<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/linux.git, branch v6.0.16</title>
<subtitle>Linux kernel stable tree (mirror)</subtitle>
<id>https://git.radix-linux.su/kernel/linux.git/atom?h=v6.0.16</id>
<link rel='self' href='https://git.radix-linux.su/kernel/linux.git/atom?h=v6.0.16'/>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/'/>
<updated>2022-12-31T12:26:54+00:00</updated>
<entry>
<title>Linux 6.0.16</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@linuxfoundation.org</email>
</author>
<published>2022-12-31T12:26:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=29e1bc6a55debd187afb6ec2e49beb7e57102b0a'/>
<id>urn:sha1:29e1bc6a55debd187afb6ec2e49beb7e57102b0a</id>
<content type='text'>
Link: https://lore.kernel.org/r/20221228144328.162723588@linuxfoundation.org
Tested-by: Justin M. Forbes &lt;jforbes@fedoraproject.org&gt;
Tested-by: Florian Fainelli &lt;f.fainelli@gmail.com&gt;
Tested-by: Ron Economos &lt;re@w6rz.net&gt;
Tested-by: Thierry Reding &lt;treding@nvidia.com&gt;
Tested-by: Bagas Sanjaya &lt;bagasdotme@gmail.com&gt;
Tested-by: Linux Kernel Functional Testing &lt;lkft@linaro.org&gt;
Tested-by: Shuah Khan &lt;skhan@linuxfoundation.org&gt;
Link: https://lore.kernel.org/r/20221230094059.698032393@linuxfoundation.org
Tested-by: Slade Watkins &lt;srw@sladewatkins.net&gt;
Tested-by: Florian Fainelli &lt;f.fainelli@gmail.com&gt;
Tested-by: Joel Fernandes (Google) &lt;joel@joelfernandes.org&gt;
Tested-by: Allen Pais &lt;apais@linux.microsoft.com&gt;
Tested-by: Guenter Roeck &lt;linux@roeck-us.net&gt;
Tested-by: Bagas Sanjaya &lt;bagasdotme@gmail.com&gt;
Tested-by: Linux Kernel Functional Testing &lt;lkft@linaro.org&gt;
Tested-by: Ron Economos &lt;re@w6rz.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cifs: fix uninitialised var in smb2_compound_op()</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Paulo Alcantara</name>
<email>pc@cjr.nz</email>
</author>
<published>2022-10-04T18:10:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=e4538d07e959194f6c6bf91ccd1920e18a95c0bc'/>
<id>urn:sha1:e4538d07e959194f6c6bf91ccd1920e18a95c0bc</id>
<content type='text'>
commit 69ccafdd35cdffd72504bfed58dcaee5e73a88a7 upstream.

Fix uninitialised variable @idata when calling smb2_compound_op() with
SMB2_OP_POSIX_QUERY_INFO.

Reported-by: kernel test robot &lt;lkp@intel.com&gt;
Signed-off-by: Paulo Alcantara (SUSE) &lt;pc@cjr.nz&gt;
Reviewed-by: Ronnie Sahlberg &lt;lsahlber@redhat.com&gt;
Signed-off-by: Steve French &lt;stfrench@microsoft.com&gt;
Cc: Guenter Roeck &lt;linux@roeck-us.net&gt;
Cc: Conor Dooley &lt;conor@kernel.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>pwm: tegra: Fix 32 bit build</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Steven Price</name>
<email>steven.price@arm.com</email>
</author>
<published>2022-11-10T11:45:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=5f0d81cc1c59f5ce7914f5f52570b6b5868f02d7'/>
<id>urn:sha1:5f0d81cc1c59f5ce7914f5f52570b6b5868f02d7</id>
<content type='text'>
[ Upstream commit dd1f1da4ada5d8ac774c2ebe97230637820b3323 ]

The value of NSEC_PER_SEC &lt;&lt; PWM_DUTY_WIDTH doesn't fix within a 32 bit
integer causing a build warning/error (and the value truncated):

  drivers/pwm/pwm-tegra.c: In function ‘tegra_pwm_config’:
  drivers/pwm/pwm-tegra.c:148:53: error: result of ‘1000000000 &lt;&lt; 8’ requires 39 bits to represent, but ‘long int’ only has 32 bits [-Werror=shift-overflow=]
    148 |   required_clk_rate = DIV_ROUND_UP_ULL(NSEC_PER_SEC &lt;&lt; PWM_DUTY_WIDTH,
        |                                                     ^~

Explicitly cast to a u64 to ensure the correct result.

Fixes: cfcb68817fb3 ("pwm: tegra: Improve required rate calculation")
Signed-off-by: Steven Price &lt;steven.price@arm.com&gt;
Reviewed-by: Uwe Kleine-König &lt;u.kleine-koenig@pengutronix.de&gt;
Reviewed-by: Jon Hunter &lt;jonathanh@nvidia.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>mfd: qcom_rpm: Use devm_of_platform_populate() to simplify code</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Christophe JAILLET</name>
<email>christophe.jaillet@wanadoo.fr</email>
</author>
<published>2022-11-20T13:01:43+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=3e6b931fa2b0c5e1b0cf62f887dda791aafbd591'/>
<id>urn:sha1:3e6b931fa2b0c5e1b0cf62f887dda791aafbd591</id>
<content type='text'>
[ Upstream commit e48dee96046246980d476714b3f6684d45f29c13 ]

Use devm_of_platform_populate() instead of hand-writing it.
This simplifies the code.

Signed-off-by: Christophe JAILLET &lt;christophe.jaillet@wanadoo.fr&gt;
Signed-off-by: Lee Jones &lt;lee@kernel.org&gt;
Link: https://lore.kernel.org/r/fd997dc92b9cee219e9c55e22959a94f4bbf570b.1668949256.git.christophe.jaillet@wanadoo.fr
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>cifs: fix use-after-free on the link name</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>ChenXiaoSong</name>
<email>chenxiaosong2@huawei.com</email>
</author>
<published>2022-11-04T07:44:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=7e02dc7d2ee838f75c3b836f5fba199117c6b20c'/>
<id>urn:sha1:7e02dc7d2ee838f75c3b836f5fba199117c6b20c</id>
<content type='text'>
commit 542228db2f28fdf775b301f2843e1fe486e7c797 upstream.

xfstests generic/011 reported use-after-free bug as follows:

  BUG: KASAN: use-after-free in __d_alloc+0x269/0x859
  Read of size 15 at addr ffff8880078933a0 by task dirstress/952

  CPU: 1 PID: 952 Comm: dirstress Not tainted 6.1.0-rc3+ #77
  Call Trace:
   __dump_stack+0x23/0x29
   dump_stack_lvl+0x51/0x73
   print_address_description+0x67/0x27f
   print_report+0x3e/0x5c
   kasan_report+0x7b/0xa8
   kasan_check_range+0x1b2/0x1c1
   memcpy+0x22/0x5d
   __d_alloc+0x269/0x859
   d_alloc+0x45/0x20c
   d_alloc_parallel+0xb2/0x8b2
   lookup_open+0x3b8/0x9f9
   open_last_lookups+0x63d/0xc26
   path_openat+0x11a/0x261
   do_filp_open+0xcc/0x168
   do_sys_openat2+0x13b/0x3f7
   do_sys_open+0x10f/0x146
   __se_sys_creat+0x27/0x2e
   __x64_sys_creat+0x55/0x6a
   do_syscall_64+0x40/0x96
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

  Allocated by task 952:
   kasan_save_stack+0x1f/0x42
   kasan_set_track+0x21/0x2a
   kasan_save_alloc_info+0x17/0x1d
   __kasan_kmalloc+0x7e/0x87
   __kmalloc_node_track_caller+0x59/0x155
   kstrndup+0x60/0xe6
   parse_mf_symlink+0x215/0x30b
   check_mf_symlink+0x260/0x36a
   cifs_get_inode_info+0x14e1/0x1690
   cifs_revalidate_dentry_attr+0x70d/0x964
   cifs_revalidate_dentry+0x36/0x62
   cifs_d_revalidate+0x162/0x446
   lookup_open+0x36f/0x9f9
   open_last_lookups+0x63d/0xc26
   path_openat+0x11a/0x261
   do_filp_open+0xcc/0x168
   do_sys_openat2+0x13b/0x3f7
   do_sys_open+0x10f/0x146
   __se_sys_creat+0x27/0x2e
   __x64_sys_creat+0x55/0x6a
   do_syscall_64+0x40/0x96
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

  Freed by task 950:
   kasan_save_stack+0x1f/0x42
   kasan_set_track+0x21/0x2a
   kasan_save_free_info+0x1c/0x34
   ____kasan_slab_free+0x1c1/0x1d5
   __kasan_slab_free+0xe/0x13
   __kmem_cache_free+0x29a/0x387
   kfree+0xd3/0x10e
   cifs_fattr_to_inode+0xb6a/0xc8c
   cifs_get_inode_info+0x3cb/0x1690
   cifs_revalidate_dentry_attr+0x70d/0x964
   cifs_revalidate_dentry+0x36/0x62
   cifs_d_revalidate+0x162/0x446
   lookup_open+0x36f/0x9f9
   open_last_lookups+0x63d/0xc26
   path_openat+0x11a/0x261
   do_filp_open+0xcc/0x168
   do_sys_openat2+0x13b/0x3f7
   do_sys_open+0x10f/0x146
   __se_sys_creat+0x27/0x2e
   __x64_sys_creat+0x55/0x6a
   do_syscall_64+0x40/0x96
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

When opened a symlink, link name is from 'inode-&gt;i_link', but it may be
reset to a new value when revalidate the dentry. If some processes get the
link name on the race scenario, then UAF will happen on link name.

Fix this by implementing 'get_link' interface to duplicate the link name.

Fixes: 76894f3e2f71 ("cifs: improve symlink handling for smb2+")
Signed-off-by: ChenXiaoSong &lt;chenxiaosong2@huawei.com&gt;
Reviewed-by: Paulo Alcantara (SUSE) &lt;pc@cjr.nz&gt;
Signed-off-by: Steve French &lt;stfrench@microsoft.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cifs: fix memory leaks in session setup</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Paulo Alcantara</name>
<email>pc@cjr.nz</email>
</author>
<published>2022-10-19T14:25:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=b0a1236fe0fda2dce9a291870338922b9c1e920f'/>
<id>urn:sha1:b0a1236fe0fda2dce9a291870338922b9c1e920f</id>
<content type='text'>
commit 01f2ee7e325611524078009d70392a5d5eca0945 upstream.

We were only zeroing out the ntlmssp blob but forgot to free the
allocated buffer in the end of SMB2_sess_auth_rawntlmssp_negotiate()
and SMB2_sess_auth_rawntlmssp_authenticate() functions.

This fixes below kmemleak reports:

unreferenced object 0xffff88800ddcfc60 (size 96):
  comm "mount.cifs", pid 758, jiffies 4294696066 (age 42.967s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000d0beeb29&gt;] __kmalloc+0x39/0xa0
    [&lt;00000000e3834047&gt;] build_ntlmssp_smb3_negotiate_blob+0x2c/0x110 [cifs]
    [&lt;00000000e85f5ab2&gt;] SMB2_sess_auth_rawntlmssp_negotiate+0xd3/0x230 [cifs]
    [&lt;0000000080fdb897&gt;] SMB2_sess_setup+0x16c/0x2a0 [cifs]
    [&lt;000000009af320a8&gt;] cifs_setup_session+0x13b/0x370 [cifs]
    [&lt;00000000f15d5982&gt;] cifs_get_smb_ses+0x643/0xb90 [cifs]
    [&lt;00000000fe15eb90&gt;] mount_get_conns+0x63/0x3e0 [cifs]
    [&lt;00000000768aba03&gt;] mount_get_dfs_conns+0x16/0xa0 [cifs]
    [&lt;00000000cf1cf146&gt;] cifs_mount+0x1c2/0x9a0 [cifs]
    [&lt;000000000d66b51e&gt;] cifs_smb3_do_mount+0x10e/0x710 [cifs]
    [&lt;0000000077a996c5&gt;] smb3_get_tree+0xf4/0x200 [cifs]
    [&lt;0000000094dbd041&gt;] vfs_get_tree+0x23/0xc0
    [&lt;000000003a8561de&gt;] path_mount+0x2d3/0xb50
    [&lt;00000000ed5c86d6&gt;] __x64_sys_mount+0x102/0x140
    [&lt;00000000142142f3&gt;] do_syscall_64+0x3b/0x90
    [&lt;00000000e2b89731&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
unreferenced object 0xffff88801437f000 (size 512):
  comm "mount.cifs", pid 758, jiffies 4294696067 (age 42.970s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000d0beeb29&gt;] __kmalloc+0x39/0xa0
    [&lt;00000000004f53d2&gt;] build_ntlmssp_auth_blob+0x4f/0x340 [cifs]
    [&lt;000000005f333084&gt;] SMB2_sess_auth_rawntlmssp_authenticate+0xd4/0x250 [cifs]
    [&lt;0000000080fdb897&gt;] SMB2_sess_setup+0x16c/0x2a0 [cifs]
    [&lt;000000009af320a8&gt;] cifs_setup_session+0x13b/0x370 [cifs]
    [&lt;00000000f15d5982&gt;] cifs_get_smb_ses+0x643/0xb90 [cifs]
    [&lt;00000000fe15eb90&gt;] mount_get_conns+0x63/0x3e0 [cifs]
    [&lt;00000000768aba03&gt;] mount_get_dfs_conns+0x16/0xa0 [cifs]
    [&lt;00000000cf1cf146&gt;] cifs_mount+0x1c2/0x9a0 [cifs]
    [&lt;000000000d66b51e&gt;] cifs_smb3_do_mount+0x10e/0x710 [cifs]
    [&lt;0000000077a996c5&gt;] smb3_get_tree+0xf4/0x200 [cifs]
    [&lt;0000000094dbd041&gt;] vfs_get_tree+0x23/0xc0
    [&lt;000000003a8561de&gt;] path_mount+0x2d3/0xb50
    [&lt;00000000ed5c86d6&gt;] __x64_sys_mount+0x102/0x140
    [&lt;00000000142142f3&gt;] do_syscall_64+0x3b/0x90
    [&lt;00000000e2b89731&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Fixes: a4e430c8c8ba ("cifs: replace kfree() with kfree_sensitive() for sensitive data")
Signed-off-by: Paulo Alcantara (SUSE) &lt;pc@cjr.nz&gt;
Signed-off-by: Steve French &lt;stfrench@microsoft.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cifs: Fix xid leak in cifs_get_file_info_unix()</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Zhang Xiaoxu</name>
<email>zhangxiaoxu5@huawei.com</email>
</author>
<published>2022-10-17T14:45:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=4d99a4c674811d2a9a48644cfb7b82110def7df0'/>
<id>urn:sha1:4d99a4c674811d2a9a48644cfb7b82110def7df0</id>
<content type='text'>
commit 10269f13257d4eb6061d09ccce61666316df9838 upstream.

If stardup the symlink target failed, should free the xid,
otherwise the xid will be leaked.

Fixes: 76894f3e2f71 ("cifs: improve symlink handling for smb2+")
Reviewed-by: Paulo Alcantara (SUSE) &lt;pc@cjr.nz&gt;
Signed-off-by: Zhang Xiaoxu &lt;zhangxiaoxu5@huawei.com&gt;
Signed-off-by: Steve French &lt;stfrench@microsoft.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cifs: fix double-fault crash during ntlmssp</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Paulo Alcantara</name>
<email>pc@cjr.nz</email>
</author>
<published>2022-10-14T20:14:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=983ec6379b9bab7bf790aa7df5dc3a461ebad72a'/>
<id>urn:sha1:983ec6379b9bab7bf790aa7df5dc3a461ebad72a</id>
<content type='text'>
commit b854b4ee66437e6e1622fda90529c814978cb4ca upstream.

The crash occurred because we were calling memzero_explicit() on an
already freed sess_data::iov[1] (ntlmsspblob) in sess_free_buffer().

Fix this by not calling memzero_explicit() on sess_data::iov[1] as
it's already by handled by callers.

Fixes: a4e430c8c8ba ("cifs: replace kfree() with kfree_sensitive() for sensitive data")
Reviewed-by: Enzo Matsumiya &lt;ematsumiya@suse.de&gt;
Signed-off-by: Paulo Alcantara (SUSE) &lt;pc@cjr.nz&gt;
Signed-off-by: Steve French &lt;stfrench@microsoft.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Yassine Oudjana</name>
<email>y.oudjana@protonmail.com</email>
</author>
<published>2022-11-07T15:33:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=7ee97ad1704ba7ed66f9b3917d70a4494cc80fea'/>
<id>urn:sha1:7ee97ad1704ba7ed66f9b3917d70a4494cc80fea</id>
<content type='text'>
commit 341fd15e2e18c24d5c738496cfc3d7a272241201 upstream.

Commit bf7571c00dca ("extcon: usbc-tusb320: Add USB TYPE-C support")
added an optional Type-C interface to the driver but missed to check
if it is in use when calling the IRQ handler. This causes an oops on
devices currently using the old extcon interface. Check if a Type-C
port is registered before calling the Type-C IRQ handler.

Fixes: bf7571c00dca ("extcon: usbc-tusb320: Add USB TYPE-C support")
Signed-off-by: Yassine Oudjana &lt;y.oudjana@protonmail.com&gt;
Reviewed-by: Marek Vasut &lt;marex@denx.de&gt;
Reviewed-by: Heikki Krogerus &lt;heikki.krogerus@linux.intel.com&gt;
Link: https://lore.kernel.org/r/20221107153317.657803-1-y.oudjana@protonmail.com
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>clk: renesas: r8a779f0: Fix SD0H clock name</title>
<updated>2022-12-31T12:26:54+00:00</updated>
<author>
<name>Geert Uytterhoeven</name>
<email>geert+renesas@glider.be</email>
</author>
<published>2022-10-12T07:02:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=9d63bf17345627cedb30a6fe1001411943c4e95c'/>
<id>urn:sha1:9d63bf17345627cedb30a6fe1001411943c4e95c</id>
<content type='text'>
commit 99c05a2b710f16ea592ccb63ef5fe5f1f6b15db9 upstream.

Correct the misspelled textual name of the SD0H clock.

Fixes: 9b5dd1ff705c6854 ("clk: renesas: r8a779f0: Add SDH0 clock")
Signed-off-by: Geert Uytterhoeven &lt;geert+renesas@glider.be&gt;
Reviewed-by: Wolfram Sang &lt;wsa+renesas@sang-engineering.com&gt;
Link: https://lore.kernel.org/r/1f682d338f133608f138ae87323707436ad8c748.1665558014.git.geert+renesas@glider.be
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
</feed>
