Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp516011yba; Mon, 1 Apr 2019 10:52:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqwIckahoGvE19PmtP9SsCAKiAvSoSY1BNR97NNpPDFoQT7rRaRIofneLd3vwFRhSJp2ujHK X-Received: by 2002:a62:5185:: with SMTP id f127mr23334898pfb.199.1554141127866; Mon, 01 Apr 2019 10:52:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554141127; cv=none; d=google.com; s=arc-20160816; b=AaIWRnUsHYmPOipdFrd97z/stlCIhq86f6kQTDjdIM+HT2Ffr6kTgOd4+XS/6StvEG t5k+2zOQUdRXbHzKX/e2Pi05LYx9FRWbiQxiUrogSJPUoNr1V4Uxd8dgQD27yKjX/B7Q nSDpFw8Plum+C2GrKwJ5sK5HWdONbRALhU5augGf0GfUq38dhLysFEicD2uxV1WdLQwP xeq1uqIVIe46EcYIEB3w7KPaToNaAD0lEQobjqG9anrastuNr+AZuHHRM99Getzbe1Bj fagY+uDXI+D9mpqKl2REisKZt8YjBmo8A9ftJR4udKnXymC33xaUxEptICZB3Tf3Pirg P9UQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=xtIiNsKa0suJNxWm9ZsNQRLrP7cPuPDFGee/lzKuj1Q=; b=PC7S8hcxDT26hYWebCCVcfBbdozWRwPlky6VIFtiM1gBT5fugRtUAcrI7nHRz/VuX4 EKnC7rkpLHFj+s4ubURvrviZ3iLzbLHr1Bna1AznbsI0ChR79CKGmTU0uEQ5rlllbPEL 15gIlYwcFoQcJeFv/BXea7QJcK/dtr0c9+C7ZJ91jzCQ+nStqoJVuwXKFKTAp8BMPgrY 5ND9F9yQLgB+YdQXExKRRzldXJkfupMlBVCJw/JS6K8cvKiyV0ZK6548lvE7CF/o1UNn sOcDxTFXbUaOF9IswkZbXbNClP8mQkwPgqcZaZG4emjRhNAb6HF+JM+sIdoQon4MD/16 wGng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jsX7HuHo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y18si9066641pll.172.2019.04.01.10.51.52; Mon, 01 Apr 2019 10:52:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jsX7HuHo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732935AbfDARvU (ORCPT + 99 others); Mon, 1 Apr 2019 13:51:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:33710 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728763AbfDAR2D (ORCPT ); Mon, 1 Apr 2019 13:28:03 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B0B1220830; Mon, 1 Apr 2019 17:28:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554139682; bh=ligoVCaaHaCAkIsnzJ9H0kd4GdPS18KVmEkNT07FMJY=; h=From:To:Cc:Subject:Date:From; b=jsX7HuHoIvKL2QaXuqzaZptZvOV0njCUcvUMunOusFOVo9GYtuVU4lJYbAZv4DNP0 7lnnYHfrleKRlegq5qUQDteOrqJhWsVZ5cL38vMueQBwLhooHjTAPPb760CdKjzLlT kAn6nDABrpFeftQQm4ys3tshbO+aGhVoNguND9LI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/56] 4.9.167-stable review Date: Mon, 1 Apr 2019 19:02:16 +0200 Message-Id: <20190401170103.398401360@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.167-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.167-rc1 X-KernelTest-Deadline: 2019-04-03T17:01+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.167 release. There are 56 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed Apr 3 17:00:20 UTC 2019. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.167-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.167-rc1 Eric Biggers arm64: support keyctl() system call in 32-bit mode Greg Kroah-Hartman Revert "USB: core: only clean up what we allocated" Mathias Nyman xhci: Fix port resume done detection for SS ports with LPM enabled Radoslav Gerganov USB: gadget: f_hid: fix deadlock in f_hidg_write() Sean Christopherson KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts Sean Christopherson KVM: Reject device ioctls from processes other than the VM's creator Thomas Gleixner x86/smp: Enforce CONFIG_HOTPLUG_CPU when SMP=y Thomas Gleixner cpu/hotplug: Prevent crash when CPU bringup fails on CONFIG_HOTPLUG_CPU=n Adrian Hunter perf intel-pt: Fix TSC slip Yasushi Asano usb: host: xhci-rcar: Add XHCI_TRUST_TX_LENGTH quirk Fabrizio Castro usb: common: Consider only available nodes for dr_mode Axel Lin gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input YueHaibing fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links Wentao Wang Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc Bjørn Mork USB: serial: option: add Olicard 600 Mans Rullgard USB: serial: option: set driver_info for SIM5218 and compatibles Lin Yi USB: serial: mos7720: fix mos_parport refcount imbalance on error path George McCollister USB: serial: ftdi_sio: add additional NovaTech products Greg Kroah-Hartman USB: serial: cp210x: add new device id Hoan Nguyen An serial: sh-sci: Fix setting SCSCR_TIE while transferring data Aditya Pakki serial: max310x: Fix to avoid potential NULL pointer dereference Malcolm Priestley staging: vt6655: Fix interrupt race condition on device start up. Malcolm Priestley staging: vt6655: Remove vif check from vnt_interrupt Ian Abbott staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest Kangjie Lu tty: atmel_serial: fix a potential NULL pointer dereference Steffen Maier scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices Steffen Maier scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host Martin K. Petersen scsi: sd: Quiesce warning if device does not report optimal I/O size Bart Van Assche scsi: sd: Fix a race between closing an sd device and sd I/O Tetsuo Handa fs/open.c: allow opening only regular files during execve() Takashi Iwai ALSA: pcm: Don't suspend stream in unrecoverable PCM state Takashi Iwai ALSA: pcm: Fix possible OOB access in PCM oss plugins Gustavo A. R. Silva ALSA: seq: oss: Fix Spectre v1 vulnerability Gustavo A. R. Silva ALSA: rawmidi: Fix potential Spectre v1 vulnerability Christian Lamparter net: dsa: qca8k: remove leftover phy accessors Olga Kornievskaia NFSv4.1 don't free interrupted slot on open Naveen N. Rao powerpc: bpf: Fix generation of load/store DW instructions Kohji Okuno ARM: imx6q: cpuidle: fix bug that CPU might not wake up at expected time Andrea Righi btrfs: raid56: properly unmap parity page in finish_parity_scrub() Josef Bacik btrfs: remove WARN_ON in log_dir_items Eric Dumazet tun: add a missing rcu_read_unlock() in error path Eric Dumazet tun: properly test for IFF_UP Finn Thain mac8390: Fix mmio access size probe Xin Long sctp: get sctphdr by offset in sctp_compute_cksum Zhiqiang Liu vxlan: Don't call gro_cells_destroy() before device is unregistered Eric Dumazet tcp: do not use ipv6 header for ipv4 flow Maxime Chevallier packets: Always register packet sk in the same order Eric Dumazet net: rose: fix a possible stack overflow Christoph Paasch net/packet: Set __GFP_NOWARN upon allocation in alloc_pg_vec Bjorn Helgaas mISDN: hfcpci: Test both vendor & device ID for Digium HFC4S Eric Dumazet dccp: do not use ipv6 header for ipv4 flow Bhadram Varka stmmac: copy unicast mac address to MAC registers Johannes Berg cfg80211: size various nl80211 messages correctly Christoffer Dall video: fbdev: Set pixclock = 0 in goldfishfb Marcel Holtmann Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer Marcel Holtmann Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt ------------- Diffstat: Documentation/virtual/kvm/api.txt | 16 +++-- Makefile | 4 +- arch/arm/mach-imx/cpuidle-imx6q.c | 27 +++---- arch/arm64/Kconfig | 4 ++ arch/powerpc/include/asm/ppc-opcode.h | 2 + arch/powerpc/net/bpf_jit.h | 17 ++--- arch/powerpc/net/bpf_jit32.h | 4 ++ arch/powerpc/net/bpf_jit64.h | 20 ++++++ arch/powerpc/net/bpf_jit_comp64.c | 12 ++-- arch/x86/Kconfig | 8 +-- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/vmx.c | 14 ---- arch/x86/kvm/x86.c | 12 ++++ drivers/gpio/gpio-adnp.c | 6 +- drivers/isdn/hardware/mISDN/hfcmulti.c | 3 +- drivers/net/dsa/qca8k.c | 18 ----- drivers/net/ethernet/8390/mac8390.c | 19 +++-- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 16 ++++- drivers/net/tun.c | 16 +++-- drivers/net/vxlan.c | 4 +- drivers/s390/scsi/zfcp_erp.c | 17 +++++ drivers/s390/scsi/zfcp_ext.h | 2 + drivers/s390/scsi/zfcp_scsi.c | 4 ++ drivers/scsi/sd.c | 22 ++++-- drivers/staging/comedi/comedidev.h | 2 + drivers/staging/comedi/drivers.c | 33 +++++++-- drivers/staging/comedi/drivers/ni_mio_common.c | 10 ++- drivers/staging/vt6655/device_main.c | 11 ++- drivers/tty/serial/atmel_serial.c | 4 ++ drivers/tty/serial/kgdboc.c | 4 +- drivers/tty/serial/max310x.c | 2 + drivers/tty/serial/sh-sci.c | 12 +--- drivers/usb/common/common.c | 2 + drivers/usb/core/config.c | 9 +-- drivers/usb/gadget/function/f_hid.c | 6 +- drivers/usb/host/xhci-rcar.c | 1 + drivers/usb/host/xhci-ring.c | 9 ++- drivers/usb/host/xhci.h | 1 + drivers/usb/serial/cp210x.c | 1 + drivers/usb/serial/ftdi_sio.c | 2 + drivers/usb/serial/ftdi_sio_ids.h | 4 +- drivers/usb/serial/mos7720.c | 4 +- drivers/usb/serial/option.c | 13 ++-- drivers/video/fbdev/goldfishfb.c | 2 +- fs/btrfs/raid56.c | 3 +- fs/btrfs/tree-log.c | 11 ++- fs/nfs/nfs4proc.c | 3 +- fs/open.c | 6 ++ fs/proc/proc_sysctl.c | 3 +- include/net/sctp/checksum.h | 2 +- include/net/sock.h | 6 ++ kernel/cpu.c | 20 +++++- net/bluetooth/l2cap_core.c | 83 ++++++++++++++-------- net/dccp/ipv6.c | 4 +- net/ipv6/tcp_ipv6.c | 8 +-- net/packet/af_packet.c | 4 +- net/rose/rose_subr.c | 21 +++--- net/wireless/nl80211.c | 16 ++--- sound/core/oss/pcm_oss.c | 43 +++++------ sound/core/pcm_native.c | 9 ++- sound/core/rawmidi.c | 2 + sound/core/seq/oss/seq_oss_synth.c | 7 +- .../perf/util/intel-pt-decoder/intel-pt-decoder.c | 20 +++--- virt/kvm/kvm_main.c | 3 + 64 files changed, 422 insertions(+), 252 deletions(-)