[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210222121013.581198717@linuxfoundation.org>
Date: Mon, 22 Feb 2021 13:35:56 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com,
stable@...r.kernel.org
Subject: [PATCH 4.4 00/35] 4.4.258-rc1 review
This is the start of the stable review cycle for the 4.4.258 release.
There are 35 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Wed, 24 Feb 2021 12:07:46 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.258-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Linux 4.4.258-rc1
Lai Jiangshan <laijs@...ux.alibaba.com>
kvm: check tlbs_dirty directly
Arun Easi <aeasi@...vell.com>
scsi: qla2xxx: Fix crash during driver load on big endian machines
Jan Beulich <jbeulich@...e.com>
xen-blkback: fix error handling in xen_blkbk_map()
Jan Beulich <jbeulich@...e.com>
xen-scsiback: don't "handle" error by BUG()
Jan Beulich <jbeulich@...e.com>
xen-netback: don't "handle" error by BUG()
Jan Beulich <jbeulich@...e.com>
xen-blkback: don't "handle" error by BUG()
Stefano Stabellini <stefano.stabellini@...inx.com>
xen/arm: don't ignore return errors from set_phys_to_machine
Jan Beulich <jbeulich@...e.com>
Xen/gntdev: correct error checking in gntdev_map_grant_pages()
Jan Beulich <jbeulich@...e.com>
Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
Jan Beulich <jbeulich@...e.com>
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
Jan Beulich <jbeulich@...e.com>
Xen/x86: don't bail early from clear_foreign_p2m_mapping()
Vasily Gorbik <gor@...ux.ibm.com>
tracing: Avoid calling cc-option -mrecord-mcount for every Makefile
Greg Thelen <gthelen@...gle.com>
tracing: Fix SKIP_STACK_VALIDATION=1 build due to bad merge with -mrecord-mcount
Andi Kleen <ak@...ux.intel.com>
trace: Use -mcount-record for dynamic ftrace
Borislav Petkov <bp@...e.de>
x86/build: Disable CET instrumentation in the kernel for 32-bit too
Stefano Garzarella <sgarzare@...hat.com>
vsock: fix locking in vsock_shutdown()
Edwin Peer <edwin.peer@...adcom.com>
net: watchdog: hold device global xmit lock during tx disable
Serge Semin <Sergey.Semin@...kalelectronics.ru>
usb: dwc3: ulpi: Replace CPU-based busyloop with Protocol-based one
Felipe Balbi <balbi@...nel.org>
usb: dwc3: ulpi: fix checkpatch warning
Randy Dunlap <rdunlap@...radead.org>
h8300: fix PREEMPTION build, TI_PRE_COUNT undefined
Jozsef Kadlecsik <kadlec@...l.kfki.hu>
netfilter: xt_recent: Fix attempt to update deleted entry
Roman Gushchin <guro@...com>
memblock: do not start bottom-up allocations with kernel_end
Phillip Lougher <phillip@...ashfs.org.uk>
squashfs: add more sanity checks in xattr id lookup
Phillip Lougher <phillip@...ashfs.org.uk>
squashfs: add more sanity checks in inode lookup
Phillip Lougher <phillip@...ashfs.org.uk>
squashfs: add more sanity checks in id lookup
Theodore Ts'o <tytso@....edu>
memcg: fix a crash in wb_workfn when a device disappears
Qian Cai <cai@....pw>
include/trace/events/writeback.h: fix -Wstringop-truncation warnings
Tobin C. Harding <tobin@...nel.org>
lib/string: Add strscpy_pad() function
Dave Wysochanski <dwysocha@...hat.com>
SUNRPC: Handle 0 length opaque XDR object data properly
Dave Wysochanski <dwysocha@...hat.com>
SUNRPC: Move simple_get_bytes and simple_get_netobj into private header
Johannes Berg <johannes.berg@...el.com>
iwlwifi: mvm: guard against device removal in reprobe
Emmanuel Grumbach <emmanuel.grumbach@...el.com>
iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap
Cong Wang <cong.wang@...edance.com>
af_key: relax availability checks for skb size calculation
Steven Rostedt (VMware) <rostedt@...dmis.org>
fgraph: Initialize tracing_graph_pause at task creation
Steven Rostedt (VMware) <rostedt@...dmis.org>
tracing: Do not count ftrace events in top level enable output
-------------
Diffstat:
Makefile | 11 +++++-
arch/arm/xen/p2m.c | 6 ++-
arch/h8300/kernel/asm-offsets.c | 3 ++
arch/x86/Makefile | 6 +--
arch/x86/xen/p2m.c | 15 ++++----
drivers/block/xen-blkback/blkback.c | 28 ++++++++------
drivers/net/wireless/iwlwifi/mvm/ops.c | 3 +-
drivers/net/wireless/iwlwifi/pcie/tx.c | 5 +++
drivers/net/xen-netback/netback.c | 4 +-
drivers/scsi/qla2xxx/qla_tmpl.c | 9 +++--
drivers/scsi/qla2xxx/qla_tmpl.h | 2 +-
drivers/usb/dwc3/ulpi.c | 20 ++++++++--
drivers/xen/gntdev.c | 33 +++++++++++------
drivers/xen/xen-scsiback.c | 4 +-
fs/fs-writeback.c | 2 +-
fs/squashfs/export.c | 41 ++++++++++++++++----
fs/squashfs/id.c | 40 ++++++++++++++++----
fs/squashfs/squashfs_fs_sb.h | 1 +
fs/squashfs/super.c | 6 +--
fs/squashfs/xattr.h | 10 ++++-
fs/squashfs/xattr_id.c | 66 ++++++++++++++++++++++++++++-----
include/linux/backing-dev.h | 10 +++++
include/linux/ftrace.h | 4 +-
include/linux/netdevice.h | 2 +
include/linux/string.h | 4 ++
include/linux/sunrpc/xdr.h | 3 +-
include/trace/events/writeback.h | 35 +++++++++--------
include/xen/grant_table.h | 1 +
kernel/trace/ftrace.c | 2 -
kernel/trace/trace_events.c | 3 +-
lib/string.c | 47 +++++++++++++++++++----
mm/backing-dev.c | 1 +
mm/memblock.c | 49 +++---------------------
net/key/af_key.c | 6 +--
net/netfilter/xt_recent.c | 12 +++++-
net/sunrpc/auth_gss/auth_gss.c | 30 +--------------
net/sunrpc/auth_gss/auth_gss_internal.h | 45 ++++++++++++++++++++++
net/sunrpc/auth_gss/gss_krb5_mech.c | 31 +---------------
net/vmw_vsock/af_vsock.c | 8 ++--
scripts/Makefile.build | 3 ++
virt/kvm/kvm_main.c | 3 +-
41 files changed, 389 insertions(+), 225 deletions(-)
Powered by blists - more mailing lists