Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1487894pxb; Wed, 2 Feb 2022 06:10:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJz42DrOaNli3il6dhQRRccYJVw56SFqlXqwvySgSNCK/Ax/z+6mtZCFmHbg+MWYwFpL9jes X-Received: by 2002:a63:6886:: with SMTP id d128mr24219602pgc.522.1643811024563; Wed, 02 Feb 2022 06:10:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643811024; cv=none; d=google.com; s=arc-20160816; b=Mjs5SxQ9ZEMwU6shPiQXddQfyG8OReEv6hPwcXr+vV9/Kyk5EY8gSp+jRTl9KA886u NUP59yGoCMpEBMYmU59UulMVtMqjoPFnPNwzmV98NFo7zzuSAOIf0MAtUPx/hPL/CAmc IaRsfEkjFqOWRAJ2b7G7ISCtunSLhTE28EYf6rwNbyGZZ1oWmykr9y917PocTpiTBRHa JKSTfczRwVE7/ALMhYXt95Ql5i3mVVTGMwJu/51Vy154Con0HiT8QknaBmZ9FkoRThcf ckHQPAWOEdQEVUmxvb4QQqHY/knTfk1v8OgKE1v95p1UjXhsi/kV7rjLJWug4LgW7KR/ N4Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=wAFB7vE76nHm6ZsB0Ex1+ydUjwJfjAlr85YBLT8qVws=; b=kgcl3iGhI/aUZ8mynNBeDYMRtBeJkvU9x+UzusX829YrcICSxfqymt6WJwIZak5/+o 37SCzrkPDDyrAuHACgQRxAiqBdix+CIzqAMWld37VF8GMeTRLciAZ9EGNh584U8rfhPd aOxtpjiwWY05rJ1BBj10F4l2t3EfOG563zaB12xtP5rg6ReWhXtuEgwkA4wFg7wQnUaQ vHbMdw35rOXX+Wm+e7oEvi9dZPkm5KhuGPc1Y9DBDusaN1VEQ0R/O1pC0WXvx9H8BIDB /Bn0nLd+aMr0AxWwMWyc2wQBaw//BsioFYDSWcRn7tOobgY1yPAdRdz3L32ZcdlKroCS gMTg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oLLYH9xr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bf17si19037425pgb.10.2022.02.02.06.10.11; Wed, 02 Feb 2022 06:10:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oLLYH9xr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235582AbiBASRJ (ORCPT + 99 others); Tue, 1 Feb 2022 13:17:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49560 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241869AbiBASQ4 (ORCPT ); Tue, 1 Feb 2022 13:16:56 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF625C061755; Tue, 1 Feb 2022 10:16:56 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 500F061418; Tue, 1 Feb 2022 18:16:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E98DEC340EC; Tue, 1 Feb 2022 18:16:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643739415; bh=TDuJuTDku0kHyQpV7ppZT1wjeLf9kcE4/fB7g/DaVgA=; h=From:To:Cc:Subject:Date:From; b=oLLYH9xrWHS2yJ+XjN3XMpfDM4DacrCxo/G/t2zp8HqCcjPvZmbs3AORofOY7sKrI N0DLjxBtYEMPC7amAVsgbUf6DkzkdHZl3bGox5l6isXE91sHNSKqOF+A1oS24Undhz MA7QhcDoRrjBEAS/rGXUVL5/iS806R+av9Tc+qmc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com Subject: [PATCH 4.4 00/25] 4.4.302-rc1 review Date: Tue, 1 Feb 2022 19:16:24 +0100 Message-Id: <20220201180822.148370751@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.302-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.302-rc1 X-KernelTest-Deadline: 2022-02-03T18:08+00:00 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time. -------------------------- This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.302-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.302-rc1 Guillaume Bertholon KVM: x86: Fix misplaced backport of "work around leak of uninitialized stack contents" Guillaume Bertholon Revert "tc358743: fix register i2c_rd/wr function fix" Guillaume Bertholon Revert "drm/radeon/ci: disable mclk switching for high refresh rates (v2)" Guillaume Bertholon Bluetooth: MGMT: Fix misplaced BT_HS check Eric Dumazet ipv4: tcp: send zero IPID in SYNACK messages Eric Dumazet ipv4: raw: lock the socket in raw_bind() Guenter Roeck hwmon: (lm90) Reduce maximum conversion rate for G781 Xianting Tian drm/msm: Fix wrong size calculation Jianguo Wu net-procfs: show net devices bound packet types Eric Dumazet ipv4: avoid using shared IP generator for connected sockets Congyu Liu net: fix information leakage in /proc/net/ptype Ido Schimmel ipv6_tunnel: Rate limit warning messages John Meneghini scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() Alan Stern USB: core: Fix hang in usb_kill_urb by adding memory barriers Alan Stern usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge Cameron Williams tty: Add support for Brainboxes UC cards. daniel.starke@siemens.com tty: n_gsm: fix SW flow control encoding/handling Valentin Caron serial: stm32: fix software flow control transfer Greg Kroah-Hartman PM: wakeup: simplify the output logic of pm_show_wakelocks() Jan Kara udf: Fix NULL ptr deref when converting from inline format Jan Kara udf: Restore i_lenAlloc when inode expansion fails Steffen Maier scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices Vasily Gorbik s390/hypfs: include z/VM guests with access control group set Brian Gix Bluetooth: refactor malicious adv data check Ziyang Xuan can: bcm: fix UAF of bcm op ------------- Diffstat: Makefile | 4 +- arch/s390/hypfs/hypfs_vm.c | 6 ++- arch/x86/kvm/x86.c | 14 +++--- drivers/gpu/drm/msm/msm_drv.c | 2 +- drivers/gpu/drm/radeon/ci_dpm.c | 6 --- drivers/hwmon/lm90.c | 2 +- drivers/media/i2c/tc358743.c | 2 +- drivers/s390/scsi/zfcp_fc.c | 13 ++++- drivers/scsi/bnx2fc/bnx2fc_fcoe.c | 20 ++------ drivers/tty/n_gsm.c | 4 +- drivers/tty/serial/8250/8250_pci.c | 100 ++++++++++++++++++++++++++++++++++++- drivers/tty/serial/stm32-usart.c | 2 +- drivers/usb/core/hcd.c | 14 ++++++ drivers/usb/core/urb.c | 12 +++++ drivers/usb/storage/unusual_devs.h | 10 ++++ fs/udf/inode.c | 9 ++-- include/linux/netdevice.h | 1 + include/net/ip.h | 21 ++++---- kernel/power/wakelock.c | 12 ++--- net/bluetooth/hci_event.c | 10 ++-- net/bluetooth/mgmt.c | 8 +-- net/can/bcm.c | 20 ++++---- net/core/net-procfs.c | 38 ++++++++++++-- net/ipv4/ip_output.c | 11 +++- net/ipv4/raw.c | 5 +- net/ipv6/ip6_tunnel.c | 8 +-- net/packet/af_packet.c | 2 + 27 files changed, 262 insertions(+), 94 deletions(-)