From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:48952 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933136AbdKPL3v (ORCPT ); Thu, 16 Nov 2017 06:29:51 -0500 Date: Thu, 16 Nov 2017 12:29:56 +0100 From: Greg Kroah-Hartman To: Ben Hutchings , Jan Kara , Theodore Ts'o Cc: "HUANG Weller (CM/ESW12-CN)" , stable Subject: Re: Security fixes for 4.4 Message-ID: <20171116112956.GA23318@kroah.com> References: <1510780246.18523.74.camel@codethink.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1510780246.18523.74.camel@codethink.co.uk> Sender: stable-owner@vger.kernel.org List-ID: On Wed, Nov 15, 2017 at 09:10:46PM +0000, Ben Hutchings wrote: > Please apply the attached backported patches to 4.4-stable. The > upstream commits are: > > 06bd3c36a733 ext4: fix data exposure after a crash This patch did not apply, and when I worked at it by hand to apply, it then broke the build with: fs/ext4/inode.c: In function ‘ext4_map_blocks’: fs/ext4/inode.c:669:17: error: ‘EXT4_GET_BLOCKS_ZERO’ undeclared (first use in this function); did you mean ‘EXT4_GET_BLOCKS_PRE_IO’? !(flags & EXT4_GET_BLOCKS_ZERO) && ^~~~~~~~~~~~~~~~~~~~ As Ted didn't provide this on the list of ext4 patches to backport to 4.4 in the past, I'm a bit hesitant to take this now. Are you sure it is needed? thanks, greg k-h