APPLIED: [SRU][Jammy][PULL] Jammy update: v5.15.160 upstream stable release
Stefan Bader
stefan.bader at canonical.com
Wed Jun 26 09:22:26 UTC 2024
On 24.06.24 16:56, Manuel Diewald wrote:
> This pull request (20 commits) includes the following Jammy stable patchsets:
>
> Jammy update: v5.15.160 upstream stable release
> https://bugs.launchpad.net/bugs/2070292
>
> Note also that the 'stable-next' branch head contains this and all
> prior pending upstream stable releases. I recommend fetching and
> applying just this reference ('stable-next') instead of each
> tags/jammy-stable-* reference:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/jammy stable-next
>
> -Manuel
>
> ------------------------------------------------------------------------
>
> The following changes since commit ecc7a6434732e7cff3997c9e70bd4d017a09c7d1:
>
> UBUNTU: Upstream stable to v5.15.159 (2024-06-21 14:51:34 +0200)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/jammy tags/jammy-stable-v5.15.160
>
> for you to fetch changes up to 33eee45401f8e18859727f4cb60d0b9651aced0a:
>
> UBUNTU: Upstream stable to v5.15.160 (2024-06-24 16:47:54 +0200)
>
> ----------------------------------------------------------------
> Akira Yokosawa (1):
> docs: kernel_include.py: Cope with docutils 0.21
>
> AngeloGioacchino Del Regno (1):
> remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
>
> Carlos Llamas (1):
> binder: fix max_thread type inconsistency
>
> Daniel Thompson (1):
> serial: kgdboc: Fix NMI-safety problems from keyboard reset code
>
> Doug Berger (2):
> net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
> net: bcmgenet: synchronize UMAC_CMD access
>
> Eric Dumazet (2):
> netlink: annotate lockless accesses to nlk->max_recvmsg_len
> netlink: annotate data-races around sk->sk_err
>
> Greg Kroah-Hartman (1):
> Linux 5.15.160
>
> Harshit Mogalapalli (1):
> Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
>
> Heikki Krogerus (1):
> usb: typec: ucsi: displayport: Fix potential deadlock
>
> Jarkko Sakkinen (2):
> KEYS: trusted: Fix memory leak in tpm2_key_encode()
> KEYS: trusted: Do not use WARN when encode fails
>
> Jose Fernandez (1):
> drm/amd/display: Fix division by zero in setup_dsc_config
>
> Manuel Diewald (1):
> UBUNTU: Upstream stable to v5.15.160
>
> NeilBrown (1):
> nfsd: don't allow nfsd threads to be signalled.
>
> Sean Christopherson (1):
> KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
>
> Sergey Shtylyov (1):
> pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin()
>
> Srinivasan Shanmugam (1):
> drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
>
> Thomas Weißschuh (1):
> admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
>
> .../admin-guide/hw-vuln/core-scheduling.rst | 4 +--
> Documentation/sphinx/kernel_include.py | 1 -
> Makefile | 2 +-
> arch/x86/kvm/x86.c | 11 ++++++--
> debian.master/upstream-stable | 2 +-
> drivers/android/binder.c | 2 +-
> drivers/android/binder_internal.h | 2 +-
> drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c | 3 +++
> drivers/gpu/drm/amd/display/dc/dsc/dc_dsc.c | 7 ++++-
> drivers/net/ethernet/broadcom/genet/bcmgenet.c | 12 ++++++++-
> drivers/net/ethernet/broadcom/genet/bcmgenet.h | 2 ++
> drivers/net/ethernet/broadcom/genet/bcmgenet_wol.c | 6 +++++
> drivers/net/ethernet/broadcom/genet/bcmmii.c | 4 +++
> drivers/pinctrl/core.c | 14 +++++++---
> drivers/remoteproc/mtk_scp.c | 10 +++++++-
> drivers/tty/serial/kgdboc.c | 30 +++++++++++++++++++++-
> drivers/usb/typec/ucsi/displayport.c | 4 ---
> fs/nfs/callback.c | 9 +------
> fs/nfsd/nfs4proc.c | 5 ++--
> fs/nfsd/nfssvc.c | 12 ---------
> net/netlink/af_netlink.c | 23 +++++++++--------
> net/sunrpc/svc_xprt.c | 16 +++++-------
> security/keys/trusted-keys/trusted_tpm2.c | 25 +++++++++++++-----
> tools/testing/selftests/vm/map_hugetlb.c | 7 -----
> 24 files changed, 137 insertions(+), 76 deletions(-)
>
Applied to jammy:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240626/a9034535/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240626/a9034535/attachment-0001.sig>
More information about the kernel-team
mailing list