From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 94FA2C3F68F for ; Wed, 4 Dec 2019 17:13:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 6B76520833 for ; Wed, 4 Dec 2019 17:13:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575479606; bh=yi8pZN5CQSKLpi2NID6vVJBfFqOTr4KpY2Z1FCauBzw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=vkAoKA8k62Wi9+FHIj65/1cCuOSJBpzLNJUSj1T5M6lLiynxxo9jrzL+F6+UP946H 5ByugOJr1TcXTfGohMqhSvmoi48AZYPs4mhKGLgTui0ydbb4vkXdTDj6HzGeDvwm5c X1J/GEUyX7j8Grp2KqfJIdar281BBg7Y5jKRv5ww= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728896AbfLDRNZ (ORCPT ); Wed, 4 Dec 2019 12:13:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:56092 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726934AbfLDRNZ (ORCPT ); Wed, 4 Dec 2019 12:13:25 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 126A32081B; Wed, 4 Dec 2019 17:13:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575479604; bh=yi8pZN5CQSKLpi2NID6vVJBfFqOTr4KpY2Z1FCauBzw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=XNKq94QgXKX8nVhI/J7QhYiUDjhbwY8KtyxLNou9b9o1MV8OXgPfeFRKHi/gCizA0 rwSgo5EKKacd/cGU9qQ0Es9+LKKw+szgH3BHlNh06V5S1LDsI0H1apXEtKFqjFra5R A8Z0lTI9u15NS6Z136HiA4LdFUPgEKGzhOhLvoKM= Date: Wed, 4 Dec 2019 18:13:22 +0100 From: Greg Kroah-Hartman To: Amol Grover Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 5.4 00/46] 5.4.2-stable review Message-ID: <20191204171322.GB3627415@kroah.com> References: <20191203212705.175425505@linuxfoundation.org> <20191204132318.GA14649@workstation-kernel-dev> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191204132318.GA14649@workstation-kernel-dev> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 04, 2019 at 06:53:18PM +0530, Amol Grover wrote: > On Tue, Dec 03, 2019 at 11:35:20PM +0100, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 5.4.2 release. > > There are 46 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Thu, 05 Dec 2019 21:20:36 +0000. > > Anything received after that time might be too late. > > > > The whole patch series can be found in one patch at: > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.2-rc1.gz > > or in the git tree and branch at: > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y > > and the diffstat can be found below. > > > > thanks, > > > > greg k-h > > > > ------------- > > Pseudo-Shortlog of commits: > > > > Greg Kroah-Hartman > > Linux 5.4.2-rc1 > > > > Hans de Goede > > platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size > > > > Hans de Goede > > platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer > > > > Candle Sun > > HID: core: check whether Usage Page item is after Usage ID items > > > > Herbert Xu > > crypto: talitos - Fix build error by selecting LIB_DES > > > > Joel Stanley > > Revert "jffs2: Fix possible null-pointer dereferences in jffs2_add_frag_to_fragtree()" > > > > Theodore Ts'o > > ext4: add more paranoia checking in ext4_expand_extra_isize handling > > > > Heiner Kallweit > > r8169: fix resume on cable plug-in > > > > Heiner Kallweit > > r8169: fix jumbo configuration for RTL8168evl > > > > Thadeu Lima de Souza Cascardo > > selftests: pmtu: use -oneline for ip route list cache > > > > John Rutherford > > tipc: fix link name length check > > > > Jakub Kicinski > > selftests: bpf: correct perror strings > > > > Jakub Kicinski > > selftests: bpf: test_sockmap: handle file creation failures gracefully > > > > Jakub Kicinski > > net/tls: use sg_next() to walk sg entries > > > > Jakub Kicinski > > net/tls: remove the dead inplace_crypto code > > > > Jakub Kicinski > > selftests/tls: add a test for fragmented messages > > > > Hi, > I'm not sure if this is relevant but I tested out the latest revision > of tools/testing/selftests/net/tls (run as sudo) with 5.3.9, 5.3.13, > and 5.4.1, and all of them resulted in Oops. I'm not sure that it > happens only on my PC but the old version worked fine on all 3 kernels. > > More information available in this thread: > https://lore.kernel.org/stable/20191203171817.GA24581@workstation-portable/ Any specific commit cause this issue? Should I drop one/any of these? thanks, greg k-h