Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp1637915pxy; Mon, 2 Aug 2021 06:49:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxcxrz8kOClnMSO6wCl82qaR6eFUAKBJUFrplUhcmMVtrxOnUcJ8eNOtwLwrE++bec3vsrv X-Received: by 2002:a05:6e02:784:: with SMTP id q4mr1259468ils.174.1627912172509; Mon, 02 Aug 2021 06:49:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627912172; cv=none; d=google.com; s=arc-20160816; b=qx9gav/MKtqb6/nckyXbtaHSEyiaR5Xj90Ia4Cq+eVEpTp17ZfJz1L4dwDaLTrbb+9 tUdmgm4uhg0rf1jmzohgaFki8F214D0lehElwM+FdO5nGRJ8+J8WbyZs6ky9NBcj4Doe wRX7uUpGH0C/KUZX5r88ThM2PURzZkvq/EYqUEOhn7adjkjCFO/1/EkjR04+6v28d4Fd YQbPpi4TBPUEn8q9q9sCXZU/UlLYuY/rN1tF/xsDTUAizJvOO9rCyGOhOtVEYAs61whj VuBhY8x+Z/p8vF9HcSdNj+gvIEEE8gqHz+bzmOP+/lPM8QmJN2tVObBt0kHWC7ET117A RcoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=EfD9xtfBOBbhUTVtU/xB25KvTLhHL9AYl2CdYJ9nth8=; b=ZJGMFVfKgrzxHDwIMe/UuM5xVp/uWkvDZkEuwLkRl1Aikx2IabMglwAHBUsmOC2HKX Bkrb1k6nPDgb0gkie//A/3NVHqEbMH0JSOFGdlo4GHgP/GuJxgIuZ+V5VzbCLa8HvbXY lAOe2KU6dt2Ll6mzOZUFmzeF6NTywMdi/KbQWW4bPf2Ovz8523MMmKCPY5xpO+RfYock Q09Wj3d90VtN5l9sK9Gc9aqaLB3k2As7j0Eu7Olht+Krbp9lmhXpp2kkkmvgQjY7aTB9 i9MFGyeChdnKoeSiG5JV0N2NTkttsBPoOF+Gm01Qc1bA5/2cdwpH0iOdDh+aGSWSLt+H Q6aQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ZKvoSgdb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n3si13644681ioh.98.2021.08.02.06.49.21; Mon, 02 Aug 2021 06:49:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ZKvoSgdb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234552AbhHBNs3 (ORCPT + 99 others); Mon, 2 Aug 2021 09:48:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:56300 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234058AbhHBNqj (ORCPT ); Mon, 2 Aug 2021 09:46:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B294260F6D; Mon, 2 Aug 2021 13:46:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627911989; bh=e6PekA7Irec1lEjiPv97qbqcAsPUFP/IHOnPpEKJqK4=; h=From:To:Cc:Subject:Date:From; b=ZKvoSgdbR4jsXJmMxXaNGpFAR5RegcNGq+X2Vw+s7TIv8XBxXUJ83jwglZ3bcU2+L YMEs/Ii/DQ6EoGRkLjuH3rWAB541045GOEKEGInT4zcmxK9QstZyfLxuTJI/nxcBfi T8MPR38b2BMa6w08laO122ojP5u0NjdHxlllibHo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, stable@vger.kernel.org Subject: [PATCH 4.4 00/26] 4.4.278-rc1 review Date: Mon, 2 Aug 2021 15:44:10 +0200 Message-Id: <20210802134332.033552261@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.278-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.278-rc1 X-KernelTest-Deadline: 2021-08-04T13:43+00:00 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.4.278 release. There are 26 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 04 Aug 2021 13:43:24 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.278-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.278-rc1 Wang Hai sis900: Fix missing pci_disable_device() in probe and remove Wang Hai tulip: windbond-840: Fix missing pci_disable_device() in probe and remove Pavel Skripkin net: llc: fix skb_over_panic Jiapeng Chong mlx4: Fix missing error code in mlx4_load_one() Hoang Le tipc: fix sleeping in tipc accept routine Pablo Neira Ayuso netfilter: nft_nat: allow to specify layer 4 protocol NAT only Nguyen Dinh Phi cfg80211: Fix possible memory leak in function cfg80211_bss_update Jan Kiszka x86/asm: Ensure asm/proto.h can be included stand-alone Paul Jakma NIU: fix incorrect error return, missed in previous revert Pavel Skripkin can: esd_usb2: fix memory leak Pavel Skripkin can: ems_usb: fix memory leak Pavel Skripkin can: usb_8dev: fix memory leak Junxiao Bi ocfs2: issue zeroout to EOF blocks Junxiao Bi ocfs2: fix zero out valid data Russell King ARM: ensure the signal page contains defined contents Matthew Wilcox lib/string.c: add multibyte memset functions Sudeep Holla ARM: dts: versatile: Fix up interrupt controller node names Desmond Cheong Zhi Xi hfs: add lock nesting notation to hfs_find_init Desmond Cheong Zhi Xi hfs: fix high memory mapping in hfs_bnode_read Desmond Cheong Zhi Xi hfs: add missing clean-up in hfs_fill_super Xin Long sctp: move 198 addresses from unusable to private scope Yang Yingliang net/802/garp: fix memleak in garp_request_join() Yang Yingliang net/802/mrp: fix memleak in mrp_request_join() Yang Yingliang workqueue: fix UAF in pwq_unbound_release_workfn() Miklos Szeredi af_unix: fix garbage collect vs MSG_PEEK Jens Axboe net: split out functions related to registering inflight socket files ------------- Diffstat: Makefile | 4 +- arch/arm/boot/dts/versatile-ab.dts | 5 +- arch/arm/boot/dts/versatile-pb.dts | 2 +- arch/arm/kernel/signal.c | 14 ++- arch/x86/include/asm/proto.h | 2 + drivers/net/can/usb/ems_usb.c | 14 ++- drivers/net/can/usb/esd_usb2.c | 16 ++- drivers/net/can/usb/usb_8dev.c | 15 ++- drivers/net/ethernet/dec/tulip/winbond-840.c | 7 +- drivers/net/ethernet/mellanox/mlx4/main.c | 1 + drivers/net/ethernet/sis/sis900.c | 7 +- drivers/net/ethernet/sun/niu.c | 3 +- fs/hfs/bfind.c | 14 ++- fs/hfs/bnode.c | 25 ++++- fs/hfs/btree.h | 7 ++ fs/hfs/super.c | 10 +- fs/ocfs2/file.c | 103 ++++++++++------- include/linux/string.h | 30 +++++ include/net/af_unix.h | 1 + include/net/llc_pdu.h | 31 ++++-- include/net/sctp/constants.h | 4 +- kernel/workqueue.c | 20 ++-- lib/string.c | 66 +++++++++++ net/802/garp.c | 14 +++ net/802/mrp.c | 14 +++ net/Makefile | 2 +- net/llc/af_llc.c | 10 +- net/llc/llc_s_ac.c | 2 +- net/netfilter/nft_nat.c | 4 +- net/sctp/protocol.c | 3 +- net/tipc/socket.c | 9 +- net/unix/Kconfig | 5 + net/unix/Makefile | 2 + net/unix/af_unix.c | 115 ++++++++----------- net/unix/garbage.c | 68 +---------- net/unix/scm.c | 161 +++++++++++++++++++++++++++ net/unix/scm.h | 10 ++ net/wireless/scan.c | 6 +- 38 files changed, 579 insertions(+), 247 deletions(-)