Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp6121421pxv; Thu, 29 Jul 2021 07:04:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzcGW1JSR5533MZa968K40WBO2NOA8C8FIPflkOGOSG+gnOUfa71zaj4rsAgj/hwO4JQoK5 X-Received: by 2002:a6b:e60f:: with SMTP id g15mr4235383ioh.48.1627567447903; Thu, 29 Jul 2021 07:04:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627567447; cv=none; d=google.com; s=arc-20160816; b=gdlA/AOJL2ge2ReY6eL6YCyAjhfl2xq7LXbwyky7yj8+m1uLpZPxUpoVf/Fuyzf9TI IpiF1CEqxzbbvB4DgTwP+YQuSY9Fe6Jt85ueLN01OfD8oGUuBmvbbOmJrNDatgQ552ZN 3iyNuo49lqYx/92Peah8SFUOQ7EEM/T8hK4aIlF6hqN4KZy5Orx1esoLHHtV+RQXZ94V CXcrFPgUUOTvFBVKiT1Zx0nrXUIzNja8fhw+KnAL06C8dD9XiHPyK2lrsv9u2+xnxb04 i0tzBaDxqj+EOTd+PG/vIZ8eOHt9UY5yQHKcPIYJTmoStu9s/mYD3XGTXZCk6hH02R2o +jXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=AlULBQ6QJVr31+TCaJI3GaEZkOLS3rUcmOWWtzvfYhI=; b=Cm8NjcMJoqjz7A3+oFPG3Q/vVZ5fz2oXAO4vAKHY7M4MMTo0VJp7IEktW0AHVM/pMU RFbOM4I2h2/7fa6ObAOALRLbDAGUm1czA/pD+e6FfrQwDc5D0EOvIq9fcK4ugJU56OAN Det7Nc70rEsNEc7Lz7xkANrBNfmJCTctEwXhUIhoLd1ARgYb0svPm9ZY3OBD+Fu9bGkA J2d3x2mICnuUHzqpS3iOEpsV6t2aqXopXOUPs5NVJIyPVq1r2nKqc82Jza9fgkn7omW1 SKV5yKNr4EPxlXxuDL/NlQ57lL3Aavdg5DnOxXqV5mjLAd1MHPbH6iMF+rTIGv56XUWg ROPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=z9qGB7HN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n13si3572049ioj.25.2021.07.29.07.03.56; Thu, 29 Jul 2021 07:04:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=z9qGB7HN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238525AbhG2OBc (ORCPT + 99 others); Thu, 29 Jul 2021 10:01:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:48872 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238093AbhG2N6y (ORCPT ); Thu, 29 Jul 2021 09:58:54 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3506761040; Thu, 29 Jul 2021 13:58:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627567126; bh=z/eAghivfB8PvDeoVAEx8JQz6zCL53hx6Z2aXp+N624=; h=From:To:Cc:Subject:Date:From; b=z9qGB7HN6ZRuDVRXwTY7HwqBEA2QyVhUH2dsdEnFAAdjR8rjPXdeR/6Zlyr78XCic 5mQHNF93xnwSWFiUh9GJvJZEXWr6zuoLuzUqb0SoLxy8+A11M4L77n1+0QDI4WA8GO bn5dm/BsexjE9GBdOVscfrFoki0NmUmRcY1e7+TY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, stable@vger.kernel.org Subject: [PATCH 5.10 00/24] 5.10.55-rc1 review Date: Thu, 29 Jul 2021 15:54:20 +0200 Message-Id: <20210729135137.267680390@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.55-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.10.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.10.55-rc1 X-KernelTest-Deadline: 2021-07-31T13:51+00:00 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 5.10.55 release. There are 24 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat, 31 Jul 2021 13:51:22 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.55-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.10.55-rc1 Vasily Averin ipv6: ip6_finish_output2: set sk into newly allocated nskb Sudeep Holla ARM: dts: versatile: Fix up interrupt controller node names Christoph Hellwig iomap: remove the length variable in iomap_seek_hole Christoph Hellwig iomap: remove the length variable in iomap_seek_data Hyunchul Lee cifs: fix the out of range assignment to bit fields in parse_server_interfaces Cristian Marussi firmware: arm_scmi: Fix range check for the maximum number of pending messages Sudeep Holla firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow Desmond Cheong Zhi Xi hfs: add lock nesting notation to hfs_find_init Desmond Cheong Zhi Xi hfs: fix high memory mapping in hfs_bnode_read Desmond Cheong Zhi Xi hfs: add missing clean-up in hfs_fill_super Zheyu Ma drm/ttm: add a check against null pointer dereference Vasily Averin ipv6: allocate enough headroom in ip6_finish_output2() Paul E. McKenney rcu-tasks: Don't delete holdouts within trc_wait_for_one_reader() Paul E. McKenney rcu-tasks: Don't delete holdouts within trc_inspect_reader() Xin Long sctp: move 198 addresses from unusable to private scope Eric Dumazet net: annotate data race around sk_ll_usec Yang Yingliang net/802/garp: fix memleak in garp_request_join() Yang Yingliang net/802/mrp: fix memleak in mrp_request_join() Paul Gortmaker cgroup1: fix leaked context root causing sporadic NULL deref in LTP Yang Yingliang workqueue: fix UAF in pwq_unbound_release_workfn() Miklos Szeredi af_unix: fix garbage collect vs MSG_PEEK Maxim Levitsky KVM: x86: determine if an exception has an error code only when injecting it. Pavel Begunkov io_uring: fix link timeout refs Yonghong Song tools: Allow proper CC/CXX/... override with LLVM=1 in Makefile.include ------------- Diffstat: Makefile | 4 +-- arch/arm/boot/dts/versatile-ab.dts | 5 ++-- arch/arm/boot/dts/versatile-pb.dts | 2 +- arch/x86/kvm/x86.c | 13 ++++++--- drivers/firmware/arm_scmi/driver.c | 12 ++++---- drivers/gpu/drm/ttm/ttm_range_manager.c | 3 ++ fs/cifs/smb2ops.c | 4 +-- fs/hfs/bfind.c | 14 ++++++++- fs/hfs/bnode.c | 25 ++++++++++++---- fs/hfs/btree.h | 7 +++++ fs/hfs/super.c | 10 +++---- fs/internal.h | 1 - fs/io_uring.c | 1 - fs/iomap/seek.c | 25 ++++++---------- include/linux/fs_context.h | 1 + include/net/busy_poll.h | 2 +- include/net/sctp/constants.h | 4 +-- kernel/cgroup/cgroup-v1.c | 4 +-- kernel/rcu/tasks.h | 6 ++-- kernel/workqueue.c | 20 ++++++++----- net/802/garp.c | 14 +++++++++ net/802/mrp.c | 14 +++++++++ net/core/sock.c | 2 +- net/ipv6/ip6_output.c | 28 ++++++++++++++++++ net/sctp/protocol.c | 3 +- net/unix/af_unix.c | 51 +++++++++++++++++++++++++++++++-- tools/scripts/Makefile.include | 12 ++++++-- 27 files changed, 217 insertions(+), 70 deletions(-)