summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Ben Hutchings [Thu, 9 Jun 2016 22:35:08 +0000 (23:35 +0100)]
cpupower: Bump soname version
Forwarded: http://mid.gmane.org/
20160610005619.GQ7555@decadent.org.uk
Several functions in the libcpupower API are renamed or removed in
Linux 4.7. This is an backward-incompatible ABI change, so the
library soname should change from libcpupower.so.0 to
libcpupower.so.1.
Fixes: ac5a181d065d ("cpupower: Add cpuidle parts into library")
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name cpupower-bump-soname-version.patch
Ben Hutchings [Sun, 21 Feb 2016 15:33:15 +0000 (15:33 +0000)]
tools/build: Remove bpf() run-time check at build time
Forwarded: no
It is not correct to test that a syscall works on the build system's
kernel. We might be building on an earlier kernel version or with
security restrictions that block bpf().
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name tools-build-remove-bpf-run-time-check-at-build-time.patch
Ben Hutchings [Fri, 25 Sep 2015 21:50:50 +0000 (22:50 +0100)]
Revert "perf build: Fix libunwind feature detection on 32-bit x86"
Forwarded: no
This reverts commit
05b41775e2edd69a83f592e3534930c934d4038e.
It broke feature detection that was working just fine for us.
Gbp-Pq: Topic bugfix/x86
Gbp-Pq: Name revert-perf-build-fix-libunwind-feature-detection-on.patch
Ben Hutchings [Fri, 25 Sep 2015 19:09:23 +0000 (20:09 +0100)]
tools/perf: Remove shebang lines from perf scripts
Forwarded: no
perf scripts need to be invoked through perf, not directly through
perl (or other language interpreter). So including shebang lines in
them is useless and possibly misleading.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name tools-perf-remove-shebangs.patch
Ben Hutchings [Mon, 13 Jul 2015 19:29:20 +0000 (20:29 +0100)]
perf tools: Use $KBUILD_BUILD_TIMESTAMP as man page date
Forwarded: http://mid.gmane.org/
20160517132809.GE7555@decadent.org.uk
This allows man pages to be built reproducibly.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name tools-perf-man-date.patch
Ben Hutchings [Mon, 8 Sep 2014 17:31:24 +0000 (18:31 +0100)]
kbuild: Fix recordmcount dependency for OOT modules
Forwarded: no
We never rebuild anything in-tree when building an out-of-tree
modules, so external modules should not depend on the recordmcount
sources.
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name kbuild-fix-recordmcount-dependency.patch
Ben Hutchings [Sun, 24 Jun 2012 01:51:39 +0000 (02:51 +0100)]
usbip: Document TCP wrappers
Forwarded: no
Add references to TCP wrappers configuration in the manual page.
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name usbip-document-tcp-wrappers.patch
Ben Hutchings [Fri, 2 Dec 2016 23:06:18 +0000 (23:06 +0000)]
module: Disable matching missing version CRC
Forwarded: not-needed
This partly reverts commit
cd3caefb4663e3811d37cc2afad3cce642d60061.
We want to fail closed if a symbol version CRC is missing, as the
alternative may allow subverting module signing.
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name module-disable-matching-missing-version-crc.patch
Miklos Szeredi [Tue, 24 Jan 2023 15:41:18 +0000 (16:41 +0100)]
ovl: fail on invalid uid/gid mapping at copy up
Origin: https://git.kernel.org/linus/
4f11ada10d0ad3fd53e2bd67806351de63a4f9c3
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2023-0386
If st_uid/st_gid doesn't have a mapping in the mounter's user_ns, then
copy-up should fail, just like it would fail if the mounter task was doing
the copy using "cp -a".
There's a corner case where the "cp -a" would succeed but copy up fail: if
there's a mapping of the invalid uid/gid (65534 by default) in the user
namespace. This is because stat(2) will return this value if the mapping
doesn't exist in the current user_ns and "cp -a" will in turn be able to
create a file with this uid/gid.
This behavior would be inconsistent with POSIX ACL's, which return -1 for
invalid uid/gid which result in a failed copy.
For consistency and simplicity fail the copy of the st_uid/st_gid are
invalid.
Fixes: 459c7c565ac3 ("ovl: unprivieged mounts")
Cc: <stable@vger.kernel.org> # v5.11
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Reviewed-by: Christian Brauner <brauner@kernel.org>
Reviewed-by: Seth Forshee <sforshee@kernel.org>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name ovl-fail-on-invalid-uid-gid-mapping-at-copy-up.patch
Miklos Szeredi [Mon, 14 Dec 2020 14:26:13 +0000 (15:26 +0100)]
vfs: move cap_convert_nscap() call into vfs_setxattr()
Origin: https://git.kernel.org/linus/
7c03e2cda4a584cadc398e8f6641ca9988a39d52
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2021-3493
cap_convert_nscap() does permission checking as well as conversion of the
xattr value conditionally based on fs's user-ns.
This is needed by overlayfs and probably other layered fs (ecryptfs) and is
what vfs_foo() is supposed to do anyway.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Acked-by: James Morris <jamorris@linux.microsoft.com>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name vfs-move-cap_convert_nscap-call-into-vfs_setxattr.patch
Ben Hutchings [Thu, 25 Apr 2019 14:31:33 +0000 (15:31 +0100)]
ntfs: mark it as broken
NTFS has unfixed issues CVE-2018-12929, CVE-2018-12930, and
CVE-2018-12931. ntfs-3g is a better supported alternative.
Make sure it can't be enabled even in custom kernels.
Gbp-Pq: Topic debian
Gbp-Pq: Name ntfs-mark-it-as-broken.patch
Ben Hutchings [Tue, 16 Feb 2016 02:45:42 +0000 (02:45 +0000)]
[i386/686-pae] PCI: Set pci=nobios by default
Forwarded: not-needed
CONFIG_PCI_GOBIOS results in physical addresses 640KB-1MB being mapped
W+X, which is undesirable for security reasons and will result in a
warning at boot now that we enable CONFIG_DEBUG_WX.
This can be overridden using the kernel parameter "pci=nobios", but we
want to disable W+X by default. Disable PCI BIOS probing by default;
it can still be enabled using "pci=bios".
Gbp-Pq: Topic debian
Gbp-Pq: Name i386-686-pae-pci-set-pci-nobios-by-default.patch
Robert Holmes [Tue, 23 Apr 2019 07:39:29 +0000 (07:39 +0000)]
[PATCH] KEYS: Make use of platform keyring for module signature verify
Bug-Debian: https://bugs.debian.org/935945
Origin: https://src.fedoraproject.org/rpms/kernel/raw/master/f/KEYS-Make-use-of-platform-keyring-for-module-signature.patch
This patch completes commit
278311e417be ("kexec, KEYS: Make use of
platform keyring for signature verify") which, while adding the
platform keyring for bzImage verification, neglected to also add
this keyring for module verification.
As such, kernel modules signed with keys from the MokList variable
were not successfully verified.
Signed-off-by: Robert Holmes <robeholmes@gmail.com>
Signed-off-by: Jeremy Cline <jcline@redhat.com>
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name KEYS-Make-use-of-platform-keyring-for-module-signature.patch
Ben Hutchings [Sun, 5 May 2019 12:45:06 +0000 (13:45 +0100)]
MODSIGN: Make shash allocation failure fatal
mod_is_hash_blacklisted() currently returns 0 (suceess) if
crypto_alloc_shash() fails. This should instead be a fatal error,
so unwrap and pass up the error code.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name modsign-make-shash-allocation-failure-fatal.patch
Lee, Chun-Yi [Tue, 13 Mar 2018 10:38:03 +0000 (18:38 +0800)]
[PATCH 4/4] MODSIGN: check the attributes of db and mok
Origin: https://lore.kernel.org/patchwork/patch/933176/
That's better for checking the attributes of db and mok variables
before loading certificates to kernel keyring.
For db and dbx, both of them are authenticated variables. Which
means that they can only be modified by manufacturer's key. So
the kernel should checks EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS
attribute before we trust it.
For mok-rt and mokx-rt, both of them are created by shim boot loader
to forward the mok/mokx content to runtime. They must be runtime-volatile
variables. So kernel should checks that the attributes map did not set
EFI_VARIABLE_NON_VOLATILE bit before we trust it.
Cc: David Howells <dhowells@redhat.com>
Cc: Josh Boyer <jwboyer@fedoraproject.org>
Cc: James Bottomley <James.Bottomley@HansenPartnership.com>
Signed-off-by: "Lee, Chun-Yi" <jlee@suse.com>
[Rebased by Luca Boccassi]
[bwh: Forward-ported to 5.5.9:
- get_cert_list() takes a pointer to status and returns the cert list
- Adjust filename, context]
[bwh: Forward-ported to 5.10: MokListRT and MokListXRT are now both
loaded through a single code path.]
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name 0004-MODSIGN-check-the-attributes-of-db-and-mok.patch
Lee, Chun-Yi [Tue, 13 Mar 2018 10:38:02 +0000 (18:38 +0800)]
[PATCH 3/4] MODSIGN: checking the blacklisted hash before loading a kernel module
Origin: https://lore.kernel.org/patchwork/patch/933175/
This patch adds the logic for checking the kernel module's hash
base on blacklist. The hash must be generated by sha256 and enrolled
to dbx/mokx.
For example:
sha256sum sample.ko
mokutil --mokx --import-hash $HASH_RESULT
Whether the signature on ko file is stripped or not, the hash can be
compared by kernel.
Cc: David Howells <dhowells@redhat.com>
Cc: Josh Boyer <jwboyer@fedoraproject.org>
Cc: James Bottomley <James.Bottomley@HansenPartnership.com>
Signed-off-by: "Lee, Chun-Yi" <jlee@suse.com>
[Rebased by Luca Boccassi]
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name 0003-MODSIGN-checking-the-blacklisted-hash-before-loading-a-kernel-module.patch
Lee, Chun-Yi [Tue, 13 Mar 2018 10:37:59 +0000 (18:37 +0800)]
[PATCH 1/5] MODSIGN: do not load mok when secure boot disabled
Origin: https://lore.kernel.org/patchwork/patch/933173/
The mok can not be trusted when the secure boot is disabled. Which
means that the kernel embedded certificate is the only trusted key.
Due to db/dbx are authenticated variables, they needs manufacturer's
KEK for update. So db/dbx are secure when secureboot disabled.
Cc: David Howells <dhowells@redhat.com>
Cc: Josh Boyer <jwboyer@fedoraproject.org>
Cc: James Bottomley <James.Bottomley@HansenPartnership.com>
Signed-off-by: "Lee, Chun-Yi" <jlee@suse.com>
[Rebased by Luca Boccassi]
[bwh: Forward-ported to 5.5.9:
- get_cert_list() takes a pointer to status and returns the cert list
- Adjust filename]
[Salvatore Bonaccorso: Forward-ported to 5.10: Refresh for changes in
38a1f03aa240 ("integrity: Move import of MokListRT certs to a separate
routine"). Refresh in context for change in
ebd9c2ae369a ("integrity: Load mokx
variables into the blacklist keyring")]
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name 0001-MODSIGN-do-not-load-mok-when-secure-boot-disabled.patch
Linn Crosetto [Tue, 30 Aug 2016 17:54:38 +0000 (11:54 -0600)]
arm64: add kernel config option to lock down when in Secure Boot mode
Bug-Debian: https://bugs.debian.org/831827
Forwarded: no
Add a kernel configuration option to lock down the kernel, to restrict
userspace's ability to modify the running kernel when UEFI Secure Boot is
enabled. Based on the x86 patch by Matthew Garrett.
Determine the state of Secure Boot in the EFI stub and pass this to the
kernel using the FDT.
Signed-off-by: Linn Crosetto <linn@hpe.com>
[bwh: Forward-ported to 4.10: adjust context]
[Lukas Wunner: Forward-ported to 4.11: drop parts applied upstream]
[bwh: Forward-ported to 4.15 and lockdown patch set:
- Pass result of efi_get_secureboot() in stub through to
efi_set_secure_boot() in main kernel
- Use lockdown API and naming]
[bwh: Forward-ported to 4.19.3: adjust context in update_fdt()]
[dannf: Moved init_lockdown() call after uefi_init(), fixing SB detection]
[bwh: Drop call to init_lockdown(), as efi_set_secure_boot() now calls this]
[bwh: Forward-ported to 5.6: efi_get_secureboot() no longer takes a
sys_table parameter]
[bwh: Forward-ported to 5.7: EFI initialisation from FDT was rewritten, so:
- Add Secure Boot mode to the parameter enumeration in fdtparams.c
- Add a parameter to efi_get_fdt_params() to return the Secure Boot mode
- Since Xen does not have a property name defined for Secure Boot mode,
change efi_get_fdt_prop() to handle a missing property name by clearing
the output variable]
[Salvatore Bonaccorso: Forward-ported to 5.10:
f30f242fb131 ("efi: Rename
arm-init to efi-init common for all arch") renamed arm-init.c to efi-init.c]
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name arm64-add-kernel-config-option-to-lock-down-when.patch
Ben Hutchings [Fri, 30 Aug 2019 14:54:24 +0000 (15:54 +0100)]
mtd: phram,slram: Disable when the kernel is locked down
Forwarded: https://lore.kernel.org/linux-security-module/
20190830154720.eekfjt6c4jzvlbfz@decadent.org.uk/
These drivers allow mapping arbitrary memory ranges as MTD devices.
This should be disabled to preserve the kernel's integrity when it is
locked down.
* Add the HWPARAM flag to the module parameters
* When slram is built-in, it uses __setup() to read kernel parameters,
so add an explicit check security_locked_down() check
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Cc: Matthew Garrett <mjg59@google.com>
Cc: David Howells <dhowells@redhat.com>
Cc: Joern Engel <joern@lazybastard.org>
Cc: linux-mtd@lists.infradead.org
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name mtd-disable-slram-and-phram-when-locked-down.patch
Ben Hutchings [Tue, 10 Sep 2019 10:54:28 +0000 (11:54 +0100)]
efi: Lock down the kernel if booted in secure boot mode
Based on an earlier patch by David Howells, who wrote the following
description:
> UEFI Secure Boot provides a mechanism for ensuring that the firmware will
> only load signed bootloaders and kernels. Certain use cases may also
> require that all kernel modules also be signed. Add a configuration option
> that to lock down the kernel - which includes requiring validly signed
> modules - if the kernel is secure-booted.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name efi-lock-down-the-kernel-if-booted-in-secure-boot-mo.patch
David Howells [Mon, 18 Feb 2019 12:45:03 +0000 (12:45 +0000)]
[28/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
Origin: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/commit?id=
a5d70c55c603233c192b375f72116a395909da28
UEFI machines can be booted in Secure Boot mode. Add an EFI_SECURE_BOOT
flag that can be passed to efi_enabled() to find out whether secure boot is
enabled.
Move the switch-statement in x86's setup_arch() that inteprets the
secure_boot boot parameter to generic code and set the bit there.
Suggested-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
cc: linux-efi@vger.kernel.org
[rperier: Forward-ported to 5.5:
- Use pr_warn()
- Adjust context]
[bwh: Forward-ported to 5.6: adjust context]
[bwh: Forward-ported to 5.7:
- Use the next available bit in efi.flags
- Adjust context]
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name efi-add-an-efi_secure_boot-flag-to-indicate-secure-b.patch
Ben Hutchings [Mon, 24 Feb 2025 01:02:26 +0000 (02:02 +0100)]
Revert "xen/swiotlb: add alignment check for dma buffers"
Bug-Debian: https://bugs.debian.org/
1087807
Bug-Debian: https://bugs.debian.org/
1088159
Bug-Debian: https://bugs.debian.org/
1093371
This reverts commit
a0a8b7bebe1b1f9017b09e1e045f16725e871f9c, which
was commit
9f40ec84a7976d95c34e7cc070939deb103652b0 upstream. This
caused regressions for a number of drivers under Xen.
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name revert-xen-swiotlb-add-alignment-check-for-dma-buffe.patch
Ben Hutchings [Thu, 7 Jul 2022 16:58:43 +0000 (18:58 +0200)]
wireguard: Clear keys after suspend despite CONFIG_ANDROID=y
Forwarded: not-needed
WireGuard assumes that CONFIG_ANDROID implies Android power
management, i.e. user-space suspending the system automatically at
short intervals, and so does not clear keys after a suspend/resume
cycle. Debian systems don't do that kind of power management but we
do set CONFIG_ANDROID on some architectures as a dependency of Binder.
In 5.20, CONFIG_PM_USERSPACE_AUTOSLEEP will be introduced to tell the
kernel that this kind of power management is in use, and
CONFIG_ANDROID will be removed. For now, remove this one test that
does the wrong thing for us.
References: https://lwn.net/Articles/899743/
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name wireguard-ignore-config_android.patch
Ben Hutchings [Tue, 20 Aug 2019 17:12:35 +0000 (18:12 +0100)]
Partially revert "net: socket: implement 64-bit timestamps"
The introduction of SIOCGSTAMP{,NS}_OLD and move of SICOGSTAMP{,NS} to
a different header has caused build failures for various user-space
programs including qemu and suricata. It also causes a test failure
for glibc.
For now, remove the _OLD suffix on the old ioctl numbers and require
programs using 64-bit timestamps to explicitly use SIOCGSTAMP{,NS}_NEW.
References: https://lore.kernel.org/lkml/
af0eb47a-5b98-1bd9-3e8d-
652e7f28b01f@de.ibm.com/
References: https://bugs.debian.org/934316
References: https://ci.debian.net/data/autopkgtest/testing/amd64/g/glibc/
2772289/log.gz
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name partially-revert-net-socket-implement-64-bit-timestamps.patch
Ben Hutchings [Mon, 7 Sep 2020 02:38:04 +0000 (03:38 +0100)]
Makefile: Do not check for libelf when building OOT module
When building out-of-tree modules, the necessary tools should have
already been built. We therefore do not need libelf-dev to be
installed.
This effectively reverts commit
9f0c18aec620 "objtool: Fix
CONFIG_STACK_VALIDATION=y warning for out-of-tree modules", and
similarly moves the check introduced by commit
33a57ce0a54d "bpf:
Compile resolve_btfids tool at kernel compilation start".
Gbp-Pq: Topic debian
Gbp-Pq: Name makefile-do-not-check-for-libelf-when-building-oot-module.patch
Ben Hutchings [Wed, 13 Apr 2016 20:48:06 +0000 (21:48 +0100)]
fs: Add MODULE_SOFTDEP declarations for hard-coded crypto drivers
Bug-Debian: https://bugs.debian.org/819725
Forwarded: http://mid.gmane.org/
20160517133631.GF7555@decadent.org.uk
This helps initramfs builders and other tools to find the full
dependencies of a module.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
[Lukas Wunner: Forward-ported to 4.11: drop parts applied upstream]
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name fs-add-module_softdep-declarations-for-hard-coded-cr.patch
Ian Campbell [Wed, 20 Nov 2013 08:30:14 +0000 (08:30 +0000)]
phy/marvell: disable 4-port phys
Bug-Debian: https://bugs.debian.org/723177
Forwarded: http://thread.gmane.org/gmane.linux.debian.devel.bugs.general/
1107774/
The Marvell PHY was originally disabled because it can cause networking
failures on some systems. According to Lennert Buytenhek this is because some
of the variants added did not share the same register layout. Since the known
cases are all 4-ports disable those variants (indicated by a 4 in the
penultimate position of the model name) until they can be audited for
correctness.
[bwh: Also #if-out the init functions for these PHYs to avoid
compiler warnings]
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name disable-some-marvell-phys.patch
Ben Hutchings [Mon, 12 Feb 2018 23:59:26 +0000 (23:59 +0000)]
x86: Make x32 syscall support conditional on a kernel parameter
Bug-Debian: https://bugs.debian.org/708070
Forwarded: https://lore.kernel.org/lkml/
1415245982.3398.53.camel@decadent.org.uk/T/#u
Enabling x32 in the standard amd64 kernel would increase its attack
surface while provide no benefit to the vast majority of its users.
No-one seems interested in regularly checking for vulnerabilities
specific to x32 (at least no-one with a white hat).
Still, adding another flavour just to turn on x32 seems wasteful. And
the only differences on syscall entry are a few instructions that mask
out the x32 flag and compare the syscall number.
Use a static key to control whether x32 syscalls are really enabled, a
Kconfig parameter to set its default value and a kernel parameter
"syscall.x32" to change it at boot time.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/x86
Gbp-Pq: Name x86-make-x32-syscall-support-conditional.patch
Ben Hutchings [Mon, 5 Dec 2011 04:00:58 +0000 (04:00 +0000)]
x86: memtest: WARN if bad RAM found
Bug-Debian: https://bugs.debian.org/613321
Forwarded: http://thread.gmane.org/gmane.linux.kernel/
1286471
Since this is not a particularly thorough test, if we find any bad
bits of RAM then there is a fair chance that there are other bad bits
we fail to detect.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/x86
Gbp-Pq: Name x86-memtest-WARN-if-bad-RAM-found.patch
Ard Biesheuvel [Fri, 1 Jul 2022 13:53:22 +0000 (15:53 +0200)]
arm64: compat: Implement misalignment fixups for multiword loads
Origin: https://git.kernel.org/linus/
3fc24ef32d3b9368f4c103dcd21d6a3f959b4870
The 32-bit ARM kernel implements fixups on behalf of user space when
using LDM/STM or LDRD/STRD instructions on addresses that are not 32-bit
aligned. This is not something that is supported by the architecture,
but was done anyway to increase compatibility with user space software,
which mostly targeted x86 at the time and did not care about aligned
accesses.
This feature is one of the remaining impediments to being able to switch
to 64-bit kernels on 64-bit capable hardware running 32-bit user space,
so let's implement it for the arm64 compat layer as well.
Note that the intent is to implement the exact same handling of
misaligned multi-word loads and stores as the 32-bit kernel does,
including what appears to be missing support for user space programs
that rely on SETEND to switch to a different byte order and back. Also,
like the 32-bit ARM version, we rely on the faulting address reported by
the CPU to infer the memory address, instead of decoding the instruction
fully to obtain this information.
This implementation is taken from the 32-bit ARM tree, with all pieces
removed that deal with instructions other than LDRD/STRD and LDM/STM, or
that deal with alignment exceptions taken in kernel mode.
Cc: debian-arm@lists.debian.org
Cc: Vagrant Cascadian <vagrant@debian.org>
Cc: Riku Voipio <riku.voipio@iki.fi>
Cc: Steve McIntyre <steve@einval.com>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Reviewed-by: Arnd Bergmann <arnd@arndb.de>
Link: https://lore.kernel.org/r/20220701135322.3025321-1-ardb@kernel.org
[catalin.marinas@arm.com: change the option to 'default n']
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Gbp-Pq: Topic features/arm64
Gbp-Pq: Name arm64-compat-Implement-misalignment-fixups-for-multi.patch
Cyril Brulebois [Mon, 3 Jan 2022 20:59:36 +0000 (21:59 +0100)]
arm64: dts: Add support for Raspberry Pi Compute Module 4 IO Board
It was introduced in mainline during the v5.16 release cycle. Since
many broadcom includes were reworked since v5.10, adding support would
involve more than cherry-picking a DTS addition that uses a few
includes.
To avoid side effects on other models, introduce a DTS that leverages
some existing includes (bcm2711.dtsi and bcm283x-rpi-usb-host.dtsi)
and describes the rest without re-using parts of the Raspberry Pi 4 B
model.
To avoid phandle rotation (0x16, 0x17, and 0x18) across 3 nodes
(dma@
7e007000, i2c@
7e205000, and interrupt-controller@
7ef00100), and the
related changes in other nodes referencing them, hardcode 0x16 as the
phandle for interrupt-controller@
7ef00100. This leads to an empty dtdiff
between this new DTB and the one produced by a v5.16-rc8 build.
Authored-by: Uwe Kleine-König <u.kleine-koenig@pengutronix.de>
Reviewed-by: Cyril Brulebois <cyril@debamax.com>
Gbp-Pq: Topic features/arm64
Gbp-Pq: Name arm64-dts-raspberry-Add-support-for-the-CM4.patch
Uwe Kleine-König [Mon, 10 May 2021 09:09:32 +0000 (11:09 +0200)]
arm64: dts: rockchip: Add support for PCIe on helios64
Origin: https://git.kernel.org/pub/scm/linux/kernel/git/mmind/linux-rockchip.git/patch/?id=
5a65adfa2ad1542f856fc7de3999d51f3a35d2e2
This is enough to make the SATA controller visible:
# lspci
00:00.0 PCI bridge: Fuzhou Rockchip Electronics Co., Ltd RK3399 PCI Express Root Port
01:00.0 SATA controller: JMicron Technology Corp. JMB58x AHCI SATA controller
Signed-off-by: Uwe Kleine-König <uwe@kleine-koenig.org>
Link: https://lore.kernel.org/r/20210510090932.970447-1-uwe@kleine-koenig.org
Signed-off-by: Heiko Stuebner <heiko@sntech.de>
Gbp-Pq: Topic features/arm64
Gbp-Pq: Name arm64-dts-rockchip-Add-support-for-PCIe-on-helios64.patch
Uwe Kleine-König [Mon, 10 May 2021 09:06:07 +0000 (11:06 +0200)]
arm64: dts: rockchip: Add support for two PWM fans on helios64
Origin: https://git.kernel.org/pub/scm/linux/kernel/git/mmind/linux-rockchip.git/patch/?id=
271b66414df0b172c936b3cfd1894b7939f84165
On the helios64 board the two connectors P6 and P7 are supposed to
power two fans. Add the corresponding pwm-fan devices.
Signed-off-by: Uwe Kleine-König <uwe@kleine-koenig.org>
Link: https://lore.kernel.org/r/20210510090607.970145-1-uwe@kleine-koenig.org
Signed-off-by: Heiko Stuebner <heiko@sntech.de>
Gbp-Pq: Topic features/arm64
Gbp-Pq: Name arm64-dts-rockchip-Add-support-for-two-PWM-fans-on-h.patch
Uwe Kleine-König [Mon, 29 Mar 2021 08:45:58 +0000 (09:45 +0100)]
arm64: dts: rockchip: kobol-helios64: Add mmc aliases
This patch is part of commit
5dcbe7e3862d ("arm64: dts: rockchip: move mmc
aliases to board dts on rk3399") upstream. It is applied here only for Kobol's
helios64 to simplify conflict resolution for some further patches. It currently
is a noop as the same aliases already exist in rk3399.dtsi.
Link: https://lore.kernel.org/r/20210324122235.1059292-7-heiko@sntech.de
Gbp-Pq: Topic features/arm64
Gbp-Pq: Name arm64-dts-rockchip-kobol-helios64-Add-mmc-aliases.patch
Uwe Kleine-König [Sun, 24 Jan 2021 21:03:28 +0000 (22:03 +0100)]
arm64: dts: rockchip: Rely on SoC external pull up on pmic-int-l on Helios64
Origin: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=
1e58ba111421375c5948c3e8145bdd84b06ac095
According to the schematic there is an external pull up, so there is no
need to enable the internal one additionally. Using no pull up matches
the vendor device tree.
Signed-off-by: Uwe Kleine-König <uwe@kleine-koenig.org>
Link: https://lore.kernel.org/r/20210124210328.611707-2-uwe@kleine-koenig.org
Signed-off-by: Heiko Stuebner <heiko@sntech.de>
Gbp-Pq: Topic features/arm64
Gbp-Pq: Name arm64-dts-rockchip-Rely-on-SoC-external-pull-up-on-p.patch
Uwe Kleine-König [Wed, 14 Oct 2020 20:00:30 +0000 (22:00 +0200)]
arm64: dts: rockchip: Add basic support for Kobol's Helios64
Origin: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=
09e006cfb43e8ec38afe28278b210dab72e6cac8
The hardware is described in detail on Kobol's wiki at
https://wiki.kobol.io/helios64/intro/.
Up to now the following peripherals are working:
- UART
- Micro-SD card
- eMMC
- ethernet port 1
- status LED
- temperature sensor on i2c bus 2
Signed-off-by: Uwe Kleine-König <uwe@kleine-koenig.org>
Link: https://lore.kernel.org/r/20201014200030.845759-3-uwe@kleine-koenig.org
Signed-off-by: Heiko Stuebner <heiko@sntech.de>
Gbp-Pq: Topic features/arm64
Gbp-Pq: Name arm64-dts-rockchip-Add-basic-support-for-Kobol-s-Hel.patch
Hans de Goede [Wed, 19 May 2021 13:56:18 +0000 (15:56 +0200)]
platform/x86: toshiba_haps: Fix missing newline in pr_debug call in toshiba_haps_notify
Origin: https://git.kernel.org/linus/
7dc4a18d017ca26abd1cea197e486fb3e5cd7632
Bug-Debian: https://bugs.debian.org/799193
The pr_debug() call in toshiba_haps_notify() is missing a newline at the
end of the string, add this.
BugLink: https://bugs.debian.org/799193
Reported-by: Salvatore Bonaccorso <carnil@debian.org>
Signed-off-by: Hans de Goede <hdegoede@redhat.com>
Link: https://lore.kernel.org/r/20210519135618.139701-1-hdegoede@redhat.com
Gbp-Pq: Topic bugfix/x86
Gbp-Pq: Name platform-x86-toshiba_haps-Fix-missing-newline-in-pr_.patch
Ben Hutchings [Tue, 25 Sep 2018 18:44:13 +0000 (19:44 +0100)]
x86-32: Disable 3D-Now in generic config
We want the 686 flavour to run on Geode LX and similar AMD family 5
CPUs as well as family 6 and higher CPUs. This used to work with
CONFIG_M686=y. However commit
25d76ac88821 "x86/Kconfig: Explicitly
enumerate i686-class CPUs in Kconfig" in Linux 4.16 has made the
kernel require family 6 or higher.
It looks like a sensible choice would be to enable CONFIG_MGEODE_LX
and CONFIG_X86_GENERIC (for more generic optimisations), but this
currently enables CONFIG_X86_USE_3D_NOW which will cause the kernel to
crash on CPUs without the AMD-specific 3D-Now instructions.
Make CONFIG_X86_USE_3DNOW depend on CONFIG_X86_GENERIC being disabled.
Gbp-Pq: Topic bugfix/x86
Gbp-Pq: Name x86-32-disable-3dnow-in-generic-config.patch
Geoff Levand [Wed, 13 Jun 2018 17:56:08 +0000 (10:56 -0700)]
arm64/acpi: Add fixup for HPE m400 quirks
Forwarded: https://patchwork.codeaurora.org/patch/547277/
Adds a new ACPI init routine acpi_fixup_m400_quirks that adds
a work-around for HPE ProLiant m400 APEI firmware problems.
The work-around disables APEI when CONFIG_ACPI_APEI is set and
m400 firmware is detected. Without this fixup m400 systems
experience errors like these on startup:
[Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 2
[Hardware Error]: event severity: fatal
[Hardware Error]: Error 0, type: fatal
[Hardware Error]: section_type: memory error
[Hardware Error]: error_status: 0x0000000000001300
[Hardware Error]: error_type: 10, invalid address
Kernel panic - not syncing: Fatal hardware error!
Signed-off-by: Geoff Levand <geoff@infradead.org>
[bwh: Adjust context to apply to Linux 4.19]
Gbp-Pq: Topic bugfix/arm64
Gbp-Pq: Name arm64-acpi-Add-fixup-for-HPE-m400-quirks.patch
Krzysztof Kozlowski [Wed, 29 Aug 2018 07:32:23 +0000 (09:32 +0200)]
powerpc/boot: Fix missing crc32poly.h when building with KERNEL_XZ
Origin: https://patchwork.ozlabs.org/patch/963258/
After commit
faa16bc404d7 ("lib: Use existing define with
polynomial") the lib/xz/xz_crc32.c includes a header from include/linux
directory thus any other user of this code should define proper include
path.
This fixes the build error on powerpc with CONFIG_KERNEL_XZ:
In file included from ../arch/powerpc/boot/../../../lib/decompress_unxz.c:233:0,
from ../arch/powerpc/boot/decompress.c:42:
../arch/powerpc/boot/../../../lib/xz/xz_crc32.c:18:29: fatal error: linux/crc32poly.h: No such file or directory
Reported-by: Michal Kubecek <mkubecek@suse.cz>
Fixes: faa16bc404d7 ("lib: Use existing define with polynomial")
Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
Reported-by: kbuild test robot <lkp@intel.com>
Reported-by: Meelis Roos <mroos@linux.ee>
Tested-by: Michal Kubecek <mkubecek@suse.cz>
Gbp-Pq: Topic bugfix/powerpc
Gbp-Pq: Name powerpc-boot-fix-missing-crc32poly.h-when-building-with-kernel_xz.patch
Ben Hutchings [Wed, 11 Jul 2018 22:40:55 +0000 (23:40 +0100)]
ARM: mm: Export __sync_icache_dcache() for xen-privcmd
Forwarded: https://marc.info/?l=linux-arm-kernel&m=
153134944429241
The xen-privcmd driver, which can be modular, calls set_pte_at()
which in turn may call __sync_icache_dcache().
The call to __sync_icache_dcache() may be optimised out because it is
conditional on !pte_special(), and xen-privcmd calls pte_mkspecial().
However, in a non-LPAE configuration there is no "special" bit and the
call is really unconditional.
Fixes: 3ad0876554ca ("xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE")
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/arm
Gbp-Pq: Name arm-mm-export-__sync_icache_dcache-for-xen-privcmd.patch
Ben Hutchings [Sat, 19 Aug 2017 20:42:09 +0000 (21:42 +0100)]
sh: Do not use hyphen in exported variable names
Forwarded: https://marc.info/?l=linux-sh&m=
150317827322995&w=2
arch/sh/Makefile defines and exports ld-bfd to be used by
arch/sh/boot/Makefile and arch/sh/boot/compressed/Makefile. Similarly
arch/sh/boot/Makefile defines and exports suffix-y to be used by
arch/sh/boot/compressed/Makefile. However some shells, including
dash, will not pass through environment variables whose name includes
a hyphen. Usually GNU make does not use a shell to recurse, but if
e.g. $(srctree) contains '~' it will use a shell here.
Rename these variables to ld_bfd and suffix_y.
References: https://buildd.debian.org/status/fetch.php?pkg=linux&arch=sh4&ver=4.13%7Erc5-1%7Eexp1&stamp=
1502943967&raw=0
Fixes: ef9b542fce00 ("sh: bzip2/lzma uImage support.")
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/sh
Gbp-Pq: Name sh-boot-do-not-use-hyphen-in-exported-variable-name.patch
Ben Hutchings [Sat, 22 Jul 2017 16:37:33 +0000 (17:37 +0100)]
perf tools: Fix unwind build on i386
Forwarded: no
EINVAL may not be defined when building unwind-libunwind.c with
REMOTE_UNWIND_LIBUNWIND, resulting in a compiler error in
LIBUNWIND__ARCH_REG_ID(). Its only caller, access_reg(), only checks
for a negative return value and doesn't care what it is. So change
-EINVAL to -1.
Fixes: 52ffe0ff02fc ("Support x86(32-bit) cross platform callchain unwind.")
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/x86
Gbp-Pq: Name perf-tools-fix-unwind-build-on-i386.patch
Heinrich Schuchardt [Mon, 4 Jun 2018 17:15:23 +0000 (19:15 +0200)]
arm64: dts: rockchip: correct voltage selector on Firefly-RK3399
Bug-Debian: https://bugs.debian.org/900799
Origin: https://git.kernel.org/pub/scm/linux/kernel/git/mmind/linux-rockchip.git/patch/?id=
710e8c4a54be82ee8a97324e7b4330bf191e08bf
Without this patch the Firefly-RK3399 board boot process hangs after these
lines:
fan53555-regulator 0-0040: FAN53555 Option[8] Rev[1] Detected!
fan53555-reg: supplied by vcc_sys
vcc1v8_s3: supplied by vcc_1v8
Blacklisting driver fan53555 allows booting.
The device tree uses a value of fcs,suspend-voltage-selector different to
any other board.
Changing this setting to the usual value is sufficient to enable booting
and also matches the value used in the vendor kernel.
Fixes: 171582e00db1 ("arm64: dts: rockchip: add support for firefly-rk3399 board")
Cc: stable@vger.kernel.org
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Heiko Stuebner <heiko@sntech.de>
Gbp-Pq: Topic bugfix/arm64
Gbp-Pq: Name dts-rockchip-correct-voltage-selector-firefly-RK3399.patch
Ben Hutchings [Fri, 17 Feb 2017 01:30:30 +0000 (01:30 +0000)]
ARM: dts: kirkwood: Fix SATA pinmux-ing for TS419
Forwarded: https://www.spinics.net/lists/arm-kernel/msg563610.html
Bug-Debian: https://bugs.debian.org/855017
The old board code for the TS419 assigns MPP pins 15 and 16 as SATA
activity signals (and none as SATA presence signals). Currently the
device tree assigns the SoC's default pinmux groups for SATA, which
conflict with the second Ethernet port.
Reported-by: gmbh@gazeta.pl
Tested-by: gmbh@gazeta.pl
References: https://bugs.debian.org/855017
Cc: stable@vger.kernel.org # 3.15+
Fixes: 934b524b3f49 ("ARM: Kirkwood: Add DT description of QNAP 419")
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/arm
Gbp-Pq: Name arm-dts-kirkwood-fix-sata-pinmux-ing-for-ts419.patch
Adam Borowski [Tue, 28 Mar 2017 14:55:05 +0000 (16:55 +0200)]
btrfs: warn about RAID5/6 being experimental at mount time
Bug-Debian: https://bugs.debian.org/863290
Origin: https://bugs.debian.org/863290#5
Too many people come complaining about losing their data -- and indeed,
there's no warning outside a wiki and the mailing list tribal knowledge.
Message severity chosen for consistency with XFS -- "alert" makes dmesg
produce nice red background which should get the point across.
Signed-off-by: Adam Borowski <kilobyte@angband.pl>
[bwh: Also add_taint() so this is flagged in bug reports]
Gbp-Pq: Topic debian
Gbp-Pq: Name btrfs-warn-about-raid5-6-being-experimental-at-mount.patch
Ben Hutchings [Wed, 13 Jul 2016 00:37:22 +0000 (01:37 +0100)]
fanotify: Taint on use of FANOTIFY_ACCESS_PERMISSIONS
Forwarded: not-needed
Various free and proprietary AV products use this feature and users
apparently want it. But punting access checks to userland seems like
an easy way to deadlock the system, and there will be nothing we can
do about that. So warn and taint the kernel if this feature is
actually used.
Gbp-Pq: Topic debian
Gbp-Pq: Name fanotify-taint-on-use-of-fanotify_access_permissions.patch
Ben Hutchings [Sat, 18 Mar 2017 20:47:58 +0000 (20:47 +0000)]
fjes: Disable auto-loading
Bug-Debian: https://bugs.debian.org/853976
Forwarded: no
fjes matches a generic ACPI device ID, and relies on its probe
function to distinguish whether that really corresponds to a supported
device. Very few system will need the driver and it wastes memory on
all the other systems where the same device ID appears, so disable
auto-loading.
Gbp-Pq: Topic debian
Gbp-Pq: Name fjes-disable-autoload.patch
Ben Hutchings [Sat, 20 Apr 2013 14:52:02 +0000 (15:52 +0100)]
viafb: Autoload on OLPC XO 1.5 only
Bug-Debian: https://bugs.debian.org/705788
Forwarded: no
It appears that viafb won't work automatically on all the boards for
which it has a PCI device ID match. Currently, it is blacklisted by
udev along with most other framebuffer drivers, so this doesn't matter
much.
However, this driver is required for console support on the XO 1.5.
We need to allow it to be autoloaded on this model only, and then
un-blacklist it in udev.
Gbp-Pq: Topic bugfix/x86
Gbp-Pq: Name viafb-autoload-on-olpc-xo1.5-only.patch
Ben Hutchings [Wed, 5 Feb 2014 23:01:30 +0000 (23:01 +0000)]
snd-pcsp: Disable autoload
Forwarded: not-needed
Bug-Debian: https://bugs.debian.org/697709
There are two drivers claiming the platform:pcspkr device:
- pcspkr creates an input(!) device that can only beep
- snd-pcsp creates an equivalent input device plus a PCM device that can
play barely recognisable renditions of sampled sound
snd-pcsp is blacklisted by the alsa-base package, but not everyone
installs that. On PCs where no sound is wanted at all, both drivers
will still be loaded and one or other will complain that it couldn't
claim the relevant I/O range.
In case anyone finds snd-pcsp useful, we continue to build it. But
remove the alias, to ensure it's not loaded where it's not wanted.
Gbp-Pq: Topic debian
Gbp-Pq: Name snd-pcsp-disable-autoload.patch
Ben Hutchings [Sun, 31 Mar 2013 02:58:04 +0000 (03:58 +0100)]
cdc_ncm,cdc_mbim: Use NCM by default
Forwarded: not-needed
Devices that support both NCM and MBIM modes should be kept in NCM
mode unless there is userland support for MBIM.
Set the default value of cdc_ncm.prefer_mbim to false and leave it to
userland (modem-manager) to override this with a modprobe.conf file
once it's ready to speak MBIM.
Gbp-Pq: Topic debian
Gbp-Pq: Name cdc_ncm-cdc_mbim-use-ncm-by-default.patch
Ben Hutchings [Tue, 20 Aug 2019 23:32:16 +0000 (00:32 +0100)]
intel-iommu: Add Kconfig option to exclude iGPU by default
Bug-Debian: https://bugs.debian.org/935270
Bug-Kali: https://bugs.kali.org/view.php?id=5644
There is still laptop firmware that touches the integrated GPU behind
the operating system's back, and doesn't say so in the RMRR table.
Enabling the IOMMU for all devices causes breakage.
Replace CONFIG_INTEL_IOMMU_DEFAULT_ON with a 3-way choice
corresponding to "on", "off", and "on,intgpu_off".
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/x86
Gbp-Pq: Name intel-iommu-add-kconfig-option-to-exclude-igpu-by-default.patch
Ben Hutchings [Tue, 20 Aug 2019 23:05:30 +0000 (00:05 +0100)]
intel-iommu: Add option to exclude integrated GPU only
Bug-Debian: https://bugs.debian.org/935270
Bug-Kali: https://bugs.kali.org/view.php?id=5644
There is still laptop firmware that touches the integrated GPU behind
the operating system's back, and doesn't say so in the RMRR table.
Enabling the IOMMU for all devices causes breakage, but turning it off
for all graphics devices seems like a major weakness.
Add an option, intel_iommu=igpu_off, to exclude only integrated GPUs
from remapping. This is a narrower exclusion than igfx_off: it only
affects Intel devices on the root bus. Devices attached through an
external port (Thunderbolt or ExpressCard) won't be on the root bus.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/x86
Gbp-Pq: Name intel-iommu-add-option-to-exclude-integrated-gpu-only.patch
Ben Hutchings [Mon, 11 Jan 2016 15:23:55 +0000 (15:23 +0000)]
security,perf: Allow further restriction of perf_event_open
Forwarded: https://lkml.org/lkml/2016/1/11/587
When kernel.perf_event_open is set to 3 (or greater), disallow all
access to performance events by users without CAP_SYS_ADMIN.
Add a Kconfig symbol CONFIG_SECURITY_PERF_EVENTS_RESTRICT that
makes this value the default.
This is based on a similar feature in grsecurity
(CONFIG_GRKERNSEC_PERF_HARDEN). This version doesn't include making
the variable read-only. It also allows enabling further restriction
at run-time regardless of whether the default is changed.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/all
Gbp-Pq: Name security-perf-allow-further-restriction-of-perf_event_open.patch
Serge Hallyn [Fri, 31 May 2013 18:12:12 +0000 (19:12 +0100)]
add sysctl to disallow unprivileged CLONE_NEWUSER by default
Origin: http://kernel.ubuntu.com/git?p=serge%2Fubuntu-saucy.git;a=commit;h=
5c847404dcb2e3195ad0057877e1422ae90892b8
add sysctl to disallow unprivileged CLONE_NEWUSER by default
This is a short-term patch. Unprivileged use of CLONE_NEWUSER
is certainly an intended feature of user namespaces. However
for at least saucy we want to make sure that, if any security
issues are found, we have a fail-safe.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
[bwh: Remove unneeded binary sysctl bits]
[bwh: Keep this sysctl, but change the default to enabled]
Gbp-Pq: Topic debian
Gbp-Pq: Name add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by-default.patch
Ben Hutchings [Wed, 19 Jun 2013 03:35:28 +0000 (04:35 +0100)]
yama: Disable by default
Bug-Debian: https://bugs.debian.org/712740
Forwarded: not-needed
Gbp-Pq: Topic debian
Gbp-Pq: Name yama-disable-by-default.patch
Ben Hutchings [Wed, 16 Mar 2011 03:17:06 +0000 (03:17 +0000)]
sched: Do not enable autogrouping by default
Forwarded: not-needed
We want to provide the option of autogrouping but without enabling
it by default yet.
Gbp-Pq: Topic debian
Gbp-Pq: Name sched-autogroup-disabled.patch
Ben Hutchings [Fri, 2 Nov 2012 05:32:06 +0000 (05:32 +0000)]
fs: Enable link security restrictions by default
Bug-Debian: https://bugs.debian.org/609455
Forwarded: not-needed
This reverts commit
561ec64ae67ef25cac8d72bb9c4bfc955edfd415
('VFS: don't do protected {sym,hard}links by default').
Gbp-Pq: Topic debian
Gbp-Pq: Name fs-enable-link-security-restrictions-by-default.patch
Ben Hutchings [Sun, 4 Aug 2019 23:29:11 +0000 (00:29 +0100)]
hamradio: Disable auto-loading as mitigation against local exploits
Forwarded: not-needed
We can mitigate the effect of vulnerabilities in obscure protocols by
preventing unprivileged users from loading the modules, so that they
are only exploitable on systems where the administrator has chosen to
load the protocol.
The 'ham' radio protocols (ax25, netrom, rose) are not actively
maintained or widely used. Therefore disable auto-loading.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic debian
Gbp-Pq: Name hamradio-disable-auto-loading-as-mitigation-against-local-exploits.patch
Ben Hutchings [Thu, 16 Feb 2017 19:09:17 +0000 (19:09 +0000)]
dccp: Disable auto-loading as mitigation against local exploits
Forwarded: not-needed
We can mitigate the effect of vulnerabilities in obscure protocols by
preventing unprivileged users from loading the modules, so that they
are only exploitable on systems where the administrator has chosen to
load the protocol.
The 'dccp' protocol is not actively maintained or widely used.
Therefore disable auto-loading.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic debian
Gbp-Pq: Name dccp-disable-auto-loading-as-mitigation-against-local-exploits.patch
Ben Hutchings [Fri, 19 Nov 2010 02:12:48 +0000 (02:12 +0000)]
[PATCH 1/3] rds: Disable auto-loading as mitigation against local exploits
Forwarded: not-needed
Recent review has revealed several bugs in obscure protocol
implementations that can be exploited by local users for denial of
service or privilege escalation. We can mitigate the effect of any
remaining vulnerabilities in such protocols by preventing unprivileged
users from loading the modules, so that they are only exploitable on
systems where the administrator has chosen to load the protocol.
The 'rds' protocol is one such protocol that has been found to be
vulnerable, and which was not present in the 'lenny' kernel.
Therefore disable auto-loading.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic debian
Gbp-Pq: Name rds-Disable-auto-loading-as-mitigation-against-local.patch
Ben Hutchings [Fri, 19 Nov 2010 02:12:48 +0000 (02:12 +0000)]
[PATCH 2/3] af_802154: Disable auto-loading as mitigation against local exploits
Forwarded: not-needed
Recent review has revealed several bugs in obscure protocol
implementations that can be exploited by local users for denial of
service or privilege escalation. We can mitigate the effect of any
remaining vulnerabilities in such protocols by preventing unprivileged
users from loading the modules, so that they are only exploitable on
systems where the administrator has chosen to load the protocol.
The 'af_802154' (IEEE 802.15.4) protocol is not widely used, was
not present in the 'lenny' kernel, and seems to receive only sporadic
maintenance. Therefore disable auto-loading.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic debian
Gbp-Pq: Name af_802154-Disable-auto-loading-as-mitigation-against.patch
Ben Hutchings [Mon, 12 Mar 2018 01:14:03 +0000 (01:14 +0000)]
firmware_class: Refer to Debian wiki page when logging missing firmware
Bug-Debian: https://bugs.debian.org/888405
Forwarded: not-needed
If firmware loading fails due to a missing file, log a second error
message referring to our wiki page about firmware. This will explain
why some firmware is in non-free, or can't be packaged at all. Only
do this once per boot.
Do something similar in the radeon and amdgpu drivers, where we have
an early check to avoid failing at a point where we cannot display
anything.
Gbp-Pq: Topic debian
Gbp-Pq: Name firmware_class-refer-to-debian-wiki-firmware-page.patch
Ben Hutchings [Tue, 8 Jan 2013 03:25:52 +0000 (03:25 +0000)]
radeon, amdgpu: Firmware is required for DRM and KMS on R600 onward
Bug-Debian: https://bugs.debian.org/607194
Bug-Debian: https://bugs.debian.org/607471
Bug-Debian: https://bugs.debian.org/610851
Bug-Debian: https://bugs.debian.org/627497
Bug-Debian: https://bugs.debian.org/632212
Bug-Debian: https://bugs.debian.org/637943
Bug-Debian: https://bugs.debian.org/649448
Bug-Debian: https://bugs.debian.org/697229
Forwarded: no
radeon requires firmware/microcode for the GPU in all chips, but for
newer chips (apparently R600 'Evergreen' onward) it also expects
firmware for the memory controller and other sub-blocks.
radeon attempts to gracefully fall back and disable some features if
the firmware is not available, but becomes unstable - the framebuffer
and/or system memory may be corrupted, or the display may stay black.
Therefore, perform a basic check for the existence of
/lib/firmware/{radeon,amdgpu} when a device is probed, and abort if it
is missing, except for the pre-R600 case.
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name radeon-amdgpu-firmware-is-required-for-drm-and-kms-on-r600-onward.patch
Ben Hutchings [Sun, 9 Dec 2012 16:40:31 +0000 (16:40 +0000)]
firmware: Remove redundant log messages from drivers
Forwarded: no
Now that firmware_class logs every success and failure consistently,
many other log messages can be removed from drivers.
This will probably need to be split up into multiple patches prior to
upstream submission.
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name firmware-remove-redundant-log-messages-from-drivers.patch
Ben Hutchings [Sun, 9 Dec 2012 16:02:00 +0000 (16:02 +0000)]
firmware_class: Log every success and failure against given device
Forwarded: no
The hundreds of users of request_firmware() have nearly as many
different log formats for reporting failures. They also have only the
vaguest hint as to what went wrong; only firmware_class really knows
that. Therefore, add specific log messages for the failure modes that
aren't currently logged.
In case of a driver that tries multiple names, this may result in the
impression that it failed to initialise. Therefore, also log successes.
This makes many error messages in drivers redundant, which will be
removed in later patches.
This does not cover the case where we fall back to a user-mode helper
(which is no longer enabled in Debian).
NOTE: hw-detect will depend on the "firmware: failed to load %s (%d)\n"
format to detect missing firmware.
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name firmware_class-log-every-success-and-failure.patch
Ben Hutchings [Mon, 19 May 2025 17:24:37 +0000 (19:24 +0200)]
iwlwifi: Do not request unreleased firmware for IWL6000
Bug-Debian: https://bugs.debian.org/689416
Forwarded: not-needed
The iwlwifi driver currently supports firmware API versions 4-6 for
these devices. It will request the file for the latest supported
version and then fall back to earlier versions. However, the latest
version that has actually been released is 4, so we expect the
requests for versions 6 and then 5 to fail.
The installer appears to report any failed request, and it is probably
not easy to detect that this particular failure is harmless. So stop
requesting the unreleased firmware.
Gbp-Pq: Topic debian
Gbp-Pq: Name iwlwifi-do-not-request-unreleased-firmware.patch
Ben Hutchings [Mon, 24 Aug 2009 22:19:58 +0000 (23:19 +0100)]
af9005: Use request_firmware() to load register init script
Forwarded: no
Read the register init script from the Windows driver. This is sick
but should avoid the potential copyright infringement in distributing
a version of the script which is directly derived from the driver.
Gbp-Pq: Topic features/all
Gbp-Pq: Name drivers-media-dvb-usb-af9005-request_firmware.patch
Ben Hutchings [Mon, 26 Apr 2021 16:27:16 +0000 (18:27 +0200)]
kbuild: Abort build if SUBDIRS used
Forwarded: not-needed
Bug-Debian: https://bugs.debian.org/987575
DKMS and module-assistant both build OOT modules as root. If they
build an old OOT module that still use SUBDIRS this causes Kbuild
to try building a full kernel, which obviously fails but not before
deleting files from the installed headers package.
To avoid such mishaps, detect this situation and abort the build.
The error message is based on that used in commit
0126be38d988
"kbuild: announce removal of SUBDIRS if used".
Gbp-Pq: Topic debian
Gbp-Pq: Name kbuild-abort-build-if-subdirs-used.patch
Ben Hutchings [Thu, 10 Dec 2020 16:31:39 +0000 (17:31 +0100)]
kbuild: Look for module.lds under arch directory too
Forwarded: not-needed
Bug-Debian: https://bugs.debian.org/975571
The module.lds linker script is now built under the scripts directory,
where previously it was under arch/$(SRCARCH).
However, we package the scripts directory as linux-kbuild, which is
meant to be able to do support native and cross-builds. That means it
shouldn't contain files for a specific target architecture without a
wrapper to select between them, and it doesn't appear that linker
scripts are powerful enough to implement such a wrapper.
Building module.lds in a different location would require relatively
large changes. Moving it in the package build rules can work, but we
need to support custom kernel builds from the same source so we can't
assume it's moved.
Therefore, we move module.lds under the arch build directory in
rules.real and change Makefile.modfinal to look for it in both places.
Gbp-Pq: Topic debian
Gbp-Pq: Name kbuild-look-for-module.lds-under-arch-directory-too.patch
Bastian Blank [Tue, 4 Aug 2020 09:44:37 +0000 (09:44 +0000)]
[PATCH 2/2] perf/traceevent: Support asciidoctor for documentation
From
cd02fc78859ef9aefd7c92406f9523622da0b472 Mon Sep 17 00:00:00 2001
Forwarded: not-needed
Gbp-Pq: Topic debian
Gbp-Pq: Name perf-traceevent-support-asciidoctor-for-documentatio.patch
Bastian Blank [Tue, 4 Aug 2020 09:44:19 +0000 (09:44 +0000)]
[PATCH 1/2] Documentation: Drop sphinx version check
From
252aa79fdbd4ac2da09d9b98f81bf11f5e3e1870 Mon Sep 17 00:00:00 2001
Forwarded: not-needed
Gbp-Pq: Topic debian
Gbp-Pq: Name documentation-drop-sphinx-version-check.patch
Ben Hutchings [Fri, 22 Jun 2018 16:27:00 +0000 (17:27 +0100)]
android: Enable building ashmem and binder as modules
Bug-Debian: https://bugs.debian.org/901492
We want to enable use of the Android ashmem and binder drivers to
support Anbox, but they should not be built-in as that would waste
resources and increase security attack surface on systems that don't
need them.
- Add a MODULE_LICENSE declaration to ashmem
- Change the Makefiles to build each driver as an object with the
"_linux" suffix (which is what Anbox expects)
- Change config symbol types to tristate
Gbp-Pq: Topic debian
Gbp-Pq: Name android-enable-building-ashmem-and-binder-as-modules.patch
Ben Hutchings [Mon, 7 Sep 2020 01:51:53 +0000 (02:51 +0100)]
Export symbols needed by Android drivers
Bug-Debian: https://bugs.debian.org/901492
We want to enable use of the Android ashmem and binder drivers to
support Anbox, but they should not be built-in as that would waste
resources and increase security attack surface on systems that don't
need them.
Export the currently un-exported symbols they depend on.
Gbp-Pq: Topic debian
Gbp-Pq: Name export-symbols-needed-by-android-drivers.patch
Ben Hutchings [Fri, 13 Apr 2018 19:10:28 +0000 (20:10 +0100)]
wireless: Add Debian wireless-regdb certificates
Forwarded: not-needed
This hex dump is generated using:
{
for cert in debian/certs/wireless-regdb-*.pem; do
openssl x509 -in $cert -outform der;
done
} | hexdump -v -e '1/1 "0x%.2x," "\n"' > net/wireless/certs/debian.hex
Gbp-Pq: Topic debian
Gbp-Pq: Name wireless-add-debian-wireless-regdb-certificates.patch
Bastian Blank [Fri, 7 Oct 2011 20:37:52 +0000 (21:37 +0100)]
Install perf scripts non-executable
Forwarded: no
[bwh: Forward-ported to 4.13]
Gbp-Pq: Topic debian
Gbp-Pq: Name tools-perf-install.patch
Bastian Blank [Mon, 26 Sep 2011 12:53:12 +0000 (13:53 +0100)]
Create manpages and binaries including the version
Forwarded: no
[bwh: Fix version insertion in perf man page cross-references and perf
man page title. Install bash_completion script for perf with a
version-dependent name. And do the same for trace.]
Gbp-Pq: Topic debian
Gbp-Pq: Name tools-perf-version.patch
Nobuhiro Iwamatsu [Mon, 19 May 2025 17:24:37 +0000 (19:24 +0200)]
[sh4] Fix uImage build
Bug-Debian: https://bugs.debian.org/569034
Forwarded: not-needed
[bwh: This was added without a description, but I think it is done
only to avoid a build-dependency on u-boot-tools.]
Gbp-Pq: Topic debian
Gbp-Pq: Name arch-sh4-fix-uimage-build.patch
YunQiang Su [Mon, 16 Nov 2020 01:11:00 +0000 (09:11 +0800)]
Use RELAXED ieee754 mode for Loongson-3 as 3A 4000 is 2008-only
Forwarded: not-needed
There are 2 mode of value of IEEE NaN hardcoded by CPU.
Currently, our mipsel/mips64el port is in so-called lagacy mode.
Loongson 3A 4000 is set as the so-called 2008 mode.
To make Debian workable on Loongson 3A 4000, we need set the kerenl in
RELAXED mode.
https://web.archive.org/web/
20180830093617/https://dmz-portal.mips.com/wiki/MIPS_ABI_-_NaN_Interlinking
Gbp-Pq: Topic debian
Gbp-Pq: Name mips-ieee754-relaxed.patch
YunQiang Su [Mon, 14 May 2018 08:16:18 +0000 (16:16 +0800)]
Disable uImage generation for mips generic
Forwarded: not-needed
MIPS generic trys to generate uImage when build, which then ask for
u-boot-tools.
Gbp-Pq: Topic debian
Gbp-Pq: Name mips-boston-disable-its.patch
Ben Hutchings [Mon, 13 Sep 2010 01:16:18 +0000 (02:16 +0100)]
[PATCH] Partially revert "MIPS: Add -Werror to arch/mips/Kbuild"
Forwarded: not-needed
This reverts commits
66f9ba101f54bda63ab1db97f9e9e94763d0651b and
5373633cc9253ba82547473e899cab141c54133e.
We really don't want to add -Werror anywhere.
Gbp-Pq: Topic debian
Gbp-Pq: Name mips-disable-werror.patch
dann frazier [Mon, 26 Mar 2007 22:30:51 +0000 (16:30 -0600)]
Hardcode arch script output
Bug-Debian: https://bugs.debian.org/392592
Forwarded: not-needed
Here's a patch that simply uses hardcoded definitions instead of
doing the dynamic tests that require architecture-specific scripts.
I don't particularly like this approach because it restricts
portability and diverts from upstream. But, it is simpler, and this
really needs to be fixed somehow before etch (along with a rebuild of
linux-modules-extra-2.6), so I'm willing to live with it if my other
patch is deemed unacceptable.
My primary concern is that, in the future, the output of these scripts
will change and we (or our successors) will either not notice or
forget to update the hardcoded values.
Including the scripts in linux-kbuild will avoid this manual step
altogether, and allow for the possibility of other archs to provide
their own scripts in the future.
Gbp-Pq: Topic debian
Gbp-Pq: Name ia64-hardcode-arch-script-output.patch
Bastian Blank [Sun, 22 Feb 2009 14:39:35 +0000 (15:39 +0100)]
kbuild: Make the toolchain variables easily overwritable
Forwarded: not-needed
Allow make variables to be overridden for each flavour by a file in
the build tree, .kernelvariables.
We currently use this for ARCH, KERNELRELEASE, CC, and in some cases
also CROSS_COMPILE, KCFLAGS.
This file can only be read after we establish the build tree, and all
use of $(ARCH) needs to be moved after this.
[bwh: Updated for 5.3: include .kernelvariables from current directory
rather than using undefined $(obj).]
Gbp-Pq: Topic debian
Gbp-Pq: Name kernelvariables.patch
Ben Hutchings [Tue, 12 May 2015 18:29:22 +0000 (19:29 +0100)]
Make mkcompile_h accept an alternate timestamp string
Forwarded: not-needed
We want to include the Debian version in the utsname::version string
instead of a full timestamp string. However, we still need to provide
a standard timestamp string for gen_initramfs_list.sh to make the
kernel image reproducible.
Make mkcompile_h use $KBUILD_BUILD_VERSION_TIMESTAMP in preference to
$KBUILD_BUILD_TIMESTAMP.
Gbp-Pq: Topic debian
Gbp-Pq: Name uname-version-timestamp.patch
Ben Hutchings [Tue, 24 Jul 2012 02:13:10 +0000 (03:13 +0100)]
Include package version along with kernel release in stack traces
Forwarded: not-needed
For distribution binary packages we assume
$DISTRIBUTION_OFFICIAL_BUILD, $DISTRIBUTOR and $DISTRIBUTION_VERSION
are set.
Gbp-Pq: Topic debian
Gbp-Pq: Name version.patch
Ben Hutchings [Sat, 24 Aug 2019 18:00:41 +0000 (19:00 +0100)]
Documentation: Fix broken link to CIPSO draft
Forwarded: not-needed
We exclude the CIPSO draft text as its licence is not DFSG compliant.
Link to the IETF's online version instead.
Gbp-Pq: Topic debian/dfsg
Gbp-Pq: Name documentation-fix-broken-link-to-cipso-draft.patch
Ben Hutchings [Sat, 2 Jun 2012 18:53:38 +0000 (19:53 +0100)]
video: Remove nvidiafb and rivafb
Bug-Debian: https://bugs.debian.org/383481
Forwarded: no
These drivers contain register programming code provided by the
hardware vendor that appears to have been deliberately obfuscated.
This is arguably not the preferred form for modification.
These drivers are also largely redundant with nouveau. The RIVA 128
(NV3) is not supported by nouveau but is about 15 years old and
probably discontinued 10 years ago.
Gbp-Pq: Topic debian/dfsg
Gbp-Pq: Name video-remove-nvidiafb-and-rivafb.patch
Frederik Schüler [Fri, 5 Jan 2007 15:55:24 +0000 (15:55 +0000)]
Add removal patches for: 3c359, smctr, keyspan, cops
Forwarded: not-needed
Gbp-Pq: Topic debian/dfsg
Gbp-Pq: Name drivers-net-appletalk-cops.patch
Ben Hutchings [Sun, 27 May 2012 00:56:58 +0000 (01:56 +0100)]
vs6624: mark as broken
Forwarded: not-needed
Gbp-Pq: Topic debian/dfsg
Gbp-Pq: Name vs6624-disable.patch
Ben Hutchings [Mon, 17 Aug 2009 01:45:41 +0000 (02:45 +0100)]
dvb-usb-af9005: mark as broken
Forwarded: not-needed
Gbp-Pq: Topic debian/dfsg
Gbp-Pq: Name drivers-media-dvb-dvb-usb-af9005-disable.patch
Ben Hutchings [Mon, 13 Apr 2009 16:34:00 +0000 (17:34 +0100)]
Remove microcode patches for mgsuvd (not enabled in Debian configs)
Forwarded: not-needed
Gbp-Pq: Topic debian/dfsg
Gbp-Pq: Name arch-powerpc-platforms-8xx-ucode-disable.patch
Ian Campbell [Thu, 17 Jan 2013 08:55:21 +0000 (08:55 +0000)]
Tweak gitignore for Debian pkg-kernel using git svn.
Forwarded: not-needed
[bwh: Tweak further for pure git]
Gbp-Pq: Topic debian
Gbp-Pq: Name gitignore.patch
Ben Hutchings [Mon, 19 May 2025 17:24:37 +0000 (19:24 +0200)]
linux (5.10.237-1) bullseye-security; urgency=high
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.235
- afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY
- afs: Fix directory format encoding struct
- nbd: don't allow reconnect after disconnect (CVE-2025-21731)
- nvme: Add error check for xa_store in nvme_get_effects_log
- afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call
- [armhf] drm/etnaviv: Fix page property being used for non writecombine
buffers
- drm/amdgpu: Fix potential NULL pointer dereference in
atomctrl_get_smc_sclk_range_table (CVE-2024-58052)
- [arm*] genirq: Make handle_enforce_irqctx() unconditionally available
- ipmi: ipmb: Add check devm_kasprintf() returned value (CVE-2024-58051)
- wifi: rtlwifi: do not complete firmware loading needlessly
- wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last
step
- rtlwifi: remove redundant assignment to variable err
- wifi: rtlwifi: wait for firmware loading before releasing memory
- wifi: rtlwifi: fix init_sw_vars leak when probe fails
- wifi: rtlwifi: usb: fix workqueue leak when probe fails
- rtlwifi: replace usage of found with dedicated list iterator variable
- wifi: rtlwifi: remove unused timer and related code
- wifi: rtlwifi: remove unused dualmac control leftovers
- wifi: rtlwifi: remove unused check_buddy_priv (CVE-2024-58072)
- wifi: rtlwifi: destroy workqueue at rtl_deinit_core
- wifi: rtlwifi: fix memory leaks and invalid access at probe error path
(CVE-2024-58063)
- wifi: rtlwifi: pci: wait for firmware loading before releasing memory
- ACPI: fan: cleanup resources in the error path of .probe()
- [x86] cpupower: fix TSC MHz calculation (regression in 5.10.181)
- cpufreq: schedutil: Simplify sugov_update_next_freq()
- cpufreq: schedutil: Fix superfluous updates caused by need_freq_update
- [arm64] clk: imx8mp: Fix clkout1/2 support
- team: prevent adding a device which is already a team device lower
(CVE-2024-58071)
- regulator: of: Implement the unwind path of of_regulator_match()
- [arm*] wifi: wlcore: fix unbalanced pm_runtime calls
- net/smc: fix data error when recvmsg with MSG_PEEK flag
- wifi: mt76: mt76u_vendor_request: Do not print error messages when
-EPROTO
- [x86] cpufreq: ACPI: Fix max-frequency computation
- wifi: cfg80211: Handle specific BSSID in 6GHz scanning
- wifi: cfg80211: adjust allocation of colocated AP data
- net: let net.core.dev_weight always be non-zero (CVE-2025-21806)
- net/mlxfw: Drop hard coded max FW flash image size
- net: sched: Disallow replacing of child qdisc from one parent to another
(CVE-2025-21700)
- net: ethernet: ti: am65-cpsw: fix freeing IRQ in
am65_cpsw_nuss_remove_tx_chns() (CVE-2025-21799)
- net/rose: prevent integer overflows in rose_setsockopt() (CVE-2025-21711)
- [armhf] ASoC: sun4i-spdif: Add clock multiplier settings
- perf header: Fix one memory leakage in process_bpf_btf()
- perf header: Fix one memory leakage in process_bpf_prog_info()
- perf env: Conditionally compile BPF support code on having
HAVE_LIBBPF_SUPPORT
- perf bpf: Fix two memory leakages when calling
perf_env__insert_bpf_prog_info()
- padata: fix sysfs store callback check
- perf top: Don't complain about lack of vmlinux when not resolving some
kernel samples
- perf report: Fix misleading help message about --demangle
- bpf: Send signals asynchronously if !preemptible (CVE-2025-21728)
- padata: fix UAF in padata_reorder (CVE-2025-21727)
- padata: add pd get/put refcnt helper
- padata: avoid UAF for reorder_work (CVE-2025-21726)
- RDMA/mlx4: Avoid false error about access to uninitialized gids array
- rdma/cxgb4: Prevent potential integer overflow on 32bit (CVE-2024-57973)
- [arm64] dts: qcom: msm8916: correct sleep clock frequency
- [arm64] dts: qcom: msm8994: correct sleep clock frequency
- [arm64] dts: qcom: sm8250: correct sleep clock frequency
- media: rc: iguanair: handle timeouts
- media: lmedm04: Use GFP_KERNEL for URB allocation/submission.
- media: lmedm04: Handle errors for lme2510_int_read
- media: marvell: Add check for clk_enable()
- media: uvcvideo: Propagate buf->error to userspace
- [armhf] staging: media: imx: fix OF node leak in
imx_media_add_of_subdevs()
- [arm*] PCI: rcar-ep: Fix incorrect variable used when calling
devm_request_mem_region() (CVE-2025-21804)
- scsi: mpt3sas: Set ioc->manu_pg11.EEDPTagMode directly to 1
- ocfs2: mark dquot as inactive if failed to start trans while releasing
dquot
- module: Extend the preempt disabled section in
dereference_symbol_descriptor().
- NFSv4.2: fix COPY_NOTIFY xdr buf size calculation
- xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO
- [armhf] dmaengine: ti: edma: fix OF node reference leaks in edma_driver
- [arm64] rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
(CVE-2024-58069)
- ubifs: skip dumping tnc tree when zroot is null (CVE-2024-58058)
- [arm64] net: hns3: fix oops when unload drivers paralleling
(CVE-2025-21802) (regression in 5.10.76)
- [arm*] net: fec: implement TSO descriptor cleanup
- ipmr: do not call mr_mfc_uses_dev() for unres entries (CVE-2025-21719)
- PM: hibernate: Add error handling for syscore_suspend()
- net: rose: fix timer races against user threads (CVE-2025-21718)
- [armhf] net: davicom: fix UAF in dm9000_drv_remove (CVE-2025-21715)
- perf trace: Fix runtime error of index out of bounds
- vsock: Allow retrying on connect() failure
- net: hsr: fix fill_frame_info() regression vs VLAN packets (regression in
5.10.231)
- NFSD: Reset cb_seq_status after NFS4ERR_DELAY
- netfilter: nf_tables: reject mismatching sum of field_len with set key
length (CVE-2025-21826)
- usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to
PD_T_SENDER_RESPONSE
- HID: core: Fix assumption that Resolution Multipliers must be in Logical
Collections (CVE-2024-57986)
- media: uvcvideo: Fix double free in error path (CVE-2024-57980)
- usb: gadget: f_tcm: Don't free command immediately (CVE-2024-58055)
- btrfs: output the reason for open_ctree() failure
- btrfs: fix use-after-free when attempting to join an aborted transaction
(CVE-2025-21753)
- btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling
- sched: Don't try to catch up excess steal time.
- [x86] amd_nb: Restrict init function to AMD-based systems
- printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
(CVE-2024-58017)
- safesetid: check size of policy writes (CVE-2024-58016)
- tun: fix group permission check
- mmc: core: Respect quirk_max_rate for non-UHS SDIO card
- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
(CVE-2024-58014)
- tomoyo: don't emit warning in tomoyo_write_control() (CVE-2024-58085)
- [x86] mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id
- HID: Wacom: Add PCI Wacom device support
- net/mlx5: use do_aux_work for PHC overflow checks
- i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz
- APEI: GHES: Have GHES honor the panic= setting
- [arm64] mmc: sdhci-msm: Correctly set the load for the regulator
- tipc: re-order conditions in tipc_crypto_key_rcv()
- Input: allocate keycode for phone linking
- [amd64] mm: Don't disable PCID when INVLPG has been fixed by microcode
- net: usb: rtl8150: use new tasklet API
- net: usb: rtl8150: enable basic endpoint checking (CVE-2025-21708)
- usb: xhci: Add timeout argument in address_device USB HCD callback
- usb: xhci: Fix NULL pointer dereference on certain command aborts
(CVE-2024-57981)
- nvme: handle connectivity loss in nvme_set_queue_count
- [x86] gpu: drm_dp_cec: fix broken CEC adapter properties check
- [x86] tg3: Disable tg3 PCIe AER on system reboot (regression in 5.10.201)
- udp: gso: do not drop small packets when PMTU reduces
- [arm*] gpio: pca953x: Improve interrupt support
- net: atlantic: fix warning during hot unplug
- net: rose: lock the socket in rose_bind() (CVE-2025-21749)
- tun: revert fix group permission check
- drm/modeset: Handle tiled displays in pan_display_atomic.
- [armhf,i386] binfmt_flat: Fix integer overflow bug on 32 bit systems
(CVE-2024-58010)
- [arm64] dts: rockchip: increase gmac rx_delay on rk3399-puma
- KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
(CVE-2024-58083)
- Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection
- [arm64] clk: sunxi-ng: a100: enable MMC clock reparenting
- [arm64] clk: qcom: clk-alpha-pll: fix alpha mode configuration
- blk-cgroup: Fix class @block_class's subsystem refcount leakage
(CVE-2025-21745)
- efi: libstub: Use '-std=gnu11' to fix build with GCC 15
- perf bench: Fix undefined behavior in cmpworker()
- of: Correct child specifier used as input of the 2nd nexus node
- of: Fix of_find_node_opts_by_path() handling of alias+path+options
- HID: hid-sensor-hub: don't use stale platform-data on remove
- wifi: rtlwifi: rtl8821ae: Fix media status report
- wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()
(CVE-2025-21744)
- [arm*] soc: qcom: socinfo: Avoid out of bounds read of serial number
(CVE-2024-58007)
- dm-crypt: don't update io->sector after kcryptd_crypt_write_io_submit()
- dm-crypt: track tag_offset in convert_context
- [x86] ALSA: hda/realtek: Enable headset mic on Positivo C6400
- scsi: qla2xxx: Move FCE Trace buffer allocation to user control
- [x86] scsi: storvsc: Set correct data length for sending SCSI command
without payload
- [x86] boot: Use '-std=gnu11' to fix build with GCC 15
- iio: light: as73211: fix channel handling in only-color triggered buffer
- media: mc: fix endpoint iteration
- media: uvcvideo: Fix event flags in uvc_ctrl_send_events
- media: uvcvideo: Remove redundant NULL assignment
- [arm64] crypto: qce - fix goto jump in error path
- [arm64] crypto: qce - unregister previously registered algos in error
path
- nvmem: core: improve range check for nvmem_cell_write()
- vfio/platform: check the bounds of read/write syscalls
- pnfs/flexfiles: retry getting layout segment for reads
- ocfs2: handle a symlink read error correctly (CVE-2024-58001)
- nilfs2: fix possible int overflows in nilfs_fiemap() (CVE-2025-21736)
- NFC: nci: Add bounds checking in nci_hci_create_pipe() (CVE-2025-21735)
- mtd: onenand: Fix uninitialized retlen in do_otp_read()
- [armhf] net/ncsi: wait for the last response to Deselect Package before
configuring channel
- ptp: Ensure info->enable callback is always set (CVE-2025-21814)
- ocfs2: check dir i_size in ocfs2_find_entry
- nfsd: clear acl_access/acl_default after releasing them (CVE-2025-21796)
- NFSD: fix hang in nfsd4_shutdown_callback (CVE-2025-21795)
- HID: multitouch: Add NULL check in mt_input_configured (CVE-2024-58020)
(regression in 5.10.195)
- ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu()
- vrf: use RCU protection in l3mdev_l3_out() (CVE-2025-21791)
- team: better TEAM_OPTION_TYPE_STRING validation (CVE-2025-21787)
- [arm64] cacheinfo: Avoid out-of-bounds write to cacheinfo array
(CVE-2025-21785)
- [x86] xen: allow larger contiguous memory regions in PV guests
- media: cxd2841er: fix 64-bit division on gcc-9
- media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
(CVE-2024-57834)
- [x86] PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P
- vfio/pci: Enable iowrite64 and ioread64 for vfio pci
- [x86] xen: Grab mm lock before grabbing pt lock
- orangefs: fix a oob in orangefs_debug_write (CVE-2025-21782)
- [x86] ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10
tablet 5V
- batman-adv: fix panic during interface removal (CVE-2025-21781)
- batman-adv: Ignore neighbor throughput metrics in error case
- [x86] perf/x86/intel: Ensure LBRs are disabled when a CPU is starting
- usb: roles: set switch registered flag early on (regression in 5.10.211)
- [arm*] usb: dwc2: gadget: remove of_node reference upon udc_stop
- usb: core: fix pipe creation for get_bMaxPacketSize0
- USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist
- USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone
- usb: gadget: f_midi: fix MIDI Streaming descriptor lengths
(CVE-2025-21835)
- USB: hub: Ignore non-compliant devices with too many configs or
interfaces (CVE-2025-21776)
- USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk
- usb: cdc-acm: Check control transfer buffer size before access
(CVE-2025-21704)
- usb: cdc-acm: Fix handling of oversized fragments
- USB: serial: option: add MeiG Smart SLM828
- USB: serial: option: add Telit Cinterion FN990B compositions
- USB: serial: option: fix Telit Cinterion FN990A name
- USB: serial: option: drop MeiG Smart defines
- [armhf] can: c_can: fix unbalanced runtime PM disable in error path
- can: j1939: j1939_sk_send_loop(): fix unable to send messages with data
length zero
- efi: Avoid cold plugged memory for placing the kernel
- serial: 8250: Fix fifo underflow on flush
- [x86] partitions: mac: fix handling of bogus partition table
(CVE-2025-21772)
- regmap-irq: Add missing kfree()
- [arm64] Handle .ARM.attributes section in linker scripts
- clocksource: Limit number of CPUs checked for clock synchronization
- clocksource: Replace deprecated CPU-hotplug functions.
- clocksource: Replace cpumask_weight() with cpumask_empty()
- clocksource: Use pr_info() for "Checking clocksource synchronization"
message
- clocksource: Use migrate_disable() to avoid calling get_random_u32() in
atomic context (CVE-2025-21767)
- net: treat possible_net_t net pointer as an RCU one and add
read_pnet_rcu()
- net: add dev_net_rcu() helper
- ipv4: use RCU protection in rt_is_expired()
- ipv4: use RCU protection in inet_select_addr()
- ipv6: use RCU protection in ip6_default_advmss() (CVE-2025-21765)
- ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
- neighbour: delete redundant judgment statements
- neighbour: use RCU protection in __neigh_notify() (CVE-2025-21763)
- arp: use RCU protection in arp_xmit() (CVE-2025-21762)
- openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
(CVE-2025-21761)
- ndisc: extend RCU protection in ndisc_send_skb() (CVE-2025-21760)
- nilfs2: do not output warnings when clearing dirty buffers
- nilfs2: do not force clear folio if buffer is referenced (CVE-2025-21722)
- nilfs2: protect access to buffers with no active references
(CVE-2025-21811)
- serial: 8250_pci: add support for ASIX AX99100
- parport_pc: add support for ASIX AX99100
- f2fs: fix to wait dio completion (CVE-2024-47726)
- [x86] i8253: Disable PIT timer 0 when not in use
- Revert "btrfs: avoid monopolizing a core when activating a swap file"
(regression in 5.10.233)
- btrfs: avoid monopolizing a core when activating a swap file
- pps: Fix a use-after-free (CVE-2024-57979)
- ima: Fix use-after-free on a dentry's dname.name (CVE-2024-39494)
- vlan: introduce vlan_dev_free_egress_priority
- vlan: move dev_put into vlan_dev_uninit (regression in 5.10.80)
- nvme-pci: fix multiple races in nvme_setup_io_queues
- [arm64] mte: Do not allow PROT_MTE on MAP_HUGETLB user mappings
- crypto: testmgr - fix wrong key length for pkcs1pad
- crypto: testmgr - Fix wrong test case of RSA
- crypto: testmgr - fix version number of RSA tests
- crypto: testmgr - populate RSA CRT parameters in RSA test vectors
- crypto: testmgr - some more fixes to RSA test vectors
- mm: update mark_victim tracepoints fields
- memcg: fix soft lockup in the OOM process (CVE-2024-57977)
- drm/probe-helper: Create a HPD IRQ event helper for a single connector
- [arm64] drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event()
- tpm: Use managed allocation for bios event log
- tpm: Change to kvalloc() in eventlog/acpi.c (CVE-2024-58005)
- batman-adv: Add new include for min/max helpers
- batman-adv: Drop initialization of flexible ethtool_link_ksettings
- batman-adv: Drop unmanaged ELP metric worker (CVE-2025-21823)
- [arm*] usb: dwc3: Increase DWC3 controller halt timeout
- [arm*] usb: dwc3: Fix timeout issue during controller enter/exit from
halt state
- usb/gadget: f_midi: Replace tasklet with work
- USB: gadget: f_midi: f_midi_complete to call queue_work (CVE-2025-21859)
- geneve: Fix use-after-free in geneve_find_dev(). (CVE-2025-21858)
- geneve: Suppress list corruption splat in geneve_destroy_tunnels().
- net: extract port range fields from fl_flow_key
- flow_dissector: Fix handling of mixed port and port-range keys
- flow_dissector: Fix port range key handling in BPF conversion
- bpf: skip non exist keys in generic_map_lookup_batch
- [arm64] tee: optee: Fix supplicant wait loop (CVE-2025-21871)
- nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (CVE-2025-21848)
- [x86] ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED
- acct: block access to kernel internal filesystems
- [x86] cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit
- IB/mlx5: Set and get correct qp_num for a DCT QP
- RDMA/mlx5: Fix bind QP error cleanup flow
- sunrpc: suppress warnings for unused procfs functions
- ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports
(regression in 5.10.121)
- Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (regression in
5.10.177)
- net: loopback: Avoid sending IP packets without an Ethernet header
(regression in 5.10.229)
- [arm64] net: cadence: macb: Synchronize stats calculations
- [armhf] ASoC: es8328: fix route from DAC to output
- ipvs: Always clear ipvs_property flag in skb_scrub_packet()
- tcp: Defer ts_recent changes until req is owned
- [arm*] net: mvpp2: cls: Fixed Non IP flow, with vlan tag flow defination.
- net: use indirect call helpers for dst_input
- net: use indirect call helpers for dst_output
- include: net: add static inline dst_dev_overhead() to dst.h
- net: ipv6: rpl_iptunnel: mitigate 2-realloc issue
- net: ipv6: fix dst ref loop on input in rpl lwt
- [i386] CPU: Fix warm boot hang regression on AMD SC1100 SoC systems
- ftrace: Avoid potential division by zero in function_stat_show()
(CVE-2025-21898)
- perf/core: Fix low freq setting via IOC_PERIOD
- [armhf] i2c: npcm: disable interrupt enable bit before devm_request_irq
(CVE-2025-21878)
- usbnet: gl620a: fix endpoint checking in genelink_bind() (CVE-2025-21877)
- [armhf] phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks
in refclk
- mptcp: always handle address removal under msk socket lock
(CVE-2025-21875)
- vmlinux.lds: Ensure that const vars with relocations are mapped R/O
- sched/core: Prevent rescheduling when interrupts are disabled
(CVE-2024-58090)
- [x86] intel_idle: Handle older CPUs, which stop the TSC in deeper C
states, correctly
- pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (CVE-2025-21702)
- drop_monitor: fix incorrect initialization order (CVE-2025-21862)
- kernel/acct.c: use dedicated helper to access rlimit values
- acct: perform last write from workqueue (CVE-2025-21846)
- smb: client: Add check for next_buffer in receive_encrypted_standard()
(CVE-2025-21844)
- drm/amdgpu: Check extended configuration space register when system uses
large bar
- drm/amdgpu: disable BAR resize on Dell G5 SE
- efi: Don't map the entire mokvar table to determine its size
(CVE-2025-21872)
- HID: appleir: Fix potential NULL dereference at raw event handle
(CVE-2025-21948)
- gpio: aggregator: protect driver attr handlers against module unload
(CVE-2025-21943)
- [x86] ALSA: hda: intel: Add Dell ALC3271 to power_save denylist
- ALSA: hda/realtek: update ALC222 depop optimize
- drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M
- [x86] platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e
- [x86] cacheinfo: Validate CPUID leaf 0x2 EDX output
- [x86] cpu: Validate CPUID leaf 0x2 EDX output
- [x86] cpu: Properly parse CPUID leaf 0x2 TLB descriptor 0x63
- wifi: cfg80211: regulatory: improve invalid hints checking
(CVE-2025-21910)
- wifi: nl80211: reject cooked mode if it is set along with other flags
(CVE-2025-21909)
- rapidio: add check for rio_add_net() in rio_scan_alloc_net()
(CVE-2025-21935)
- rapidio: fix an API misues when rio_add_net() fails (CVE-2025-21934)
- block: fix conversion of GPT partition name to 7-bit
- mm/page_alloc: fix uninitialized variable
- wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
- [amd64] HID: intel-ish-hid: Fix use-after-free issue in
ishtp_hid_remove() (CVE-2025-21928)
- nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch
- net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
- caif_virtio: fix wrong pointer check in cfv_probe() (CVE-2025-21904)
- [armhf] hwmon: (pmbus) Initialise page count in pmbus_identify()
- hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table
- [x86] ALSA: usx2y: validate nrpacks module parameter on probe
- llc: do not use skb_get() before dev_queue_xmit() (CVE-2025-21925)
- [arm64] hwmon: fix a NULL vs IS_ERR_OR_NULL() check in
xgene_hwmon_probe()
- be2net: fix sleeping while atomic bugs in be_ndo_bridge_getlink
- ppp: Fix KMSAN uninit-value warning with bpf (CVE-2025-21922)
- vlan: enforce underlying device type (CVE-2025-21920)
- net-timestamp: support TCP GSO case for a few missing flags
- net: ipv6: fix dst ref loop in ila lwtunnel
- net: ipv6: fix missing dst ref drop in ila lwtunnel
- usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card
Reader
- usb: renesas_usbhs: Flush the notify_hotplug_work (CVE-2025-21917)
- [x86] usb: atm: cxacru: fix a flaw in existing endpoint checks
(CVE-2025-21916)
- usb: typec: ucsi: increase timeout for PPM reset operations
- usb: gadget: Set self-powered based on MaxPower and bmAttributes
- usb: gadget: Fix setting self-powered state on suspend
- usb: gadget: Check bmAttributes only if configuration is valid
- xhci: pci: Fix indentation in the PCI device ID definitions
- Squashfs: check the inode number is not the invalid value of zero
(CVE-2024-26982)
- [x86] mei: me: add panther lake P DID
- [x86] intel_th: pci: Add Arrow Lake support
- [x86] intel_th: pci: Add Panther Lake-H support
- [x86] intel_th: pci: Add Panther Lake-P/U support
- slimbus: messaging: Free transaction ID in delayed interrupt scenario
(CVE-2025-21914)
- nilfs2: move page release outside of nilfs_delete_entry and
nilfs_set_link
- nilfs2: eliminate staggered calls to kunmap in nilfs_rename
- nilfs2: handle errors that nilfs_prepare_chunk() may return
(CVE-2025-21721)
- media: uvcvideo: Only save async fh if success
- media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
- Revert "media: uvcvideo: Require entities to have a non-zero unique ID"
(regression in 5.10.231)
- bpf, vsock: Invoke proto::close on close()
- vsock: Keep the binding until socket destruction (CVE-2025-21756)
- vsock: Orphan socket after transport release
- sched: sch_cake: add bounds checks to host bulk flow fairness counts
(CVE-2025-21647)
- crypto: hisilicon/qm - inject error before stopping queue
(CVE-2024-47730)
- btrfs: bring back the incorrectly removed extent buffer lock recursion
support
- usb: xhci: Enable the TRB overfetch quirk on VIA VL805
- udf: Fix use of check_add_overflow() with mixed type arguments
- net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels
https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.236
- vlan: fix memory leak in vlan_newlink()
- [x86] clockevents/drivers/i8253: Fix stop sequence for timer 0
- ipv6: Fix signed integer overflow in __ip6_append_data (CVE-2022-49728)
- [x86] KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't
in-kernel (CVE-2025-21779)
- [x86] kexec: fix memory leak of elf header buffer (CVE-2022-49546)
- [x86] fbdev: hyperv_fb: iounmap() the correct memory when removing a
device
- netfilter: conntrack: convert to refcount_t api
- netfilter: nft_ct: fix use after free when attaching zone template
- netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template.
- ice: fix memory leak in aRFS after reset (CVE-2025-21981)
- netpoll: hold rcu read lock in __netpoll_send_skb()
- [x86] Drivers: hv: vmbus: Don't release fb_mmio resource in
vmbus_free_mmio()
- net/mlx5: handle errors in mlx5_chains_create_table() (CVE-2025-21975)
- netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in
insert_tree() (CVE-2025-21959)
- ipvs: prevent integer overflow in do_ip_vs_get_ctl()
- net_sched: Prevent creation of classes with TC_H_ROOT (CVE-2025-21971)
- netfilter: nft_exthdr: fix offset with ipv4_find_option()
- net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed
devices
- nvme-fc: go straight to connecting state when initializing
- hrtimers: Mark is_migration_base() with __always_inline
- [x86] powercap: call put_device() on an error path in
powercap_register_control_type()
- [x86] iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in
ibft_attr_show_nic() (CVE-2025-21993)
- scsi: qla1280: Fix kernel oops when debug level > 2 (CVE-2025-21957)
- [x86] ACPI: resource: IRQ override for Eluktronics MECH-17
- [amd64] HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in
doorbell
- HID: ignore non-functional sensor in HP 5MP Camera (CVE-2025-21992)
- [x86] ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module
- nvmet-rdma: recheck queue state is LIVE in state lock in recv done
- sctp: Fix undefined behavior in left shift operation
- nvme: only allow entering LIVE from CONNECTING state
- fuse: don't truncate cached, mutated symlink
- [x86] irq: Define trace events conditionally
- drm/nouveau: Do not override forced connector status
- block: fix 'kmem_cache of name 'bio-108' already exists'
- USB: serial: ftdi_sio: add support for Altera USB Blaster 3
- USB: serial: option: add Telit Cinterion FE990B compositions
- USB: serial: option: fix Telit Cinterion FE990A name
- USB: serial: option: match on interface class for Telit FN990B
- [x86] microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA
nodes (CVE-2025-21991)
- drm/atomic: Filter out redundant DPMS calls
- drm/amd/display: Assign normalized_pix_clk when color depth = 14
(CVE-2025-21956)
- drm/amd/display: Fix slab-use-after-free on hdcp_work (CVE-2025-21968)
- qlcnic: fix memory leak issues in qlcnic_sriov_common.c
- [x86] drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data()
- [x86] i2c: ali1535: Fix an error handling path in ali1535_probe()
- [x86] i2c: ali15x3: Fix an error handling path in ali15x3_probe()
- [x86] i2c: sis630: Fix an error handling path in sis630_probe()
- drm/amd/display: Check plane scaling against format specific hw plane
caps.
- drm/amd/display/dc/core/dc_resource: Staticify local functions
- drm/amd/display: Reject too small viewport size when validating plane
- drm/amd/display: fix odm scaling
- drm/amd/display: Check for invalid input params when building scaling
params
- drm/amd/display: Fix null check for pipe_ctx->plane_state in
resource_build_scaling_params (CVE-2025-21941)
- xfrm_output: Force software GSO only in tunnel mode
- [arm*] dts: bcm2711: PL011 UARTs are actually r1p5
- ]arm*] dts: bcm2711: Don't mark timer regs unconfigured
- [arm64] RDMA/hns: Remove redundant 'phy_addr' in
hns_roce_hem_list_find_mtt()
- [arm64] RDMA/hns: Fix soft lockup during bt pages loop (CVE-2025-22010)
- [arm64] RDMA/hns: Fix wrong value of max_sge_rd
- Bluetooth: Fix error code in chan_alloc_skb_cb() (CVE-2025-22007)
- ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
(CVE-2025-22005)
- ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create().
- net: atm: fix use after free in lec_send() (CVE-2025-22004)
- net/neighbor: add missing policy for NDTPA_QUEUE_LENBYTES
- [armhf] i2c: omap: fix IRQ storms
- regulator: check that dummy regulator has been probed before using it
(CVE-2025-22008)
- proc: fix UAF in proc_get_inode() (CVE-2025-21999)
- drm/amdgpu: Fix even more out of bound writes from debugfs
(CVE-2021-47489)
- Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
(CVE-2024-53144)
- bpf, sockmap: Fix race between element replace and close()
(CVE-2024-56664)
- batman-adv: Ignore own maximum aggregation size during RX
- [arm*] soc: qcom: pdr: Fix the potential deadlock (CVE-2025-22014)
- drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()
(CVE-2025-21996)
- ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names
- HID: hid-plantronics: Add mic mute mapping and generalize quirks
- atm: Fix NULL pointer dereference (CVE-2025-22018)
- [armhf] 9350/1: fault: Implement copy_from_kernel_nofault_allowed()
- [armhf] 9351/1: fault: Add "cut here" line for prefetch aborts
- netfilter: socket: Lookup orig tuple for IPv6 SNAT (CVE-2025-22021)
- [x86] ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx
- tty: serial: 8250: Add some more device IDs
- net: usb: qmi_wwan: add Telit Cinterion FN990B composition
- net: usb: qmi_wwan: add Telit Cinterion FE990B composition
- net: usb: usbnet: restore usb%d name exception for local mac addresses
(regression in 5.10.229)
- memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
(CVE-2025-22020)
- serial: 8250_dma: terminate correct DMA in tx_dma_flush()
- media: i2c: et8ek8: Don't strip remove function when driver is builtin
(CVE-2024-38611)
- i2c: dev: check return value when calling dev_set_name() (CVE-2022-49046)
- watch_queue: fix pipe accounting mismatch (CVE-2025-23138)
- cpufreq: governor: Fix negative 'idle_time' handling in dbs_update()
- [x86] fpu: Avoid copying dynamic FP state from init_task in
arch_dup_task_struct()
- [x86] platform: Only allow CONFIG_EISA for 32-bit
- PM: sleep: Adjust check before setting power.must_resume
- [x86] EDAC/ie31200: Fix the size of EDAC_MC_LAYER_CHIP_SELECT layer
- [x86] EDAC/ie31200: Fix the DIMM size mask for several SoCs
- [x86] EDAC/ie31200: Fix the error path order of ie31200_init()
- [x96] thermal: int340x: Add NULL check for adev (CVE-2025-23136)
- PM: sleep: Fix handling devices with direct_complete set on errors
- perf/ring_buffer: Allow the EPOLLRDNORM flag for poll
- ALSA: hda/realtek: Always honor no_shutup_pins
- drm/dp_mst: Fix drm RAD print
- PCI/ASPM: Fix link state exit during switch upstream function removal
- [arm64] PCI: brcmstb: Use internal register to change link capability
- PCI/portdrv: Only disable pciehp interrupts early when needed
- drm/amd/display: fix type mismatch in
CalculateDynamicMetadataParameters()
- PCI: Remove stray put_device() in pci_register_host_bridge()
- PCI: pciehp: Don't enable HPIE when resuming in poll mode
- [arm64] clk: amlogic: gxbb: drop incorrect flag on 32k clock
- [arm*] clk: samsung: Fix UBSAN panic in samsung_clk_init()
(CVE-2025-39728)
- bpf: Use preempt_count() directly in bpf_send_signal_common()
- [arm*] clk: rockchip: rk3328: fix wrong clk_ref_usb3otg parent
- IB/mad: Check available slots before posting receive WRs
- [arm*] pinctrl: tegra: Set SFIO mode to Mux Register
- [arm64] clk: amlogic: g12b: fix cluster A parent data
- [arm64] clk: amlogic: gxbb: drop non existing 32k clock parent
- [arm64] clk: amlogic: g12a: fix mmc A peripheral clock
- [amd64] entry: Fix ORC unwinder for PUSH_REGS with save_ret=1
- RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (CVE-2025-22086)
- [x86] dumpstack: Fix inaccurate unwinding from exception stacks due to
misplaced assignment
- isofs: fix KMSAN uninit-value bug in do_isofs_readdir()
- iio: accel: mma8452: Ensure error return on failure to matching
oversampling ratio
- perf units: Fix insufficient array space
- kexec: initialize ELF lowest address to ULONG_MAX
- ocfs2: validate l_tree_depth to avoid out-of-bounds access
(CVE-2025-22079)
- NFSv4: Don't trigger uneccessary scans for return-on-close delegations
- perf python: Fixup description of sample.id event member
- perf python: Decrement the refcount of just created event on failure
- perf python: Don't keep a raw_data pointer to consumed ring buffer space
- perf python: Check if there is space to copy all the event
- objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
- exfat: fix the infinite loop in exfat_find_last_cluster()
- rtnetlink: Allocate vfinfo size for VF GUIDs when supported
(CVE-2025-22075)
- ring-buffer: Fix bytes_dropped calculation issue
- ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are
invalid
- sched/smt: Always inline sched_smt_active()
- wifi: iwlwifi: fw: allocate chained SG tables for dump
- nvme-tcp: fix possible UAF in nvme_tcp_poll
- nvme-pci: clean up CMBMSC when registering CMB fails
- nvme-pci: skip CMB blocks incompatible with PCI P2P DMA
- affs: generate OFS sequence numbers starting at 1
- affs: don't write overlarge OFS data block size fields
- [x86] platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go
4 tablet
- sched/deadline: Use online cpus for validating runtime
- locking/semaphore: Use wake_q to wake up processes outside lock critical
section
- [x86] ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360
14-dy1xxx
- can: statistics: use atomic access in hot path
- hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9}
- ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
(CVE-2023-53034)
- netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets
(CVE-2025-22063)
- net_sched: skbprio: Remove overly strict queue assertions
(CVE-2025-38637)
- vsock: avoid timeout during connect() if the socket is closing
- tunnels: Accept PACKET_HOST in skb_tunnel_check_pmtu().
- netfilter: nft_tunnel: fix geneve_opt type confusion addition
(CVE-2025-22056)
- ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS
- [arm*] net: dsa: mv88e6xxx: propperly shutdown PPU re-enable timer on
destroy
- net: fix geneve_opt length integer overflow (CVE-2025-22055)
- arcnet: Add NULL check in com20020pci_probe() (CVE-2025-22054)
- can: flexcan: only change CAN state when link up in system PM
- [arm64] tty: serial: fsl_lpuart: use UARTMODIR register bits for lpuart32
platform
- [arm64] tty: serial: fsl_lpuart: disable transmitter before changing
RS485 related registers
- drm/amd/pm: Fix negative array index read (CVE-2024-46821)
- drm/amd/display: Skip inactive planes within
ModeSupportAndSystemConfiguration (CVE-2024-46812)
- btrfs: handle errors from btrfs_dec_ref() properly (CVE-2024-46753)
- [x86] tsc: Always save/restore TSC sched_clock() on suspend/resume
- [x86] mm: Fix flush_tlb_range() when used for zapping normal PMDs
(CVE-2025-22045)
- acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (CVE-2025-22044)
- [x86] ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP
- [armhf] mmc: sdhci-pxav3: set NEED_RSP_BUSY capability
- tracing: Fix use-after-free in print_graph_function_flags during tracer
switching (CVE-2025-22035)
- tracing: Ensure module defining synth event cannot be unloaded while
tracing
- ext4: don't over-report free space or inodes in statvfs
- ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
- jfs: fix slab-out-of-bounds read in ea_get() (CVE-2025-39735)
- jfs: add index corruption check to DT_GETPAGE()
- nfsd: put dl_stid if fail to queue dl_recall (CVE-2025-22025)
- NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up
- netfilter: conntrack: fix crash due to confirmed bit load reordering
- [x86] kexec: Fix double-free of elf header buffer
https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.237
- tipc: fix memory leak in tipc_link_xmit (CVE-2025-37757)
- net: tls: explicitly disallow disconnect (CVE-2025-37756)
- ata: sata_sx4: Drop pointless VPRINTK() calls and convert the remaining
ones
- ata: sata_sx4: Add error handling in pdc20621_i2c_read()
- net: ppp: Add bound checking for skb data on ppp_sync_txmung
(CVE-2025-37749)
- [amd64] nft_set_pipapo: fix incorrect avx2 match of 5th field octet
- umount: Allow superblock owners to force umount
- pm: cpupower: bench: Prevent NULL dereference on malloc failure
(CVE-2025-37841)
- [amd64] cpu: Don't clear X86_FEATURE_LAHF_LM flag in init_amd_k8() on AMD
when running in a virtual machine
- [arm*] perf: arm_pmu: Don't disable counter in armpmu_add()
- HID: pidff: Convert infinite length from Linux API to PID standard
- HID: pidff: Do not send effect envelope if it's empty
- HID: pidff: Fix null pointer dereference in pidff_find_fields
(CVE-2025-37862)
- [x86] ALSA: hda: intel: Fix Optimus when GPU has no sound
- ALSA: usb-audio: Fix CME quirk for UF series keyboards
- page_pool: avoid infinite loop to schedule delayed worker
(CVE-2025-37859)
- fs/jfs: cast inactags to s64 to prevent potential overflow
- fs/jfs: Prevent integer overflow in AG size calculation (CVE-2025-37858)
- jfs: Prevent copying of nlink with value 0 from disk inode
(CVE-2025-37741)
- jfs: add sanity check for agwidth in dbMount (CVE-2025-37740)
- ata: libata-eh: Do not use ATAPI DMA for a device limited to PIO mode
- f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()
(CVE-2025-37739)
- ahci: add PCI ID for Marvell 88SE9215 SATA Controller
- ext4: protect ext4_release_dquot against freezing
- ext4: ignore xattrs past end (CVE-2025-37738)
- scsi: st: Fix array overflow in st_setup() (CVE-2025-37857)
- wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table
- net: vlan: don't propagate flags on open (CVE-2025-23163)
- tracing: fix return value in __ftrace_event_enable_disable for
TRACE_REG_UNREGISTER
- Bluetooth: hci_uart: fix race during initialization
- drm: allow encoder mode_set even when connectors change for crtc
- [x86] drm: panel-orientation-quirks: Add support for AYANEO 2S
- [x86] drm: panel-orientation-quirks: Add new quirk for GPD Win 2
- drm/bridge: panel: forbid initializing a panel with unknown connector
type
- [amd64] drm/amdkfd: clamp queue size to minimum
- [amd64] drm/amdkfd: Fix pqm_destroy_queue race with GPU reset
- [armhf] fbdev: omapfb: Add 'plane' value check (CVE-2025-37851)
- [arm*] pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()
(CVE-2025-37850)
- bpf: support SKF_NET_OFF and SKF_LL_OFF on skb frags
- ext4: reject casefold inode flag without casefold feature
- ext4: don't treat fhandle lookup of ea_inode as FS corruption
(regression in 5.10.183)
- [arm64] media: venus: hfi: add a check to handle OOB in sfr region
(CVE-2025-23159)
- [arm64] media: venus: hfi: add check to handle incorrect queue size
(CVE-2025-23158)
- media: siano: Fix error handling in smsdvb_module_init()
- [amd64] xenfs/xensyms: respect hypervisor's "next" indication
- [arm64] errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list
- [arm*] mtd: rawnand: brcmnand: fix PM resume warning (CVE-2025-37840)
- media: streamzap: prevent processing IR data on URB failure
- media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf()
- [arm64] media: venus: hfi_parser: add check to avoid out of bound access
(CVE-2025-23157)
- [arm*] net: dsa: mv88e6xxx: workaround RGMII transmit delay erratum for
6320 family
- wifi: mac80211: fix integer overflow in hwmp_route_info_get()
- ext4: fix off-by-one error in do_split (CVE-2025-23150)
- i3c: Add NULL pointer check in i3c_master_queue_ibi() (CVE-2025-23147)
- jbd2: remove wrong sb->s_sequence check (CVE-2025-37839)
- [armhf] mfd: ene-kb3930: Fix a potential NULL pointer dereference
(CVE-2025-23146)
- lib: scatterlist: fix sg_split_phys to preserve original scatterlist
offsets
- [x86] mtd: inftlcore: Add error check for inftl_read_oob()
- mtd: rawnand: Add status chack in r852_ready()
- mm: add missing release barrier on PGDAT_RECLAIM_LOCKED unlock
- sctp: detect and prevent references to a freed transport in sendmsg
(CVE-2025-23142)
- [arm*] thermal/drivers/rockchip: Add missing rk3328 mapping entry
- [x86] crypto: ccp - Fix check for the primary ASP device
- dm-integrity: set ti->error on memory allocation failure
- ftrace: Add cond_resched() to ftrace_graph_set_hash()
- [arm64] gpio: zynq: Fix wakeup source leaks on device unbind
- of/irq: Fix device node refcount leakages in of_irq_count()
- of/irq: Fix device node refcount leakage in API irq_of_parse_and_map()
- of/irq: Fix device node refcount leakages in of_irq_init()
- [arm64] PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe()
- PCI: Fix reference leak in pci_alloc_child_bus()
- [arm64] pinctrl: qcom: Clear latched interrupt status when changing IRQ
type
- [x86] e820: Fix handling of subpage regions when calculating nosave
ranges in e820__register_nosave_regions()
- Bluetooth: hci_uart: Fix another race during initialization
- [armhf] HSI: ssi_protocol: Fix use after free vulnerability in
ssi_protocol
Driver Due to Race Condition (CVE-2025-37838)
- wifi: at76c50x: fix use after free access in at76_disconnect
(CVE-2025-37796)
- wifi: mac80211: Purge vif txq in ieee80211_do_stop() (CVE-2025-37794)
- [arm*] wifi: wl1251: fix memory leak in wl1251_tx_work
- scsi: iscsi: Fix missing scsi_host_put() in error path
- [amd64] RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe()
- [arm64] RDMA/hns: Fix wrong maximum DMA segment size
- RDMA/core: Silence oversized kvmalloc() warning (CVE-2025-37867)
- Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid
address
- Bluetooth: btrtl: Prevent potential NULL dereference (CVE-2025-37792)
- igc: handle the IGC_PTP_ENABLED flag correctly
- igc: cleanup PTP module if probe fails
- net: openvswitch: fix nested key length validation in the set() action
(CVE-2025-37789)
- cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
(CVE-2025-37788)
- [armhf] net: b53: enable BPDU reception for management port
- cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS
- writeback: fix false warning in inode_to_wb()
- [x86] asus-laptop: Fix an uninitialized variable
- nfsd: decrease sc_count directly if fail to queue dl_recall
(CVE-2025-37871)
- btrfs: correctly escape subvol in btrfs_show_options()
- hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key
(CVE-2025-37782)
- [arm*] i2c: cros-ec-tunnel: defer probe if parent EC is not present
(CVE-2025-37781)
- isofs: Prevent the use of too small fid (CVE-2025-37780)
- tracing: Fix filter string testing (regression in 5.10.104)
- virtiofs: add filesystem context source name check (CVE-2025-37773)
- [x86] perf/x86/intel: Allow to update user space GPRs from PEBS records
- [x86] perf/x86/intel/uncore: Fix the scale of IIO free running counters
on SNR
- [x86] perf/x86/intel/uncore: Fix the scale of IIO free running counters
on ICX
- module: sign with sha512 instead of sha1 by default
- drm/amd/pm/powerplay: Prevent division by zero (CVE-2025-37770)
- drm/amd/pm/powerplay/hwmgr/smu7_thermal: Prevent division by zero
(CVE-2025-37768)
- drm/amd/pm/powerplay/hwmgr/vega20_thermal: Prevent division by zero
(CVE-2025-37766)
- drm/nouveau: prime: fix ttm_bo_delayed_delete oops (CVE-2025-37765)
- cpufreq: Reference count policy in cpufreq_update_limits()
- tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
(CVE-2024-50154)
- mptcp: fix NULL pointer in can_accept_new_subflow (CVE-2025-23145)
- misc: pci_endpoint_test: Avoid issue of interrupts remaining after
request_irq error (CVE-2025-23140)
- [amd64] pvh: Call C code via the kernel virtual mapping
- nvme: avoid double free special payload (CVE-2024-41073)
- [aem*] phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node
function
- wifi: ath10k: avoid NULL pointer error during sdio remove
(CVE-2024-56599)
- drm/amd/display: Stop amdgpu_dm initialize when link nums greater than
max_links (CVE-2024-46816)
- [x86] drm/amd/display: Fix out-of-bounds access in
'dcn21_link_encoder_create' (CVE-2024-56608)
- smb: client: fix potential UAF in cifs_debug_files_proc_show()
(CVE-2024-26928)
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show()
(CVE-2023-52752)
- cifs: Fix UAF in cifs_demultiplex_thread() (CVE-2023-52572)
- smb: client: fix potential deadlock when releasing mids (CVE-2023-52757)
- smb: client: fix potential UAF in cifs_stats_proc_show() (CVE-2024-35867)
- smb: client: fix UAF in async decryption (CVE-2024-50047)
- smb: client: fix NULL ptr deref in crypto_aead_setkey()
- bpf: avoid holding freeze_mutex during mmap operation (CVE-2025-21853)
- bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
(CVE-2023-52621)
- blk-cgroup: support to track if policy is online
- blk-iocost: do not WARN if iocg was already offlined (CVE-2024-36908)
- ext4: fix timer use-after-free on failed mount (CVE-2024-49960)
- net/mlx5e: Fix use-after-free of encap entry in neigh update handler
(CVE-2021-47247)
- ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322)
- net: openvswitch: fix race on port output
- openvswitch: fix lockup on tx to unregistering netdev with carrier
- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- scsi: ufs: bsg: Set bsg_queue to NULL after removal (CVE-2024-54458)
- net: defer final 'struct net' free in netns dismantle (CVE-2024-56658)
- jfs: Fix shift-out-of-bounds in dbDiscardAG (CVE-2024-44938)
- dm cache: fix flushing uninitialized delayed_work on cache_ctr error
(CVE-2024-50280) (regression in 5.10.163)
- vfio/pci: fix memory leak during D3hot to D0 transition (CVE-2022-49219)
- kernel/resource: fix kfree() of bootmem memory again (CVE-2022-49190)
- [x86] drm/i915/gt: Cleanup partial engine discovery failures
(CVE-2022-48893)
- fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children
stats (CVE-2024-26686)
- mm: fix apply_to_existing_page_range()
- [x86] drivers: staging: rtl8723bs: Fix deadlock in
rtw_surveydone_event_callback() (CVE-2022-49309)
- [armhf] pmdomain: ti: Add a null pointer check to the
omap_prm_domain_init (CVE-2024-35943)
- [x86] drivers: staging: rtl8723bs: Fix locking in
rtw_scan_timeout_handler()
- tracing: Allow synthetic events to pass around stacktraces
- tracing: Fix synth event printk format for str fields
- media: streamzap: remove unnecessary ir_raw_event_reset and handle
- media: streamzap: no need for usb pid/vid in device name
- media: streamzap: less chatter
- media: streamzap: remove unused struct members
- media: streamzap: fix race between device disconnection and urb callback
(CVE-2025-22027)
- [arm64] media: venus: venc: Init the session only once in queue_setup
- [arm64] media: venus: Limit HFI sessions to the maximum supported
- [arm64] media: venus: hfi: Correct session init return error
- [arm64] media: venus: pm_helpers: Check instance state when calculate
instance frequency
- [arm64] media: venus: Create hfi platform and move vpp/vsp there
- [arm64] media: venus: Rename venus_caps to hfi_plat_caps
- [arm64] media: venus: hfi_plat: Add codecs and capabilities ops
- [arm64] media: venus: Get codecs and capabilities from hfi platform
- [arm64] media: venus: hfi_parser: refactor hfi packet parsing logic
(CVE-2025-23156)
- [arm*] net: dsa: mv88e6xxx: fix VTU methods for 6320 family
- [armhf] soc: samsung: exynos-chipid: initialize later - with
arch_initcall
- [armhf] soc: samsung: exynos-chipid: convert to driver and merge
exynos-asv
- [armhf] soc: samsung: exynos-chipid: avoid soc_device_to_device()
- [armhf] soc: samsung: exynos-chipid: Pass revision reg offsets
- [armhf] soc: samsung: exynos-chipid: Add NULL pointer check in
exynos_chipid_probe() (CVE-2025-23148)
- iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary
return value check
- iio: adc: ad7768-1: Fix conversion result sign
- backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()
(CVE-2025-23144)
- cifs: print TIDs as hex
- cifs: avoid NULL pointer dereference in dbg call (CVE-2025-37844)
- PCI: Introduce domain_nr in pci_host_bridge
- PCI: Coalesce host bridge contiguous apertures
- PCI: Assign PCI domain IDs by ida_alloc()
- PCI: Fix reference leak in pci_register_host_bridge() (CVE-2025-37836)
- drm/amd/amdgpu/amdgpu_vram_mgr: Add missing descriptions for 'dev' and
'dir'
- drm/amdgpu: Remove amdgpu_device arg from free_sgt api (v2)
- drm/amdgpu/dma_buf: fix page_link check
- [arm*] cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
(CVE-2025-37829)
- net: phy: leds: fix memory leak
- tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
(CVE-2025-37824)
- net_sched: hfsc: Fix a UAF vulnerability in class handling
(CVE-2025-37797)
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
(CVE-2025-37823)
- [amd64] iommu/amd: Return an error if vCPU affinity is set for non-vCPU
IRTE
- virtio_console: fix missing byte order handling for cols and rows
- [x86] KVM: SVM: Allocate IR data using atomic allocation
- mcb: fix a double free bug in chameleon_parse_gdd() (CVE-2025-37817)
- USB: storage: quirk for ADATA Portable HDD CH94
- [x86] mei: me: add panther lake H DID
- [x86] KVM: x86: Reset IRTE to host control if *new* route isn't postable
(CVE-2025-37885)
- USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe
- USB: serial: option: add Sierra Wireless EM9291
- USB: serial: simple: add OWON HDS200 series oscilloscope support
- usb: cdns3: Fix deadlock when using NCM gadget (CVE-2025-37812)
- [arm*] usb: dwc3: gadget: check that event count does not exceed event
buffer length (CVE-2025-37810)
- usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive
- usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive
- USB: VLI disk crashes if LPM is used
- crypto: null - Use spin lock instead of mutex (CVE-2025-37808)
- clk: check for disabled clock-provider in of_clk_get_hw_from_clkspec()
- [armhf] usb: gadget: aspeed: Add NULL pointer check in
ast_vhub_init_dev() (CVE-2025-37881)
- [amd64] qibfs: fix _another_ leak
- udmabuf: fix a buf size overflow issue during udmabuf creation
(CVE-2025-37803)
- nvme: requeue namespace scan on missed AENs
- [arm64] ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls
- nvme: re-read ANA log page after ns scan completes
- [amd64] objtool: Stop UNRET validation on UD2
- [x86] bugs: Use SBPB in write_ibpb() if applicable
- [x86] bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
- ext4: make block validity check resistent to sb bh corruption
- scsi: pm80xx: Set phy_attached to zero when device is gone
- md/raid1: Add check for missing source disk in process_checks()
- [x86] comedi: jr3_pci: Fix synchronous deletion of timer
- xdp: Reset bpf_redirect_info before running a xdp's BPF prog.
- nvme: fixup scan failure for non-ANA multipath controllers
- PCI: Fix use-after-free in pci_bus_release_domain_nr()
- [armhf] soc: samsung: exynos-chipid: correct helpers __init annotation
- [arm64] media: venus: Fix uninitialized variable count being checked for
zero
- [arm64] media: venus: hfi_parser: Check for instance after hfi platform
get
[ Ben Hutchings ]
* Bump ABI to 35
* d/b/genpatch-rt: Fix subprocess cleanup with Python 3.13
* [rt] Update to 5.10.237-rt131:
- u64_stats: Introduce u64_stats_set()
- netfilter: nft_counter: Use u64_stats_t for statistic.
- rt: fix build issue in at_hdmac
- rt: fix build issue in be2net
* d/salsa-ci.yml: Run lintian from the target release, not always unstable
* Revert "d/salsa-ci.yml: Suppress aliased-location lintian errors"
* linux-signed-*: lintian: Correct overrides for bullseye:
- Adjust override of version-substvar-for-external-package
- Add override for copyright-excludes-files-in-native-package
[ Salvatore Bonaccorso ]
* d/b/genpatch-rt: Drop now unused 'io' module.
[dgit import unpatched linux 5.10.237-1]
Ben Hutchings [Mon, 19 May 2025 17:24:37 +0000 (19:24 +0200)]
Import linux_5.10.237.orig.tar.xz
[dgit import orig linux_5.10.237.orig.tar.xz]
Ben Hutchings [Mon, 19 May 2025 17:24:37 +0000 (19:24 +0200)]
Import linux_5.10.237-1.debian.tar.xz
[dgit import tarball linux 5.10.237-1 linux_5.10.237-1.debian.tar.xz]