Return-Path: <kernel-team-bounces@lists.ubuntu.com> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=<UNKNOWN>) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) by ozlabs.org (Postfix) with ESMTP id 3yRVRG06Nmz9t4X; Wed, 1 Nov 2017 12:06:34 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from <kernel-team-bounces@lists.ubuntu.com>) id 1e9hUE-0007MZ-3p; Wed, 01 Nov 2017 01:06:30 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from <cascardo@canonical.com>) id 1e9hUC-0007MD-EA for kernel-team@lists.ubuntu.com; Wed, 01 Nov 2017 01:06:28 +0000 Received: from 1.general.cascardo.us.vpn ([10.172.70.58] helo=calabresa) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.76) (envelope-from <cascardo@canonical.com>) id 1e9hUB-0000TA-MH for kernel-team@lists.ubuntu.com; Wed, 01 Nov 2017 01:06:28 +0000 Date: Tue, 31 Oct 2017 23:06:24 -0200 From: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> To: kernel-team@lists.ubuntu.com Subject: [Xenial SRU] Xenial update to 4.4.95 stable release Message-ID: <20171101010623.izmle42cxc3hk5dj@calabresa> MIME-Version: 1.0 Content-Disposition: inline User-Agent: NeoMutt/20170113 (1.7.2) X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions <kernel-team.lists.ubuntu.com> List-Unsubscribe: <https://lists.ubuntu.com/mailman/options/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe> List-Archive: <https://lists.ubuntu.com/archives/kernel-team> List-Post: <mailto:kernel-team@lists.ubuntu.com> List-Help: <mailto:kernel-team-request@lists.ubuntu.com?subject=help> List-Subscribe: <https://lists.ubuntu.com/mailman/listinfo/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" <kernel-team-bounces@lists.ubuntu.com>
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1729107 The following changes since commit 77234fdcbc94647e30bd04f43f4f47c88f6d527f: Linux 4.4.94 (2017-10-31 21:21:24 -0200) are available in the git repository at: git://git.launchpad.net/~cascardo/ubuntu/+source/linux/+git/xenial stable for you to fetch changes up to dfa721999a5833ab06d135dbecb1dfe956d84d2e: Linux 4.4.95 (2017-10-31 22:59:30 -0200) ---------------------------------------------------------------- Alan Stern (1): USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor() Arnd Bergmann (1): brcmsmac: make some local variables 'static const' to reduce stack size Ben Hutchings (1): ALSA: seq: Enable 'use' locking in all configurations Ben Skeggs (1): drm/nouveau/mmu: flush tlbs before deleting page tables David Howells (2): KEYS: don't let add_key() update an uninstantiated key KEYS: Fix race between updating and finding a negative key David Kozub (1): clockevents/drivers/cs5535: Improve resilience to spurious interrupts Eric Biggers (5): KEYS: encrypted: fix dereference of NULL user_key_payload lib/digsig: fix dereference of NULL user_key_payload fscrypt: fix dereference of NULL user_key_payload fscrypto: require write access to mount to set encryption policy FS-Cache: fix dereference of NULL user_key_payload Eric Sesterhenn (1): pkcs7: Prevent NULL pointer dereference, since sinfo is not always set. Felipe Balbi (1): usb: quirks: add quirk for WORLDE MINI MIDI keyboard Greg Kroah-Hartman (1): Linux 4.4.95 Hans de Goede (1): USB: devio: Revert "USB: devio: Don't corrupt user memory" Ilia Mirkin (1): drm/nouveau/bsp/g92: disable by default Jaegeuk Kim (2): f2fs crypto: replace some BUG_ON()'s with error checks f2fs crypto: add missing locking for keyring_key access Jan Luebbe (1): bus: mbus: fix window size calculation for 4GB windows Johan Hovold (1): USB: serial: metro-usb: add MS7820 device id John David Anglin (2): parisc: Avoid trashing sr2 and sr3 in LWS code parisc: Fix double-word compare and exchange in LWS code on 32-bit kernels Jonathan Liu (2): usb: musb: sunxi: Explicitly release USB PHY on exit usb: musb: Check for host-mode using is_host_active() on reset interrupt Jussi Laako (1): ALSA: usb-audio: Add native DSD support for Pro-Ject Pre Box S2 Digital Larry Finger (1): rtlwifi: rtl8821ae: Fix connection lost problem Maksim Salau (1): usb: cdc_acm: Add quirk for Elatec TWN3 Mathias Nyman (1): usb: hub: Allow reset retry for USB2 devices on connect bounce Oleg Nesterov (1): sched/autogroup: Fix autogroup_move_group() to never skip sched_move_task() Pontus Andersson (1): i2c: ismt: Separate I2C block read from SMBus block read Stefan Mätje (1): can: esd_usb2: Fix can_dlc value for received RTR, frames Takashi Iwai (1): ALSA: hda: Remove superfluous '-' added by printk conversion Wolfgang Grandegger (1): can: gs_usb: fix busy loop if no more TX context is available Makefile | 2 +- arch/parisc/kernel/syscall.S | 55 +++--- crypto/asymmetric_keys/pkcs7_parser.c | 3 + drivers/bus/mvebu-mbus.c | 2 +- drivers/clocksource/cs5535-clockevt.c | 3 +- drivers/gpu/drm/nouveau/nvkm/engine/bsp/g84.c | 2 +- drivers/gpu/drm/nouveau/nvkm/subdev/mmu/base.c | 2 + drivers/i2c/busses/i2c-ismt.c | 5 +- drivers/net/can/usb/esd_usb2.c | 2 +- drivers/net/can/usb/gs_usb.c | 10 +- .../net/wireless/brcm80211/brcmsmac/phy/phy_n.c | 197 ++++++++++----------- .../net/wireless/realtek/rtlwifi/rtl8821ae/hw.c | 2 +- drivers/usb/class/cdc-acm.c | 3 + drivers/usb/core/config.c | 6 +- drivers/usb/core/devio.c | 6 +- drivers/usb/core/hub.c | 11 +- drivers/usb/core/quirks.c | 4 + drivers/usb/musb/musb_core.c | 6 +- drivers/usb/musb/sunxi.c | 2 + drivers/usb/serial/metro-usb.c | 1 + fs/ext4/crypto_key.c | 6 + fs/f2fs/crypto.c | 1 - fs/f2fs/crypto_fname.c | 2 - fs/f2fs/crypto_key.c | 25 ++- fs/f2fs/file.c | 6 + fs/fscache/object-list.c | 7 + include/linux/key.h | 49 +++-- include/linux/mbus.h | 4 +- kernel/sched/auto_group.c | 23 +-- lib/digsig.c | 6 + net/dns_resolver/dns_key.c | 2 +- security/keys/big_key.c | 4 +- security/keys/encrypted-keys/encrypted.c | 9 +- security/keys/gc.c | 8 +- security/keys/key.c | 41 +++-- security/keys/keyctl.c | 9 +- security/keys/keyring.c | 10 +- security/keys/proc.c | 7 +- security/keys/process_keys.c | 2 +- security/keys/request_key.c | 7 +- security/keys/request_key_auth.c | 2 +- security/keys/trusted.c | 2 +- security/keys/user_defined.c | 4 +- sound/core/seq/seq_lock.c | 4 - sound/core/seq/seq_lock.h | 12 -- sound/pci/hda/hda_codec.c | 2 +- sound/usb/quirks.c | 1 + 47 files changed, 325 insertions(+), 254 deletions(-)
Applied to xenial master-next branch. Cascardo. Applied-to: xenial/master-next