APPLIED: [SRU][Bionic][PULL] Bionic upstream stable patchset 2022-10-06
Luke Nowakowski-Krijger
luke.nowakowskikrijger at canonical.com
Wed Nov 9 12:31:58 UTC 2022
Applied to bionic/linux master-next
Thanks!
- Luke
On Fri, Oct 7, 2022 at 1:55 AM Kamal Mostafa <kamal at canonical.com> wrote:
> This pull request (46 commits) includes the following Bionic stable
> patchsets:
>
> Bionic update: upstream stable patchset 2022-10-06
> Ported from the following upstream stable releases:
> v4.14.292, v4.19.257
> https://bugs.launchpad.net/bugs/1992112
>
> Note also that the 'stable-next' branch head contains this and all prior
> pending upstream stable releases, rebased to master-next:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/bionic stable-next
>
> -Kamal
>
> ---
>
> The following changes since commit
> 0c07241d4da9dfb19106cb2802ef814fa2dcc033:
>
> UBUNTU: SAUCE: netfilter: nf_queue: Fix memory leak in
> nf_queue_entry_get_refs (2022-10-06 10:16:57 -0700)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/bionic
> tags/bionic-stable-2022-10-06
>
> for you to fetch changes up to 7dc1a8ebc632a7498501b7bedf02b131930676ed:
>
> UBUNTU: Upstream stable to v4.14.292, v4.19.257 (2022-10-06 16:48:57
> -0700)
>
> ----------------------------------------------------------------
> Basavaraj Natikar (1):
> pinctrl: amd: Don't save/restore interrupt status and wake status
> bits
>
> Bernard Pidoux (1):
> rose: check NULL rose_loopback_neigh->loopback
>
> Brian Foster (1):
> s390: fix double free of GS and RI CBs on fork() failure
>
> Chen Zhongjin (1):
> x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry
>
> David Hildenbrand (1):
> mm/hugetlb: fix hugetlb not supporting softdirty tracking
>
> Denis V. Lunev (1):
> neigh: fix possible DoS due to net iface start/stop loop
>
> Dongliang Mu (1):
> media: pvrusb2: fix memory leak in pvr_probe
>
> Florian Westphal (1):
> netfilter: ebtables: reject blobs that don't provide all entry points
>
> Gaosheng Cui (1):
> audit: fix potential double free on error path from
> fsnotify_add_inode_mark
>
> Geert Uytterhoeven (1):
> netfilter: conntrack: NF_CONNTRACK_PROCFS should no longer default
> to y
>
> Gerald Schaefer (1):
> s390/mm: do not trigger write fault when vma does not allow VM_WRITE
>
> Goldwyn Rodrigues (1):
> btrfs: check if root is readonly while setting security xattr
>
> Guoqing Jiang (1):
> md: call __md_stop_writes in md_stop
>
> Helge Deller (1):
> parisc: Fix exception handler for fldw and fstw instructions
>
> Hsin-Yi Wang (1):
> arm64: map FDT as RW for early_init_dt_scan()
>
> Jacob Keller (1):
> ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter
>
> Jann Horn (2):
> mm: Force TLB flush for PFNMAP mappings before unlink_file_vma()
> mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse
>
> Jing Leng (1):
> kbuild: Fix include path in scripts/Makefile.modpost
>
> Jonathan Toppins (1):
> bonding: 802.3ad: fix no transmission of LACPDUs
>
> Juergen Gross (1):
> s390/hypfs: avoid error message under KVM
>
> Kamal Mostafa (1):
> UBUNTU: Upstream stable to v4.14.292, v4.19.257
>
> Karthik Alapati (1):
> HID: hidraw: fix memory leak in hidraw_release()
>
> Kuniyuki Iwashima (10):
> net: Fix data-races around weight_p and dev_weight_[rt]x_bias.
> ratelimit: Fix data-races in ___ratelimit().
> net: Fix a data-race around sysctl_tstamp_allow_data.
> net: Fix a data-race around sysctl_net_busy_poll.
> net: Fix a data-race around sysctl_net_busy_read.
> net: Fix a data-race around netdev_budget.
> net: Fix a data-race around netdev_budget_usecs.
> net: Fix a data-race around sysctl_somaxconn.
> kprobes: don't call disarm_kprobe() for disabled kprobes
> net: Fix data-races around netdev_tstamp_prequeue.
>
> Letu Ren (1):
> fbdev: fb_pm2fb: Avoid potential divide by zero error
>
> Luiz Augusto von Dentz (1):
> Bluetooth: L2CAP: Fix build errors in some archs
>
> Maciej Żenczykowski (1):
> net: ipvtap - add __init/__exit annotations to module init/exit funcs
>
> Maxim Mikityanskiy (1):
> bpf: Fix the off-by-two error in range markings
>
> Pablo Neira Ayuso (2):
> netfilter: nft_payload: report ERANGE for too long offset and length
> netfilter: nft_payload: do not truncate csum_offset and csum_type
>
> Pawan Gupta (1):
> x86/bugs: Add "unknown" reporting for MMIO Stale Data
>
> Quanyang Wang (1):
> asm-generic: sections: refactor memory_intersects
>
> Saurabh Sengar (1):
> scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq
>
> Siddh Raman Pant (1):
> loop: Check for overflow while configuring loop
>
> Xin Xiong (1):
> xfrm: fix refcount leak in __xfrm_policy_check()
>
> Yang Jihong (1):
> ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when
> ftrace is dead
>
> Yang Yingliang (1):
> net: neigh: don't call kfree_skb() under spin_lock_irqsave()
>
> .../hw-vuln/processor_mmio_stale_data.rst | 14 +++++
> arch/arm64/include/asm/mmu.h | 2 +-
> arch/arm64/kernel/kaslr.c | 5 +-
> arch/arm64/kernel/setup.c | 9 +++-
> arch/arm64/mm/mmu.c | 15 +-----
> arch/parisc/kernel/unaligned.c | 2 +-
> arch/s390/hypfs/hypfs_diag.c | 2 +-
> arch/s390/hypfs/inode.c | 2 +-
> arch/s390/kernel/process.c | 22 +++++---
> arch/s390/mm/fault.c | 4 +-
> arch/x86/include/asm/cpufeatures.h | 1 +
> arch/x86/kernel/cpu/bugs.c | 14 ++++-
> arch/x86/kernel/cpu/common.c | 34 +++++++++----
> arch/x86/kernel/unwind_orc.c | 15 ++++--
> debian.master/upstream-stable | 4 +-
> drivers/block/loop.c | 5 ++
> drivers/hid/hidraw.c | 3 ++
> drivers/md/md.c | 1 +
> drivers/media/usb/pvrusb2/pvrusb2-hdw.c | 1 +
> drivers/net/bonding/bond_3ad.c | 38 ++++++--------
> drivers/net/ethernet/intel/ixgbe/ixgbe_ptp.c | 59
> +++++++++++++++++-----
> drivers/net/ipvlan/ipvtap.c | 4 +-
> drivers/pinctrl/pinctrl-amd.c | 11 +++-
> drivers/scsi/storvsc_drv.c | 2 +-
> drivers/video/fbdev/pm2fb.c | 5 ++
> fs/btrfs/xattr.c | 3 ++
> include/asm-generic/sections.h | 7 ++-
> include/linux/netfilter_bridge/ebtables.h | 4 --
> include/linux/rmap.h | 7 ++-
> include/net/busy_poll.h | 2 +-
> kernel/audit_fsnotify.c | 1 +
> kernel/kprobes.c | 10 ++--
> kernel/trace/ftrace.c | 10 ++++
> lib/ratelimit.c | 12 +++--
> mm/mmap.c | 20 +++++++-
> mm/rmap.c | 31 +++++++-----
> net/bluetooth/l2cap_core.c | 10 ++--
> net/bridge/netfilter/ebtable_broute.c | 8 ---
> net/bridge/netfilter/ebtable_filter.c | 8 ---
> net/bridge/netfilter/ebtable_nat.c | 8 ---
> net/bridge/netfilter/ebtables.c | 8 +--
> net/core/dev.c | 12 ++---
> net/core/neighbour.c | 27 +++++++---
> net/core/skbuff.c | 2 +-
> net/core/sock.c | 2 +-
> net/core/sysctl_net_core.c | 15 +++---
> net/netfilter/Kconfig | 1 -
> net/netfilter/nft_payload.c | 29 ++++++++---
> net/rose/rose_loopback.c | 3 +-
> net/sched/sch_generic.c | 2 +-
> net/socket.c | 2 +-
> net/xfrm/xfrm_policy.c | 1 +
> scripts/Makefile.modpost | 3 +-
> tools/testing/selftests/bpf/test_verifier.c | 32 ++++++------
> 54 files changed, 346 insertions(+), 208 deletions(-)
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221109/e7c2d97b/attachment-0001.html>
More information about the kernel-team
mailing list