NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
--------------------------
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.302-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below.
thanks,
greg k-h
------------- Pseudo-Shortlog of commits:
Greg Kroah-Hartman gregkh@linuxfoundation.org Linux 4.4.302-rc1
Guillaume Bertholon guillaume.bertholon@ens.fr KVM: x86: Fix misplaced backport of "work around leak of uninitialized stack contents"
Guillaume Bertholon guillaume.bertholon@ens.fr Revert "tc358743: fix register i2c_rd/wr function fix"
Guillaume Bertholon guillaume.bertholon@ens.fr Revert "drm/radeon/ci: disable mclk switching for high refresh rates (v2)"
Guillaume Bertholon guillaume.bertholon@ens.fr Bluetooth: MGMT: Fix misplaced BT_HS check
Eric Dumazet edumazet@google.com ipv4: tcp: send zero IPID in SYNACK messages
Eric Dumazet edumazet@google.com ipv4: raw: lock the socket in raw_bind()
Guenter Roeck linux@roeck-us.net hwmon: (lm90) Reduce maximum conversion rate for G781
Xianting Tian xianting.tian@linux.alibaba.com drm/msm: Fix wrong size calculation
Jianguo Wu wujianguo@chinatelecom.cn net-procfs: show net devices bound packet types
Eric Dumazet edumazet@google.com ipv4: avoid using shared IP generator for connected sockets
Congyu Liu liu3101@purdue.edu net: fix information leakage in /proc/net/ptype
Ido Schimmel idosch@nvidia.com ipv6_tunnel: Rate limit warning messages
John Meneghini jmeneghi@redhat.com scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
Alan Stern stern@rowland.harvard.edu USB: core: Fix hang in usb_kill_urb by adding memory barriers
Alan Stern stern@rowland.harvard.edu usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge
Cameron Williams cang1@live.co.uk tty: Add support for Brainboxes UC cards.
daniel.starke@siemens.com daniel.starke@siemens.com tty: n_gsm: fix SW flow control encoding/handling
Valentin Caron valentin.caron@foss.st.com serial: stm32: fix software flow control transfer
Greg Kroah-Hartman gregkh@linuxfoundation.org PM: wakeup: simplify the output logic of pm_show_wakelocks()
Jan Kara jack@suse.cz udf: Fix NULL ptr deref when converting from inline format
Jan Kara jack@suse.cz udf: Restore i_lenAlloc when inode expansion fails
Steffen Maier maier@linux.ibm.com scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices
Vasily Gorbik gor@linux.ibm.com s390/hypfs: include z/VM guests with access control group set
Brian Gix brian.gix@intel.com Bluetooth: refactor malicious adv data check
Ziyang Xuan william.xuanziyang@huawei.com can: bcm: fix UAF of bcm op
-------------
Diffstat:
Makefile | 4 +- arch/s390/hypfs/hypfs_vm.c | 6 ++- arch/x86/kvm/x86.c | 14 +++--- drivers/gpu/drm/msm/msm_drv.c | 2 +- drivers/gpu/drm/radeon/ci_dpm.c | 6 --- drivers/hwmon/lm90.c | 2 +- drivers/media/i2c/tc358743.c | 2 +- drivers/s390/scsi/zfcp_fc.c | 13 ++++- drivers/scsi/bnx2fc/bnx2fc_fcoe.c | 20 ++------ drivers/tty/n_gsm.c | 4 +- drivers/tty/serial/8250/8250_pci.c | 100 ++++++++++++++++++++++++++++++++++++- drivers/tty/serial/stm32-usart.c | 2 +- drivers/usb/core/hcd.c | 14 ++++++ drivers/usb/core/urb.c | 12 +++++ drivers/usb/storage/unusual_devs.h | 10 ++++ fs/udf/inode.c | 9 ++-- include/linux/netdevice.h | 1 + include/net/ip.h | 21 ++++---- kernel/power/wakelock.c | 12 ++--- net/bluetooth/hci_event.c | 10 ++-- net/bluetooth/mgmt.c | 8 +-- net/can/bcm.c | 20 ++++---- net/core/net-procfs.c | 38 ++++++++++++-- net/ipv4/ip_output.c | 11 +++- net/ipv4/raw.c | 5 +- net/ipv6/ip6_tunnel.c | 8 +-- net/packet/af_packet.c | 2 + 27 files changed, 262 insertions(+), 94 deletions(-)
On 2/1/22 11:16 AM, Greg Kroah-Hartman wrote:
NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.302-rc1...
Couldn't find the patch. Didn't get pushed perhaps.
thanks, -- Shuah
On 2/1/22 12:46 PM, Shuah Khan wrote:
On 2/1/22 11:16 AM, Greg Kroah-Hartman wrote:
NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.302-rc1...
Couldn't find the patch. Didn't get pushed perhaps.
Found it. All set.
thanks, -- Shuah
On Tue 2022-02-01 19:16:24, Greg Kroah-Hartman wrote:
NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
CIP testing did not find any problems here:
https://gitlab.com/cip-project/cip-testing/linux-stable-rc-ci/-/tree/linux-4...
Tested-by: Pavel Machek (CIP) pavel@denx.de
Best regards, Pavel
On Tue, Feb 01, 2022 at 07:16:24PM +0100, Greg Kroah-Hartman wrote:
NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late.
Build results: total: 160 pass: 160 fail: 0 Qemu test results: total: 342 pass: 342 fail: 0
Tested-by: Guenter Roeck linux@roeck-us.net
Guenter
On 2/1/22 11:16 AM, Greg Kroah-Hartman wrote:
NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.302-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below.
thanks,
greg k-h
Compiled and booted on my test system. No dmesg regressions.
Tested-by: Shuah Khan skhan@linuxfoundation.org
thanks, -- Shuah
On Tue, 1 Feb 2022 at 23:47, Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.302-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y and the diffstat can be found below.
thanks,
greg k-h
Results from Linaro’s test farm. No regressions on arm64, arm, x86_64, and i386.
Tested-by: Linux Kernel Functional Testing lkft@linaro.org
## Build * kernel: 4.4.302-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-4.4.y * git commit: 806b2893e0101bdff3ead10f038759a025f73557 * git describe: v4.4.301-26-g806b2893e010 * test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-4.4.y/build/v4.4.30...
## Test Regressions (compared to v4.4.299-114-g37c6a274092f) No test regressions found.
## Metric Regressions (compared to v4.4.299-114-g37c6a274092f) No metric regressions found.
## Test Fixes (compared to v4.4.299-114-g37c6a274092f) No test fixes found.
## Metric Fixes (compared to v4.4.299-114-g37c6a274092f) No metric fixes found.
## Test result summary total: 55060, pass: 44792, fail: 242, skip: 8710, xfail: 1316
## Build Summary * arm: 258 total, 258 passed, 0 failed * arm64: 62 total, 62 passed, 0 failed * i386: 35 total, 35 passed, 0 failed * juno-r2: 1 total, 1 passed, 0 failed * mips: 44 total, 44 passed, 0 failed * sparc: 24 total, 24 passed, 0 failed * x15: 1 total, 1 passed, 0 failed * x86: 2 total, 1 passed, 1 failed * x86_64: 60 total, 48 passed, 12 failed
## Test suites summary * fwts * kselftest-android * kselftest-bpf * kselftest-capabilities * kselftest-cgroup * kselftest-clone3 * kselftest-core * kselftest-cpu-hotplug * kselftest-cpufreq * kselftest-efivarfs * kselftest-filesystems * kselftest-firmware * kselftest-fpu * kselftest-futex * kselftest-gpio * kselftest-intel_pstate * kselftest-ipc * kselftest-ir * kselftest-kcmp * kselftest-kexec * kselftest-kvm * kselftest-lib * kselftest-livepatch * kselftest-membarrier * kselftest-ptrace * kselftest-rseq * kselftest-rtc * kselftest-seccomp * kselftest-sigaltstack * kselftest-size * kselftest-splice * kselftest-static_keys * kselftest-sync * kselftest-sysctl * kselftest-timens * kselftest-timers * kselftest-tmpfs * kselftest-tpm2 * kselftest-user * kselftest-vm * kselftest-x86 * kselftest-zram * kvm-unit-tests * libhugetlbfs * linux-log-parser * ltp-cap_bounds-tests * ltp-commands-tests * ltp-containers-tests * ltp-controllers-tests * ltp-cpuhotplug-tests * ltp-crypto-tests * ltp-cve-tests * ltp-dio-tests * ltp-fcntl-locktests-tests * ltp-filecaps-tests * ltp-fs-tests * ltp-fs_bind-tests * ltp-fs_perms_simple-tests * ltp-fsx-tests * ltp-hugetlb-tests * ltp-io-tests * ltp-ipc-tests * ltp-math-tests * ltp-mm-tests * ltp-nptl-tests * ltp-open-posix-tests * ltp-pty-tests * ltp-sched-tests * ltp-securebits-tests * ltp-syscalls-tests * ltp-tracing-tests * network-basic-tests * packetdrill * perf * ssuite * v4l2-compliance
-- Linaro LKFT https://lkft.linaro.org
On Tue, Feb 1, 2022 at 1:17 PM Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
NOTE! This is the proposed LAST 4.4.y kernel release to happen under the rules of the normal stable kernel releases. After this one, it will be marked End-Of-Life as it has been 6 years and you really should know better by now and have moved to a newer kernel tree. After this one, no more security fixes will be backported and you will end up with an insecure system over time.
This is the start of the stable review cycle for the 4.4.302 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Thu, 03 Feb 2022 18:08:10 +0000. Anything received after that time might be too late.
First time testing the kernel like this, but I was able to compile and boot on my x86_64 test system with no regressions.
Tested-by: Slade Watkins slade@sladewatkins.com
(Feel free to let me know if I can't send my Tested-by to you.)
All the best, Slade
-- Slade Watkins slade@sladewatkins.com