From 560aa10f272a1f4167896dd3bf7b860b15112438 Mon Sep 17 00:00:00 2001 From: huwentao Date: Wed, 29 Oct 2025 10:53:27 +0800 Subject: [PATCH] release 4.19.90-2510.4.0 --- SOURCE | 2 +- kernel.spec | 82 ++++++++++++++++++- ...ovide-devm_platform_ioremap_resource.patch | 78 ------------------ series.conf | 1 - 4 files changed, 81 insertions(+), 82 deletions(-) delete mode 100644 patches/0051-drivers-provide-devm_platform_ioremap_resource.patch diff --git a/SOURCE b/SOURCE index bbb77ce5..111aa4b6 100644 --- a/SOURCE +++ b/SOURCE @@ -1 +1 @@ -4.19.90-2510.3.0 +4.19.90-2510.4.0 diff --git a/kernel.spec b/kernel.spec index de4d6e38..7fc66986 100644 --- a/kernel.spec +++ b/kernel.spec @@ -12,7 +12,7 @@ %global KernelVer %{version}-%{release}.%{_target_cpu} -%global hulkrelease 2510.3.0 +%global hulkrelease 2510.4.0 %define with_patch 1 @@ -32,7 +32,7 @@ Name: kernel Version: 4.19.90 -Release: %{hulkrelease}.0348 +Release: %{hulkrelease}.0349 Summary: Linux Kernel License: GPLv2 URL: http://www.kernel.org/ @@ -850,6 +850,84 @@ fi %changelog +* Wed Oct 29 2025 huwentao - 4.19.90-2510.4.0.0349 +- !18619 notifiers: Add oops check in blocking_notifier_call_chain() +- !18595 Fix CVE-2023-53719 +- !18618 CVE-2023-53648 +- !18590 mtd: Fix device name leak when register device failed in add_mtd_device() +- !18601 xhci: Remove device endpoints from bandwidth list when freeing the device +- !18582 media: v4l2-mem2mem: add lock to protect parameter num_rdy +- notifiers: Add oops check in blocking_notifier_call_chain() +- ALSA: ac97: Fix possible error value of *rac97 +- ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer +- !18607 wifi: mwifiex: avoid possible NULL skb pointer dereference +- !18603 Bluetooth: L2CAP: Fix use-after-free +- wifi: mwifiex: avoid possible NULL skb pointer dereference +- !18575 CVE-2023-53153 +- !18581 net/tunnel: wait until all sk_user_data reader finish before releasing the sock +- !18580 sctp: fix a potential overflow in sctp_ifwdtsn_skip +- !18578 sctp: check send stream number after wait_for_sndbuf +- !18577 CVE-2023-53148 +- !18576 wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() +- !18574 sctp: handle the error returned from sctp_auth_asoc_init_active_key +- !18573 igb: Do not free q_vector unless new one was allocated +- Bluetooth: L2CAP: Fix use-after-free +- !18600 mm/slub: avoid accessing metadata when pointer is invalid in object_err() +- !18599 scsi: qla4xxx: Prevent a potential error pointer dereference +- xhci: Remove device endpoints from bandwidth list when freeing the device +- !18551 posix-timers: Ensure timer ID search-loop limit is valid +- mm/slub: avoid accessing metadata when pointer is invalid in object_err() +- scsi: qla4xxx: Prevent a potential error pointer dereference +- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() +- serial: arc_uart: fix of_iomap leak in `arc_serial_probe` +- drivers: provide devm_platform_ioremap_resource() +- mtd: Fix device name leak when register device failed in add_mtd_device() +- !18543 CVE-2023-53567 +- !18529 drm/radeon: free iio for atombios when driver shutdown +- media: v4l2-mem2mem: add lock to protect parameter num_rdy +- net/tunnel: wait until all sk_user_data reader finish before releasing the sock +- sctp: fix a potential overflow in sctp_ifwdtsn_skip +- sctp: check send stream number after wait_for_sndbuf +- igb: Do not bring the device up after non-fatal error +- igb: Fix igb_down hung on surprise removal +- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() +- wifi: cfg80211: Partial revert "wifi: cfg80211: Fix use after free for wext" +- wifi: cfg80211: Fix use after free for wext +- sctp: handle the error returned from sctp_auth_asoc_init_active_key +- igb: Do not free q_vector unless new one was allocated +- !18499 posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() +- !18454 usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() +- !18366 squashfs: add more sanity checks +- !18240 efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare +- !18491 CVE-2023-53515 +- posix-timers: Ensure timer ID search-loop limit is valid +- spi: qup: Don't skip cleanup in remove's error path +- spi: qup: fix PM reference leak in spi_qup_remove() +- drm/radeon: free iio for atombios when driver shutdown +- !18429 bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent +- !18426 dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path +- !18416 ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed +- !18418 CVE-2023-53271 +- !18420 CVE-2023-53265 +- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() +- virtio-mmio: fix memory leak of vm_dev +- virtio-mmio: don't break lifecycle of vm_dev +- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() +- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent +- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path +- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size +- ubi: ensure that VID header offset + VID header size <= alloc, size +- ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume() +- ubi: Fix use-after-free when volume resizing failed +- ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed +- Squashfs: fix handling and sanity checking of xattr_ids count +- squashfs: fix xattr id and id lookup sanity checks +- squashfs: fix inode lookup sanity checks +- squashfs: add more sanity checks in inode lookup +- squashfs: add more sanity checks in xattr id lookup +- squashfs: add more sanity checks in id lookup +- efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare + * Wed Oct 22 2025 huwentao - 4.19.90-2510.3.0.0348 - !18072 CVE-2023-53431 - !18469 e1000e: fix heap overflow in e1000_set_eeprom diff --git a/patches/0051-drivers-provide-devm_platform_ioremap_resource.patch b/patches/0051-drivers-provide-devm_platform_ioremap_resource.patch deleted file mode 100644 index 835c7604..00000000 --- a/patches/0051-drivers-provide-devm_platform_ioremap_resource.patch +++ /dev/null @@ -1,78 +0,0 @@ -From 9adb641d4a64e0ed52ba63ea401a9858efe8976d Mon Sep 17 00:00:00 2001 -From: Bartosz Golaszewski -Date: Wed, 20 Feb 2019 11:12:39 +0000 -Subject: [PATCH 10/55] drivers: provide devm_platform_ioremap_resource() - -mainline inclusion -from mainline-v5.1-rc1 -commit 306563985819ed2af9df0a26ae368ed12cf28f41 -bugzilla: https://gitee.com/openeuler/kernel/issues/I8AU2M - -Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=306563985819ed2af9df0a26ae368ed12cf28f41 - -------------------------------------------------------------------- - -There are currently 1200+ instances of using platform_get_resource() -and devm_ioremap_resource() together in the kernel tree. - -This patch wraps these two calls in a single helper. Thanks to that -we don't have to declare a local variable for struct resource * and can -omit the redundant argument for resource type. We also have one -function call less. - -Signed-off-by: Bartosz Golaszewski -Acked-by: Greg Kroah-Hartman -Reviewed-by: Andy Shevchenko -Signed-off-by: Linus Walleij -Signed-off-by: hongrongxuan ---- - drivers/base/platform.c | 18 ++++++++++++++++++ - include/linux/platform_device.h | 3 +++ - 2 files changed, 21 insertions(+) - -diff --git a/drivers/base/platform.c b/drivers/base/platform.c -index be8c82cc4445..23ec70ef6897 100644 ---- a/drivers/base/platform.c -+++ b/drivers/base/platform.c -@@ -80,6 +80,24 @@ struct resource *platform_get_resource(struct platform_device *dev, - } - EXPORT_SYMBOL_GPL(platform_get_resource); - -+/** -+ * devm_platform_ioremap_resource - call devm_ioremap_resource() for a platform -+ * device -+ * -+ * @pdev: platform device to use both for memory resource lookup as well as -+ * resource managemend -+ * @index: resource index -+ */ -+void __iomem *devm_platform_ioremap_resource(struct platform_device *pdev, -+ unsigned int index) -+{ -+ struct resource *res; -+ -+ res = platform_get_resource(pdev, IORESOURCE_MEM, index); -+ return devm_ioremap_resource(&pdev->dev, res); -+} -+EXPORT_SYMBOL_GPL(devm_platform_ioremap_resource); -+ - /** - * platform_get_irq - get an IRQ for a device - * @dev: platform device -diff --git a/include/linux/platform_device.h b/include/linux/platform_device.h -index 1a9f38f27f65..9e5c98fcea8c 100644 ---- a/include/linux/platform_device.h -+++ b/include/linux/platform_device.h -@@ -51,6 +51,9 @@ extern struct device platform_bus; - extern void arch_setup_pdev_archdata(struct platform_device *); - extern struct resource *platform_get_resource(struct platform_device *, - unsigned int, unsigned int); -+extern void __iomem * -+devm_platform_ioremap_resource(struct platform_device *pdev, -+ unsigned int index); - extern int platform_get_irq(struct platform_device *, unsigned int); - extern int platform_irq_count(struct platform_device *); - extern struct resource *platform_get_resource_byname(struct platform_device *, --- -2.27.0 - diff --git a/series.conf b/series.conf index c629a7d3..2045d32a 100644 --- a/series.conf +++ b/series.conf @@ -51,7 +51,6 @@ patches/0047-Revert-perf-hisi-remove-duplicated-code.patch patches/0048-docs-perf-convert-to-ReST.patch patches/0049-drivers-perf-Fix-kernel-panic-when-rmmod-PMU-modules.patch patches/0050-For-drivers-that-do-not-support-context-exclusion-le.patch -patches/0051-drivers-provide-devm_platform_ioremap_resource.patch patches/0052-perf-hisi-use-devm_platform_ioremap_resource-to-simp.patch patches/0053-drivers-perf-hisi-Add-identifier-sysfs-file.patch patches/0054-drivers-perf-hisi-Remove-unnecessary-check-of-counte.patch -- Gitee