From patchwork Mon Mar 8 18:22:27 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1449314 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4DvRXL0Xkyz9sWR; Tue, 9 Mar 2021 05:22:40 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1lJKWY-0007nr-8W; Mon, 08 Mar 2021 18:22:34 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1lJKWW-0007nj-5g for kernel-team@lists.ubuntu.com; Mon, 08 Mar 2021 18:22:32 +0000 Received: from 2.general.kamal.us.vpn ([10.172.68.52] helo=ascalon) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1lJKWV-00041j-Km for kernel-team@lists.ubuntu.com; Mon, 08 Mar 2021 18:22:31 +0000 Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1lJKWT-0006Nl-GD for kernel-team@lists.ubuntu.com; Mon, 08 Mar 2021 10:22:29 -0800 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.98 upstream stable release Date: Mon, 8 Mar 2021 10:22:27 -0800 Message-Id: <20210308182227.24366-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (26 commits) includes the following Focal stable patchsets: Focal update: v5.4.98 upstream stable release https://bugs.launchpad.net/bugs/1918158 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit da68b3abd8b93dd4209384a99a99f1c642731966: UBUNTU: [Config] Fix up trusted keys annotation for i386 (2021-03-01 16:13:49 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.98 for you to fetch changes up to f6f4c7ef4a7d4d9e9e1d8c795392eece6758b2e2: UBUNTU: upstream stable to v5.4.98 (2021-03-08 08:12:17 -0800) ---------------------------------------------------------------- Baolin Wang (1): blk-cgroup: Use cond_resched() when destroy blkgs Cong Wang (1): af_key: relax availability checks for skb size calculation Daniel Borkmann (1): bpf: Fix 32 bit src register truncation on div/mod Dave Wysochanski (2): SUNRPC: Move simple_get_bytes and simple_get_netobj into private header SUNRPC: Handle 0 length opaque XDR object data properly David Collins (1): regulator: core: avoid regulator_resolve_supply() race condition Eliot Blennerhassett (1): ASoC: ak4458: correct reset polarity Emmanuel Grumbach (1): iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap Greg Kroah-Hartman (1): Linux 5.4.98 Gregory Greenman (1): iwlwifi: mvm: invalidate IDs of internal stations at mvm start Johannes Berg (3): iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() iwlwifi: pcie: fix context info memory leak iwlwifi: mvm: guard against device removal in reprobe Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.98 Mark Brown (1): regulator: Fix lockdep warning resolving supplies Masami Hiramatsu (1): tracing/kprobe: Fix to support kretprobe events on unloaded modules Pan Bian (1): chtls: Fix potential resource leak Peter Gonda (1): Fix unsynchronized access to sev members through svm_register_enc_region Phillip Lougher (3): squashfs: add more sanity checks in id lookup squashfs: add more sanity checks in inode lookup squashfs: add more sanity checks in xattr id lookup Qii Wang (1): i2c: mediatek: Move suspend and resume handling to NOIRQ phase Ricardo Ribalda (1): ASoC: Intel: Skylake: Zero snd_ctl_elem_value Sara Sharon (1): iwlwifi: mvm: skip power command when unbinding vif during CSA Shay Bar (1): mac80211: 160MHz with extended NSS BW in CSA Trond Myklebust (1): pNFS/NFSv4: Try to return invalid layout in pnfs_layout_process() Makefile | 2 +- arch/x86/kvm/svm.c | 18 +++--- block/blk-cgroup.c | 18 ++++-- debian.master/upstream-stable | 2 +- drivers/crypto/chelsio/chtls/chtls_cm.c | 7 +-- drivers/i2c/busses/i2c-mt65xx.c | 19 ++++++- .../net/wireless/intel/iwlwifi/mvm/debugfs-vif.c | 3 + drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c | 3 + drivers/net/wireless/intel/iwlwifi/mvm/ops.c | 7 ++- drivers/net/wireless/intel/iwlwifi/mvm/sta.c | 6 ++ .../wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c | 11 +++- drivers/net/wireless/intel/iwlwifi/pcie/tx.c | 5 ++ drivers/regulator/core.c | 44 +++++++++++---- fs/nfs/pnfs.c | 8 ++- fs/squashfs/export.c | 41 +++++++++++--- fs/squashfs/id.c | 40 ++++++++++--- fs/squashfs/squashfs_fs_sb.h | 1 + fs/squashfs/super.c | 6 +- fs/squashfs/xattr.h | 10 +++- fs/squashfs/xattr_id.c | 66 +++++++++++++++++++--- include/linux/kprobes.h | 2 +- include/linux/sunrpc/xdr.h | 3 +- kernel/bpf/verifier.c | 28 +++++---- kernel/kprobes.c | 34 ++++++++--- kernel/trace/trace_kprobe.c | 10 ++-- net/key/af_key.c | 6 +- net/mac80211/spectmgmt.c | 10 +++- net/sunrpc/auth_gss/auth_gss.c | 30 +--------- net/sunrpc/auth_gss/auth_gss_internal.h | 45 +++++++++++++++ net/sunrpc/auth_gss/gss_krb5_mech.c | 31 +--------- sound/soc/codecs/ak4458.c | 22 +++----- sound/soc/intel/skylake/skl-topology.c | 2 +- 32 files changed, 364 insertions(+), 176 deletions(-) create mode 100644 net/sunrpc/auth_gss/auth_gss_internal.h