Return-Path: <kernel-team-bounces@lists.ubuntu.com> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=<UNKNOWN>) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) by ozlabs.org (Postfix) with ESMTP id 3y7Hnp5Pcqz9s7B; Fri, 6 Oct 2017 03:11:26 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from <kernel-team-bounces@lists.ubuntu.com>) id 1e08k4-0002mL-D5; Thu, 05 Oct 2017 16:11:20 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from <stefan.bader@canonical.com>) id 1e08k2-0002ks-AM for kernel-team@lists.ubuntu.com; Thu, 05 Oct 2017 16:11:18 +0000 Received: from 1.general.smb.uk.vpn ([10.172.193.28] helo=canonical.com) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from <stefan.bader@canonical.com>) id 1e08k2-0000Z1-1Y for kernel-team@lists.ubuntu.com; Thu, 05 Oct 2017 16:11:18 +0000 From: Stefan Bader <stefan.bader@canonical.com> To: kernel-team@lists.ubuntu.com Subject: [Xenial SRU] Xenial update to 4.4.90 stable release Date: Thu, 5 Oct 2017 18:11:17 +0200 Message-Id: <1507219877-3940-1-git-send-email-stefan.bader@canonical.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions <kernel-team.lists.ubuntu.com> List-Unsubscribe: <https://lists.ubuntu.com/mailman/options/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe> List-Archive: <https://lists.ubuntu.com/archives/kernel-team> List-Post: <mailto:kernel-team@lists.ubuntu.com> List-Help: <mailto:kernel-team-request@lists.ubuntu.com?subject=help> List-Subscribe: <https://lists.ubuntu.com/mailman/listinfo/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" <kernel-team-bounces@lists.ubuntu.com>
BugLink: https://bugs.launchpad.net/bugs/1721550 Fixed up "KEYS: prevent creating a different user's keyrings" because it failed to apply cleanly as we carry a delta for bug #1569924 "linux: Add UEFI keyring for externally signed modules". Fixed up "cxl: Fix driver use count" because it failed to apply cleanly as we carry a delta for bug #1588468 "CAPI: CGZIP AFU contexts do not receive interrupts after heavy afu open/close". -Stefan --- The following changes since commit 1465e7ba36c924e6ca40f0d0a4a4626709cc052f: Linux 4.4.89 (2017-10-05 10:31:22 +0200) are available in the git repository at: git://git.launchpad.net/~smb/+git/linux-xenial stable-4.4 for you to fetch changes up to 2e5e122a2893d598104e18e189ddf3e6e42b0935: Linux 4.4.90 (2017-10-05 16:16:43 +0200) ---------------------------------------------------------------- Andreas Gruenbacher (2): vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets gfs2: Fix debugfs glocks dump Arnd Bergmann (1): fix xen_swiotlb_dma_mmap prototype Avraham Stern (1): mac80211: flush hw_roc_start work before cancelling the ROC Bo Yan (1): tracing: Erase irqsoff trace with empty write Christoph Hellwig (1): bsg-lib: don't free job in bsg_prepare_job Dennis Yang (1): md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list Eric Biggers (4): KEYS: fix writing past end of user-supplied buffer in keyring_read() KEYS: prevent creating a different user's keyrings KEYS: prevent KEYCTL_READ on negative key x86/fpu: Don't let userspace set bogus xcomp_bv Frederic Barrat (1): cxl: Fix driver use count Greg Kroah-Hartman (1): Linux 4.4.90 Haozhong Zhang (2): KVM: VMX: do not change SN bit in vmx_update_pi_irte() KVM: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt Jan H. Schönherr (1): KVM: VMX: Do not BUG() on out-of-bounds guest IRQ Jim Mattson (1): kvm: nVMX: Don't allow L2 to access the hardware CR8 LEROY Christophe (2): crypto: talitos - Don't provide setkey for non hmac hashing algs. crypto: talitos - fix sha224 Marc Zyngier (1): arm64: Make sure SPsel is always set Myungho Jung (1): timer/sysclt: Restrict timer migration sysctl values to 0 and 1 Naohiro Aota (2): btrfs: fix NULL pointer dereference from free_reloc_roots() btrfs: propagate error to btrfs_cmp_data_prepare caller Nicolai Stange (1): PCI: Fix race condition with driver_override Oleg Nesterov (1): seccomp: fix the usage of get/put_seccomp_filter() in seccomp_get_filter() Paolo Bonzini (1): KVM: VMX: use cmpxchg64 Paul Mackerras (1): KVM: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce() Robert Jarzmik (3): dmaengine: mmp-pdma: add number of requestors ARM: pxa: add the number of DMA requestor lines ARM: pxa: fix the number of DMA requestor lines Shaohua Li (1): md/raid5: fix a race condition in stripe batch Shu Wang (1): cifs: release auth_key.response for reconnect. Stefano Stabellini (1): swiotlb-xen: implement xen_swiotlb_dma_mmap callback Steve French (3): Fix SMB3.1.1 guest authentication to Samba SMB: Validate negotiate (to protect against downgrade) even if signing off SMB3: Don't ignore O_SYNC/O_DSYNC and O_DIRECT flags Tahsin Erdogan (1): tracing: Fix trace_pipe behavior for instance traces Tyrel Datwyler (1): powerpc/pseries: Fix parent_dn reference leak in add_dt_node() Vladis Dronov (2): nl80211: check for the required netlink attributes presence video: fbdev: aty: do not leak uninitialized padding in clk to userspace Will Deacon (1): arm64: fault: Route pte translation faults via do_translation_fault Xin Long (1): scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly satoru takeuchi (1): btrfs: prevent to set invalid default subvolid Makefile | 2 +- arch/arm/boot/dts/pxa27x.dtsi | 1 + arch/arm/boot/dts/pxa3xx.dtsi | 1 + arch/arm/mach-pxa/devices.c | 4 +- arch/arm/mach-pxa/pxa25x.c | 2 +- arch/arm/mach-pxa/pxa27x.c | 2 +- arch/arm/mach-pxa/pxa3xx.c | 2 +- arch/arm/plat-pxa/include/plat/dma.h | 2 +- arch/arm/xen/mm.c | 1 + arch/arm64/kernel/head.S | 1 + arch/arm64/mm/fault.c | 2 +- arch/powerpc/kvm/book3s_64_vio.c | 46 +++++++++++++--------- arch/powerpc/platforms/pseries/mobility.c | 4 +- arch/x86/kernel/fpu/regset.c | 11 ++++++ arch/x86/kernel/fpu/signal.c | 4 +- arch/x86/kvm/vmx.c | 65 +++++++++++++++++++------------ block/bsg-lib.c | 1 - drivers/crypto/talitos.c | 7 ++-- drivers/md/raid5.c | 13 +++++-- drivers/misc/cxl/api.c | 4 ++ drivers/misc/cxl/file.c | 8 +++- drivers/pci/pci-sysfs.c | 11 +++++- drivers/scsi/scsi_transport_iscsi.c | 2 +- drivers/video/fbdev/aty/atyfb_base.c | 2 +- drivers/xen/swiotlb-xen.c | 19 +++++++++ fs/btrfs/ioctl.c | 6 ++- fs/btrfs/relocation.c | 2 +- fs/cifs/connect.c | 8 ++++ fs/cifs/file.c | 7 ++++ fs/cifs/smb2pdu.c | 19 ++++++--- fs/gfs2/glock.c | 21 +++++----- fs/read_write.c | 4 +- include/linux/key.h | 2 + include/linux/platform_data/mmp_dma.h | 1 + include/xen/swiotlb-xen.h | 5 +++ kernel/seccomp.c | 23 +++++++---- kernel/sysctl.c | 2 + kernel/time/timer.c | 2 +- kernel/trace/trace.c | 12 ++++-- net/mac80211/offchannel.c | 2 + net/wireless/nl80211.c | 3 ++ security/keys/internal.h | 2 +- security/keys/key.c | 2 + security/keys/keyctl.c | 5 +++ security/keys/keyring.c | 37 +++++++++--------- security/keys/process_keys.c | 8 +++- 46 files changed, 271 insertions(+), 119 deletions(-)
Applied to xenial master-next branch. Thanks. Cascardo.