Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1487386ybg; Tue, 2 Jun 2020 11:18:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJymOryIw4DtXh3Qzzl9pNEe5z3JnRK/i5elz+Nax8XQW4IxrpyqrR+rDbFVaX4G1ImSLz4J X-Received: by 2002:a17:906:6951:: with SMTP id c17mr23992905ejs.87.1591121915616; Tue, 02 Jun 2020 11:18:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591121915; cv=none; d=google.com; s=arc-20160816; b=fZ97/YliK8FQFSHqOHjOFhTIzHInkRhpBxj3cn6QBZ283PPHVXpaCztJvcfn2AlZRd BEyqpws7FSCKrKx8dQC/nZieJfUgfPvhmOLjX5dllQBDsOZ4NlQ9k0R1sS1KIZ9O+evs ZupEzkDd63oBbbxYgEFesq12SrOLjeTu2uip+LwjndTW+jFWvlBR4qMbxPZiS/L7mkWX HKwrV4dp4MQZhZlfhSMHig4ZyKQUuoggdLCgrsZZwczUbLHjbOnlX1HHznVrfjh84CCe zBD5HooB5k7ceZVtRDqJ6wZc66sKzJf1E4sGLEFTfSIVmcGfKcbUu11ETjQj+QX1kF5D DBwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=vVooJU58KoleUA11nl87NUtje+V6fPJ28BSD5iXvppQ=; b=hf4AYw7e3V1JEF8sKFvKDsjqTMqQneYSuYgzBKHRYPAVnh089CUCavb1Ekfi2Kg5XR uqAjc93v7bwAyRc+5JfdJu5sI65GRqh7AyzdfzwSBX+L4gvLQ8j2TkVSIZws14cFvMeD Zw1LlKpdPaiSLRbMsO202IlaO6T4TW98cTgr9Hxg0kgznl8698+gMivoM5R83ZkM/9yd WNS1wI7FSVuxmMy2OAhuzT3p2qqjMijXQqrBYqH4qsgVCQ04MPdqAlouF2ZpSPj/r9vF qL2Tdw0d+zNHNHWULMOyxHR05aQxO6wX2GBfwvOEuZi03shm4Zs1cP8AHKXb9KyviyTW g5zA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Cv00d3gc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n23si393980edq.264.2020.06.02.11.18.11; Tue, 02 Jun 2020 11:18:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Cv00d3gc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726267AbgFBSOD (ORCPT + 99 others); Tue, 2 Jun 2020 14:14:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:41802 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726130AbgFBSOC (ORCPT ); Tue, 2 Jun 2020 14:14:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4CBFA2068D; Tue, 2 Jun 2020 18:14:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591121641; bh=MrXSZE70Zbx4hxiTKRHGSxKbDAuPhmbRXB6E9TDnFN4=; h=From:To:Cc:Subject:Date:From; b=Cv00d3gcS29yDXQRyxV3aU+Sbi7l6aFR15i6cPDbsoIdwmOrMID0JYdBHTBXKVG95 rupv0O3EYSXjJ702nFSv3zyHeZJgpZ/bcVYmQY476VPjKQZXbdJhM1TZOB/sOZBSac CPerulRdB88pu2MiX3o1RumBLpbOA94fyP17VZXE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/55] 4.9.226-rc3 review Date: Tue, 2 Jun 2020 20:13:59 +0200 Message-Id: <20200602181325.420361863@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.226-rc3.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.226-rc3 X-KernelTest-Deadline: 2020-06-04T18:13+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.226 release. There are 55 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 04 Jun 2020 18:12:28 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.226-rc3.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.226-rc3 Benjamin Block scsi: zfcp: fix request object use-after-free in send path causing wrong traces Salil Mehta net: hns: Fixes the missing put_device in positive leg for roce reset Guoqing Jiang sc16is7xx: move label 'err_spi' to correct section Liviu Dudau mm/vmalloc.c: don't dereference possible NULL pointer in __vunmap() Roopa Prabhu net: rtnl_configure_link: fix dev flags changes arg to __dev_notify_flags Thomas Gleixner genirq/generic_pending: Do not lose pending affinity update Pablo Neira Ayuso netfilter: nf_conntrack_pptp: fix compilation warning with W=1 build Qiushi Wu bonding: Fix reference count leak in bond_sysfs_slave_add. Qiushi Wu qlcnic: fix missing release in qlcnic_83xx_interrupt_test. Pablo Neira Ayuso netfilter: nf_conntrack_pptp: prevent buffer overflows in debug code Phil Sutter netfilter: ipset: Fix subcounter update skip Michael Braun netfilter: nft_reject_bridge: enable reject with bridge vlan Xin Long ip_vti: receive ipip packet by calling ip_tunnel_rcv Jeremy Sowden vti4: eliminated some duplicate code. Xin Long xfrm: fix a NULL-ptr deref in xfrm_local_error Xin Long xfrm: fix a warning in xfrm_policy_insert_list Xin Long xfrm: allow to accept packets with ipv6 NEXTHDR_HOP in xfrm_input Alexander Dahl x86/dma: Fix max PFN arithmetic overflow on 32 bit systems Linus Lüssing mac80211: mesh: fix discovery timer re-arming issue / crash Helge Deller parisc: Fix kernel panic in mem_init() Qiushi Wu iommu: Fix reference count leak in iommu_group_alloc. Arnd Bergmann include/asm-generic/topology.h: guard cpumask_of_node() macro argument Alexander Potapenko fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info() Konstantin Khlebnikov mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() Jerry Lee libceph: ignore pool overlay and cache logic on redirects Eric W. Biederman exec: Always set cap_ambient in cap_bprm_set_creds Chris Chiu ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC Changming Liu ALSA: hwdep: fix a left shifting 1 by 31 UB bug Robert Beckett ARM: dts/imx6q-bx50v3: Set display interface clock parents Sebastian Reichel ARM: dts: imx6q-bx50v3: Add internal switch Martyn Welch ARM: dts: imx: Correct B850v3 clock assignment Kaike Wan IB/qib: Call kobject_put() when kobject_init_and_add() fails Wei Yongjun Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() Kevin Locke Input: i8042 - add ThinkPad S230u to i8042 reset list Łukasz Patron Input: xpad - add custom init packet for Xbox One S controllers Brendan Shanks Input: evdev - call input_flush_device() on release(), not flush() James Hilliard Input: usbtouchscreen - add support for BonXeon TP Steve French cifs: Fix null pointer check in cifs_read Masahiro Yamada usb: gadget: legacy: fix redundant initialization warnings Lei Xue cachefiles: Fix race between read_waiter and read_copier involving op->to_do Bob Peterson gfs2: move privileged user check to gfs2_quota_lock_check Chuhong Yuan net: microchip: encx24j600: add missed kthread_stop Stephen Warren gpio: tegra: mask GPIO IRQs during IRQ shutdown Kalderon, Michal IB/cma: Fix reference count leak when no ipv4 addresses are set Dmitry V. Levin uapi: fix linux/if_pppol2tp.h userspace compilation errors Qiushi Wu net/mlx4_core: fix a memory leak bug. Qiushi Wu net: sun: fix missing release regions in cas_init_one(). Moshe Shemesh net/mlx5: Add command entry handling completion Manivannan Sadhasivam net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() Moshe Shemesh net/mlx5e: Update netdev txq on completions during closure Jere Leppänen sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed Roman Mashak net sched: fix reporting the first-time use timestamp Yuqi Jin net: revert "net: get rid of an signed integer overflow in ip_idents_reserve()" Vadim Fedorenko net: ipip: fix wrong address family in init error path Eric Dumazet ax25: fix setsockopt(SO_BINDTODEVICE) ------------- Diffstat: Makefile | 4 +- arch/arm/boot/dts/imx6q-b450v3.dts | 7 -- arch/arm/boot/dts/imx6q-b650v3.dts | 7 -- arch/arm/boot/dts/imx6q-b850v3.dts | 11 ---- arch/arm/boot/dts/imx6q-bx50v3.dtsi | 77 ++++++++++++++++++++++ arch/parisc/mm/init.c | 2 +- arch/x86/include/asm/dma.h | 2 +- drivers/gpio/gpio-tegra.c | 1 + drivers/infiniband/hw/qib/qib_sysfs.c | 9 +-- drivers/input/evdev.c | 19 ++---- drivers/input/joystick/xpad.c | 12 ++++ drivers/input/rmi4/rmi_driver.c | 3 +- drivers/input/serio/i8042-x86ia64io.h | 7 ++ drivers/input/touchscreen/usbtouchscreen.c | 1 + drivers/iommu/iommu.c | 2 +- drivers/net/bonding/bond_sysfs_slave.c | 4 +- drivers/net/ethernet/hisilicon/hns/hns_dsaf_main.c | 3 + drivers/net/ethernet/mellanox/mlx4/fw.c | 2 +- drivers/net/ethernet/mellanox/mlx5/core/cmd.c | 15 +++++ drivers/net/ethernet/mellanox/mlx5/core/en_tx.c | 6 +- drivers/net/ethernet/microchip/encx24j600.c | 5 +- .../net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c | 4 +- drivers/net/ethernet/sun/cassini.c | 3 +- drivers/s390/scsi/zfcp_fsf.c | 10 ++- drivers/tty/serial/sc16is7xx.c | 2 + drivers/usb/gadget/legacy/inode.c | 3 +- fs/binfmt_elf.c | 2 +- fs/cachefiles/rdwr.c | 2 +- fs/cifs/file.c | 2 +- fs/gfs2/quota.c | 3 +- fs/gfs2/quota.h | 3 +- include/asm-generic/topology.h | 2 +- include/linux/mlx5/driver.h | 1 + include/linux/mm.h | 15 ++++- include/linux/netfilter/nf_conntrack_pptp.h | 2 +- include/net/act_api.h | 3 +- include/rdma/ib_addr.h | 6 +- include/uapi/linux/l2tp.h | 7 +- kernel/irq/migration.c | 26 ++++++-- mm/vmalloc.c | 2 +- net/ax25/af_ax25.c | 6 +- net/bridge/netfilter/nft_reject_bridge.c | 6 ++ net/ceph/osd_client.c | 4 +- net/core/rtnetlink.c | 2 +- net/ipv4/ip_vti.c | 75 +++++++++++---------- net/ipv4/ipip.c | 2 +- net/ipv4/netfilter/nf_nat_pptp.c | 7 +- net/ipv4/route.c | 14 ++-- net/mac80211/mesh_hwmp.c | 7 ++ net/netfilter/ipset/ip_set_list_set.c | 2 +- net/netfilter/nf_conntrack_pptp.c | 62 +++++++++-------- net/qrtr/qrtr.c | 2 +- net/sctp/sm_statefuns.c | 9 +-- net/xfrm/xfrm_input.c | 2 +- net/xfrm/xfrm_output.c | 3 +- net/xfrm/xfrm_policy.c | 7 +- security/commoncap.c | 1 + sound/core/hwdep.c | 4 +- sound/usb/mixer.c | 8 +++ 59 files changed, 338 insertions(+), 182 deletions(-)