Changelog in Linux kernel 5.15.178

 
ALSA: usb-audio: Add delay quirk for USB Audio Device [+ + +]
Author: Lianqin Hu <[email protected]>
Date:   Wed Jan 15 09:32:35 2025 +0000

    ALSA: usb-audio: Add delay quirk for USB Audio Device
    
    commit ad5b205f9e022b407d91f952faddd05718be2866 upstream.
    
    Audio control requests that sets sampling frequency sometimes fail on
    this card. Adding delay between control messages eliminates that problem.
    
    usb 1-1: New USB device found, idVendor=0d8c, idProduct=0014
    usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
    usb 1-1: Product: USB Audio Device
    usb 1-1: Manufacturer: C-Media Electronics Inc.
    
    Signed-off-by: Lianqin Hu <[email protected]>
    Cc: <[email protected]>
    Signed-off-by: Takashi Iwai <[email protected]>
    Link: https://patch.msgid.link/TYUPR06MB6217E94D922B9BF422A73F32D2192@TYUPR06MB6217.apcprd06.prod.outlook.com
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
ASoC: samsung: Add missing depends on I2C [+ + +]
Author: Charles Keepax <[email protected]>
Date:   Wed Jan 8 13:48:28 2025 +0000

    ASoC: samsung: Add missing depends on I2C
    
    [ Upstream commit 704dbe97a68153a84319ad63f526e12ba868b88e ]
    
    When switching to selects for MFD_WM8994 a dependency should have also
    been added for I2C, as the dependency on MFD_WM8994 will not be
    considered by the select.
    
    Fixes: fd55c6065bec ("ASoC: samsung: Add missing selects for MFD_WM8994")
    Reported-by: kernel test robot <[email protected]>
    Closes: https://lore.kernel.org/oe-kbuild-all/[email protected]/
    Signed-off-by: Charles Keepax <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Mark Brown <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

ASoC: samsung: Add missing selects for MFD_WM8994 [+ + +]
Author: Charles Keepax <[email protected]>
Date:   Tue Jan 7 10:41:34 2025 +0000

    ASoC: samsung: Add missing selects for MFD_WM8994
    
    [ Upstream commit fd55c6065bec5268740e944a1800e6fad00974d9 ]
    
    Anything selecting SND_SOC_WM8994 should also select MFD_WM8994, as
    SND_SOC_WM8994 does not automatically do so. Add the missing selects.
    
    Reported-by: kernel test robot <[email protected]>
    Closes: https://lore.kernel.org/oe-kbuild-all/[email protected]/
    Signed-off-by: Charles Keepax <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Mark Brown <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

ASoC: wm8994: Add depends on MFD core [+ + +]
Author: Charles Keepax <[email protected]>
Date:   Mon Jan 6 15:46:39 2025 +0000

    ASoC: wm8994: Add depends on MFD core
    
    [ Upstream commit 5ed01155cea69801f1f0c908954a56a5a3474bed ]
    
    The ASoC driver should not be used without the MFD component. This was
    causing randconfig issues with regmap IRQ which is selected by the MFD
    part of the wm8994 driver.
    
    Reported-by: kernel test robot <[email protected]>
    Closes: https://lore.kernel.org/oe-kbuild-all/[email protected]/
    Signed-off-by: Charles Keepax <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Mark Brown <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>
 
Bluetooth: RFCOMM: Fix not validating setsockopt user input [+ + +]
Author: Luiz Augusto von Dentz <[email protected]>
Date:   Fri Apr 5 15:43:45 2024 -0400

    Bluetooth: RFCOMM: Fix not validating setsockopt user input
    
    commit a97de7bff13b1cc825c1b1344eaed8d6c2d3e695 upstream.
    
    syzbot reported rfcomm_sock_setsockopt_old() is copying data without
    checking user input length.
    
    BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
    include/linux/sockptr.h:49 [inline]
    BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
    include/linux/sockptr.h:55 [inline]
    BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old
    net/bluetooth/rfcomm/sock.c:632 [inline]
    BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70
    net/bluetooth/rfcomm/sock.c:673
    Read of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064
    
    Fixes: 9f2c8a03fbb3 ("Bluetooth: Replace RFCOMM link mode with security level")
    Fixes: bb23c0ab8246 ("Bluetooth: Add support for deferring RFCOMM connection setup")
    Reported-by: syzbot <[email protected]>
    Signed-off-by: Eric Dumazet <[email protected]>
    Signed-off-by: Luiz Augusto von Dentz <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>
    Signed-off-by: Keerthana K <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

Bluetooth: SCO: Fix not validating setsockopt user input [+ + +]
Author: Luiz Augusto von Dentz <[email protected]>
Date:   Fri Apr 5 15:41:52 2024 -0400

    Bluetooth: SCO: Fix not validating setsockopt user input
    
    commit 51eda36d33e43201e7a4fd35232e069b2c850b01 upstream.
    
    syzbot reported sco_sock_setsockopt() is copying data without
    checking user input length.
    
    BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
    include/linux/sockptr.h:49 [inline]
    BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
    include/linux/sockptr.h:55 [inline]
    BUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90
    net/bluetooth/sco.c:893
    Read of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578
    
    Fixes: ad10b1a48754 ("Bluetooth: Add Bluetooth socket voice option")
    Fixes: b96e9c671b05 ("Bluetooth: Add BT_DEFER_SETUP option to sco socket")
    Fixes: 00398e1d5183 ("Bluetooth: Add support for BT_PKT_STATUS CMSG data for SCO connections")
    Fixes: f6873401a608 ("Bluetooth: Allow setting of codec for HFP offload use case")
    Reported-by: syzbot <[email protected]>
    Signed-off-by: Eric Dumazet <[email protected]>
    Signed-off-by: Luiz Augusto von Dentz <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>
    Signed-off-by: Keerthana K <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
drm/v3d: Assign job pointer to NULL before signaling the fence [+ + +]
Author: Maíra Canal <[email protected]>
Date:   Wed Jan 22 22:24:03 2025 -0300

    drm/v3d: Assign job pointer to NULL before signaling the fence
    
    commit 6e64d6b3a3c39655de56682ec83e894978d23412 upstream.
    
    In commit e4b5ccd392b9 ("drm/v3d: Ensure job pointer is set to NULL
    after job completion"), we introduced a change to assign the job pointer
    to NULL after completing a job, indicating job completion.
    
    However, this approach created a race condition between the DRM
    scheduler workqueue and the IRQ execution thread. As soon as the fence is
    signaled in the IRQ execution thread, a new job starts to be executed.
    This results in a race condition where the IRQ execution thread sets the
    job pointer to NULL simultaneously as the `run_job()` function assigns
    a new job to the pointer.
    
    This race condition can lead to a NULL pointer dereference if the IRQ
    execution thread sets the job pointer to NULL after `run_job()` assigns
    it to the new job. When the new job completes and the GPU emits an
    interrupt, `v3d_irq()` is triggered, potentially causing a crash.
    
    [  466.310099] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000c0
    [  466.318928] Mem abort info:
    [  466.321723]   ESR = 0x0000000096000005
    [  466.325479]   EC = 0x25: DABT (current EL), IL = 32 bits
    [  466.330807]   SET = 0, FnV = 0
    [  466.333864]   EA = 0, S1PTW = 0
    [  466.337010]   FSC = 0x05: level 1 translation fault
    [  466.341900] Data abort info:
    [  466.344783]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
    [  466.350285]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    [  466.355350]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
    [  466.360677] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000089772000
    [  466.367140] [00000000000000c0] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
    [  466.375875] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
    [  466.382163] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device algif_hash algif_skcipher af_alg bnep binfmt_misc vc4 snd_soc_hdmi_codec drm_display_helper cec brcmfmac_wcc spidev rpivid_hevc(C) drm_client_lib brcmfmac hci_uart drm_dma_helper pisp_be btbcm brcmutil snd_soc_core aes_ce_blk v4l2_mem2mem bluetooth aes_ce_cipher snd_compress videobuf2_dma_contig ghash_ce cfg80211 gf128mul snd_pcm_dmaengine videobuf2_memops ecdh_generic sha2_ce ecc videobuf2_v4l2 snd_pcm v3d sha256_arm64 rfkill videodev snd_timer sha1_ce libaes gpu_sched snd videobuf2_common sha1_generic drm_shmem_helper mc rp1_pio drm_kms_helper raspberrypi_hwmon spi_bcm2835 gpio_keys i2c_brcmstb rp1 raspberrypi_gpiomem rp1_mailbox rp1_adc nvmem_rmem uio_pdrv_genirq uio i2c_dev drm ledtrig_pattern drm_panel_orientation_quirks backlight fuse dm_mod ip_tables x_tables ipv6
    [  466.458429] CPU: 0 UID: 1000 PID: 2008 Comm: chromium Tainted: G         C         6.13.0-v8+ #18
    [  466.467336] Tainted: [C]=CRAP
    [  466.470306] Hardware name: Raspberry Pi 5 Model B Rev 1.0 (DT)
    [  466.476157] pstate: 404000c9 (nZcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    [  466.483143] pc : v3d_irq+0x118/0x2e0 [v3d]
    [  466.487258] lr : __handle_irq_event_percpu+0x60/0x228
    [  466.492327] sp : ffffffc080003ea0
    [  466.495646] x29: ffffffc080003ea0 x28: ffffff80c0c94200 x27: 0000000000000000
    [  466.502807] x26: ffffffd08dd81d7b x25: ffffff80c0c94200 x24: ffffff8003bdc200
    [  466.509969] x23: 0000000000000001 x22: 00000000000000a7 x21: 0000000000000000
    [  466.517130] x20: ffffff8041bb0000 x19: 0000000000000001 x18: 0000000000000000
    [  466.524291] x17: ffffffafadfb0000 x16: ffffffc080000000 x15: 0000000000000000
    [  466.531452] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
    [  466.538613] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffffd08c527eb0
    [  466.545777] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
    [  466.552941] x5 : ffffffd08c4100d0 x4 : ffffffafadfb0000 x3 : ffffffc080003f70
    [  466.560102] x2 : ffffffc0829e8058 x1 : 0000000000000001 x0 : 0000000000000000
    [  466.567263] Call trace:
    [  466.569711]  v3d_irq+0x118/0x2e0 [v3d] (P)
    [  466.573826]  __handle_irq_event_percpu+0x60/0x228
    [  466.578546]  handle_irq_event+0x54/0xb8
    [  466.582391]  handle_fasteoi_irq+0xac/0x240
    [  466.586498]  generic_handle_domain_irq+0x34/0x58
    [  466.591128]  gic_handle_irq+0x48/0xd8
    [  466.594798]  call_on_irq_stack+0x24/0x58
    [  466.598730]  do_interrupt_handler+0x88/0x98
    [  466.602923]  el0_interrupt+0x44/0xc0
    [  466.606508]  __el0_irq_handler_common+0x18/0x28
    [  466.611050]  el0t_64_irq_handler+0x10/0x20
    [  466.615156]  el0t_64_irq+0x198/0x1a0
    [  466.618740] Code: 52800035 3607faf3 f9442e80 52800021 (f9406018)
    [  466.624853] ---[ end trace 0000000000000000 ]---
    [  466.629483] Kernel panic - not syncing: Oops: Fatal exception in interrupt
    [  466.636384] SMP: stopping secondary CPUs
    [  466.640320] Kernel Offset: 0x100c400000 from 0xffffffc080000000
    [  466.646259] PHYS_OFFSET: 0x0
    [  466.649141] CPU features: 0x100,00000170,00901250,0200720b
    [  466.654644] Memory Limit: none
    [  466.657706] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---
    
    Fix the crash by assigning the job pointer to NULL before signaling the
    fence. This ensures that the job pointer is cleared before any new job
    starts execution, preventing the race condition and the NULL pointer
    dereference crash.
    
    Cc: [email protected]
    Fixes: e4b5ccd392b9 ("drm/v3d: Ensure job pointer is set to NULL after job completion")
    Signed-off-by: Maíra Canal <[email protected]>
    Reviewed-by: Jose Maria Casanova Crespo <[email protected]>
    Reviewed-by: Iago Toral Quiroga <[email protected]>
    Tested-by: Phil Elwell <[email protected]>
    Link: https://patchwork.freedesktop.org/patch/msgid/[email protected]
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
fs/ntfs3: Additional check in ntfs_file_release [+ + +]
Author: Konstantin Komarov <[email protected]>
Date:   Wed Sep 4 12:57:31 2024 +0300

    fs/ntfs3: Additional check in ntfs_file_release
    
    commit 031d6f608290c847ba6378322d0986d08d1a645a upstream.
    
    Reported-by: [email protected]
    Signed-off-by: Konstantin Komarov <[email protected]>
    Signed-off-by: Bin Lan <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>
    Signed-off-by: Suraj Jitindar Singh <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag [+ + +]
Author: Andreas Gruenbacher <[email protected]>
Date:   Mon Jan 13 19:31:28 2025 +0100

    gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
    
    commit 7c9d9223802fbed4dee1ae301661bf346964c9d2 upstream.
    
    Truncate an inode's address space when flipping the GFS2_DIF_JDATA flag:
    depending on that flag, the pages in the address space will either use
    buffer heads or iomap_folio_state structs, and we cannot mix the two.
    
    Reported-by: Kun Hu <[email protected]>, Jiaji Qin <[email protected]>
    Signed-off-by: Andreas Gruenbacher <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
Input: atkbd - map F23 key to support default copilot shortcut [+ + +]
Author: Mark Pearson <[email protected]>
Date:   Mon Jan 20 20:24:08 2025 -0800

    Input: atkbd - map F23 key to support default copilot shortcut
    
    commit 907bc9268a5a9f823ffa751957a5c1dd59f83f42 upstream.
    
    Microsoft defined Meta+Shift+F23 as the Copilot shortcut instead of a
    dedicated keycode, and multiple vendors have their keyboards emit this
    sequence in response to users pressing a dedicated "Copilot" key.
    Unfortunately the default keymap table in atkbd does not map scancode
    0x6e (F23) and so the key combination does not work even if userspace
    is ready to handle it.
    
    Because this behavior is common between multiple vendors and the
    scancode is currently unused map 0x6e to keycode 193 (KEY_F23) so that
    key sequence is generated properly.
    
    MS documentation for the scan code:
    https://learn.microsoft.com/en-us/windows/win32/inputdev/about-keyboard-input#scan-codes
    Confirmed on Lenovo, HP and Dell machines by Canonical.
    Tested on Lenovo T14s G6 AMD.
    
    Signed-off-by: Mark Pearson <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Cc: [email protected]
    Signed-off-by: Dmitry Torokhov <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

Input: xpad - add support for wooting two he (arm) [+ + +]
Author: Jack Greiner <[email protected]>
Date:   Fri Jan 17 16:51:58 2025 -0800

    Input: xpad - add support for wooting two he (arm)
    
    commit 222f3390c15c4452a9f7e26f5b7d9138e75d00d5 upstream.
    
    Add Wooting Two HE (ARM) to the list of supported devices.
    
    Signed-off-by: Jack Greiner <[email protected]>
    Signed-off-by: Pavel Rojtberg <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Cc: [email protected]
    Signed-off-by: Dmitry Torokhov <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

Input: xpad - add unofficial Xbox 360 wireless receiver clone [+ + +]
Author: Nilton Perim Neto <[email protected]>
Date:   Fri Jan 17 09:34:18 2025 -0800

    Input: xpad - add unofficial Xbox 360 wireless receiver clone
    
    commit e4940fe6322c851659c17852b671c6e7b1aa9f56 upstream.
    
    Although it mimics the Microsoft's VendorID, it is in fact a clone.
    Taking into account that the original Microsoft Receiver is not being
    manufactured anymore, this drive can solve dpad issues encontered by
    those who still use the original 360 Wireless controller
    but are using a receiver clone.
    
    Signed-off-by: Nilton Perim Neto <[email protected]>
    Signed-off-by: Pavel Rojtberg <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Cc: [email protected]
    Signed-off-by: Dmitry Torokhov <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() [+ + +]
Author: Ido Schimmel <[email protected]>
Date:   Wed Oct 23 15:30:09 2024 +0300

    ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
    
    commit 90e0569dd3d32f4f4d2ca691d3fa5a8a14a13c12 upstream.
    
    The per-netns IP tunnel hash table is protected by the RTNL mutex and
    ip_tunnel_find() is only called from the control path where the mutex is
    taken.
    
    Add a lockdep expression to hlist_for_each_entry_rcu() in
    ip_tunnel_find() in order to validate that the mutex is held and to
    silence the suspicious RCU usage warning [1].
    
    [1]
    WARNING: suspicious RCU usage
    6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted
    -----------------------------
    net/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!!
    
    other info that might help us debug this:
    
    rcu_scheduler_active = 2, debug_locks = 1
    1 lock held by ip/362:
     #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60
    
    stack backtrace:
    CPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139
    Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
    Call Trace:
     <TASK>
     dump_stack_lvl+0xba/0x110
     lockdep_rcu_suspicious.cold+0x4f/0xd6
     ip_tunnel_find+0x435/0x4d0
     ip_tunnel_newlink+0x517/0x7a0
     ipgre_newlink+0x14c/0x170
     __rtnl_newlink+0x1173/0x19c0
     rtnl_newlink+0x6c/0xa0
     rtnetlink_rcv_msg+0x3cc/0xf60
     netlink_rcv_skb+0x171/0x450
     netlink_unicast+0x539/0x7f0
     netlink_sendmsg+0x8c1/0xd80
     ____sys_sendmsg+0x8f9/0xc20
     ___sys_sendmsg+0x197/0x1e0
     __sys_sendmsg+0x122/0x1f0
     do_syscall_64+0xbb/0x1d0
     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    
    Fixes: c54419321455 ("GRE: Refactor GRE tunneling code.")
    Suggested-by: Eric Dumazet <[email protected]>
    Signed-off-by: Ido Schimmel <[email protected]>
    Reviewed-by: Eric Dumazet <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Alva Lan <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
irqchip/sunxi-nmi: Add missing SKIP_WAKE flag [+ + +]
Author: Philippe Simons <[email protected]>
Date:   Sun Jan 12 13:34:02 2025 +0100

    irqchip/sunxi-nmi: Add missing SKIP_WAKE flag
    
    [ Upstream commit 3a748d483d80f066ca4b26abe45cdc0c367d13e9 ]
    
    Some boards with Allwinner SoCs connect the PMIC's IRQ pin to the SoC's NMI
    pin instead of a normal GPIO. Since the power key is connected to the PMIC,
    and people expect to wake up a suspended system via this key, the NMI IRQ
    controller must stay alive when the system goes into suspend.
    
    Add the SKIP_WAKE flag to prevent the sunxi NMI controller from going to
    sleep, so that the power key can wake up those systems.
    
    [ tglx: Fixed up coding style ]
    
    Signed-off-by: Philippe Simons <[email protected]>
    Signed-off-by: Thomas Gleixner <[email protected]>
    Link: https://lore.kernel.org/all/[email protected]
    Signed-off-by: Sasha Levin <[email protected]>

 
Linux: Linux 5.15.178 [+ + +]
Author: Greg Kroah-Hartman <[email protected]>
Date:   Sat Feb 1 18:24:02 2025 +0100

    Linux 5.15.178
    
    Link: https://lore.kernel.org/r/[email protected]
    Tested-by: Mark Brown <[email protected]>
    Tested-by: Florian Fainelli <[email protected]>
    Tested-by: Jon Hunter <[email protected]>
    Tested-by: Ron Economos <[email protected]>
    Tested-by: Linux Kernel Functional Testing <[email protected]>
    Tested-by: kernelci.org bot <[email protected]>
    Tested-by: Vijayendra Suman <[email protected]>
    Tested-by: Hardik Garg <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
mptcp: don't always assume copied data in mptcp_cleanup_rbuf() [+ + +]
Author: Paolo Abeni <[email protected]>
Date:   Mon Dec 30 19:12:31 2024 +0100

    mptcp: don't always assume copied data in mptcp_cleanup_rbuf()
    
    commit 551844f26da2a9f76c0a698baaffa631d1178645 upstream.
    
    Under some corner cases the MPTCP protocol can end-up invoking
    mptcp_cleanup_rbuf() when no data has been copied, but such helper
    assumes the opposite condition.
    
    Explicitly drop such assumption and performs the costly call only
    when strictly needed - before releasing the msk socket lock.
    
    Fixes: fd8976790a6c ("mptcp: be careful on MPTCP-level ack.")
    Cc: [email protected]
    Signed-off-by: Paolo Abeni <[email protected]>
    Reviewed-by: Mat Martineau <[email protected]>
    Signed-off-by: Matthieu Baerts (NGI0) <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    [ Conflicts in this version, because commit 581302298524 ("mptcp: error
      out earlier on disconnect") has not been backported to this version,
      and there was no need to do so. The only conflict was in protocol.c,
      and easy to resolve: the context was different, but the same addition
      can still be made at the same spot in mptcp_recvmsg(). ]
    Signed-off-by: Matthieu Baerts (NGI0) <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
net: sched: fix ets qdisc OOB Indexing [+ + +]
Author: Jamal Hadi Salim <[email protected]>
Date:   Sat Jan 11 09:57:39 2025 -0500

    net: sched: fix ets qdisc OOB Indexing
    
    commit d62b04fca4340a0d468d7853bd66e511935a18cb upstream.
    
    Haowei Yan <[email protected]> found that ets_class_from_arg() can
    index an Out-Of-Bound class in ets_class_from_arg() when passed clid of
    0. The overflow may cause local privilege escalation.
    
     [   18.852298] ------------[ cut here ]------------
     [   18.853271] UBSAN: array-index-out-of-bounds in net/sched/sch_ets.c:93:20
     [   18.853743] index 18446744073709551615 is out of range for type 'ets_class [16]'
     [   18.854254] CPU: 0 UID: 0 PID: 1275 Comm: poc Not tainted 6.12.6-dirty #17
     [   18.854821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
     [   18.856532] Call Trace:
     [   18.857441]  <TASK>
     [   18.858227]  dump_stack_lvl+0xc2/0xf0
     [   18.859607]  dump_stack+0x10/0x20
     [   18.860908]  __ubsan_handle_out_of_bounds+0xa7/0xf0
     [   18.864022]  ets_class_change+0x3d6/0x3f0
     [   18.864322]  tc_ctl_tclass+0x251/0x910
     [   18.864587]  ? lock_acquire+0x5e/0x140
     [   18.865113]  ? __mutex_lock+0x9c/0xe70
     [   18.866009]  ? __mutex_lock+0xa34/0xe70
     [   18.866401]  rtnetlink_rcv_msg+0x170/0x6f0
     [   18.866806]  ? __lock_acquire+0x578/0xc10
     [   18.867184]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
     [   18.867503]  netlink_rcv_skb+0x59/0x110
     [   18.867776]  rtnetlink_rcv+0x15/0x30
     [   18.868159]  netlink_unicast+0x1c3/0x2b0
     [   18.868440]  netlink_sendmsg+0x239/0x4b0
     [   18.868721]  ____sys_sendmsg+0x3e2/0x410
     [   18.869012]  ___sys_sendmsg+0x88/0xe0
     [   18.869276]  ? rseq_ip_fixup+0x198/0x260
     [   18.869563]  ? rseq_update_cpu_node_id+0x10a/0x190
     [   18.869900]  ? trace_hardirqs_off+0x5a/0xd0
     [   18.870196]  ? syscall_exit_to_user_mode+0xcc/0x220
     [   18.870547]  ? do_syscall_64+0x93/0x150
     [   18.870821]  ? __memcg_slab_free_hook+0x69/0x290
     [   18.871157]  __sys_sendmsg+0x69/0xd0
     [   18.871416]  __x64_sys_sendmsg+0x1d/0x30
     [   18.871699]  x64_sys_call+0x9e2/0x2670
     [   18.871979]  do_syscall_64+0x87/0x150
     [   18.873280]  ? do_syscall_64+0x93/0x150
     [   18.874742]  ? lock_release+0x7b/0x160
     [   18.876157]  ? do_user_addr_fault+0x5ce/0x8f0
     [   18.877833]  ? irqentry_exit_to_user_mode+0xc2/0x210
     [   18.879608]  ? irqentry_exit+0x77/0xb0
     [   18.879808]  ? clear_bhb_loop+0x15/0x70
     [   18.880023]  ? clear_bhb_loop+0x15/0x70
     [   18.880223]  ? clear_bhb_loop+0x15/0x70
     [   18.880426]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
     [   18.880683] RIP: 0033:0x44a957
     [   18.880851] Code: ff ff e8 fc 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 8974 24 10
     [   18.881766] RSP: 002b:00007ffcdd00fad8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
     [   18.882149] RAX: ffffffffffffffda RBX: 00007ffcdd010db8 RCX: 000000000044a957
     [   18.882507] RDX: 0000000000000000 RSI: 00007ffcdd00fb70 RDI: 0000000000000003
     [   18.885037] RBP: 00007ffcdd010bc0 R08: 000000000703c770 R09: 000000000703c7c0
     [   18.887203] R10: 0000000000000080 R11: 0000000000000246 R12: 0000000000000001
     [   18.888026] R13: 00007ffcdd010da8 R14: 00000000004ca7d0 R15: 0000000000000001
     [   18.888395]  </TASK>
     [   18.888610] ---[ end trace ]---
    
    Fixes: dcc68b4d8084 ("net: sch_ets: Add a new Qdisc")
    Reported-by: Haowei Yan <[email protected]>
    Suggested-by: Haowei Yan <[email protected]>
    Signed-off-by: Jamal Hadi Salim <[email protected]>
    Reviewed-by: Eric Dumazet <[email protected]>
    Reviewed-by: Petr Machata <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
platform/chrome: cros_ec_typec: Check for EC driver [+ + +]
Author: Akihiko Odaki <[email protected]>
Date:   Mon Apr 4 13:11:01 2022 +0900

    platform/chrome: cros_ec_typec: Check for EC driver
    
    commit 7464ff8bf2d762251b9537863db0e1caf9b0e402 upstream.
    
    The EC driver may not be initialized when cros_typec_probe is called,
    particulary when CONFIG_CROS_EC_CHARDEV=m.
    
    Signed-off-by: Akihiko Odaki <[email protected]>
    Reviewed-by: Guenter Roeck <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Prashant Malani <[email protected]>
    Signed-off-by: Laura Nao <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
regmap: detach regmap from dev on regmap_exit [+ + +]
Author: Cosmin Tanislav <[email protected]>
Date:   Thu Nov 28 15:16:23 2024 +0200

    regmap: detach regmap from dev on regmap_exit
    
    commit 3061e170381af96d1e66799d34264e6414d428a7 upstream.
    
    At the end of __regmap_init(), if dev is not NULL, regmap_attach_dev()
    is called, which adds a devres reference to the regmap, to be able to
    retrieve a dev's regmap by name using dev_get_regmap().
    
    When calling regmap_exit, the opposite does not happen, and the
    reference is kept until the dev is detached.
    
    Add a regmap_detach_dev() function and call it in regmap_exit() to make
    sure that the devres reference is not kept.
    
    Cc: [email protected]
    Fixes: 72b39f6f2b5a ("regmap: Implement dev_get_regmap()")
    Signed-off-by: Cosmin Tanislav <[email protected]>
    Rule: add
    Link: https://lore.kernel.org/stable/20241128130554.362486-1-demonsingur%40gmail.com
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Mark Brown <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Tzung-Bi Shih <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" [+ + +]
Author: Greg Kroah-Hartman <[email protected]>
Date:   Fri Jan 17 09:17:12 2025 +0100

    Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null"
    
    commit 086fd062bc3883ae1ce4166cff5355db315ad879 upstream.
    
    This reverts commit 13014969cbf07f18d62ceea40bd8ca8ec9d36cec.
    
    It is reported to cause crashes on Tegra systems, so revert it for now.
    
    Link: https://lore.kernel.org/r/[email protected]
    Reported-by: Jon Hunter <[email protected]>
    Cc: stable <[email protected]>
    Cc: Lianqin Hu <[email protected]>
    Link: https://lore.kernel.org/r/2025011711-yippee-fever-a737@gregkh
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request [+ + +]
Author: Xiang Zhang <[email protected]>
Date:   Tue Jan 7 10:24:31 2025 +0800

    scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request
    
    [ Upstream commit 63ca02221cc5aa0731fe2b0cc28158aaa4b84982 ]
    
    The ISCSI_UEVENT_GET_HOST_STATS request is already handled in
    iscsi_get_host_stats(). This fix ensures that redundant responses are
    skipped in iscsi_if_rx().
    
     - On success: send reply and stats from iscsi_get_host_stats()
       within if_recv_msg().
    
     - On error: fall through.
    
    Signed-off-by: Xiang Zhang <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Reviewed-by: Mike Christie <[email protected]>
    Signed-off-by: Martin K. Petersen <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

scsi: storvsc: Ratelimit warning logs to prevent VM denial of service [+ + +]
Author: Easwar Hariharan <[email protected]>
Date:   Tue Jan 7 17:28:40 2025 +0000

    scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
    
    commit d2138eab8cde61e0e6f62d0713e45202e8457d6d upstream.
    
    If there's a persistent error in the hypervisor, the SCSI warning for
    failed I/O can flood the kernel log and max out CPU utilization,
    preventing troubleshooting from the VM side. Ratelimit the warning so
    it doesn't DoS the VM.
    
    Closes: https://github.com/microsoft/WSL/issues/9173
    Signed-off-by: Easwar Hariharan <[email protected]>
    Link: https://lore.kernel.org/r/20250107-eahariha-ratelimit-storvsc-v1-1-7fc193d1f2b0@linux.microsoft.com
    Reviewed-by: Michael Kelley <[email protected]>
    Signed-off-by: Martin K. Petersen <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
seccomp: Stub for !CONFIG_SECCOMP [+ + +]
Author: Linus Walleij <[email protected]>
Date:   Wed Jan 8 23:44:45 2025 +0100

    seccomp: Stub for !CONFIG_SECCOMP
    
    [ Upstream commit f90877dd7fb5085dd9abd6399daf63dd2969fc90 ]
    
    When using !CONFIG_SECCOMP with CONFIG_GENERIC_ENTRY, the
    randconfig bots found the following snag:
    
       kernel/entry/common.c: In function 'syscall_trace_enter':
    >> kernel/entry/common.c:52:23: error: implicit declaration
       of function '__secure_computing' [-Wimplicit-function-declaration]
          52 |                 ret = __secure_computing(NULL);
             |                       ^~~~~~~~~~~~~~~~~~
    
    Since generic entry calls __secure_computing() unconditionally,
    fix this by moving the stub out of the ifdef clause for
    CONFIG_HAVE_ARCH_SECCOMP_FILTER so it's always available.
    
    Link: https://lore.kernel.org/oe-kbuild-all/[email protected]/
    Signed-off-by: Linus Walleij <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Kees Cook <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() [+ + +]
Author: Qasim Ijaz <[email protected]>
Date:   Mon Jan 13 18:00:34 2025 +0000

    USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
    
    commit 575a5adf48b06a2980c9eeffedf699ed5534fade upstream.
    
    This patch addresses a null-ptr-deref in qt2_process_read_urb() due to
    an incorrect bounds check in the following:
    
           if (newport > serial->num_ports) {
                   dev_err(&port->dev,
                           "%s - port change to invalid port: %i\n",
                           __func__, newport);
                   break;
           }
    
    The condition doesn't account for the valid range of the serial->port
    buffer, which is from 0 to serial->num_ports - 1. When newport is equal
    to serial->num_ports, the assignment of "port" in the
    following code is out-of-bounds and NULL:
    
           serial_priv->current_port = newport;
           port = serial->port[serial_priv->current_port];
    
    The fix checks if newport is greater than or equal to serial->num_ports
    indicating it is out-of-bounds.
    
    Reported-by: syzbot <[email protected]>
    Closes: https://syzkaller.appspot.com/bug?extid=506479ebf12fe435d01a
    Fixes: f7a33e608d9a ("USB: serial: add quatech2 usb to serial driver")
    Cc: <[email protected]>      # 3.5
    Signed-off-by: Qasim Ijaz <[email protected]>
    Reviewed-by: Greg Kroah-Hartman <[email protected]>
    Signed-off-by: Johan Hovold <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
vfio/platform: check the bounds of read/write syscalls [+ + +]
Author: Alex Williamson <[email protected]>
Date:   Wed Jan 22 10:38:30 2025 -0700

    vfio/platform: check the bounds of read/write syscalls
    
    commit ce9ff21ea89d191e477a02ad7eabf4f996b80a69 upstream.
    
    count and offset are passed from user space and not checked, only
    offset is capped to 40 bits, which can be used to read/write out of
    bounds of the device.
    
    Fixes: 6e3f26456009 (“vfio/platform: read and write support for the device fd”)
    Cc: [email protected]
    Reported-by: Mostafa Saleh <[email protected]>
    Reviewed-by: Eric Auger <[email protected]>
    Reviewed-by: Mostafa Saleh <[email protected]>
    Tested-by: Mostafa Saleh <[email protected]>
    Signed-off-by: Alex Williamson <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
wifi: iwlwifi: add a few rate index validity checks [+ + +]
Author: Anjaneyulu <[email protected]>
Date:   Wed Jun 14 12:41:37 2023 +0300

    wifi: iwlwifi: add a few rate index validity checks
    
    commit efbe8f81952fe469d38655744627d860879dcde8 upstream.
    
    Validate index before access iwl_rate_mcs to keep rate->index
    inside the valid boundaries. Use MCS_0_INDEX if index is less
    than MCS_0_INDEX and MCS_9_INDEX if index is greater then
    MCS_9_INDEX.
    
    Signed-off-by: Anjaneyulu <[email protected]>
    Signed-off-by: Gregory Greenman <[email protected]>
    Link: https://lore.kernel.org/r/20230614123447.79f16b3aef32.If1137f894775d6d07b78cbf3a6163ffce6399507@changeid
    Signed-off-by: Johannes Berg <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>