From patchwork Mon Jun 28 16:32:15 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1498059 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4GDCnS1kHLz9sVm; Tue, 29 Jun 2021 02:32:28 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1lxuBN-00038Q-68; Mon, 28 Jun 2021 16:32:25 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1lxuBL-00038F-Cu for kernel-team@lists.ubuntu.com; Mon, 28 Jun 2021 16:32:23 +0000 Received: from 3.general.kamal.us.vpn ([10.172.68.53] helo=ascalon) by youngberry.canonical.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from ) id 1lxuBL-0004cl-4m for kernel-team@lists.ubuntu.com; Mon, 28 Jun 2021 16:32:23 +0000 Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1lxuBH-0000DQ-K2 for kernel-team@lists.ubuntu.com; Mon, 28 Jun 2021 09:32:19 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.127 upstream stable release Date: Mon, 28 Jun 2021 09:32:15 -0700 Message-Id: <20210628163215.558-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (29 commits) includes the following Focal stable patchsets: Focal update: v5.4.127 upstream stable release https://bugs.launchpad.net/bugs/1933851 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit 531b44b728f322eea5148593b3d3b838ad18ecde: UBUNTU: upstream stable to v5.4.126 (2021-06-23 09:23:04 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.127 for you to fetch changes up to 2c33eeec71931f7a4479fadf3247f916f008f0c3: UBUNTU: upstream stable to v5.4.127 (2021-06-28 08:10:33 -0700) ---------------------------------------------------------------- Ahelenia ZiemiaƄska (1): HID: multitouch: set Stylus suffix for Stylus-application devices, too Andreas Gruenbacher (1): gfs2: Prevent direct-I/O write fallback errors from getting lost Anirudh Rayabharam (1): HID: usbhid: fix info leak in hid_submit_ctrl Bindu Ramamurthy (1): drm/amd/display: Allow bandwidth validation for 0 streams. Bixuan Cui (1): HID: gt683r: add missing MODULE_DEVICE_TABLE Dan Robertson (1): net: ieee802154: fix null deref in parse dev addr Daniel Wagner (1): scsi: qedf: Do not put host in qedf_vport_create() unconditionally Dmitry Torokhov (1): HID: hid-input: add mapping for emoji picker key Ewan D. Milne (1): scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V Greg Kroah-Hartman (1): Linux 5.4.127 Hannes Reinecke (3): nvme-loop: reset queue count to 1 in nvme_loop_destroy_io_queues() nvme-loop: clear NVME_LOOP_Q_LIVE when nvme_loop_configure_admin_queue() fails nvme-loop: check for NVME_LOOP_Q_LIVE in nvme_loop_destroy_admin_queue() Hillf Danton (1): gfs2: Fix use-after-free in gfs2_glock_shrink_scan Jiapeng Chong (2): ethernet: myri10ge: Fix missing error code in myri10ge_probe() rtnetlink: Fix missing error code in rtnl_bridge_notify() Josh Triplett (1): net: ipconfig: Don't override command-line hostnames or domains Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.127 Khem Raj (1): riscv: Use -mno-relax when using lld linker Mark Bolhuis (1): HID: Add BUS_VIRTUAL to hid_connect logging Maurizio Lombardi (1): scsi: target: core: Fix warning on realtime kernels Nirenjan Krishnan (1): HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 Pavel Machek (CIP) (1): drm/tegra: sor: Do not leak runtime PM reference Saeed Mirzamohammadi (1): HID: quirks: Add quirk for Lenovo optical mouse Srinivas Pandruvada (1): HID: hid-sensor-hub: Return error for hid_set_field() failure Yongqiang Liu (1): ARM: OMAP2+: Fix build warning when mmc_omap is not built Zheng Yongjun (3): net/x25: Return the correct errno code net: Return the correct errno code fib: Return the correct errno code Makefile | 2 +- arch/arm/mach-omap2/board-n8x0.c | 2 +- arch/riscv/Makefile | 9 +++++++++ debian.master/upstream-stable | 2 +- .../gpu/drm/amd/display/dc/dcn20/dcn20_resource.c | 2 +- drivers/gpu/drm/tegra/sor.c | 14 ++++++++++---- drivers/hid/hid-core.c | 3 +++ drivers/hid/hid-debug.c | 1 + drivers/hid/hid-gt683r.c | 1 + drivers/hid/hid-ids.h | 2 ++ drivers/hid/hid-input.c | 3 +++ drivers/hid/hid-multitouch.c | 8 ++++---- drivers/hid/hid-quirks.c | 2 ++ drivers/hid/hid-sensor-hub.c | 13 +++++++++---- drivers/hid/usbhid/hid-core.c | 2 +- drivers/net/ethernet/myricom/myri10ge/myri10ge.c | 1 + drivers/nvme/target/loop.c | 5 ++++- drivers/scsi/qedf/qedf_main.c | 20 +++++++++----------- drivers/scsi/scsi_devinfo.c | 1 + drivers/target/target_core_transport.c | 4 +--- fs/gfs2/file.c | 5 ++++- fs/gfs2/glock.c | 2 +- include/linux/hid.h | 3 +-- include/uapi/linux/input-event-codes.h | 1 + net/compat.c | 2 +- net/core/fib_rules.c | 2 +- net/core/rtnetlink.c | 4 +++- net/ieee802154/nl802154.c | 9 +++++---- net/ipv4/ipconfig.c | 13 ++++++++----- net/x25/af_x25.c | 2 +- 30 files changed, 91 insertions(+), 49 deletions(-)