From patchwork Tue Nov 16 19:53:28 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1555988 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=SeJSdyNW; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HtxZZ6NbDz9sR4 for ; Wed, 17 Nov 2021 06:53:42 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1mn4WM-0000Dl-FT; Tue, 16 Nov 2021 19:53:34 +0000 Received: from smtp-relay-canonical-0.internal ([10.131.114.83] helo=smtp-relay-canonical-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1mn4WL-0000De-65 for kernel-team@lists.ubuntu.com; Tue, 16 Nov 2021 19:53:33 +0000 Received: from ascalon (unknown [192.188.8.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-0.canonical.com (Postfix) with ESMTPSA id 02FE93F213 for ; Tue, 16 Nov 2021 19:53:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1637092413; bh=R1rwxl8daHxGIDBE5EGUFcg9Nbsi+WJ7+5tbSnXKoaQ=; h=From:To:Subject:Date:Message-Id; b=SeJSdyNW696Sa2d3RYU+f4wrPpMVHFjboJGFdEYE1elTKYcSZEFHH6OLUIeq7Ecio s3oxQTISFk1J96hIp9/3ItmF0mMZLpc2DCQuIUYyDULr2/IqAdMpb/x6m3xxTw/OMS ZJeALThhWHf0I3suWTV1Zrqqxq5SNmXK7X0q4UEafrmp60DRw38fvFfmTKivkOe+kU w8H/h1GUR9i5KTDvzKYIlG/4+WSpW8KSqx078C1aLPKp53JB12RCUJRU/UO9bSD8cm 8HUcwWiYulK4AfIkYFF265VCOA8tgOaVePnTaQW9OvxwUvRMMwJk1x1AAgjAPMasV5 hmiUTzrOm1JxQ== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1mn4WJ-0003yC-6k for kernel-team@lists.ubuntu.com; Tue, 16 Nov 2021 11:53:31 -0800 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Hirsute][PULL] Hirsute upstream stable patchset 2021-11-16 Date: Tue, 16 Nov 2021 11:53:28 -0800 Message-Id: <20211116195328.15129-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (35 commits) includes the following Hirsute stable patchsets: Hirsute upstream stable patchset 2021-11-16 Ported from the following upstream stable releases: v5.10.72, v5.14.11 https://bugs.launchpad.net/bugs/195115 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases, rebased to master-next: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-hirsute.git stable-next -Kamal ----- The following changes since commit 140adcc76b5b15df643a911a3b5a1d1f6778d02f: UBUNTU: upstream stable to v5.10.71, v5.14.10 (2021-11-12 12:05:30 +0100) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-hirsute.git tags/hirsute-stable-2021-11-16 for you to fetch changes up to 704f6480bf252e719912cbed3c9bb115c5dd723c: UBUNTU: upstream stable to v5.10.72, v5.14.11 (2021-11-16 11:38:26 -0800) ---------------------------------------------------------------- Anand K Mistry (1): perf/x86: Reset destroy callback on event init failure Ansuel Smith (1): thermal/drivers/tsens: Fix wrong check for tzd in irq handlers Changbin Du (1): tools/vm/page-types: remove dependency on opt_file for idle page tracking Dai Ngo (1): nfsd: back channel stuck in SEQ4_STATUS_CB_PATH_DOWN Dan Carpenter (1): ext2: fix sleeping in atomic bugs on error Daniel Wagner (1): nvme-fc: update hardware queues before using them David Howells (1): afs: Add missing vnode validation checks Faizel K B (1): usb: testusb: Fix for showing the connection speed Fares Mehanna (1): kvm: x86: Add AMD PMU MSRs to msrs_to_save_all[] Filipe Manana (1): btrfs: fix mount failure due to past and transient device flush error Hans de Goede (2): platform/x86: touchscreen_dmi: Add info for the Chuwi HiBook (CWI514) tablet platform/x86: touchscreen_dmi: Update info for the Chuwi Hi10 Plus (CWI527) tablet James Smart (1): nvme-fc: avoid race between time out and tear down Jan Beulich (1): xen-netback: correct success/error reporting for the SKB-with-fraglist case Kamal Mostafa (1): UBUNTU: upstream stable to v5.10.72, v5.14.11 Kate Hsuan (1): libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD. Li Zhijian (1): selftests: be sure to make khdr before other targets Linus Torvalds (1): sparc64: fix pci_iounmap() when CONFIG_PCI is not set Marc Zyngier (1): irqchip/gic: Work around broken Renesas integration Maxim Levitsky (1): KVM: x86: nSVM: restore int_vector in svm_clear_vintr Ming Lei (2): scsi: sd: Free scsi_disk device via put_device() block: don't call rq_qos_ops->done_bio if the bio isn't tracked Nathan Chancellor (1): kasan: always respect CONFIG_KASAN_STACK Oded Gabbay (1): habanalabs/gaudi: fix LBW RR configuration Ofir Bitton (1): habanalabs: fail collective wait when not supported Oliver Upton (1): selftests: KVM: Align SMCCC call with the spec in steal_time Omer Shpigelman (1): habanalabs/gaudi: use direct MSI in single mode Qu Wenruo (1): btrfs: replace BUG_ON() in btrfs_csum_one_bio() with proper error handling Sergey Senozhatsky (1): KVM: do not shrink halt_poll_ns below grow_start Shuah Khan (1): selftests:kvm: fix get_warnings_count() ignoring fscanf() return warn Steve French (1): smb3: correct smb3 ACL security descriptor Tobias Schramm (1): spi: rockchip: handle zero length transfers without timing out Vladimir Oltean (1): net: mdio: introduce a shutdown method to mdio device drivers Wen Xiong (1): scsi: ses: Retry failed Send/Receive Diagnostic commands Yang Yingliang (1): usb: dwc2: check return value after calling platform_get_resource() arch/sparc/lib/iomap.c | 2 + arch/x86/events/core.c | 1 + arch/x86/kvm/svm/svm.c | 2 + arch/x86/kvm/x86.c | 7 ++ block/bio.c | 2 +- debian.master/upstream-stable | 4 +- drivers/ata/libata-core.c | 34 +++++- drivers/irqchip/irq-gic.c | 52 +++++++++- .../misc/habanalabs/common/command_submission.c | 9 ++ drivers/misc/habanalabs/gaudi/gaudi.c | 9 +- drivers/misc/habanalabs/gaudi/gaudi_security.c | 115 ++++++++++++--------- .../habanalabs/include/gaudi/asic_reg/gaudi_regs.h | 2 + drivers/net/phy/mdio_device.c | 11 ++ drivers/net/xen-netback/netback.c | 2 +- drivers/nvme/host/fc.c | 18 ++-- drivers/platform/x86/touchscreen_dmi.c | 54 +++++++++- drivers/scsi/sd.c | 9 +- drivers/scsi/ses.c | 22 +++- drivers/spi/spi-rockchip.c | 6 ++ drivers/thermal/qcom/tsens.c | 4 +- drivers/usb/dwc2/hcd.c | 4 + fs/afs/dir.c | 11 ++ fs/afs/file.c | 16 ++- fs/afs/write.c | 17 ++- fs/btrfs/file-item.c | 13 ++- fs/btrfs/volumes.c | 13 +++ fs/cifs/smb2pdu.c | 4 +- fs/ext2/balloc.c | 14 ++- fs/nfsd/nfs4state.c | 16 ++- include/linux/libata.h | 1 + include/linux/mdio.h | 3 + scripts/Makefile.kasan | 3 +- tools/testing/selftests/kvm/steal_time.c | 4 +- .../selftests/kvm/x86_64/mmio_warning_test.c | 3 +- tools/testing/selftests/lib.mk | 1 + tools/usb/testusb.c | 14 +-- tools/vm/page-types.c | 2 +- virt/kvm/kvm_main.c | 6 +- 38 files changed, 401 insertions(+), 109 deletions(-)