Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp3997749imm; Mon, 14 May 2018 00:41:59 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqmGBqL/UXX5snXWB1dCXUXBalLP3s5URHlGhftOfNsqarLtfyAmjpKA9hKU/367zOor9i3 X-Received: by 2002:a65:550d:: with SMTP id f13-v6mr7648383pgr.324.1526283719076; Mon, 14 May 2018 00:41:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526283719; cv=none; d=google.com; s=arc-20160816; b=OqKpsuDLSPm1CcUB/0gmVreWNdpsMizqkwjGbupxdvBmSWncdX8pSts5NE46mp+h13 Z9WCIg+MIS5dMo+IjxBzRmUxLvugxeF6NXSm+tqmWf3bjjkp8j/7Urkyc1u9CLVBGOdY cLdpjABf/yxdCYTqsQEq/Tp2ktS8V5SFotIFTIpFsKOv+X1BqDO0BgaeURVVjUlotuf4 LDUPQThfLfL/7OHwfkJVMCW/zBcCkAIvB5Xtlu9zoVPv1MWbRBPcHrIAWcRWQHZMTAS0 xAzk7waPOgTi8YSnnvWqgg/t2qmp48nmhw5hcAtOAnknM/dG5DIYuKr6z1kkNsINrwu2 01PA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=f85petV7iljwsCwIK/dL146fZCz5C7XripxBPvW0ZLQ=; b=c8n7uTRJeTYXUqEZYk5iNreEArVliQn0m1niIfSpgedcQLxVXjT3SjR93wN+aaMUJb AbHX/uIuSzUJw2LYFfYig6rcpxxuuFhuV1UXJFxwOXaydX/oYFxO5giSO6i/HPsk7J64 W6yUT1OotE5GUHdo1beZUPazXcyhI/1UDCmvDMJ5o03IUvQzLb3b7nTdgG2YfNd3GIO1 GLFYYmGSBfQCm22ZPID4f+DVt2s+qJZoDTB925IV4bB0LXSBTtXjIVYMK11WbU338dVv Wcgbm8yWDu/yWg3JdLb5LwBBSp0Yrpqa/ziNMiKV+edV9XJkqg32R2O/IZB6F48dSPDl VwqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cI0SEL8e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s6-v6si7316574pgr.369.2018.05.14.00.41.44; Mon, 14 May 2018 00:41:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cI0SEL8e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752802AbeENHl3 (ORCPT + 99 others); Mon, 14 May 2018 03:41:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:58682 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752623AbeENGwL (ORCPT ); Mon, 14 May 2018 02:52:11 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0BA0820834; Mon, 14 May 2018 06:52:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526280730; bh=Cgse2WZet5nr3Rhqm7Zr6JQW4E0irL5Ff0yh4biZGxs=; h=From:To:Cc:Subject:Date:From; b=cI0SEL8e1Y6+Sx5y3cFuTiuaojJPJmVlSy2VhnxBJkHDHIs+QTIxXemDILgVj12+T aSemkHYtN+UQbSOAG5ravVuJ2dCs+CIea+U3rwDM8YAhQILEM+JZIW0c2sDdd9Cnxh TL05HkqYvsE+tQI9Oh4xgEV1LDAuksgsnVrkjnEs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.4 00/56] 4.4.132-stable review Date: Mon, 14 May 2018 08:48:05 +0200 Message-Id: <20180514064754.853201981@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 MIME-Version: 1.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.132-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.132-rc1 X-KernelTest-Deadline: 2018-05-16T06:48+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.4.132 release. There are 56 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed May 16 06:47:39 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.132-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.132-rc1 Peter Zijlstra perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() Peter Zijlstra perf/core: Fix possible Spectre-v1 indexing for ->aux_pages[] Peter Zijlstra perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver Peter Zijlstra perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr Peter Zijlstra perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* Masami Hiramatsu tracing/uprobe_event: Fix strncpy corner case Hans de Goede Revert "Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174" Gustavo A. R. Silva atm: zatm: Fix potential Spectre v1 Gustavo A. R. Silva net: atm: Fix potential Spectre v1 Jimmy Assarsson can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() Steven Rostedt (VMware) tracing: Fix regex_match_front() to not over compare the test string Hans de Goede libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs Johan Hovold rfkill: gpio: fix memory leak in probe error path Yi Zhao xfrm_user: fix return value from xfrm_user_rcv_msg Wei Fang f2fs: fix a dead loop in f2fs_fiemap() Jan Kara bdi: Fix oops in wb_workfn() Eric Dumazet tcp: fix TCP_REPAIR_QUEUE bound checking Jiri Olsa perf: Remove superfluous allocation error check Eric Dumazet soreuseport: initialise timewait reuseport field Eric Dumazet dccp: initialize ireq->ir_mark Eric Dumazet net: fix uninit-value in __hw_addr_add_ex() Eric Dumazet net: initialize skb->peeked when cloning Eric Dumazet net: fix rtnh_ok() Eric Dumazet netlink: fix uninit-value in netlink_sendmsg Eric Dumazet crypto: af_alg - fix possible uninit-value in alg_bind() Julian Anastasov ipvs: fix rtnl_lock lockups caused by start_sync_thread Bin Liu usb: musb: host: fix potential NULL pointer dereference SZ Lin (林上智) USB: serial: option: adding support for ublox R410M Johan Hovold USB: serial: option: reimplement interface masking Alan Stern USB: Accept bulk endpoints with 1024-byte maxpacket Greg Kroah-Hartman USB: serial: visor: handle potential invalid device configuration Ben Hutchings test_firmware: fix setting old custom fw path back on exit, second try Thomas Hellstrom drm/vmwgfx: Fix a buffer object leak Danit Goldberg IB/mlx5: Use unlimited rate when static rate is not supported SZ Lin (林上智) NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 Leon Romanovsky RDMA/mlx5: Protect from shift operand overflow Roland Dreier RDMA/ucma: Allow resolving address w/o specifying source address Darrick J. Wong xfs: prevent creating negative-sized file via INSERT_RANGE Vittorio Gambaletta (VittGam) Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro Dmitry Torokhov Input: leds - fix out of bound access Mathieu Desnoyers tracepoint: Do not warn on ENOMEM Takashi Iwai ALSA: aloop: Add missing cable lock to ctl API callbacks Robert Rosengren ALSA: aloop: Mark paused device as inactive Takashi Iwai ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() Takashi Iwai ALSA: pcm: Check PCM state at xfern compat ioctl Kristian Evensen USB: serial: option: Add support for Quectel EP06 Markus Pargmann gpmi-nand: Handle ECC Errors in erased pages Vasanthakumar Thiagarajan ath10k: rebuild crypto header in rx data frames Vasanthakumar Thiagarajan ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode David Spinadel mac80211: Add RX flag to indicate ICV stripped Sara Sharon mac80211: allow same PN for AMSDU sub-frames Sara Sharon mac80211: allow not sending MIC up from driver for HW crypto Tejun Heo percpu: include linux/sched.h for cond_resched() Alexander Yarygin KVM: s390: Enable all facility bits that are known good for passthrough Teng Qin bpf: map_get_next_key to return first key on NULL Tan Xiaojun perf/core: Fix the perf_cpu_time_max_percent check ------------- Diffstat: Makefile | 4 +- arch/s390/kvm/kvm-s390.c | 4 +- arch/x86/kernel/cpu/perf_event.c | 8 +- arch/x86/kernel/cpu/perf_event_intel_cstate.c | 2 + arch/x86/kernel/cpu/perf_event_msr.c | 9 +- crypto/af_alg.c | 8 +- drivers/ata/libata-core.c | 3 + drivers/atm/zatm.c | 3 + drivers/bluetooth/btusb.c | 2 +- drivers/gpu/drm/vmwgfx/vmwgfx_kms.c | 1 + drivers/infiniband/core/ucma.c | 2 +- drivers/infiniband/hw/mlx5/qp.c | 22 +- drivers/input/input-leds.c | 8 +- drivers/input/touchscreen/atmel_mxt_ts.c | 9 + drivers/mtd/nand/gpmi-nand/gpmi-nand.c | 78 +++- drivers/net/can/usb/kvaser_usb.c | 2 +- drivers/net/usb/qmi_wwan.c | 1 + drivers/net/wireless/ath/ath10k/core.c | 8 + drivers/net/wireless/ath/ath10k/core.h | 4 + drivers/net/wireless/ath/ath10k/htt_rx.c | 100 ++++- drivers/net/wireless/ath/wcn36xx/txrx.c | 2 +- drivers/usb/core/config.c | 4 +- drivers/usb/musb/musb_host.c | 4 +- drivers/usb/serial/option.c | 448 ++++++++-------------- drivers/usb/serial/visor.c | 69 ++-- fs/f2fs/data.c | 2 +- fs/fs-writeback.c | 2 +- fs/xfs/xfs_file.c | 14 +- include/net/inet_timewait_sock.h | 1 + include/net/mac80211.h | 14 +- include/net/nexthop.h | 2 +- kernel/bpf/arraymap.c | 2 +- kernel/bpf/hashtab.c | 9 +- kernel/bpf/syscall.c | 20 +- kernel/events/callchain.c | 10 +- kernel/events/core.c | 2 +- kernel/events/ring_buffer.c | 7 +- kernel/trace/trace_events_filter.c | 3 + kernel/trace/trace_uprobe.c | 2 + kernel/tracepoint.c | 4 +- mm/percpu.c | 1 + net/atm/lec.c | 9 +- net/core/dev_addr_lists.c | 4 +- net/core/skbuff.c | 1 + net/dccp/ipv4.c | 1 + net/dccp/ipv6.c | 1 + net/ipv4/inet_timewait_sock.c | 1 + net/ipv4/tcp.c | 2 +- net/mac80211/util.c | 5 +- net/mac80211/wep.c | 3 +- net/mac80211/wpa.c | 45 ++- net/netfilter/ipvs/ip_vs_ctl.c | 8 - net/netfilter/ipvs/ip_vs_sync.c | 155 ++++---- net/netlink/af_netlink.c | 2 + net/rfkill/rfkill-gpio.c | 7 +- net/xfrm/xfrm_user.c | 2 +- sound/core/pcm_compat.c | 2 + sound/core/seq/seq_virmidi.c | 4 +- sound/drivers/aloop.c | 29 +- tools/testing/selftests/firmware/fw_filesystem.sh | 6 +- 60 files changed, 656 insertions(+), 531 deletions(-)