Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp814089ybg; Tue, 9 Jun 2020 13:36:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxfjOG/44tIDeWw99sYdMRQivjd29+JjWW4z/3++UGFqHX751p5tfWebFLhDAU1zvAZSAys X-Received: by 2002:a17:906:81d7:: with SMTP id e23mr186543ejx.462.1591734984821; Tue, 09 Jun 2020 13:36:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591734984; cv=none; d=google.com; s=arc-20160816; b=TEhX0NR1sZujKpv4AlTwDSk9PX5YUgoEEd2TQOZnwaTL64pRYLIDJcTYZRoHO1b1VT /UD8tufYM3a4akUejTxSLDi8TypMtucVznxqlKbCvPrpUB/bFtsf+dkoTsrTpZL8fL97 E3AicZ9de8UEbklZFK7Ir8G+C83G45evjJLF5RRl/N8OjOsK0JRdnP7OiOTAPvoa4YYb cMdU8YtcixHkUU+nHH2JAs2LfoFRyCO77kNf0F2s3EyjeCRMH+lBhTbajkcsUITMxulM eRwapr9xovNUr0Ov/ZHwEizrJxxs+OIshV2YGaiLR/0JmUaNKHVPR3IGyaztvhPyYh9y pdiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=reoiSZyfNZ8i+cX0GdXN38+KASdmuWMpHUyyGATq42A=; b=d3PzPQHtErFzN4kQSdoB0sODv103+P9DWLhjBewaHFWPJhxjE7YgvOEImtq9aUqml2 7+ujxkMvLpNbHNIzNf5TS9ZKzb4cfxF6aXerTzetizi4Z7h8al1P3HOQr3x+WS0ajLjB nNKE5yrPemkDMGioScT0nay9AypWwfdW9Rtz77P9mNP0EUnJegs+iQhz06XYeO/Goia5 Hkj8GFsRDgrs7C+MoMY0qsEG71glkwHuusanZp8tqTZGf81n0avCyzNvUSzseiG25/l5 Ennz6Tj5XjPj+yRVkVxeuNV2mlJdR4PAd5Vk26dlX7kscyftQTw7PTHpKKikERAiVpxC lKGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iHD0U4NL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a63si12086477edf.135.2020.06.09.13.36.02; Tue, 09 Jun 2020 13:36:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iHD0U4NL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730660AbgFITSZ (ORCPT + 99 others); Tue, 9 Jun 2020 15:18:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:51220 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729318AbgFITSY (ORCPT ); Tue, 9 Jun 2020 15:18:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F1EB320734; Tue, 9 Jun 2020 19:18:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591730303; bh=IpZW/2FSFVdaAzEF8PUPW2p0qKc4IefaxU2AP0T4i2g=; h=From:To:Cc:Subject:Date:From; b=iHD0U4NLPXcAWMtXKDqg0nAshjHiO/MXkh2fv2Jr3pCanbSBP4FWQUzJCYntsquSk FCX9bDc2F1yC/gm16NWt+MvjvWiM8oo2C+lcTRwDA/58FGYsVtK7SKAEfZHmysEzcu zV8t+vuH8HhwsfCIyBzr0tyPzyyN81tJMRDOeU5E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/42] 4.9.227-rc2 review Date: Tue, 9 Jun 2020 21:18:21 +0200 Message-Id: <20200609190124.109610974@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.227-rc2.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.227-rc2 X-KernelTest-Deadline: 2020-06-11T19:01+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.227 release. There are 42 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 11 Jun 2020 19:01:14 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.227-rc2.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.227-rc2 Oleg Nesterov uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned Mathieu Othacehe iio: vcnl4000: Fix i2c swapped word reading. Josh Poimboeuf x86/speculation: Add Ivy Bridge to affected list Mark Gross x86/speculation: Add SRBDS vulnerability and mitigation documentation Mark Gross x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation Mark Gross x86/cpu: Add 'table' argument to cpu_matches() Mark Gross x86/cpu: Add a steppings field to struct x86_cpu_id Srinivas Kandagatla nvmem: qfprom: remove incorrect write support Pascal Terjan staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK Jiri Slaby tty: hvc_console, fix crashes on parallel open/close Dmitry Torokhov vt: keyboard: avoid signed integer overflow in k_ascii Dinghao Liu usb: musb: Fix runtime PM imbalance on error Daniele Palmas USB: serial: option: add Telit LE910C1-EUX compositions Bin Liu USB: serial: usb_wwan: do not resubmit rx urb on fatal errors Matt Jolly USB: serial: qcserial: add DW5816e QDL support Eric Dumazet l2tp: add sk_family checks to l2tp_validate_socket Stefano Garzarella vsock: fix timeout in vsock_accept() Chuhong Yuan NFC: st21nfca: add missed kfree_skb() in an error path Daniele Palmas net: usb: qmi_wwan: add Telit LE910C1-EUX composition Eric Dumazet l2tp: do not use inet_hash()/inet_unhash() Yang Yingliang devinet: fix memleak in inetdev_init() Dan Carpenter airo: Fix read overflows sending packets Can Guo scsi: ufs: Release clock if DMA map fails yangerkun slip: not call free_netdev before rtnl_unlock in slip_open Ben Hutchings slcan: Fix double-free on slcan_open() error path Jérôme Pouiller mmc: fix compilation of user API Daniel Axtens kernel/relay.c: handle alloc_percpu returning NULL in relay_open Giuseppe Marco Randazzo p54usb: add AirVasT USB stick device-id Julian Sax HID: i2c-hid: add Schneider SCL142ALM to descriptor override Fan Yang mm: Fix mremap not considering huge pmd devmap Guillaume Nault pppoe: only process PADT targeted at local interfaces Dinghao Liu net: smsc911x: Fix runtime PM imbalance on error Jonathan McDowell net: ethernet: stmmac: Enable interface clocks on probe for IPQ806x Valentin Longchamp net/ethernet/freescale: rework quiesce/activate for ucc_geth Jeremy Kerr net: bmac: Fix read of MAC address from ROM Nathan Chancellor x86/mmiotrace: Use cpumask_available() for cpumask_var_t variables Eugeniy Paltsev ARC: Fix ICCM & DCCM runtime size checks Vasily Gorbik s390/ftrace: save traced function caller Xinwei Kong spi: dw: use "smp_mb()" to avoid sending spi data error Zhen Lei esp6: fix memleak on error path in esp6_input Eugeniu Rosca usb: gadget: f_uac2: fix error handling in afunc_bind (again) Hannes Reinecke scsi: scsi_devinfo: fixup string compare ------------- Diffstat: Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + Documentation/hw-vuln/index.rst | 3 +- .../special-register-buffer-data-sampling.rst | 149 +++++++++++++++++++++ Documentation/kernel-parameters.txt | 20 +++ Makefile | 4 +- arch/arc/kernel/setup.c | 5 +- arch/s390/kernel/mcount.S | 1 + arch/x86/include/asm/cpu_device_id.h | 27 ++++ arch/x86/include/asm/cpufeatures.h | 30 +++-- arch/x86/include/asm/msr-index.h | 4 + arch/x86/include/asm/pgtable.h | 1 + arch/x86/kernel/cpu/bugs.c | 106 +++++++++++++++ arch/x86/kernel/cpu/common.c | 54 ++++++-- arch/x86/kernel/cpu/cpu.h | 1 + arch/x86/kernel/cpu/match.c | 7 +- arch/x86/mm/mmio-mod.c | 4 +- drivers/base/cpu.c | 8 ++ drivers/hid/i2c-hid/i2c-hid-dmi-quirks.c | 8 ++ drivers/iio/light/vcnl4000.c | 6 +- drivers/net/can/slcan.c | 3 +- drivers/net/ethernet/apple/bmac.c | 2 +- drivers/net/ethernet/freescale/ucc_geth.c | 13 +- drivers/net/ethernet/smsc/smsc911x.c | 9 +- .../net/ethernet/stmicro/stmmac/dwmac-ipq806x.c | 13 ++ drivers/net/ppp/pppoe.c | 3 + drivers/net/slip/slip.c | 3 + drivers/net/usb/qmi_wwan.c | 1 + drivers/net/wireless/cisco/airo.c | 12 ++ drivers/net/wireless/intersil/p54/p54usb.c | 1 + drivers/nfc/st21nfca/dep.c | 4 +- drivers/nvmem/qfprom.c | 14 -- drivers/scsi/scsi_devinfo.c | 23 ++-- drivers/scsi/ufs/ufshcd.c | 1 + drivers/spi/spi-dw.c | 3 + drivers/staging/rtl8712/wifi.h | 9 +- drivers/tty/hvc/hvc_console.c | 23 ++-- drivers/tty/vt/keyboard.c | 26 ++-- drivers/usb/gadget/function/f_uac2.c | 4 +- drivers/usb/musb/musb_debugfs.c | 10 +- drivers/usb/serial/option.c | 4 + drivers/usb/serial/qcserial.c | 1 + drivers/usb/serial/usb_wwan.c | 4 + include/linux/mod_devicetable.h | 6 + include/uapi/linux/mmc/ioctl.h | 1 + kernel/events/uprobes.c | 14 +- kernel/relay.c | 5 + mm/mremap.c | 2 +- net/ipv4/devinet.c | 1 + net/ipv6/esp6.c | 4 +- net/l2tp/l2tp_core.c | 2 + net/l2tp/l2tp_ip.c | 29 +++- net/l2tp/l2tp_ip6.c | 30 +++-- net/vmw_vsock/af_vsock.c | 2 +- 53 files changed, 585 insertions(+), 136 deletions(-)