linux-yocto/5.4: update to v5.4.156
Updating linux-yocto/5.4 to the latest korg -stable release that comprises the following commits: 89b6869b942b Linux 5.4.156 7cdcaa7c765b pinctrl: stm32: use valid pin identifier in stm32_pinctrl_resume() a9c4e246f7c3 ARM: 9122/1: select HAVE_FUTEX_CMPXCHG a98c81ab1751 tracing: Have all levels of checks prevent recursion b0feaa8376f5 net: mdiobus: Fix memory leak in __mdiobus_register 0ab35e707462 scsi: core: Fix shost->cmd_per_lun calculation in scsi_add_host_with_dma() 9068beaa049a Input: snvs_pwrkey - add clk handling 8de335e8199f ALSA: hda: avoid write to STATESTS if controller is in reset 570bc60dcd00 platform/x86: intel_scu_ipc: Update timeout value in comment 4054b869dc26 isdn: mISDN: Fix sleeping function called from invalid context 5001160d3ed5 ARM: dts: spear3xx: Fix gmac node e9d9ffa19367 net: stmmac: add support for dwmac 3.40a 044fa2afd676 btrfs: deal with errors when checking if a dir entry exists during log replay d49a293b946d gcc-plugins/structleak: add makefile var for disabling structleak e8ef9984418f selftests: netfilter: remove stray bash debug line b7fdebde2c9b netfilter: Kconfig: use 'default y' instead of 'm' for bool config option 285e9210b1fa isdn: cpai: check ctr->cnr to avoid array index out of bound 1f75f8883b4f nfc: nci: fix the UAF of rf_conn_info object 4f5d1c29cfab mm, slub: fix potential memoryleak in kmem_cache_open() a1ec195a1943 mm, slub: fix mismatch between reconstructed freelist depth and cnt 8e25a62e8dab powerpc/idle: Don't corrupt back chain when going idle d0148cfaf89c KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest 80bbb0bc3a02 KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() 722e6f6ac818 powerpc64/idle: Fix SP offsets when saving GPRs d6f451f1f60c audit: fix possible null-pointer dereference in audit_filter_rules c974f2f92c31 ASoC: DAPM: Fix missing kctl change notifications 5307a77b7149 ALSA: hda/realtek: Add quirk for Clevo PC50HS 50fc52e5ca59 ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset 0f218ba4c8aa vfs: check fd has read access in kernel_read_file_from_fd() f439d2bcb679 elfcore: correct reference to CONFIG_UML d3a83576378b ocfs2: mount fails with buffer overflow in strlen b05caf023b14 ocfs2: fix data corruption after conversion from inline format bce53fbee948 ceph: fix handling of "meta" errors 151c72bba129 can: j1939: j1939_xtp_rx_rts_session_new(): abort TP less than 9 bytes 0ddf781882ac can: j1939: j1939_xtp_rx_dat_one(): cancel session if receive TP.DT with error length a0e47d2833b4 can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv 7e66cfed66f9 can: j1939: j1939_tp_rxtimer(): fix errant alert in j1939_tp_rxtimer 1248582e47a9 can: peak_pci: peak_pci_remove(): fix UAF ea82c2463e22 can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification c26dcd1cb8db can: rcar_can: fix suspend/resume 8c5585eae3ae net: enetc: fix ethtool counter name for PM0_TERR c0b0baade9b8 net: stmmac: Fix E2E delay mechanism c4b64011e458 net: hns3: disable sriov before unload hclge layer 472acf1582fd net: hns3: add limit ets dwrr bandwidth cannot be 0 b1f9380ee230 net: hns3: reset DWRR of unused tc to zero 12bdcbc04341 NIOS2: irqflags: rename a redefined register name 599766696f69 net: dsa: lantiq_gswip: fix register definition f49ce82f9b7c lan78xx: select CRC32 83094f8c44cb netfilter: ipvs: make global sysctl readonly in non-init netns ce70ee94dde6 ASoC: wm8960: Fix clock configuration on slave mode 0f5b08ca22e1 dma-debug: fix sg checks in debug_dma_map_sg() 50aefa9acc91 NFSD: Keep existing listeners on portlist error 4a5bf3e729d9 xtensa: xtfpga: Try software restart before simulating CPU reset 31137288b946 xtensa: xtfpga: use CONFIG_USE_OF instead of CONFIG_OF d946a39bad58 ARM: dts: at91: sama5d2_som1_ek: disable ISC node by default e7c4819c0b67 tee: optee: Fix missing devices unregister during optee_remove b1e9b4e0f656 net: switchdev: do not propagate bridge updates across bridges 2d22cd048289 parisc: math-emu: Fix fall-through warnings Signed-off-by:Bruce Ashfield <bruce.ashfield@gmail.com> Signed-off-by:
Steve Sakoman <steve@sakoman.com>
Loading
Please register or sign in to comment