[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241115063722.599985562@linuxfoundation.org>
Date: Fri, 15 Nov 2024 07:38:10 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: stable@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
patches@...ts.linux.dev,
linux-kernel@...r.kernel.org,
torvalds@...ux-foundation.org,
akpm@...ux-foundation.org,
linux@...ck-us.net,
shuah@...nel.org,
patches@...nelci.org,
lkft-triage@...ts.linaro.org,
pavel@...x.de,
jonathanh@...dia.com,
f.fainelli@...il.com,
sudipm.mukherjee@...il.com,
srw@...dewatkins.net,
rwarsow@....de,
conor@...nel.org,
hargar@...rosoft.com,
broonie@...nel.org
Subject: [PATCH 6.1 00/39] 6.1.118-rc1 review
This is the start of the stable review cycle for the 6.1.118 release.
There are 39 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sun, 17 Nov 2024 06:37:07 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1.118-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.1.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Linux 6.1.118-rc1
Linus Torvalds <torvalds@...ux-foundation.org>
9p: fix slab cache name creation for real
Konstantin Komarov <almaz.alexandrovich@...agon-software.com>
fs/ntfs3: Fix general protection fault in run_is_mapped_full
Hans de Goede <hdegoede@...hat.com>
platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors
Qun-Wei Lin <qun-wei.lin@...iatek.com>
mm: krealloc: Fix MTE false alarm in __do_krealloc
Luiz Augusto von Dentz <luiz.von.dentz@...el.com>
Bluetooth: L2CAP: Fix uaf in l2cap_connect
Xiaxi Shen <shenxiaxi26@...il.com>
ext4: fix timer use-after-free on failed mount
Philip Yang <Philip.Yang@....com>
drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
Qiao Ma <mqaio@...ux.alibaba.com>
uprobe: avoid out-of-bounds memory access of fetching args
Andrii Nakryiko <andrii@...nel.org>
uprobes: encapsulate preparation of uprobe args buffer
Hagar Hemdan <hagarhem@...zon.com>
io_uring: fix possible deadlock in io_register_iowq_max_workers()
Li Nan <linan122@...wei.com>
md/raid10: improve code of mrdev in raid10_sync_request
Reinhard Speyerer <rspmn@...or.de>
net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition
Yanteng Si <siyanteng@...oftware.com.cn>
LoongArch: Use "Exception return address" to comment ERA
Hans de Goede <hdegoede@...hat.com>
HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard
Kenneth Albanowski <kenalba@...omium.org>
HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
Alessandro Zanni <alessandro.zanni87@...il.com>
fs: Fix uninitialized value issue in from_kuid and from_kgid
Jiawei Ye <jiawei.ye@...mail.com>
bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6
Yuan Can <yuancan@...wei.com>
vDPA/ifcvf: Fix pci_read_config_byte() return code handling
Nilay Shroff <nilay@...ux.ibm.com>
nvme: make keep-alive synchronous operation
Michael Ellerman <mpe@...erman.id.au>
powerpc/powernv: Free name on error in opal_event_init()
Keith Busch <kbusch@...nel.org>
nvme-multipath: defer partition scanning
Will Deacon <will@...nel.org>
kasan: Disable Software Tag-Based KASAN with GCC
Ian Forbes <ian.forbes@...adcom.com>
drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS
Julian Vetter <jvetter@...rayinc.com>
sound: Make CONFIG_SND depend on INDIRECT_IOMEM instead of UML
Herbert Xu <herbert@...dor.apana.org.au>
crypto: marvell/cesa - Disable hash algorithms
Herbert Xu <herbert@...dor.apana.org.au>
crypto: api - Fix liveliness check in crypto_alg_tested
Rik van Riel <riel@...riel.com>
bpf: use kvzmalloc to allocate BPF verifier environment
Greg Joyce <gjoyce@...ux.ibm.com>
nvme: disable CC.CRIME (NVME_CC_CRIME)
WangYuli <wangyuli@...ontech.com>
HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad
Stefan Blum <stefanblum2004@...il.com>
HID: multitouch: Add support for B2402FVA track point
SurajSonawane2415 <surajsonawane0215@...il.com>
block: Fix elevator_get_default() checking for NULL q->tag_set
Hannes Reinecke <hare@...e.de>
nvme: tcp: avoid race between queue_lock lock and destroy
Sergey Matsievskiy <matsievskiysv@...il.com>
irqchip/ocelot: Fix trigger register address
Pedro Falcato <pedro.falcato@...il.com>
9p: Avoid creating multiple slab caches with the same name
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Revert "Bluetooth: hci_conn: Consolidate code for aborting connections"
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Revert "Bluetooth: hci_core: Fix possible buffer overflow"
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Revert "Bluetooth: af_bluetooth: Fix deadlock"
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Revert "Bluetooth: hci_sync: Fix overwriting request callback"
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Revert "Bluetooth: fix use-after-free in accessing skb after sending it"
-------------
Diffstat:
Makefile | 4 +-
arch/loongarch/include/asm/loongarch.h | 2 +-
arch/powerpc/platforms/powernv/opal-irqchip.c | 1 +
block/elevator.c | 4 +-
crypto/algapi.c | 2 +-
drivers/crypto/marvell/cesa/hash.c | 12 +-
drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.c | 14 +-
drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.h | 2 +-
drivers/gpu/drm/amd/amdkfd/kfd_chardev.c | 2 +-
drivers/gpu/drm/amd/amdkfd/kfd_device.c | 4 +-
.../gpu/drm/amd/amdkfd/kfd_device_queue_manager.c | 2 +-
drivers/gpu/drm/amd/amdkfd/kfd_mqd_manager.c | 2 +-
drivers/gpu/drm/amd/amdkfd/kfd_process.c | 2 +-
.../gpu/drm/amd/amdkfd/kfd_process_queue_manager.c | 4 +-
drivers/gpu/drm/vmwgfx/vmwgfx_drv.h | 4 +-
drivers/gpu/drm/vmwgfx/vmwgfx_kms.c | 4 +-
drivers/gpu/drm/vmwgfx/vmwgfx_kms.h | 3 -
drivers/hid/hid-ids.h | 1 +
drivers/hid/hid-lenovo.c | 8 ++
drivers/hid/hid-multitouch.c | 13 ++
drivers/irqchip/irq-mscc-ocelot.c | 4 +-
drivers/md/raid10.c | 23 +--
drivers/net/usb/qmi_wwan.c | 1 +
drivers/nvme/host/core.c | 31 ++--
drivers/nvme/host/multipath.c | 33 +++++
drivers/nvme/host/nvme.h | 1 +
drivers/nvme/host/tcp.c | 7 +-
drivers/platform/x86/x86-android-tablets.c | 3 +-
drivers/vdpa/ifcvf/ifcvf_base.c | 2 +-
fs/ext4/super.c | 2 +-
fs/ntfs3/inode.c | 9 ++
fs/ocfs2/file.c | 9 +-
include/net/bluetooth/hci_core.h | 3 +-
io_uring/io_uring.c | 5 +
kernel/bpf/verifier.c | 4 +-
kernel/trace/trace_uprobe.c | 86 +++++------
lib/Kconfig.kasan | 7 +-
mm/slab_common.c | 2 +-
net/9p/client.c | 12 +-
net/bluetooth/af_bluetooth.c | 10 +-
net/bluetooth/hci_conn.c | 158 ++++++++++++++++-----
net/bluetooth/hci_core.c | 50 +++----
net/bluetooth/hci_event.c | 20 +--
net/bluetooth/hci_sync.c | 44 ++----
net/bluetooth/l2cap_core.c | 9 --
net/bluetooth/mgmt.c | 15 +-
net/core/filter.c | 2 +-
sound/Kconfig | 2 +-
48 files changed, 401 insertions(+), 243 deletions(-)
Powered by blists - more mailing lists