From patchwork Thu Aug 19 16:40:07 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1518753 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=QLD0c8qO; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4Gr9Vt0NTsz9t0T; Fri, 20 Aug 2021 02:40:36 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1mGl5h-0004cM-Ai; Thu, 19 Aug 2021 16:40:29 +0000 Received: from smtp-relay-canonical-1.internal ([10.131.114.174] helo=smtp-relay-canonical-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1mGl5a-0004cB-PM for kernel-team@lists.ubuntu.com; Thu, 19 Aug 2021 16:40:22 +0000 Received: from ascalon (unknown [192.188.8.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 9D6C5411ED for ; Thu, 19 Aug 2021 16:40:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1629391222; bh=AM8Z7fiXBy4j3X42tO/rL7idUrptR0ualt21V3JIT0I=; h=From:To:Subject:Date:Message-Id; b=QLD0c8qONQyUUUkgrfK7EwGCDQ8Gc9hFfd+VpPdWF7VvM2Q4aYWegvdwzxs90tUEZ hfchxJODc55s11VPNxdQ8IsZxEba5lwW1sVeh1bCTfnj+6ZgwEhSCbmk+8p0OIaFdY ETHmCMkWjPqVfadTaIbmBPhyoQP+lKh7DjxU2JD4BONOxOSbZtJ0hMGIU2xtySZ6Zg oaIJLerw1w72VA8h8Cck8vK42017120IOSJ3BKESNhJw+shMDCws9xCNTrLZJU9AaD NLtDuZWPFQwx/RasZTo/G8bhEN0fBPZWHDX1B+fSz2MwfIFHiI48dgWdA6Wu/vjKCi 241oueDD8vU7Q== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1mGl5O-0007JV-O8 for kernel-team@lists.ubuntu.com; Thu, 19 Aug 2021 09:40:10 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.137 upstream stable release Date: Thu, 19 Aug 2021 09:40:07 -0700 Message-Id: <20210819164007.27911-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (23 commits) includes the following Focal stable patchsets: Focal update: v5.4.137 upstream stable release https://bugs.launchpad.net/bugs/1940557 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit d7f820541b4d3378dac28d58f5ab72d2b7c15ef7: UBUNTU: upstream stable to v5.4.136 (2021-08-19 07:12:11 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.137 for you to fetch changes up to 5f847457d7f6863d9be3eead74a5ec6e18775d31: UBUNTU: upstream stable to v5.4.137 (2021-08-19 09:12:59 -0700) ---------------------------------------------------------------- Christoph Hellwig (2): iomap: remove the length variable in iomap_seek_data iomap: remove the length variable in iomap_seek_hole Cristian Marussi (1): firmware: arm_scmi: Fix range check for the maximum number of pending messages Desmond Cheong Zhi Xi (3): hfs: add missing clean-up in hfs_fill_super hfs: fix high memory mapping in hfs_bnode_read hfs: add lock nesting notation to hfs_find_init Eric Dumazet (1): net: annotate data race around sk_ll_usec Greg Kroah-Hartman (2): selftest: fix build error in tools/testing/selftests/vm/userfaultfd.c Linux 5.4.137 Hyunchul Lee (1): cifs: fix the out of range assignment to bit fields in parse_server_interfaces Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.137 Maxim Levitsky (1): KVM: x86: determine if an exception has an error code only when injecting it. Miklos Szeredi (1): af_unix: fix garbage collect vs MSG_PEEK Paul Gortmaker (1): cgroup1: fix leaked context root causing sporadic NULL deref in LTP Sudeep Holla (2): firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow ARM: dts: versatile: Fix up interrupt controller node names Vasily Averin (2): ipv6: allocate enough headroom in ip6_finish_output2() ipv6: ip6_finish_output2: set sk into newly allocated nskb Xin Long (1): sctp: move 198 addresses from unusable to private scope Yang Yingliang (3): workqueue: fix UAF in pwq_unbound_release_workfn() net/802/mrp: fix memleak in mrp_request_join() net/802/garp: fix memleak in garp_request_join() Yonghong Song (1): tools: Allow proper CC/CXX/... override with LLVM=1 in Makefile.include Makefile | 2 +- arch/arm/boot/dts/versatile-ab.dts | 5 ++-- arch/arm/boot/dts/versatile-pb.dts | 2 +- arch/x86/kvm/x86.c | 13 +++++--- debian.master/upstream-stable | 2 +- drivers/firmware/arm_scmi/driver.c | 12 ++++---- fs/cifs/smb2ops.c | 4 +-- fs/hfs/bfind.c | 14 ++++++++- fs/hfs/bnode.c | 25 ++++++++++++---- fs/hfs/btree.h | 7 +++++ fs/hfs/super.c | 10 +++---- fs/internal.h | 1 - fs/iomap/seek.c | 25 ++++++---------- include/linux/fs_context.h | 1 + include/net/busy_poll.h | 2 +- include/net/sctp/constants.h | 4 +-- kernel/cgroup/cgroup-v1.c | 4 +-- kernel/workqueue.c | 20 ++++++++----- net/802/garp.c | 14 +++++++++ net/802/mrp.c | 14 +++++++++ net/core/sock.c | 2 +- net/ipv6/ip6_output.c | 28 ++++++++++++++++++ net/sctp/protocol.c | 3 +- net/unix/af_unix.c | 51 ++++++++++++++++++++++++++++++-- tools/scripts/Makefile.include | 12 ++++++-- tools/testing/selftests/vm/userfaultfd.c | 2 +- 26 files changed, 213 insertions(+), 66 deletions(-)