[Xenial][SRU][Pull] Xenial update: 4.4.219 upstream stable release
Kleber Souza
kleber.souza at canonical.com
Tue Apr 21 13:16:33 UTC 2020
This pull request includes the following Xenial stable patchset:
Xenial update: 4.4.219 upstream stable release
BugLink: https://bugs.launchpad.net/bugs/1874045
Please note that the following patches have been skipped as they were already
applied to xenial/linux:
* slcan: Don't transmit uninitialized stack data in padding
* xen-netfront: Fix mismatched rtnl_unlock
* xen-netfront: Update features after registering netdev
The following patch needed some context adjustment:
* l2tp: fix duplicate session creation
All the other patches applied cleanly.
Kleber
----
The following changes since commit a2e779375a3afed7b6fbef11fc08e019d658d320:
Linux 4.4.218 (2020-04-20 16:18:08 +0200)
are available in the Git repository at:
git://git.launchpad.net/~kleber-souza/ubuntu/+source/linux/+git/xenial xenial-update-to-4.4.219
for you to fetch changes up to 6f7772921d7b66e5355fbd874f4c41c97cb1a0c5:
Linux 4.4.219 (2020-04-21 14:07:48 +0200)
----------------------------------------------------------------
Avihai Horon (1):
RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow
Daniel Jordan (1):
padata: always acquire cpu_hotplug_lock before pinst->lock
David Ahern (1):
tools/accounting/getdelays.c: fix netlink attribute length
Gao Feng (1):
l2tp: Refactor the codes with existing macros instead of literal number
Gerd Hoffmann (1):
drm/bochs: downgrade pci_request_region failure from error to warning
Greg Kroah-Hartman (1):
Linux 4.4.219
Guillaume Nault (5):
l2tp: fix race in l2tp_recv_common()
l2tp: ensure session can't get removed during pppol2tp_session_ioctl()
l2tp: fix duplicate session creation
l2tp: ensure sessions are freed after their PPPOL2TP socket
l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()
Gustavo A. R. Silva (1):
power: supply: axp288_charger: Fix unchecked return value
Hans Verkuil (1):
drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read()
Jason A. Donenfeld (1):
random: always use batched entropy for get_random_u{32,64}
Jisheng Zhang (1):
net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting
Kaike Wan (1):
IB/hfi1: Call kobject_put() when kobject_init_and_add() fails
Krzysztof Opasiak (2):
usb: gadget: uac2: Drop unused device qualifier descriptor
usb: gadget: printer: Drop unused device qualifier descriptor
Marcelo Ricardo Leitner (1):
sctp: fix possibly using a bad saddr with a given dst
Paul Cercueil (1):
ASoC: jz4740-i2s: Fix divider written at incorrect offset in register
Qian Cai (1):
ipv4: fix a RCU-list lock in fib_triestat_seq_show
Qiujun Huang (1):
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
Randy Dunlap (1):
mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
Shmulik Ladkani (1):
net: l2tp: Make l2tp_ip6 namespace aware
Taniya Das (1):
clk: qcom: rcg: Return failure for RCG update
William Dauchy (1):
net, ip_tunnel: fix interface lookup with no key
phil.turnbull at oracle.com (1):
l2tp: Correctly return -EBADF from pppol2tp_getname.
Documentation/accounting/getdelays.c | 2 +-
Makefile | 2 +-
drivers/char/random.c | 6 -
drivers/clk/qcom/clk-rcg2.c | 2 +-
drivers/gpu/drm/bochs/bochs_hw.c | 6 +-
drivers/gpu/drm/drm_dp_mst_topology.c | 1 +
drivers/infiniband/core/cma.c | 1 +
.../net/ethernet/stmicro/stmmac/dwmac1000_core.c | 2 +-
drivers/power/axp288_charger.c | 4 +
drivers/staging/rdma/hfi1/sysfs.c | 13 +-
drivers/usb/gadget/function/f_printer.c | 8 --
drivers/usb/gadget/function/f_uac2.c | 12 --
kernel/padata.c | 4 +-
mm/mempolicy.c | 6 +-
net/bluetooth/rfcomm/tty.c | 4 +-
net/ipv4/fib_trie.c | 3 +
net/ipv4/ip_tunnel.c | 6 +-
net/l2tp/l2tp_core.c | 149 ++++++++++++++++-----
net/l2tp/l2tp_core.h | 4 +
net/l2tp/l2tp_eth.c | 10 +-
net/l2tp/l2tp_ip.c | 17 ++-
net/l2tp/l2tp_ip6.c | 28 ++--
net/l2tp/l2tp_ppp.c | 110 +++++++--------
net/sctp/ipv6.c | 20 ++-
net/sctp/protocol.c | 28 ++--
sound/soc/jz4740/jz4740-i2s.c | 2 +-
26 files changed, 277 insertions(+), 173 deletions(-)
More information about the kernel-team
mailing list