Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4463075ybx; Mon, 4 Nov 2019 13:50:48 -0800 (PST) X-Google-Smtp-Source: APXvYqxaptKZDNHFT9e+ukP9t6j59dM6WdZQgW4mg5C3P97zTsMwuArrBi1D+U7fGW16NJlu71a+ X-Received: by 2002:a17:906:488c:: with SMTP id v12mr25948333ejq.290.1572904247697; Mon, 04 Nov 2019 13:50:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572904247; cv=none; d=google.com; s=arc-20160816; b=gKZfoNRi1oIDHBxJtYbtUjKli89J1UB2A0Jqy85MvLC8BeexhAeSGpdGc8UGQ/BUfG xayhmwV05P94JLiv6L5xKudgfZEWOK8crFzCCCiecvXjPMizzuRX93p7ByEO1BDlD+Pk ym5MnpuFrJlVAXj9EPbvag+xtpF0oiXR7PC3XWYqqfI1M8Wt1B2bXDX6bbgYp13XCLCz 4igP/8wTyS/iCWVKu2kzfXkZH+l5CvgbymhKMNwEGz9QUvv2ivj7Qsa0wWkyRj0HX0LX VejhCr0QPGgIY1VH1nRFAkyqNN5zj+YqJ+yDxvGRcPYX6LP9lYXQrxrciaklF5djLjkL WutA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=h9mOxx1cO7f6X5MmM7iF9PZQdV0Gkbal+SOFdOZBbMk=; b=fS8iX95zOludr9mVbwHPIpgj/WlUYvC+Pi72xfWat6zVXC6P6FpIvaK7RPQf0XPzpI e1uTPOwwTCKbVTyVW9h7mvaMmEWfiTs/AGQ1uStDTtMJyTF0TFBEf0XksRYdtIBk3eaa p8bqenvni8bfB6Zf6sTw9tXkrs9zeLWDuHb0cRnS98EMuQvjXr6MZODti24bFRhdXwpe agbg/K21ES866B+EGngqd8vinRPKPHdesNh4bbvN4LQLLBUkXU/0MtyDJp07PgetRkiY kgQUV1wiPqZ7nUdZ7aAH726Df8xNUFSPMOHURROn06fTffQvJjsu+dOSi6vOBiEFXog2 /FEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=D4UMJqdC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g40si8268112edb.369.2019.11.04.13.50.23; Mon, 04 Nov 2019 13:50:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=D4UMJqdC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730220AbfKDVtB (ORCPT + 99 others); Mon, 4 Nov 2019 16:49:01 -0500 Received: from mail.kernel.org ([198.145.29.99]:39924 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730192AbfKDVs6 (ORCPT ); Mon, 4 Nov 2019 16:48:58 -0500 Received: from localhost (6.204-14-84.ripe.coltfrance.com [84.14.204.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 984322184C; Mon, 4 Nov 2019 21:48:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572904137; bh=gYgPkNicXDhzGRKj0i+64NsZlmRANvyABe7/wQWA+wg=; h=From:To:Cc:Subject:Date:From; b=D4UMJqdCeV7q4eqk+FQrJLsnUL8MMzaSIM+pIWjKZPJKMkBIpQhHOcWubSnR8dl+V zHKCMRicaFnGAElFeSnaa3H//fv+OneTPE4I1ARfm5065sKx959jr9SBwW2ovxA5jB W1L2NrGDmCm7x2XgMwTKntC4JUse7JWtIo46zsU8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.4 00/46] 4.4.199-stable review Date: Mon, 4 Nov 2019 22:44:31 +0100 Message-Id: <20191104211830.912265604@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.199-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.199-rc1 X-KernelTest-Deadline: 2019-11-06T21:19+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.4.199 release. There are 46 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed 06 Nov 2019 09:14:04 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.199-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.199-rc1 Vratislav Bendel xfs: Correctly invert xfs_buftarg LRU isolation logic Xin Long sctp: not bind the socket in sctp_connect Xin Long sctp: fix the issue that flags are ignored when using kernel_connect Eric Dumazet sch_netem: fix rcu splat in netem_enqueue() Valentin Vidic net: usb: sr9800: fix uninitialized local variable Eric Dumazet bonding: fix potential NULL deref in bond_update_slave_arr Eric Biggers llc: fix sk_buff leak in llc_conn_service() Eric Biggers llc: fix sk_buff leak in llc_sap_state_process() Laura Abbott rtlwifi: Fix potential overflow on P2P code Yihui ZENG s390/cmm: fix information leak in cmm_timeout_handler() Markus Theil nl80211: fix validation of mesh path nexthop Michał Mirosław HID: fix error message in hid_open_report() Alan Stern HID: Fix assumption that devices have inputs Johan Hovold USB: serial: whiteheat: fix line-speed endianness Johan Hovold USB: serial: whiteheat: fix potential slab corruption Johan Hovold USB: ldusb: fix control-message timeout Johan Hovold USB: ldusb: fix ring-buffer locking Alan Stern USB: gadget: Reject endpoints with 0 maxpacket value Alan Stern UAS: Revert commit 3ae62a42090f ("UAS: fix alignment of scatter/gather segments") Takashi Sakamoto ALSA: bebob: Fix prototype of helper function to return negative value Miklos Szeredi fuse: truncate pending writes on O_TRUNC Miklos Szeredi fuse: flush dirty data/metadata before non-truncate setattr Hui Peng ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe() Mika Westerberg thunderbolt: Use 32-bit writes when writing ring producer/consumer Dan Carpenter USB: legousbtower: fix a signedness bug in tower_probe() Petr Mladek tracing: Initialize iter->seq after zeroing in tracing_read_pipe() Chuck Lever NFSv4: Fix leak of clp->cl_acceptor string Thomas Bogendoerfer MIPS: fw: sni: Fix out of bounds init of o32 stack Jia-Ju Bai fs: ocfs2: fix a possible null-pointer dereference in ocfs2_info_scan_inode_alloc() Jia-Ju Bai fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry() Dave Young efi/x86: Do not clean dummy variable in kexec path Lukas Wunner efi/cper: Fix endianness of PCIe class code Adam Ford serial: mctrl_gpio: Check for NULL pointer Austin Kim fs: cifs: mute -Wunused-const-variable message Bart Van Assche RDMA/iwcm: Fix a lock inversion issue Steve MacLean perf map: Fix overlapped map handling Pascal Bouwmann iio: fix center temperature of bmc150-accel-core Kees Cook exec: load_script: Do not exec truncated interpreter path Jan-Marek Glogowski usb: handle warm-reset port requests on hub resume Brian Norris scripts/setlocalversion: Improve -dirty check with git-status --no-optional-locks Kan Liang x86/cpu: Add Atom Tremont (Jacobsville) Phil Elwell sc16is7xx: Fix for "Unexpected interrupt: 8" Kent Overstreet dm: Use kzalloc for all structs with embedded biosets/mempools Mikulas Patocka dm snapshot: rework COW throttling to fix deadlock Mikulas Patocka dm snapshot: introduce account_start_copy() and account_end_copy() Mikulas Patocka dm snapshot: use mutex instead of rw_semaphore ------------- Diffstat: Makefile | 4 +- arch/mips/fw/sni/sniprom.c | 2 +- arch/s390/mm/cmm.c | 12 +- arch/x86/include/asm/intel-family.h | 3 +- arch/x86/platform/efi/efi.c | 3 - drivers/firmware/efi/cper.c | 2 +- drivers/hid/hid-axff.c | 11 +- drivers/hid/hid-core.c | 7 +- drivers/hid/hid-dr.c | 12 +- drivers/hid/hid-emsff.c | 12 +- drivers/hid/hid-gaff.c | 12 +- drivers/hid/hid-holtekff.c | 12 +- drivers/hid/hid-lg2ff.c | 12 +- drivers/hid/hid-lg3ff.c | 11 +- drivers/hid/hid-lg4ff.c | 11 +- drivers/hid/hid-lgff.c | 11 +- drivers/hid/hid-sony.c | 12 +- drivers/hid/hid-tmff.c | 12 +- drivers/hid/hid-zpff.c | 12 +- drivers/iio/accel/bmc150-accel-core.c | 2 +- drivers/infiniband/core/cma.c | 3 +- drivers/md/dm-bio-prison.c | 2 +- drivers/md/dm-io.c | 2 +- drivers/md/dm-kcopyd.c | 2 +- drivers/md/dm-region-hash.c | 2 +- drivers/md/dm-snap.c | 178 ++++++++++++++++++++---------- drivers/md/dm-thin.c | 2 +- drivers/net/bonding/bond_main.c | 2 +- drivers/net/usb/sr9800.c | 2 +- drivers/net/wireless/ath/ath6kl/usb.c | 8 ++ drivers/net/wireless/realtek/rtlwifi/ps.c | 6 + drivers/thunderbolt/nhi.c | 22 +++- drivers/tty/serial/sc16is7xx.c | 28 +++++ drivers/tty/serial/serial_mctrl_gpio.c | 3 + drivers/usb/core/hub.c | 7 ++ drivers/usb/misc/ldusb.c | 6 +- drivers/usb/misc/legousbtower.c | 2 +- drivers/usb/serial/whiteheat.c | 13 ++- drivers/usb/serial/whiteheat.h | 2 +- drivers/usb/storage/uas.c | 20 ---- fs/binfmt_script.c | 57 ++++++++-- fs/cifs/netmisc.c | 4 - fs/fuse/dir.c | 13 +++ fs/fuse/file.c | 10 +- fs/nfs/nfs4proc.c | 1 + fs/ocfs2/ioctl.c | 2 +- fs/ocfs2/xattr.c | 56 ++++------ fs/xfs/xfs_buf.c | 2 +- include/linux/usb/gadget.h | 10 ++ include/net/llc_conn.h | 2 +- include/net/sch_generic.h | 5 + include/net/sctp/sctp.h | 2 + kernel/trace/trace.c | 1 + net/llc/llc_c_ac.c | 8 +- net/llc/llc_conn.c | 32 ++---- net/llc/llc_s_ac.c | 12 +- net/llc/llc_sap.c | 23 ++-- net/sched/sch_netem.c | 2 +- net/sctp/ipv6.c | 2 +- net/sctp/protocol.c | 2 +- net/sctp/socket.c | 55 ++++----- net/wireless/nl80211.c | 3 +- scripts/setlocalversion | 12 +- sound/firewire/bebob/bebob_stream.c | 3 +- tools/perf/util/map.c | 3 + 65 files changed, 532 insertions(+), 277 deletions(-)