Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1346269pxf; Fri, 19 Mar 2021 05:21:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw2xXYSUH54JChybMuhKb+0P6UBQSNo3UsutfQnEbYt3smwDBRHwPmwaAhCk2Px7K9gbnGS X-Received: by 2002:a50:fe08:: with SMTP id f8mr9049008edt.217.1616156491687; Fri, 19 Mar 2021 05:21:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616156491; cv=none; d=google.com; s=arc-20160816; b=M0PpCHorNCrsYy17QflvM6tds9MIEufLjtI0wQkNHxr/ag8XgU/78Bfg4fRtlEv6w3 0iRC9RWwOcPwfNd08YFhBPEFhY7mD05l70yK0tKJsFgEob69p7JBLLdyFOssMVKcPJpH sup/Cjn4CYu+J152eGuEsi5KyxPz45J6FtqNK8TskXhPGjfWysJ8+Oelvg6dS+2+pzDY sKEnTVpR/IV0ctnSSgB1f+/nPDF9fHDSJnBnBX9dh4E+t2Kv6SpBcI1sMLm9BNpnumYk DmwiyAXb/agkI167z1mzHWUXSsaRkFGdDDn/k7LVqKc7HewDNk9N+X08AsdAR2u6CXHO O3LA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=+vuqj3l09SnikONSg44sHhNSbX+l85yBKhfVgDyTOW8=; b=F49jzOGJox4MnXJPzKJh7BUSCx+TyA/uhPmRm4grpx4mpuXK7/FJdXWk69sDQuiBRo HZr5itH0vFl5qSLr5sovefSMX8ECXSCOdugS5YraoeOIuVojDElkxgtYXhXfkDAAp33Z Nf9hD2oq5gLHgeNxLbUmAPh/OuCi0CaLm/Z54XgP/Do9IL5RQHwBYcpp/hA4dd8kMW9L lL7NxH1avFoyOr2D9UYDqZQw/wVc+HniuTtEald7anwfpnR14reo8FRe7ourQcVFWX9v gidUfwB1ON/Yfw5MVQruGi+bsetZCaqGHcAqRkodLXwxEfu0koOpAbN9ehYToGsV9srV 7zoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zTdg3de6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h14si4168729ejk.245.2021.03.19.05.21.06; Fri, 19 Mar 2021 05:21:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zTdg3de6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230150AbhCSMTP (ORCPT + 99 others); Fri, 19 Mar 2021 08:19:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:56754 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229933AbhCSMTB (ORCPT ); Fri, 19 Mar 2021 08:19:01 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id D623664F65; Fri, 19 Mar 2021 12:19:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1616156341; bh=eqlRLtR8Cu3pIlMmS2OHmOP/L+Bt94bG7J8FhpfX61M=; h=From:To:Cc:Subject:Date:From; b=zTdg3de6tiBxmnzFDRAHrQ16/czjBw0t7Zeo4w+7jOqir4BFTRJbLyWvAVd5XmTri V1Cb/NqkzregIGatLzabCKxdoFITMihHHpdIdUxTaLfzgXtsMVVrYUpeWuoo/DQFwd ORLEQtn9mLTuuuhz5/ulPtBHyMxm6phW0bDz7MMU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, stable@vger.kernel.org Subject: [PATCH 5.4 00/18] 5.4.107-rc1 review Date: Fri, 19 Mar 2021 13:18:38 +0100 Message-Id: <20210319121745.449875976@linuxfoundation.org> X-Mailer: git-send-email 2.31.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.107-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.4.107-rc1 X-KernelTest-Deadline: 2021-03-21T12:17+00:00 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 5.4.107 release. There are 18 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun, 21 Mar 2021 12:17:37 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.107-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.4.107-rc1 Florian Fainelli net: dsa: b53: Support setting learning on port DENG Qingfang net: dsa: tag_mtk: fix 802.1ad VLAN egress Ard Biesheuvel crypto: x86/aes-ni-xts - use direct calls to and 4-way stride Uros Bizjak crypto: aesni - Use TEST %reg,%reg instead of CMP $0,%reg Kees Cook crypto: x86 - Regularize glue function prototypes Amir Goldstein fuse: fix live lock in fuse_iget() Colin Xu drm/i915/gvt: Fix vfio_edid issue for BXT/APL Colin Xu drm/i915/gvt: Fix port number for BDW on EDID region setup Colin Xu drm/i915/gvt: Fix virtual display setup for BXT/APL Colin Xu drm/i915/gvt: Fix mmio handler break on BXT/APL. Colin Xu drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang Qu Wenruo btrfs: scrub: Don't check free space before marking a block group RO Piotr Krysiuk bpf, selftests: Fix up some test_verifier cases for unprivileged Piotr Krysiuk bpf: Add sanity check for upper ptr_limit Piotr Krysiuk bpf: Simplify alu_limit masking for pointer arithmetic Piotr Krysiuk bpf: Fix off-by-one for area size in creating mask to left Piotr Krysiuk bpf: Prohibit alu ops for pointer types not defining ptr_limit Suzuki K Poulose KVM: arm64: nvhe: Save the SPE context early ------------- Diffstat: Makefile | 4 +- arch/arm64/include/asm/kvm_hyp.h | 3 + arch/arm64/kvm/hyp/debug-sr.c | 24 ++- arch/arm64/kvm/hyp/switch.c | 13 +- arch/x86/crypto/aesni-intel_asm.S | 137 +++++++------ arch/x86/crypto/aesni-intel_avx-x86_64.S | 20 +- arch/x86/crypto/aesni-intel_glue.c | 54 +++--- arch/x86/crypto/camellia_aesni_avx2_glue.c | 74 ++++--- arch/x86/crypto/camellia_aesni_avx_glue.c | 72 ++++--- arch/x86/crypto/camellia_glue.c | 45 +++-- arch/x86/crypto/cast6_avx_glue.c | 68 +++---- arch/x86/crypto/glue_helper.c | 23 ++- arch/x86/crypto/serpent_avx2_glue.c | 65 +++---- arch/x86/crypto/serpent_avx_glue.c | 63 +++--- arch/x86/crypto/serpent_sse2_glue.c | 30 +-- arch/x86/crypto/twofish_avx_glue.c | 75 ++++---- arch/x86/crypto/twofish_glue_3way.c | 37 ++-- arch/x86/include/asm/crypto/camellia.h | 63 +++--- arch/x86/include/asm/crypto/glue_helper.h | 18 +- arch/x86/include/asm/crypto/serpent-avx.h | 20 +- arch/x86/include/asm/crypto/serpent-sse2.h | 28 ++- arch/x86/include/asm/crypto/twofish.h | 19 +- crypto/cast6_generic.c | 18 +- crypto/serpent_generic.c | 6 +- drivers/gpu/drm/i915/gvt/display.c | 212 +++++++++++++++++++++ drivers/gpu/drm/i915/gvt/handlers.c | 40 +++- drivers/gpu/drm/i915/gvt/mmio.c | 5 + drivers/gpu/drm/i915/gvt/vgpu.c | 5 +- drivers/net/dsa/b53/b53_common.c | 18 ++ drivers/net/dsa/b53/b53_regs.h | 1 + drivers/net/dsa/bcm_sf2.c | 5 - fs/btrfs/block-group.c | 48 +++-- fs/btrfs/block-group.h | 3 +- fs/btrfs/relocation.c | 2 +- fs/btrfs/scrub.c | 21 +- fs/fuse/fuse_i.h | 1 + include/crypto/cast6.h | 4 +- include/crypto/serpent.h | 4 +- include/crypto/xts.h | 2 - kernel/bpf/verifier.c | 33 ++-- net/dsa/tag_mtk.c | 19 +- .../selftests/bpf/verifier/bounds_deduction.c | 27 ++- tools/testing/selftests/bpf/verifier/unpriv.c | 15 +- .../selftests/bpf/verifier/value_ptr_arith.c | 23 ++- 44 files changed, 920 insertions(+), 547 deletions(-)