Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4799799yba; Tue, 30 Apr 2019 04:42:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqxrkIsxB4Hsux/xpPc8726PjkkCMF7goy2ZJ9VSwaxPVktmD2dWRbF4/rWcffWbGTrj4U8R X-Received: by 2002:a17:902:7205:: with SMTP id ba5mr47759840plb.285.1556624537774; Tue, 30 Apr 2019 04:42:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556624537; cv=none; d=google.com; s=arc-20160816; b=HnnVtodRqt5U575KTCw22TMi2q6T8C6YLRcAbxMDJxuAL0aDPkDttgh8f9Kbw3yrTx 25HJ4nRtsRZl+p+c3FGoSr9pVXKZvSt1e4r55kVYY0Trb9hGCk23QjodStFExnFHcYXB DmSCP/z8pRhbD9fBklyWt8ywR2B3w/4wfL7SxH8nkapK+WJ9MzS5sSy15uVBT7VpaUMR K7bMHDJYNum0rfpL5TTNXeKtZmFQXYHe3nSr5PrrwQsGofgIfNcg5aoH4XiYGNJSu9O6 EgJt9MSmvucGNqgfQu+G0KHY6M91smsKhBosP5DENR7tmuwZX3MaBS/Xc+k0epY+Eu2e KBaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=qNf5Yy0hg+Q5yJ1SDm81G1aBnjXCUxVxMegfaHx6G2A=; b=hD9T4hfpc2zlBnYTI2VbgUpmKt8p2BGw12OIVLmkuKsYlWgrXFOM60VCra6cSTwci6 GJeRYK1Tg4YHs64Uxxf4/D1+qCez5k1swxhZ0FMfOH5LLC6h112XK9csRly5hIGF7QhK b0BRY3VTLWfWThRF0ig2WUs0utBexstrQfK/p7QF94z3DmOOu/tKVXT/uwuWCLLQtlvS hBOHUvTUDGKwH13ryit3qP3T7k/HGE+/ZssjrrnLEucxwrPnUWA4C37VkdBD1rRZf15B PP6Zj9SHkjS5vSrY8OwA6nSwPvbbMHDX8FhnWWJsxzDM+jbGtdzZn9TiqZwG9FZG4LvR u+QQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vSI99ZcZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c16si14734654pgm.430.2019.04.30.04.42.01; Tue, 30 Apr 2019 04:42:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vSI99ZcZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728455AbfD3Lka (ORCPT + 99 others); Tue, 30 Apr 2019 07:40:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:46796 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727670AbfD3Lk1 (ORCPT ); Tue, 30 Apr 2019 07:40:27 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CE2DD2177B; Tue, 30 Apr 2019 11:40:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556624426; bh=Uurc2KSK68HYg73eWvnYk+ZB4MvHKeAaDWlzoobd1kY=; h=From:To:Cc:Subject:Date:From; b=vSI99ZcZB9cx7UrKhfZ8yjzlEOn97Fh0MMBPO2V3CYngYxpLju5j6DU25LlUOVcoX 9pWvBg5+JxZBkPDOa/jA/WDZwKPpZnNC8bdF427Zg3h3WUFw9G8A260Tt4XpGSS0DI ix9rcdrWmiQ3rUlfEhVWnnDFA9hjR6pmXMj7ECY0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/41] 4.9.172-stable review Date: Tue, 30 Apr 2019 13:38:11 +0200 Message-Id: <20190430113524.451237916@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.172-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.172-rc1 X-KernelTest-Deadline: 2019-05-02T11:35+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.172 release. There are 41 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu 02 May 2019 11:34:41 AM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.172-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.172-rc1 Peter Oskolkov net: IP6 defrag: use rbtrees in nf_conntrack_reasm.c Peter Oskolkov net: IP6 defrag: use rbtrees for IPv6 defrag Florian Westphal ipv6: remove dependency of nf_defrag_ipv6 on ipv6 module Peter Oskolkov net: IP defrag: encapsulate rbtree defrag code into callable functions Eric Dumazet ipv6: frags: fix a lockdep false positive ZhangXiaoxu ipv4: set the tcp_min_rtt_wlen range from 0 to one day Vinod Koul net: stmmac: move stmmac_check_ether_addr() to driver probe Hangbin Liu team: fix possible recursive locking when add slaves Zhu Yanjun net: rds: exchange of 8K and 1M pool Erez Alfasi net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query Amit Cohen mlxsw: spectrum: Fix autoneg status in ethtool Eric Dumazet ipv4: add sanity checks in ipv4_link_failure() Greg Kroah-Hartman Revert "block/loop: Use global lock for ioctl() operation." Xin Long tipc: check link name with right length in tipc_nl_compat_link_set Xin Long tipc: check bearer name with right length in tipc_nl_compat_bearer_enable Yue Haibing fm10k: Fix a potential NULL pointer dereference Florian Westphal netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON Tetsuo Handa NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family. YueHaibing fs/proc/proc_sysctl.c: Fix a NULL pointer dereference Alexander Shishkin intel_th: gth: Fix an off-by-one in output unassigning Linus Torvalds slip: make slhc_free() silently accept an error pointer Xin Long tipc: handle the err returned from cmd header function Adalbert Lazăr vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock Kai-Heng Feng USB: Consolidate LPM checks to avoid enabling LPM twice Kai-Heng Feng USB: Add new USB LPM helpers Maarten Lankhorst drm/vc4: Fix compilation error reported by kbuild test bot Maarten Lankhorst drm/vc4: Fix memory leak during gpu reset. Ard Biesheuvel ARM: 8857/1: efi: enable CP15 DMB instructions before cleaning the cache Dirk Behme dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid Lucas Stach Input: synaptics-rmi4 - write config register values to the right offset NeilBrown sunrpc: don't mark uninitialised items as VALID. Trond Myklebust nfsd: Don't release the callback slot unless it was actually held Yan, Zheng ceph: fix ci->i_head_snapc leak Jeff Layton ceph: ensure d_name stability in ceph_dentry_hash() Xie XiuQi sched/numa: Fix a possible divide-by-zero Josh Collier IB/rdmavt: Fix frwr memory registration Peter Zijlstra trace: Fix preempt_enable_no_resched() abuse Aurelien Jarno MIPS: scall64-o32: Fix indirect syscall number load Wenwen Wang tracing: Fix a memory leak by early error exit in trace_pid_write() Frank Sorenson cifs: do not attempt cifs operation on smb2+ rename error Masahiro Yamada kbuild: simplify ld-option implementation ------------- Diffstat: Documentation/networking/ip-sysctl.txt | 1 + Makefile | 4 +- arch/arm/boot/compressed/head.S | 16 +- arch/mips/kernel/scall64-o32.S | 2 +- drivers/block/loop.c | 42 +-- drivers/block/loop.h | 1 + drivers/dma/sh/rcar-dmac.c | 4 +- drivers/gpu/drm/vc4/vc4_crtc.c | 2 +- drivers/hwtracing/intel_th/gth.c | 2 +- drivers/infiniband/sw/rdmavt/mr.c | 17 +- drivers/input/rmi4/rmi_f11.c | 2 +- drivers/net/ethernet/intel/fm10k/fm10k_main.c | 2 + .../net/ethernet/mellanox/mlx5/core/en_ethtool.c | 2 +- drivers/net/ethernet/mellanox/mlx5/core/port.c | 4 - drivers/net/ethernet/mellanox/mlxsw/spectrum.c | 4 +- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 4 +- drivers/net/slip/slhc.c | 2 +- drivers/net/team/team.c | 6 + drivers/usb/core/driver.c | 23 +- drivers/usb/core/hub.c | 16 +- drivers/usb/core/message.c | 3 +- drivers/usb/core/sysfs.c | 5 +- drivers/usb/core/usb.h | 10 +- fs/ceph/dir.c | 6 +- fs/ceph/mds_client.c | 9 + fs/ceph/snap.c | 7 +- fs/cifs/inode.c | 4 + fs/nfs/super.c | 3 +- fs/nfsd/nfs4callback.c | 8 +- fs/nfsd/state.h | 1 + fs/proc/proc_sysctl.c | 6 +- include/net/inet_frag.h | 16 +- include/net/ipv6.h | 29 -- include/net/ipv6_frag.h | 111 +++++++ kernel/sched/fair.c | 4 + kernel/trace/ring_buffer.c | 2 +- kernel/trace/trace.c | 5 +- net/bridge/netfilter/ebtables.c | 3 +- net/ieee802154/6lowpan/reassembly.c | 2 +- net/ipv4/inet_fragment.c | 293 +++++++++++++++++ net/ipv4/ip_fragment.c | 295 ++--------------- net/ipv4/route.c | 32 +- net/ipv4/sysctl_net_ipv4.c | 5 +- net/ipv6/netfilter/nf_conntrack_reasm.c | 273 +++++----------- net/ipv6/netfilter/nf_defrag_ipv6_hooks.c | 3 +- net/ipv6/reassembly.c | 361 ++++++--------------- net/openvswitch/conntrack.c | 1 + net/rds/ib_fmr.c | 11 + net/rds/ib_rdma.c | 3 - net/sunrpc/cache.c | 3 + net/tipc/netlink_compat.c | 24 +- net/vmw_vsock/virtio_transport_common.c | 22 +- scripts/Kbuild.include | 4 +- 53 files changed, 866 insertions(+), 854 deletions(-)