From 7ceea688b4d0d6b14b356e7e356dcc6868543c34 Mon Sep 17 00:00:00 2001 From: hongrongxuan Date: Tue, 9 Apr 2024 20:41:43 +0800 Subject: [PATCH] release 4.19.90-2404.1.0 release 4.19.90-2404.1.0 --- SOURCE | 2 +- kernel.spec | 118 +++++++++++++++++- ...ustom-driver-version-in-favour-of-gl.patch | 2 +- ...vice-version-to-replace-pci-revision.patch | 16 +-- .../0444-net-hns3-add-support-for-PTP.patch | 2 +- ...port-customized-exception-handling-i.patch | 2 +- ...-imp-capability-bit-cannot-exceed-32.patch | 2 +- 7 files changed, 129 insertions(+), 15 deletions(-) diff --git a/SOURCE b/SOURCE index d51e402..ee1ce5a 100644 --- a/SOURCE +++ b/SOURCE @@ -1 +1 @@ -4.19.90-2403.4.0 +4.19.90-2404.1.0 diff --git a/kernel.spec b/kernel.spec index 72d75d5..d0e7efb 100644 --- a/kernel.spec +++ b/kernel.spec @@ -12,7 +12,7 @@ %global KernelVer %{version}-%{release}.%{_target_cpu} -%global hulkrelease 2403.4.0 +%global hulkrelease 2404.1.0 %define with_patch 1 @@ -32,7 +32,7 @@ Name: kernel Version: 4.19.90 -Release: %{hulkrelease}.0271 +Release: %{hulkrelease}.0272 Summary: Linux Kernel License: GPLv2 URL: http://www.kernel.org/ @@ -850,6 +850,120 @@ fi %changelog +* Tue Apr 09 2024 hongrongxuan - 4.19.90-2404.1.0.0272 +- !5874 scsi: hisi_sas: Update disk locked timeout to 7 seconds +- scsi: hisi_sas: Update disk locked timeout to 7 seconds +- !5841 fixup CVE-2024-26751 +- !5834 CVE-2021-47144 +- ARM: ep93xx: Add terminator to gpiod_lookup_table +- drm/amd/amdgpu: fix refcount leak +- !5796 netfilter: nft_limit: reject configurations that cause integer overflow +- netfilter: nft_limit: reject configurations that cause integer overflow +- !5755 sh: push-switch: Reorder cleanup operations to avoid use-after-free bug +- !5767 v5 net: fec: fix the potential memory leak in fec_enet_init() +- !5718 CVE-2024-26654 +- net: fec: fix the potential memory leak in fec_enet_init() +- !5722 btrfs: don't abort filesystem when attempting to snapshot deleted subvolume +- sh: push-switch: Reorder cleanup operations to avoid use-after-free bug +- !5727 fix CVE-2021-47101 +- !5531 ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() +- !5715 net: hns3: updates 2024.04.02 +- !5710 v2 ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() +- asix: fix wrong return value in asix_check_host_enable() +- asix: fix uninit-value in asix_mdio_read() +- net: asix: fix uninit value bugs +- btrfs: don't abort filesystem when attempting to snapshot deleted subvolume +- !5700 sr9800: Add check for usbnet_get_endpoints +- !5680 USB: usbfs: Don't WARN about excessively large memory allocations +- !5679 fix CVE-2023-52587 +- ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs +- ALSA: aica: Fix a long-time build breakage +- !5713 v2 tipc: wait and exit until all work queues are done +- net: hns3: update hns3 version to 24.3.1 +- net: hns3: fix port vlan filter not disabled problem in dynamic vlan mode +- !5696 NFS: Fix an Oopsable condition in __nfs_pageio_add_request() +- tipc: wait and exit until all work queues are done +- ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() +- !5702 ext4: Validate inode pa before using preallocation blocks +- !5694 tipc: skb_linearize the head skb when reassembling msgs +- ext4: Validate inode pa before using preallocation blocks +- !5674 mac80211: fix locking in ieee80211_start_ap error path +- !5672 arm64/mpam_ctrlmon: Update ctrl group config with rdtgrp's partid +- sr9800: Add check for usbnet_get_endpoints +- !5528 btrfs: do not BUG_ON in link_to_fixup_dir +- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() +- tipc: skb_linearize the head skb when reassembling msgs +- !5522 md/raid5: fix atomicity violation in raid5_cache_count +- USB: usbfs: Don't WARN about excessively large memory allocations +- IB/ipoib: Fix mcast list locking +- RDMA/IPoIB: Fix error code return in ipoib_mcast_join +- mac80211: fix locking in ieee80211_start_ap error path +- arm64/mpam: Allocate new partid for the created ctrl group +- arm64/mpam_ctrlmon: Update ctrl group config with rdtgrp's partid +- !5581 CVE-2023-52622 +- !5658 v2 CVE-2021-47131 +- !5645 [sync] PR-5493: arm64/mpam: Fix repeated enabling in mpam_enable() +- !5559 fix CVE-2021-47173 +- !5575 net: dsa: fix a crash if ->get_sset_count() fails +- net/tls: Use RCU API to access tls_ctx->netdev +- net/tls: Remove the context from the list in tls_device_down +- tls: Fix context leak on tls_device_down +- net/tls: Resolve KABI break when backport bugfix of CVE-2021-47131 +- net/tls: Fix use-after-free after the TLS device goes down and up +- net/tls: Replace TLS_RX_SYNC_RUNNING with RCU +- !5625 i2c: i801: Don't generate an interrupt on bus reset +- !5517 dm: revert partial fix for redundant bio-based IO accounting +- arm64/mpam: Fix repeated enabling in mpam_enable() +- !5481 jfs: fix array-index-out-of-bounds in dbAdjTree +- !5572 mld: fix panic in mld_newpack() +- !5565 tracing: Ensure visibility when inserting an element into tracing_map +- !5571 v2 mm/mlock: return EINVAL for illegal user memory range in mlock +- i2c: i801: Don't generate an interrupt on bus reset +- !5587 Fix CVE-2021-47171 +- !5579 mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy +- !5573 Fix CVE-2021-47160 +- !5564 serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' +- !5560 drm/amdgpu: Fix a use-after-free +- net: usb: fix possible use-after-free in smsc75xx_bind +- net: usb: fix memory leak in smsc75xx_bind +- ext4: avoid online resizing failures due to oversized flex bg +- ext4: unify the type of flexbg_size to unsigned int +- ext4: remove unnecessary check from alloc_flex_gd() +- mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy +- !5558 net: fujitsu: fix potential null-ptr-deref +- !5556 NFC: nci: fix memory leak in nci_allocate_device +- net: dsa: fix a crash if ->get_sset_count() fails +- net: dsa: mt7530: fix VLAN traffic leaks again +- net: dsa: mt7530: fix VLAN traffic leaks +- mld: fix panic in mld_newpack() +- mm/mlock: return EINVAL for illegal user memory range in mlock +- tracing: Ensure visibility when inserting an element into tracing_map +- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' +- !5552 net/smc: remove device from smcd_dev_list after failed device_add() +- !5290 crypto: algif_aead - Only wake up when ctx->more is zero +- !5446 keys: safe concurrent user->{session,uid}_keyring access +- drm/amdgpu: Fix a use-after-free +- !5550 pciehp: clear p_slot->work.data after powering off a slot +- usb: misc: fix improper handling of refcount in uss720_probe() +- misc/uss720: fix memory leak in uss720_probe +- !5515 netfilter: nf_tables: disallow timeout for anonymous sets +- !5538 netfilter: nf_tables: disallow anonymous set with timeout flag +- net: fujitsu: fix potential null-ptr-deref +- NFC: nci: fix memory leak in nci_allocate_device +- net/smc: remove device from smcd_dev_list after failed device_add() +- pciehp: clear p_slot->work.data after powering off a slot +- netfilter: nf_tables: disallow anonymous set with timeout flag +- ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() +- btrfs: do not BUG_ON in link_to_fixup_dir +- md/raid5: fix atomicity violation in raid5_cache_count +- dm: revert partial fix for redundant bio-based IO accounting +- netfilter: nf_tables: disallow timeout for anonymous sets +- jfs: fix array-index-out-of-bounds in dbAdjTree +- keys: safe concurrent user->{session,uid}_keyring access +- crypto: af_alg - Work around empty control messages without MSG_MORE +- crypto: af_alg - Fix regression on empty requests +- crypto: algif_aead - Only wake up when ctx->more is zero + * Wed Mar 27 2024 hongrongxuan - 4.19.90-2403.4.0.0271 - !5539 spi: spi-fsl-dspi: Fix a resource leak in an error handling path - !5542 round lts patches diff --git a/patches/0376-net-hns-Remove-custom-driver-version-in-favour-of-gl.patch b/patches/0376-net-hns-Remove-custom-driver-version-in-favour-of-gl.patch index 541a377..a71bd47 100644 --- a/patches/0376-net-hns-Remove-custom-driver-version-in-favour-of-gl.patch +++ b/patches/0376-net-hns-Remove-custom-driver-version-in-favour-of-gl.patch @@ -68,7 +68,7 @@ index 19f83dfb32aa..ac1659c18b16 100644 #include "hnae3.h" --#define HNS3_MOD_VERSION "24.2.1" +-#define HNS3_MOD_VERSION "24.3.1" - -extern char hns3_driver_version[]; - diff --git a/patches/0394-net-hns3-add-device-version-to-replace-pci-revision.patch b/patches/0394-net-hns3-add-device-version-to-replace-pci-revision.patch index 87d3ebe..95f2a13 100644 --- a/patches/0394-net-hns3-add-device-version-to-replace-pci-revision.patch +++ b/patches/0394-net-hns3-add-device-version-to-replace-pci-revision.patch @@ -1,4 +1,4 @@ -From acbb6b40a74fc79a356273a4ade6e30e7f5a82f8 Mon Sep 17 00:00:00 2001 +From 5db2eb55a287e72dc05fd56d30512bb825cfe481 Mon Sep 17 00:00:00 2001 From: Huazhong Tan Date: Thu, 15 Jun 2023 14:40:50 +0800 Subject: [PATCH] net: hns3: add device version to replace pci revision @@ -36,7 +36,7 @@ Signed-off-by: Xiaodong Li 10 files changed, 110 insertions(+), 81 deletions(-) diff --git a/drivers/net/ethernet/hisilicon/hns3/hnae3.h b/drivers/net/ethernet/hisilicon/hns3/hnae3.h -index 19a8f315aa43..971239db844a 100644 +index d29fb23197bb..ac366fae4b28 100644 --- a/drivers/net/ethernet/hisilicon/hns3/hnae3.h +++ b/drivers/net/ethernet/hisilicon/hns3/hnae3.h @@ -36,6 +36,12 @@ @@ -386,7 +386,7 @@ index 9338f030842c..55990ba4b30e 100644 dev_err(dev, "ROCEE Non-Fatal RAS error identified\n"); hclge_handle_rocee_ras_error(ae_dev); diff --git a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c -index 1248534f3376..d1cf21f86119 100644 +index 42de0b2f6020..ec28f78b712d 100644 --- a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c +++ b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c @@ -739,7 +739,7 @@ static int hclge_get_sset_count(struct hnae3_handle *handle, int stringset) @@ -486,10 +486,10 @@ index 1248534f3376..d1cf21f86119 100644 - if (hdev->pdev->revision >= HNAE3_REVISION_ID_21) { + if (hdev->ae_dev->dev_version >= HNAE3_DEVICE_VERSION_V2) { + bool enable = true; + /* for revision 0x21, vf vlan filter is per function */ - for (i = 0; i < hdev->num_alloc_vport; i++) { - vport = &hdev->vport[i]; -@@ -9256,7 +9257,7 @@ static int hclge_set_vf_vlan_filter(struct hnae3_handle *handle, int vfid, +@@ -9261,7 +9262,7 @@ static int hclge_set_vf_vlan_filter(struct hnae3_handle *handle, int vfid, u16 state; int ret; @@ -498,7 +498,7 @@ index 1248534f3376..d1cf21f86119 100644 return -EOPNOTSUPP; vport = hclge_get_vf_vport(hdev, vfid); -@@ -10553,7 +10554,7 @@ static int hclge_set_vf_spoofchk(struct hnae3_handle *handle, int vf, +@@ -10558,7 +10559,7 @@ static int hclge_set_vf_spoofchk(struct hnae3_handle *handle, int vf, u32 new_spoofchk = enable ? 1 : 0; int ret; @@ -507,7 +507,7 @@ index 1248534f3376..d1cf21f86119 100644 return -EOPNOTSUPP; vport = hclge_get_vf_vport(hdev, vf); -@@ -10586,7 +10587,7 @@ static int hclge_reset_vport_spoofchk(struct hclge_dev *hdev) +@@ -10591,7 +10592,7 @@ static int hclge_reset_vport_spoofchk(struct hclge_dev *hdev) int ret; int i; diff --git a/patches/0444-net-hns3-add-support-for-PTP.patch b/patches/0444-net-hns3-add-support-for-PTP.patch index e8e7f13..c5df2a2 100644 --- a/patches/0444-net-hns3-add-support-for-PTP.patch +++ b/patches/0444-net-hns3-add-support-for-PTP.patch @@ -406,7 +406,7 @@ index 081f03e8eae5..660201b8bd11 100644 +#include "hclge_ptp.h" #include "hnae3.h" - #define HCLGE_MOD_VERSION "24.2.1" + #define HCLGE_MOD_VERSION "24.3.1" @@ -177,6 +178,7 @@ enum HLCGE_PORT_TYPE { #define HCLGE_FUN_RST_ING_B 0 diff --git a/patches/0552-net-hns3-add-support-customized-exception-handling-i.patch b/patches/0552-net-hns3-add-support-customized-exception-handling-i.patch index a58a851..51bf5e2 100644 --- a/patches/0552-net-hns3-add-support-customized-exception-handling-i.patch +++ b/patches/0552-net-hns3-add-support-customized-exception-handling-i.patch @@ -746,7 +746,7 @@ index 9d739033daab..f32c8b52f022 100644 -#include "hnae3.h" +#include "hnae3_ext.h" - #define HCLGE_MOD_VERSION "24.2.1" + #define HCLGE_MOD_VERSION "24.3.1" #define HCLGE_DRIVER_NAME "hclge" @@ -1168,4 +1168,7 @@ void hclge_unregister_sysfs(struct hclge_dev *hdev); int hclge_cfg_mac_speed_dup_hw(struct hclge_dev *hdev, int speed, u8 duplex); diff --git a/patches/0598-net-hns3-fix-the-imp-capability-bit-cannot-exceed-32.patch b/patches/0598-net-hns3-fix-the-imp-capability-bit-cannot-exceed-32.patch index 31ae349..98b3541 100644 --- a/patches/0598-net-hns3-fix-the-imp-capability-bit-cannot-exceed-32.patch +++ b/patches/0598-net-hns3-fix-the-imp-capability-bit-cannot-exceed-32.patch @@ -39,7 +39,7 @@ index ec9aa9233506..36a7285f68cf 100644 +#include #include - #define HNAE3_MOD_VERSION "24.2.1" + #define HNAE3_MOD_VERSION "24.3.1" @@ -428,7 +429,7 @@ struct hnae3_ae_dev { #ifndef __GENKSYMS__ struct hnae3_dev_specs dev_specs;