Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp440860ybl; Wed, 4 Dec 2019 05:24:29 -0800 (PST) X-Google-Smtp-Source: APXvYqwsTZZ2EHldKYMaCzpoanCjcZJcC3fn+15OE1Shg0ISc0kg7EBnuMRl2mNv4dJqY3/ITxar X-Received: by 2002:a05:6808:681:: with SMTP id k1mr2524874oig.117.1575465869242; Wed, 04 Dec 2019 05:24:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575465869; cv=none; d=google.com; s=arc-20160816; b=iYoeoE1vC/UtBjBU+cVtxfOY33dawYHW+3gUJg0SoWT5N2m1Om58w6sSybuGxm+ot9 y5KRievCwb4GqvpQhfaUSalMHU3v0yBPblIzJpx6YHnTpbQ8EyUwtwqaOOjr+HxS6X9L jeP63mDFV7uTOJS8aCxTiroyS+/CRlNKJ886zzAR7O8HseEfHUMb52GqPIt6QY7Qhr/+ GTZqjNFXgjavterhkqkx3632sXMSJAU3Tikm83KxN93MOhNhDjI04Oqohudd8fr2FSSq 3tUdH3I5tJIVi/IN2yeEpCxqQta5G+mf13b/wN1HEFY7EoFyfjfVZDvpNVpKsY87bnxw 0kpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=bzUORddslteW5eXVIHJy4dfoW0y32isnmr7LqDGicxw=; b=dvwRvWpJ/nLhyCcr+rR7nvBiy93Ms7hItB8RWrTejhBxmFakCr4CtDvaAYRLk+szJe KVzawM7cYxAIrgQvzksehVhpfmDBR5dSujNKEnm+LpqEJ1tHMGrgUavvziPY6NDOlq6U NzJ8Cxi3ingRlLaitWjaAHF/tulv889k/3lR22i/hpkNw5L/YIToQRPFMkZeKJ8bvWGT QfuqbuAqsrj31MxpTHwQhsO81y74iB32dqjyz7VLmQoEczICYHpz863UPj/JhjpDwxaD 5nRQyhEHXHmI0sY6pCiF4WcDRxKKP8yeU/LlsmnWysD5cL7B79SUDqI4ksSDOsxYrUvi SdTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oZWXjct2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k130si3245272oih.135.2019.12.04.05.24.16; Wed, 04 Dec 2019 05:24:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oZWXjct2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727831AbfLDNX1 (ORCPT + 99 others); Wed, 4 Dec 2019 08:23:27 -0500 Received: from mail-pf1-f195.google.com ([209.85.210.195]:41836 "EHLO mail-pf1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727503AbfLDNX0 (ORCPT ); Wed, 4 Dec 2019 08:23:26 -0500 Received: by mail-pf1-f195.google.com with SMTP id s18so3646276pfd.8; Wed, 04 Dec 2019 05:23:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=bzUORddslteW5eXVIHJy4dfoW0y32isnmr7LqDGicxw=; b=oZWXjct2+pDngJOf1ZO69GNIEaqfJnySgrANO49oJSySb5qU5NC+FhIrb/ALMr1SjW hbhrD3uFhVcPYq4DvojLlxMAoUM2u1J8VJvVfcBIrkSyVCS8AjUDebQb/KnxVWR2i/Q2 Zit37FqF0dlN3xHTlBBMmj1q4mF8zIGyTTM66gFQFpbE/ug2B59RLtvjH5Mcic6ljq5Y TtqQj6KA5+9fy64Rx74VeQrTsyusJil1R9bQQICl8tj3K1BNmxIsqPRJEhABOu+RyDuD ksckKXgFgadp+68ZLnkAnQVoNF1rbfrU964lKODADfxphfNHWrXk/60hanrqAj6GGJa0 AJRw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=bzUORddslteW5eXVIHJy4dfoW0y32isnmr7LqDGicxw=; b=WRf3sUb38NmImAi8ciyc+ufyQSP7U0P7IVl7UmcHQso1lH9nHN+wZdI40uEeWoO7A6 sO3uobz94KwpRxuKs8xX9PV4qzfZQQ+KBrIQJEoGLsk+6l1eCTo0f20TnNWLrkDjAQhI bVlT1+rJWOu9cszuJFBdZN+vjMiHAwfcKONRqt9zUarp8DJ10hq54co7lQuTvcAaTPGa 9UasfW+Gkm7PHlYXaRkfqJbDoFFy2soc/vVKhrQnCg3H8mqFqJoChaMWpbAvPh0Dt1/q 4pOU8ObMQEM5YmTLf+PZ5C339L/pk2d83JBH0lC6KFmYKuSeg4Hn0aGBoAGWw86QYMqK vQOQ== X-Gm-Message-State: APjAAAVQfMGualQj1TgtGZmzvRJu5xq/f4NNUbOk709sdYNNAh4xNnq/ CMvJG9CuD4GlBLxkpW3+YoA= X-Received: by 2002:a63:d617:: with SMTP id q23mr3553478pgg.146.1575465805677; Wed, 04 Dec 2019 05:23:25 -0800 (PST) Received: from workstation-kernel-dev ([139.5.253.107]) by smtp.gmail.com with ESMTPSA id x4sm8366997pfx.68.2019.12.04.05.23.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 04 Dec 2019 05:23:25 -0800 (PST) Date: Wed, 4 Dec 2019 18:53:18 +0530 From: Amol Grover To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 5.4 00/46] 5.4.2-stable review Message-ID: <20191204132318.GA14649@workstation-kernel-dev> References: <20191203212705.175425505@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191203212705.175425505@linuxfoundation.org> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 03, 2019 at 11:35:20PM +0100, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 5.4.2 release. > There are 46 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu, 05 Dec 2019 21:20:36 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.2-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y > and the diffstat can be found below. > > thanks, > > greg k-h > > ------------- > Pseudo-Shortlog of commits: > > Greg Kroah-Hartman > Linux 5.4.2-rc1 > > Hans de Goede > platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size > > Hans de Goede > platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer > > Candle Sun > HID: core: check whether Usage Page item is after Usage ID items > > Herbert Xu > crypto: talitos - Fix build error by selecting LIB_DES > > Joel Stanley > Revert "jffs2: Fix possible null-pointer dereferences in jffs2_add_frag_to_fragtree()" > > Theodore Ts'o > ext4: add more paranoia checking in ext4_expand_extra_isize handling > > Heiner Kallweit > r8169: fix resume on cable plug-in > > Heiner Kallweit > r8169: fix jumbo configuration for RTL8168evl > > Thadeu Lima de Souza Cascardo > selftests: pmtu: use -oneline for ip route list cache > > John Rutherford > tipc: fix link name length check > > Jakub Kicinski > selftests: bpf: correct perror strings > > Jakub Kicinski > selftests: bpf: test_sockmap: handle file creation failures gracefully > > Jakub Kicinski > net/tls: use sg_next() to walk sg entries > > Jakub Kicinski > net/tls: remove the dead inplace_crypto code > > Jakub Kicinski > selftests/tls: add a test for fragmented messages > Hi, I'm not sure if this is relevant but I tested out the latest revision of tools/testing/selftests/net/tls (run as sudo) with 5.3.9, 5.3.13, and 5.4.1, and all of them resulted in Oops. I'm not sure that it happens only on my PC but the old version worked fine on all 3 kernels. More information available in this thread: https://lore.kernel.org/stable/20191203171817.GA24581@workstation-portable/ Thanks Amol > Jakub Kicinski > net: skmsg: fix TLS 1.3 crash with full sk_msg > > Jakub Kicinski > net/tls: free the record on encryption error > > Jakub Kicinski > net/tls: take into account that bpf_exec_tx_verdict() may free the record > > Paolo Abeni > openvswitch: remove another BUG_ON() > > Paolo Abeni > openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() > > Xin Long > sctp: cache netns in sctp_ep_common > > Jouni Hogander > slip: Fix use-after-free Read in slip_open > > Navid Emamdoost > sctp: Fix memory leak in sctp_sf_do_5_2_4_dupcook > > Paolo Abeni > openvswitch: fix flow command message size > > Dust Li > net: sched: fix `tc -s class show` no bstats on class with nolock subqueues > > Nikolay Aleksandrov > net: psample: fix skb_over_panic > > Chuhong Yuan > net: macb: add missed tasklet_kill > > Oleksij Rempel > net: dsa: sja1105: fix sja1105_parse_rgmii_delays() > > David Bauer > mdio_bus: don't use managed reset-controller > > Menglong Dong > macvlan: schedule bc_work even if error > > Jeroen de Borst > gve: Fix the queue page list allocated pages count > > Sebastian Andrzej Siewior > x86/fpu: Don't cache access to fpu_fpregs_owner_ctx > > Mika Westerberg > thunderbolt: Power cycle the router if NVM authentication fails > > Alexander Usyskin > mei: me: add comet point V device id > > Alexander Usyskin > mei: bus: prefix device names on bus with the bus name > > Fabio D'Urso > USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P > > Hans de Goede > staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids > > Hans de Goede > staging: rtl8723bs: Drop ACPI device ids > > Pan Bian > staging: rtl8192e: fix potential use after free > > Ajay Singh > staging: wilc1000: fix illegal memory access in wilc_parse_join_bss_param() > > Mathias Kresin > usb: dwc2: use a longer core rest timeout in dwc2_core_reset() > > Sami Tolvanen > driver core: platform: use the correct callback type for bus_find_device > > Pascal van Leeuwen > crypto: inside-secure - Fix stability issue with Macchiatobin > > Jens Axboe > net: disallow ancillary data for __sys_{send,recv}msg_file() > > Jens Axboe > net: separate out the msghdr copy from ___sys_{send,recv}msg() > > Jens Axboe > io_uring: async workers should inherit the user creds > > > ------------- > > Diffstat: > > Makefile | 4 +- > arch/x86/include/asm/fpu/internal.h | 2 +- > drivers/base/platform.c | 7 +- > drivers/crypto/Kconfig | 1 + > drivers/crypto/inside-secure/safexcel.c | 4 +- > drivers/hid/hid-core.c | 51 +++++++- > drivers/misc/mei/bus.c | 9 +- > drivers/misc/mei/hw-me-regs.h | 1 + > drivers/misc/mei/pci-me.c | 1 + > drivers/net/dsa/sja1105/sja1105_main.c | 10 +- > drivers/net/ethernet/cadence/macb_main.c | 1 + > drivers/net/ethernet/google/gve/gve_main.c | 3 +- > drivers/net/ethernet/realtek/r8169_main.c | 3 +- > drivers/net/macvlan.c | 3 +- > drivers/net/phy/mdio_bus.c | 6 +- > drivers/net/slip/slip.c | 1 + > drivers/platform/x86/hp-wmi.c | 10 +- > drivers/staging/rtl8192e/rtl8192e/rtl_core.c | 5 +- > drivers/staging/rtl8723bs/os_dep/sdio_intf.c | 7 +- > drivers/staging/wilc1000/wilc_hif.c | 25 ++-- > drivers/thunderbolt/switch.c | 54 ++++++-- > drivers/usb/dwc2/core.c | 2 +- > drivers/usb/serial/ftdi_sio.c | 3 + > drivers/usb/serial/ftdi_sio_ids.h | 7 + > fs/ext4/inode.c | 15 +++ > fs/ext4/super.c | 21 +-- > fs/io_uring.c | 23 +++- > fs/jffs2/nodelist.c | 2 +- > include/linux/skmsg.h | 26 ++-- > include/net/sctp/structs.h | 3 + > include/net/tls.h | 3 +- > net/core/filter.c | 8 +- > net/core/skmsg.c | 2 +- > net/ipv4/tcp_bpf.c | 2 +- > net/openvswitch/datapath.c | 17 ++- > net/psample/psample.c | 2 +- > net/sched/sch_mq.c | 3 +- > net/sched/sch_mqprio.c | 4 +- > net/sched/sch_multiq.c | 2 +- > net/sched/sch_prio.c | 2 +- > net/sctp/associola.c | 1 + > net/sctp/endpointola.c | 1 + > net/sctp/input.c | 4 +- > net/sctp/sm_statefuns.c | 4 +- > net/socket.c | 184 +++++++++++++++++++-------- > net/tipc/netlink_compat.c | 4 +- > net/tls/tls_main.c | 13 +- > net/tls/tls_sw.c | 32 +++-- > tools/testing/selftests/bpf/test_sockmap.c | 47 ++++--- > tools/testing/selftests/bpf/xdping.c | 2 +- > tools/testing/selftests/net/pmtu.sh | 5 +- > tools/testing/selftests/net/tls.c | 60 +++++++++ > 52 files changed, 505 insertions(+), 207 deletions(-) > >