From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:54462 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751950AbdKQMZr (ORCPT ); Fri, 17 Nov 2017 07:25:47 -0500 Date: Fri, 17 Nov 2017 13:25:52 +0100 From: Greg Kroah-Hartman To: Ben Hutchings Cc: Jan Kara , Theodore Ts'o , "HUANG Weller (CM/ESW12-CN)" , stable Subject: Re: Security fixes for 4.4 Message-ID: <20171117122552.GA21077@kroah.com> References: <1510780246.18523.74.camel@codethink.co.uk> <20171116112956.GA23318@kroah.com> <1510920410.18523.98.camel@codethink.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1510920410.18523.98.camel@codethink.co.uk> Sender: stable-owner@vger.kernel.org List-ID: On Fri, Nov 17, 2017 at 12:06:50PM +0000, Ben Hutchings wrote: > On Thu, 2017-11-16 at 12:29 +0100, Greg Kroah-Hartman wrote: > > On Wed, Nov 15, 2017 at 09:10:46PM +0000, Ben Hutchings wrote: > > > Please apply the attached backported patches to 4.4-stable.  The > > > upstream commits are: > > > > > > 06bd3c36a733 ext4: fix data exposure after a crash > > > > This patch did not apply, and when I worked at it by hand to apply, it > > then broke the build with: > > fs/ext4/inode.c: In function ‘ext4_map_blocks’: > > fs/ext4/inode.c:669:17: error: ‘EXT4_GET_BLOCKS_ZERO’ undeclared (first use in this function); did you mean ‘EXT4_GET_BLOCKS_PRE_IO’? > >        !(flags & EXT4_GET_BLOCKS_ZERO) && > >                  ^~~~~~~~~~~~~~~~~~~~ > > I attached a mailbox with backported versions of all of these. The > inline list was just for reference. Oh crap, I totally missed that, my fault. I'll queue them all up for the next release after this one. Again, my apologies and thanks for making them easy to apply, greg k-h