Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3817451pxv; Mon, 28 Jun 2021 13:41:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw+MrAtGA8V9Ucbaq+TMkEES1gu8TmO3JM2ZIAeoSe4A8l9RO2XYX17pJw8XqLiwvCAIEkz X-Received: by 2002:a02:cbdb:: with SMTP id u27mr1249490jaq.3.1624912895307; Mon, 28 Jun 2021 13:41:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624912895; cv=none; d=google.com; s=arc-20160816; b=FGbsHOXxnMd6cnllU1vTKkiaioGGRPPq5PyxembRuMua3YAY8F88d2cenHF1jlFzIm aAm/s6SCnIIac9pbrtKnmVExaJ1p4b5zz/brYfbsIQIofde1ZhC575DN4eYc1cxkQs+B p8LtaDcUNNiChIgnlwmX8O2iXBJyYGpETwZQ3Ot0xU0iZVUI+HZgO2RgnZFJi/GCXcHW LyK8Zq428XEUKigcEGz3CyzVDBduXwbNAxOYIVSGuZ29Gj/HYkM9cNgukmTKtQ8unZVf 4+0nVpUGwfX4bVeSgrZ4yKv0/pWYEbgMi8d4ldA1Ul/UTwo1VZUOAaDXDI2vDzzJTq5g seGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=A+FR+YBgwl7+SsnCPovKmWAWl+i9/sZEh1qZ1SFiP98=; b=XKOcJji0AT0zTrskCbQVTIK71lNCaBoEEUL6YxccbT33iOJDuBaY7jCOzfZwY/kVch FtgyohNBKiO/RtOj3DUmhEGzlkpbhu+a21TwokmSWn+JhQDZPMRx8BZZcDeXMXTap10q A+fAIjxsloIO1ob5Inu3dej6DoGbr1t6FAweZumBpUUkom26zHhJaA9LSnf0ROlOrnDT QU7YGQ0D74B5FcWpHqy926jr9pdiLj94SfEy4+kDdQhn9NtedVuy6WTXjAlpfLSO3WY6 5zvpQEWmWQdz0C0vpxr2sNguCl83zhpLHMV8i66gigemohmLICTanuSrvo0W4FV/cmR2 Z/Vg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qWUiiLqB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w19si1320287jal.79.2021.06.28.13.41.21; Mon, 28 Jun 2021 13:41:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qWUiiLqB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236264AbhF1PQ5 (ORCPT + 99 others); Mon, 28 Jun 2021 11:16:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:57926 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236289AbhF1OzP (ORCPT ); Mon, 28 Jun 2021 10:55:15 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8812B61206; Mon, 28 Jun 2021 14:40:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624891205; bh=31oPfyfL8dLTk9DiHHpsrGYZpelhJrk4gFIzxyPxeK4=; h=From:To:Cc:Subject:Date:From; b=qWUiiLqBZ5XmTMgvtXj7zaDdusR7Cn9cXOs92s+1P+Zw7BHpVm0PCOmZ4BHmTNDOB 19ygRL/JHa70OTFUP1cixhkBwh6ZrK8od1rg5qTv9Z3u5LqEq1VX4Nd08dmbSQnYtJ Umv+GcO3B2Ja3z0fSe9YVZNvaOxgewsAOjAaB722QxHpxC84dLe73O+ophB16pyNhN 00zwH4n5VS3gLn3JdzSprKB+sFs0wf/gdlmBFuoXkX4Nc5KBrGCZVGWh5JEt+VqoWv nrtaf4N0RdSrVryYzxRtFnrNi0Cb2QLq97vYedRKBuaTe5Oj+2XNT41iq8oRUmCT8W cRl5rIbw+E2pQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Sasha Levin , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org Subject: [PATCH 4.9 00/71] 4.9.274-rc1 review Date: Mon, 28 Jun 2021 10:38:52 -0400 Message-Id: <20210628144003.34260-1-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.274-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.274-rc1 X-KernelTest-Deadline: 2021-06-30T14:39+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.9.274 release. There are 71 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed 30 Jun 2021 02:39:51 PM UTC. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/patch/?id=linux-4.9.y&id2=v4.9.273 or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. Thanks, Sasha ------------- Pseudo-Shortlog of commits: Alexander Duyck (1): i40e: Be much more verbose about what we can and cannot offload Anirudh Rayabharam (1): HID: usbhid: fix info leak in hid_submit_ctrl Antti Järvinen (1): PCI: Mark TI C667X to avoid bus reset Arnd Bergmann (1): ARM: 9081/1: fix gcc-10 thumb2-kernel regression Bixuan Cui (1): HID: gt683r: add missing MODULE_DEVICE_TABLE Bumyong Lee (1): dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc Chen Li (1): radeon: use memcpy_to/fromio for UVD fw upload Chengyang Fan (1): net: ipv4: fix memory leak in ip_mc_add1_src Christophe JAILLET (4): alx: Fix an error handling path in 'alx_probe()' qlcnic: Fix an error handling path in 'qlcnic_probe()' netxen_nic: Fix an error handling path in 'netxen_nic_probe()' be2net: Fix an error handling path in 'be_probe()' Dan Robertson (1): net: ieee802154: fix null deref in parse dev addr Dongliang Mu (1): net: usb: fix possible use-after-free in smsc75xx_bind Du Cheng (1): cfg80211: call cfg80211_leave_ocb when switching away from OCB Eric Dumazet (5): net/af_unix: fix a data-race in unix_dgram_sendmsg / unix_release_sock inet: use bigger hash table for IP ID generation inet: annotate date races around sk->sk_txhash net/packet: annotate accesses to po->bind net/packet: annotate accesses to po->ifindex Esben Haabendal (1): net: ll_temac: Avoid ndo_start_xmit returning NETDEV_TX_BUSY Fugang Duan (1): net: fec_ptp: add clock rate zero check Hillf Danton (1): gfs2: Fix use-after-free in gfs2_glock_shrink_scan Ido Schimmel (1): rtnetlink: Fix regression in bridge VLAN configuration Jiapeng Chong (2): ethernet: myri10ge: Fix missing error code in myri10ge_probe() rtnetlink: Fix missing error code in rtnl_bridge_notify() Jisheng Zhang (1): net: stmmac: dwmac1000: Fix extended MAC address registers definition Johan Hovold (1): i2c: robotfuzz-osif: fix control-request directions Johannes Berg (2): mac80211: remove warning in ieee80211_get_sband() mac80211: drop multicast fragments Josh Triplett (1): net: ipconfig: Don't override command-line hostnames or domains Kees Cook (4): r8152: Avoid memcpy() over-reading of ETH_SS_STATS sh_eth: Avoid memcpy() over-reading of ETH_SS_STATS r8169: Avoid memcpy() over-reading of ETH_SS_STATS net: qed: Fix memcpy() overflow of qed_dcbx_params() Linyu Yuan (1): net: cdc_eem: fix tx fixup skb leak Maciej Żenczykowski (1): net: cdc_ncm: switch to eth%d interface naming Mark Bolhuis (1): HID: Add BUS_VIRTUAL to hid_connect logging Maurizio Lombardi (1): scsi: target: core: Fix warning on realtime kernels Maxim Mikityanskiy (1): netfilter: synproxy: Fix out of bounds when parsing TCP options Ming Lei (1): scsi: core: Put .shost_dev in failure path if host state changes to RUNNING Nanyong Sun (1): net: ipv4: fix memory leak in netlbl_cipsov4_add_std Naoya Horiguchi (1): mm: hwpoison: change PageHWPoison behavior on hugetlb pages Nathan Chancellor (1): Makefile: Move -Wno-unused-but-set-variable out of GCC only block Norbert Slusarek (1): can: bcm: fix infoleak in struct bcm_msg_head Paolo Abeni (1): udp: fix race between close() and udp_abort() Pavel Skripkin (5): net: rds: fix memory leak in rds_recvmsg net: hamradio: fix memory leak in mkiss_close net: ethernet: fix potential use-after-free in ec_bhf_remove net: caif: fix memory leak in ldisc_open nilfs2: fix memory leak in nilfs_sysfs_delete_device_group Peter Chen (1): usb: dwc3: core: fix kernel panic when do reboot Rafael J. Wysocki (1): Revert "PCI: PM: Do not read power state in pci_enable_device_flags()" Randy Dunlap (1): dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM Sasha Levin (1): Linux 4.9.274-rc1 Shanker Donthineni (1): PCI: Mark some NVIDIA GPUs to avoid bus reset Srinivas Pandruvada (1): HID: hid-sensor-hub: Return error for hid_set_field() failure Steven Rostedt (VMware) (3): tracing: Do no increment trace_clock_global() by one tracing: Do not stop recording cmdlines when tracing is off tracing: Do not stop recording comms if the trace file is being read Suzuki K Poulose (1): arm64: perf: Disable PMU while processing counter overflows Sven Eckelmann (1): batman-adv: Avoid WARN_ON timing related checks Tetsuo Handa (1): can: bcm/raw/isotp: use per module netdevice notifier Thomas Gleixner (1): x86/fpu: Reset state for all signal restore failures Vineet Gupta (1): ARCv2: save ABI registers across signal handling Yang Yingliang (1): dmaengine: stedma40: add missing iounmap() on error in d40_probe() Yongqiang Liu (1): ARM: OMAP2+: Fix build warning when mmc_omap is not built Zheng Yongjun (4): net/x25: Return the correct errno code net: Return the correct errno code fib: Return the correct errno code ping: Check return value of function 'ping_queue_rcv_skb' Makefile | 7 +- arch/arc/include/uapi/asm/sigcontext.h | 1 + arch/arc/kernel/signal.c | 43 +++++++++ arch/arm/kernel/setup.c | 16 ++-- arch/arm/mach-omap2/board-n8x0.c | 2 +- arch/arm64/kernel/perf_event.c | 50 ++++++----- arch/x86/kernel/fpu/signal.c | 18 ++-- drivers/dma/pl330.c | 6 +- drivers/dma/qcom/Kconfig | 1 + drivers/dma/ste_dma40.c | 3 + drivers/gpu/drm/radeon/radeon_uvd.c | 4 +- drivers/hid/hid-core.c | 3 + drivers/hid/hid-gt683r.c | 1 + drivers/hid/hid-sensor-hub.c | 13 ++- drivers/hid/usbhid/hid-core.c | 2 +- drivers/i2c/busses/i2c-robotfuzz-osif.c | 4 +- drivers/net/caif/caif_serial.c | 1 + drivers/net/ethernet/atheros/alx/main.c | 1 + drivers/net/ethernet/ec_bhf.c | 4 +- drivers/net/ethernet/emulex/benet/be_main.c | 1 + drivers/net/ethernet/freescale/fec_ptp.c | 4 + drivers/net/ethernet/intel/i40e/i40e_main.c | 52 +++++++++-- .../net/ethernet/myricom/myri10ge/myri10ge.c | 1 + .../ethernet/qlogic/netxen/netxen_nic_main.c | 2 + drivers/net/ethernet/qlogic/qed/qed_dcbx.c | 4 +- .../net/ethernet/qlogic/qlcnic/qlcnic_main.c | 1 + drivers/net/ethernet/realtek/r8169.c | 2 +- drivers/net/ethernet/renesas/sh_eth.c | 2 +- .../net/ethernet/stmicro/stmmac/dwmac1000.h | 8 +- drivers/net/ethernet/xilinx/ll_temac_main.c | 5 ++ drivers/net/hamradio/mkiss.c | 1 + drivers/net/usb/cdc_eem.c | 2 +- drivers/net/usb/cdc_ncm.c | 2 +- drivers/net/usb/r8152.c | 2 +- drivers/net/usb/smsc75xx.c | 10 ++- drivers/pci/pci.c | 16 +++- drivers/pci/quirks.c | 22 +++++ drivers/scsi/hosts.c | 8 +- drivers/target/target_core_transport.c | 4 +- drivers/usb/dwc3/core.c | 2 +- fs/gfs2/glock.c | 2 +- fs/nilfs2/sysfs.c | 1 + include/linux/hid.h | 3 +- include/linux/swapops.h | 9 -- include/net/sock.h | 10 ++- kernel/trace/trace.c | 12 --- kernel/trace/trace_clock.c | 6 +- mm/memory-failure.c | 87 +++++-------------- net/batman-adv/bat_iv_ogm.c | 4 +- net/can/bcm.c | 64 +++++++++++--- net/can/raw.c | 62 ++++++++++--- net/compat.c | 2 +- net/core/fib_rules.c | 2 +- net/core/rtnetlink.c | 4 + net/ieee802154/nl802154.c | 9 +- net/ipv4/cipso_ipv4.c | 1 + net/ipv4/igmp.c | 1 + net/ipv4/ipconfig.c | 13 +-- net/ipv4/ping.c | 12 +-- net/ipv4/route.c | 42 ++++++--- net/ipv4/udp.c | 10 +++ net/ipv6/udp.c | 3 + net/mac80211/ieee80211_i.h | 2 +- net/mac80211/rx.c | 9 +- net/netfilter/nf_synproxy_core.c | 5 ++ net/packet/af_packet.c | 32 +++---- net/rds/recv.c | 2 +- net/unix/af_unix.c | 7 +- net/wireless/util.c | 3 + net/x25/af_x25.c | 2 +- 70 files changed, 493 insertions(+), 259 deletions(-) -- 2.30.2