From patchwork Fri Nov 5 21:07:29 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1551549 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=t/v4t3Pg; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HmClL31rNz9sR4 for ; Sat, 6 Nov 2021 08:07:57 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1mj6R0-0003Gl-RG; Fri, 05 Nov 2021 21:07:38 +0000 Received: from smtp-relay-canonical-0.internal ([10.131.114.83] helo=smtp-relay-canonical-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1mj6Qx-0003GY-RS for kernel-team@lists.ubuntu.com; Fri, 05 Nov 2021 21:07:35 +0000 Received: from ascalon (3.general.kamal.us.vpn [10.172.68.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-0.canonical.com (Postfix) with ESMTPSA id 93C693F1B3 for ; Fri, 5 Nov 2021 21:07:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1636146455; bh=lel/OERCxsl9UOfC4Bn0YykWRCCUYauwWVD9CiGL+oc=; h=From:To:Subject:Date:Message-Id; b=t/v4t3PgNgZRVGpJKZBM8DYBYVp2GI3qj82yhr0xuTL/uJPaUFBgmc8WhgrLxwns3 dR0akEP6xuRW6GFSvEQOd7LHj0jarR7NCBLqZ4jofP32c6HlWB5k3Exy6rrvz2asUl pbCEWzxp7MihsTKZoEsrCFYLHkqzL4yeQ+HKgu3JbJaU0FMysDsRZUH2yLzzNPU0rH f82wQ0RsX04t/0TUjuIN28HPOKpBeR1X4Hw1rcpGoLNBhTviQ8iTxugCOcYeLjORC8 j0918ZVjkJ8KSVvsDNPt1mCVQxWQHRpO7/Cq/u2BJ6yJQzIqHiTa0kSrznhQUCawha S911CdF5mL4kQ== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1mj6Qu-000217-9B for kernel-team@lists.ubuntu.com; Fri, 05 Nov 2021 14:07:32 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.152 upstream stable release Date: Fri, 5 Nov 2021 14:07:29 -0700 Message-Id: <20211105210729.7669-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (18 commits) includes the following Focal stable patchsets: Focal update: v5.4.152 upstream stable release https://bugs.launchpad.net/bugs/1950009 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit fa0d01fc02d3c54350ebaaacad6c1dd24d730865: UBUNTU: Ubuntu-5.4.0-91.102 (2021-11-05 17:02:56 +0100) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.152 for you to fetch changes up to 47e6508a8931a1e62df341f754e10af384518b54: UBUNTU: upstream stable to v5.4.152 (2021-11-05 12:40:55 -0700) ---------------------------------------------------------------- Anand K Mistry (1): perf/x86: Reset destroy callback on event init failure Changbin Du (1): tools/vm/page-types: remove dependency on opt_file for idle page tracking Dan Carpenter (1): ext2: fix sleeping in atomic bugs on error Faizel K B (1): usb: testusb: Fix for showing the connection speed Fares Mehanna (1): kvm: x86: Add AMD PMU MSRs to msrs_to_save_all[] Greg Kroah-Hartman (1): Linux 5.4.152 Jan Beulich (1): xen-netback: correct success/error reporting for the SKB-with-fraglist case Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.152 Kate Hsuan (1): libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD. Li Zhijian (1): selftests: be sure to make khdr before other targets Linus Torvalds (1): sparc64: fix pci_iounmap() when CONFIG_PCI is not set Ming Lei (1): scsi: sd: Free scsi_disk device via put_device() Rik van Riel (1): silence nfscache allocation warnings with kvzalloc Sergey Senozhatsky (1): KVM: do not shrink halt_poll_ns below grow_start Shuah Khan (1): selftests:kvm: fix get_warnings_count() ignoring fscanf() return warn Vladimir Oltean (1): net: mdio: introduce a shutdown method to mdio device drivers Wen Xiong (1): scsi: ses: Retry failed Send/Receive Diagnostic commands Yang Yingliang (1): usb: dwc2: check return value after calling platform_get_resource() Makefile | 2 +- arch/sparc/lib/iomap.c | 2 ++ arch/x86/events/core.c | 1 + arch/x86/kvm/x86.c | 7 +++++ debian.master/upstream-stable | 2 +- drivers/ata/libata-core.c | 34 ++++++++++++++++++++-- drivers/net/phy/mdio_device.c | 11 +++++++ drivers/net/xen-netback/netback.c | 2 +- drivers/scsi/sd.c | 9 +++--- drivers/scsi/ses.c | 22 +++++++++++--- drivers/usb/dwc2/hcd.c | 4 +++ fs/ext2/balloc.c | 14 ++++----- fs/nfsd/nfscache.c | 12 +++----- include/linux/libata.h | 1 + include/linux/mdio.h | 3 ++ .../selftests/kvm/x86_64/mmio_warning_test.c | 3 +- tools/testing/selftests/lib.mk | 1 + tools/usb/testusb.c | 14 +++++---- tools/vm/page-types.c | 2 +- virt/kvm/kvm_main.c | 6 +++- 20 files changed, 114 insertions(+), 38 deletions(-)