Commit a709593c authored by Joey Lin's avatar Joey Lin
Browse files

Merge android13-5.10 into android13-5.10-pixel-staging-tm-qpr3

Merge SHA:
cc8b1052 UPSTREAM: esp: limit skb_page_frag_refill use to a single page

Bug: 255246572
Bug: 146449535 (ACK)
Bug: 161946584 (ACK)
Bug: 200287549 (ACK)
Bug: 202785178 (ACK)
Bug: 222074706 (ACK)
Bug: 222078981 (ACK)
Bug: 228992292 (ACK)
Bug: 229268271 (ACK)
Bug: 232939090 (ACK)
Bug: 233352819 (ACK)
Bug: 239396464 (ACK)
Bug: 245454030 (ACK)
Bug: 248008710 (ACK)
Bug: 250646733 (ACK)
Bug: 251067658 (ACK)
Bug: 254441685 (ACK)
Bug: 255678834 (ACK)
Bug: 259137060 (ACK)
Bug: 259900798 (ACK)
Bug: 260978220 (ACK)
Bug: 261354911 (ACK)
Bug: 261841282 (ACK)
Bug: KASAN: double-free or invalid-free in fw_dnld_over (ACK)
Bug: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605 (ACK)
Bug: KASAN: double-free or invalid-free in ubifs_free_inode+0x4f/0x70 (ACK)
Bug: KASAN: null-ptr-deref in __free_pages+0x1f/0x1b0 mm/page_alloc.c:5473 (ACK)
Bug: KASAN: null-ptr-deref in find_match.part.0+0x70/0x134 (ACK)
Bug: KASAN: null-ptr-deref in nft_trans_destroy+0x26/0x59 (ACK)
Bug: KASAN: slab-out-of-bounds in __nla_validate_parse+0x1258/0x2010 (ACK)
Bug: KASAN: slab-out-of-bounds in ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k] (ACK)
Bug: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0 (ACK)
Bug: KASAN: slab-out-of-bounds in decrypt_internal+0x385/0xc40 [tls] (ACK)
Bug: KASAN: slab-out-of-bounds in ecc_sw_hamming_calculate+0x1dc/0x7d0 (ACK)
Bug: KASAN: slab-out-of-bounds in exfat_clear_bitmap+0x147/0x490 fs/exfat/balloc.c:174 (ACK)
Bug: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] (ACK)
Bug: KASAN: slab-out-of-bounds in netlbl_bitmap_walk+0x3c/0xd0 (ACK)
Bug: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10] (ACK)
Bug: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid] (ACK)
Bug: KASAN: slab-out-of-bounds in reserve_sfa_size+0x1ba/0x380 [openvswitch] (ACK)
Bug: KASAN: slab-out-of-bounds in strcmp+0x9b/0xb0 (ACK)
Bug: KASAN: stack-out-of-bounds in get_wchan+0x188/0x250 (ACK)
Bug: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:225 [inline] (ACK)
Bug: KASAN: stack-out-of-bounds in packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489 (ACK)
Bug: KASAN: stack-out-of-bounds in syscall_stub_data+0x70/0xe0 (ACK)
Bug: KASAN: stack-out-of-bounds in trace_event_raw_event_spmi_read_end+0x1d0/0x234 (ACK)
Bug: KASAN: stack-out-of-bounds in unwind_frame+0x508/0x870 (ACK)
Bug: KASAN: use-after-free in __bfq_deactivate_entity+0x9cb/0xa50 (ACK)
Bug: KASAN: use-after-free in __ext4_find_entry+0xdca/0x1210 fs/ext4/namei.c:1553 (ACK)
Bug: KASAN: use-after-free in __list_del_entry_valid+0x13d/0x160 (ACK)
Bug: KASAN: use-after-free in __run_timers.part.0+0x170/0x470 (ACK)
Bug: KASAN: use-after-free in __thermal_cooling_device_register+0x75b/0xa90 (ACK)
Bug: KASAN: use-after-free in _raw_spin_lock+0x5a/0x110 (ACK)
Bug: KASAN: use-after-free in _raw_spin_lock+0xa8/0x150 (ACK)
Bug: KASAN: use-after-free in ax25_send_control+0x43/0x210 (ACK)
Bug: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320 (ACK)
Bug: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80 (ACK)
Bug: KASAN: use-after-free in epic_rx+0xa6/0x7e0 [epic100] (ACK)
Bug: KASAN: use-after-free in expire_timers+0x144/0x320 (ACK)
Bug: KASAN: use-after-free in ext4_rename_dir_prepare+0x152/0x220 (ACK)
Bug: KASAN: use-after-free in ext4_search_dir fs/ext4/namei.c:1394 [inline] (ACK)
Bug: KASAN: use-after-free in ext4_xattr_set_entry+0x18ab/0x3500 (ACK)
Bug: KASAN: use-after-free in hci_send_acl+0xaba/0xc50 (ACK)
Bug: KASAN: use-after-free in ip_mc_sf_allow+0x6bb/0x6d0 net/ipv4/igmp.c:2655 (ACK)
Bug: KASAN: use-after-free in irq_work_run_list (ACK)
Bug: KASAN: use-after-free in jffs2_clear_xattr_subsystem+0x95/0x6ac (ACK)
Bug: KASAN: use-after-free in mlxsw_sp_acl_tcam_vregion_rehash_intrvl_get+0xbd/0xd0 drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c:904 (ACK)
Bug: KASAN: use-after-free in mutex_lock+0x94/0x110 (ACK)
Bug: KASAN: use-after-free in ntfs_ucsncmp+0x123/0x130 (ACK)
Bug: KASAN: use-after-free in post_one_notification.isra.0+0x62e/0x840 (ACK)
Bug: KASAN: use-after-free in refcount_dec_and_test+0x20/0xd0 (ACK)
Bug: KASAN: use-after-free in refill_work+0x43/0xd4 (ACK)
Bug: KASAN: use-after-free in search_dirblock fs/ext4/namei.c:1199 [inline] (ACK)
Bug: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt] (ACK)
Bug: KASAN: use-after-free in tipc_named_reinit+0x94f/0x9b0 (ACK)
Bug: KASAN: use-after-free in write_page+0x18d/0x680 [md_mod] (ACK)
Bug: KASAN: use-after-free in xfs_log_item_in_current_chkpt+0x139/0x160 [xfs] (ACK)
Bug: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350 (ACK)
Bug: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x508/0xa50 (ACK)
Bug: KCSAN: data-race in ip6_dst_gc / ip6_dst_gc (ACK)
Bug: KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (ACK)
Bug: KCSAN: data-race in pipe_poll / pipe_poll (ACK)
Bug: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac (ACK)
Bug: KFENCE: use-after-free read in efx_ef10_sriov_free_vf_vswitching+0x82/0x170 [sfc] (ACK)
Bug: KMSAN: kernel-usb-infoleak in usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430 (ACK)
Bug: KMSAN: uninit-value in ___bpf_prog_run+0xa22b/0xb420 kernel/bpf/core.c:1637 (ACK)
Bug: KMSAN: uninit-value in mpol_rebind_policy mm/mempolicy.c:352 [inline] (ACK)
Bug: KMSAN: uninit-value in mpol_rebind_task+0x2ac/0x2c0 mm/mempolicy.c:368 (ACK)
Bug: KMSAN: uninit-value in r871xu_drv_init+0x2d54/0x3070 drivers/staging/rtl8712/usb_intf.c:541 (ACK)
Bug: KMSAN: uninit-value in string+0x4ec/0x6f0 lib/vsprintf.c:725 (ACK)
Bug: KMSAN: uninit-value in string+0x4f9/0x6f0 lib/vsprintf.c:725 (ACK)
Bug: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:643 [inline] (ACK)
Bug: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:644 [inline] (ACK)
Bug: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3 (ACK)
Bug: https://bugzilla.kernel.org/show_bug.cgi?id=211605 (ACK)
Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214417 (ACK)
Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/1734 (ACK)
Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/1906 (ACK)
Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/2018 (ACK)
Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/2053

 (ACK)
Bug: kernel NULL pointer dereference (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000000 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000010 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000020 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000028 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000040 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000050 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000086 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000088 (ACK)
Bug: kernel NULL pointer dereference, address: 0000000000000098 (ACK)
Bug: kernel NULL pointer dereference, address: 00000000000000c0 (ACK)
Bug: kernel NULL pointer dereference, address: 00000000000000de (ACK)
Bug: memory leak (ACK)
Bug: scheduling while atomic: swapper/57/0/0x00000300 (ACK)
Bug: sleeping function called from invalid context at drivers/net/ethernet/stmicro/stmmac/stmmac_hwtstamp.c:74 (ACK)
Bug: sleeping function called from invalid context at include/linux/sched/mm.h:265 (ACK)
Bug: sleeping function called from invalid context at kernel/locking/mutex.c:580 (ACK)
Bug: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 (ACK)
Bug: sleeping function called from invalid context at kernel/printk/printk.c:2347 (ACK)
Bug: unable to handle kernel NULL pointer dereference at 0000000000000020 (ACK)
Bug: unable to handle kernel paging request at 000000000000106c (ACK)
Bug: unable to handle page fault for address: 000000005bc02900 (ACK)
Bug: unable to handle page fault for address: ffffc90001ffffff (ACK)
Bug: unable to handle page fault for address: fffffbfff3ac6000 (ACK)
Bug: using __this_cpu_add() in preemptible [00000000] code: epollpep/2180 (ACK)
Bug: using smp_processor_id() in preemptible [00000000] code: nginx/2725 (ACK)

Change-Id: I751c77c56abe1cedac0ecbf4c7e2a13037380720
Signed-off-by: default avatarJoey Lin <linjoey@google.com>
parents fbb3f0f4 cc8b1052
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please to comment