From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev, linux-kernel@vger.kernel.org,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org,
lkft-triage@lists.linaro.org, pavel@denx.de,
jonathanh@nvidia.com, f.fainelli@gmail.com,
sudipm.mukherjee@gmail.com, srw@sladewatkins.net
Subject: [PATCH 4.9 00/30] 4.9.333-rc1 review
Date: Tue, 8 Nov 2022 14:38:48 +0100 [thread overview]
Message-ID: <20221108133326.715586431@linuxfoundation.org> (raw)
This is the start of the stable review cycle for the 4.9.333 release.
There are 30 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Thu, 10 Nov 2022 13:33:17 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.333-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Linux 4.9.333-rc1
Dokyung Song <dokyung.song@gmail.com>
wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
Maxim Levitsky <mlevitsk@redhat.com>
KVM: x86: emulator: update the emulation mode after CR0 write
Maxim Levitsky <mlevitsk@redhat.com>
KVM: x86: emulator: introduce emulator_recalc_and_set_mode
Maxim Levitsky <mlevitsk@redhat.com>
KVM: x86: emulator: em_sysexit should update ctxt->mode
Jim Mattson <jmattson@google.com>
KVM: x86: Mask off reserved bits in CPUID.80000008H
Ye Bin <yebin10@huawei.com>
ext4: fix warning in 'ext4_da_release_space'
Helge Deller <deller@gmx.de>
parisc: Export iosapic_serial_irq() symbol for serial port driver
Helge Deller <deller@gmx.de>
parisc: Make 8250_gsc driver dependend on CONFIG_PARISC
John Veness <john-linux@pelago.org.uk>
ALSA: usb-audio: Add quirks for MacroSilicon MS2100/MS2106 devices
David Sterba <dsterba@suse.com>
btrfs: fix type of parameter generation in btrfs_get_dentry
Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
Martin Tůma <martin.tuma@digiteqautomotive.com>
i2c: xiic: Add platform module alias
Hans Verkuil <hverkuil-cisco@xs4all.nl>
media: dvb-frontends/drxk: initialize err to 0
Hans Verkuil <hverkuil-cisco@xs4all.nl>
media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE
Gaosheng Cui <cuigaosheng1@huawei.com>
net: mdio: fix undefined behavior in bit shift for __mdiobus_register
Zhengchao Shao <shaozhengchao@huawei.com>
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
Maxim Mikityanskiy <maxtram95@gmail.com>
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
Filipe Manana <fdmanana@suse.com>
btrfs: fix ulist leaks in error paths of qgroup self tests
Yang Yingliang <yangyingliang@huawei.com>
isdn: mISDN: netjet: fix wrong check of device registration
Yang Yingliang <yangyingliang@huawei.com>
mISDN: fix possible memory leak in mISDN_register_device()
Zhang Qilong <zhangqilong3@huawei.com>
rose: Fix NULL pointer dereference in rose_send_frame()
Jason A. Donenfeld <Jason@zx2c4.com>
ipvs: use explicitly signed chars
Dan Carpenter <dan.carpenter@oracle.com>
net: sched: Fix use after free in red_enqueue()
Sergey Shtylyov <s.shtylyov@omp.ru>
ata: pata_legacy: fix pdc20230_set_piomode()
Zhang Changzhong <zhangchangzhong@huawei.com>
net: fec: fix improper use of NETDEV_TX_BUSY
Shang XiaoJing <shangxiaojing@huawei.com>
nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()
Shang XiaoJing <shangxiaojing@huawei.com>
nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send()
Zhang Xiaoxu <zhangxiaoxu5@huawei.com>
nfs4: Fix kmemleak when allocate slot failed
Trond Myklebust <trond.myklebust@hammerspace.com>
NFSv4.1: We must always send RECLAIM_COMPLETE after a reboot
Trond Myklebust <trond.myklebust@hammerspace.com>
NFSv4.1: Handle RECLAIM_COMPLETE trunking errors
-------------
Diffstat:
Makefile | 4 +-
arch/x86/kvm/cpuid.c | 1 +
arch/x86/kvm/emulate.c | 102 +++++++++++++++------
drivers/ata/pata_legacy.c | 5 +-
drivers/i2c/busses/i2c-xiic.c | 1 +
drivers/isdn/hardware/mISDN/netjet.c | 2 +-
drivers/isdn/mISDN/core.c | 5 +-
drivers/media/dvb-frontends/drxk_hard.c | 2 +-
drivers/net/ethernet/freescale/fec_main.c | 4 +-
drivers/net/phy/mdio_bus.c | 2 +-
.../wireless/broadcom/brcm80211/brcmfmac/fweh.c | 4 +
drivers/nfc/nfcmrvl/i2c.c | 7 +-
drivers/nfc/s3fwrn5/core.c | 8 +-
drivers/parisc/iosapic.c | 1 +
drivers/staging/media/s5p-cec/s5p_cec.c | 2 +
drivers/tty/serial/8250/Kconfig | 2 +-
fs/btrfs/export.c | 2 +-
fs/btrfs/export.h | 2 +-
fs/btrfs/tests/qgroup-tests.c | 20 +++-
fs/ext4/migrate.c | 3 +-
fs/nfs/nfs4client.c | 1 +
fs/nfs/nfs4state.c | 2 +
net/bluetooth/l2cap_core.c | 52 +++++++++--
net/netfilter/ipvs/ip_vs_conn.c | 4 +-
net/rose/rose_link.c | 3 +
net/sched/sch_red.c | 4 +-
sound/usb/quirks-table.h | 58 ++++++++++++
sound/usb/quirks.c | 1 +
28 files changed, 241 insertions(+), 63 deletions(-)
next reply other threads:[~2022-11-08 13:41 UTC|newest]
Thread overview: 36+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-08 13:38 Greg Kroah-Hartman [this message]
2022-11-08 13:38 ` [PATCH 4.9 01/30] NFSv4.1: Handle RECLAIM_COMPLETE trunking errors Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 02/30] NFSv4.1: We must always send RECLAIM_COMPLETE after a reboot Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 03/30] nfs4: Fix kmemleak when allocate slot failed Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 04/30] nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 05/30] nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 06/30] net: fec: fix improper use of NETDEV_TX_BUSY Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 07/30] ata: pata_legacy: fix pdc20230_set_piomode() Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 08/30] net: sched: Fix use after free in red_enqueue() Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 09/30] ipvs: use explicitly signed chars Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 10/30] rose: Fix NULL pointer dereference in rose_send_frame() Greg Kroah-Hartman
2022-11-08 13:38 ` [PATCH 4.9 11/30] mISDN: fix possible memory leak in mISDN_register_device() Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 12/30] isdn: mISDN: netjet: fix wrong check of device registration Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 13/30] btrfs: fix ulist leaks in error paths of qgroup self tests Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 14/30] Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 15/30] Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 16/30] net: mdio: fix undefined behavior in bit shift for __mdiobus_register Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 17/30] media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 18/30] media: dvb-frontends/drxk: initialize err to 0 Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 19/30] i2c: xiic: Add platform module alias Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 20/30] Bluetooth: L2CAP: Fix attempting to access uninitialized memory Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 21/30] btrfs: fix type of parameter generation in btrfs_get_dentry Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 22/30] ALSA: usb-audio: Add quirks for MacroSilicon MS2100/MS2106 devices Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 23/30] parisc: Make 8250_gsc driver dependend on CONFIG_PARISC Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 24/30] parisc: Export iosapic_serial_irq() symbol for serial port driver Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 25/30] ext4: fix warning in ext4_da_release_space Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 26/30] KVM: x86: Mask off reserved bits in CPUID.80000008H Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 27/30] KVM: x86: emulator: em_sysexit should update ctxt->mode Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 28/30] KVM: x86: emulator: introduce emulator_recalc_and_set_mode Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 29/30] KVM: x86: emulator: update the emulation mode after CR0 write Greg Kroah-Hartman
2022-11-08 13:39 ` [PATCH 4.9 30/30] wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker() Greg Kroah-Hartman
2022-11-08 15:14 ` [PATCH 4.9 00/30] 4.9.333-rc1 review Pavel Machek
2022-11-08 18:43 ` Florian Fainelli
2022-11-09 2:58 ` Guenter Roeck
2022-11-09 12:31 ` Naresh Kamboju
2022-11-10 1:59 ` Shuah Khan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221108133326.715586431@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=akpm@linux-foundation.org \
--cc=f.fainelli@gmail.com \
--cc=jonathanh@nvidia.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux@roeck-us.net \
--cc=lkft-triage@lists.linaro.org \
--cc=patches@kernelci.org \
--cc=patches@lists.linux.dev \
--cc=pavel@denx.de \
--cc=shuah@kernel.org \
--cc=srw@sladewatkins.net \
--cc=stable@vger.kernel.org \
--cc=sudipm.mukherjee@gmail.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox