From patchwork Wed Jun 17 15:00:16 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1311278 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 49n7Xp1bh1z9sRk; Thu, 18 Jun 2020 01:00:26 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1jlZY6-0001RN-Sg; Wed, 17 Jun 2020 15:00:22 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jlZY5-0001RB-KQ for kernel-team@lists.ubuntu.com; Wed, 17 Jun 2020 15:00:21 +0000 Received: from 3.general.kamal.us.vpn ([10.172.68.53] helo=ascalon) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jlZY5-00083y-6F for kernel-team@lists.ubuntu.com; Wed, 17 Jun 2020 15:00:21 +0000 Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1jlZY3-0002sb-Dl for kernel-team@lists.ubuntu.com; Wed, 17 Jun 2020 08:00:19 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Xenial][PULL] Xenial upstream stable v4.4.226 Date: Wed, 17 Jun 2020 08:00:16 -0700 Message-Id: <20200617150016.10947-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (48 commits) includes the following Xenial stable patchset: Xenial update: v4.4.226 upstream stable release https://bugs.launchpad.net/bugs/1883917 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/xenial-stable-v4.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-xenial.git stable-next -Kamal ----- The following changes since commit f37c26f7e9bdaaf2182ad4f698b83c2771f36e8f: UBUNTU: upstream stable to v4.4.225 (2020-06-16 15:29:18 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-xenial.git tags/xenial-stable-v4.4.226 for you to fetch changes up to cea27522f8c8b7c679ac3d338ede8a9a627045b0: UBUNTU: upstream stable to v4.4.226 (2020-06-17 07:39:58 -0700) ---------------------------------------------------------------- Aaron Conole (1): printk: help pr_debug and pr_devel to optimize out arguments Alexander Dahl (1): x86/dma: Fix max PFN arithmetic overflow on 32 bit systems Alexander Potapenko (1): fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info() Arnd Bergmann (1): include/asm-generic/topology.h: guard cpumask_of_node() macro argument Ben Hutchings (1): drm/msm: Fix possible null dereference on failure of get_pages() Benjamin Block (1): scsi: zfcp: fix request object use-after-free in send path causing wrong traces Brendan Shanks (1): Input: evdev - call input_flush_device() on release(), not flush() Changming Liu (1): ALSA: hwdep: fix a left shifting 1 by 31 UB bug Chris Chiu (1): ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC Dmitry V. Levin (1): uapi: fix linux/if_pppol2tp.h userspace compilation errors Eric Dumazet (1): ax25: fix setsockopt(SO_BINDTODEVICE) Eric W. Biederman (1): exec: Always set cap_ambient in cap_bprm_set_creds Greg Kroah-Hartman (1): Linux 4.4.226 Guoqing Jiang (1): sc16is7xx: move label 'err_spi' to correct section Helge Deller (1): parisc: Fix kernel panic in mem_init() James Hilliard (1): Input: usbtouchscreen - add support for BonXeon TP Jere Leppänen (1): sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed Jeremy Sowden (1): vti4: eliminated some duplicate code. Kaike Wan (1): IB/qib: Call kobject_put() when kobject_init_and_add() fails Kalderon, Michal (1): IB/cma: Fix reference count leak when no ipv4 addresses are set Kamal Mostafa (1): UBUNTU: upstream stable to v4.4.226 Kevin Locke (1): Input: i8042 - add ThinkPad S230u to i8042 reset list Konstantin Khlebnikov (1): mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() Lei Xue (1): cachefiles: Fix race between read_waiter and read_copier involving op->to_do Liviu Dudau (1): mm/vmalloc.c: don't dereference possible NULL pointer in __vunmap() Masahiro Yamada (1): usb: gadget: legacy: fix redundant initialization warnings Michael Braun (1): netfilter: nft_reject_bridge: enable reject with bridge vlan Michal Marek (1): asm-prototypes: Clear any CPP defines before declaring the functions Moshe Shemesh (1): net/mlx5: Add command entry handling completion Pablo Neira Ayuso (2): netfilter: nf_conntrack_pptp: prevent buffer overflows in debug code netfilter: nf_conntrack_pptp: fix compilation warning with W=1 build Phil Sutter (1): netfilter: ipset: Fix subcounter update skip Qiushi Wu (5): net: sun: fix missing release regions in cas_init_one(). net/mlx4_core: fix a memory leak bug. iommu: Fix reference count leak in iommu_group_alloc. qlcnic: fix missing release in qlcnic_83xx_interrupt_test. bonding: Fix reference count leak in bond_sysfs_slave_add. Roopa Prabhu (1): net: rtnl_configure_link: fix dev flags changes arg to __dev_notify_flags Steve French (1): cifs: Fix null pointer check in cifs_read Sudip Mukherjee (1): mac80211: fix memory leak Thomas Gleixner (1): genirq/generic_pending: Do not lose pending affinity update Xin Long (4): xfrm: allow to accept packets with ipv6 NEXTHDR_HOP in xfrm_input xfrm: fix a warning in xfrm_policy_insert_list xfrm: fix a NULL-ptr deref in xfrm_local_error ip_vti: receive ipip packet by calling ip_tunnel_rcv Yoshihiro Shimoda (1): usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock Yuqi Jin (1): net: revert "net: get rid of an signed integer overflow in ip_idents_reserve()" Łukasz Patron (1): Input: xpad - add custom init packet for Xbox One S controllers Makefile | 2 +- arch/parisc/mm/init.c | 2 +- arch/x86/include/asm/dma.h | 2 +- debian.master/upstream-stable | 2 +- drivers/gpu/drm/msm/msm_gem.c | 20 +++--- drivers/infiniband/hw/qib/qib_sysfs.c | 9 +-- drivers/input/evdev.c | 19 ++---- drivers/input/joystick/xpad.c | 12 ++++ drivers/input/serio/i8042-x86ia64io.h | 7 ++ drivers/input/touchscreen/usbtouchscreen.c | 1 + drivers/iommu/iommu.c | 2 +- drivers/net/bonding/bond_sysfs_slave.c | 4 +- drivers/net/ethernet/mellanox/mlx4/fw.c | 2 +- drivers/net/ethernet/mellanox/mlx5/core/cmd.c | 15 +++++ .../net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c | 4 +- drivers/net/ethernet/sun/cassini.c | 3 +- drivers/s390/scsi/zfcp_fsf.c | 10 ++- drivers/tty/serial/sc16is7xx.c | 2 + drivers/usb/gadget/legacy/inode.c | 3 +- drivers/usb/renesas_usbhs/mod_gadget.c | 2 +- fs/binfmt_elf.c | 2 +- fs/cachefiles/rdwr.c | 2 +- fs/cifs/file.c | 2 +- include/asm-generic/asm-prototypes.h | 6 ++ include/asm-generic/topology.h | 2 +- include/linux/mlx5/driver.h | 1 + include/linux/mm.h | 1 - include/linux/netfilter/nf_conntrack_pptp.h | 2 +- include/linux/printk.h | 12 ++-- include/rdma/ib_addr.h | 6 +- include/uapi/linux/l2tp.h | 7 +- kernel/irq/migration.c | 26 ++++++-- mm/vmalloc.c | 2 +- net/ax25/af_ax25.c | 6 +- net/bridge/netfilter/nft_reject_bridge.c | 6 ++ net/core/rtnetlink.c | 2 +- net/ipv4/ip_vti.c | 75 ++++++++++++---------- net/ipv4/netfilter/nf_nat_pptp.c | 7 +- net/ipv4/route.c | 14 ++-- net/mac80211/sta_info.c | 1 + net/netfilter/ipset/ip_set_list_set.c | 2 +- net/netfilter/nf_conntrack_pptp.c | 62 ++++++++++-------- net/sctp/sm_statefuns.c | 9 +-- net/xfrm/xfrm_input.c | 2 +- net/xfrm/xfrm_output.c | 3 +- net/xfrm/xfrm_policy.c | 7 +- security/commoncap.c | 1 + sound/core/hwdep.c | 4 +- sound/usb/mixer.c | 8 +++ 49 files changed, 241 insertions(+), 162 deletions(-)