release 4.19.90-2404.1.0

release 4.19.90-2404.1.0
This commit is contained in:
hongrongxuan 2024-04-09 20:41:43 +08:00
parent 5cc73319f5
commit 7ceea688b4
7 changed files with 129 additions and 15 deletions

2
SOURCE
View File

@ -1 +1 @@
4.19.90-2403.4.0
4.19.90-2404.1.0

View File

@ -12,7 +12,7 @@
%global KernelVer %{version}-%{release}.%{_target_cpu}
%global hulkrelease 2403.4.0
%global hulkrelease 2404.1.0
%define with_patch 1
@ -32,7 +32,7 @@
Name: kernel
Version: 4.19.90
Release: %{hulkrelease}.0271
Release: %{hulkrelease}.0272
Summary: Linux Kernel
License: GPLv2
URL: http://www.kernel.org/
@ -850,6 +850,120 @@ fi
%changelog
* Tue Apr 09 2024 hongrongxuan <hongrongxuan@huawei.com> - 4.19.90-2404.1.0.0272
- !5874 scsi: hisi_sas: Update disk locked timeout to 7 seconds
- scsi: hisi_sas: Update disk locked timeout to 7 seconds
- !5841 fixup CVE-2024-26751
- !5834 CVE-2021-47144
- ARM: ep93xx: Add terminator to gpiod_lookup_table
- drm/amd/amdgpu: fix refcount leak
- !5796 netfilter: nft_limit: reject configurations that cause integer overflow
- netfilter: nft_limit: reject configurations that cause integer overflow
- !5755 sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
- !5767 v5 net: fec: fix the potential memory leak in fec_enet_init()
- !5718 CVE-2024-26654
- net: fec: fix the potential memory leak in fec_enet_init()
- !5722 btrfs: don't abort filesystem when attempting to snapshot deleted subvolume
- sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
- !5727 fix CVE-2021-47101
- !5531 ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- !5715 net: hns3: updates 2024.04.02
- !5710 v2 ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- asix: fix wrong return value in asix_check_host_enable()
- asix: fix uninit-value in asix_mdio_read()
- net: asix: fix uninit value bugs
- btrfs: don't abort filesystem when attempting to snapshot deleted subvolume
- !5700 sr9800: Add check for usbnet_get_endpoints
- !5680 USB: usbfs: Don't WARN about excessively large memory allocations
- !5679 fix CVE-2023-52587
- ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs
- ALSA: aica: Fix a long-time build breakage
- !5713 v2 tipc: wait and exit until all work queues are done
- net: hns3: update hns3 version to 24.3.1
- net: hns3: fix port vlan filter not disabled problem in dynamic vlan mode
- !5696 NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
- tipc: wait and exit until all work queues are done
- ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- !5702 ext4: Validate inode pa before using preallocation blocks
- !5694 tipc: skb_linearize the head skb when reassembling msgs
- ext4: Validate inode pa before using preallocation blocks
- !5674 mac80211: fix locking in ieee80211_start_ap error path
- !5672 arm64/mpam_ctrlmon: Update ctrl group config with rdtgrp's partid
- sr9800: Add check for usbnet_get_endpoints
- !5528 btrfs: do not BUG_ON in link_to_fixup_dir
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
- tipc: skb_linearize the head skb when reassembling msgs
- !5522 md/raid5: fix atomicity violation in raid5_cache_count
- USB: usbfs: Don't WARN about excessively large memory allocations
- IB/ipoib: Fix mcast list locking
- RDMA/IPoIB: Fix error code return in ipoib_mcast_join
- mac80211: fix locking in ieee80211_start_ap error path
- arm64/mpam: Allocate new partid for the created ctrl group
- arm64/mpam_ctrlmon: Update ctrl group config with rdtgrp's partid
- !5581 CVE-2023-52622
- !5658 v2 CVE-2021-47131
- !5645 [sync] PR-5493: arm64/mpam: Fix repeated enabling in mpam_enable()
- !5559 fix CVE-2021-47173
- !5575 net: dsa: fix a crash if ->get_sset_count() fails
- net/tls: Use RCU API to access tls_ctx->netdev
- net/tls: Remove the context from the list in tls_device_down
- tls: Fix context leak on tls_device_down
- net/tls: Resolve KABI break when backport bugfix of CVE-2021-47131
- net/tls: Fix use-after-free after the TLS device goes down and up
- net/tls: Replace TLS_RX_SYNC_RUNNING with RCU
- !5625 i2c: i801: Don't generate an interrupt on bus reset
- !5517 dm: revert partial fix for redundant bio-based IO accounting
- arm64/mpam: Fix repeated enabling in mpam_enable()
- !5481 jfs: fix array-index-out-of-bounds in dbAdjTree
- !5572 mld: fix panic in mld_newpack()
- !5565 tracing: Ensure visibility when inserting an element into tracing_map
- !5571 v2 mm/mlock: return EINVAL for illegal user memory range in mlock
- i2c: i801: Don't generate an interrupt on bus reset
- !5587 Fix CVE-2021-47171
- !5579 mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy
- !5573 Fix CVE-2021-47160
- !5564 serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
- !5560 drm/amdgpu: Fix a use-after-free
- net: usb: fix possible use-after-free in smsc75xx_bind
- net: usb: fix memory leak in smsc75xx_bind
- ext4: avoid online resizing failures due to oversized flex bg
- ext4: unify the type of flexbg_size to unsigned int
- ext4: remove unnecessary check from alloc_flex_gd()
- mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy
- !5558 net: fujitsu: fix potential null-ptr-deref
- !5556 NFC: nci: fix memory leak in nci_allocate_device
- net: dsa: fix a crash if ->get_sset_count() fails
- net: dsa: mt7530: fix VLAN traffic leaks again
- net: dsa: mt7530: fix VLAN traffic leaks
- mld: fix panic in mld_newpack()
- mm/mlock: return EINVAL for illegal user memory range in mlock
- tracing: Ensure visibility when inserting an element into tracing_map
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
- !5552 net/smc: remove device from smcd_dev_list after failed device_add()
- !5290 crypto: algif_aead - Only wake up when ctx->more is zero
- !5446 keys: safe concurrent user->{session,uid}_keyring access
- drm/amdgpu: Fix a use-after-free
- !5550 pciehp: clear p_slot->work.data after powering off a slot
- usb: misc: fix improper handling of refcount in uss720_probe()
- misc/uss720: fix memory leak in uss720_probe
- !5515 netfilter: nf_tables: disallow timeout for anonymous sets
- !5538 netfilter: nf_tables: disallow anonymous set with timeout flag
- net: fujitsu: fix potential null-ptr-deref
- NFC: nci: fix memory leak in nci_allocate_device
- net/smc: remove device from smcd_dev_list after failed device_add()
- pciehp: clear p_slot->work.data after powering off a slot
- netfilter: nf_tables: disallow anonymous set with timeout flag
- ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- btrfs: do not BUG_ON in link_to_fixup_dir
- md/raid5: fix atomicity violation in raid5_cache_count
- dm: revert partial fix for redundant bio-based IO accounting
- netfilter: nf_tables: disallow timeout for anonymous sets
- jfs: fix array-index-out-of-bounds in dbAdjTree
- keys: safe concurrent user->{session,uid}_keyring access
- crypto: af_alg - Work around empty control messages without MSG_MORE
- crypto: af_alg - Fix regression on empty requests
- crypto: algif_aead - Only wake up when ctx->more is zero
* Wed Mar 27 2024 hongrongxuan <hongrongxuan@huawei.com> - 4.19.90-2403.4.0.0271
- !5539 spi: spi-fsl-dspi: Fix a resource leak in an error handling path
- !5542 round lts patches

View File

@ -68,7 +68,7 @@ index 19f83dfb32aa..ac1659c18b16 100644
#include "hnae3.h"
-#define HNS3_MOD_VERSION "24.2.1"
-#define HNS3_MOD_VERSION "24.3.1"
-
-extern char hns3_driver_version[];
-

View File

@ -1,4 +1,4 @@
From acbb6b40a74fc79a356273a4ade6e30e7f5a82f8 Mon Sep 17 00:00:00 2001
From 5db2eb55a287e72dc05fd56d30512bb825cfe481 Mon Sep 17 00:00:00 2001
From: Huazhong Tan <tanhuazhong@huawei.com>
Date: Thu, 15 Jun 2023 14:40:50 +0800
Subject: [PATCH] net: hns3: add device version to replace pci revision
@ -36,7 +36,7 @@ Signed-off-by: Xiaodong Li <lixiaodong67@huawei.com>
10 files changed, 110 insertions(+), 81 deletions(-)
diff --git a/drivers/net/ethernet/hisilicon/hns3/hnae3.h b/drivers/net/ethernet/hisilicon/hns3/hnae3.h
index 19a8f315aa43..971239db844a 100644
index d29fb23197bb..ac366fae4b28 100644
--- a/drivers/net/ethernet/hisilicon/hns3/hnae3.h
+++ b/drivers/net/ethernet/hisilicon/hns3/hnae3.h
@@ -36,6 +36,12 @@
@ -386,7 +386,7 @@ index 9338f030842c..55990ba4b30e 100644
dev_err(dev, "ROCEE Non-Fatal RAS error identified\n");
hclge_handle_rocee_ras_error(ae_dev);
diff --git a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c
index 1248534f3376..d1cf21f86119 100644
index 42de0b2f6020..ec28f78b712d 100644
--- a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c
+++ b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c
@@ -739,7 +739,7 @@ static int hclge_get_sset_count(struct hnae3_handle *handle, int stringset)
@ -486,10 +486,10 @@ index 1248534f3376..d1cf21f86119 100644
- if (hdev->pdev->revision >= HNAE3_REVISION_ID_21) {
+ if (hdev->ae_dev->dev_version >= HNAE3_DEVICE_VERSION_V2) {
bool enable = true;
/* for revision 0x21, vf vlan filter is per function */
for (i = 0; i < hdev->num_alloc_vport; i++) {
vport = &hdev->vport[i];
@@ -9256,7 +9257,7 @@ static int hclge_set_vf_vlan_filter(struct hnae3_handle *handle, int vfid,
@@ -9261,7 +9262,7 @@ static int hclge_set_vf_vlan_filter(struct hnae3_handle *handle, int vfid,
u16 state;
int ret;
@ -498,7 +498,7 @@ index 1248534f3376..d1cf21f86119 100644
return -EOPNOTSUPP;
vport = hclge_get_vf_vport(hdev, vfid);
@@ -10553,7 +10554,7 @@ static int hclge_set_vf_spoofchk(struct hnae3_handle *handle, int vf,
@@ -10558,7 +10559,7 @@ static int hclge_set_vf_spoofchk(struct hnae3_handle *handle, int vf,
u32 new_spoofchk = enable ? 1 : 0;
int ret;
@ -507,7 +507,7 @@ index 1248534f3376..d1cf21f86119 100644
return -EOPNOTSUPP;
vport = hclge_get_vf_vport(hdev, vf);
@@ -10586,7 +10587,7 @@ static int hclge_reset_vport_spoofchk(struct hclge_dev *hdev)
@@ -10591,7 +10592,7 @@ static int hclge_reset_vport_spoofchk(struct hclge_dev *hdev)
int ret;
int i;

View File

@ -406,7 +406,7 @@ index 081f03e8eae5..660201b8bd11 100644
+#include "hclge_ptp.h"
#include "hnae3.h"
#define HCLGE_MOD_VERSION "24.2.1"
#define HCLGE_MOD_VERSION "24.3.1"
@@ -177,6 +178,7 @@ enum HLCGE_PORT_TYPE {
#define HCLGE_FUN_RST_ING_B 0

View File

@ -746,7 +746,7 @@ index 9d739033daab..f32c8b52f022 100644
-#include "hnae3.h"
+#include "hnae3_ext.h"
#define HCLGE_MOD_VERSION "24.2.1"
#define HCLGE_MOD_VERSION "24.3.1"
#define HCLGE_DRIVER_NAME "hclge"
@@ -1168,4 +1168,7 @@ void hclge_unregister_sysfs(struct hclge_dev *hdev);
int hclge_cfg_mac_speed_dup_hw(struct hclge_dev *hdev, int speed, u8 duplex);

View File

@ -39,7 +39,7 @@ index ec9aa9233506..36a7285f68cf 100644
+#include <linux/bitmap.h>
#include <net/pkt_cls.h>
#define HNAE3_MOD_VERSION "24.2.1"
#define HNAE3_MOD_VERSION "24.3.1"
@@ -428,7 +429,7 @@ struct hnae3_ae_dev {
#ifndef __GENKSYMS__
struct hnae3_dev_specs dev_specs;