From patchwork Thu Dec 2 19:27:04 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1562971 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=Lta7OLri; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4J4mDg6F96z9s5P for ; Fri, 3 Dec 2021 06:27:15 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1msrja-00056y-7g; Thu, 02 Dec 2021 19:27:10 +0000 Received: from smtp-relay-canonical-0.internal ([10.131.114.83] helo=smtp-relay-canonical-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1msrjY-00055M-5a for kernel-team@lists.ubuntu.com; Thu, 02 Dec 2021 19:27:08 +0000 Received: from ascalon (unknown [192.188.8.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp-relay-canonical-0.canonical.com (Postfix) with ESMTPSA id EFBD840079 for ; Thu, 2 Dec 2021 19:27:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1638473227; bh=lIRtHhejIuE/m4+HiYTsz4mmb+TOnnpPAQUuHQAtTdM=; h=From:To:Subject:Date:Message-Id; b=Lta7OLri36n8CdRV6MKzk3pkloEZzFNhJLc3xgGoyhljnAOz64MkOAymwptBTRDei tjt1shtRGt49rS0Yr28Gqc/FJTz6Zvqk2asLXY3addbrFNMfm0cH3hxiQyR/DnZDWe ytPExxfIMcdJJWgVLZO0FDi4d+wVBaTZb6DYGD2n1ydJFPJso+JZiTFXduXGxetSJu PSKo3DJ9UujgLXswvIJvufPXWnJvtpoMUNiSfaV1wzlYj7fEc3CYzQCNUc16HLGmzo q7dh4Oamv7uq7oKqpiHbHJBQisZAaGzZ4GPH6UdMZEfdVfoxIukVQyrml2nSEvLAo+ HuKHn/pTHwEWQ== Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1msrjW-0007L4-FE for kernel-team@lists.ubuntu.com; Thu, 02 Dec 2021 11:27:06 -0800 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.159 upstream stable release Date: Thu, 2 Dec 2021 11:27:04 -0800 Message-Id: <20211202192704.28078-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (19 commits) includes the following Focal stable patchsets: Focal update: v5.4.159 upstream stable release https://bugs.launchpad.net/bugs/1953071 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit 314b88cf6b5df087b35ee5d0c0c781ebbd6010b9: UBUNTU: upstream stable to v5.4.158 (2021-12-02 08:30:00 -0800) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.159 for you to fetch changes up to ee1ca204cb1a205c7580ecf2ed6dab18b62e152a: UBUNTU: upstream stable to v5.4.159 (2021-12-02 10:56:47 -0800) ---------------------------------------------------------------- Geert Uytterhoeven (1): usb: gadget: Mark USB_FSL_QE broken on 64-bit Greg Kroah-Hartman (1): Linux 5.4.159 Gustavo A. R. Silva (1): media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init James Buren (1): usb-storage: Add compatibility quirk flags for iODD 2531/2541 Jan Kara (1): isofs: Fix out of bound access for corrupted isofs image Johan Hovold (8): comedi: dt9812: fix DMA buffers on stack comedi: ni_usb6501: fix NULL-deref in command paths comedi: vmk80xx: fix transfer-buffer overflows comedi: vmk80xx: fix bulk-buffer overflow comedi: vmk80xx: fix bulk and interrupt message timeouts staging: r8712u: fix control-message timeout staging: rtl8192u: fix control-message timeouts rsi: fix control-message timeout Juergen Gross (1): Revert "x86/kvm: fix vcpu-id indexed array sizes" Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.159 Neal Liu (1): usb: ehci: handshake CMD_RUN instead of STS_HALT Petr Mladek (1): printk/console: Allow to disable console output by using console="" or console=null Todd Kjos (1): binder: don't detect sender/target during buffer cleanup Viraj Shah (1): usb: musb: Balance list entry in musb_gadget_queue Makefile | 2 +- arch/x86/kvm/ioapic.c | 2 +- arch/x86/kvm/ioapic.h | 4 +- debian.master/upstream-stable | 2 +- drivers/android/binder.c | 14 ++-- drivers/net/wireless/rsi/rsi_91x_usb.c | 2 +- drivers/staging/comedi/drivers/dt9812.c | 115 +++++++++++++++++++++------- drivers/staging/comedi/drivers/ni_usb6501.c | 10 +++ drivers/staging/comedi/drivers/vmk80xx.c | 28 +++---- drivers/staging/media/ipu3/ipu3-css-fw.c | 7 +- drivers/staging/media/ipu3/ipu3-css-fw.h | 2 +- drivers/staging/rtl8192u/r8192U_core.c | 18 ++--- drivers/staging/rtl8712/usb_ops_linux.c | 2 +- drivers/usb/gadget/udc/Kconfig | 1 + drivers/usb/host/ehci-hcd.c | 11 ++- drivers/usb/host/ehci-platform.c | 6 ++ drivers/usb/host/ehci.h | 1 + drivers/usb/musb/musb_gadget.c | 4 +- drivers/usb/storage/unusual_devs.h | 10 +++ fs/isofs/inode.c | 2 + kernel/printk/printk.c | 9 ++- 21 files changed, 179 insertions(+), 73 deletions(-)