release 4.19.90-2406.2.0

This commit is contained in:
chenyi 2024-06-12 03:59:02 -04:00
parent ae356e6931
commit 2fb9d0873a
3 changed files with 157 additions and 28 deletions

View File

@ -1,11 +1,11 @@
diff --git a/include/linux/sunrpc/clnt.h b/include/linux/sunrpc/clnt.h diff --git a/include/linux/sunrpc/clnt.h b/include/linux/sunrpc/clnt.h
index 8aa865b..0425aaa 100644 index 5803a6891b30..eadfe3274a99 100644
--- a/include/linux/sunrpc/clnt.h --- a/include/linux/sunrpc/clnt.h
+++ b/include/linux/sunrpc/clnt.h +++ b/include/linux/sunrpc/clnt.h
@@ -70,6 +70,10 @@ struct rpc_clnt { @@ -71,6 +71,10 @@ struct rpc_clnt {
struct dentry *cl_debugfs; /* debugfs directory */
#endif #endif
struct rpc_xprt_iter cl_xpi; struct rpc_xprt_iter cl_xpi;
struct super_block *pipefs_sb;
+ +
+#if IS_ENABLED(CONFIG_ENFS) +#if IS_ENABLED(CONFIG_ENFS)
+ bool cl_enfs; + bool cl_enfs;
@ -13,7 +13,7 @@ index 8aa865b..0425aaa 100644
}; };
/* /*
@@ -124,6 +128,9 @@ struct rpc_create_args { @@ -125,6 +129,9 @@ struct rpc_create_args {
unsigned long flags; unsigned long flags;
char *client_name; char *client_name;
struct svc_xprt *bc_xprt; /* NFSv4.1 backchannel */ struct svc_xprt *bc_xprt; /* NFSv4.1 backchannel */
@ -23,7 +23,7 @@ index 8aa865b..0425aaa 100644
}; };
struct rpc_add_xprt_test { struct rpc_add_xprt_test {
@@ -221,6 +228,13 @@ bool rpc_clnt_xprt_switch_has_addr(struct rpc_clnt *clnt, @@ -222,6 +229,13 @@ bool rpc_clnt_xprt_switch_has_addr(struct rpc_clnt *clnt,
const struct sockaddr *sap); const struct sockaddr *sap);
void rpc_cleanup_clids(void); void rpc_cleanup_clids(void);
@ -38,7 +38,7 @@ index 8aa865b..0425aaa 100644
{ {
return (task->tk_msg.rpc_proc != NULL) && return (task->tk_msg.rpc_proc != NULL) &&
diff --git a/include/linux/sunrpc/sched.h b/include/linux/sunrpc/sched.h diff --git a/include/linux/sunrpc/sched.h b/include/linux/sunrpc/sched.h
index ad2e243..124f5a0 100644 index ad2e243f3f03..124f5a0faf3e 100644
--- a/include/linux/sunrpc/sched.h --- a/include/linux/sunrpc/sched.h
+++ b/include/linux/sunrpc/sched.h +++ b/include/linux/sunrpc/sched.h
@@ -90,6 +90,9 @@ struct rpc_task { @@ -90,6 +90,9 @@ struct rpc_task {
@ -73,7 +73,7 @@ index ad2e243..124f5a0 100644
{ {
diff --git a/include/linux/sunrpc/sunrpc_enfs_adapter.h b/include/linux/sunrpc/sunrpc_enfs_adapter.h diff --git a/include/linux/sunrpc/sunrpc_enfs_adapter.h b/include/linux/sunrpc/sunrpc_enfs_adapter.h
new file mode 100644 new file mode 100644
index 0000000..cdd7fa6 index 000000000000..cdd7fa699db2
--- /dev/null --- /dev/null
+++ b/include/linux/sunrpc/sunrpc_enfs_adapter.h +++ b/include/linux/sunrpc/sunrpc_enfs_adapter.h
@@ -0,0 +1,135 @@ @@ -0,0 +1,135 @@
@ -213,7 +213,7 @@ index 0000000..cdd7fa6
+#endif +#endif
+#endif // _SUNRPC_ENFS_ADAPTER_H_ +#endif // _SUNRPC_ENFS_ADAPTER_H_
diff --git a/include/linux/sunrpc/xprt.h b/include/linux/sunrpc/xprt.h diff --git a/include/linux/sunrpc/xprt.h b/include/linux/sunrpc/xprt.h
index ccfacca..2e47b35 100644 index ccfacca1eba9..2e47b3577947 100644
--- a/include/linux/sunrpc/xprt.h --- a/include/linux/sunrpc/xprt.h
+++ b/include/linux/sunrpc/xprt.h +++ b/include/linux/sunrpc/xprt.h
@@ -279,6 +279,10 @@ struct rpc_xprt { @@ -279,6 +279,10 @@ struct rpc_xprt {
@ -228,7 +228,7 @@ index ccfacca..2e47b35 100644
#if defined(CONFIG_SUNRPC_BACKCHANNEL) #if defined(CONFIG_SUNRPC_BACKCHANNEL)
diff --git a/include/linux/sunrpc/xprtmultipath.h b/include/linux/sunrpc/xprtmultipath.h diff --git a/include/linux/sunrpc/xprtmultipath.h b/include/linux/sunrpc/xprtmultipath.h
index af1257c..5677a46 100644 index af1257c030d2..5677a46eec3b 100644
--- a/include/linux/sunrpc/xprtmultipath.h --- a/include/linux/sunrpc/xprtmultipath.h
+++ b/include/linux/sunrpc/xprtmultipath.h +++ b/include/linux/sunrpc/xprtmultipath.h
@@ -22,6 +22,11 @@ struct rpc_xprt_switch { @@ -22,6 +22,11 @@ struct rpc_xprt_switch {
@ -253,7 +253,7 @@ index af1257c..5677a46 100644
+#endif +#endif
#endif #endif
diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c
index 0fc540b..ebdcd02 100644 index 1b224caf9a70..02633da2e506 100644
--- a/net/sunrpc/clnt.c --- a/net/sunrpc/clnt.c
+++ b/net/sunrpc/clnt.c +++ b/net/sunrpc/clnt.c
@@ -37,6 +37,7 @@ @@ -37,6 +37,7 @@
@ -264,7 +264,7 @@ index 0fc540b..ebdcd02 100644
#include <trace/events/sunrpc.h> #include <trace/events/sunrpc.h>
#include "sunrpc.h" #include "sunrpc.h"
@@ -490,6 +491,8 @@ static struct rpc_clnt *rpc_create_xprt(struct rpc_create_args *args, @@ -493,6 +494,8 @@ static struct rpc_clnt *rpc_create_xprt(struct rpc_create_args *args,
} }
} }
@ -273,7 +273,7 @@ index 0fc540b..ebdcd02 100644
clnt->cl_softrtry = 1; clnt->cl_softrtry = 1;
if (args->flags & RPC_CLNT_CREATE_HARDRTRY) if (args->flags & RPC_CLNT_CREATE_HARDRTRY)
clnt->cl_softrtry = 0; clnt->cl_softrtry = 0;
@@ -869,6 +872,8 @@ void rpc_shutdown_client(struct rpc_clnt *clnt) @@ -872,6 +875,8 @@ void rpc_shutdown_client(struct rpc_clnt *clnt)
list_empty(&clnt->cl_tasks), 1*HZ); list_empty(&clnt->cl_tasks), 1*HZ);
} }
@ -282,7 +282,7 @@ index 0fc540b..ebdcd02 100644
rpc_release_client(clnt); rpc_release_client(clnt);
} }
EXPORT_SYMBOL_GPL(rpc_shutdown_client); EXPORT_SYMBOL_GPL(rpc_shutdown_client);
@@ -981,6 +986,12 @@ void rpc_task_release_transport(struct rpc_task *task) @@ -984,6 +989,12 @@ void rpc_task_release_transport(struct rpc_task *task)
if (xprt) { if (xprt) {
task->tk_xprt = NULL; task->tk_xprt = NULL;
@ -295,7 +295,7 @@ index 0fc540b..ebdcd02 100644
xprt_put(xprt); xprt_put(xprt);
} }
} }
@@ -990,6 +1001,10 @@ void rpc_task_release_client(struct rpc_task *task) @@ -993,6 +1004,10 @@ void rpc_task_release_client(struct rpc_task *task)
{ {
struct rpc_clnt *clnt = task->tk_client; struct rpc_clnt *clnt = task->tk_client;
@ -306,7 +306,7 @@ index 0fc540b..ebdcd02 100644
if (clnt != NULL) { if (clnt != NULL) {
/* Remove from client task list */ /* Remove from client task list */
spin_lock(&clnt->cl_lock); spin_lock(&clnt->cl_lock);
@@ -999,14 +1014,31 @@ void rpc_task_release_client(struct rpc_task *task) @@ -1002,14 +1017,31 @@ void rpc_task_release_client(struct rpc_task *task)
rpc_release_client(clnt); rpc_release_client(clnt);
} }
@ -339,7 +339,7 @@ index 0fc540b..ebdcd02 100644
} }
static static
@@ -1597,6 +1629,14 @@ call_reserveresult(struct rpc_task *task) @@ -1600,6 +1632,14 @@ call_reserveresult(struct rpc_task *task)
return; return;
case -EIO: /* probably a shutdown */ case -EIO: /* probably a shutdown */
break; break;
@ -354,7 +354,7 @@ index 0fc540b..ebdcd02 100644
default: default:
printk(KERN_ERR "%s: unrecognized error %d, exiting\n", printk(KERN_ERR "%s: unrecognized error %d, exiting\n",
__func__, status); __func__, status);
@@ -1962,6 +2002,10 @@ call_transmit(struct rpc_task *task) @@ -1965,6 +2005,10 @@ call_transmit(struct rpc_task *task)
return; return;
if (!xprt_prepare_transmit(task)) if (!xprt_prepare_transmit(task))
return; return;
@ -365,7 +365,7 @@ index 0fc540b..ebdcd02 100644
task->tk_action = call_transmit_status; task->tk_action = call_transmit_status;
/* Encode here so that rpcsec_gss can use correct sequence number. */ /* Encode here so that rpcsec_gss can use correct sequence number. */
if (rpc_task_need_encode(task)) { if (rpc_task_need_encode(task)) {
@@ -2277,6 +2321,7 @@ call_timeout(struct rpc_task *task) @@ -2280,6 +2324,7 @@ call_timeout(struct rpc_task *task)
retry: retry:
task->tk_action = call_bind; task->tk_action = call_bind;
@ -373,7 +373,7 @@ index 0fc540b..ebdcd02 100644
task->tk_status = 0; task->tk_status = 0;
} }
@@ -2798,8 +2843,12 @@ int rpc_clnt_add_xprt(struct rpc_clnt *clnt, @@ -2801,8 +2846,12 @@ int rpc_clnt_add_xprt(struct rpc_clnt *clnt,
xprt->ops->set_connect_timeout(xprt, xprt->ops->set_connect_timeout(xprt,
connect_timeout, connect_timeout,
reconnect_timeout); reconnect_timeout);
@ -387,7 +387,7 @@ index 0fc540b..ebdcd02 100644
if (setup) { if (setup) {
ret = setup(clnt, xps, xprt, data); ret = setup(clnt, xps, xprt, data);
if (ret != 0) if (ret != 0)
@@ -2961,3 +3010,30 @@ rpc_clnt_swap_deactivate(struct rpc_clnt *clnt) @@ -2964,3 +3013,30 @@ rpc_clnt_swap_deactivate(struct rpc_clnt *clnt)
} }
EXPORT_SYMBOL_GPL(rpc_clnt_swap_deactivate); EXPORT_SYMBOL_GPL(rpc_clnt_swap_deactivate);
#endif /* CONFIG_SUNRPC_SWAP */ #endif /* CONFIG_SUNRPC_SWAP */
@ -419,7 +419,7 @@ index 0fc540b..ebdcd02 100644
+EXPORT_SYMBOL_GPL(rpc_clnt_test_xprt); +EXPORT_SYMBOL_GPL(rpc_clnt_test_xprt);
+#endif +#endif
diff --git a/net/sunrpc/sched.c b/net/sunrpc/sched.c diff --git a/net/sunrpc/sched.c b/net/sunrpc/sched.c
index a873c92..2254fea 100644 index a873c92a4898..2254fea0e863 100644
--- a/net/sunrpc/sched.c --- a/net/sunrpc/sched.c
+++ b/net/sunrpc/sched.c +++ b/net/sunrpc/sched.c
@@ -20,7 +20,7 @@ @@ -20,7 +20,7 @@
@ -446,7 +446,7 @@ index a873c92..2254fea 100644
task->tk_action = rpc_prepare_task; task->tk_action = rpc_prepare_task;
diff --git a/net/sunrpc/sunrpc_enfs_adapter.c b/net/sunrpc/sunrpc_enfs_adapter.c diff --git a/net/sunrpc/sunrpc_enfs_adapter.c b/net/sunrpc/sunrpc_enfs_adapter.c
new file mode 100644 new file mode 100644
index 0000000..106ad73 index 000000000000..106ad7309bef
--- /dev/null --- /dev/null
+++ b/net/sunrpc/sunrpc_enfs_adapter.c +++ b/net/sunrpc/sunrpc_enfs_adapter.c
@@ -0,0 +1,225 @@ @@ -0,0 +1,225 @@
@ -676,7 +676,7 @@ index 0000000..106ad73
+ rpc_multipath_ops_put(mops); + rpc_multipath_ops_put(mops);
+} +}
diff --git a/net/sunrpc/xprt.c b/net/sunrpc/xprt.c diff --git a/net/sunrpc/xprt.c b/net/sunrpc/xprt.c
index c912bf2..c2b63b3 100644 index c912bf20faa2..c2b63b3d5217 100644
--- a/net/sunrpc/xprt.c --- a/net/sunrpc/xprt.c
+++ b/net/sunrpc/xprt.c +++ b/net/sunrpc/xprt.c
@@ -48,6 +48,7 @@ @@ -48,6 +48,7 @@
@ -687,7 +687,7 @@ index c912bf2..c2b63b3 100644
#include <linux/rcupdate.h> #include <linux/rcupdate.h>
#include <trace/events/sunrpc.h> #include <trace/events/sunrpc.h>
@@ -259,6 +260,9 @@ out_sleep: @@ -259,6 +260,9 @@ int xprt_reserve_xprt(struct rpc_xprt *xprt, struct rpc_task *task)
dprintk("RPC: %5u failed to lock transport %p\n", dprintk("RPC: %5u failed to lock transport %p\n",
task->tk_pid, xprt); task->tk_pid, xprt);
task->tk_timeout = 0; task->tk_timeout = 0;
@ -757,7 +757,7 @@ index c912bf2..c2b63b3 100644
* Tear down transport state and free the rpc_xprt * Tear down transport state and free the rpc_xprt
*/ */
diff --git a/net/sunrpc/xprtmultipath.c b/net/sunrpc/xprtmultipath.c diff --git a/net/sunrpc/xprtmultipath.c b/net/sunrpc/xprtmultipath.c
index 6ebaa58..f6a004e 100644 index c0a0e2346cfb..6b3709d5ed6e 100644
--- a/net/sunrpc/xprtmultipath.c --- a/net/sunrpc/xprtmultipath.c
+++ b/net/sunrpc/xprtmultipath.c +++ b/net/sunrpc/xprtmultipath.c
@@ -18,6 +18,7 @@ @@ -18,6 +18,7 @@

2
SOURCE
View File

@ -1 +1 @@
4.19.90-2406.1.0 4.19.90-2406.2.0

View File

@ -12,7 +12,7 @@
%global KernelVer %{version}-%{release}.%{_target_cpu} %global KernelVer %{version}-%{release}.%{_target_cpu}
%global hulkrelease 2406.1.0 %global hulkrelease 2406.2.0
%define with_patch 1 %define with_patch 1
@ -32,7 +32,7 @@
Name: kernel Name: kernel
Version: 4.19.90 Version: 4.19.90
Release: %{hulkrelease}.0280 Release: %{hulkrelease}.0281
Summary: Linux Kernel Summary: Linux Kernel
License: GPLv2 License: GPLv2
URL: http://www.kernel.org/ URL: http://www.kernel.org/
@ -850,6 +850,135 @@ fi
%changelog %changelog
* Wed Jun 12 2024 chenyi <chenyi211@huawei.com> - 4.19.90-2406.2.0.0281
- !8895 net: fix out-of-bounds access in ops_init
- !8694 clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data
- !8858 PCI/PM: Drain runtime-idle callbacks before driver removal
- !8626 fs/9p: only translate RWX permissions for plain 9P2000
- !8490 scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
- !8777 memory: fsl_ifc: fix leak of IO mapping on probe failure
- !8806 media: zr364xx: fix memory leak in zr364xx_start_readpipe
- !8664 mmc: mmc_spi: fix error handling in mmc_spi_probe()
- !8865 staging: rtl8712: fix use-after-free in rtl8712_dl_fw
- !8888 nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
- !8825 watchdog: Fix possible use-after-free in wdt_startup()
- !8654 nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
- !8358 perf report: Fix memory leaks around perf_tip()
- !8552 tipc: fix a possible memleak in tipc_buf_append
- !8851 ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- net: fix out-of-bounds access in ops_init
- !8802 CVE-2021-47294
- nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
- staging: rtl8712: fix use-after-free in rtl8712_dl_fw
- PCI/PM: Drain runtime-idle callbacks before driver removal
- ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- !8628 erspan: make sure erspan_base_hdr is present in skb->head
- !8716 CVE-2024-35910
- !8325 ocfs2: fix data corruption after conversion from inline format
- !8729 tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
- !8636 ipv6: Fix potential uninit-value access in __ip6_make_skb()
- watchdog: Fix possible use-after-free in wdt_startup()
- !8773 sched: remove WARN_ON on checking rq->tmp_alone_branch
- media: zr364xx: fix memory leak in zr364xx_start_readpipe
- !8678 can: pch_can: pch_can_rx_normal: fix use after free
- netrom: Fix use-after-free of a listening socket.
- netrom: Decrease sock refcount when sock timers expire
- !8676 net: tulip: de4x5: fix the problem that the array 'lp->phy[8
- !8708 media: imon: fix access to invalid resource for the second interface
- !8707 regmap: Fix possible double-free in regcache_rbtree_exit()
- !8706 isdn: mISDN: Fix sleeping function called from invalid context
- !8705 usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency
- !8357 nilfs2: fix underflow in second superblock position calculations
- !8681 rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- !8484 scsi: megaraid_sas: Fix resource leak in case of probe failure
- memory: fsl_ifc: fix leak of IO mapping on probe failure
- sched: remove WARN_ON on checking rq->tmp_alone_branch
- !8620 CVE-2024-35896
- !8526 SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
- !8336 tcp: fix page frag corruption on page fault
- tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
- !8521 isofs: Fix out of bound access for corrupted isofs image
- !7786 powerpc/powernv: Add a null pointer check in opal_event_init()
- !8568 gfs2: Fix use-after-free in gfs2_glock_shrink_scan
- tcp: properly terminate timers for kernel sockets
- mptcp: add sk_stop_timer_sync helper
- !8478 arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
- !8366 net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
- !8544 CVE-2021-47358
- !8577 mmc: sdhci-msm: pervent access to suspended controller
- !8579 net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
- !8603 rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
- media: imon: fix access to invalid resource for the second interface
- regmap: Fix possible double-free in regcache_rbtree_exit()
- isdn: mISDN: Fix sleeping function called from invalid context
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency
- !8516 CVE-2021-47409
- !8465 drm/amd/display: Avoid NULL dereference of timing generator
- !8500 pwm: Fix double shift bug
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data
- rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- can: pch_can: pch_can_rx_normal: fix use after free
- net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
- !8402 i40e: Fix freeing of uninitialized misc IRQ vector
- !8398 comedi: ni_usb6501: fix NULL-deref in command paths
- mmc: mmc_spi: fix error handling in mmc_spi_probe()
- nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
- !8464 i2c: smbus: fix NULL function pointer dereference
- !8434 iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
- !8411 platform/x86: wmi: Fix opening of char device
- ipv6: Fix potential uninit-value access in __ip6_make_skb()
- !8307 s390/dasd: protect device queue against concurrent access
- !8444 CVE-2021-47511
- !8443 v2 ipack: ipoctal: fix module reference leak
- !8611 smackfs: restrict bytes count in smk_set_cipso()
- !8610 media: gspca: cpia1: shift-out-of-bounds in set_flicker
- !8609 can: peak_pci: peak_pci_remove(): fix UAF
- !8430 drm/sched: Avoid data corruptions
- !8557 net: cdc_eem: fix tx fixup skb leak
- !8365 efi/capsule-loader: fix incorrect allocation size
- !8333 soc: qcom: llcc: Handle a second device without data corruption
- erspan: make sure erspan_base_hdr is present in skb->head
- fs/9p: only translate RWX permissions for plain 9P2000
- netfilter: complete validation of user input
- netfilter: validate user input for expected length
- smackfs: restrict bytes count in smk_set_cipso()
- media: gspca: cpia1: shift-out-of-bounds in set_flicker
- can: peak_pci: peak_pci_remove(): fix UAF
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
- mmc: sdhci-msm: pervent access to suspended controller
- gfs2: Fix use-after-free in gfs2_glock_shrink_scan
- net: cdc_eem: fix tx fixup skb leak
- tipc: fix a possible memleak in tipc_buf_append
- staging: greybus: uart: fix tty use after free
- SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
- isofs: Fix out of bound access for corrupted isofs image
- usb: dwc2: Fix memory leak in dwc2_hcd_init
- usb: dwc2: check return value after calling platform_get_resource()
- pwm: Fix double shift bug
- scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
- scsi: megaraid_sas: Fix resource leak in case of probe failure
- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
- drm/amd/display: Avoid NULL dereference of timing generator
- i2c: smbus: fix NULL function pointer dereference
- ALSA: pcm: oss: Fix negative period/buffer sizes
- ALSA: pcm: oss: Fix a few more UBSAN fixes
- ipack: ipoctal: fix module reference leak
- iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
- drm/sched: Avoid data corruptions
- platform/x86: wmi: Fix opening of char device
- i40e: Fix freeing of uninitialized misc IRQ vector
- comedi: ni_usb6501: fix NULL-deref in command paths
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
- efi/capsule-loader: fix incorrect allocation size
- perf report: Fix memory leaks around perf_tip()
- nilfs2: fix underflow in second superblock position calculations
- tcp: fix page frag corruption on page fault
- soc: qcom: llcc: Handle a second device without data corruption
- ocfs2: fix data corruption after conversion from inline format
- s390/dasd: protect device queue against concurrent access
- powerpc/powernv: Add a null pointer check in opal_event_init()
* Tue Jun 11 2024 chenyi <chenyi211@huawei.com> - 4.19.90-2406.1.0.0280 * Tue Jun 11 2024 chenyi <chenyi211@huawei.com> - 4.19.90-2406.1.0.0280
- scsi: hisi_sas: Allocate DFX memory during dump trigger - scsi: hisi_sas: Allocate DFX memory during dump trigger