[SRU][Focal][PULL] Focal update: v5.4.245 upstream stable release
Kamal Mostafa
kamal at canonical.com
Fri Jul 28 21:51:59 UTC 2023
This pull request (18 commits) includes the following Focal stable patchsets:
Focal update: v5.4.245 upstream stable release
https://bugs.launchpad.net/bugs/2028980
Note also that the 'stable-next' branch head contains this and all prior
pending upstream stable releases. I recommend fetching and applying just this
reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference:
git://git.launchpad.net/~ubuntu-kernel-stable/+git/focal stable-next
-Kamal
-----
The following changes since commit 92a042335a5d44f737b613185c8f42db856f0492:
UBUNTU: Upstream stable to v5.4.244 (2023-07-25 12:53:56 -0700)
are available in the Git repository at:
git://git.launchpad.net/~ubuntu-kernel-stable/+git/focal tags/focal-stable-v5.4.245
for you to fetch changes up to 3c5dfba44714c0d0200c1aff3428157908b94434:
UBUNTU: Upstream stable to v5.4.245 (2023-07-28 14:10:47 -0700)
----------------------------------------------------------------
Alexander Bersenev (2):
cdc_ncm: Implement the 32-bit version of NCM Transfer Block
cdc_ncm: Fix the build warning
Carlos Llamas (1):
binder: fix UAF caused by faulty buffer cleanup
Greg Kroah-Hartman (1):
Linux 5.4.245
Hans de Goede (3):
power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize
power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
power: supply: bq24190: Call power_supply_changed() after updating input current
Hao Ge (1):
fs: fix undefined behavior in bit shift for SB_NOUSER
Jens Axboe (3):
io_uring: always grab lock in io_cancel_async_work()
io_uring: don't drop completion lock before timer is fully initialized
io_uring: have io_kill_timeout() honor the request references
Kamal Mostafa (1):
UBUNTU: Upstream stable to v5.4.245
Mark Bloch (1):
net/mlx5: devcom only supports 2 ports
Nicolas Dichtel (1):
ipv{4,6}/raw: fix output xfrm lookup wrt protocol
Paul Blakey (1):
netfilter: ctnetlink: Support offloaded conntrack entry deletion
Ruihan Li (1):
bluetooth: Add cmd validity checks at the start of hci_sock_ioctl()
Shay Drory (1):
net/mlx5: Devcom, serialize devcom registration
Tudor Ambarus (1):
net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize
Makefile | 2 +-
debian.master/upstream-stable | 2 +-
drivers/android/binder.c | 26 +-
.../net/ethernet/mellanox/mlx5/core/lib/devcom.c | 35 +-
.../net/ethernet/mellanox/mlx5/core/lib/devcom.h | 2 +
drivers/net/usb/cdc_ncm.c | 435 ++++++++++++++++-----
drivers/net/usb/huawei_cdc_ncm.c | 8 +-
drivers/power/supply/bq24190_charger.c | 13 +-
drivers/power/supply/bq27xxx_battery.c | 4 +-
drivers/power/supply/power_supply_core.c | 57 +--
fs/io_uring.c | 8 +-
include/linux/fs.h | 40 +-
include/linux/power_supply.h | 5 +-
include/linux/usb/cdc_ncm.h | 15 +-
include/net/ip.h | 2 +
include/uapi/linux/in.h | 2 +
net/bluetooth/hci_sock.c | 28 ++
net/ipv4/ip_sockglue.c | 12 +-
net/ipv4/raw.c | 5 +-
net/ipv6/raw.c | 3 +-
net/netfilter/nf_conntrack_netlink.c | 8 -
21 files changed, 521 insertions(+), 191 deletions(-)
More information about the kernel-team
mailing list