Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8111657imu; Tue, 4 Dec 2018 03:12:01 -0800 (PST) X-Google-Smtp-Source: AFSGD/W5EM8mLNR3IOezj52C2wKyFhb6SKhVffBOtuXdRUBEBvWGf7I805E6tSkzkaGH8xga6cXc X-Received: by 2002:a17:902:7603:: with SMTP id k3mr19853157pll.285.1543921921428; Tue, 04 Dec 2018 03:12:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543921921; cv=none; d=google.com; s=arc-20160816; b=OL9yOyKG/8qQiTgJ30TIvz/YundaL8aOkJCCz9IYe92PhZ9e6lpENU4t7f0IooVDsZ prUOGbqt0qZd0kDuaZnscfe2IVEHtMwt0PROYj0fWbzF0wRRYAqwVNx6aWosW/4VeH7L 3UwEwmUkuU8pptIW0rgT+dZ7xUe8Uy8Nr6JIyvSZ7HHpxMu5ZJ/OiII2TY4IxhcqFJEi Y95MffAWv4HLuv+6bUr+jZlj+VcOXFM73P64s7pQobvSDIBK2SUyzstvSJMZBpfbPo6v u6q37v86Qqc2AB5Yq4V+5TzN/GAW3ebjPeRDy9u5O8G6vU7mWnanZPi1ZtLU6UrMLwc6 1Yyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=579eQsE4F6NLjeh9y04qv8FishGyFrZ7VzhUEwV2bUs=; b=bqJQcAgMfYsTSW9e2Ov/3EgyEMdJ87T9lt5NpB6Ap8PVF4Fe0DyYBm8SsjZQ96JvrH baPIwW2BKRHmmeXNl1CgOQzgu8d+8FgC2dnd6eGE+GCjXiR0502U/SMvrrBgRTaEe/Th QzioURwY6543l8axhGsRlfcYkZXZ9xa5tLJN0QqfQwBaKkWabuWxTQ06O0Mm6vOkaAOI nD3hlNNFS1e+UGGUKn4DP48IbdoSHPOrBfmm0vv3rocT77b6EfiqHiElWcX3jgKIR6s4 z2ahGiNNYiQ8WPEAcKjGTbkxkGrzSKo1JrMsC/iDJlVdNxnLrc5lyuKA79FUfYWL58dN 9hwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="XQr/Aa4o"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 32si17271919ple.72.2018.12.04.03.11.46; Tue, 04 Dec 2018 03:12:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="XQr/Aa4o"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728750AbeLDLJO (ORCPT + 99 others); Tue, 4 Dec 2018 06:09:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:58956 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728742AbeLDLJM (ORCPT ); Tue, 4 Dec 2018 06:09:12 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 058AD214DB; Tue, 4 Dec 2018 11:09:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543921751; bh=shJmaalloJtvp0zP7vqEJyLk5k8ftHI59/p+p9PMFS0=; h=From:To:Cc:Subject:Date:From; b=XQr/Aa4oKTAVTqvYpW6ByBMpT4MPjHPUv1OQNgrtGKgLLMhXthO+Fkfe942QzVbc8 tC3YmbsJCopUbFpFvtpQbLJVElcy5drrboVp+9zw1al13tHXUm6rVsjhcA8qmbNKyO L3x/hKaUQWGpT3EuWXxABwMpEmXdz540nhAUgkRo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/50] 4.9.143-stable review Date: Tue, 4 Dec 2018 11:49:55 +0100 Message-Id: <20181204103714.485546262@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 MIME-Version: 1.0 User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.143-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.143-rc1 X-KernelTest-Deadline: 2018-12-06T10:37+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.143 release. There are 50 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu Dec 6 10:36:59 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.143-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.143-rc1 Chris Fries kbuild: Set KBUILD_CFLAGS before incl. arch Makefile Ard Biesheuvel efi/libstub: Make file I/O chunking x86-specific Arnd Bergmann workqueue: avoid clang warning Stefan Agner ARM: trusted_foundations: do not use naked function Stefan Agner bus: arm-cci: remove unnecessary unreachable() Stefan Agner ARM: 8767/1: add support for building ARM kernel with clang Stefan Agner ARM: 8766/1: drop no-thumb-interwork in EABI mode Alistair Strachan efi/libstub: arm: support building with clang YueHaibing misc: mic/scif: fix copy-paste error in scif_create_remote_lookup Dexuan Cui Drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() Yu Zhao mm: use swp_offset as key in shmem_replace_page() Martin Kelly iio:st_magn: Fix enable device after trigger Felipe Balbi Revert "usb: dwc3: gadget: skip Set/Clear Halt when invalid" Michael Niewöhner usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series Kai-Heng Feng USB: usb-storage: Add new IDs to ums-realtek Josef Bacik btrfs: release metadata before running delayed refs Richard Genoud dmaengine: at_hdmac: fix module unloading Richard Genoud dmaengine: at_hdmac: fix memory leak in at_dma_xlate() Pan Bian ext2: fix potential use after free Takashi Iwai ALSA: sparc: Fix invalid snd_free_pages() at error path Takashi Iwai ALSA: control: Fix race between adding and removing a user element Takashi Iwai ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write Takashi Iwai ALSA: wss: Fix invalid snd_free_pages() at error path Maximilian Heyne fs: fix lost error code in dio_complete Jiri Olsa perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() Jiri Olsa perf/x86/intel: Move branch tracing setup to the Intel-specific source file Filipe Manana Btrfs: ensure path name is null terminated at btrfs_control_ioctl Max Filippov xtensa: fix coprocessor context offset definitions Max Filippov xtensa: enable coprocessors that are being flushed Wanpeng Li KVM: X86: Fix scan ioapic use-before-initialization Jim Mattson kvm: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb Junaid Shahid kvm: mmu: Fix race in emulated page table writes Bernd Eckstein <3erndeckstein@gmail.com> usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 Julian Wiedmann s390/qeth: fix length check in SNMP processing Pan Bian rapidio/rionet: do not free skb before reading its length Petr Machata net: skb_scrub_packet(): Scrub offload_fwd_mark Sasha Levin Revert "wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()" Matthias Schwarzott media: em28xx: Fix use-after-free when disconnecting Hugh Dickins mm/khugepaged: collapse_shmem() do not crash on Compound Hugh Dickins mm/khugepaged: collapse_shmem() without freezing new_page Hugh Dickins mm/khugepaged: minor reorderings in collapse_shmem() Hugh Dickins mm/khugepaged: collapse_shmem() remember to clear holes Hugh Dickins mm/khugepaged: fix crashes due to misaccounted holes Mike Rapoport shmem: introduce shmem_inode_acct_block Mike Rapoport shmem: shmem_charge: verify max_block is not exceeded before inode update Hugh Dickins mm/khugepaged: collapse_shmem() stop if punched or truncated Hugh Dickins mm/huge_memory: fix lockdep complaint on 32-bit i_size_read() Hugh Dickins mm/huge_memory: splitting set mapping+index before unfreeze Konstantin Khlebnikov mm/huge_memory.c: reorder operations in __split_huge_page_tail() Hugh Dickins mm/huge_memory: rename freeze_page() to unmap_page() ------------- Diffstat: Makefile | 69 ++++++------- arch/arm/Makefile | 2 +- arch/arm/boot/compressed/Makefile | 2 +- arch/arm/firmware/trusted_foundations.c | 14 ++- arch/x86/events/core.c | 20 ---- arch/x86/events/intel/core.c | 52 +++++++--- arch/x86/events/perf_event.h | 13 ++- arch/x86/kvm/mmu.c | 27 ++---- arch/x86/kvm/svm.c | 20 +++- arch/x86/kvm/x86.c | 3 +- arch/xtensa/kernel/asm-offsets.c | 16 +-- arch/xtensa/kernel/process.c | 5 +- drivers/bus/arm-cci.c | 2 - drivers/dma/at_hdmac.c | 10 +- drivers/firmware/efi/libstub/Makefile | 3 +- drivers/firmware/efi/libstub/efi-stub-helper.c | 11 ++- drivers/hv/channel.c | 8 ++ drivers/iio/magnetometer/st_magn_buffer.c | 12 +-- drivers/media/usb/em28xx/em28xx-dvb.c | 3 +- drivers/misc/mic/scif/scif_rma.c | 2 +- drivers/net/rionet.c | 2 +- drivers/net/usb/ipheth.c | 10 +- drivers/net/wireless/ti/wlcore/cmd.c | 6 -- drivers/s390/net/qeth_core_main.c | 27 +++--- drivers/usb/core/quirks.c | 3 + drivers/usb/dwc3/gadget.c | 5 - drivers/usb/storage/unusual_realtek.h | 10 ++ fs/btrfs/super.c | 1 + fs/btrfs/transaction.c | 6 +- fs/direct-io.c | 4 +- fs/ext2/xattr.c | 2 +- include/linux/workqueue.h | 4 +- mm/huge_memory.c | 79 +++++++-------- mm/khugepaged.c | 129 ++++++++++++++----------- mm/shmem.c | 97 ++++++++++--------- net/core/skbuff.c | 4 + sound/core/control.c | 80 ++++++++------- sound/isa/wss/wss_lib.c | 2 - sound/pci/ac97/ac97_codec.c | 2 +- sound/sparc/cs4231.c | 8 +- 40 files changed, 424 insertions(+), 351 deletions(-)