Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1175874ybg; Tue, 2 Jun 2020 03:20:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwTv3bZLZHs6sXP7S0ISFCnRd9CmItaTjbtpABw1vNtUGlYs5J/F0jVFWSU1H8W9je6ZHV7 X-Received: by 2002:a17:906:3499:: with SMTP id g25mr21368334ejb.518.1591093253072; Tue, 02 Jun 2020 03:20:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591093253; cv=none; d=google.com; s=arc-20160816; b=MRxzoYTgPi/lviwojkNA0WhNaQ5tTvkn6zGEzE1722qG2L23+4H+papSg4wfgrsOnk TMsGriwyY7Fnk+O/AuFEjCKCoSAlRPiScSh/l7/FMHIEXx2/VXEPvibbFte9fnTpxePc e7W4tzj6T7xtCFwtKD9kPE27rxX76QGWqpMQ5eZV11scb/1FxsSRnAdcv5tZjzOjjOPm 1BifOXMc9WVtr1lBpQ/SPyy+GcOPUXseVja8FC9e/uWJFsYNCRtiS3wJ8qiwzLr8wdan yXBrRP4TExU5pS+FbbnfLEOtSzymGvWpky07uaYSFxBEFw1aFj6GMWbA1HLj/4xoHBVR boUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=ibf70gw5ZgzkJyd901R2cxzhoN4mGWBfO0R27jtjmrk=; b=DfjI5YAkLV+ih6GWYpyXhW4Rqy3E9T7R+HrKVFqzmDq2QvfZC1tE6pKgSxRbNQwFXd q4sMafKyT/BopRn0cFhVjGKNb1yVAwFlJBAI6XE/0vPXeu9p30a94cFtYhZnoLkodLM8 CTRVtlCTaGOx07CFdxpfkgyonVEQvieeAwhcui/4vif4v8IdYfO/AW5PxspSDe5CZ6lv P07ApUyGJd0f9eUYgDlfcwiTeppL8OW38VeTLfkFsS86p8tn8i6F/UZdwYzJNIqwFr8w 5H/M9e3TZDXIubGeeX0Ra6FLh7+BALXKsmdKDIf+97nfH+MlN6P+WSPcj/gWWjdrkV8u kf+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bCX1jkZ7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qh23si1200579ejb.351.2020.06.02.03.20.30; Tue, 02 Jun 2020 03:20:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bCX1jkZ7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727769AbgFBKQk (ORCPT + 99 others); Tue, 2 Jun 2020 06:16:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:59594 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727977AbgFBKQM (ORCPT ); Tue, 2 Jun 2020 06:16:12 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1F48F206A4; Tue, 2 Jun 2020 10:16:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591092970; bh=/ICJOi2Jk5AGm6n4Em1+cXiPwNbB4uPwZ51SPTTbijU=; h=From:To:Cc:Subject:Date:From; b=bCX1jkZ7s7VbGqIvuKUWD7vM3oyuh2NCkQu2KkkFX9H8poEFQ+yM1Y9QkgT01NUg4 If3aJZiNnnchibh46iP8Kn2QAqRhSeuK8i7osMOKNUCLHCfm7WUqk3PfjWkF057Fgn Z4V1X8PBtZXV5hZaUb5aXe2amwQ+6BPmCs7C3CkY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.4 00/47] 4.4.226-rc2 review Date: Tue, 2 Jun 2020 12:16:07 +0200 Message-Id: <20200602100034.001608787@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.226-rc2.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.226-rc2 X-KernelTest-Deadline: 2020-06-04T10:00+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.4.226 release. There are 47 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 04 Jun 2020 09:57:12 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.226-rc2.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.226-rc2 Benjamin Block scsi: zfcp: fix request object use-after-free in send path causing wrong traces Aaron Conole printk: help pr_debug and pr_devel to optimize out arguments Ben Hutchings drm/msm: Fix possible null dereference on failure of get_pages() Guoqing Jiang sc16is7xx: move label 'err_spi' to correct section Michal Marek asm-prototypes: Clear any CPP defines before declaring the functions Liviu Dudau mm/vmalloc.c: don't dereference possible NULL pointer in __vunmap() Roopa Prabhu net: rtnl_configure_link: fix dev flags changes arg to __dev_notify_flags Sudip Mukherjee mac80211: fix memory leak Yoshihiro Shimoda usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock Thomas Gleixner genirq/generic_pending: Do not lose pending affinity update Matt Roper drm/fb-helper: Use proper plane mask for fb cleanup Konstantin Khlebnikov mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() Pablo Neira Ayuso netfilter: nf_conntrack_pptp: fix compilation warning with W=1 build Qiushi Wu bonding: Fix reference count leak in bond_sysfs_slave_add. Qiushi Wu qlcnic: fix missing release in qlcnic_83xx_interrupt_test. Pablo Neira Ayuso netfilter: nf_conntrack_pptp: prevent buffer overflows in debug code Phil Sutter netfilter: ipset: Fix subcounter update skip Michael Braun netfilter: nft_reject_bridge: enable reject with bridge vlan Xin Long ip_vti: receive ipip packet by calling ip_tunnel_rcv Jeremy Sowden vti4: eliminated some duplicate code. Xin Long xfrm: fix a NULL-ptr deref in xfrm_local_error Xin Long xfrm: fix a warning in xfrm_policy_insert_list Xin Long xfrm: allow to accept packets with ipv6 NEXTHDR_HOP in xfrm_input Alexander Dahl x86/dma: Fix max PFN arithmetic overflow on 32 bit systems Helge Deller parisc: Fix kernel panic in mem_init() Qiushi Wu iommu: Fix reference count leak in iommu_group_alloc. Arnd Bergmann include/asm-generic/topology.h: guard cpumask_of_node() macro argument Alexander Potapenko fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info() Eric W. Biederman exec: Always set cap_ambient in cap_bprm_set_creds Chris Chiu ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC Changming Liu ALSA: hwdep: fix a left shifting 1 by 31 UB bug Kaike Wan IB/qib: Call kobject_put() when kobject_init_and_add() fails Kevin Locke Input: i8042 - add ThinkPad S230u to i8042 reset list Łukasz Patron Input: xpad - add custom init packet for Xbox One S controllers Brendan Shanks Input: evdev - call input_flush_device() on release(), not flush() James Hilliard Input: usbtouchscreen - add support for BonXeon TP Steve French cifs: Fix null pointer check in cifs_read Masahiro Yamada usb: gadget: legacy: fix redundant initialization warnings Lei Xue cachefiles: Fix race between read_waiter and read_copier involving op->to_do Kalderon, Michal IB/cma: Fix reference count leak when no ipv4 addresses are set Dmitry V. Levin uapi: fix linux/if_pppol2tp.h userspace compilation errors Qiushi Wu net/mlx4_core: fix a memory leak bug. Qiushi Wu net: sun: fix missing release regions in cas_init_one(). Moshe Shemesh net/mlx5: Add command entry handling completion Jere Leppänen sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed Yuqi Jin net: revert "net: get rid of an signed integer overflow in ip_idents_reserve()" Eric Dumazet ax25: fix setsockopt(SO_BINDTODEVICE) ------------- Diffstat: Makefile | 4 +- arch/parisc/mm/init.c | 2 +- arch/x86/include/asm/dma.h | 2 +- drivers/gpu/drm/drm_fb_helper.c | 2 +- drivers/gpu/drm/msm/msm_gem.c | 20 +++--- drivers/infiniband/hw/qib/qib_sysfs.c | 9 +-- drivers/input/evdev.c | 19 ++---- drivers/input/joystick/xpad.c | 12 ++++ drivers/input/serio/i8042-x86ia64io.h | 7 ++ drivers/input/touchscreen/usbtouchscreen.c | 1 + drivers/iommu/iommu.c | 2 +- drivers/net/bonding/bond_sysfs_slave.c | 4 +- drivers/net/ethernet/mellanox/mlx4/fw.c | 2 +- drivers/net/ethernet/mellanox/mlx5/core/cmd.c | 15 +++++ .../net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c | 4 +- drivers/net/ethernet/sun/cassini.c | 3 +- drivers/s390/scsi/zfcp_fsf.c | 10 ++- drivers/tty/serial/sc16is7xx.c | 2 + drivers/usb/gadget/legacy/inode.c | 3 +- drivers/usb/renesas_usbhs/mod_gadget.c | 2 +- fs/binfmt_elf.c | 2 +- fs/cachefiles/rdwr.c | 2 +- fs/cifs/file.c | 2 +- include/asm-generic/asm-prototypes.h | 6 ++ include/asm-generic/topology.h | 2 +- include/linux/mlx5/driver.h | 1 + include/linux/mm.h | 1 - include/linux/netfilter/nf_conntrack_pptp.h | 2 +- include/linux/printk.h | 12 ++-- include/rdma/ib_addr.h | 6 +- include/uapi/linux/l2tp.h | 7 +- kernel/irq/migration.c | 26 ++++++-- mm/vmalloc.c | 2 +- net/ax25/af_ax25.c | 6 +- net/bridge/netfilter/nft_reject_bridge.c | 6 ++ net/core/rtnetlink.c | 2 +- net/ipv4/ip_vti.c | 75 ++++++++++++---------- net/ipv4/netfilter/nf_nat_pptp.c | 7 +- net/ipv4/route.c | 14 ++-- net/mac80211/sta_info.c | 1 + net/netfilter/ipset/ip_set_list_set.c | 2 +- net/netfilter/nf_conntrack_pptp.c | 62 ++++++++++-------- net/sctp/sm_statefuns.c | 9 +-- net/xfrm/xfrm_input.c | 2 +- net/xfrm/xfrm_output.c | 3 +- net/xfrm/xfrm_policy.c | 7 +- security/commoncap.c | 1 + sound/core/hwdep.c | 4 +- sound/usb/mixer.c | 8 +++ 49 files changed, 242 insertions(+), 163 deletions(-)