From patchwork Mon Sep 13 19:36:32 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1527564 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=uREKUgfb; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4H7cDd30wPz9sQt; Tue, 14 Sep 2021 05:36:48 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1mPrks-0007yW-Nt; Mon, 13 Sep 2021 19:36:38 +0000 Received: from smtp-relay-canonical-1.internal ([10.131.114.174] helo=smtp-relay-canonical-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1mPrkq-0007yQ-FM for kernel-team@lists.ubuntu.com; Mon, 13 Sep 2021 19:36:36 +0000 Received: from ascalon (3.general.kamal.us.vpn [10.172.68.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 4D1B63F108 for ; Mon, 13 Sep 2021 19:36:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1631561796; bh=YdCO8BfPuFrS00QLvIMhV5psaNjBeISboSTCikKNBQc=; h=From:To:Subject:Date:Message-Id:MIME-Version:Content-Type; b=uREKUgfb/utuQCpHOXryom5gWVmQOzILeoRWelNqgcuWlGo7DXl/+JLf9eF6IKRSQ nZtGPCzUB/LRANn5ThZ6r/kHoQx+HnSOhSvQKj0YVgwSgTok91Ow6kUaTstbJ+2lfE 6zaD8RAvRyr1ImgfIm9/vdCY5g5jhc0IBUQdirJq3Jls6i8ppNSjv1+BxhOUVknQFz 8dpFk0UAIwETH40MqK2hNWV3Nf5KfjPHWVs50+gVYeHRzNColCVC8o3WUxbYN5R4CW vnPWDzodQaxwTNtEbHxWWY4nevmuo+wsP97mCUFtbwzWNJhov/7cS2au/Y/Uc1Zf6g mOKu48spTzXkg== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1mPrkn-0006LG-HJ for kernel-team@lists.ubuntu.com; Mon, 13 Sep 2021 12:36:33 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.141 upstream stable release Date: Mon, 13 Sep 2021 12:36:32 -0700 Message-Id: <20210913193632.24246-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (29 commits) includes the following Focal stable patchsets: Focal update: v5.4.141 upstream stable release https://bugs.launchpad.net/bugs/1943484 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit a88c224f45f0f0278cfafef19bd36877fb52efb6: UBUNTU: Ubuntu-5.4.0-85.95 (2021-09-03 17:37:31 +0200) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.141 for you to fetch changes up to 5d1ec2648cd57cf23a9438781376e1694b09c028: UBUNTU: upstream stable to v5.4.141 (2021-09-13 10:35:48 -0700) ---------------------------------------------------------------- Alexandre Courbot (1): media: v4l2-mem2mem: always consider OUTPUT queue during poll Filipe Manana (1): btrfs: fix lockdep splat when enabling and disabling qgroups Greg Kroah-Hartman (1): Linux 5.4.141 Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.141 Lai Jiangshan (1): KVM: X86: MMU: Use the correct inherited permissions to get shadow page Longfang Liu (1): USB:ehci:fix Kunpeng920 ehci hardware problem Luke D Jones (1): ALSA: hda: Add quirk for ASUS Flow x13 Masami Hiramatsu (1): tracing: Reject string operand in the histogram expression Miklos Szeredi (1): ovl: prevent private clone if bind mount is not allowed Nikolay Borisov (4): btrfs: make qgroup_free_reserved_data take btrfs_inode btrfs: make btrfs_qgroup_reserve_data take btrfs_inode btrfs: export and rename qgroup_reserve_meta btrfs: don't flush from btrfs_delayed_inode_reserve_metadata Pali Rohár (1): ppp: Fix generating ppp unit id when ifname is not specified Qu Wenruo (5): btrfs: qgroup: allow to unreserve range without releasing other ranges btrfs: qgroup: try to flush qgroup space when we get -EDQUOT btrfs: transaction: Cleanup unused TRANS_STATE_BLOCKED btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT btrfs: qgroup: don't commit transaction when we already hold the handle Sean Christopherson (1): KVM: SVM: Fix off-by-one indexing when nullifying last used SEV VMCB Sumit Garg (1): tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag Wesley Cheng (7): usb: dwc3: Stop active transfers before halting the controller usb: dwc3: gadget: Allow runtime suspend if UDC unbinded usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup usb: dwc3: gadget: Prevent EP queuing while stopping transfers usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable usb: dwc3: gadget: Disable gadget IRQ during pullup disable usb: dwc3: gadget: Avoid runtime resume if disabling pullup YueHaibing (1): net: xilinx_emaclite: Do not print real IOMEM pointer Documentation/virt/kvm/mmu.txt | 4 +- Makefile | 2 +- arch/x86/kvm/paging_tmpl.h | 14 +- arch/x86/kvm/svm.c | 2 +- debian.master/upstream-stable | 2 +- drivers/media/v4l2-core/v4l2-mem2mem.c | 6 +- drivers/net/ethernet/xilinx/xilinx_emaclite.c | 5 +- drivers/net/ppp/ppp_generic.c | 19 +- drivers/tee/optee/call.c | 2 +- drivers/tee/optee/core.c | 3 +- drivers/tee/optee/rpc.c | 5 +- drivers/tee/optee/shm_pool.c | 8 +- drivers/tee/tee_shm.c | 4 +- drivers/usb/dwc3/ep0.c | 2 +- drivers/usb/dwc3/gadget.c | 118 +++++++-- drivers/usb/host/ehci-pci.c | 3 + fs/btrfs/ctree.h | 13 +- fs/btrfs/delalloc-space.c | 2 +- fs/btrfs/delayed-inode.c | 3 +- fs/btrfs/disk-io.c | 4 +- fs/btrfs/file.c | 7 +- fs/btrfs/inode.c | 2 +- fs/btrfs/qgroup.c | 328 +++++++++++++++++++------- fs/btrfs/qgroup.h | 5 +- fs/btrfs/transaction.c | 16 +- fs/btrfs/transaction.h | 15 -- fs/namespace.c | 42 ++-- include/linux/tee_drv.h | 1 + kernel/trace/trace_events_hist.c | 20 +- sound/pci/hda/patch_realtek.c | 1 + 30 files changed, 468 insertions(+), 190 deletions(-)