Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp3602663rwb; Tue, 8 Nov 2022 06:27:55 -0800 (PST) X-Google-Smtp-Source: AA0mqf6ID/6Z1Lhvm3HmHZN00k0mqySjSQyAKXldInVYl7jL91eEFF4jjeS7KYIFvmVhDVYB6p8f X-Received: by 2002:a17:902:7044:b0:188:6d97:7aaa with SMTP id h4-20020a170902704400b001886d977aaamr20609631plt.11.1667917675748; Tue, 08 Nov 2022 06:27:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667917675; cv=none; d=google.com; s=arc-20160816; b=pq6UrM+/rs9ShhwJuQ/4VsTRFE5D2nwEogjSyvPeEc/I0zS3ooC2tE2cyNHqd+hjxi WoqRXxAI2fVjLKTIjTatv9gdZjXNQiGLcfmgUMDcxopptFgD6VPTG6EmH+AlMiV0qMPt mrHqUcabOANNHKPOD9knaa4M7ywiV/jzO4HsNdGMaQdzGagn7mNFasUzrCTsheMg9lWy +EavlzLxc2xyC7rPxjoLZpoLkbCaZzSMcF3gPCfROif9ClnI7v3AeAJxQdRtKkbWHK1J K3jvcUiRbAaNt0u3CHhVPETWFzXgY9ZOT9NePz3TQV2FCHastWNwDRz6m9PGx7oH0qWK 8oxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=Qf9Hm5G+JNmbEeN/ckcEjBErqZpDTDY9JMRt4Pk3ZCU=; b=HBAIHAhT9croH3UqbmX3M518qw3PRzGLGPp1sSFZXAm/umBIiLIgu/MDrhR1/FpczT PwGS271Xu2/bzIG/C4CTcz5OHT62mIkhjZUEpBGq+Xx3hmTtsS5y/XaPScPi+KqTcrN8 rB4ZoH1mG7QeARcjD0S+TEMS4Rqhjr/BE3dNrsmoygdVYy1Ni0e8i18WBIampsVMlLBs DEh3Gawq15yP4SI1+yRgNvpyqur/AgPriMFlxiQ+ho68u2ZoYeKsIe3UlSYIJBkCsGnX oyQhxN1gJ4hPBysO73HfS8sE5UPqQCvBq20lusVKWzMXVYeeDHMAonTF5q1k8fqBbuLR G2nA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wdhNunc9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id me13-20020a17090b17cd00b001fd7cab081bsi21604749pjb.125.2022.11.08.06.27.42; Tue, 08 Nov 2022 06:27:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wdhNunc9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234494AbiKHNo0 (ORCPT + 90 others); Tue, 8 Nov 2022 08:44:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44518 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234456AbiKHNoY (ORCPT ); Tue, 8 Nov 2022 08:44:24 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7FEDB50F15; Tue, 8 Nov 2022 05:44:21 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 0B9A6B81AEE; Tue, 8 Nov 2022 13:44:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 22EECC433C1; Tue, 8 Nov 2022 13:44:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1667915058; bh=S5MiQjjR8MdolSHwhCC0TTGQpz/U0sTajPQB4Gb/mfA=; h=From:To:Cc:Subject:Date:From; b=wdhNunc9iEWMpoaAHIk89995ndUJbAJ0agrJm7OZhOLFkdEQ0VFoYe1zTTulmz20Y 3YB3pgOvmYhLQm0dv6dh99xO0D+MvQrc0hs9GtDHBy25e3pzNiY7ZvOe3KW3GF4Gc+ FGzCKOD3CFr4Pfx1+RL6JPATMzAWyUPjaGCbfuCc= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net Subject: [PATCH 4.14 00/40] 4.14.299-rc1 review Date: Tue, 8 Nov 2022 14:38:45 +0100 Message-Id: <20221108133328.351887714@linuxfoundation.org> X-Mailer: git-send-email 2.38.1 MIME-Version: 1.0 User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.299-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.14.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.14.299-rc1 X-KernelTest-Deadline: 2022-11-10T13:33+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 4.14.299 release. There are 40 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 10 Nov 2022 13:33:17 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.299-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.14.299-rc1 Dokyung Song wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker() Masahiro Yamada linux/bits.h: make BIT(), GENMASK(), and friends available in assembly Masahiro Yamada linux/const.h: move UL() macro to include/linux/const.h Masahiro Yamada linux/const.h: prefix include guard of uapi/linux/const.h with _UAPI Maxim Levitsky KVM: x86: emulator: update the emulation mode after CR0 write Maxim Levitsky KVM: x86: emulator: introduce emulator_recalc_and_set_mode Maxim Levitsky KVM: x86: emulator: em_sysexit should update ctxt->mode Jim Mattson KVM: x86: Mask off reserved bits in CPUID.80000008H Ye Bin ext4: fix warning in 'ext4_da_release_space' Helge Deller parisc: Export iosapic_serial_irq() symbol for serial port driver Helge Deller parisc: Make 8250_gsc driver dependend on CONFIG_PARISC Ard Biesheuvel efi: random: reduce seed size to 32 bytes John Veness ALSA: usb-audio: Add quirks for MacroSilicon MS2100/MS2106 devices Gaosheng Cui capabilities: fix potential memleak on error path from vfs_getxattr_alloc() Kuniyuki Iwashima tcp/udp: Make early_demux back namespacified. David Sterba btrfs: fix type of parameter generation in btrfs_get_dentry Yu Kuai block, bfq: protect 'bfqd->queued' by 'bfqd->lock' Luiz Augusto von Dentz Bluetooth: L2CAP: Fix attempting to access uninitialized memory Martin Tůma i2c: xiic: Add platform module alias Hans Verkuil media: dvb-frontends/drxk: initialize err to 0 Hans Verkuil media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE Chen Zhongjin net, neigh: Fix null-ptr-deref in neigh_table_clear() Gaosheng Cui net: mdio: fix undefined behavior in bit shift for __mdiobus_register Zhengchao Shao Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() Maxim Mikityanskiy Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu Filipe Manana btrfs: fix ulist leaks in error paths of qgroup self tests Filipe Manana btrfs: fix inode list leak during backref walking at resolve_indirect_refs() Yang Yingliang isdn: mISDN: netjet: fix wrong check of device registration Yang Yingliang mISDN: fix possible memory leak in mISDN_register_device() Zhang Qilong rose: Fix NULL pointer dereference in rose_send_frame() Jason A. Donenfeld ipvs: use explicitly signed chars Dan Carpenter net: sched: Fix use after free in red_enqueue() Sergey Shtylyov ata: pata_legacy: fix pdc20230_set_piomode() Zhang Changzhong net: fec: fix improper use of NETDEV_TX_BUSY Shang XiaoJing nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() Shang XiaoJing nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() Chen Zhongjin net: dsa: Fix possible memory leaks in dsa_loop_init() Zhang Xiaoxu nfs4: Fix kmemleak when allocate slot failed Trond Myklebust NFSv4.1: We must always send RECLAIM_COMPLETE after a reboot Trond Myklebust NFSv4.1: Handle RECLAIM_COMPLETE trunking errors ------------- Diffstat: Makefile | 4 +- arch/arm/include/asm/memory.h | 6 -- arch/arm64/include/asm/memory.h | 6 -- arch/unicore32/include/asm/memory.h | 6 -- arch/x86/kvm/cpuid.c | 1 + arch/x86/kvm/emulate.c | 102 +++++++++++++++------ block/bfq-iosched.c | 4 +- drivers/ata/pata_legacy.c | 5 +- drivers/firmware/efi/efi.c | 2 +- drivers/i2c/busses/i2c-xiic.c | 1 + drivers/isdn/hardware/mISDN/netjet.c | 2 +- drivers/isdn/mISDN/core.c | 5 +- drivers/media/dvb-frontends/drxk_hard.c | 2 +- drivers/media/platform/s5p-cec/s5p_cec.c | 2 + drivers/net/dsa/dsa_loop.c | 25 +++-- drivers/net/ethernet/freescale/fec_main.c | 4 +- drivers/net/phy/mdio_bus.c | 2 +- .../wireless/broadcom/brcm80211/brcmfmac/fweh.c | 4 + drivers/nfc/nfcmrvl/i2c.c | 7 +- drivers/nfc/s3fwrn5/core.c | 8 +- drivers/parisc/iosapic.c | 1 + drivers/tty/serial/8250/Kconfig | 2 +- fs/btrfs/backref.c | 36 ++++---- fs/btrfs/export.c | 2 +- fs/btrfs/export.h | 2 +- fs/btrfs/tests/qgroup-tests.c | 20 +++- fs/ext4/migrate.c | 3 +- fs/nfs/nfs4client.c | 1 + fs/nfs/nfs4state.c | 2 + include/linux/bits.h | 17 ++-- include/linux/const.h | 9 ++ include/linux/efi.h | 2 +- include/net/protocol.h | 4 - include/net/tcp.h | 2 + include/net/udp.h | 1 + include/uapi/linux/const.h | 9 +- net/bluetooth/l2cap_core.c | 52 +++++++++-- net/core/neighbour.c | 2 +- net/ipv4/af_inet.c | 14 +-- net/ipv4/ip_input.c | 32 ++++--- net/ipv4/sysctl_net_ipv4.c | 59 +----------- net/ipv6/ip6_input.c | 23 +++-- net/ipv6/tcp_ipv6.c | 9 +- net/ipv6/udp.c | 9 +- net/netfilter/ipvs/ip_vs_conn.c | 4 +- net/rose/rose_link.c | 3 + net/sched/sch_red.c | 4 +- security/commoncap.c | 6 +- sound/usb/quirks-table.h | 58 ++++++++++++ sound/usb/quirks.c | 1 + 50 files changed, 358 insertions(+), 229 deletions(-)