Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7377537yba; Thu, 2 May 2019 08:51:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqx3I78/JGR2ESHOpxLpBER3/fTZCyjkTd5HIaK8sGDhdYMAPPkWLCZli/O7oxDTd5rqa+ap X-Received: by 2002:a63:e10b:: with SMTP id z11mr4699687pgh.46.1556812293115; Thu, 02 May 2019 08:51:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556812293; cv=none; d=google.com; s=arc-20160816; b=wOJAKS97bP+3PZSx1pr6eaF7pknfgeX5YvSMfe75MHE6aJwMhU9Ym2Nafg8qhGKbqo bCzb2MRmyKFPY6Ys+xwG1rYak0KhinwBhps/KmYlzgM7ykuqEfNkr7AsqBQ3ovLq+fGI g73jqu/Z3SIyzd8pnJL01LAhrqlIEVzdBjJQJOlPytVoQ9+JuNn3PCV+DPuSSCJazTtt 1AhPVtyp4lnDRaGajsWXwYH/bNmSEiIfZ7jEEA4OYnyuQuXlvSNToQIfFiZXnzP6oF+g kEAGo2i6nXSEDvRboKIENJKwlKRVTi8bvfiZ2cU/Gr2ngbbhoKWBKS/575O3Tv4pSaTA RSlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=R7kVY6tmH6XhSFYvcn+O5Ux+dFm5AbrXRYi6anrTuDo=; b=I2pSk9YNLXvpdRlk8RnhGEjxt7V2+o6Y7tEP9YnKFONwiRkVF/YxbFfaTZk0qofgqM ufgxU7brKcztG05BrD0ILwAdTbZxDQnqUXj4n2QP7kLMiGFsuc/a5qsooCLHZnef2e/z g28KkBvZhQQw+jQI8AU3nDQ5+ODMT79x8BEAlVRU4VCSiZoCWXIUvtZmjGmZqkfaqfjK LWdIXdDJcEyGDhn5J7BOod3N4+Yz86h5rPGk+L0zEvn+AKbZ+HkihKyZN2zEcDCq8jbM 3kT5qWTSrcvRiMgImCKvqRSKEMAjZE/XvvMJwQxcT55Ru0zWhBlOFGKWSzMTXGWmKGGv nprQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HjpOZF+W; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y16si30486719pga.34.2019.05.02.08.51.17; Thu, 02 May 2019 08:51:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HjpOZF+W; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726580AbfEBPWW (ORCPT + 99 others); Thu, 2 May 2019 11:22:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:37560 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726558AbfEBPWT (ORCPT ); Thu, 2 May 2019 11:22:19 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 79E4620675; Thu, 2 May 2019 15:22:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556810538; bh=ZdkIgil3bDGk0PV79nCsXlQ1XE1jRu/b1f7xqdy9RP0=; h=From:To:Cc:Subject:Date:From; b=HjpOZF+WR4eBr2m6/7pFZvBjEeZQXTu8aHB5Bblo1IBrCsgo9kNq6zoFs/KvtgOLH Yq+o2lg7DeH+bYKAxThzcwaDy90Ov4UWSXvB9Y0WkQRiycg6XRI8JGNF0HFrIlY6bK U40ItY8WMB32qP+XeySTYHahd1ogwCQP+PHtFe/E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/32] 4.9.173-stable review Date: Thu, 2 May 2019 17:20:46 +0200 Message-Id: <20190502143314.649935114@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.173-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.173-rc1 X-KernelTest-Deadline: 2019-05-04T14:33+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.173 release. There are 32 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat 04 May 2019 02:32:02 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.173-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.173-rc1 Alex Williamson vfio/type1: Limit DMA mappings per container Kangjie Lu leds: pca9532: fix a potential NULL pointer dereference Changbin Du kconfig/[mn]conf: handle backspace (^H) key Geert Uytterhoeven gpio: of: Fix of_gpiochip_add() error path raymond pang libata: fix using DMA buffers on stack Steffen Maier scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN Al Viro ceph: fix use-after-free on symlink traversal Mukesh Ojha usb: u132-hcd: fix resource leak Kangjie Lu scsi: qla4xxx: fix a potential NULL pointer dereference Wen Yang net: ethernet: ti: fix possible object reference leak Wen Yang net: ibm: fix possible object reference leak Wen Yang net: xilinx: fix possible object reference leak Trond Myklebust NFS: Fix a typo in nfs_init_timeout_values() Dan Carpenter staging: rtl8712: uninitialized memory in read_bbreg_hdl() Lukas Wunner net: ks8851: Set initial carrier state to down Lukas Wunner net: ks8851: Delay requesting IRQ until opened Lukas Wunner net: ks8851: Reassert reset pin if chip ID check fails Lukas Wunner net: ks8851: Dequeue RX packets explicitly Marco Felsch ARM: dts: pfla02: increase phy reset duration Guido Kiener usb: gadget: net2272: Fix net2272_dequeue() Guido Kiener usb: gadget: net2280: Fix net2280_dequeue() Guido Kiener usb: gadget: net2280: Fix overrun of OUT messages Petr Štetiar serial: ar933x_uart: Fix build failure with disabled console Mao Wenan sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() Xin Long netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING Pablo Neira Ayuso netfilter: nft_set_rbtree: check for inactive element after flag mismatch Aditya Pakki qlcnic: Avoid potential NULL pointer dereference Martin Schwidefsky s390: limit brk randomization to 32MB Helen Koike ARM: dts: bcm283x: Fix hdmi hpd gpio pull Hans Verkuil media: vivid: check if the cec_adapter is valid Gustavo A. R. Silva usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set Alexander Kappner usbnet: ipheth: prevent TX queue timeouts when device not ready ------------- Diffstat: Makefile | 4 +-- arch/arm/boot/dts/bcm2835-rpi-b-rev2.dts | 2 +- arch/arm/boot/dts/imx6qdl-phytec-pfla02.dtsi | 1 + arch/s390/include/asm/elf.h | 11 ++++--- drivers/ata/libata-zpodd.c | 34 ++++++++++++++------ drivers/gpio/gpiolib-of.c | 8 ++++- drivers/leds/leds-pca9532.c | 8 +++-- drivers/media/platform/vivid/vivid-vid-common.c | 3 +- drivers/net/ethernet/ibm/ehea/ehea_main.c | 1 + drivers/net/ethernet/micrel/ks8851.c | 36 +++++++++++----------- .../net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c | 2 ++ drivers/net/ethernet/ti/netcp_ethss.c | 8 +++-- drivers/net/ethernet/xilinx/xilinx_axienet_main.c | 2 ++ drivers/net/usb/ipheth.c | 33 ++++++++++++++------ drivers/s390/scsi/zfcp_fc.c | 21 ++++++++++--- drivers/scsi/qla4xxx/ql4_os.c | 2 ++ drivers/staging/rtl8712/rtl8712_cmd.c | 10 +----- drivers/staging/rtl8712/rtl8712_cmd.h | 2 +- drivers/tty/serial/ar933x_uart.c | 24 +++++---------- drivers/tty/serial/sc16is7xx.c | 12 ++++++-- drivers/usb/gadget/udc/net2272.c | 1 + drivers/usb/gadget/udc/net2280.c | 8 ++--- drivers/usb/host/u132-hcd.c | 3 ++ drivers/vfio/vfio_iommu_type1.c | 14 +++++++++ fs/ceph/inode.c | 2 +- fs/nfs/client.c | 2 +- net/bridge/br_netfilter_hooks.c | 1 + net/bridge/br_netfilter_ipv6.c | 2 ++ net/netfilter/nft_set_rbtree.c | 7 ++--- scripts/kconfig/lxdialog/inputbox.c | 3 +- scripts/kconfig/nconf.c | 2 +- scripts/kconfig/nconf.gui.c | 3 +- 32 files changed, 176 insertions(+), 96 deletions(-)