Home Home > GIT Browse > SLE12-SP5-AZURE
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJohannes Thumshirn <jthumshirn@suse.de>2019-08-21 10:46:07 +0200
committerJohannes Thumshirn <jthumshirn@suse.de>2019-08-21 10:46:07 +0200
commitca392f3e13ff337809caed2f6e461ebb88c9580d (patch)
tree564c164c944b9036a1f373ed50db86b19e67c519
parent81777d6aa92760ae90507a076b4035fc0d4862a8 (diff)
parenta5c4e7b8614bfe9647e087b6240d7f02374047c2 (diff)
Merge remote-tracking branch 'origin/SLE12-SP4' into SLE12-SP5
Conflicts: series.conf
-rw-r--r--patches.arch/powerpc-fadump-re-register-firmware-assisted-dump-if.patch10
-rw-r--r--patches.arch/powerpc-fadump-use-kstrtoint-to-handle-sysfs-store.patch77
-rw-r--r--patches.drivers/ibmvnic-Unmap-DMA-address-of-TX-descriptor-buffers-a.patch63
-rw-r--r--patches.fixes/0001-USB-CDC-fix-sanity-checks-in-CDC-union-parser.patch45
-rw-r--r--patches.fixes/0001-usb-cdc-acm-make-sure-a-refcount-is-taken-early-enou.patch56
-rw-r--r--patches.fixes/nvme-multipath-revalidate-nvme_ns_head-gendisk-in-nv.patch48
-rw-r--r--patches.fixes/xfs-clear-sb-s_fs_info-on-mount-failure.patch82
-rw-r--r--series.conf6
8 files changed, 382 insertions, 5 deletions
diff --git a/patches.arch/powerpc-fadump-re-register-firmware-assisted-dump-if.patch b/patches.arch/powerpc-fadump-re-register-firmware-assisted-dump-if.patch
index 2a99a71cb8..093078a2e2 100644
--- a/patches.arch/powerpc-fadump-re-register-firmware-assisted-dump-if.patch
+++ b/patches.arch/powerpc-fadump-re-register-firmware-assisted-dump-if.patch
@@ -1,4 +1,4 @@
-From f5aa3c72fe11280467d94e8d420b009b7acb074c Mon Sep 17 00:00:00 2001
+From 0823c68b054bca9dc321adea829af5cf36afb30b Mon Sep 17 00:00:00 2001
From: Hari Bathini <hbathini@linux.ibm.com>
Date: Fri, 14 Sep 2018 19:36:02 +0530
Subject: [PATCH] powerpc/fadump: re-register firmware-assisted dump if already
@@ -29,12 +29,12 @@ Acked-by: Michal Suchanek <msuchanek@suse.de>
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/powerpc/kernel/fadump.c b/arch/powerpc/kernel/fadump.c
-index fa4de264b747..0894ac5519b2 100644
+index a711d22339ea..761b28b1427d 100644
--- a/arch/powerpc/kernel/fadump.c
+++ b/arch/powerpc/kernel/fadump.c
-@@ -1435,8 +1435,8 @@ static ssize_t fadump_register_store(struct kobject *kobj,
+@@ -1444,8 +1444,8 @@ static ssize_t fadump_register_store(struct kobject *kobj,
break;
- case '1':
+ case 1:
if (fw_dump.dump_registered == 1) {
- ret = -EEXIST;
- goto unlock_out;
@@ -44,5 +44,5 @@ index fa4de264b747..0894ac5519b2 100644
/* Register Firmware-assisted dump */
ret = register_fadump();
--
-2.13.7
+2.22.0
diff --git a/patches.arch/powerpc-fadump-use-kstrtoint-to-handle-sysfs-store.patch b/patches.arch/powerpc-fadump-use-kstrtoint-to-handle-sysfs-store.patch
new file mode 100644
index 0000000000..57487f9273
--- /dev/null
+++ b/patches.arch/powerpc-fadump-use-kstrtoint-to-handle-sysfs-store.patch
@@ -0,0 +1,77 @@
+From dcdc46794b7bb76733d9792cca2f45871d66881f Mon Sep 17 00:00:00 2001
+From: Michal Suchanek <msuchanek@suse.de>
+Date: Mon, 26 Jun 2017 16:06:01 +0200
+Subject: [PATCH] powerpc/fadump: use kstrtoint to handle sysfs store
+
+References: bsc#1146376
+Patch-mainline: v4.15-rc1
+Git-commit: dcdc46794b7bb76733d9792cca2f45871d66881f
+
+Currently sysfs store handlers in fadump use if buf[0] == 'char'.
+
+This means input "100foo" is interpreted as '1' and "01" as '0'.
+
+Change to kstrtoint so leading zeroes and the like is handled in
+expected way.
+
+Signed-off-by: Michal Suchanek <msuchanek@suse.de>
+Acked-by: Hari Bathini <hbathini@linux.vnet.ibm.com>
+Signed-off-by: Michal Suchanek <a class="moz-txt-link-rfc2396E" href="mailto:msuchanek@suse.de">&lt;msuchanek@suse.de&gt;</a></pre>
+Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
+---
+ arch/powerpc/kernel/fadump.c | 17 +++++++++++++----
+ 1 file changed, 13 insertions(+), 4 deletions(-)
+
+diff --git a/arch/powerpc/kernel/fadump.c b/arch/powerpc/kernel/fadump.c
+index e1431800bfb9..04ea5c04fd24 100644
+--- a/arch/powerpc/kernel/fadump.c
++++ b/arch/powerpc/kernel/fadump.c
+@@ -1270,10 +1270,15 @@ static ssize_t fadump_release_memory_store(struct kobject *kobj,
+ struct kobj_attribute *attr,
+ const char *buf, size_t count)
+ {
++ int input = -1;
++
+ if (!fw_dump.dump_active)
+ return -EPERM;
+
+- if (buf[0] == '1') {
++ if (kstrtoint(buf, 0, &input))
++ return -EINVAL;
++
++ if (input == 1) {
+ /*
+ * Take away the '/proc/vmcore'. We are releasing the dump
+ * memory, hence it will not be valid anymore.
+@@ -1307,21 +1312,25 @@ static ssize_t fadump_register_store(struct kobject *kobj,
+ const char *buf, size_t count)
+ {
+ int ret = 0;
++ int input = -1;
+
+ if (!fw_dump.fadump_enabled || fdm_active)
+ return -EPERM;
+
++ if (kstrtoint(buf, 0, &input))
++ return -EINVAL;
++
+ mutex_lock(&fadump_mutex);
+
+- switch (buf[0]) {
+- case '0':
++ switch (input) {
++ case 0:
+ if (fw_dump.dump_registered == 0) {
+ goto unlock_out;
+ }
+ /* Un-register Firmware-assisted dump */
+ fadump_unregister_dump(&fdm);
+ break;
+- case '1':
++ case 1:
+ if (fw_dump.dump_registered == 1) {
+ ret = -EEXIST;
+ goto unlock_out;
+--
+2.22.0
+
diff --git a/patches.drivers/ibmvnic-Unmap-DMA-address-of-TX-descriptor-buffers-a.patch b/patches.drivers/ibmvnic-Unmap-DMA-address-of-TX-descriptor-buffers-a.patch
new file mode 100644
index 0000000000..ddee90a1c9
--- /dev/null
+++ b/patches.drivers/ibmvnic-Unmap-DMA-address-of-TX-descriptor-buffers-a.patch
@@ -0,0 +1,63 @@
+From 80f0fe0934cd3daa13a5e4d48a103f469115b160 Mon Sep 17 00:00:00 2001
+From: Thomas Falcon <tlfalcon@linux.ibm.com>
+Date: Wed, 14 Aug 2019 14:57:05 -0500
+Subject: [PATCH] ibmvnic: Unmap DMA address of TX descriptor buffers after use
+
+References: bsc#1146351 ltc#180726
+Patch-mainline: v5.3 or v5.3-rc6 (next release)
+Git-commit: 80f0fe0934cd3daa13a5e4d48a103f469115b160
+
+There's no need to wait until a completion is received to unmap
+TX descriptor buffers that have been passed to the hypervisor.
+Instead unmap it when the hypervisor call has completed. This patch
+avoids the possibility that a buffer will not be unmapped because
+a TX completion is lost or mishandled.
+
+Reported-by: Abdul Haleem <abdhalee@linux.vnet.ibm.com>
+Tested-by: Devesh K. Singh <devesh_singh@in.ibm.com>
+Signed-off-by: Thomas Falcon <tlfalcon@linux.ibm.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Acked-by: Michal Suchanek <msuchanek@suse.de>
+---
+ drivers/net/ethernet/ibm/ibmvnic.c | 11 ++---------
+ 1 file changed, 2 insertions(+), 9 deletions(-)
+
+diff --git a/drivers/net/ethernet/ibm/ibmvnic.c b/drivers/net/ethernet/ibm/ibmvnic.c
+index 3da680073265..cebd20f3128d 100644
+--- a/drivers/net/ethernet/ibm/ibmvnic.c
++++ b/drivers/net/ethernet/ibm/ibmvnic.c
+@@ -1568,6 +1568,8 @@ static netdev_tx_t ibmvnic_xmit(struct sk_buff *skb, struct net_device *netdev)
+ lpar_rc = send_subcrq_indirect(adapter, handle_array[queue_num],
+ (u64)tx_buff->indir_dma,
+ (u64)num_entries);
++ dma_unmap_single(dev, tx_buff->indir_dma,
++ sizeof(tx_buff->indir_arr), DMA_TO_DEVICE);
+ } else {
+ tx_buff->num_entries = num_entries;
+ lpar_rc = send_subcrq(adapter, handle_array[queue_num],
+@@ -2788,7 +2790,6 @@ static int ibmvnic_complete_tx(struct ibmvnic_adapter *adapter,
+ union sub_crq *next;
+ int index;
+ int i, j;
+- u8 *first;
+
+ restart_loop:
+ while (pending_scrq(adapter, scrq)) {
+@@ -2818,14 +2819,6 @@ static int ibmvnic_complete_tx(struct ibmvnic_adapter *adapter,
+
+ txbuff->data_dma[j] = 0;
+ }
+- /* if sub_crq was sent indirectly */
+- first = &txbuff->indir_arr[0].generic.first;
+- if (*first == IBMVNIC_CRQ_CMD) {
+- dma_unmap_single(dev, txbuff->indir_dma,
+- sizeof(txbuff->indir_arr),
+- DMA_TO_DEVICE);
+- *first = 0;
+- }
+
+ if (txbuff->last_frag) {
+ dev_kfree_skb_any(txbuff->skb);
+--
+2.22.0
+
diff --git a/patches.fixes/0001-USB-CDC-fix-sanity-checks-in-CDC-union-parser.patch b/patches.fixes/0001-USB-CDC-fix-sanity-checks-in-CDC-union-parser.patch
new file mode 100644
index 0000000000..b3327c93f4
--- /dev/null
+++ b/patches.fixes/0001-USB-CDC-fix-sanity-checks-in-CDC-union-parser.patch
@@ -0,0 +1,45 @@
+From 54364278fb3cabdea51d6398b07c87415065b3fc Mon Sep 17 00:00:00 2001
+From: Oliver Neukum <oneukum@suse.com>
+Date: Tue, 13 Aug 2019 11:35:41 +0200
+Subject: [PATCH] USB: CDC: fix sanity checks in CDC union parser
+Git-commit: 54364278fb3cabdea51d6398b07c87415065b3fc
+Patch-mainline: v5.3-rc5
+References: bsc#1142635
+
+A few checks checked for the size of the pointer to a structure
+instead of the structure itself. Copy & paste issue presumably.
+
+Fixes: e4c6fb7794982 ("usbnet: move the CDC parser into USB core")
+Cc: stable <stable@vger.kernel.org>
+Reported-by: syzbot+45a53506b65321c1fe91@syzkaller.appspotmail.com
+Signed-off-by: Oliver Neukum <oneukum@suse.com>
+Link: https://lore.kernel.org/r/20190813093541.18889-1-oneukum@suse.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/usb/core/message.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/drivers/usb/core/message.c b/drivers/usb/core/message.c
+index e844bb7b5676..5adf489428aa 100644
+--- a/drivers/usb/core/message.c
++++ b/drivers/usb/core/message.c
+@@ -2218,14 +2218,14 @@ int cdc_parse_cdc_header(struct usb_cdc_parsed_header *hdr,
+ (struct usb_cdc_dmm_desc *)buffer;
+ break;
+ case USB_CDC_MDLM_TYPE:
+- if (elength < sizeof(struct usb_cdc_mdlm_desc *))
++ if (elength < sizeof(struct usb_cdc_mdlm_desc))
+ goto next_desc;
+ if (desc)
+ return -EINVAL;
+ desc = (struct usb_cdc_mdlm_desc *)buffer;
+ break;
+ case USB_CDC_MDLM_DETAIL_TYPE:
+- if (elength < sizeof(struct usb_cdc_mdlm_detail_desc *))
++ if (elength < sizeof(struct usb_cdc_mdlm_detail_desc))
+ goto next_desc;
+ if (detail)
+ return -EINVAL;
+--
+2.16.4
+
diff --git a/patches.fixes/0001-usb-cdc-acm-make-sure-a-refcount-is-taken-early-enou.patch b/patches.fixes/0001-usb-cdc-acm-make-sure-a-refcount-is-taken-early-enou.patch
new file mode 100644
index 0000000000..a57409795f
--- /dev/null
+++ b/patches.fixes/0001-usb-cdc-acm-make-sure-a-refcount-is-taken-early-enou.patch
@@ -0,0 +1,56 @@
+From c52873e5a1ef72f845526d9f6a50704433f9c625 Mon Sep 17 00:00:00 2001
+From: Oliver Neukum <oneukum@suse.com>
+Date: Thu, 8 Aug 2019 16:21:19 +0200
+Subject: [PATCH] usb: cdc-acm: make sure a refcount is taken early enough
+Git-commit: c52873e5a1ef72f845526d9f6a50704433f9c625
+Patch-mainline: v5.3-rc5
+References: bsc#1142635
+
+destroy() will decrement the refcount on the interface, so that
+it needs to be taken so early that it never undercounts.
+
+Fixes: 7fb57a019f94e ("USB: cdc-acm: Fix potential deadlock (lockdep warning)")
+Cc: stable <stable@vger.kernel.org>
+Reported-and-tested-by: syzbot+1b2449b7b5dc240d107a@syzkaller.appspotmail.com
+Signed-off-by: Oliver Neukum <oneukum@suse.com>
+Link: https://lore.kernel.org/r/20190808142119.7998-1-oneukum@suse.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/usb/class/cdc-acm.c | 12 +++++++-----
+ 1 file changed, 7 insertions(+), 5 deletions(-)
+
+--- a/drivers/usb/class/cdc-acm.c
++++ b/drivers/usb/class/cdc-acm.c
+@@ -1342,10 +1342,6 @@ made_compressed_probe:
+ if (acm == NULL)
+ goto alloc_fail;
+
+- minor = acm_alloc_minor(acm);
+- if (minor < 0)
+- goto alloc_fail1;
+-
+ ctrlsize = usb_endpoint_maxp(epctrl);
+ readsize = usb_endpoint_maxp(epread) *
+ (quirks == SINGLE_RX_URB ? 1 : 2);
+@@ -1353,6 +1349,13 @@ made_compressed_probe:
+ acm->writesize = usb_endpoint_maxp(epwrite) * 20;
+ acm->control = control_interface;
+ acm->data = data_interface;
++
++ usb_get_intf(acm->control); /* undone in destruct() */
++
++ minor = acm_alloc_minor(acm);
++ if (minor < 0)
++ goto alloc_fail1;
++
+ acm->minor = minor;
+ acm->dev = usb_dev;
+ if (h.usb_cdc_acm_descriptor)
+@@ -1501,7 +1504,6 @@ skip_countries:
+ usb_driver_claim_interface(&acm_driver, data_interface, acm);
+ usb_set_intfdata(data_interface, acm);
+
+- usb_get_intf(control_interface);
+ tty_dev = tty_port_register_device(&acm->port, acm_tty_driver, minor,
+ &control_interface->dev);
+ if (IS_ERR(tty_dev)) {
diff --git a/patches.fixes/nvme-multipath-revalidate-nvme_ns_head-gendisk-in-nv.patch b/patches.fixes/nvme-multipath-revalidate-nvme_ns_head-gendisk-in-nv.patch
new file mode 100644
index 0000000000..53a501574d
--- /dev/null
+++ b/patches.fixes/nvme-multipath-revalidate-nvme_ns_head-gendisk-in-nv.patch
@@ -0,0 +1,48 @@
+From fab7772bfbcfe8fb8e3e352a6a8fcaf044cded17 Mon Sep 17 00:00:00 2001
+From: Anthony Iliopoulos <ailiopoulos@suse.com>
+Date: Mon, 29 Jul 2019 14:40:40 +0200
+Subject: [PATCH] nvme-multipath: revalidate nvme_ns_head gendisk in
+ nvme_validate_ns
+Git-commit: fab7772bfbcfe8fb8e3e352a6a8fcaf044cded17
+Patch-mainline: v5.3-rc5
+References: bsc#1120876
+
+When CONFIG_NVME_MULTIPATH is set, only the hidden gendisk associated
+with the per-controller ns is run through revalidate_disk when a
+rescan is triggered, while the visible blockdev never gets its size
+(bdev->bd_inode->i_size) updated to reflect any capacity changes that
+may have occurred.
+
+This prevents online resizing of nvme block devices and in extension of
+any filesystems atop that will are unable to expand while mounted, as
+userspace relies on the blockdev size for obtaining the disk capacity
+(via BLKGETSIZE/64 ioctls).
+
+Fix this by explicitly revalidating the actual namespace gendisk in
+addition to the per-controller gendisk, when multipath is enabled.
+
+Signed-off-by: Anthony Iliopoulos <ailiopoulos@suse.com>
+Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
+Reviewed-by: Johannes Thumshirn <jthumshirn@suse.de>
+Signed-off-by: Christoph Hellwig <hch@lst.de>
+Acked-by: Anthony Iliopoulos <ailiopoulos@suse.com>
+
+---
+ drivers/nvme/host/core.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/drivers/nvme/host/core.c b/drivers/nvme/host/core.c
+index 8f3fbe5ca937..80c7a7ee240b 100644
+--- a/drivers/nvme/host/core.c
++++ b/drivers/nvme/host/core.c
+@@ -1715,6 +1715,7 @@ static void __nvme_revalidate_disk(struct gendisk *disk, struct nvme_id_ns *id)
+ if (ns->head->disk) {
+ nvme_update_disk_info(ns->head->disk, ns, id);
+ blk_queue_stack_limits(ns->head->disk->queue, ns->queue);
++ revalidate_disk(ns->head->disk);
+ }
+ #endif
+ }
+--
+2.16.4
+
diff --git a/patches.fixes/xfs-clear-sb-s_fs_info-on-mount-failure.patch b/patches.fixes/xfs-clear-sb-s_fs_info-on-mount-failure.patch
new file mode 100644
index 0000000000..555a0f1f71
--- /dev/null
+++ b/patches.fixes/xfs-clear-sb-s_fs_info-on-mount-failure.patch
@@ -0,0 +1,82 @@
+From c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82 Mon Sep 17 00:00:00 2001
+From: Dave Chinner <dchinner@redhat.com>
+Date: Thu, 10 May 2018 21:50:23 -0700
+Subject: [PATCH] xfs: clear sb->s_fs_info on mount failure
+Git-commit: c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
+Patch-mainline: v4.18-rc1
+References: bsc#1146285, CVE-2018-20976
+
+We recently had an oops reported on a 4.14 kernel in
+xfs_reclaim_inodes_count() where sb->s_fs_info pointed to garbage
+and so the m_perag_tree lookup walked into lala land.
+
+Essentially, the machine was under memory pressure when the mount
+was being run, xfs_fs_fill_super() failed after allocating the
+xfs_mount and attaching it to sb->s_fs_info. It then cleaned up and
+freed the xfs_mount, but the sb->s_fs_info field still pointed to
+the freed memory. Hence when the superblock shrinker then ran
+it fell off the bad pointer.
+
+With the superblock shrinker problem fixed at teh VFS level, this
+stale s_fs_info pointer is still a problem - we use it
+unconditionally in ->put_super when the superblock is being torn
+down, and hence we can still trip over it after a ->fill_super
+call failure. Hence we need to clear s_fs_info if
+xfs-fs_fill_super() fails, and we need to check if it's valid in
+the places it can potentially be dereferenced after a ->fill_super
+failure.
+
+Signed-off-by: Dave Chinner <dchinner@redhat.com>
+Reviewed-by: Darrick J. Wong <darrick.wong@oracle.com>
+Signed-off-by: Darrick J. Wong <darrick.wong@oracle.com>
+Acked-by: Anthony Iliopoulos <ailiopoulos@suse.com>
+
+---
+ fs/xfs/xfs_super.c | 10 ++++++++++
+ 1 file changed, 10 insertions(+)
+
+diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c
+index f19fe291356e..39e5ec3d407f 100644
+--- a/fs/xfs/xfs_super.c
++++ b/fs/xfs/xfs_super.c
+@@ -1772,6 +1772,7 @@ xfs_fs_fill_super(
+ out_close_devices:
+ xfs_close_devices(mp);
+ out_free_fsname:
++ sb->s_fs_info = NULL;
+ xfs_free_fsname(mp);
+ kfree(mp);
+ out:
+@@ -1789,6 +1790,10 @@ xfs_fs_put_super(
+ {
+ struct xfs_mount *mp = XFS_M(sb);
+
++ /* if ->fill_super failed, we have no mount to tear down */
++ if (!sb->s_fs_info)
++ return;
++
+ xfs_notice(mp, "Unmounting Filesystem");
+ xfs_filestream_unmount(mp);
+ xfs_unmountfs(mp);
+@@ -1798,6 +1803,8 @@ xfs_fs_put_super(
+ xfs_destroy_percpu_counters(mp);
+ xfs_destroy_mount_workqueues(mp);
+ xfs_close_devices(mp);
++
++ sb->s_fs_info = NULL;
+ xfs_free_fsname(mp);
+ kfree(mp);
+ }
+@@ -1817,6 +1824,9 @@ xfs_fs_nr_cached_objects(
+ struct super_block *sb,
+ struct shrink_control *sc)
+ {
++ /* Paranoia: catch incorrect calls during mount setup or teardown */
++ if (WARN_ON_ONCE(!sb->s_fs_info))
++ return 0;
+ return xfs_reclaim_inodes_count(XFS_M(sb));
+ }
+
+--
+2.16.4
+
diff --git a/series.conf b/series.conf
index 955db55f76..633c22d336 100644
--- a/series.conf
+++ b/series.conf
@@ -16185,6 +16185,7 @@
patches.arch/powerpc-powernv-npu-Don-t-explicitly-flush-nmmu-tlb.patch
patches.fixes/powerpc-lib-Implement-PMEM-API.patch
patches.fixes/powerpc-lib-Implement-UACCESS_FLUSHCACHE-API.patch
+ patches.arch/powerpc-fadump-use-kstrtoint-to-handle-sysfs-store.patch
patches.arch/powerpc-signal-Properly-handle-return-value-from-upr.patch
patches.arch/powerpc-Fix-DABR-match-on-hash-based-systems.patch
patches.arch/powerpc-64s-hash-Fix-512T-hint-detection-to-use-128T.patch
@@ -30771,6 +30772,7 @@
patches.suse/xfs-move-generic_write_sync-calls-inwards.patch
patches.suse/iomap-iomap_dio_rw-handles-all-sync-writes.patch
patches.suse/iomap-use-fua-for-pure-data-o_dsync-dio-writes.patch
+ patches.fixes/xfs-clear-sb-s_fs_info-on-mount-failure.patch
patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
patches.fixes/dax-change-bdev_dax_supported-to-support-boolean-ret.patch
patches.drivers/crypto-caam-fix-DMA-mapping-dir-for-generated-IV
@@ -48855,6 +48857,10 @@
patches.drivers/ALSA-hda-Add-a-generic-reboot_notify.patch
patches.drivers/ALSA-usb-audio-Fix-an-OOB-bug-in-parse_audio_mixer_u.patch
patches.drivers/ALSA-usb-audio-Fix-a-stack-buffer-overflow-bug-in-ch.patch
+ patches.fixes/nvme-multipath-revalidate-nvme_ns_head-gendisk-in-nv.patch
+ patches.fixes/0001-usb-cdc-acm-make-sure-a-refcount-is-taken-early-enou.patch
+ patches.fixes/0001-USB-CDC-fix-sanity-checks-in-CDC-union-parser.patch
+ patches.drivers/ibmvnic-Unmap-DMA-address-of-TX-descriptor-buffers-a.patch
# tip/tip
patches.fixes/x86-kconfig-remove-x86_direct_gbpages-dependency-on-debug_pagealloc.patch