[SRU][Focal][PULL] Focal update: v5.4.82 upstream stable release
Kamal Mostafa
kamal at canonical.com
Thu Dec 17 20:43:07 UTC 2020
This pull request (39 commits) includes the following Focal stable patchsets:
Focal update: v5.4.82 upstream stable release
https://bugs.launchpad.net/bugs/1908564
Note also that the 'stable-next' branch head contains this and all prior
pending upstream stable releases. I recommend fetching and applying just this
reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference:
git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next
-Kamal
-----
The following changes since commit b7e4fa67b4453bbf7afbb7a6a540c4151458cab4:
UBUNTU: upstream stable to v5.4.81 (2020-12-17 12:35:58 -0800)
are available in the Git repository at:
git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.82
for you to fetch changes up to 8a245567f7eb47de9ed465d73d18a876b0fbabad:
UBUNTU: upstream stable to v5.4.82 (2020-12-17 12:35:58 -0800)
----------------------------------------------------------------
Alexander Duyck (1):
tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control
Anmol Karn (1):
rose: Fix Null pointer dereference in rose_send_frame()
Antoine Tenart (2):
netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal
net: ip6_gre: set dev->hard_header_len when using header_ops
Dan Carpenter (2):
net/x25: prevent a couple of overflows
chelsio/chtls: fix a double free in chtls_setkey()
Davide Caratti (3):
net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl
net: openvswitch: ensure LSE is pullable before reading it
net/sched: act_mpls: ensure LSE is pullable before reading it
Eran Ben Elisha (1):
net/mlx5: Fix wrong address reclaim when command interface is down
Greg Kroah-Hartman (1):
Linux 5.4.82
Guillaume Nault (1):
ipv4: Fix tos mask in inet_rtm_getroute()
Hector Martin (1):
ALSA: usb-audio: US16x08: fix value count for level meters
Jamie Iles (1):
bonding: wait for sysfs kobject destruction before freeing struct slave
Jens Axboe (1):
tun: honor IOCB_NOWAIT flag
Julian Wiedmann (1):
net/af_iucv: set correct sk_protocol for child sockets
Kamal Mostafa (1):
UBUNTU: upstream stable to v5.4.82
Krzysztof Kozlowski (1):
dt-bindings: net: correct interrupt flags in examples
Maurizio Drocco (1):
ima: extend boot_aggregate with kernel measurements
Maxim Mikityanskiy (1):
net/tls: Protect from calling tls_dev_del for TLS RX twice
Parav Pandit (1):
devlink: Hold rtnl lock while reading netdev attributes
Randy Dunlap (1):
staging/octeon: fix up merge error
Sanjay Govind (1):
Input: xpad - support Ardwiino Controllers
Shiraz Saleem (1):
RDMA/i40iw: Address an mmap handler exploit in i40iw
Thomas Falcon (2):
ibmvnic: Ensure that SCRQ entry reads are correctly ordered
ibmvnic: Fix TX completion error handling
Toke Høiland-Jørgensen (1):
inet_ecn: Fix endianness of checksum update when setting ECT(1)
Vadim Fedorenko (1):
net/tls: missing received data after fast remote close
Vasily Averin (1):
tracing: Remove WARN_ON in start_thread()
Vinay Kumar Yadav (1):
chelsio/chtls: fix panic during unload reload chtls
Vincent Guittot (1):
sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list
Wang Hai (2):
ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init
net: mvpp2: Fix error return code in mvpp2_open()
Willem de Bruijn (1):
sock: set sk_err to ee_errno on dequeue from errq
Yevgeny Kliteynik (1):
net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering
Yves-Alexis Perez (1):
usbnet: ipheth: fix connectivity with iOS 14
Zhang Changzhong (3):
cxgb3: fix error return code in t3_sge_alloc_qset()
net: pasemi: fix error return code in pasemi_mac_open()
vxlan: fix error return code in __vxlan_dev_create()
.../devicetree/bindings/net/can/tcan4x5x.txt | 2 +-
.../devicetree/bindings/net/nfc/nxp-nci.txt | 2 +-
.../devicetree/bindings/net/nfc/pn544.txt | 2 +-
Makefile | 2 +-
debian.master/upstream-stable | 2 +-
drivers/crypto/chelsio/chtls/chtls_cm.c | 1 +
drivers/crypto/chelsio/chtls/chtls_hw.c | 1 +
drivers/infiniband/hw/i40iw/i40iw_main.c | 5 --
drivers/infiniband/hw/i40iw/i40iw_verbs.c | 36 +++----------
drivers/input/joystick/xpad.c | 2 +
drivers/net/bonding/bond_main.c | 61 +++++++++++++++-------
drivers/net/bonding/bond_sysfs_slave.c | 18 +------
drivers/net/ethernet/chelsio/cxgb3/sge.c | 1 +
drivers/net/ethernet/ibm/ibmvnic.c | 22 ++++++--
drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c | 1 +
.../net/ethernet/mellanox/mlx5/core/pagealloc.c | 21 +++++++-
.../ethernet/mellanox/mlx5/core/steering/dr_cmd.c | 1 +
.../mellanox/mlx5/core/steering/dr_domain.c | 5 ++
.../mellanox/mlx5/core/steering/dr_types.h | 1 +
drivers/net/ethernet/pasemi/pasemi_mac.c | 8 ++-
drivers/net/tun.c | 14 +++--
drivers/net/usb/ipheth.c | 2 +-
drivers/net/vxlan.c | 4 +-
drivers/staging/octeon/ethernet-tx.c | 2 +-
include/linux/mlx5/mlx5_ifc.h | 9 +++-
include/net/bonding.h | 8 +++
include/net/inet_ecn.h | 2 +-
include/net/tls.h | 6 +++
kernel/sched/fair.c | 36 ++++++++++---
kernel/trace/trace_hwlat.c | 2 +-
net/bridge/br_netfilter_hooks.c | 7 ++-
net/core/devlink.c | 4 ++
net/core/skbuff.c | 5 +-
net/ipv4/route.c | 7 +--
net/ipv4/tcp_cong.c | 5 ++
net/ipv6/addrlabel.c | 26 +++++----
net/ipv6/ip6_gre.c | 16 ++++--
net/iucv/af_iucv.c | 4 +-
net/openvswitch/actions.c | 3 ++
net/rose/rose_loopback.c | 17 ++++--
net/sched/act_mpls.c | 3 ++
net/tls/tls_device.c | 5 +-
net/tls/tls_sw.c | 6 +++
net/x25/af_x25.c | 6 ++-
security/integrity/ima/ima.h | 2 +-
security/integrity/ima/ima_crypto.c | 15 +++++-
sound/usb/mixer_us16x08.c | 2 +-
47 files changed, 284 insertions(+), 128 deletions(-)
More information about the kernel-team
mailing list