Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3881165pxb; Tue, 17 Nov 2020 06:06:54 -0800 (PST) X-Google-Smtp-Source: ABdhPJw3d8zFx4aigvPTN4QJ/kP8Jym8lPO6ht7TffPn+b3QGhhzZBguDVPS5ModaRnqnmN/ctHc X-Received: by 2002:a17:906:4495:: with SMTP id y21mr20192382ejo.209.1605622013774; Tue, 17 Nov 2020 06:06:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605622013; cv=none; d=google.com; s=arc-20160816; b=NijaQbCpnl52IiqNkz97oT3+hxnWyAzregrnfuB5Yf6+IOjDnaW51chEHCoVplK0KR tbPrVtOtoRawoWqi88cC6ANQMvCgZl1Labo7KQ9oHgxLskqMuqOQFTWHEd+Zzmia11a5 fOZkXkIDCeDzoyoatIMq79/y5exVTYH8NdQ6mzSfYbqdRcYhPw3+HvgWpTuZz6okfroN tPRlYjoVQC/LkG6z4AFkthttY/Z5bF193ZTzAVMSlMkXoaj9jl1FYNY4Xf8HC2y1vhc8 eF8o/oBsTRUc8sFCcwplC+lVhfjehbzFSy8pv119KTZuHZf2Be1uUyfl2mOBg7PWoDj1 VyGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=RYfI/OuvAxPRsGCQDkVgH+5pbn4AvpuxVWp/Qjixy3M=; b=o8YN9ZQfkNaeXyxQuB6WyNsq3HufkkGjVl34RXqjxG3xXrLGwclhbnRhTl3bHHxGLS ug8GS5dJZ0T7UpIT2ssqPhjfy8t9GaJk9opUIDaLIpV9BhcTANqjZGmt7tV758l5lYqc P+1ry3VomRppNosuiq+aw0xHKxFbQwA85Tgo7iU/uEnfldn7sk1s9rUuDNTxPhDHYqFZ GekMwTCOympi1neRA8BLaysUdheGea6m81EPUbSJTnf3MyUvjTTnNJYMzAZgSzRsX1Pg DBgp8RRR4CDn2+kh488HQXSA3ZAV7dQl/YjfQ8X+WenqNb3u3q3up9bEdGhEZypzzpkn zeXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mBMpWFKo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p1si13133886ejz.55.2020.11.17.06.06.27; Tue, 17 Nov 2020 06:06:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mBMpWFKo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729564AbgKQNLA (ORCPT + 99 others); Tue, 17 Nov 2020 08:11:00 -0500 Received: from mail.kernel.org ([198.145.29.99]:40220 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729543AbgKQNKy (ORCPT ); Tue, 17 Nov 2020 08:10:54 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2AB1D221EB; Tue, 17 Nov 2020 13:10:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605618652; bh=KVQwupIDHXTFxYmcKJzWmC7v2v++PCOoKFUCLDrrXjo=; h=From:To:Cc:Subject:Date:From; b=mBMpWFKolDDf2fBi6DnmGffSvGgbSRB2sW/g65+e78iGATyNErx9fwKGZ+ni9SmSt kXZggly/e14KFCEd67TFYlV9mKZch9XMFBTqby1iCFfnFGuTAHygND2voXGjULDjVi ciyy31cDmF3XAQhTunmYEh11I6YQi7ry2BepBL9k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, stable@vger.kernel.org Subject: [PATCH 4.9 00/78] 4.9.244-rc1 review Date: Tue, 17 Nov 2020 14:04:26 +0100 Message-Id: <20201117122109.116890262@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.244-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.244-rc1 X-KernelTest-Deadline: 2020-11-19T12:21+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.244 release. There are 78 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 19 Nov 2020 12:20:51 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.244-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.244-rc1 Boris Protopopov Convert trailing spaces and periods in path components Eric Biggers ext4: fix leaking sysfs kobject after failed mount Matteo Croce reboot: fix overflow parsing reboot cpu number Matteo Croce Revert "kernel/reboot.c: convert simple_strtoul to kstrtoint" Jiri Olsa perf/core: Fix race in the perf_mmap_close() function Juergen Gross xen/events: block rogue events for some time Juergen Gross xen/events: defer eoi in case of excessive number of events Juergen Gross xen/events: use a common cpu hotplug hook for event channels Juergen Gross xen/events: switch user event channels to lateeoi model Juergen Gross xen/pciback: use lateeoi irq binding Juergen Gross xen/scsiback: use lateeoi irq binding Juergen Gross xen/netback: use lateeoi irq binding Juergen Gross xen/blkback: use lateeoi irq binding Juergen Gross xen/events: add a new "late EOI" evtchn framework Juergen Gross xen/events: fix race in evtchn_fifo_unmask() Juergen Gross xen/events: add a proper barrier to 2-level uevent unmasking Juergen Gross xen/events: avoid removing an event channel while handling it kiyin(尹亮) perf/core: Fix a memory leak in perf_event_parse_addr_filter() Mathieu Poirier perf/core: Fix crash when using HW tracing kernel filters Song Liu perf/core: Fix bad use of igrab() Anand K Mistry x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP George Spelvin random32: make prandom_u32() output unpredictable Mao Wenan net: Update window_clamp if SOCK_RCVBUF is set Martin Schiller net/x25: Fix null-ptr-deref in x25_connect Ursula Braun net/af_iucv: fix null pointer dereference on shutdown Oliver Herms IPv6: Set SIT tunnel hard_header_len to zero Stefano Stabellini swiotlb: fix "x86: Don't panic if can not alloc buffer for swiotlb" Coiby Xu pinctrl: amd: fix incorrect way to disable debounce filter Coiby Xu pinctrl: amd: use higher precision for 512 RtcClk Thomas Zimmermann drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] Al Viro don't dump the threads that had been already exiting when zapped. Wengang Wang ocfs2: initialize ip_next_orphan Alexander Usyskin mei: protect mei_cl_mtu from null dereference Chris Brandt usb: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode Joseph Qi ext4: unlock xattr_sem properly in ext4_inline_data_truncate() Kaixu Xia ext4: correctly report "not supported" for {usr,grp}jquota when !CONFIG_QUOTA Peter Zijlstra perf: Fix get_recursion_context() Wang Hai cosa: Add missing kfree in error path of cosa_write Evan Nimmo of/address: Fix of_node memory leak in of_dma_is_coherent Christoph Hellwig xfs: fix a missing unlock on error in xfs_fs_map_blocks Darrick J. Wong xfs: fix rmap key and record comparison functions Darrick J. Wong xfs: fix flags argument to rmap lookup when converting shared file rmaps Billy Tsai pinctrl: aspeed: Fix GPI only function problem. Suravee Suthikulpanit iommu/amd: Increase interrupt remapping table limit to 512 entries Hannes Reinecke scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() Ye Bin cfg80211: regulatory: Fix inconsistent format argument Johannes Berg mac80211: always wind down STA state Johannes Berg mac80211: fix use of skb payload instead of header Evan Quan drm/amdgpu: perform srbm soft reset always on SDMA resume Keita Suzuki scsi: hpsa: Fix memory leak in hpsa_init_one() Bob Peterson gfs2: check for live vs. read-only file system in gfs2_fitrim Bob Peterson gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free Evgeny Novikov usb: gadget: goku_udc: fix potential crashes in probe Masashi Honma ath9k_htc: Use appropriate rs_datalen type Mark Gray geneve: add transport ports in route lookup for geneve Martyna Szapar i40e: Memory leak in i40e_config_iwarp_qvlist Martyna Szapar i40e: Fix of memory leak and integer truncation in i40e_virtchnl.c Grzegorz Siwik i40e: Wrong truncation from u16 to u8 Sergey Nemov i40e: add num_vectors checker in iwarp handler Christophe JAILLET i40e: Fix a potential NULL pointer dereference Will Deacon pinctrl: devicetree: Avoid taking direct reference to device name string Filipe Manana Btrfs: fix missing error return if writeback for extent buffer never started Brian Foster xfs: flush new eof page on truncate to avoid post-eof corruption Stephane Grosjean can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping Dan Carpenter can: peak_usb: add range checking in decode operations Oleksij Rempel can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() Oliver Hartkopp can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames Vincent Mailhol can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context Dan Carpenter ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() Jiri Olsa perf tools: Add missing swap for ino_generation zhuoliang zhang net: xfrm: fix a race condition during allocing spi Marc Zyngier genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY Johannes Thumshirn btrfs: reschedule when cloning lots of extents Zeng Tao time: Prevent undefined behaviour in timespec64_to_ns() Shijie Luo mm: mempolicy: fix potential pte_unmap_unlock pte error Alexander Aring gfs2: Wake up when sd_glock_disposal becomes zero Steven Rostedt (VMware) ring-buffer: Fix recursion protection transitions between interrupt context Michał Mirosław regulator: defer probe when trying to get voltage from unresolved supply ------------- Diffstat: Documentation/kernel-parameters.txt | 8 + Makefile | 4 +- arch/x86/events/intel/pt.c | 4 +- arch/x86/kernel/cpu/bugs.c | 52 ++- drivers/block/xen-blkback/blkback.c | 22 +- drivers/block/xen-blkback/xenbus.c | 5 +- drivers/char/random.c | 1 - drivers/gpu/drm/amd/amdgpu/cik_sdma.c | 27 +- drivers/gpu/drm/gma500/psb_irq.c | 34 +- drivers/iommu/amd_iommu_types.h | 6 +- drivers/misc/mei/client.h | 4 +- drivers/net/can/dev.c | 14 +- drivers/net/can/usb/peak_usb/pcan_usb_core.c | 51 ++- drivers/net/can/usb/peak_usb/pcan_usb_fd.c | 48 ++- drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c | 32 +- drivers/net/geneve.c | 36 +- drivers/net/wan/cosa.c | 1 + drivers/net/wireless/ath/ath9k/htc_drv_txrx.c | 2 +- drivers/net/xen-netback/common.h | 15 + drivers/net/xen-netback/interface.c | 61 ++- drivers/net/xen-netback/netback.c | 11 +- drivers/net/xen-netback/rx.c | 13 +- drivers/of/address.c | 4 +- drivers/pinctrl/aspeed/pinctrl-aspeed.c | 7 +- drivers/pinctrl/devicetree.c | 26 +- drivers/pinctrl/pinctrl-amd.c | 6 +- drivers/regulator/core.c | 2 + drivers/scsi/device_handler/scsi_dh_alua.c | 9 +- drivers/scsi/hpsa.c | 4 +- drivers/usb/class/cdc-acm.c | 9 + drivers/usb/gadget/udc/goku_udc.c | 2 +- drivers/xen/events/events_2l.c | 9 +- drivers/xen/events/events_base.c | 422 +++++++++++++++++-- drivers/xen/events/events_fifo.c | 82 ++-- drivers/xen/events/events_internal.h | 20 +- drivers/xen/evtchn.c | 7 +- drivers/xen/xen-pciback/pci_stub.c | 14 +- drivers/xen/xen-pciback/pciback.h | 12 +- drivers/xen/xen-pciback/pciback_ops.c | 48 ++- drivers/xen/xen-pciback/xenbus.c | 2 +- drivers/xen/xen-scsiback.c | 23 +- fs/btrfs/extent_io.c | 4 + fs/btrfs/ioctl.c | 2 + fs/cifs/cifs_unicode.c | 8 +- fs/ext4/inline.c | 1 + fs/ext4/super.c | 5 +- fs/gfs2/glock.c | 3 +- fs/gfs2/rgrp.c | 5 +- fs/ocfs2/super.c | 1 + fs/xfs/libxfs/xfs_rmap.c | 2 +- fs/xfs/libxfs/xfs_rmap_btree.c | 16 +- fs/xfs/xfs_iops.c | 10 + fs/xfs/xfs_pnfs.c | 2 +- include/linux/can/skb.h | 20 +- include/linux/perf_event.h | 2 +- include/linux/prandom.h | 36 +- include/linux/time64.h | 4 + include/xen/events.h | 29 +- kernel/events/core.c | 42 +- kernel/events/internal.h | 2 +- kernel/exit.c | 5 +- kernel/irq/Kconfig | 1 + kernel/reboot.c | 28 +- kernel/time/timer.c | 7 - kernel/trace/ring_buffer.c | 54 ++- lib/random32.c | 462 +++++++++++++-------- lib/swiotlb.c | 6 +- mm/mempolicy.c | 6 +- net/ipv4/syncookies.c | 9 +- net/ipv6/sit.c | 2 - net/ipv6/syncookies.c | 10 +- net/iucv/af_iucv.c | 3 +- net/mac80211/sta_info.c | 18 + net/mac80211/tx.c | 35 +- net/wireless/reg.c | 2 +- net/x25/af_x25.c | 2 +- net/xfrm/xfrm_state.c | 8 +- sound/hda/ext/hdac_ext_controller.c | 2 + tools/perf/util/session.c | 1 + 79 files changed, 1465 insertions(+), 549 deletions(-)