diff --git a/blacklist.conf b/blacklist.conf index 0de3b5d..b28d335 100644 --- a/blacklist.conf +++ b/blacklist.conf @@ -2703,3 +2703,6 @@ df6d4f9db79c1a5d6f48b59db35ccd1e9ff9adfc # 08529078d8d9 not present 7ba6b09fda5e0cb741ee56f3264665e0edc64822 # hardware this is relevant for not supported in SLE12 76e1ef1d81a4129d7e2fb8c48c83b166d1c8e040 # not a fix, too risky for an optimization 269777aa530f3438ec1781586cdac0b5fe47b061 # all builds in SLE12 are SMP, patc irrelevant +6a2cbc58d6c9d90cd74288cc497c2b45815bc064 # our code never uses more than 8B, impact is incorrect output only +39f985c8f667c80a3d1eb19d31138032fa36b09e # we don't have c7510ab2cf5c ("mm: abstract out wake_page_match() from wake_page_function()") +910603818c6c0558fe9b5e056a3bd5195aaae1a5 # already applied diff --git a/patches.suse/cachefiles-Drop-superfluous-readpages-aops-NULL-check.patch b/patches.suse/cachefiles-Drop-superfluous-readpages-aops-NULL-check.patch new file mode 100644 index 0000000..5f16f2e --- /dev/null +++ b/patches.suse/cachefiles-Drop-superfluous-readpages-aops-NULL-check.patch @@ -0,0 +1,50 @@ +From: Takashi Iwai +Date: Wed, 20 Jan 2021 16:11:12 +0000 +Subject: cachefiles: Drop superfluous readpages aops NULL check +Git-commit: db58465f1121086b524be80be39d1fedbe5387f3 +Patch-mainline: v5.11-rc5 +References: bsc#1210430 + +After the recent actions to convert readpages aops to readahead, the +NULL checks of readpages aops in cachefiles_read_or_alloc_page() may +hit falsely. More badly, it's an ASSERT() call, and this panics. + +Drop the superfluous NULL checks for fixing this regression. + +[dh: Note that cachefiles never actually used readpages, so this check was + never actually necessary] + +Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=208883 +Buglink: https://bugzilla.opensuse.org/show_bug.cgi?id=1175245 +Fixes: 9ae326a69004 ("CacheFiles: A cache that backs onto a mounted filesystem") +Signed-off-by: Takashi Iwai +Signed-off-by: David Howells +Acked-by: Matthew Wilcox (Oracle) +Signed-off-by: Linus Torvalds +[adjusted context as we don't have 10d83e11a582 + ("cachefiles: drop direct usage of ->bmap method.")] + +Acked-by: Luís Henriques + +--- + fs/cachefiles/rdwr.c | 2 -- + 1 file changed, 2 deletions(-) + +--- a/fs/cachefiles/rdwr.c ++++ b/fs/cachefiles/rdwr.c +@@ -418,7 +418,6 @@ int cachefiles_read_or_alloc_page(struct + inode = d_backing_inode(object->backer); + ASSERT(S_ISREG(inode->i_mode)); + ASSERT(inode->i_mapping->a_ops->bmap); +- ASSERT(inode->i_mapping->a_ops->readpages); + + /* calculate the shift required to use bmap */ + shift = PAGE_SHIFT - inode->i_sb->s_blocksize_bits; +@@ -717,7 +716,6 @@ int cachefiles_read_or_alloc_pages(struc + inode = d_backing_inode(object->backer); + ASSERT(S_ISREG(inode->i_mode)); + ASSERT(inode->i_mapping->a_ops->bmap); +- ASSERT(inode->i_mapping->a_ops->readpages); + + /* calculate the shift required to use bmap */ + shift = PAGE_SHIFT - inode->i_sb->s_blocksize_bits; diff --git a/patches.suse/cachefiles-Fix-page-leak-in-cachefiles_read_backing_f.patch b/patches.suse/cachefiles-Fix-page-leak-in-cachefiles_read_backing_f.patch new file mode 100644 index 0000000..4165613 --- /dev/null +++ b/patches.suse/cachefiles-Fix-page-leak-in-cachefiles_read_backing_f.patch @@ -0,0 +1,86 @@ +From: Kiran Kumar Modukuri +Date: Mon, 24 Sep 2018 12:02:39 +1000 +Subject: cachefiles: Fix page leak in cachefiles_read_backing_file while + vmscan is active +Git-commit: 9a24ce5b66f9c8190d63b15f4473600db4935f1f +Patch-mainline: v4.20-rc5 +References: bsc#1210430 + +[Description] + +In a heavily loaded system where the system pagecache is nearing memory +limits and fscache is enabled, pages can be leaked by fscache while trying +read pages from cachefiles backend. This can happen because two +applications can be reading same page from a single mount, two threads can +be trying to read the backing page at same time. This results in one of +the threads finding that a page for the backing file or netfs file is +already in the radix tree. During the error handling cachefiles does not +clean up the reference on backing page, leading to page leak. + +[Fix] +The fix is straightforward, to decrement the reference when error is +encountered. + + [dhowells: Note that I've removed the clearance and put of newpage as + they aren't attested in the commit message and don't appear to actually + achieve anything since a new page is only allocated is newpage!=NULL and + any residual new page is cleared before returning.] + +[Testing] +I have tested the fix using following method for 12+ hrs. + +1) mkdir -p /mnt/nfs ; mount -o vers=3,fsc :/export /mnt/nfs +2) create 10000 files of 2.8MB in a NFS mount. +3) start a thread to simulate heavy VM presssure + (while true ; do echo 3 > /proc/sys/vm/drop_caches ; sleep 1 ; done)& +4) start multiple parallel reader for data set at same time + find /mnt/nfs -type f | xargs -P 80 cat > /dev/null & + find /mnt/nfs -type f | xargs -P 80 cat > /dev/null & + find /mnt/nfs -type f | xargs -P 80 cat > /dev/null & + .. + .. + find /mnt/nfs -type f | xargs -P 80 cat > /dev/null & + find /mnt/nfs -type f | xargs -P 80 cat > /dev/null & +5) finally check using cat /proc/fs/fscache/stats | grep -i pages ; + free -h , cat /proc/meminfo and page-types -r -b lru + to ensure all pages are freed. + +Reviewed-by: Daniel Axtens +Signed-off-by: Shantanu Goel +Signed-off-by: Kiran Kumar Modukuri +[dja: forward ported to current upstream] +Signed-off-by: Daniel Axtens +Signed-off-by: David Howells +Acked-by: Luís Henriques + +--- + fs/cachefiles/rdwr.c | 6 ++++++ + 1 file changed, 6 insertions(+) + +diff --git a/fs/cachefiles/rdwr.c b/fs/cachefiles/rdwr.c +index 40f7595aad10..db233588a69a 100644 +--- a/fs/cachefiles/rdwr.c ++++ b/fs/cachefiles/rdwr.c +@@ -535,7 +535,10 @@ static int cachefiles_read_backing_file(struct cachefiles_object *object, + netpage->index, cachefiles_gfp); + if (ret < 0) { + if (ret == -EEXIST) { ++ put_page(backpage); ++ backpage = NULL; + put_page(netpage); ++ netpage = NULL; + fscache_retrieval_complete(op, 1); + continue; + } +@@ -608,7 +611,10 @@ static int cachefiles_read_backing_file(struct cachefiles_object *object, + netpage->index, cachefiles_gfp); + if (ret < 0) { + if (ret == -EEXIST) { ++ put_page(backpage); ++ backpage = NULL; + put_page(netpage); ++ netpage = NULL; + fscache_retrieval_complete(op, 1); + continue; + } + diff --git a/patches.suse/cachefiles-Fix-race-between-read_waiter-and-read_copi.patch b/patches.suse/cachefiles-Fix-race-between-read_waiter-and-read_copi.patch new file mode 100644 index 0000000..f542585 --- /dev/null +++ b/patches.suse/cachefiles-Fix-race-between-read_waiter-and-read_copi.patch @@ -0,0 +1,123 @@ +From: Lei Xue +Date: Thu, 7 May 2020 08:50:22 -0400 +Subject: cachefiles: Fix race between read_waiter and read_copier involving + op->to_do +Git-commit: 7bb0c5338436dae953622470d52689265867f032 +Patch-mainline: v5.7-rc6 +References: bsc#1210430 + +There is a potential race in fscache operation enqueuing for reading and +copying multiple pages from cachefiles to netfs. The problem can be seen +easily on a heavy loaded system (for example many processes reading files +continually on an NFS share covered by fscache triggered this problem within +a few minutes). + +The race is due to cachefiles_read_waiter() adding the op to the monitor +to_do list and then then drop the object->work_lock spinlock before +completing fscache_enqueue_operation(). Once the lock is dropped, +cachefiles_read_copier() grabs the op, completes processing it, and +makes it through fscache_retrieval_complete() which sets the op->state to +the final state of FSCACHE_OP_ST_COMPLETE(4). When cachefiles_read_waiter() +finally gets through the remainder of fscache_enqueue_operation() +it sees the invalid state, and hits the ASSERTCMP and the following +oops is seen: +[ 2259.612361] FS-Cache: +[ 2259.614785] FS-Cache: Assertion failed +[ 2259.618639] FS-Cache: 4 == 5 is false +[ 2259.622456] ------------[ cut here ]------------ +[ 2259.627190] kernel BUG at fs/fscache/operation.c:70! +... +[ 2259.791675] RIP: 0010:[] [] fscache_enqueue_operation+0xff/0x170 [fscache] +[ 2259.802059] RSP: 0000:ffffa0263d543be0 EFLAGS: 00010046 +[ 2259.807521] RAX: 0000000000000019 RBX: ffffa01a4d390480 RCX: 0000000000000006 +[ 2259.814847] RDX: 0000000000000000 RSI: 0000000000000046 RDI: ffffa0263d553890 +[ 2259.822176] RBP: ffffa0263d543be8 R08: 0000000000000000 R09: ffffa0263c2d8708 +[ 2259.829502] R10: 0000000000001e7f R11: 0000000000000000 R12: ffffa01a4d390480 +[ 2259.844483] R13: ffff9fa9546c5920 R14: ffffa0263d543c80 R15: ffffa0293ff9bf10 +[ 2259.859554] FS: 00007f4b6efbd700(0000) GS:ffffa0263d540000(0000) knlGS:0000000000000000 +[ 2259.875571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 +[ 2259.889117] CR2: 00007f49e1624ff0 CR3: 0000012b38b38000 CR4: 00000000007607e0 +[ 2259.904015] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 +[ 2259.918764] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 +[ 2259.933449] PKRU: 55555554 +[ 2259.943654] Call Trace: +[ 2259.953592] +[ 2259.955577] [] cachefiles_read_waiter+0x92/0xf0 [cachefiles] +[ 2259.978039] [] __wake_up_common+0x82/0x120 +[ 2259.991392] [] __wake_up_common_lock+0x83/0xc0 +[ 2260.004930] [] ? task_rq_unlock+0x20/0x20 +[ 2260.017863] [] __wake_up+0x13/0x20 +[ 2260.030230] [] __wake_up_bit+0x50/0x70 +[ 2260.042535] [] unlock_page+0x2b/0x30 +[ 2260.054495] [] page_endio+0x29/0x90 +[ 2260.066184] [] mpage_end_io+0x51/0x80 + +CPU1 +cachefiles_read_waiter() + 20 static int cachefiles_read_waiter(wait_queue_entry_t *wait, unsigned mode, + 21 int sync, void *_key) + 22 { +... + 61 spin_lock(&object->work_lock); + 62 list_add_tail(&monitor->op_link, &op->to_do); + 63 spin_unlock(&object->work_lock); + + 64 + 65 fscache_enqueue_retrieval(op); +182 static inline void fscache_enqueue_retrieval(struct fscache_retrieval *op) +183 { +184 fscache_enqueue_operation(&op->op); +185 } + 58 void fscache_enqueue_operation(struct fscache_operation *op) + 59 { + 60 struct fscache_cookie *cookie = op->object->cookie; + 61 + 62 _enter("{OBJ%x OP%x,%u}", + 63 op->object->debug_id, op->debug_id, atomic_read(&op->usage)); + 64 + 65 ASSERT(list_empty(&op->pend_link)); + 66 ASSERT(op->processor != NULL); + 67 ASSERT(fscache_object_is_available(op->object)); + 68 ASSERTCMP(atomic_read(&op->usage), >, 0); + + +CPU2 +cachefiles_read_copier() +168 while (!list_empty(&op->to_do)) { +... +202 fscache_end_io(op, monitor->netfs_page, error); +203 put_page(monitor->netfs_page); +204 fscache_retrieval_complete(op, 1); + +CPU1 + 58 void fscache_enqueue_operation(struct fscache_operation *op) + 59 { +... + 69 ASSERTIFCMP(op->state != FSCACHE_OP_ST_IN_PROGRESS, + 70 op->state, ==, FSCACHE_OP_ST_CANCELLED); + +Signed-off-by: Lei Xue +Signed-off-by: Dave Wysochanski +Signed-off-by: David Howells +Acked-by: Luís Henriques + +--- + fs/cachefiles/rdwr.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/fs/cachefiles/rdwr.c b/fs/cachefiles/rdwr.c +index d3d78176b23c..e7726f5f1241 100644 +--- a/fs/cachefiles/rdwr.c ++++ b/fs/cachefiles/rdwr.c +@@ -60,9 +60,9 @@ static int cachefiles_read_waiter(wait_queue_entry_t *wait, unsigned mode, + object = container_of(op->op.object, struct cachefiles_object, fscache); + spin_lock(&object->work_lock); + list_add_tail(&monitor->op_link, &op->to_do); ++ fscache_enqueue_retrieval(op); + spin_unlock(&object->work_lock); + +- fscache_enqueue_retrieval(op); + fscache_put_retrieval(op); + return 0; + } + diff --git a/patches.suse/cachefiles-Handle-readpage-error-correctly.patch b/patches.suse/cachefiles-Handle-readpage-error-correctly.patch new file mode 100644 index 0000000..bdac7cf --- /dev/null +++ b/patches.suse/cachefiles-Handle-readpage-error-correctly.patch @@ -0,0 +1,42 @@ +From: "Matthew Wilcox (Oracle)" +Date: Mon, 26 Oct 2020 09:12:10 +0000 +Subject: cachefiles: Handle readpage error correctly +Git-commit: 9480b4e75b7108ee68ecf5bc6b4bd68e8031c521 +Patch-mainline: v5.10-rc2 +References: bsc#1210430 + +If ->readpage returns an error, it has already unlocked the page. + +Fixes: 5e929b33c393 ("CacheFiles: Handle truncate unlocking the page we're reading") +Cc: stable@vger.kernel.org +Signed-off-by: Matthew Wilcox (Oracle) +Signed-off-by: David Howells +Signed-off-by: Linus Torvalds +Acked-by: Luís Henriques + +--- + fs/cachefiles/rdwr.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/fs/cachefiles/rdwr.c b/fs/cachefiles/rdwr.c +index 3080cda9e824..8bda092e60c5 100644 +--- a/fs/cachefiles/rdwr.c ++++ b/fs/cachefiles/rdwr.c +@@ -121,7 +121,7 @@ static int cachefiles_read_reissue(struct cachefiles_object *object, + _debug("reissue read"); + ret = bmapping->a_ops->readpage(NULL, backpage); + if (ret < 0) +- goto unlock_discard; ++ goto discard; + } + + /* but the page may have been read before the monitor was installed, so +@@ -138,6 +138,7 @@ static int cachefiles_read_reissue(struct cachefiles_object *object, + + unlock_discard: + unlock_page(backpage); ++discard: + spin_lock_irq(&object->work_lock); + list_del(&monitor->op_link); + spin_unlock_irq(&object->work_lock); + diff --git a/patches.suse/fscache-cachefiles-remove-redundant-variable-cache.patch b/patches.suse/fscache-cachefiles-remove-redundant-variable-cache.patch new file mode 100644 index 0000000..064363f --- /dev/null +++ b/patches.suse/fscache-cachefiles-remove-redundant-variable-cache.patch @@ -0,0 +1,35 @@ +From: Colin Ian King +Date: Tue, 17 Jul 2018 09:53:42 +0100 +Subject: fscache, cachefiles: remove redundant variable 'cache' +Git-commit: 31ffa563833576bd49a8bf53120568312755e6e2 +Patch-mainline: v4.20-rc5 +References: bsc#1210430 + +Variable 'cache' is being assigned but is never used hence it is +redundant and can be removed. + +Cleans up clang warning: +Warning: variable 'cache' set but not used [-Wunused-but-set-variable] + +Signed-off-by: Colin Ian King +Signed-off-by: David Howells +Acked-by: Luís Henriques + +--- + fs/cachefiles/rdwr.c | 3 --- + 1 file changed, 3 deletions(-) + +--- a/fs/cachefiles/rdwr.c ++++ b/fs/cachefiles/rdwr.c +@@ -967,11 +967,8 @@ error: + void cachefiles_uncache_page(struct fscache_object *_object, struct page *page) + { + struct cachefiles_object *object; +- struct cachefiles_cache *cache; + + object = container_of(_object, struct cachefiles_object, fscache); +- cache = container_of(object->fscache.cache, +- struct cachefiles_cache, cache); + + _enter("%p,{%lu}", object, page->index); + diff --git a/patches.suse/net-phy-realtek-Use-the-dummy-stubs-for-MMD-register.patch b/patches.suse/net-phy-realtek-Use-the-dummy-stubs-for-MMD-register.patch new file mode 100644 index 0000000..4301dd9 --- /dev/null +++ b/patches.suse/net-phy-realtek-Use-the-dummy-stubs-for-MMD-register.patch @@ -0,0 +1,42 @@ +From 9be73bb093813473a80b4d14b01cdf5de76991f1 Mon Sep 17 00:00:00 2001 +From: Kevin Hao +Date: Tue, 20 Mar 2018 09:44:53 +0800 +Subject: [PATCH 1/2] net: phy: realtek: Use the dummy stubs for MMD register + access for rtl8211b +Git-commit: 0231b1a074c672f8c00da00a57144072890d816b +Patch-mainline: v4.16-rc7 +References: git-fixes + +The Ethernet on mpc8315erdb is broken since commit b6b5e8a69118 +("gianfar: Disable EEE autoneg by default"). The reason is that +even though the rtl8211b doesn't support the MMD extended registers +access, it does return some random values if we trying to access +the MMD register via indirect method. This makes it seem that the +EEE is supported by this phy device. And the subsequent writing to +the MMD registers does cause the phy malfunction. So use the dummy +stubs for the MMD register access to fix this issue. + +Fixes: b6b5e8a69118 ("gianfar: Disable EEE autoneg by default") +Signed-off-by: Kevin Hao +Signed-off-by: David S. Miller +Signed-off-by: Denis Kirjanov +--- + drivers/net/phy/realtek.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/drivers/net/phy/realtek.c b/drivers/net/phy/realtek.c +index e221feb58d9f..f75c94daf3c2 100644 +--- a/drivers/net/phy/realtek.c ++++ b/drivers/net/phy/realtek.c +@@ -177,6 +177,8 @@ static struct phy_driver realtek_drvs[] = { + .flags = PHY_HAS_INTERRUPT, + .ack_interrupt = &rtl821x_ack_interrupt, + .config_intr = &rtl8211b_config_intr, ++ .read_mmd = &genphy_read_mmd_unsupported, ++ .write_mmd = &genphy_write_mmd_unsupported, + }, { + .phy_id = 0x001cc914, + .name = "RTL8211DN Gigabit Ethernet", +-- +2.16.4 + diff --git a/patches.suse/power-supply-da9150-Fix-use-after-free-bug-in-da9150.patch b/patches.suse/power-supply-da9150-Fix-use-after-free-bug-in-da9150.patch new file mode 100644 index 0000000..a8af6de --- /dev/null +++ b/patches.suse/power-supply-da9150-Fix-use-after-free-bug-in-da9150.patch @@ -0,0 +1,54 @@ +From 06615d11cc78162dfd5116efb71f29eb29502d37 Mon Sep 17 00:00:00 2001 +From: Zheng Wang +Date: Sun, 12 Mar 2023 01:46:50 +0800 +Subject: [PATCH] power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition +Git-commit: 06615d11cc78162dfd5116efb71f29eb29502d37 +Patch-mainline: v6.3-rc4 +References: CVE-2023-30772 bsc#1210329 + +In da9150_charger_probe, &charger->otg_work is bound with +da9150_charger_otg_work. da9150_charger_otg_ncb may be +called to start the work. + +If we remove the module which will call da9150_charger_remove +to make cleanup, there may be a unfinished work. The possible +sequence is as follows: + +Fix it by canceling the work before cleanup in the da9150_charger_remove + +CPU0 CPUc1 + + |da9150_charger_otg_work +da9150_charger_remove | +power_supply_unregister | +device_unregister | +power_supply_dev_release| +kfree(psy) | + | + | power_supply_changed(charger->usb); + | //use + +Fixes: c1a281e34dae ("power: Add support for DA9150 Charger") +Signed-off-by: Zheng Wang +Signed-off-by: Sebastian Reichel +Acked-by: Takashi Iwai + +--- + drivers/power/supply/da9150-charger.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/drivers/power/supply/da9150-charger.c b/drivers/power/supply/da9150-charger.c +index 14da5c595dd9..a87aeaea38e1 100644 +--- a/drivers/power/supply/da9150-charger.c ++++ b/drivers/power/supply/da9150-charger.c +@@ -657,6 +657,7 @@ static int da9150_charger_remove(struct platform_device *pdev) + + if (!IS_ERR_OR_NULL(charger->usb_phy)) + usb_unregister_notifier(charger->usb_phy, &charger->otg_nb); ++ cancel_work_sync(&charger->otg_work); + + power_supply_unregister(charger->battery); + power_supply_unregister(charger->usb); +-- +2.35.3 + diff --git a/patches.suse/tuntap-fix-dividing-by-zero-in-ebpf-queue-selection.patch b/patches.suse/tuntap-fix-dividing-by-zero-in-ebpf-queue-selection.patch new file mode 100644 index 0000000..a0a5684 --- /dev/null +++ b/patches.suse/tuntap-fix-dividing-by-zero-in-ebpf-queue-selection.patch @@ -0,0 +1,48 @@ +From 429f228f66b3dec61e2a12a826b2a48b98a5572c Mon Sep 17 00:00:00 2001 +From: Jason Wang +Date: Wed, 8 May 2019 23:20:17 -0400 +Subject: [PATCH 2/2] tuntap: fix dividing by zero in ebpf queue selection +Git-commit: a35d310f03a692bf4798eb309a1950a06a150620 +Patch-mainline: v5.2-rc1 +References: git-fixes + +We need check if tun->numqueues is zero (e.g for the persist device) +before trying to use it for modular arithmetic. + +Reported-by: Eric Dumazet +Fixes: 96f84061620c6("tun: add eBPF based queue selection method") +Signed-off-by: Jason Wang +Reviewed-by: Eric Dumazet +Signed-off-by: David S. Miller +Signed-off-by: Denis Kirjanov +--- + drivers/net/tun.c | 7 ++++++- + 1 file changed, 6 insertions(+), 1 deletion(-) + +diff --git a/drivers/net/tun.c b/drivers/net/tun.c +index ac50b45c3629..85e957e2663c 100644 +--- a/drivers/net/tun.c ++++ b/drivers/net/tun.c +@@ -591,13 +591,18 @@ static u16 tun_automq_select_queue(struct tun_struct *tun, struct sk_buff *skb) + static u16 tun_ebpf_select_queue(struct tun_struct *tun, struct sk_buff *skb) + { + struct tun_prog *prog; ++ u32 numqueues; + u16 ret = 0; + ++ numqueues = READ_ONCE(tun->numqueues); ++ if (!numqueues) ++ return 0; ++ + prog = rcu_dereference(tun->steering_prog); + if (prog) + ret = bpf_prog_run_clear_cb(prog->prog, skb); + +- return ret % tun->numqueues; ++ return ret % numqueues; + } + + static u16 tun_select_queue(struct net_device *dev, struct sk_buff *skb, +-- +2.16.4 + diff --git a/series.conf b/series.conf index 03a6555..a85e0c1 100644 --- a/series.conf +++ b/series.conf @@ -25618,6 +25618,7 @@ patches.suse/batman-adv-fix-header-size-check-in-batadv_dbg_arp.patch patches.suse/batman-adv-Fix-skbuff-rcsum-on-packet-reroute.patch patches.suse/net-phy-Add-general-dummy-stubs-for-MMD-register-acc.patch + patches.suse/net-phy-realtek-Use-the-dummy-stubs-for-MMD-register.patch patches.suse/s390-qeth-free-netdevice-when-removing-a-card.patch patches.suse/s390-qeth-when-thread-completes-wake-up-all-waiters.patch patches.suse/s390-qeth-lock-read-device-while-queueing-next-buffe.patch @@ -44531,7 +44532,9 @@ patches.suse/misc-mic-scif-fix-copy-paste-error-in-scif_create_re.patch patches.suse/unifdef-use-memcpy-instead-of-strncpy.patch patches.suse/fscache-Fix-race-in-fscache_op_complete-due-to-split.patch + patches.suse/cachefiles-Fix-page-leak-in-cachefiles_read_backing_f.patch patches.suse/fscache-fix-race-between-enablement-and-dropping-of-.patch + patches.suse/fscache-cachefiles-remove-redundant-variable-cache.patch patches.suse/ACPI-IORT-Fix-iort_get_platform_device_domain-uninit.patch patches.suse/mm-cleancache-fix-corruption-on-missed-inode-invalid.patch patches.suse/mm-use-swp_offset-as-key-in-shmem_replace_page.patch @@ -50086,6 +50089,7 @@ patches.suse/clk-tegra-Fix-PLLM-programming-on-Tegra124-when-PMC-.patch patches.suse/ipv4-Fix-raw-socket-lookup-for-local-traffic.patch patches.suse/net-hns3-remove-redundant-assignment-of-l2_hdr-to-it.patch + patches.suse/tuntap-fix-dividing-by-zero-in-ebpf-queue-selection.patch patches.suse/tuntap-synchronize-through-tfiles-array-instead-of-t.patch patches.suse/tipc-fix-hanging-clients-using-poll-with-EPOLLOUT-fl.patch patches.suse/vlan-disable-SIOCSHWTSTAMP-in-container.patch @@ -56426,6 +56430,7 @@ patches.suse/s390-ism-fix-error-return-code-in-ism_probe patches.suse/net-phy-fix-aneg-restart-in-phy_ethtool_set_eee.patch patches.suse/pppoe-only-process-PADT-targeted-at-local-interfaces.patch + patches.suse/cachefiles-Fix-race-between-read_waiter-and-read_copi.patch patches.suse/pinctrl-sunrisepoint-Fix-PAD-lock-register-offset-fo.patch patches.suse/pinctrl-baytrail-Enable-pin-configuration-setting-fo.patch patches.suse/pinctrl-cherryview-Add-missing-spinlock-usage-in-chv.patch @@ -58669,6 +58674,7 @@ patches.suse/nvme-fc-wait-for-queues-to-freeze-before-calling-upd.patch patches.suse/smb3-add-some-missing-definitions-from-MS-FSCC.patch patches.suse/NTB-hw-amd-fix-an-issue-about-leak-system-resources.patch + patches.suse/cachefiles-Handle-readpage-error-correctly.patch patches.suse/scsi-qla2xxx-remove-incorrect-sparse-ifdef.patch patches.suse/x86-kexec-Use-up-to-dated-screen_info-copy-to-fill-b.patch patches.suse/msft-hv-2164-hyperv_fb-Update-screen_info-after-removing-old-fram.patch @@ -59490,6 +59496,7 @@ patches.suse/powerpc-Fix-alignment-bug-within-the-init-sections.patch patches.suse/spi-cadence-cache-reference-clock-rate-during-probe.patch patches.suse/nfsd4-readdirplus-shouldn-t-return-parent-of-export.patch + patches.suse/cachefiles-Drop-superfluous-readpages-aops-NULL-check.patch patches.suse/02-tcp-fix-potential-use-after-free-due-to-double-kfree.patch patches.suse/net-usb-cdc_ncm-don-t-spew-notifications.patch patches.suse/can-dev-can_restart-fix-use-after-free-bug.patch @@ -63174,6 +63181,7 @@ patches.suse/net-usb-smsc95xx-Limit-packet-length-to-skb-len.patch patches.suse/net-usb-lan78xx-Limit-packet-length-to-skb-len.patch patches.suse/Bluetooth-btsdio-fix-use-after-free-bug-in-btsdio_re.patch + patches.suse/power-supply-da9150-Fix-use-after-free-bug-in-da9150.patch patches.suse/s390-vfio-ap-fix-memory-leak-in-vfio_ap-device-drive.patch patches.suse/NFSv4-Fix-hangs-when-recovering-open-state-after-a-s.patch patches.suse/ring-buffer-Fix-race-while-reader-and-writer-are-on-the-same-page.patch