APPLIED: [SRU][Bionic][PULL] Bionic upstream stable patchset 2022-01-25
Stefan Bader
stefan.bader at canonical.com
Thu Jan 27 14:14:47 UTC 2022
On 25.01.22 19:58, Kamal Mostafa wrote:
> This pull request (32 commits) includes the following Bionic stable
> patchsets:
>
> Bionic update: upstream stable patchset 2022-01-25
> Ported from the following upstream stable releases:
> v4.14.260, v4.19.223
> https://bugs.launchpad.net/bugs/1959033
>
> Note also that the 'stable-next' branch head contains this and all prior
> pending upstream stable releases, rebased to master-next:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/bionic stable-next
>
> -Kamal
>
> ---
>
> The following changes since commit 581275c2215d0cfcbfcf8e5e247951e17521a994:
>
> UBUNTU: upstream stable to v4.14.259, v4.19.222 (2022-01-14 11:22:15 -0800)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/bionic tags/bionic-stable-2022-01-25
>
> for you to fetch changes up to 4c74df799c5937168fd8af6b8c8beab9df8240f7:
>
> UBUNTU: upstream stable to v4.14.260, v4.19.223 (2022-01-25 09:16:00 -0800)
>
> ----------------------------------------------------------------
> Andrew Cooper (1):
> x86/pkey: Fix undefined behaviour with PKRU_WD_BIT
>
> Ard Biesheuvel (1):
> ARM: 9169/1: entry: fix Thumb2 bug in iWMMXt exception handling
>
> Benjamin Tissoires (1):
> HID: holtek: fix mouse probing
>
> Chao Yu (1):
> f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
>
> Colin Ian King (1):
> ALSA: drivers: opl3: Fix incorrect use of vp->state
>
> Dongliang Mu (1):
> spi: change clk_disable_unprepare to clk_unprepare
>
> Fabien Dessenne (1):
> pinctrl: stm32: consider the GPIO offset to expose all the GPIO lines
>
> Fernando Fernandez Mancera (1):
> bonding: fix ad_actor_system option setting to default
>
> Greg Jesionowski (1):
> net: usb: lan78xx: add Allied Telesis AT29M2-AF
>
> Guenter Roeck (2):
> hwmon: (lm90) Fix usage of CONFIG2 register in detect function
> hwmon: (lm90) Do not report 'busy' status bit as alarm
>
> Gustavo A. R. Silva (1):
> IB/qib: Use struct_size() helper
>
> Ignacy Gawędzki (1):
> netfilter: fix regression in looped (broad|multi)cast's MAC handling
>
> Jiasheng Jiang (4):
> qlcnic: potential dereference null pointer of rx_queue->page_ring
> fjes: Check for error irq
> drivers: net: smc911x: Check for error irq
> sfc: falcon: Check null pointer of rx_queue->page_ring
>
> Jimmy Assarsson (1):
> can: kvaser_usb: get CAN clock frequency from device
>
> John David Anglin (1):
> parisc: Correct completer in lws start
>
> José Expósito (2):
> IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
> Input: atmel_mxt_ts - fix double free in mxt_read_info_block
>
> Kamal Mostafa (1):
> UBUNTU: upstream stable to v4.14.260, v4.19.223
>
> Lin Ma (3):
> ax25: NPD bug when detaching AX25 device
> hamradio: defer ax25 kfree after unregister_netdev
> hamradio: improve the incomplete fix to avoid NPD
>
> Marian Postevca (1):
> usb: gadget: u_ether: fix race in setting MAC address in setup phase
>
> Mike Marciniszyn (1):
> IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
>
> Rémi Denis-Courmont (1):
> phonet/pep: refuse to enable an unbound pipe
>
> Sean Christopherson (1):
> KVM: VMX: Fix stale docs for kvm-intel.emulate_invalid_guest_state
>
> Willem de Bruijn (2):
> net: accept UFOv6 packages in virtio_net_hdr_to_skb
> net: skip virtio_net_hdr_set_proto if protocol already set
>
> Xiaoke Wang (1):
> ALSA: jack: Check the return value of kstrdup()
>
> Documentation/admin-guide/kernel-parameters.txt | 8 +++--
> Documentation/networking/bonding.txt | 11 +++---
> arch/arm/kernel/entry-armv.S | 8 ++---
> arch/parisc/kernel/syscall.S | 2 +-
> arch/x86/include/asm/pgtable.h | 4 +--
> debian.master/upstream-stable | 4 +--
> drivers/hid/hid-holtek-mouse.c | 15 ++++++++
> drivers/hwmon/lm90.c | 8 ++---
> drivers/infiniband/hw/qib/qib_user_sdma.c | 35 ++++++++++++------
> drivers/input/touchscreen/atmel_mxt_ts.c | 2 +-
> drivers/net/bonding/bond_options.c | 2 +-
> drivers/net/can/usb/kvaser_usb.c | 41 +++++++++++++++++++---
> drivers/net/ethernet/qlogic/qlcnic/qlcnic_sriov.h | 2 +-
> .../ethernet/qlogic/qlcnic/qlcnic_sriov_common.c | 12 +++++--
> .../net/ethernet/qlogic/qlcnic/qlcnic_sriov_pf.c | 4 ++-
> drivers/net/ethernet/sfc/falcon/rx.c | 5 ++-
> drivers/net/ethernet/smsc/smc911x.c | 5 +++
> drivers/net/fjes/fjes_main.c | 5 +++
> drivers/net/hamradio/mkiss.c | 5 +--
> drivers/net/usb/lan78xx.c | 6 ++++
> drivers/pinctrl/stm32/pinctrl-stm32.c | 8 ++---
> drivers/spi/spi-armada-3700.c | 2 +-
> drivers/usb/gadget/function/u_ether.c | 15 +++-----
> fs/f2fs/xattr.c | 9 ++++-
> include/linux/virtio_net.h | 25 +++++++++++--
> net/ax25/af_ax25.c | 4 ++-
> net/netfilter/nfnetlink_log.c | 3 +-
> net/netfilter/nfnetlink_queue.c | 3 +-
> net/phonet/pep.c | 2 ++
> sound/core/jack.c | 4 +++
> sound/drivers/opl3/opl3_midi.c | 2 +-
> 31 files changed, 193 insertions(+), 68 deletions(-)
>
Applied to bionic:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20220127/2480b7d3/attachment.sig>
More information about the kernel-team
mailing list