[SRU][Focal][PULL] Focal update: v5.4.245 upstream stable release

Kamal Mostafa kamal at canonical.com
Fri Jul 28 21:51:59 UTC 2023


This pull request (18 commits) includes the following Focal stable patchsets:

	Focal update: v5.4.245 upstream stable release
	https://bugs.launchpad.net/bugs/2028980

Note also that the 'stable-next' branch head contains this and all prior
pending upstream stable releases.  I recommend fetching and applying just this
reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference:

   git://git.launchpad.net/~ubuntu-kernel-stable/+git/focal stable-next

 -Kamal

-----

The following changes since commit 92a042335a5d44f737b613185c8f42db856f0492:

  UBUNTU: Upstream stable to v5.4.244 (2023-07-25 12:53:56 -0700)

are available in the Git repository at:

  git://git.launchpad.net/~ubuntu-kernel-stable/+git/focal tags/focal-stable-v5.4.245

for you to fetch changes up to 3c5dfba44714c0d0200c1aff3428157908b94434:

  UBUNTU: Upstream stable to v5.4.245 (2023-07-28 14:10:47 -0700)

----------------------------------------------------------------
Alexander Bersenev (2):
      cdc_ncm: Implement the 32-bit version of NCM Transfer Block
      cdc_ncm: Fix the build warning

Carlos Llamas (1):
      binder: fix UAF caused by faulty buffer cleanup

Greg Kroah-Hartman (1):
      Linux 5.4.245

Hans de Goede (3):
      power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize
      power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
      power: supply: bq24190: Call power_supply_changed() after updating input current

Hao Ge (1):
      fs: fix undefined behavior in bit shift for SB_NOUSER

Jens Axboe (3):
      io_uring: always grab lock in io_cancel_async_work()
      io_uring: don't drop completion lock before timer is fully initialized
      io_uring: have io_kill_timeout() honor the request references

Kamal Mostafa (1):
      UBUNTU: Upstream stable to v5.4.245

Mark Bloch (1):
      net/mlx5: devcom only supports 2 ports

Nicolas Dichtel (1):
      ipv{4,6}/raw: fix output xfrm lookup wrt protocol

Paul Blakey (1):
      netfilter: ctnetlink: Support offloaded conntrack entry deletion

Ruihan Li (1):
      bluetooth: Add cmd validity checks at the start of hci_sock_ioctl()

Shay Drory (1):
      net/mlx5: Devcom, serialize devcom registration

Tudor Ambarus (1):
      net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize

 Makefile                                           |   2 +-
 debian.master/upstream-stable                      |   2 +-
 drivers/android/binder.c                           |  26 +-
 .../net/ethernet/mellanox/mlx5/core/lib/devcom.c   |  35 +-
 .../net/ethernet/mellanox/mlx5/core/lib/devcom.h   |   2 +
 drivers/net/usb/cdc_ncm.c                          | 435 ++++++++++++++++-----
 drivers/net/usb/huawei_cdc_ncm.c                   |   8 +-
 drivers/power/supply/bq24190_charger.c             |  13 +-
 drivers/power/supply/bq27xxx_battery.c             |   4 +-
 drivers/power/supply/power_supply_core.c           |  57 +--
 fs/io_uring.c                                      |   8 +-
 include/linux/fs.h                                 |  40 +-
 include/linux/power_supply.h                       |   5 +-
 include/linux/usb/cdc_ncm.h                        |  15 +-
 include/net/ip.h                                   |   2 +
 include/uapi/linux/in.h                            |   2 +
 net/bluetooth/hci_sock.c                           |  28 ++
 net/ipv4/ip_sockglue.c                             |  12 +-
 net/ipv4/raw.c                                     |   5 +-
 net/ipv6/raw.c                                     |   3 +-
 net/netfilter/nf_conntrack_netlink.c               |   8 -
 21 files changed, 521 insertions(+), 191 deletions(-)



More information about the kernel-team mailing list