Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp211498iob; Mon, 2 May 2022 17:20:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwZWz7a/mQsJ1e0am7S/wjtw6wJ0YU4Nw6gHME56D1bt9A+w3lhDmk2J3cHXXFjB7OVyXFE X-Received: by 2002:a63:114c:0:b0:3c2:3346:3c2b with SMTP id 12-20020a63114c000000b003c233463c2bmr4826201pgr.226.1651537239194; Mon, 02 May 2022 17:20:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651537239; cv=none; d=google.com; s=arc-20160816; b=bNqhtYovY+ct8Gmf6Wwj0t/8spuZLmUOK379Dkd4Xlha/mr338k67O71hpPYhZrXec KrpSJo32KmzY49xFE0LZmE2yMsMR0l4rB7dts3lm7Bl0ZsgZydiWDFGaQ5FveCORp2xb xuVX4Lz7OyyN2V3zgw7/LrFgSLT2blq3F1mmKPwaYR5OL7ueEoQHbVb0Z19VGCTchr9M 6iIJ+5Sstl2upg9+nT/N26rGic3xRNEio3xpX4KzLsg1QgHu7nUPsL0kOWQxhHBH6KDL 6z4CUJgNIty1VMQ0eS+uefHIDYfLYOTNtcqRF8FQl970Nme23twIUp/zsWCxOX0HOxV7 iwlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=KmP8v/o1B5YCm9ZGnF/bp0iIsXeR5LNCTnAYTUKBlI4=; b=qqCsx0ZwCNFsSffqzNiuTirC0KAqH0/bKtag218mugTFN4TD5Pll4QuOI5DmrBvqnx 859vW55mYZ7rp/A8iwV8nkKx2BR8bcu2cpD/xyPQCLku3Bi0NWKWeDtIpZD1uWsQ8ssX 0GWRbi0W/pjQz7An0MmaOJVXziDm6XML8g0xEXpQEhsBz7IU92RexP27tIbVz7tNwUpj U1nwrT1idXFo4lQso4eO8bZOLn4yfa4z1QOJWMSDVDXg5SINPTrG0qSvBmALryTmCgAw 12DtJkOLY4kQaaRLFyKv+ptK9zEqyHEnovwVNFTA9EurO5a6SyW1hRE1KJMsdmwNPAfr Jj8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UT8Sf4sZ; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id 18-20020a170902ee5200b0015caeda8720si11361745plo.106.2022.05.02.17.20.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 17:20:39 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UT8Sf4sZ; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 00493B08; Mon, 2 May 2022 17:17:29 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241060AbiEAPd6 (ORCPT + 99 others); Sun, 1 May 2022 11:33:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33884 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347877AbiEAPdy (ORCPT ); Sun, 1 May 2022 11:33:54 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E3483270C; Sun, 1 May 2022 08:30:25 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id EC7C760F0C; Sun, 1 May 2022 15:30:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8B736C385AA; Sun, 1 May 2022 15:30:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1651419024; bh=D+titBiPsLq3t7mWEkS40P2eI+ot2gfCkiZBuIC0Zks=; h=From:To:Cc:Subject:Date:From; b=UT8Sf4sZmzUbc6gNYvj57RdBhi1J4kBMMZfDxQd9vMl6C3DSfKxaOXsC5w47BbV+D zk/UkJEKIwkxh/NdLQe9wjvlzR7sec0/E7fKy+H5T1imYBBDDyAxcr0TFoaRMA8HuR Y9f7y8QnEE5bMJG2FHE4Br5mOvH3EzaN0syFZM4M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, akpm@linux-foundation.org, torvalds@linux-foundation.org, stable@vger.kernel.org Cc: lwn@lwn.net, jslaby@suse.cz, Greg Kroah-Hartman Subject: Linux 5.15.37 Date: Sun, 1 May 2022 17:30:16 +0200 Message-Id: <1651419016222111@kroah.com> X-Mailer: git-send-email 2.36.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I'm announcing the release of the 5.15.37 kernel. All users of the 5.15 kernel series must upgrade. The updated 5.15.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.15.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary thanks, greg k-h ------------ Makefile | 2 arch/arm/boot/dts/socfpga.dtsi | 2 arch/arm/boot/dts/socfpga_arria10.dtsi | 2 arch/arm64/boot/dts/altera/socfpga_stratix10.dtsi | 2 arch/arm64/boot/dts/intel/socfpga_agilex.dtsi | 2 arch/powerpc/kernel/kvm.c | 3 arch/powerpc/kernel/signal_32.c | 4 arch/powerpc/kernel/signal_64.c | 2 arch/x86/kernel/fpu/signal.c | 7 drivers/block/Kconfig | 16 drivers/block/floppy.c | 43 drivers/gpu/drm/armada/armada_gem.c | 7 drivers/spi/spi-cadence-quadspi.c | 24 fs/btrfs/file.c | 142 ++ fs/btrfs/inode.c | 28 fs/btrfs/ioctl.c | 5 fs/erofs/data.c | 2 fs/ext4/file.c | 5 fs/f2fs/file.c | 2 fs/fuse/file.c | 2 fs/gfs2/bmap.c | 60 - fs/gfs2/file.c | 252 ++++- fs/gfs2/glock.c | 330 +++++- fs/gfs2/glock.h | 20 fs/gfs2/incore.h | 4 fs/iomap/buffered-io.c | 2 fs/iomap/direct-io.c | 29 fs/ntfs/file.c | 2 fs/ntfs3/file.c | 2 fs/xfs/xfs_file.c | 6 fs/zonefs/super.c | 4 include/linux/bpf.h | 101 +- include/linux/bpf_verifier.h | 18 include/linux/iomap.h | 11 include/linux/mm.h | 3 include/linux/pagemap.h | 58 - include/linux/uio.h | 4 kernel/bpf/btf.c | 16 kernel/bpf/cgroup.c | 2 kernel/bpf/helpers.c | 12 kernel/bpf/map_iter.c | 4 kernel/bpf/ringbuf.c | 2 kernel/bpf/syscall.c | 2 kernel/bpf/verifier.c | 488 ++++------ kernel/trace/bpf_trace.c | 22 lib/iov_iter.c | 98 +- mm/filemap.c | 4 mm/gup.c | 120 ++ mm/kfence/core.c | 11 mm/kfence/kfence.h | 3 net/core/bpf_sk_storage.c | 2 net/core/filter.c | 64 - net/core/sock_map.c | 2 tools/testing/selftests/bpf/prog_tests/ksyms_btf.c | 14 tools/testing/selftests/bpf/progs/test_ksyms_btf_write_check.c | 29 tools/testing/selftests/bpf/verifier/calls.c | 19 56 files changed, 1471 insertions(+), 651 deletions(-) Andreas Gruenbacher (14): gup: Turn fault_in_pages_{readable,writeable} into fault_in_{readable,writeable} iov_iter: Turn iov_iter_fault_in_readable into fault_in_iov_iter_readable iov_iter: Introduce fault_in_iov_iter_writeable gfs2: Add wrapper for iomap_file_buffered_write gfs2: Clean up function may_grant gfs2: Move the inode glock locking to gfs2_file_buffered_write gfs2: Eliminate ip->i_gh gfs2: Fix mmap + page fault deadlocks for buffered I/O iomap: Fix iomap_dio_rw return value for user copies iomap: Support partial direct I/O on user copy failures iomap: Add done_before argument to iomap_dio_rw gup: Introduce FOLL_NOFAULT flag to disable page faults iov_iter: Introduce nofault flag to disable page faults gfs2: Fix mmap + page fault deadlocks for direct I/O Bob Peterson (1): gfs2: Introduce flag for glock holder auto-demotion Dinh Nguyen (2): spi: cadence-quadspi: fix write completion support ARM: dts: socfpga: change qspi to "intel,socfpga-qspi" Filipe Manana (2): btrfs: fix deadlock due to page faults during direct IO reads and writes btrfs: fallback to blocking mode when doing async dio over multiple extents Greg Kroah-Hartman (1): Linux 5.15.37 Hao Luo (9): bpf: Introduce composable reg, ret and arg types. bpf: Replace ARG_XXX_OR_NULL with ARG_XXX | PTR_MAYBE_NULL bpf: Replace RET_XXX_OR_NULL with RET_XXX | PTR_MAYBE_NULL bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL bpf: Introduce MEM_RDONLY flag bpf: Convert PTR_TO_MEM_OR_NULL to composable types. bpf: Make per_cpu_ptr return rdonly PTR_TO_MEM. bpf: Add MEM_RDONLY for helper args that are pointers to rdonly mem. bpf/selftests: Test PTR_TO_RDONLY_MEM Kumar Kartikeya Dwivedi (2): bpf: Fix crash due to out of bounds access into reg2btf_ids. selftests/bpf: Add test for reg2btf_ids out of bounds access Linus Torvalds (1): mm: gup: make fault_in_safe_writeable() use fixup_user_fault() Muchun Song (1): mm: kfence: fix objcgs vector allocation Willy Tarreau (1): floppy: disable FDRAWCMD by default