Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3369991ybp; Sun, 6 Oct 2019 10:26:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqwAUmlOtm1GmXMNvW7f5G36V3D2Gur8vdXleKTU0IPgcrnpSqPQs0tBHK0386neJCWCJYmA X-Received: by 2002:a17:906:34d0:: with SMTP id h16mr20872967ejb.190.1570382788741; Sun, 06 Oct 2019 10:26:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570382788; cv=none; d=google.com; s=arc-20160816; b=rYUY9QV0xjIAMquF8f/LpxxUuxddFAeIl80w7YzsFv2h0KJkahLcnee/Tt9YMRAqby 0o3pTdKUwD25uM2XuMnj9pNoDfPJmvSobXoLtm6Kur1uksADhEHwFRagBbAGrAUgbQJX qbfH3d/OU/G7hu5Uwh3AW5pJ2VBbClm9r0UfOKgPq73HH0yoqc9m8elC3os+HDIfAJLy l0rPyGUosE+9rUDiZN39h82nsWZ2tLZFx7oK7Z6YXXmEyHxZGBVz1CsiYdxomJcwfhAz zu+P782k7YpcGUU6xKAud+AuoVFwCocsUzBTnpO2cE0xVSoFD3yxL7OC313O4T46FAGu /mlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=A3u1BLjyUNHzIbxGF7m1hZFmoR4oXhgptIMTjQ7IIFc=; b=HCyoqNSaP/yQIY7u2tFysk+g+C+sXkLwZsC9xwUYEiL1T3tt/PuvMxvA6cJvZzoVqo rAN0VPnJYKBPu1ObDtH7VKH2XXdHEoUkoZ0ylBQoeKhBo54zSlmB5X1R/5AZ3yy36cJj HMPsOeGZUJ5DncShs4RHXeO9NGBv/Urdr08CnB9c9wakskITBY8L410UhSM/1jWbsNpx 7L6laPpmwmzGjqqvKxtG74BoIBjXcDYX7WzIap3bTEUOW4GAHhyxnn0ALfFNel4eRlT6 49oc5FAfU6uNr2IzbhRldLLyEX+YaTiQ6IZ9P4GIf8E3kqQO9Hptdf6ojA+z56ARy/Pg TK5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=COKR0ZMU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s41si7613175edm.412.2019.10.06.10.26.04; Sun, 06 Oct 2019 10:26:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=COKR0ZMU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727127AbfJFRYc (ORCPT + 99 others); Sun, 6 Oct 2019 13:24:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:49390 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727899AbfJFRY3 (ORCPT ); Sun, 6 Oct 2019 13:24:29 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3B92E2077B; Sun, 6 Oct 2019 17:24:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570382667; bh=jYcUuOoGTrkAPl3WEvq1A1MFB5r3phaBlG9JylAIb1k=; h=From:To:Cc:Subject:Date:From; b=COKR0ZMUVEIzk+9G+zQ3zkbSc9JyH5GY7lWR2RHPThjpgAq3/Q6hLDU07HllvpYkQ 8bghNzJwEJ50YQ33aH40v+wxsqv6VpIwXAFumuh5XBBJ41OLO05OMbzoV4CAiDEfeW 73B52Z4Uy/VmcUN5PVgSslebanXxjEBgMooWaaas= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/47] 4.9.196-stable review Date: Sun, 6 Oct 2019 19:20:47 +0200 Message-Id: <20191006172016.873463083@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.196-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.196-rc1 X-KernelTest-Deadline: 2019-10-08T17:20+00:00 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.196 release. There are 47 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Tue 08 Oct 2019 05:19:59 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.196-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.196-rc1 Andrey Konovalov NFC: fix attrs checks in netlink interface Eric Biggers smack: use GFP_NOFS while holding inode_smack::smk_lock Jann Horn Smack: Don't ignore other bprm->unsafe flags if LSM_UNSAFE_PTRACE is set David Ahern ipv6: Handle missing host route in __ipv6_ifa_notify Eric Dumazet sch_cbq: validate TCA_CBQ_WRROPT to avoid crash Dongli Zhang xen-netfront: do not use ~0U as error return value for xennet_fill_frags() Dotan Barak net/rds: Fix error handling in rds_ib_add_one() Eric Dumazet sch_dsmark: fix potential NULL deref in dsmark_init() Reinhard Speyerer qmi_wwan: add support for Cinterion CLS8 devices Eric Dumazet nfc: fix memory leak in llcp_sock_bind() Martin KaFai Lau net: Unpublish sk from sk_reuseport_cb before call_rcu Navid Emamdoost net: qlogic: Fix memory leak in ql_alloc_large_buffers Paolo Abeni net: ipv4: avoid mixed n_redirects and rate_tokens usage Eric Dumazet ipv6: drop incoming packets having a v4mapped source address Johan Hovold hso: fix NULL-deref on tty open Vishal Kulkarni cxgb4:Fix out-of-bounds MSI-X info array access Martijn Coenen ANDROID: binder: synchronize_rcu() when using POLLFREE. Martijn Coenen ANDROID: binder: remove waitqueue when thread exits. Nicolas Boichat kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K Changwei Ge ocfs2: wait for recovering done after direct unlock request David Howells hypfs: Fix error number left in struct pointer member OGAWA Hirofumi fat: work around race with userspace's read via blockdev while mounting Mike Rapoport ARM: 8903/1: ensure that usable memory in bank 0 starts from a PMD-aligned address Jia-Ju Bai security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb() Joao Moreno HID: apple: Fix stuck function keys when using FN Will Deacon ARM: 8898/1: mm: Don't treat faults reported from cache maintenance as writes Nishka Dasgupta PCI: tegra: Fix OF node reference leak Kai-Heng Feng mfd: intel-lpss: Remove D3cold delay Nathan Chancellor MIPS: tlbex: Explicitly cast _PAGE_NO_EXEC to a boolean Bart Van Assche scsi: core: Reduce memory required for SCSI logging Eugen Hristev clk: at91: select parent if main oscillator or bypass is enabled Arnd Bergmann arm64: fix unreachable code issue with cmpxchg Nathan Lynch powerpc/pseries: correctly track irq state in default idle Nicholas Piggin powerpc/64s/exception: machine check use correct cfar for late handler Jean Delvare drm/amdgpu/si: fix ASIC tests hexin vfio_pci: Restore original state on release Sowjanya Komatineni pinctrl: tegra: Fix write barrier placement in pmx_writel Nathan Lynch powerpc/pseries/mobility: use cond_resched when updating device tree Christophe Leroy powerpc/futex: Fix warning: 'oldval' may be used uninitialized in this function Nathan Lynch powerpc/rtas: use device model APIs and serialization during LPM Stephen Boyd clk: sirf: Don't reference clk_init_data after registration Nathan Huckleberry clk: qoriq: Fix -Wunused-const-variable Corey Minyard ipmi_si: Only schedule continuously in the thread in maintenance mode Jia-Ju Bai gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() KyleMahlkuch drm/radeon: Fix EEH during kexec Marko Kohtala video: ssd1307fb: Start page range at page_offset Andrey Smirnov drm/bridge: tc358767: Increase AUX transfer length limit ------------- Diffstat: Makefile | 4 +-- arch/arm/mm/fault.c | 4 +-- arch/arm/mm/fault.h | 1 + arch/arm/mm/mmu.c | 16 +++++++++ arch/arm64/include/asm/cmpxchg.h | 6 ++-- arch/mips/mm/tlbex.c | 2 +- arch/powerpc/include/asm/futex.h | 3 +- arch/powerpc/kernel/exceptions-64s.S | 4 +++ arch/powerpc/kernel/rtas.c | 11 ++++-- arch/powerpc/platforms/pseries/mobility.c | 9 +++++ arch/powerpc/platforms/pseries/setup.c | 3 ++ arch/s390/hypfs/inode.c | 9 ++--- drivers/android/binder.c | 26 +++++++++++++- drivers/char/ipmi/ipmi_si_intf.c | 24 ++++++++++--- drivers/clk/at91/clk-main.c | 10 ++++-- drivers/clk/clk-qoriq.c | 2 +- drivers/clk/sirf/clk-common.c | 12 ++++--- drivers/gpu/drm/amd/amdgpu/si.c | 6 ++-- drivers/gpu/drm/bridge/tc358767.c | 2 +- drivers/gpu/drm/radeon/radeon_connectors.c | 2 +- drivers/gpu/drm/radeon/radeon_drv.c | 8 +++++ drivers/hid/hid-apple.c | 49 +++++++++++++++----------- drivers/mfd/intel-lpss-pci.c | 2 ++ drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c | 9 +++-- drivers/net/ethernet/qlogic/qla3xxx.c | 1 + drivers/net/usb/hso.c | 12 ++++--- drivers/net/usb/qmi_wwan.c | 1 + drivers/net/xen-netfront.c | 17 ++++----- drivers/pci/host/pci-tegra.c | 22 ++++++++---- drivers/pinctrl/tegra/pinctrl-tegra.c | 4 ++- drivers/scsi/scsi_logging.c | 48 ++----------------------- drivers/vfio/pci/vfio_pci.c | 17 ++++++--- drivers/video/fbdev/ssd1307fb.c | 2 +- fs/fat/dir.c | 13 +++++-- fs/fat/fatent.c | 3 ++ fs/ocfs2/dlm/dlmunlock.c | 23 +++++++++--- include/scsi/scsi_dbg.h | 2 -- lib/Kconfig.debug | 2 +- net/core/sock.c | 11 ++++-- net/ipv4/route.c | 5 ++- net/ipv6/addrconf.c | 17 ++++++--- net/ipv6/ip6_input.c | 10 ++++++ net/nfc/llcp_sock.c | 7 +++- net/nfc/netlink.c | 6 ++-- net/rds/ib.c | 6 ++-- net/sched/sch_cbq.c | 27 +++++++++++--- net/sched/sch_dsmark.c | 2 ++ security/smack/smack_access.c | 4 +-- security/smack/smack_lsm.c | 7 ++-- 49 files changed, 328 insertions(+), 165 deletions(-)