APPLIED: [SRU][Focal][PULL] Focal update: v5.4.82 upstream stable release
Ian May
ian.may at canonical.com
Thu Dec 17 23:45:20 UTC 2020
Applied to focal/linux
Thanks,
Ian
On 2020-12-17 12:43:07 , Kamal Mostafa wrote:
> This pull request (39 commits) includes the following Focal stable patchsets:
>
> Focal update: v5.4.82 upstream stable release
> https://bugs.launchpad.net/bugs/1908564
>
> Note also that the 'stable-next' branch head contains this and all prior
> pending upstream stable releases. I recommend fetching and applying just this
> reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference:
>
> git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next
>
> -Kamal
>
> -----
>
> The following changes since commit b7e4fa67b4453bbf7afbb7a6a540c4151458cab4:
>
> UBUNTU: upstream stable to v5.4.81 (2020-12-17 12:35:58 -0800)
>
> are available in the Git repository at:
>
> git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.82
>
> for you to fetch changes up to 8a245567f7eb47de9ed465d73d18a876b0fbabad:
>
> UBUNTU: upstream stable to v5.4.82 (2020-12-17 12:35:58 -0800)
>
> ----------------------------------------------------------------
> Alexander Duyck (1):
> tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control
>
> Anmol Karn (1):
> rose: Fix Null pointer dereference in rose_send_frame()
>
> Antoine Tenart (2):
> netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal
> net: ip6_gre: set dev->hard_header_len when using header_ops
>
> Dan Carpenter (2):
> net/x25: prevent a couple of overflows
> chelsio/chtls: fix a double free in chtls_setkey()
>
> Davide Caratti (3):
> net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl
> net: openvswitch: ensure LSE is pullable before reading it
> net/sched: act_mpls: ensure LSE is pullable before reading it
>
> Eran Ben Elisha (1):
> net/mlx5: Fix wrong address reclaim when command interface is down
>
> Greg Kroah-Hartman (1):
> Linux 5.4.82
>
> Guillaume Nault (1):
> ipv4: Fix tos mask in inet_rtm_getroute()
>
> Hector Martin (1):
> ALSA: usb-audio: US16x08: fix value count for level meters
>
> Jamie Iles (1):
> bonding: wait for sysfs kobject destruction before freeing struct slave
>
> Jens Axboe (1):
> tun: honor IOCB_NOWAIT flag
>
> Julian Wiedmann (1):
> net/af_iucv: set correct sk_protocol for child sockets
>
> Kamal Mostafa (1):
> UBUNTU: upstream stable to v5.4.82
>
> Krzysztof Kozlowski (1):
> dt-bindings: net: correct interrupt flags in examples
>
> Maurizio Drocco (1):
> ima: extend boot_aggregate with kernel measurements
>
> Maxim Mikityanskiy (1):
> net/tls: Protect from calling tls_dev_del for TLS RX twice
>
> Parav Pandit (1):
> devlink: Hold rtnl lock while reading netdev attributes
>
> Randy Dunlap (1):
> staging/octeon: fix up merge error
>
> Sanjay Govind (1):
> Input: xpad - support Ardwiino Controllers
>
> Shiraz Saleem (1):
> RDMA/i40iw: Address an mmap handler exploit in i40iw
>
> Thomas Falcon (2):
> ibmvnic: Ensure that SCRQ entry reads are correctly ordered
> ibmvnic: Fix TX completion error handling
>
> Toke Høiland-Jørgensen (1):
> inet_ecn: Fix endianness of checksum update when setting ECT(1)
>
> Vadim Fedorenko (1):
> net/tls: missing received data after fast remote close
>
> Vasily Averin (1):
> tracing: Remove WARN_ON in start_thread()
>
> Vinay Kumar Yadav (1):
> chelsio/chtls: fix panic during unload reload chtls
>
> Vincent Guittot (1):
> sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list
>
> Wang Hai (2):
> ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init
> net: mvpp2: Fix error return code in mvpp2_open()
>
> Willem de Bruijn (1):
> sock: set sk_err to ee_errno on dequeue from errq
>
> Yevgeny Kliteynik (1):
> net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering
>
> Yves-Alexis Perez (1):
> usbnet: ipheth: fix connectivity with iOS 14
>
> Zhang Changzhong (3):
> cxgb3: fix error return code in t3_sge_alloc_qset()
> net: pasemi: fix error return code in pasemi_mac_open()
> vxlan: fix error return code in __vxlan_dev_create()
>
> .../devicetree/bindings/net/can/tcan4x5x.txt | 2 +-
> .../devicetree/bindings/net/nfc/nxp-nci.txt | 2 +-
> .../devicetree/bindings/net/nfc/pn544.txt | 2 +-
> Makefile | 2 +-
> debian.master/upstream-stable | 2 +-
> drivers/crypto/chelsio/chtls/chtls_cm.c | 1 +
> drivers/crypto/chelsio/chtls/chtls_hw.c | 1 +
> drivers/infiniband/hw/i40iw/i40iw_main.c | 5 --
> drivers/infiniband/hw/i40iw/i40iw_verbs.c | 36 +++----------
> drivers/input/joystick/xpad.c | 2 +
> drivers/net/bonding/bond_main.c | 61 +++++++++++++++-------
> drivers/net/bonding/bond_sysfs_slave.c | 18 +------
> drivers/net/ethernet/chelsio/cxgb3/sge.c | 1 +
> drivers/net/ethernet/ibm/ibmvnic.c | 22 ++++++--
> drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c | 1 +
> .../net/ethernet/mellanox/mlx5/core/pagealloc.c | 21 +++++++-
> .../ethernet/mellanox/mlx5/core/steering/dr_cmd.c | 1 +
> .../mellanox/mlx5/core/steering/dr_domain.c | 5 ++
> .../mellanox/mlx5/core/steering/dr_types.h | 1 +
> drivers/net/ethernet/pasemi/pasemi_mac.c | 8 ++-
> drivers/net/tun.c | 14 +++--
> drivers/net/usb/ipheth.c | 2 +-
> drivers/net/vxlan.c | 4 +-
> drivers/staging/octeon/ethernet-tx.c | 2 +-
> include/linux/mlx5/mlx5_ifc.h | 9 +++-
> include/net/bonding.h | 8 +++
> include/net/inet_ecn.h | 2 +-
> include/net/tls.h | 6 +++
> kernel/sched/fair.c | 36 ++++++++++---
> kernel/trace/trace_hwlat.c | 2 +-
> net/bridge/br_netfilter_hooks.c | 7 ++-
> net/core/devlink.c | 4 ++
> net/core/skbuff.c | 5 +-
> net/ipv4/route.c | 7 +--
> net/ipv4/tcp_cong.c | 5 ++
> net/ipv6/addrlabel.c | 26 +++++----
> net/ipv6/ip6_gre.c | 16 ++++--
> net/iucv/af_iucv.c | 4 +-
> net/openvswitch/actions.c | 3 ++
> net/rose/rose_loopback.c | 17 ++++--
> net/sched/act_mpls.c | 3 ++
> net/tls/tls_device.c | 5 +-
> net/tls/tls_sw.c | 6 +++
> net/x25/af_x25.c | 6 ++-
> security/integrity/ima/ima.h | 2 +-
> security/integrity/ima/ima_crypto.c | 15 +++++-
> sound/usb/mixer_us16x08.c | 2 +-
> 47 files changed, 284 insertions(+), 128 deletions(-)
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list