Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp3406616pxy; Mon, 26 Apr 2021 00:36:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyFJnUOyvnQ7l91mfkXORUd+O+mwNJrvCDqBUFSKs5rQRymeKl/Mi3R0oBwoF5d+XCesxiD X-Received: by 2002:a17:902:b08a:b029:ec:af20:5602 with SMTP id p10-20020a170902b08ab02900ecaf205602mr17776819plr.71.1619422565781; Mon, 26 Apr 2021 00:36:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619422565; cv=none; d=google.com; s=arc-20160816; b=DxaQFmMf+sc67cfIOT731P5mTUvPzKRYnfBJBJ/wtThHKyDyYGxMk0qRfJTQOyG+H2 IF9as3HYaor0T3U/51MjPYQkYmayWM+vo8BvsfCLB3HosNqAS6B+UD6j2E/lfaCfzU5U yqHGc8ExztLZr+bSo0l/macGczxDpITdglYyioIEw/lnV4BDysO3nUyfXUS5UI7fXoNt r7hnG97qVoOBDWJynMJ0yHJ5LfYz47+9nfds6UoX8rBY6Af5F4B7AGuRRU7C4Lvj2LEn nyqSHS4JxyllKWCmPtm5XJZ2sYhIB2qJvgop1wVznErw2YwxqPG6YZ9IHERxhyYsALoz 4Eeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=0knNiyjj1xfebT6iJSELfB/ofTJNDE96RlJwivpkGcU=; b=yAwvOqAKvciLXm/rNJlQRKjHBjNASrwdvy8FwDYO7+NhLa7s1B494yAjKroitdP0ZA 9PkU6/stbZACt0yfuGm4erRPVa0oomo1oA2/4iSzpVqJjCwAYC9w0a7hBaN5+zPP3YmP eeT89X+CvtmMvHyySd7XdYBzNN/n3Shwmf3DJfUyl3eeePhtOEGcMRw+dJLUTJCms//B HWyJSawv/ggcapyhJ6R2wxyy26gQrybzu5CuTOr04fSORmBdakhKq3LsRp4p+iAMD43S eaN7vp0LCkudHi0uwEUWNr1ELgblvECG6xrJTDNY//L8zWEDb2zeKKrLmBo+LYmbJCQV noUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fJ+NrB1E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q4si16461187pfj.237.2021.04.26.00.35.53; Mon, 26 Apr 2021 00:36:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fJ+NrB1E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231989AbhDZHdp (ORCPT + 99 others); Mon, 26 Apr 2021 03:33:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:44726 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232620AbhDZHdc (ORCPT ); Mon, 26 Apr 2021 03:33:32 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BCC54611C0; Mon, 26 Apr 2021 07:32:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619422371; bh=Bj1a+ak4wBYq0CFHzz+3sSEFYLl+1CWYLqNj+HuZ9f8=; h=From:To:Cc:Subject:Date:From; b=fJ+NrB1EUzykwhEbvDbZZN6kcUjMaG17gKJWkeH9X2L2F4qG/5YgbnifemjTxTMFm 4MP/yJ6vSAEwf9CaLC9Z+ui8PaoV/K3kNxCJBZpW3R4FoZogbSdcInD5cempVWc3sL 1MFjs1Zl+YSJRUqCsGtn4jg1mN4HtFRIrx8x2OPw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, stable@vger.kernel.org Subject: [PATCH 4.9 00/37] 4.9.268-rc1 review Date: Mon, 26 Apr 2021 09:29:01 +0200 Message-Id: <20210426072817.245304364@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.268-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.268-rc1 X-KernelTest-Deadline: 2021-04-28T07:28+00:00 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.268 release. There are 37 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 28 Apr 2021 07:28:08 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.268-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.268-rc1 Mike Galbraith x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access John Paul Adrian Glaubitz ia64: tools: remove duplicate definition of ia64_mf() on ia64 Randy Dunlap ia64: fix discontig.c section mismatches Wan Jiabing cavium/liquidio: Fix duplicate argument Michael Brown xen-netback: Check for hotplug-status existence before watching Vasily Gorbik s390/entry: save the caller of psw_idle Tony Lindgren ARM: dts: Fix swapped mmc order for omap3 Jia-Ju Bai HID: alps: fix error return code in alps_input_configured() Zhang Yi ext4: correct error label in ext4_rename() Anirudh Rayabharam net: hso: fix null-ptr-deref during tty device unregistration Shuah Khan usbip: synchronize event handler with sysfs code paths Shuah Khan usbip: vudc synchronize sysfs code paths Shuah Khan usbip: stub-dev synchronize sysfs code paths Shuah Khan usbip: add sysfs_lock to synchronize sysfs code paths Colin Ian King usbip: Fix incorrect double assignment to udc->ud.tcp_rx Fredrik Strupe ARM: 9071/1: uprobes: Don't hook on thumb instructions Jason Xing i40e: fix the panic when running bpf in xdpdrv mode Hristo Venev net: sit: Unregister catch-all devices Christophe JAILLET net: davicom: Fix regulator not turned off on failed probe Jolly Shah scsi: libsas: Reset num_scatter if libata marks qc as NODATA Arnd Bergmann Input: i8042 - fix Pegatron C15B ID entry Guenter Roeck pcnet32: Use pci_resource_len to validate PCI resource Alexander Aring net: ieee802154: forbid monitor for add llsec seclevel Alexander Aring net: ieee802154: stop dump llsec seclevels for monitors Alexander Aring net: ieee802154: forbid monitor for add llsec devkey Alexander Aring net: ieee802154: stop dump llsec devkeys for monitors Alexander Aring net: ieee802154: forbid monitor for add llsec dev Alexander Aring net: ieee802154: stop dump llsec devs for monitors Alexander Aring net: ieee802154: stop dump llsec keys for monitors Alexander Shiyan ASoC: fsl_esai: Fix TDM slot setup for I2S mode Arnd Bergmann ARM: keystone: fix integer overflow warning Tong Zhu neighbour: Disregard DEAD dst in neigh_update Wang Qing arc: kernel: Return -EFAULT if copy_to_user() fails Tony Lindgren ARM: dts: Fix moving mmc devices with aliases for omap4 & 5 Andy Shevchenko dmaengine: dw: Make it dependent to HAS_IOMEM Fabian Vogt Input: nspire-keypad - enable interrupts only when opened Or Cohen net/sctp: fix race condition in sctp_destroy_sock ------------- Diffstat: Makefile | 4 +- arch/arc/kernel/signal.c | 4 +- arch/arm/boot/dts/omap3.dtsi | 3 ++ arch/arm/boot/dts/omap4.dtsi | 5 ++ arch/arm/boot/dts/omap5.dtsi | 5 ++ arch/arm/mach-keystone/keystone.c | 4 +- arch/arm/probes/uprobes/core.c | 4 +- arch/ia64/mm/discontig.c | 6 +-- arch/s390/kernel/entry.S | 1 + arch/x86/kernel/crash.c | 3 +- drivers/dma/dw/Kconfig | 2 + drivers/hid/hid-alps.c | 1 + drivers/input/keyboard/nspire-keypad.c | 56 ++++++++++++---------- drivers/input/serio/i8042-x86ia64io.h | 1 + drivers/net/ethernet/amd/pcnet32.c | 5 +- drivers/net/ethernet/cavium/liquidio/cn66xx_regs.h | 2 +- drivers/net/ethernet/davicom/dm9000.c | 6 ++- drivers/net/ethernet/intel/i40e/i40e_main.c | 6 +++ drivers/net/usb/hso.c | 33 +++++-------- drivers/net/xen-netback/xenbus.c | 12 +++-- drivers/scsi/libsas/sas_ata.c | 9 ++-- drivers/usb/usbip/stub_dev.c | 11 ++++- drivers/usb/usbip/usbip_common.h | 3 ++ drivers/usb/usbip/usbip_event.c | 2 + drivers/usb/usbip/vhci_hcd.c | 1 + drivers/usb/usbip/vhci_sysfs.c | 30 ++++++++++-- drivers/usb/usbip/vudc_dev.c | 1 + drivers/usb/usbip/vudc_sysfs.c | 7 ++- fs/ext4/namei.c | 2 +- net/core/neighbour.c | 2 +- net/ieee802154/nl802154.c | 29 +++++++++++ net/ipv6/sit.c | 4 +- net/sctp/socket.c | 13 ++--- sound/soc/fsl/fsl_esai.c | 8 ++-- tools/arch/ia64/include/asm/barrier.h | 3 -- 35 files changed, 190 insertions(+), 98 deletions(-)