From patchwork Wed Oct 20 16:55:50 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1543973 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=iy1cD6pA; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HZGw20SQkz9sNH for ; Thu, 21 Oct 2021 03:56:02 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1mdEse-0007y7-3Q; Wed, 20 Oct 2021 16:55:56 +0000 Received: from smtp-relay-canonical-0.internal ([10.131.114.83] helo=smtp-relay-canonical-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1mdEsb-0007xp-DP for kernel-team@lists.ubuntu.com; Wed, 20 Oct 2021 16:55:53 +0000 Received: from ascalon (unknown [192.188.8.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-0.canonical.com (Postfix) with ESMTPSA id 1A8A53FFE6 for ; Wed, 20 Oct 2021 16:55:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1634748953; bh=556oOSwdfmD3ejgQpjwazaRHd8v5F7pnBHQqp3VmVxw=; h=From:To:Subject:Date:Message-Id; b=iy1cD6pANgITB1a3ntlZ+hbUQagWrqzAkVTfcPMuRKDI5wfML0zTOpSRbHRtJDtuU QrtGQ5XA2eSiJuxIu7yRFlxqRw5QVB6GsLflWrBKrnf7Uk49bx9HT3y7fngSXaOm/u EttBo83Y8q4Fzq58HlvkYmG0ZHnaNl+tHXNrYoiU8azWua2BCwqw9n3HaYuDOKSQXZ 5dsO4faOxhOeXXZri7FD+GTaJeeLlzGLR0UkgdXf0Zd41sgIZTvdtYH4yriaGvTTi7 i3Kn9EdCULUlwzvdLpBnz+9m3mKpW4VzznBmdwZT3mVGXCkSKm3Iog4wvp7SHMHog5 u3fcgtSrzWeFQ== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1mdEsZ-0004Z6-Fl for kernel-team@lists.ubuntu.com; Wed, 20 Oct 2021 09:55:51 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.151 upstream stable release Date: Wed, 20 Oct 2021 09:55:50 -0700 Message-Id: <20211020165550.16349-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (54 commits) includes the following Focal stable patchsets: Focal update: v5.4.151 upstream stable release https://bugs.launchpad.net/bugs/1947888 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit f9c988d1e900000180da2a3a6679fb157e748a83: UBUNTU: upstream stable to v5.4.150 (2021-10-20 09:17:13 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git focal-stable-v5.4.151 for you to fetch changes up to 9d328870ade5736634989933bc8b37aa5b7537ea: UBUNTU: upstream stable to v5.4.151 (2021-10-20 09:21:41 -0700) ---------------------------------------------------------------- Andrea Claudi (1): ipvs: check that ip_vs_conn_tab_bits is between 8 and 20 Andrej Shadura (1): HID: u2fzero: ignore incomplete packets without data Anirudh Rayabharam (1): HID: usbhid: free raw_report buffers in usbhid_stop Charlene Liu (1): drm/amd/display: Pass PCI deviceid into DC Chen Jingwen (1): elf: don't use MAP_FIXED_NOREPLACE for elf interpreter mappings Chih-Kang Chang (1): mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug Dan Carpenter (1): crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() Dongliang Mu (2): usb: hso: fix error handling code of hso_create_net_device usb: hso: remove the bailout parameter Eric Biggers (1): fs-verity: fix signed integer overflow with i_size near S64_MAX Eric Dumazet (2): af_unix: fix races in sk_peer_pid and sk_peer_cred accesses net: udp: annotate data race around udp_sk(sk)->corkflag F.A.Sulaiman (1): HID: betop: fix slab-out-of-bounds Write in betop_probe Greg Kroah-Hartman (1): Linux 5.4.151 Igor Matheus Andrade Torrente (1): tty: Fix out-of-bound vmalloc access in imageblit Jacob Keller (2): e100: fix length calculation in e100_get_regs_len e100: fix buffer overrun in e100_get_regs James Morse (1): cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory Jeffle Xu (1): ext4: fix reserved space counter leakage Jian Shen (1): net: hns3: do not allow call hns3_nic_net_open repeatedly Jiri Benc (1): selftests, bpf: test_lwt_ip_encap: Really disable rp_filter Johan Hovold (5): ipack: ipoctal: fix stack information leak ipack: ipoctal: fix tty registration race ipack: ipoctal: fix tty-registration error handling ipack: ipoctal: fix missing allocation-failure check ipack: ipoctal: fix module reference leak Johannes Berg (3): mac80211: fix use-after-free in CCMP/GCMP RX mac80211: mesh: fix potentially unaligned access mac80211-hwsim: fix late beacon hrtimer handling Jonathan Hsu (1): scsi: ufs: Fix illegal offset in UPIU event trace Jozsef Kadlecsik (1): netfilter: ipset: Fix oversized kvmalloc() calls Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.151 Kan Liang (1): perf/x86/intel: Update event constraints for ICX Kevin Hao (1): cpufreq: schedutil: Use kobject release() method to free sugov_tunables Leon Yu (1): net: stmmac: don't attach interface until resume finishes Lorenzo Bianconi (1): mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap Nadezda Lutovinova (3): hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field Nirmoy Das (1): debugfs: debugfs_create_file_size(): use IS_ERR to check for error Oliver Neukum (1): hso: fix bailout in error case of probe Paul Fertser (2): hwmon: (tmp421) report /PVLD condition as fault hwmon: (tmp421) fix rounding for negative values Pawel Laszczak (1): usb: cdns3: fix race condition before setting doorbell Rahul Lakkireddy (1): scsi: csiostor: Add module softdep on cxgb4 Ritesh Harjani (1): ext4: fix loff_t overflow in ext4_max_bitmap_size() Rob Herring (1): PCI: Fix pci_host_bridge struct device release/free handling Vadim Pasternak (1): hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs Vlad Buslov (1): net: sched: flower: protect fl_walk() with rcu Xiao Liang (1): net: ipv4: Fix rtnexthop len when RTA_FLOW is present Xin Long (1): sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb Zelin Deng (1): x86/kvmclock: Move this_cpu_pvti into kvmclock.h sumiyawang (1): libnvdimm/pmem: Fix crash triggered when I/O in-flight during unbind yangerkun (1): ext4: fix potential infinite loop in ext4_dx_readdir() Makefile | 2 +- arch/x86/events/intel/core.c | 1 + arch/x86/include/asm/kvmclock.h | 14 +++++ arch/x86/kernel/kvmclock.c | 13 +---- debian.master/upstream-stable | 2 +- drivers/cpufreq/cpufreq_governor_attr_set.c | 2 +- drivers/crypto/ccp/ccp-ops.c | 14 ++--- drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c | 1 + drivers/hid/hid-betopff.c | 13 +++-- drivers/hid/hid-u2fzero.c | 4 +- drivers/hid/usbhid/hid-core.c | 13 ++++- drivers/hwmon/mlxreg-fan.c | 12 +++-- drivers/hwmon/tmp421.c | 33 ++++-------- drivers/hwmon/w83791d.c | 29 ++++------- drivers/hwmon/w83792d.c | 28 ++++------ drivers/hwmon/w83793.c | 26 ++++------ drivers/ipack/devices/ipoctal.c | 63 +++++++++++++++++------ drivers/net/ethernet/hisilicon/hns3/hns3_enet.c | 5 ++ drivers/net/ethernet/intel/e100.c | 22 +++++--- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 4 +- drivers/net/usb/hso.c | 33 ++++++++---- drivers/net/wireless/mac80211_hwsim.c | 4 +- drivers/nvdimm/pmem.c | 4 +- drivers/pci/probe.c | 36 +++++++------ drivers/pci/remove.c | 2 +- drivers/scsi/csiostor/csio_init.c | 1 + drivers/scsi/ufs/ufshcd.c | 3 +- drivers/tty/vt/vt.c | 21 +++++++- drivers/usb/cdns3/gadget.c | 14 +++++ fs/binfmt_elf.c | 2 +- fs/debugfs/inode.c | 2 +- fs/ext4/dir.c | 6 +-- fs/ext4/inode.c | 5 ++ fs/ext4/super.c | 16 ++++-- fs/verity/enable.c | 2 +- fs/verity/open.c | 2 +- include/net/ip_fib.h | 2 +- include/net/nexthop.h | 2 +- include/net/sock.h | 2 + kernel/sched/cpufreq_schedutil.c | 16 ++++-- net/core/sock.c | 32 +++++++++--- net/ipv4/fib_semantics.c | 16 +++--- net/ipv4/udp.c | 10 ++-- net/ipv6/route.c | 5 +- net/ipv6/udp.c | 2 +- net/mac80211/mesh_ps.c | 3 +- net/mac80211/tx.c | 12 +++++ net/mac80211/wpa.c | 6 +++ net/netfilter/ipset/ip_set_hash_gen.h | 4 +- net/netfilter/ipvs/ip_vs_conn.c | 4 ++ net/sched/cls_flower.c | 6 +++ net/sctp/input.c | 2 +- net/unix/af_unix.c | 34 +++++++++--- tools/testing/selftests/bpf/test_lwt_ip_encap.sh | 13 +++-- 54 files changed, 409 insertions(+), 216 deletions(-)