From patchwork Thu Aug 26 20:19:06 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1521338 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=oAGqpsg1; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4GwZ2P4B4mz9sW4; Fri, 27 Aug 2021 06:19:40 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1mJLqX-0005u4-Ra; Thu, 26 Aug 2021 20:19:33 +0000 Received: from smtp-relay-canonical-1.internal ([10.131.114.174] helo=smtp-relay-canonical-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1mJLqQ-0005tt-Si for kernel-team@lists.ubuntu.com; Thu, 26 Aug 2021 20:19:26 +0000 Received: from ascalon (2.general.kamal.us.vpn [10.172.68.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id B9A8A3F070 for ; Thu, 26 Aug 2021 20:19:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1630009166; bh=24Rasz0it7MaGbHn2XHfk5WIfpc+SeuLJxIx/gQ5IIk=; h=From:To:Subject:Date:Message-Id; b=oAGqpsg1Q8/RsJMuYGC9/7cc81HdfzjvOxREUdrEi0hhhPj4+FD+lZGfBa9ZnoRNv JW0AXimXzcxXDWy8boY9pIjb0sKK0wbz1Ih9miBEbaMIGGkbZKAwg080SCxtKlC/eN 2kKuGIhozC0GzF5I77QJSefUjF2/vmPyW+aH5on4sX+0bbmb/DN4GYWnI/jjkjpjpF g6qQAP4cvzcunvDi0ywsGf/lO/JERUj4EUSfGPIcnT+1sdvihaGn+Hr7FsU++Nu6pn 3JXkbAF9JzxG6ZZA7TIGigpOfCmxza997swsOom9SSf+CjoLq0Y5c6yuwL3l82cw7W dQt3kTXGlBTzg== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1mJLqN-000164-IA for kernel-team@lists.ubuntu.com; Thu, 26 Aug 2021 13:19:23 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.139 upstream stable release Date: Thu, 26 Aug 2021 13:19:06 -0700 Message-Id: <20210826201906.3515-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (24 commits) includes the following Focal stable patchsets: Focal update: v5.4.139 upstream stable release https://bugs.launchpad.net/bugs/1941796 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit ddb767935c834fb616e90e55abc81478f47c0b43: UBUNTU: upstream stable to v5.4.138 (2021-08-26 12:23:49 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.139 for you to fetch changes up to b4c3fab32d94f536f78ab4ea82f36928d17e9c32: UBUNTU: upstream stable to v5.4.139 (2021-08-26 12:44:12 -0700) ---------------------------------------------------------------- Alain Volmat (1): spi: stm32h7: fix full duplex irq handler handling Axel Lin (1): regulator: rt5033: Fix n_voltages settings for BUCK and LDO Cristian Marussi (1): firmware: arm_scmi: Add delayed response status check Daniel Borkmann (4): bpf: Inherit expanded/patched seen count from old aux data bpf: Do not mark insn as seen under speculative path verification bpf: Fix leakage under speculation on mispredicted branches bpf, selftests: Adjust few selftest outcomes wrt unreachable code Filipe Manana (3): btrfs: do not commit logs and transactions during link and rename operations btrfs: fix race causing unnecessary inode logging during link and rename btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction Greg Kroah-Hartman (2): Revert "Bluetooth: Shutdown controller after workqueues are flushed or cancelled" Linux 5.4.139 Guenter Roeck (1): spi: mediatek: Fix fifo transfer Jia He (1): qed: fix possible unpaired spin_{un}lock_bh in _qed_mcp_cmd_and_union() John Fastabend (2): bpf: Test_verifier, add alu32 bounds tracking tests bpf, selftests: Add a verifier test for assigning 32bit reg states to 64bit ones Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.139 Keith Busch (1): nvme: fix nvme_setup_command metadata trace event Kyle Russell (1): ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits Linus Torvalds (1): ACPI: fix NULL pointer dereference Pravin B Shelar (1): net: Fix zero-copy head len calculation. Randy Dunlap (1): btrfs: delete duplicated words + other fixes in comments Sudeep Holla (1): firmware: arm_scmi: Ensure drivers provide a probe function Takashi Iwai (1): r8152: Fix potential PM refcount imbalance Makefile | 2 +- debian.master/upstream-stable | 2 +- drivers/firmware/arm_scmi/bus.c | 3 + drivers/firmware/arm_scmi/driver.c | 8 +- drivers/net/ethernet/qlogic/qed/qed_mcp.c | 23 +++-- drivers/net/usb/r8152.c | 3 +- drivers/nvme/host/trace.h | 6 +- drivers/spi/spi-mt65xx.c | 19 +--- drivers/spi/spi-stm32.c | 15 +-- fs/btrfs/block-group.c | 2 +- fs/btrfs/ctree.c | 2 +- fs/btrfs/disk-io.c | 2 +- fs/btrfs/extent_io.c | 2 +- fs/btrfs/free-space-cache.c | 2 +- fs/btrfs/inode.c | 115 +++------------------ fs/btrfs/qgroup.c | 2 +- fs/btrfs/tree-log.c | 107 +++++++++---------- fs/btrfs/tree-log.h | 14 +-- include/acpi/acpi_bus.h | 3 +- include/linux/mfd/rt5033-private.h | 4 +- kernel/bpf/verifier.c | 65 ++++++++++-- net/bluetooth/hci_core.c | 16 +-- net/core/skbuff.c | 5 +- sound/soc/codecs/tlv320aic31xx.h | 4 +- tools/testing/selftests/bpf/test_verifier.c | 2 +- tools/testing/selftests/bpf/verifier/bounds.c | 65 ++++++++++++ tools/testing/selftests/bpf/verifier/dead_code.c | 2 + tools/testing/selftests/bpf/verifier/jmp32.c | 22 ++++ tools/testing/selftests/bpf/verifier/jset.c | 10 +- tools/testing/selftests/bpf/verifier/unpriv.c | 2 + .../selftests/bpf/verifier/value_ptr_arith.c | 7 +- 31 files changed, 294 insertions(+), 242 deletions(-)