Received: by 10.213.65.68 with SMTP id h4csp1800792imn; Thu, 29 Mar 2018 11:16:15 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/lTUoqOWx4+VU93QzrWlEIVwaYkGlUv0Ut45m4ihzHX+ZKpICWs3wJd6uFOnQ7lxZ21v/r X-Received: by 10.101.82.139 with SMTP id y11mr6265218pgp.68.1522347375130; Thu, 29 Mar 2018 11:16:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522347375; cv=none; d=google.com; s=arc-20160816; b=BWqPlzuUGhfpxDoXAcNoPDxUIRCMU8pjb/Mj6udkLFE1rp3lkuqenh+54ntsk0owRy TKW4wTSguVd7UfGUniCiDrfyQFuv5wToBzU7LYtAfL0olomj+4IURHSx/kCM/qYqkG1M jatJzHY83HLagR02RWxsMVEz0M+yTn2K/goL8aJDIKVCZGkAOaZOI1OCyNXH2RSpam61 JPNTM8yJnOnh9CKa+vs4mwBUy3T6gXRpJQkM4r2bpb4gBpUiYuwp6xu7on4I3nDTUSmH 7EqlJk+Fkm6dZKPkB8hEek+l7GoKuCYiJ/McUuQmB6dvgB3l6F0xpwy8W14Ibam4LBRs Uq5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from :arc-authentication-results; bh=EN2Fo40R3DheZRl7WU1QYaFTBbsBrRpoyISFD11q4gg=; b=VMgytTJiXTKo0zPveZGAxsrHQq7XL0d+IMFKShrw6QaoE38um/Xgwjxbb/tQ1ViCd1 wPZEcRuW2xR5OgW8hTRrPAMLUKsqbUcBPTYx6sCZ0mc5zrljb0Cub73xhDa2ztln/zRq gwR3jTew1uYbjOblP/lUQfIObfAinkl8Vr/sBUdRKeKwnhcr7eJtDY6Hzg7rzPPQU3U5 RdntjzRGt4sKQIZOkYlZ0WLR+ojMs9gZR8g1ICOh2P2NE/Z/JPBPTWyKr0WGcezUbuZv n2vRQUoh2+pdhaybdokfigUiYkb+g+ahWFGq2z/8n2pB5ty648raRL5ZUTFDmpQm0vK+ iNSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j16si4248718pga.720.2018.03.29.11.16.01; Thu, 29 Mar 2018 11:16:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754123AbeC2SOz (ORCPT + 99 others); Thu, 29 Mar 2018 14:14:55 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:60028 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753203AbeC2SHa (ORCPT ); Thu, 29 Mar 2018 14:07:30 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 71622B00; Thu, 29 Mar 2018 18:07:29 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuahkh@osg.samsung.com, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/28] 4.9.92-stable review Date: Thu, 29 Mar 2018 20:00:19 +0200 Message-Id: <20180329175733.447823703@linuxfoundation.org> X-Mailer: git-send-email 2.16.3 MIME-Version: 1.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.92-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.92-rc1 X-KernelTest-Deadline: 2018-03-31T17:57+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.92 release. There are 28 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat Mar 31 17:57:18 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.92-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.92-rc1 Yunsheng Lin net: hns: Fix a skb used after free bug Tom Herbert kcm: lock lower socket in kcm_attach Florian Fainelli net: systemport: Rewrite __bcm_sysport_tx_reclaim() Julian Wiedmann s390/qeth: on channel error, reject further cmd requests Julian Wiedmann s390/qeth: lock read device while queueing next buffer Julian Wiedmann s390/qeth: when thread completes, wake up all waiters Julian Wiedmann s390/qeth: free netdevice when removing a card Madalin Bucur soc/fsl/qbman: fix issue in qman_delete_cgr_safe() Arkadi Sharshevsky team: Fix double free in error path Vinicius Costa Gomes skbuff: Fix not waking applications when errors are enqueued David Ahern net: Only honor ifindex in IP_PKTINFO if non-0 Nicolas Dichtel netlink: avoid a double skb free in genlmsg_mcast() Arvind Yadav net/iucv: Free memory obtained by kzalloc Florian Fainelli net: fec: Fix unbalanced PM runtime calls SZ Lin (林上智) net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface Christophe JAILLET net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred Eric Dumazet l2tp: do not accept arbitrary sockets Lorenzo Bianconi ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() Alexey Kodanev dccp: check sk for closed state in dccp_sendmsg() Kirill Tkhai net: Fix hlist corruptions in inet_evict_bucket() Eric Dumazet net: use skb_to_full_sk() in skb_update_prio() Eric Dumazet ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() Alexey Kodanev sch_netem: fix skb leak in netem_enqueue() Paul Blakey rhashtable: Fix rhlist duplicates insertion Guillaume Nault ppp: avoid loop in xmit recursion detection code Roman Mashak net sched actions: return explicit error when tunnel_key mode is not specified Marc Zyngier genirq: Track whether the trigger type has been set Johannes Thumshirn scsi: sg: don't return bogus Sg_requests ------------- Diffstat: Makefile | 4 ++-- drivers/net/ethernet/arc/emac_rockchip.c | 6 +++-- drivers/net/ethernet/broadcom/bcmsysport.c | 33 ++++++++++++--------------- drivers/net/ethernet/broadcom/bcmsysport.h | 2 +- drivers/net/ethernet/freescale/fec_main.c | 2 ++ drivers/net/ethernet/hisilicon/hns/hns_enet.c | 22 ++++++++---------- drivers/net/ethernet/hisilicon/hns/hns_enet.h | 6 ++--- drivers/net/ethernet/ti/cpsw.c | 3 ++- drivers/net/ppp/ppp_generic.c | 26 +++++++++++---------- drivers/net/team/team.c | 4 ++-- drivers/s390/net/qeth_core_main.c | 21 ++++++++++++----- drivers/s390/net/qeth_l2_main.c | 2 +- drivers/s390/net/qeth_l3_main.c | 2 +- drivers/scsi/sg.c | 5 ++-- drivers/soc/fsl/qbman/qman.c | 28 ++++------------------- include/linux/cgroup-defs.h | 4 ++-- include/linux/irq.h | 11 ++++++++- include/linux/rhashtable.h | 4 +++- include/net/sch_generic.h | 19 +++++++++++++++ kernel/irq/manage.c | 13 ++++++++++- lib/rhashtable.c | 4 +++- net/core/dev.c | 22 ++++++++++++------ net/core/skbuff.c | 2 +- net/dccp/proto.c | 5 ++++ net/ieee802154/6lowpan/core.c | 12 ++++++---- net/ipv4/inet_fragment.c | 3 +++ net/ipv4/ip_sockglue.c | 6 +++-- net/ipv6/ndisc.c | 3 ++- net/iucv/af_iucv.c | 4 +++- net/kcm/kcmsock.c | 33 +++++++++++++++++++-------- net/l2tp/l2tp_core.c | 8 +++++-- net/netlink/genetlink.c | 2 +- net/sched/act_tunnel_key.c | 1 + net/sched/sch_netem.c | 2 +- 34 files changed, 202 insertions(+), 122 deletions(-)