c | 1 + drivers/scsi/qla2xxx/qla_attr.c | 2 + drivers/scsi/qla2xxx/qla_os.c | 11 +++- drivers/spi/spi-bcm2835aux.c | 62 +++++++--------------- drivers/target/target_core_user.c | 9 +++- fs/afs/cell.c | 4 ++ fs/ceph/caps.c | 5 +- fs/ceph/inode.c | 7 +-- fs/ceph/snap.c | 4 +- fs/ceph/super.h | 2 +- fs/ceph/xattr.c | 19 +++++-- fs/read_write.c | 49 ++++++++++++++--- include/linux/ceph/buffer.h | 3 +- include/linux/gpio.h | 24 --------- include/net/act_api.h | 4 +- include/net/netfilter/nf_tables.h | 9 +++- include/net/psample.h | 1 + kernel/kprobes.c | 8 +-- net/bluetooth/hidp/core.c | 9 +++- net/core/netpoll.c | 6 +-- net/ipv4/tcp.c | 29 ++++++---- net/ipv4/tcp_output.c | 3 +- net/ipv6/mcast.c | 5 +- net/netfilter/nf_tables_api.c | 15 ++++-- net/netfilter/nft_flow_offload.c | 9 ++-- net/psample/psample.c | 2 +- net/rds/recv.c | 5 +- net/sched/act_bpf.c | 2 +- net/sched/act_connmark.c | 2 +- net/sched/act_csum.c | 2 +- net/sched/act_gact.c | 2 +- net/sched/act_ife.c | 2 +- net/sched/act_ipt.c | 11 ++-- net/sched/act_mirred.c | 2 +- net/sched/act_nat.c | 2 +- net/sched/act_pedit.c | 2 +- net/sched/act_police.c | 2 +- net/sched/act_sample.c | 7 ++- net/sched/act_simple.c | 2 +- net/sched/act_skbedit.c | 2 +- net/sched/act_skbmod.c | 2 +- net/sched/act_tunnel_key.c | 2 +- net/sched/act_vlan.c | 2 +- tools/bpf/bpftool/common.c | 2 +- tools/hv/hv_kvp_daemon.c | 2 +- tools/testing/selftests/kvm/lib/x86.c | 16 +++--- tools/testing/selftests/kvm/platform_info_test.c | 2 +- virt/kvm/arm/mmio.c | 7 +++ virt/kvm/arm/vgic/vgic-init.c | 30 +++++++---- 75 files changed, 382 insertions(+), 248 deletions(-)