From patchwork Mon Sep 20 15:12:35 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1530222 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=C5lwddy4; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4HCp2j1kfQz9sW4; Tue, 21 Sep 2021 01:12:45 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1mSKyG-0005Ov-9o; Mon, 20 Sep 2021 15:12:40 +0000 Received: from smtp-relay-canonical-1.internal ([10.131.114.174] helo=smtp-relay-canonical-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1mSKyE-0005Op-I1 for kernel-team@lists.ubuntu.com; Mon, 20 Sep 2021 15:12:38 +0000 Received: from ascalon (unknown [192.188.8.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 41B5C40184 for ; Mon, 20 Sep 2021 15:12:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1632150758; bh=2Jeae9ZGYI0efDmHWtze8QmhWCE9FAjTLRKwriWbtz0=; h=From:To:Subject:Date:Message-Id:MIME-Version:Content-Type; b=C5lwddy4XgcMlykNT4JFgxCNCosIszdr6zAxxb4U7lm4PL8Q66MIxtZryN6X2zRFE PIX0Ispoc827i2QEcbf0ju0W4VVbpZkxvfnuHrNY092RXxYJKMtDmyYcy7sp3Ra/X+ 0cSw4/tbwZn2TfFt3pklOK9GNhfIigmxhaKBAuTulLjUJLocLN7byPsdktODNhBpIY hElEeVUiJLbJT44o7/OpAFk4/s87bK5fZ9ZojUB0zqh1GlUFnduCZga4ZSyEHrk5S7 7d2Cg/BBMB5EhYvPRL8qNF6fT7msnUsArH3fpdjn4PMlnzFhFXAFhMTaU4MRBTqtxp ZjLOdF6eAzFhA== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1mSKyC-0000Nl-Ct for kernel-team@lists.ubuntu.com; Mon, 20 Sep 2021 08:12:36 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.143 upstream stable release Date: Mon, 20 Sep 2021 08:12:35 -0700 Message-Id: <20210920151235.1304-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (62 commits) includes the following Focal stable patchsets: Focal update: v5.4.143 upstream stable release https://bugs.launchpad.net/bugs/1944212 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit 104a0c1e6ba5c7e7f9557cef50132579e5e78270: UBUNTU: upstream stable to v5.4.142 (2021-09-20 07:09:52 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.143 for you to fetch changes up to a3010dd2b1a85e2f62ffeb3e25e452f32618825e: UBUNTU: upstream stable to v5.4.143 (2021-09-20 07:40:07 -0700) ---------------------------------------------------------------- Adrian Larumbe (1): dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers Alan Stern (1): USB: core: Avoid WARNings for 0-length descriptor requests Andreas Persson (1): mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards Andy Shevchenko (1): ptp_pch: Restore dependency on PCI Arkadiusz Kubalewski (1): i40e: Fix ATR queue selection Bing Guo (1): drm/amd/display: Fix Dynamic bpp issue with 8K30 with Navi 1X Dan Carpenter (1): media: zr364xx: fix memory leaks in probe() Dave Gerlach (1): ARM: dts: am43x-epos-evm: Reduce i2c0 bus speed for tps65218 Dinghao Liu (1): net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 Dongliang Mu (2): ipack: tpci200: fix many double free issues in tpci200_pci_probe ipack: tpci200: fix memory leak in the tpci200_register Evgeny Novikov (1): media: zr364xx: propagate errors from zr364xx_start_readpipe() Frank Wunderlich (1): iommu: Check if group is NULL before remove device Harshvardhan Jha (1): scsi: megaraid_mm: Fix end of loop tests for list_for_each_entry() Ilya Leoshkevich (1): bpf: Clear zext_dst of dead insns Ivan T. Ivanov (1): net: usb: lan78xx: don't modify phy_device state concurrently Jakub Kicinski (2): bnxt: don't lock the tx queue from napi poll bnxt: disable napi before canceling DIM Jaroslav Kysela (1): ALSA: hda - fix the 'Capture Switch' value change notifications Jason Wang (1): virtio-net: use NETIF_F_GRO_HW instead of NETIF_F_LRO Jeff Layton (1): fs: warn about impending deprecation of mandatory locks Johannes Weiner (1): mm: memcontrol: fix occasional OOMs due to proportional memory.low reclaim Jouni Malinen (5): ath: Use safer key clearing with key cache entries ath9k: Clear key cache explicitly on disabling hardware ath: Export ath_hw_keysetmac() ath: Modify ath_key_delete() to not need full key entry ath9k: Postpone key cache entry deletion for TXQ frames reference it Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.143 Lahav Schlesinger (1): vrf: Reset skb conntrack connection on VRF rcv Marcin Bachry (1): PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI Marek Behún (1): cpufreq: armada-37xx: forbid cpufreq for 1.2 GHz variant Michael Chan (1): bnxt_en: Add missing DMA memory barriers Murphy Zhou (1): ovl: add splice file read write helper NeilBrown (1): btrfs: prevent rename2 from exchanging a subvol with a directory from different parents Ole Bjørn Midtbø (1): Bluetooth: hidp: use correct wait queue when removing ctrl_wait Parav Pandit (1): virtio: Protect vqs list access Pavel Skripkin (2): media: drivers/media/usb: fix memory leak in zr364xx_probe net: 6pack: fix slab-out-of-bounds in decode_data Peter Ujfalusi (1): dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available Randy Dunlap (1): dccp: add do-while-0 stubs for dccp_pr_debug macros Ritesh Harjani (1): ext4: fix EXT4_MAX_LOGICAL_BLOCK macro Saravana Kannan (2): net: mdio-mux: Don't ignore memory allocation errors net: mdio-mux: Handle -EPROBE_DEFER correctly Sasha Levin (1): Linux 5.4.143 Sergey Marinkevich (1): netfilter: nft_exthdr: fix endianness of tcp option cast Sreekanth Reddy (1): scsi: core: Avoid printing an error if target_alloc() returns -ENXIO Srinivas Kandagatla (3): slimbus: messaging: start transaction ids from 1 instead of zero slimbus: messaging: check for valid transaction id slimbus: ngd: reset dma setup during runtime pm Steven Rostedt (VMware) (1): tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name Sudeep Holla (1): ARM: dts: nomadik: Fix up interrupt controller node names Sylwester Dziedziuch (1): iavf: Fix ping is lost after untrusted VF had tried to change MAC Takashi Iwai (1): ASoC: intel: atom: Fix breakage for PCM buffer address setup Thomas Gleixner (1): x86/fpu: Make init_fpstate correct with optimized XSAVE Vincent Whitchurch (1): mmc: dw_mmc: Fix hang on data CRC error Xie Yongji (1): vhost: Fix the calculation in vhost_overflow() Xuan Zhuo (1): virtio-net: support XDP when not more queues Yafang Shao (1): mm, memcg: avoid stale protection values when cgroup is above protection Ye Bin (1): scsi: scsi_dh_rdac: Avoid crash during rdac_bus_attach() Yu Kuai (1): dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() kaixi.fan (1): ovs: clear skb->tstamp in forwarding path lijinlin (1): scsi: core: Fix capacity set to zero after offlinining device Makefile | 2 +- arch/arm/boot/dts/am43x-epos-evm.dts | 2 +- arch/arm/boot/dts/ste-nomadik-stn8815.dtsi | 4 +- arch/x86/include/asm/fpu/internal.h | 30 ++----- arch/x86/kernel/fpu/xstate.c | 38 ++++++++- debian.master/upstream-stable | 2 +- drivers/cpufreq/armada-37xx-cpufreq.c | 6 +- drivers/dma/of-dma.c | 9 +- drivers/dma/sh/usb-dmac.c | 2 +- drivers/dma/xilinx/xilinx_dma.c | 12 +++ drivers/gpu/drm/amd/display/dc/dcn20/dcn20_optc.c | 2 +- drivers/iommu/iommu.c | 3 + drivers/ipack/carriers/tpci200.c | 60 +++++++------- drivers/media/usb/zr364xx/zr364xx.c | 77 ++++++++++++------ drivers/mmc/host/dw_mmc.c | 6 +- drivers/mtd/chips/cfi_cmdset_0002.c | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt.c | 69 ++++++++++------ drivers/net/ethernet/intel/i40e/i40e_txrx.c | 3 +- drivers/net/ethernet/intel/iavf/iavf.h | 1 + drivers/net/ethernet/intel/iavf/iavf_main.c | 1 + drivers/net/ethernet/intel/iavf/iavf_virtchnl.c | 47 ++++++++++- .../net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c | 4 +- drivers/net/hamradio/6pack.c | 6 ++ drivers/net/phy/mdio-mux.c | 36 +++++--- drivers/net/usb/lan78xx.c | 16 +++- drivers/net/virtio_net.c | 76 ++++++++++++----- drivers/net/vrf.c | 4 + drivers/net/wireless/ath/ath.h | 3 +- drivers/net/wireless/ath/ath5k/mac80211-ops.c | 2 +- drivers/net/wireless/ath/ath9k/htc_drv_main.c | 2 +- drivers/net/wireless/ath/ath9k/hw.h | 1 + drivers/net/wireless/ath/ath9k/main.c | 95 +++++++++++++++++++++- drivers/net/wireless/ath/key.c | 41 ++++++---- drivers/pci/quirks.c | 1 + drivers/ptp/Kconfig | 3 +- drivers/scsi/device_handler/scsi_dh_rdac.c | 4 +- drivers/scsi/megaraid/megaraid_mm.c | 21 +++-- drivers/scsi/scsi_scan.c | 3 +- drivers/scsi/scsi_sysfs.c | 9 +- drivers/slimbus/messaging.c | 7 +- drivers/slimbus/qcom-ngd-ctrl.c | 5 +- drivers/usb/core/message.c | 6 ++ drivers/vhost/vhost.c | 10 ++- drivers/virtio/virtio.c | 1 + drivers/virtio/virtio_ring.c | 8 ++ fs/btrfs/inode.c | 10 ++- fs/ext4/ext4.h | 2 +- fs/namespace.c | 6 +- fs/overlayfs/file.c | 47 +++++++++++ include/linux/memcontrol.h | 59 +++++++++++--- include/linux/virtio.h | 1 + kernel/bpf/verifier.c | 1 + kernel/trace/trace_events_hist.c | 2 + mm/memcontrol.c | 8 ++ mm/vmscan.c | 26 ++++-- net/bluetooth/hidp/core.c | 2 +- net/dccp/dccp.h | 6 +- net/netfilter/nft_exthdr.c | 8 +- net/openvswitch/vport.c | 1 + sound/pci/hda/hda_generic.c | 10 ++- sound/soc/intel/atom/sst-mfld-platform-pcm.c | 2 +- 61 files changed, 702 insertions(+), 231 deletions(-)