Received: by 2002:ab2:7855:0:b0:1f9:5764:f03e with SMTP id m21csp993688lqp; Thu, 23 May 2024 06:21:44 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWadyWPOMVGdCX+fdggdteRoxB0tTOCoMR1xOY7HJdjcIDmnpwsYwquH8+oEJfWI7LZSM5aB0Iw+I+2cM7kGobMb8fzolp1MXitAmq+wg== X-Google-Smtp-Source: AGHT+IEhoJvOAWJUgD6rxawTsfiCZzBjg2bMEdbdMqF6l+cwEEPEeFsswIgITN4rbMdoHY58sB8i X-Received: by 2002:a05:6122:1d8c:b0:4e4:ed90:27e6 with SMTP id 71dfb90a1353d-4e4ed902c49mr282275e0c.5.1716470503543; Thu, 23 May 2024 06:21:43 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716470503; cv=pass; d=google.com; s=arc-20160816; b=kQMNMaX+S8GvFNZBsxHnBDX6QF2iExarir9A2MmmAJ1NVb+yMFx5+VlIXe0lsoWA4c XEd19GN6wA60TBD9dcJw3iuq+HK7MtAkO0nKaJ6hWmnvM2jjnMw6mAdgAtHdT2D8fZx5 5OFs8Tkg3f7aXpTIvAdEI6UVn7N82WQ9yizyj6O2TzCmUqlwynL3iY0RVq21yz5cbKlt 6SHno4aIOe745+4zBHLB5xM6Q+9+GIEQCHL3MH3RYi184TwJYNRopl49L0rAlqpGSTqL npXtkaPWHLs7hi0yUb874lGw2k4b92gjRS/y+j0Ac6qvv9Mywb5XFghBaMncGPE4RB99 BhbA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=HDLu8bOoDvAqgMoTxV/iLibqCS1V9iiaibmuNUCSM6U=; fh=mu3yMcbpSNren0iJy86deW9Bxhns6X76a0mmcso85PI=; b=QZhoyMgrtRvoZ8rT3xpWS5oQ0bYMOLlNKJ7/qIbw7AMpJEvv24VOXFGFIyIVY+m14t eXHEhGgg/+W3jSYfF0pbtVlIBbuwKaDDud5zxy+1ktCyjxMFcDTaZ32LuYRl16OHKcZn JG6mNVgHxxchzZIVFKDPZDGhZfNcB6gSUEcgTrWTjiwnK4UT6lDV8ff81wbDVp4OjiuR b1i9s7j3N9asx3lk8jJb5FrXCLIA4egCObpiU3I/UQwf48OZQt3vOMM0MMF5ApeFLEbG Y+P+JTK5vYiL16a3CFZM032eaFJEpJgfz6crDWp+6phJcvvfbR0QCxSEQFLz+Ho2N6x8 cP5A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QEvt5MrH; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-187566-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-187566-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id 71dfb90a1353d-4df7c05a959si5442560e0c.186.2024.05.23.06.21.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 May 2024 06:21:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-187566-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QEvt5MrH; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-187566-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-187566-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 366CA1C203E3 for ; Thu, 23 May 2024 13:21:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1D78E14C596; Thu, 23 May 2024 13:20:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="QEvt5MrH" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0321813BAC3; Thu, 23 May 2024 13:20:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716470453; cv=none; b=EgSpY1JNbY+13AFINBZ6wz+MSiaNT85xY0EwfJNW7phGzvAuUBfVftqlUHoSFagwqOZimC+JnV3+uM/RKoZrgRAm4yVSXpH1rVctom/pJxBiiQOmt5lwX3nq+N3QzeGlyRYU3oy8FEqyeXVOE1pWjtjVd7bqwMsAZRy21qxA/s0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716470453; c=relaxed/simple; bh=ar6qY6T96THmaK4PF+VaWr6N1OIeuEpfrHMygoEs2Zo=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=EIBZJal2t7JVsc+sQ2JjCNKQ/5cp5zKcNTGrJQvA55T+DNx4ozRimwzbE1gIPp/e4kjzT9uCtkAJPSANuM5mD9/59Mma3JolRhsP+LtVs1TSh+58FPCFyTDbdDg/+Ed8M6YZH7+QRm5WnebjAK8JRxjZfXdCWikAtUvliTUstPM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=QEvt5MrH; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 06851C2BD10; Thu, 23 May 2024 13:20:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1716470452; bh=ar6qY6T96THmaK4PF+VaWr6N1OIeuEpfrHMygoEs2Zo=; h=From:To:Cc:Subject:Date:From; b=QEvt5MrHT6ukSpbUXSx8wDujylPunhQ+jC96x4IW+Alr8JAg5k2r/I1HB/R6hCSDO okAX1Z2Qa8mdEmmtFsF26b8wJN+IhmcklXpjzPYram0QvPrB9KjunzSQjs70MmtkPc 4AcC0BS+Uf0i6yXW5X9rX70HOSJRcrOFHHhA9LUU= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, allen.lkml@gmail.com, broonie@kernel.org Subject: [PATCH 6.1 00/45] 6.1.92-rc1 review Date: Thu, 23 May 2024 15:12:51 +0200 Message-ID: <20240523130332.496202557@linuxfoundation.org> X-Mailer: git-send-email 2.45.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1.92-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-6.1.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 6.1.92-rc1 X-KernelTest-Deadline: 2024-05-25T13:03+00:00 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This is the start of the stable review cycle for the 6.1.92 release. There are 45 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat, 25 May 2024 13:03:15 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1.92-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.1.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 6.1.92-rc1 Akira Yokosawa docs: kernel_include.py: Cope with docutils 0.21 Thomas Weißschuh admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET Jarkko Sakkinen KEYS: trusted: Do not use WARN when encode fails AngeloGioacchino Del Regno remoteproc: mediatek: Make sure IPI buffer fits in L2TCM Daniel Thompson serial: kgdboc: Fix NMI-safety problems from keyboard reset code Javier Carrasco usb: typec: tipd: fix event checking for tps6598x Heikki Krogerus usb: typec: ucsi: displayport: Fix potential deadlock Jose Ignacio Tornos Martinez net: usb: ax88179_178a: fix link status when link is set to down/up Prashanth K usb: dwc3: Wait unconditionally after issuing EndXfer command Carlos Llamas binder: fix max_thread type inconsistency Srinivasan Shanmugam drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() Mark Rutland arm64: atomics: lse: remove stale dependency on JUMP_LABEL Eric Sandeen xfs: short circuit xfs_growfs_data_private() if delta is zero Hironori Shiina xfs: get root inode correctly at bulkstat Darrick J. Wong xfs: fix log recovery when unknown rocompat bits are set Darrick J. Wong xfs: allow inode inactivation during a ro mount log recovery Darrick J. Wong xfs: invalidate xfs_bufs when allocating cow extents Darrick J. Wong xfs: estimate post-merge refcounts correctly Darrick J. Wong xfs: hoist refcount record merge predicates Guo Xuenan xfs: fix super block buf log item UAF during force shutdown Guo Xuenan xfs: wait iclog complete before tearing down AIL Darrick J. Wong xfs: attach dquots to inode before reading data/cow fork mappings Darrick J. Wong xfs: invalidate block device page cache during unmount Long Li xfs: fix incorrect i_nlink caused by inode racing Long Li xfs: fix sb write verify for lazysbcount Darrick J. Wong xfs: fix incorrect error-out in xfs_remove Dave Chinner xfs: fix off-by-one-block in xfs_discard_folio() Dave Chinner xfs: drop write error injection is unfixable, remove it Dave Chinner xfs: use iomap_valid method to detect stale cached iomaps Dave Chinner iomap: write iomap validity checks Dave Chinner xfs: xfs_bmap_punch_delalloc_range() should take a byte range Dave Chinner iomap: buffered write failure should not truncate the page cache Dave Chinner xfs,iomap: move delalloc punching to iomap Dave Chinner xfs: use byte ranges for write cleanup ranges Dave Chinner xfs: punching delalloc extents on write failure is racy Dave Chinner xfs: write page faults in iomap are not buffered writes Mengqi Zhang mmc: core: Add HS400 tuning in HS400es initialization Jarkko Sakkinen KEYS: trusted: Fix memory leak in tpm2_key_encode() NeilBrown nfsd: don't allow nfsd threads to be signalled. Aidan MacDonald mfd: stpmic1: Fix swapped mask/unmask in irq chip Sergey Shtylyov pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() Jacob Keller ice: remove unnecessary duplicate checks for VF VSI ID Jacob Keller ice: pass VSI pointer into ice_vc_isvalid_q_id Ronald Wahl net: ks8851: Fix another TX stall caused by wrong ISR flag handling Jose Fernandez drm/amd/display: Fix division by zero in setup_dsc_config ------------- Diffstat: .../admin-guide/hw-vuln/core-scheduling.rst | 4 +- Documentation/sphinx/kernel_include.py | 1 - Makefile | 4 +- arch/arm64/Kconfig | 1 - arch/arm64/include/asm/lse.h | 1 - drivers/android/binder.c | 2 +- drivers/android/binder_internal.h | 2 +- drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c | 3 + drivers/gpu/drm/amd/display/dc/dsc/dc_dsc.c | 7 +- drivers/mfd/stpmic1.c | 5 +- drivers/mmc/core/mmc.c | 9 +- drivers/net/ethernet/intel/ice/ice_virtchnl.c | 22 +- drivers/net/ethernet/intel/ice/ice_virtchnl_fdir.c | 3 - drivers/net/ethernet/micrel/ks8851_common.c | 18 +- drivers/net/usb/ax88179_178a.c | 37 ++- drivers/pinctrl/core.c | 14 +- drivers/remoteproc/mtk_scp.c | 10 +- drivers/tty/serial/kgdboc.c | 30 ++- drivers/usb/dwc3/gadget.c | 4 +- drivers/usb/typec/tipd/core.c | 45 ++-- drivers/usb/typec/tipd/tps6598x.h | 11 + drivers/usb/typec/ucsi/displayport.c | 4 - fs/iomap/buffered-io.c | 254 ++++++++++++++++++++- fs/iomap/iter.c | 19 +- fs/nfs/callback.c | 9 +- fs/nfsd/nfs4proc.c | 5 +- fs/nfsd/nfssvc.c | 12 - fs/xfs/libxfs/xfs_bmap.c | 8 +- fs/xfs/libxfs/xfs_errortag.h | 12 +- fs/xfs/libxfs/xfs_refcount.c | 146 ++++++++++-- fs/xfs/libxfs/xfs_sb.c | 7 +- fs/xfs/xfs_aops.c | 37 +-- fs/xfs/xfs_bmap_util.c | 10 +- fs/xfs/xfs_bmap_util.h | 2 +- fs/xfs/xfs_buf.c | 1 + fs/xfs/xfs_buf_item.c | 2 + fs/xfs/xfs_error.c | 27 ++- fs/xfs/xfs_file.c | 2 +- fs/xfs/xfs_fsops.c | 4 + fs/xfs/xfs_icache.c | 6 + fs/xfs/xfs_inode.c | 16 +- fs/xfs/xfs_ioctl.c | 4 +- fs/xfs/xfs_iomap.c | 177 ++++++++------ fs/xfs/xfs_iomap.h | 6 +- fs/xfs/xfs_log.c | 53 ++--- fs/xfs/xfs_mount.c | 15 ++ fs/xfs/xfs_pnfs.c | 6 +- include/linux/iomap.h | 47 +++- net/sunrpc/svc_xprt.c | 16 +- security/keys/trusted-keys/trusted_tpm2.c | 25 +- 50 files changed, 866 insertions(+), 299 deletions(-)