[PATCH 5.4 00/39] 5.4.82-rc1 review

From: Greg Kroah-Hartman
Date: Sun Dec 06 2020 - 06:43:33 EST


This is the start of the stable review cycle for the 5.4.82 release.
There are 39 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.

Responses should be made by Tue, 08 Dec 2020 11:15:42 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.82-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Linux 5.4.82-rc1

Shiraz Saleem <shiraz.saleem@xxxxxxxxx>
RDMA/i40iw: Address an mmap handler exploit in i40iw

Vasily Averin <vvs@xxxxxxxxxxxxx>
tracing: Remove WARN_ON in start_thread()

Po-Hsu Lin <po-hsu.lin@xxxxxxxxxxxxx>
Input: i8042 - add ByteSpeed touchpad to noloop table

Sanjay Govind <sanjay.govind9@xxxxxxxxx>
Input: xpad - support Ardwiino Controllers

Hector Martin <marcan@xxxxxxxxx>
ALSA: usb-audio: US16x08: fix value count for level meters

Eran Ben Elisha <eranbe@xxxxxxxxxx>
net/mlx5: Fix wrong address reclaim when command interface is down

Yevgeny Kliteynik <kliteyn@xxxxxxxxxx>
net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering

Davide Caratti <dcaratti@xxxxxxxxxx>
net/sched: act_mpls: ensure LSE is pullable before reading it

Davide Caratti <dcaratti@xxxxxxxxxx>
net: openvswitch: ensure LSE is pullable before reading it

Davide Caratti <dcaratti@xxxxxxxxxx>
net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl

Wang Hai <wanghai38@xxxxxxxxxx>
net: mvpp2: Fix error return code in mvpp2_open()

Dan Carpenter <dan.carpenter@xxxxxxxxxx>
chelsio/chtls: fix a double free in chtls_setkey()

Zhang Changzhong <zhangchangzhong@xxxxxxxxxx>
vxlan: fix error return code in __vxlan_dev_create()

Zhang Changzhong <zhangchangzhong@xxxxxxxxxx>
net: pasemi: fix error return code in pasemi_mac_open()

Zhang Changzhong <zhangchangzhong@xxxxxxxxxx>
cxgb3: fix error return code in t3_sge_alloc_qset()

Dan Carpenter <dan.carpenter@xxxxxxxxxx>
net/x25: prevent a couple of overflows

Antoine Tenart <atenart@xxxxxxxxxx>
net: ip6_gre: set dev->hard_header_len when using header_ops

Eric Dumazet <edumazet@xxxxxxxxxx>
geneve: pull IP header before ECN decapsulation

Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
inet_ecn: Fix endianness of checksum update when setting ECT(1)

Thomas Falcon <tlfalcon@xxxxxxxxxxxxx>
ibmvnic: Fix TX completion error handling

Thomas Falcon <tlfalcon@xxxxxxxxxxxxx>
ibmvnic: Ensure that SCRQ entry reads are correctly ordered

Vinay Kumar Yadav <vinay.yadav@xxxxxxxxxxx>
chelsio/chtls: fix panic during unload reload chtls

Krzysztof Kozlowski <krzk@xxxxxxxxxx>
dt-bindings: net: correct interrupt flags in examples

Guillaume Nault <gnault@xxxxxxxxxx>
ipv4: Fix tos mask in inet_rtm_getroute()

Antoine Tenart <atenart@xxxxxxxxxx>
netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal

Vincent Guittot <vincent.guittot@xxxxxxxxxx>
sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list

Maurizio Drocco <maurizio.drocco@xxxxxxx>
ima: extend boot_aggregate with kernel measurements

Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
staging/octeon: fix up merge error

Jamie Iles <jamie@xxxxxxxxxxxx>
bonding: wait for sysfs kobject destruction before freeing struct slave

Yves-Alexis Perez <corsac@xxxxxxxxxx>
usbnet: ipheth: fix connectivity with iOS 14

Jens Axboe <axboe@xxxxxxxxx>
tun: honor IOCB_NOWAIT flag

Alexander Duyck <alexanderduyck@xxxxxx>
tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control

Willem de Bruijn <willemb@xxxxxxxxxx>
sock: set sk_err to ee_errno on dequeue from errq

Anmol Karn <anmol.karan123@xxxxxxxxx>
rose: Fix Null pointer dereference in rose_send_frame()

Maxim Mikityanskiy <maximmi@xxxxxxxxxxxx>
net/tls: Protect from calling tls_dev_del for TLS RX twice

Vadim Fedorenko <vfedorenko@xxxxxxxx>
net/tls: missing received data after fast remote close

Julian Wiedmann <jwi@xxxxxxxxxxxxx>
net/af_iucv: set correct sk_protocol for child sockets

Wang Hai <wanghai38@xxxxxxxxxx>
ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init

Parav Pandit <parav@xxxxxxxxxx>
devlink: Hold rtnl lock while reading netdev attributes


-------------

Diffstat:

.../devicetree/bindings/net/can/tcan4x5x.txt | 2 +-
.../devicetree/bindings/net/nfc/nxp-nci.txt | 2 +-
.../devicetree/bindings/net/nfc/pn544.txt | 2 +-
Makefile | 4 +-
drivers/crypto/chelsio/chtls/chtls_cm.c | 1 +
drivers/crypto/chelsio/chtls/chtls_hw.c | 1 +
drivers/infiniband/hw/i40iw/i40iw_main.c | 5 --
drivers/infiniband/hw/i40iw/i40iw_verbs.c | 36 +++----------
drivers/input/joystick/xpad.c | 2 +
drivers/input/serio/i8042-x86ia64io.h | 4 ++
drivers/net/bonding/bond_main.c | 61 +++++++++++++++-------
drivers/net/bonding/bond_sysfs_slave.c | 18 +------
drivers/net/ethernet/chelsio/cxgb3/sge.c | 1 +
drivers/net/ethernet/ibm/ibmvnic.c | 22 ++++++--
drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c | 1 +
.../net/ethernet/mellanox/mlx5/core/pagealloc.c | 21 +++++++-
.../ethernet/mellanox/mlx5/core/steering/dr_cmd.c | 1 +
.../mellanox/mlx5/core/steering/dr_domain.c | 5 ++
.../mellanox/mlx5/core/steering/dr_types.h | 1 +
drivers/net/ethernet/pasemi/pasemi_mac.c | 8 ++-
drivers/net/geneve.c | 20 +++++--
drivers/net/tun.c | 14 +++--
drivers/net/usb/ipheth.c | 2 +-
drivers/net/vxlan.c | 4 +-
drivers/staging/octeon/ethernet-tx.c | 2 +-
include/linux/mlx5/mlx5_ifc.h | 9 +++-
include/net/bonding.h | 8 +++
include/net/inet_ecn.h | 2 +-
include/net/tls.h | 6 +++
kernel/sched/fair.c | 36 ++++++++++---
kernel/trace/trace_hwlat.c | 2 +-
net/bridge/br_netfilter_hooks.c | 7 ++-
net/core/devlink.c | 4 ++
net/core/skbuff.c | 5 +-
net/ipv4/route.c | 7 +--
net/ipv4/tcp_cong.c | 5 ++
net/ipv6/addrlabel.c | 26 +++++----
net/ipv6/ip6_gre.c | 16 ++++--
net/iucv/af_iucv.c | 4 +-
net/openvswitch/actions.c | 3 ++
net/rose/rose_loopback.c | 17 ++++--
net/sched/act_mpls.c | 3 ++
net/tls/tls_device.c | 5 +-
net/tls/tls_sw.c | 6 +++
net/x25/af_x25.c | 6 ++-
security/integrity/ima/ima.h | 2 +-
security/integrity/ima/ima_crypto.c | 15 +++++-
sound/usb/mixer_us16x08.c | 2 +-
48 files changed, 304 insertions(+), 132 deletions(-)