Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4466199ybx; Mon, 4 Nov 2019 13:54:22 -0800 (PST) X-Google-Smtp-Source: APXvYqzkPSDRZQcbjBBG0iPLWrdRDj5INWGIEQE+EDd6N5eqCIqaZEhkN/1HoB4diYwICwcCbRxN X-Received: by 2002:a05:6402:602:: with SMTP id n2mr11539250edv.23.1572904462016; Mon, 04 Nov 2019 13:54:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572904462; cv=none; d=google.com; s=arc-20160816; b=jD8DrI7rqC65zL3wbVlmbJPeZuJWan65hBf0mn/4i/61CLEthliH9gGvNHHPOKxtgs EdIQzRatGN+hEmlunJQjQp2xxnpGK2wOFULXEIh6uuhjQwbw1kNCdeHE0obXZNhuyNI1 2REBLdYeG1OAosYSudoo6yWUi3cDewMe4AG9r/oiRBNtfYOW3Vp1dbEZkYQnucSuVdGU xRGO2xBndO436JIBLL9a5t3AD1Lub43lgumZvD6R7DoAH0X1L5qrSkh5VGayWWByEs7u IZAC13ScIDX1zdSk3bahjzTmAGsXfqP/NvNkAHb3J6QQ6s9CgBO7S/iavKCZ8T+CMopN 2dsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=QgaijddNIheHa4bFz/KlkfTWY4NKr9pQ4bNh4dWmcas=; b=lFDF+1MQ3vSKOa4SXQqj8WmMn8VRCk9OxTN/TueQxyQCQlVG1zLtDvDZ2IUyHPoK7V ChwaYnGGev4F+WqYAx4sOxSWpgCKd28Io2G5cAzjXFsMDWwM7a8OJUba5xJDTJvRX9i/ OmuEXvBe9H3GDNc3YAqOzBptIDEtjpjY9iVHJ2jRUja5p2aJ8cxXSD8OBigVFrqY+GE4 DrKhoiOguOfSjun7t6wgZnmDFMdGC6Yr7gNUmnwbaiRS8m3IxwWICkKejcBlFiVoxzqA z76ZkfltYjoAXqexXAchmpI9dE9KMm9C0Sq72VkMkbU6ItvFyZSzJD6uc5yLTudD2NAk sU7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KZuv5B5b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t52si7870384edd.3.2019.11.04.13.53.58; Mon, 04 Nov 2019 13:54:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KZuv5B5b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387705AbfKDVu0 (ORCPT + 99 others); Mon, 4 Nov 2019 16:50:26 -0500 Received: from mail.kernel.org ([198.145.29.99]:42364 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387670AbfKDVuU (ORCPT ); Mon, 4 Nov 2019 16:50:20 -0500 Received: from localhost (6.204-14-84.ripe.coltfrance.com [84.14.204.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 75E40214D9; Mon, 4 Nov 2019 21:50:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572904218; bh=bDMbPI+TF/BBeyhCFQW66zMJ9kE9WoYr1tZ9qBsQlf8=; h=From:To:Cc:Subject:Date:From; b=KZuv5B5bw+wUSXl8C3T33L+ENHEsUVjSSOi22nF0tNqepQlrFlbHndHvV3UaubMb8 zzRKEv+l5Oi8NWmkJvY3hiccOGvd3GXG6T9Sge2i9+0oD3lKqsh8rbgMeEW7veUtOZ XFtPCUvbXpmCuaFH56f3XpqPYA94gTaEDCN44UI0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/62] 4.9.199-stable review Date: Mon, 4 Nov 2019 22:44:22 +0100 Message-Id: <20191104211901.387893698@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.199-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.199-rc1 X-KernelTest-Deadline: 2019-11-06T21:20+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.199 release. There are 62 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed 06 Nov 2019 09:14:04 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.199-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.199-rc1 Takashi Iwai ALSA: timer: Fix mutex deadlock at releasing card Takashi Iwai ALSA: timer: Simplify error path in snd_timer_open() Takashi Iwai ALSA: timer: Limit max instances per timer Takashi Iwai ALSA: timer: Follow standard EXPORT_SYMBOL() declarations Vratislav Bendel xfs: Correctly invert xfs_buftarg LRU isolation logic Xin Long sctp: not bind the socket in sctp_connect Xin Long sctp: fix the issue that flags are ignored when using kernel_connect Eric Dumazet sch_netem: fix rcu splat in netem_enqueue() Valentin Vidic net: usb: sr9800: fix uninitialized local variable Eric Dumazet bonding: fix potential NULL deref in bond_update_slave_arr Eric Biggers llc: fix sk_buff leak in llc_conn_service() Eric Biggers llc: fix sk_buff leak in llc_sap_state_process() Tony Lindgren dmaengine: cppi41: Fix cppi41_dma_prep_slave_sg() when idle Laura Abbott rtlwifi: Fix potential overflow on P2P code Yihui ZENG s390/cmm: fix information leak in cmm_timeout_handler() Markus Theil nl80211: fix validation of mesh path nexthop Michał Mirosław HID: fix error message in hid_open_report() Alan Stern HID: Fix assumption that devices have inputs Hans de Goede HID: i2c-hid: add Trekstor Primebook C11B to descriptor override Johan Hovold USB: serial: whiteheat: fix line-speed endianness Johan Hovold USB: serial: whiteheat: fix potential slab corruption Johan Hovold USB: ldusb: fix control-message timeout Johan Hovold USB: ldusb: fix ring-buffer locking Alan Stern usb-storage: Revert commit 747668dbc061 ("usb-storage: Set virt_boundary_mask to avoid SG overflows") Alan Stern USB: gadget: Reject endpoints with 0 maxpacket value Alan Stern UAS: Revert commit 3ae62a42090f ("UAS: fix alignment of scatter/gather segments") Takashi Sakamoto ALSA: bebob: Fix prototype of helper function to return negative value Miklos Szeredi fuse: truncate pending writes on O_TRUNC Miklos Szeredi fuse: flush dirty data/metadata before non-truncate setattr Hui Peng ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe() Mika Westerberg thunderbolt: Use 32-bit writes when writing ring producer/consumer Dan Carpenter USB: legousbtower: fix a signedness bug in tower_probe() Petr Mladek tracing: Initialize iter->seq after zeroing in tracing_read_pipe() Christian Borntraeger s390/uaccess: avoid (false positive) compiler warnings Chuck Lever NFSv4: Fix leak of clp->cl_acceptor string Thomas Bogendoerfer MIPS: fw: sni: Fix out of bounds init of o32 stack Jia-Ju Bai fs: ocfs2: fix a possible null-pointer dereference in ocfs2_info_scan_inode_alloc() Jia-Ju Bai fs: ocfs2: fix a possible null-pointer dereference in ocfs2_write_end_nolock() Jia-Ju Bai fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry() Jia Guo ocfs2: clear zero in unaligned direct IO Dave Young efi/x86: Do not clean dummy variable in kexec path Lukas Wunner efi/cper: Fix endianness of PCIe class code Adam Ford serial: mctrl_gpio: Check for NULL pointer Austin Kim fs: cifs: mute -Wunused-const-variable message Thierry Reding gpio: max77620: Use correct unit for debounce times Bart Van Assche RDMA/iwcm: Fix a lock inversion issue Connor Kuehl staging: rtl8188eu: fix null dereference when kzalloc fails Andi Kleen perf jevents: Fix period for Intel fixed counters Steve MacLean perf map: Fix overlapped map handling Pascal Bouwmann iio: fix center temperature of bmc150-accel-core Kees Cook exec: load_script: Do not exec truncated interpreter path Sam Ravnborg rtc: pcf8523: set xtal load capacitance from DT Jan-Marek Glogowski usb: handle warm-reset port requests on hub resume Brian Norris scripts/setlocalversion: Improve -dirty check with git-status --no-optional-locks Hans de Goede HID: i2c-hid: Add Odys Winbook 13 to descriptor override Kan Liang x86/cpu: Add Atom Tremont (Jacobsville) Julian Sax HID: i2c-hid: add Direkt-Tek DTLAPY133-1 to descriptor override Phil Elwell sc16is7xx: Fix for "Unexpected interrupt: 8" Kent Overstreet dm: Use kzalloc for all structs with embedded biosets/mempools Mikulas Patocka dm snapshot: rework COW throttling to fix deadlock Mikulas Patocka dm snapshot: introduce account_start_copy() and account_end_copy() Mikulas Patocka dm snapshot: use mutex instead of rw_semaphore ------------- Diffstat: Makefile | 4 +- arch/mips/fw/sni/sniprom.c | 2 +- arch/s390/include/asm/uaccess.h | 4 +- arch/s390/mm/cmm.c | 12 +- arch/x86/include/asm/intel-family.h | 3 +- arch/x86/platform/efi/efi.c | 3 - drivers/dma/cppi41.c | 21 +++- drivers/firmware/efi/cper.c | 2 +- drivers/gpio/gpio-max77620.c | 6 +- drivers/hid/hid-axff.c | 11 +- drivers/hid/hid-core.c | 7 +- drivers/hid/hid-dr.c | 12 +- drivers/hid/hid-emsff.c | 12 +- drivers/hid/hid-gaff.c | 12 +- drivers/hid/hid-holtekff.c | 12 +- drivers/hid/hid-lg2ff.c | 12 +- drivers/hid/hid-lg3ff.c | 11 +- drivers/hid/hid-lg4ff.c | 11 +- drivers/hid/hid-lgff.c | 11 +- drivers/hid/hid-logitech-hidpp.c | 11 +- drivers/hid/hid-sony.c | 12 +- drivers/hid/hid-tmff.c | 12 +- drivers/hid/hid-zpff.c | 12 +- drivers/hid/i2c-hid/i2c-hid-dmi-quirks.c | 35 ++++++ drivers/iio/accel/bmc150-accel-core.c | 2 +- drivers/infiniband/core/cma.c | 3 +- drivers/md/dm-bio-prison.c | 2 +- drivers/md/dm-io.c | 2 +- drivers/md/dm-kcopyd.c | 2 +- drivers/md/dm-region-hash.c | 2 +- drivers/md/dm-snap.c | 178 +++++++++++++++++++--------- drivers/md/dm-thin.c | 2 +- drivers/net/bonding/bond_main.c | 2 +- drivers/net/usb/sr9800.c | 2 +- drivers/net/wireless/ath/ath6kl/usb.c | 8 ++ drivers/net/wireless/realtek/rtlwifi/ps.c | 6 + drivers/rtc/rtc-pcf8523.c | 28 +++-- drivers/staging/rtl8188eu/os_dep/usb_intf.c | 6 +- drivers/thunderbolt/nhi.c | 22 +++- drivers/tty/serial/sc16is7xx.c | 28 +++++ drivers/tty/serial/serial_mctrl_gpio.c | 3 + drivers/usb/core/hub.c | 7 ++ drivers/usb/gadget/udc/core.c | 11 ++ drivers/usb/misc/ldusb.c | 6 +- drivers/usb/misc/legousbtower.c | 2 +- drivers/usb/serial/whiteheat.c | 13 +- drivers/usb/serial/whiteheat.h | 2 +- drivers/usb/storage/scsiglue.c | 10 -- drivers/usb/storage/uas.c | 20 ---- fs/binfmt_script.c | 57 +++++++-- fs/cifs/netmisc.c | 4 - fs/fuse/dir.c | 13 ++ fs/fuse/file.c | 10 +- fs/nfs/nfs4proc.c | 1 + fs/ocfs2/aops.c | 25 +++- fs/ocfs2/ioctl.c | 2 +- fs/ocfs2/xattr.c | 56 ++++----- fs/xfs/xfs_buf.c | 2 +- include/net/llc_conn.h | 2 +- include/net/sch_generic.h | 5 + include/net/sctp/sctp.h | 2 + include/sound/timer.h | 2 + kernel/trace/trace.c | 1 + net/llc/llc_c_ac.c | 8 +- net/llc/llc_conn.c | 32 ++--- net/llc/llc_s_ac.c | 12 +- net/llc/llc_sap.c | 23 ++-- net/sched/sch_netem.c | 2 +- net/sctp/ipv6.c | 2 +- net/sctp/protocol.c | 2 +- net/sctp/socket.c | 55 +++++---- net/wireless/nl80211.c | 3 +- scripts/setlocalversion | 12 +- sound/core/hrtimer.c | 1 + sound/core/timer.c | 141 +++++++++++++++------- sound/firewire/bebob/bebob_stream.c | 3 +- tools/perf/pmu-events/jevents.c | 12 +- tools/perf/util/map.c | 3 + 78 files changed, 754 insertions(+), 358 deletions(-)