From patchwork Fri Aug 28 19:31:36 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1353511 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4BdV8j35vcz9sTR; Sat, 29 Aug 2020 05:31:49 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1kBk6C-0003wp-7m; Fri, 28 Aug 2020 19:31:44 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1kBk6A-0003wh-4e for kernel-team@lists.ubuntu.com; Fri, 28 Aug 2020 19:31:42 +0000 Received: from 3.general.kamal.us.vpn ([10.172.68.53] helo=ascalon) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1kBk69-0000ik-NY for kernel-team@lists.ubuntu.com; Fri, 28 Aug 2020 19:31:41 +0000 Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1kBk66-0003nQ-Lv for kernel-team@lists.ubuntu.com; Fri, 28 Aug 2020 12:31:38 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Xenial][PULL] Xenial update: v4.4.234 upstream stable release Date: Fri, 28 Aug 2020 12:31:36 -0700 Message-Id: <20200828193136.14470-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (38 commits) includes the following Xenial stable patchsets: Xenial update: v4.4.234 upstream stable release https://bugs.launchpad.net/bugs/1893248 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/xenial-stable-v4.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-xenial.git stable-next -Kamal P.S. This pull req actually also includes one patch deferred from v4.4.233 as well as a bookkeeping patch for v4.4.233. No special handling is needed: - cxl: Fix kobject memleak - UBUNTU: upstream stable to v4.4.233 ----- The following changes since commit 640f2e5115f94256335024a02005e365bf4089c7: UBUNTU: [Packaging] bind hv_fcopy_daemon startup to hv_fcopy device (2020-08-28 11:51:05 -0600) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-xenial.git tags/xenial-stable-v4.4.234 for you to fetch changes up to af4e5e6afb7860f433b2d57a54d2bc1cd5709c7b: UBUNTU: upstream stable to v4.4.234 (2020-08-28 12:12:26 -0700) ---------------------------------------------------------------- Adam Ford (1): omapfb: dss: Fix max fclk divider for omap36xx Ahmad Fatoum (2): watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options watchdog: f71808e_wdt: remove use of wrong watchdog_info option Al Viro (1): do_epoll_ctl(): clean the failure exits up a bit Andrea Arcangeli (1): coredump: fix race condition between collapse_huge_page() and core dumping Charan Teja Reddy (1): mm, page_alloc: fix core hung in free_pcppages_bulk() Chuhong Yuan (1): media: budget-core: Improve exception handling in budget_register() Darrick J. Wong (1): xfs: fix inode quota reservation checks Dinghao Liu (1): ASoC: intel: Fix memleak in sst_media_open Doug Berger (1): mm: include CMA pages in lowmem_reserve at boot Eiichi Tsukata (1): xfs: Fix UBSAN null-ptr-deref in xfs_sysfs_init Eric Biggers (1): ext4: clean up ext4_match() and callers Eric Sandeen (1): ext4: fix potential negative array index in do_split() Evgeny Novikov (1): media: vpss: clean up resources in init Greg Kroah-Hartman (1): Linux 4.4.234 Greg Ungerer (1): m68knommu: fix overwriting of bits in ColdFire V3 cache control Hugh Dickins (2): khugepaged: khugepaged_test_exit() check mmget_still_valid() khugepaged: adjust VM_BUG_ON_MM() in __khugepaged_enter() Jan Kara (1): ext4: fix checking of directory entry validity for inline directories Jann Horn (1): romfs: fix uninitialized memory leak in romfs_dev_read() Javed Hasan (1): scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases Josef Bacik (1): btrfs: don't show full path of bind mounts in subvol= Juergen Gross (1): xen: don't reschedule in preemption off sections Kamal Mostafa (2): UBUNTU: upstream stable to v4.4.233 UBUNTU: upstream stable to v4.4.234 Kees Cook (1): net/compat: Add missing sock updates for SCM_RIGHTS Liu Ying (1): drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() Luc Van Oostenryck (1): alpha: fix annotation of io{read,write}{16,32}be() Mao Wenan (1): virtio_ring: Avoid loop when vq is broken in virtqueue_poll Marc Zyngier (1): epoll: Keep a reference on files added to the check list Marcos Paulo de Souza (1): btrfs: export helpers for subvolume name/id resolution Masami Hiramatsu (1): perf probe: Fix memory leakage when the probe point is not found Michael Ellerman (1): powerpc: Allow 4224 bytes of stack expansion for the signal frame Peter Xu (1): mm/hugetlb: fix calculation of adjust_range_if_pmd_sharing_possible Wang Hai (1): cxl: Fix kobject memleak Will Deacon (1): KVM: arm/arm64: Don't reschedule in unmap_stage2_range() Xiongfeng Wang (1): Input: psmouse - add a newline when printing 'proto' by sysfs Zhe Li (1): jffs2: fix UAF problem Makefile | 2 +- arch/alpha/include/asm/io.h | 8 +-- arch/arm/kvm/mmu.c | 8 --- arch/m68k/include/asm/m53xxacr.h | 6 +- arch/powerpc/mm/fault.c | 7 +- debian.master/upstream-stable | 2 +- drivers/gpu/drm/imx/imx-ldb.c | 7 +- drivers/input/mouse/psmouse-base.c | 2 +- drivers/media/pci/ttpci/budget-core.c | 11 +++- drivers/media/platform/davinci/vpss.c | 20 ++++-- drivers/misc/cxl/sysfs.c | 2 +- drivers/scsi/libfc/fc_disc.c | 12 +++- drivers/video/fbdev/omap2/dss/dss.c | 2 +- drivers/virtio/virtio_ring.c | 3 + drivers/watchdog/f71808e_wdt.c | 6 +- drivers/xen/preempt.c | 2 +- fs/btrfs/ctree.h | 2 + fs/btrfs/export.c | 8 +-- fs/btrfs/export.h | 5 ++ fs/btrfs/super.c | 18 +++-- fs/eventpoll.c | 19 +++--- fs/ext4/namei.c | 99 +++++++++++----------------- fs/jffs2/dir.c | 6 +- fs/romfs/storage.c | 4 +- fs/xfs/xfs_sysfs.h | 6 +- fs/xfs/xfs_trans_dquot.c | 2 +- include/linux/mm.h | 4 ++ include/net/sock.h | 4 ++ mm/huge_memory.c | 4 +- mm/hugetlb.c | 25 ++++--- mm/page_alloc.c | 7 +- net/compat.c | 1 + net/core/sock.c | 21 ++++++ sound/soc/intel/atom/sst-mfld-platform-pcm.c | 5 +- tools/perf/util/probe-finder.c | 2 +- 35 files changed, 198 insertions(+), 144 deletions(-)