APPLIED/Cmnt: [SRU][Focal][PULL] Focal update: v5.4.265 upstream stable release
Stefan Bader
stefan.bader at canonical.com
Wed Jan 31 10:20:26 UTC 2024
On 30.01.24 09:45, Manuel Diewald wrote:
> This pull request (39 commits) includes the following Focal stable patchsets:
>
> Focal update: v5.4.265 upstream stable release
> https://bugs.launchpad.net/bugs/2051644
>
> Note also that the 'stable-next' branch head contains this and all
> prior pending upstream stable releases. I recommend fetching and
> applying just this reference ('stable-next') instead of each
> tags/focal-stable-* reference:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/focal stable-next
>
> -Manuel
>
> ------------------------------------------------------------------------
>
> The following changes since commit 90c0197ea43fba23e80467c46baf2565ae68c4e1:
>
> UBUNTU: Upstream stable to v5.4.264 (2024-01-19 18:01:40 +0100)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/focal tags/focal-stable-v5.4.265
>
> for you to fetch changes up to bce4e0b44c54e46856cd50aaebaf0f41565e50a3:
>
> UBUNTU: Upstream stable to v5.4.265 (2024-01-30 09:08:49 +0100)
>
> ----------------------------------------------------------------
> Adrian Hunter (1):
> mmc: block: Be sure to wait while busy in CQE error recovery
>
> Andrew Halaney (1):
> net: stmmac: Handle disabled MDIO busses from devicetree
>
> Andy Shevchenko (1):
> platform/x86: intel_telemetry: Fix kernel doc descriptions
>
> Aoba K (1):
> HID: multitouch: Add quirk for HONOR GLO-GXXX touchpad
>
> Baokun Li (1):
> ext4: prevent the normalized size from exceeding EXT_MAX_BLOCKS
>
> Chengfeng Ye (2):
> atm: solos-pci: Fix potential deadlock on &cli_queue_lock
> atm: solos-pci: Fix potential deadlock on &tx_queue_lock
>
> Coly Li (3):
> bcache: avoid oversize memory allocation by small stripe_size
> bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc()
> bcache: avoid NULL checking to c->root in run_cache_set()
>
> David Howells (1):
> afs: Fix refcount underflow from error handling race
>
> Denis Benato (2):
> HID: hid-asus: reset the backlight brightness level on resume
> HID: hid-asus: add const to read-only outgoing usb buffer
>
> Dinghao Liu (1):
> qed: Fix a potential use-after-free in qed_cxt_tables_alloc
>
> Dong Chenchen (1):
> net: Remove acked SYN flag from packet in the transmit queue correctly
>
> Florent Revest (1):
> team: Fix use-after-free when an option instance allocation fails
>
> Greg Kroah-Hartman (1):
> Linux 5.4.265
>
> Hyunwoo Kim (2):
> atm: Fix Use-After-Free in do_vcc_ioctl
> appletalk: Fix Use-After-Free in atalk_ioctl
>
> James Houghton (1):
> arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify
>
> Jens Axboe (1):
> cred: switch to using atomic_long_t
>
> Kai Vehmanen (1):
> ALSA: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants
>
> Krzysztof Kozlowski (1):
> soundwire: stream: fix NULL pointer dereference for multi_link
>
> Lech Perczak (1):
> net: usb: qmi_wwan: claim interface 4 for ZTE MF290
>
> Linus Torvalds (1):
> asm-generic: qspinlock: fix queued_spin_value_unlocked() implementation
>
> Maciej Żenczykowski (1):
> net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX
>
> Manuel Diewald (1):
> UBUNTU: Upstream stable to v5.4.265
>
> Ming Lei (1):
> blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!"
>
> Naveen N Rao (2):
> powerpc/ftrace: Create a dummy stackframe to fix stack unwind
> powerpc/ftrace: Fix stack teardown in ftrace_no_trace
>
> Nikolay Kuratov (1):
> vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space()
>
> Oliver Neukum (2):
> usb: aqc111: check packet for fixup for true limit
> HID: add ALWAYS_POLL quirk for Apple kb
>
> Rasmus Villemoes (1):
> net: stmmac: use dev_err_probe() for reporting mdio bus registration failure
>
> Stefan Wahren (3):
> qca_debug: Prevent crash on TX ring changes
> qca_debug: Fix ethtool -G iface tx behavior
> qca_spi: Fix reset behavior
>
> Steven Rostedt (Google) (1):
> ring-buffer: Fix memory leak of free page
>
> Yusong Gao (1):
> sign-file: Fix incorrect return values check
>
> Makefile | 2 +-
> arch/arm64/include/asm/pgtable.h | 6 +++
> arch/powerpc/kernel/trace/ftrace_64_mprofile.S | 17 ++++--
> block/blk-throttle.c | 2 +
> debian.master/upstream-stable | 2 +-
> drivers/atm/solos-pci.c | 8 +--
> drivers/hid/hid-asus.c | 25 +++++++--
> drivers/hid/hid-multitouch.c | 5 ++
> drivers/hid/hid-quirks.c | 1 +
> drivers/md/bcache/bcache.h | 1 +
> drivers/md/bcache/btree.c | 7 +++
> drivers/md/bcache/super.c | 4 +-
> drivers/mmc/core/core.c | 2 +
> drivers/mmc/core/mmc_ops.c | 5 +-
> drivers/mmc/core/mmc_ops.h | 2 +
> drivers/net/ethernet/qlogic/qed/qed_cxt.c | 1 +
> drivers/net/ethernet/qualcomm/qca_debug.c | 17 +++---
> drivers/net/ethernet/qualcomm/qca_spi.c | 20 ++++++-
> drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 6 +--
> drivers/net/ethernet/stmicro/stmmac/stmmac_mdio.c | 8 ++-
> drivers/net/team/team.c | 4 +-
> drivers/net/usb/aqc111.c | 8 +--
> drivers/net/usb/qmi_wwan.c | 1 +
> drivers/platform/x86/intel_telemetry_core.c | 4 +-
> drivers/soundwire/stream.c | 7 +--
> fs/afs/rxrpc.c | 2 +-
> fs/ext4/mballoc.c | 4 ++
> include/asm-generic/qspinlock.h | 2 +-
> include/linux/cred.h | 8 +--
> include/net/addrconf.h | 12 ++++-
> include/net/if_inet6.h | 4 --
> kernel/cred.c | 64 +++++++++++------------
> kernel/trace/ring_buffer.c | 2 +
> net/appletalk/ddp.c | 9 ++--
> net/atm/ioctl.c | 7 ++-
> net/ipv4/tcp_output.c | 6 +++
> net/ipv6/addrconf.c | 6 +--
> net/vmw_vsock/virtio_transport_common.c | 2 +-
> scripts/sign-file.c | 12 ++---
> sound/pci/hda/patch_hdmi.c | 2 +
> 40 files changed, 204 insertions(+), 103 deletions(-)
>
Skipped "appletalk: Fix Use-After-Free in atalk_ioctl" because it is
already applied as CVE-2023-51781.
Applied to focal:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240131/3b8ca085/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240131/3b8ca085/attachment-0001.sig>
More information about the kernel-team
mailing list