+++ /dev/null
-From c183165f87a486d5879f782c05a23c179c3794ab Mon Sep 17 00:00:00 2001
-From: Geliang Tang <tanggeliang@kylinos.cn>
-Date: Fri, 28 Mar 2025 15:27:18 +0100
-Subject: selftests: mptcp: close fd_in before returning in main_loop
-
-From: Geliang Tang <tanggeliang@kylinos.cn>
-
-commit c183165f87a486d5879f782c05a23c179c3794ab upstream.
-
-The file descriptor 'fd_in' is opened when cfg_input is configured, but
-not closed in main_loop(), this patch fixes it.
-
-Fixes: 05be5e273c84 ("selftests: mptcp: add disconnect tests")
-Cc: stable@vger.kernel.org
-Co-developed-by: Cong Liu <liucong2@kylinos.cn>
-Signed-off-by: Cong Liu <liucong2@kylinos.cn>
-Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
-Reviewed-by: Matthieu Baerts (NGI0) <matttbe@kernel.org>
-Signed-off-by: Matthieu Baerts (NGI0) <matttbe@kernel.org>
-Link: https://patch.msgid.link/20250328-net-mptcp-misc-fixes-6-15-v1-3-34161a482a7f@kernel.org
-Signed-off-by: Jakub Kicinski <kuba@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- tools/testing/selftests/net/mptcp/mptcp_connect.c | 7 +++++--
- 1 file changed, 5 insertions(+), 2 deletions(-)
-
---- a/tools/testing/selftests/net/mptcp/mptcp_connect.c
-+++ b/tools/testing/selftests/net/mptcp/mptcp_connect.c
-@@ -734,7 +734,7 @@ static int copyfd_io(int infd, int peerf
- }
-
- if (ret)
-- return ret;
-+ goto out;
-
- if (cfg_time) {
- unsigned int delta_ms;
-@@ -754,7 +754,10 @@ static int copyfd_io(int infd, int peerf
- fprintf(stderr, "%d", delta_ms);
- }
-
-- return 0;
-+out:
-+ if (cfg_input)
-+ close(fd_in);
-+ return ret;
- }
-
- static void check_sockaddr(int pf, struct sockaddr_storage *ss,
pci-brcmstb-fix-missing-of_node_put-in-brcm_pcie_probe.patch
pci-fix-reference-leak-in-pci_alloc_child_bus.patch
pinctrl-qcom-clear-latched-interrupt-status-when-changing-irq-type.patch
-selftests-mptcp-close-fd_in-before-returning-in-main_loop.patch
arm64-errata-add-newer-arm-cores-to-the-spectre_bhb_loop_affected-lists.patch
acpi-platform-profile-fix-cfi-violation-when-accessing-sysfs-files.patch
x86-e820-fix-handling-of-subpage-regions-when-calculating-nosave-ranges-in-e820__register_nosave_regions.patch
+++ /dev/null
-From ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 Mon Sep 17 00:00:00 2001
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-Date: Fri, 17 Jan 2025 14:18:52 +0000
-Subject: scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get
-
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-
-commit ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 upstream.
-
-The driver leaks the device reference taken with
-of_find_device_by_node(). Fix the leak by using devm_of_qcom_ice_get().
-
-Fixes: 56541c7c4468 ("scsi: ufs: ufs-qcom: Switch to the new ICE API")
-Cc: stable@vger.kernel.org
-Signed-off-by: Tudor Ambarus <tudor.ambarus@linaro.org>
-Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
-Reviewed-by: Abel Vesa <abel.vesa@linaro.org>
-Acked-by: Martin K. Petersen <martin.petersen@oracle.com> # SCSI
-Reviewed-by: Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org>
-Link: https://lore.kernel.org/r/20250117-qcom-ice-fix-dev-leak-v2-3-1ffa5b6884cb@linaro.org
-Signed-off-by: Bjorn Andersson <andersson@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/ufs/host/ufs-qcom.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/drivers/ufs/host/ufs-qcom.c
-+++ b/drivers/ufs/host/ufs-qcom.c
-@@ -118,7 +118,7 @@ static int ufs_qcom_ice_init(struct ufs_
- struct device *dev = hba->dev;
- struct qcom_ice *ice;
-
-- ice = of_qcom_ice_get(dev);
-+ ice = devm_of_qcom_ice_get(dev);
- if (ice == ERR_PTR(-EOPNOTSUPP)) {
- dev_warn(dev, "Disabling inline encryption support\n");
- ice = NULL;
kvm-ppc-enable-cap_spapr_tce_vfio-on-pseries-kvm-guests.patch
kvm-x86-explicitly-zero-initialize-on-stack-cpuid-unions.patch
kvm-x86-acquire-srcu-in-kvm_get_mp_state-to-protect-guest-memory-accesses.patch
-scsi-ufs-qcom-fix-dev-reference-leaked-through-of_qcom_ice_get.patch
landlock-move-code-to-ease-future-backports.patch
landlock-add-the-errata-interface.patch
landlock-add-erratum-for-tcp-fix.patch
+++ /dev/null
-From ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 Mon Sep 17 00:00:00 2001
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-Date: Fri, 17 Jan 2025 14:18:52 +0000
-Subject: scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get
-
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-
-commit ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 upstream.
-
-The driver leaks the device reference taken with
-of_find_device_by_node(). Fix the leak by using devm_of_qcom_ice_get().
-
-Fixes: 56541c7c4468 ("scsi: ufs: ufs-qcom: Switch to the new ICE API")
-Cc: stable@vger.kernel.org
-Signed-off-by: Tudor Ambarus <tudor.ambarus@linaro.org>
-Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
-Reviewed-by: Abel Vesa <abel.vesa@linaro.org>
-Acked-by: Martin K. Petersen <martin.petersen@oracle.com> # SCSI
-Reviewed-by: Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org>
-Link: https://lore.kernel.org/r/20250117-qcom-ice-fix-dev-leak-v2-3-1ffa5b6884cb@linaro.org
-Signed-off-by: Bjorn Andersson <andersson@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/ufs/host/ufs-qcom.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/drivers/ufs/host/ufs-qcom.c
-+++ b/drivers/ufs/host/ufs-qcom.c
-@@ -118,7 +118,7 @@ static int ufs_qcom_ice_init(struct ufs_
- struct device *dev = hba->dev;
- struct qcom_ice *ice;
-
-- ice = of_qcom_ice_get(dev);
-+ ice = devm_of_qcom_ice_get(dev);
- if (ice == ERR_PTR(-EOPNOTSUPP)) {
- dev_warn(dev, "Disabling inline encryption support\n");
- ice = NULL;
kvm-ppc-enable-cap_spapr_tce_vfio-on-pseries-kvm-guests.patch
kvm-x86-explicitly-zero-initialize-on-stack-cpuid-unions.patch
kvm-x86-acquire-srcu-in-kvm_get_mp_state-to-protect-guest-memory-accesses.patch
-scsi-ufs-qcom-fix-dev-reference-leaked-through-of_qcom_ice_get.patch
landlock-move-code-to-ease-future-backports.patch
landlock-add-the-errata-interface.patch
landlock-add-erratum-for-tcp-fix.patch
+++ /dev/null
-From ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 Mon Sep 17 00:00:00 2001
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-Date: Fri, 17 Jan 2025 14:18:52 +0000
-Subject: scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get
-
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-
-commit ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 upstream.
-
-The driver leaks the device reference taken with
-of_find_device_by_node(). Fix the leak by using devm_of_qcom_ice_get().
-
-Fixes: 56541c7c4468 ("scsi: ufs: ufs-qcom: Switch to the new ICE API")
-Cc: stable@vger.kernel.org
-Signed-off-by: Tudor Ambarus <tudor.ambarus@linaro.org>
-Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
-Reviewed-by: Abel Vesa <abel.vesa@linaro.org>
-Acked-by: Martin K. Petersen <martin.petersen@oracle.com> # SCSI
-Reviewed-by: Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org>
-Link: https://lore.kernel.org/r/20250117-qcom-ice-fix-dev-leak-v2-3-1ffa5b6884cb@linaro.org
-Signed-off-by: Bjorn Andersson <andersson@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/ufs/host/ufs-qcom.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/drivers/ufs/host/ufs-qcom.c
-+++ b/drivers/ufs/host/ufs-qcom.c
-@@ -125,7 +125,7 @@ static int ufs_qcom_ice_init(struct ufs_
- int err;
- int i;
-
-- ice = of_qcom_ice_get(dev);
-+ ice = devm_of_qcom_ice_get(dev);
- if (ice == ERR_PTR(-EOPNOTSUPP)) {
- dev_warn(dev, "Disabling inline encryption support\n");
- ice = NULL;
kvm-ppc-enable-cap_spapr_tce_vfio-on-pseries-kvm-guests.patch
kvm-x86-explicitly-zero-initialize-on-stack-cpuid-unions.patch
kvm-x86-acquire-srcu-in-kvm_get_mp_state-to-protect-guest-memory-accesses.patch
-scsi-ufs-qcom-fix-dev-reference-leaked-through-of_qcom_ice_get.patch
landlock-move-code-to-ease-future-backports.patch
landlock-add-the-errata-interface.patch
landlock-add-erratum-for-tcp-fix.patch
+++ /dev/null
-From ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 Mon Sep 17 00:00:00 2001
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-Date: Fri, 17 Jan 2025 14:18:52 +0000
-Subject: scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get
-
-From: Tudor Ambarus <tudor.ambarus@linaro.org>
-
-commit ded40f32b55f7f2f4ed9627dd3c37a1fe89ed8c6 upstream.
-
-The driver leaks the device reference taken with
-of_find_device_by_node(). Fix the leak by using devm_of_qcom_ice_get().
-
-Fixes: 56541c7c4468 ("scsi: ufs: ufs-qcom: Switch to the new ICE API")
-Cc: stable@vger.kernel.org
-Signed-off-by: Tudor Ambarus <tudor.ambarus@linaro.org>
-Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
-Reviewed-by: Abel Vesa <abel.vesa@linaro.org>
-Acked-by: Martin K. Petersen <martin.petersen@oracle.com> # SCSI
-Reviewed-by: Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org>
-Link: https://lore.kernel.org/r/20250117-qcom-ice-fix-dev-leak-v2-3-1ffa5b6884cb@linaro.org
-Signed-off-by: Bjorn Andersson <andersson@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/ufs/host/ufs-qcom.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/drivers/ufs/host/ufs-qcom.c
-+++ b/drivers/ufs/host/ufs-qcom.c
-@@ -121,7 +121,7 @@ static int ufs_qcom_ice_init(struct ufs_
- struct device *dev = hba->dev;
- struct qcom_ice *ice;
-
-- ice = of_qcom_ice_get(dev);
-+ ice = devm_of_qcom_ice_get(dev);
- if (ice == ERR_PTR(-EOPNOTSUPP)) {
- dev_warn(dev, "Disabling inline encryption support\n");
- ice = NULL;
gve-handle-overflow-when-reporting-tx-consumed-descriptors.patch
kvm-x86-explicitly-zero-initialize-on-stack-cpuid-unions.patch
kvm-x86-acquire-srcu-in-kvm_get_mp_state-to-protect-guest-memory-accesses.patch
-scsi-ufs-qcom-fix-dev-reference-leaked-through-of_qcom_ice_get.patch
ntb-use-64-bit-arithmetic-for-the-msi-doorbell-mask.patch
of-irq-fix-device-node-refcount-leakage-in-api-of_irq_parse_one.patch
of-irq-fix-device-node-refcount-leakage-in-api-of_irq_parse_raw.patch