Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2631084pxj; Mon, 14 Jun 2021 03:31:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwZWdMDRfBGi6655w94FiEWPlTu9om3e1TIbd6oPh70yuVxtoL3FsPjA4la+o0CViNXimhx X-Received: by 2002:a05:6402:1d38:: with SMTP id dh24mr16485456edb.18.1623666714067; Mon, 14 Jun 2021 03:31:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623666714; cv=none; d=google.com; s=arc-20160816; b=gRDaQ+ryCCbjWTjMp9l0MWUCFASA1CZqUwDyjkvDLw9W49reDaJC+Y4b6oQlbq3PlK Lg/Vmql0eYlI6Uz1BhGcHZY2lTeWQ/lNYqtCWTgTLOPBTItpNLwmWjUYN97DQFMU6sF/ SUB0//fFN46f0+iYPtFwfArwO2byQNWiCuSCkaQxxL2/jlgvCBRR5fRb11EXIlIIBlQo rKxLMRS5RaQ93vGWPX6ik9o9cpqThEkeEiM6KfHR3D7rQ+Xh0EI8ZCcuF9VdbD0NbFJX zMLECuuutbkO15fkYMXV5m9nQQj15JZIYPHxj8eXfQbcbXpvm9Or9LVq0oqPr566AA0V jdNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=ZgNxzpjN8hWF4S1BcHt+Bfh0Vzu6rbhBzkhLYqEm5BM=; b=fAdwM8mCJW3Q+oN84IB81dQ4GIn6ACF0Kl5Oj38Az5HbNRPngIEj2TWC0OXu/dbSBi yiUXBtHyzhf57T9LpLOo2BxeGdGp2vWUGaPD8Byp48DkzOF049lpDIhx5oDEhG8UoFcU 2GBzs24wC5+OrEpRgiF7iD2sL2e6AUlECbFOuCyo4KlklAB/4FzNJ7J6aDVUToRPUSqb wQhfpIqgKEegVke809kie8Tb5ixCyqDstyKdZgvCcLptHjS6b/IrxjZ5DtQ7lbmuUaIZ pZ+oSpsAiNw2/JhrN8dRI9TiLWe7JKRpMHFvDOOj2p+UxNHemFdWwBcBCL76WX9LK4t+ N5NQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=q0yCfKCe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dd1si11382998edb.49.2021.06.14.03.31.31; Mon, 14 Jun 2021 03:31:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=q0yCfKCe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232915AbhFNKbp (ORCPT + 99 others); Mon, 14 Jun 2021 06:31:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:37944 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232881AbhFNKbN (ORCPT ); Mon, 14 Jun 2021 06:31:13 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BC267611EE; Mon, 14 Jun 2021 10:29:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623666551; bh=qsmRx8u0yLDD+IyCKvCb6rruykZJ665Q6sBFrMfym3M=; h=From:To:Cc:Subject:Date:From; b=q0yCfKCeBmDfodXYZmH0e4szUJp1KRbKuse9HKeyPZ19ILHTDnF5G2YCHP7WkY/82 y69Dr+uAU/PaAco21kZDvNqxKF0a9h4zA+sUy33cEVCkYtHtkU5lsbth5WvI/j8XAE w1s/+IA7B883EVDn2VuwEuzWLi2P3oQxESOhPR9E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, stable@vger.kernel.org Subject: [PATCH 4.4 00/34] 4.4.273-rc1 review Date: Mon, 14 Jun 2021 12:26:51 +0200 Message-Id: <20210614102641.582612289@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.273-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.273-rc1 X-KernelTest-Deadline: 2021-06-16T10:26+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.4.273 release. There are 34 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 16 Jun 2021 10:26:30 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.273-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.273-rc1 Steven Rostedt (VMware) ftrace: Do not blindly read the ip address in ftrace_bug() Ming Lei scsi: core: Only put parent device if host state differs from SHOST_CREATED Dai Ngo NFSv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error. Paolo Bonzini kvm: fix previous commit for 32-bit builds Leo Yan perf session: Correct buffer copying when peeking events Dan Carpenter NFS: Fix a potential NULL dereference in nfs_get_client() Marco Elver perf: Fix data race between pin_count increment/decrement Linyu Yuan usb: gadget: eem: fix wrong eem header operation Johan Hovold USB: serial: quatech2: fix control-request directions Alexandre GRIVEAUX USB: serial: omninet: add device id for Zyxel Omni 56K Plus George McCollister USB: serial: ftdi_sio: add NovaTech OrionMX product ID Marian-Cristian Rotariu usb: dwc3: ep0: fix NULL pointer exception Maciej Żenczykowski USB: f_ncm: ncm_bitrate (speed) is unsigned Alexander Kuznetsov cgroup1: don't allow '\n' in renaming Ritesh Harjani btrfs: return value from btrfs_mark_extent_written() in case of error Paolo Bonzini kvm: avoid speculation-based attacks from out-of-range memslot accesses Chris Packham i2c: mpc: implement erratum A-004447 workaround Chris Packham i2c: mpc: Make use of i2c_recover_bus() Chris Packham powerpc/fsl: set fsl,i2c-erratum-a004447 flag for P1010 i2c controllers Chris Packham powerpc/fsl: set fsl,i2c-erratum-a004447 flag for P2041 i2c controllers Jiapeng Chong bnx2x: Fix missing error code in bnx2x_iov_init_one() Tiezhu Yang MIPS: Fix kernel hang under FUNCTION_GRAPH_TRACER and PREEMPT_TRACER Saubhik Mukherjee net: appletalk: cops: Fix data race in cops_probe1 Zong Li net: macb: ensure the device is available before accessing GEMGXL control registers Dmitry Bogdanov scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal Matt Wang scsi: vmw_pvscsi: Set correct residual data length Zheyu Ma net/qla3xxx: fix schedule while atomic in ql_sem_spinlock Dan Carpenter net: mdiobus: get rid of a BUG_ON() Johannes Berg netlink: disable IRQs for netlink_lock_table() Johannes Berg bonding: init notify_work earlier to avoid uninitialized use Zheyu Ma isdn: mISDN: netjet: Fix crash in nj_probe: Zou Wei ASoC: sti-sas: add missing MODULE_DEVICE_TABLE Jeimon net/nfc/rawsock.c: fix a permission check bug Kees Cook proc: Track /proc/$pid/attr/ opener mm_struct ------------- Diffstat: Makefile | 4 +- arch/mips/lib/mips-atomic.c | 12 +-- arch/powerpc/boot/dts/fsl/p1010si-post.dtsi | 8 ++ arch/powerpc/boot/dts/fsl/p2041si-post.dtsi | 16 ++++ drivers/i2c/busses/i2c-mpc.c | 95 ++++++++++++++++++++++- drivers/isdn/hardware/mISDN/netjet.c | 1 - drivers/net/appletalk/cops.c | 4 +- drivers/net/bonding/bond_main.c | 2 +- drivers/net/ethernet/broadcom/bnx2x/bnx2x_sriov.c | 4 +- drivers/net/ethernet/cadence/macb.c | 3 + drivers/net/ethernet/qlogic/qla3xxx.c | 2 +- drivers/net/phy/mdio_bus.c | 3 +- drivers/scsi/hosts.c | 2 +- drivers/scsi/qla2xxx/qla_target.c | 2 + drivers/scsi/vmw_pvscsi.c | 8 +- drivers/usb/dwc3/ep0.c | 3 + drivers/usb/gadget/function/f_eem.c | 4 +- drivers/usb/gadget/function/f_ncm.c | 2 +- drivers/usb/serial/ftdi_sio.c | 1 + drivers/usb/serial/ftdi_sio_ids.h | 1 + drivers/usb/serial/omninet.c | 2 + drivers/usb/serial/quatech2.c | 6 +- fs/btrfs/file.c | 4 +- fs/nfs/client.c | 2 +- fs/nfs/nfs4proc.c | 8 ++ fs/proc/base.c | 9 ++- include/linux/kvm_host.h | 11 ++- kernel/cgroup.c | 4 + kernel/events/core.c | 2 + kernel/trace/ftrace.c | 8 +- net/netlink/af_netlink.c | 6 +- net/nfc/rawsock.c | 2 +- sound/soc/codecs/sti-sas.c | 1 + tools/perf/util/session.c | 1 + 34 files changed, 209 insertions(+), 34 deletions(-)