Unverified Commit 316ca9c3 authored by openeuler-ci-bot's avatar openeuler-ci-bot Committed by Gitee
Browse files

!592 Backport 5.10.150 LTS

Merge Pull Request from: @zhangjialin11 
 
Backport 5.10.150 LTS patches from upstream.

Conflicts:

Already merged(19):
f039b43cbaea inet: fully convert sk->sk_rx_dst to RCU rules
45c33966759e mm: hugetlb: fix UAF in hugetlb_handle_userfault
c378c479c517 io_uring/af_unix: defer registered files gc to io_uring release
67cbc8865a66 io_uring: correct pinned_vm accounting
904f881b5736 arm64: topology: fix possible overflow in amu_fie_setup()
dbcca76435a6 HID: roccat: Fix use-after-free in roccat_read()
484400d433ca r8152: Rate limit overflow messages
d88b88514ef2 crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr
657de36c72f5 arm64: ftrace: fix module PLTs with mcount
29f50bcf0f8b net: mvpp2: fix mvpp2 debugfs leak
6cc0e2afc6a1 bnx2x: fix potential memory leak in bnx2x_tpa_stop()
2a1d03632085 mISDN: fix use-after-free bugs in l1oip timer handlers
0cf6c09dafee ring-buffer: Fix race between reset page and reading page
fbb0e601bd51 ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate
483831ad0440 ext4: fix check for block being out of directory size
f34ab9516276 ext4: fix null-ptr-deref in ext4_write_info
e50472949604 fbdev: smscufx: Fix use-after-free in ufx_ops_open()
7d551b7d6114 block: fix inflight statistics of part0
6b7ae4a904a4 quota: Check next/prev free block number after reading from quota file

Context conflict(1):
c13d0d2f5a48 usb: host: xhci-plat: suspend and resume clocks

Total patches: 389 - 19 = 370 
 
Link:https://gitee.com/openeuler/kernel/pulls/592

 

Reviewed-by: default avatarZheng Zengkai <zhengzengkai@huawei.com>
Signed-off-by: default avatarZheng Zengkai <zhengzengkai@huawei.com>
parents 6bf61fdd 15bbc3f6
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please to comment