APPLIED: [SRU][Focal][PULL] Focal update: v5.4.82 upstream stable release

Ian May ian.may at canonical.com
Thu Dec 17 23:45:20 UTC 2020


Applied to focal/linux

Thanks,
Ian

On 2020-12-17 12:43:07 , Kamal Mostafa wrote:
> This pull request (39 commits) includes the following Focal stable patchsets:
> 
> 	Focal update: v5.4.82 upstream stable release
> 	https://bugs.launchpad.net/bugs/1908564
> 
> Note also that the 'stable-next' branch head contains this and all prior
> pending upstream stable releases.  I recommend fetching and applying just this
> reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference:
> 
>    git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next
> 
>  -Kamal
> 
> -----
> 
> The following changes since commit b7e4fa67b4453bbf7afbb7a6a540c4151458cab4:
> 
>   UBUNTU: upstream stable to v5.4.81 (2020-12-17 12:35:58 -0800)
> 
> are available in the Git repository at:
> 
>   git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.82
> 
> for you to fetch changes up to 8a245567f7eb47de9ed465d73d18a876b0fbabad:
> 
>   UBUNTU: upstream stable to v5.4.82 (2020-12-17 12:35:58 -0800)
> 
> ----------------------------------------------------------------
> Alexander Duyck (1):
>       tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control
> 
> Anmol Karn (1):
>       rose: Fix Null pointer dereference in rose_send_frame()
> 
> Antoine Tenart (2):
>       netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal
>       net: ip6_gre: set dev->hard_header_len when using header_ops
> 
> Dan Carpenter (2):
>       net/x25: prevent a couple of overflows
>       chelsio/chtls: fix a double free in chtls_setkey()
> 
> Davide Caratti (3):
>       net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl
>       net: openvswitch: ensure LSE is pullable before reading it
>       net/sched: act_mpls: ensure LSE is pullable before reading it
> 
> Eran Ben Elisha (1):
>       net/mlx5: Fix wrong address reclaim when command interface is down
> 
> Greg Kroah-Hartman (1):
>       Linux 5.4.82
> 
> Guillaume Nault (1):
>       ipv4: Fix tos mask in inet_rtm_getroute()
> 
> Hector Martin (1):
>       ALSA: usb-audio: US16x08: fix value count for level meters
> 
> Jamie Iles (1):
>       bonding: wait for sysfs kobject destruction before freeing struct slave
> 
> Jens Axboe (1):
>       tun: honor IOCB_NOWAIT flag
> 
> Julian Wiedmann (1):
>       net/af_iucv: set correct sk_protocol for child sockets
> 
> Kamal Mostafa (1):
>       UBUNTU: upstream stable to v5.4.82
> 
> Krzysztof Kozlowski (1):
>       dt-bindings: net: correct interrupt flags in examples
> 
> Maurizio Drocco (1):
>       ima: extend boot_aggregate with kernel measurements
> 
> Maxim Mikityanskiy (1):
>       net/tls: Protect from calling tls_dev_del for TLS RX twice
> 
> Parav Pandit (1):
>       devlink: Hold rtnl lock while reading netdev attributes
> 
> Randy Dunlap (1):
>       staging/octeon: fix up merge error
> 
> Sanjay Govind (1):
>       Input: xpad - support Ardwiino Controllers
> 
> Shiraz Saleem (1):
>       RDMA/i40iw: Address an mmap handler exploit in i40iw
> 
> Thomas Falcon (2):
>       ibmvnic: Ensure that SCRQ entry reads are correctly ordered
>       ibmvnic: Fix TX completion error handling
> 
> Toke Høiland-Jørgensen (1):
>       inet_ecn: Fix endianness of checksum update when setting ECT(1)
> 
> Vadim Fedorenko (1):
>       net/tls: missing received data after fast remote close
> 
> Vasily Averin (1):
>       tracing: Remove WARN_ON in start_thread()
> 
> Vinay Kumar Yadav (1):
>       chelsio/chtls: fix panic during unload reload chtls
> 
> Vincent Guittot (1):
>       sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list
> 
> Wang Hai (2):
>       ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init
>       net: mvpp2: Fix error return code in mvpp2_open()
> 
> Willem de Bruijn (1):
>       sock: set sk_err to ee_errno on dequeue from errq
> 
> Yevgeny Kliteynik (1):
>       net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering
> 
> Yves-Alexis Perez (1):
>       usbnet: ipheth: fix connectivity with iOS 14
> 
> Zhang Changzhong (3):
>       cxgb3: fix error return code in t3_sge_alloc_qset()
>       net: pasemi: fix error return code in pasemi_mac_open()
>       vxlan: fix error return code in __vxlan_dev_create()
> 
>  .../devicetree/bindings/net/can/tcan4x5x.txt       |  2 +-
>  .../devicetree/bindings/net/nfc/nxp-nci.txt        |  2 +-
>  .../devicetree/bindings/net/nfc/pn544.txt          |  2 +-
>  Makefile                                           |  2 +-
>  debian.master/upstream-stable                      |  2 +-
>  drivers/crypto/chelsio/chtls/chtls_cm.c            |  1 +
>  drivers/crypto/chelsio/chtls/chtls_hw.c            |  1 +
>  drivers/infiniband/hw/i40iw/i40iw_main.c           |  5 --
>  drivers/infiniband/hw/i40iw/i40iw_verbs.c          | 36 +++----------
>  drivers/input/joystick/xpad.c                      |  2 +
>  drivers/net/bonding/bond_main.c                    | 61 +++++++++++++++-------
>  drivers/net/bonding/bond_sysfs_slave.c             | 18 +------
>  drivers/net/ethernet/chelsio/cxgb3/sge.c           |  1 +
>  drivers/net/ethernet/ibm/ibmvnic.c                 | 22 ++++++--
>  drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c    |  1 +
>  .../net/ethernet/mellanox/mlx5/core/pagealloc.c    | 21 +++++++-
>  .../ethernet/mellanox/mlx5/core/steering/dr_cmd.c  |  1 +
>  .../mellanox/mlx5/core/steering/dr_domain.c        |  5 ++
>  .../mellanox/mlx5/core/steering/dr_types.h         |  1 +
>  drivers/net/ethernet/pasemi/pasemi_mac.c           |  8 ++-
>  drivers/net/tun.c                                  | 14 +++--
>  drivers/net/usb/ipheth.c                           |  2 +-
>  drivers/net/vxlan.c                                |  4 +-
>  drivers/staging/octeon/ethernet-tx.c               |  2 +-
>  include/linux/mlx5/mlx5_ifc.h                      |  9 +++-
>  include/net/bonding.h                              |  8 +++
>  include/net/inet_ecn.h                             |  2 +-
>  include/net/tls.h                                  |  6 +++
>  kernel/sched/fair.c                                | 36 ++++++++++---
>  kernel/trace/trace_hwlat.c                         |  2 +-
>  net/bridge/br_netfilter_hooks.c                    |  7 ++-
>  net/core/devlink.c                                 |  4 ++
>  net/core/skbuff.c                                  |  5 +-
>  net/ipv4/route.c                                   |  7 +--
>  net/ipv4/tcp_cong.c                                |  5 ++
>  net/ipv6/addrlabel.c                               | 26 +++++----
>  net/ipv6/ip6_gre.c                                 | 16 ++++--
>  net/iucv/af_iucv.c                                 |  4 +-
>  net/openvswitch/actions.c                          |  3 ++
>  net/rose/rose_loopback.c                           | 17 ++++--
>  net/sched/act_mpls.c                               |  3 ++
>  net/tls/tls_device.c                               |  5 +-
>  net/tls/tls_sw.c                                   |  6 +++
>  net/x25/af_x25.c                                   |  6 ++-
>  security/integrity/ima/ima.h                       |  2 +-
>  security/integrity/ima/ima_crypto.c                | 15 +++++-
>  sound/usb/mixer_us16x08.c                          |  2 +-
>  47 files changed, 284 insertions(+), 128 deletions(-)
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list