Hello community,

here is the log from the commit of package kernel-source for openSUSE:Factory 
checked in at 2018-06-28 15:10:41
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kernel-source (Old)
 and      /work/SRC/openSUSE:Factory/.kernel-source.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kernel-source"

Thu Jun 28 15:10:41 2018 rev:437 rq:619106 version:4.17.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes        
2018-06-20 15:21:28.851571180 +0200
+++ /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes   
2018-06-28 15:10:55.443867483 +0200
@@ -1,0 +2,204 @@
+Tue Jun 26 08:45:20 CEST 2018 - [email protected]
+
+- Linux 4.17.3 (bnc#1012628).
+- net: aquantia: fix unsigned numvecs comparison with less than
+  zero (bnc#1012628).
+- bonding: re-evaluate force_primary when the primary slave name
+  changes (bnc#1012628).
+- cdc_ncm: avoid padding beyond end of skb (bnc#1012628).
+- ipv6: allow PMTU exceptions to local routes (bnc#1012628).
+- net: dsa: add error handling for pskb_trim_rcsum (bnc#1012628).
+- net: phy: dp83822: use BMCR_ANENABLE instead of BMSR_ANEGCAPABLE
+  for DP83620 (bnc#1012628).
+- net/sched: act_simple: fix parsing of TCA_DEF_DATA
+  (bnc#1012628).
+- tcp: verify the checksum of the first data segment in a new
+  connection (bnc#1012628).
+- tls: fix use-after-free in tls_push_record (bnc#1012628).
+- tls: fix waitall behavior in tls_sw_recvmsg (bnc#1012628).
+- udp: fix rx queue len reported by diag and proc interface
+  (bnc#1012628).
+- net: in virtio_net_hdr only add VLAN_HLEN to csum_start if
+  payload holds vlan (bnc#1012628).
+- hv_netvsc: Fix a network regression after ifdown/ifup
+  (bnc#1012628).
+- ext4: fix hole length detection in ext4_ind_map_blocks()
+  (bnc#1012628).
+- ext4: update mtime in ext4_punch_hole even if no blocks are
+  released (bnc#1012628).
+- ext4: do not allow external inodes for inline data
+  (bnc#1012628).
+- ext4: bubble errors from ext4_find_inline_data_nolock() up to
+  ext4_iget() (bnc#1012628).
+- ext4: correctly handle a zero-length xattr with a non-zero
+  e_value_offs (bnc#1012628).
+- ext4: fix fencepost error in check for inode count overflow
+  during resize (bnc#1012628).
+- driver core: Don't ignore class_dir_create_and_add() failure
+  (bnc#1012628).
+- Btrfs: allow empty subvol= again (bnc#1012628).
+- Btrfs: fix clone vs chattr NODATASUM race (bnc#1012628).
+- Btrfs: fix memory and mount leak in btrfs_ioctl_rm_dev_v2()
+  (bnc#1012628).
+- btrfs: return error value if create_io_em failed in
+  cow_file_range (bnc#1012628).
+- btrfs: scrub: Don't use inode pages for device replace
+  (bnc#1012628).
+- ALSA: usb-audio: Disable the quirk for Nura headset
+  (bnc#1012628).
+- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo
+  AIOs (bnc#1012628).
+- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation
+  (bnc#1012628).
+- ALSA: hda - Handle kzalloc() failure in
+  snd_hda_attach_pcm_stream() (bnc#1012628).
+- ALSA: hda: add dock and led support for HP EliteBook 830 G5
+  (bnc#1012628).
+- ALSA: hda: add dock and led support for HP ProBook 640 G4
+  (bnc#1012628).
+- x86/MCE: Fix stack out-of-bounds write in mce-inject.c:
+  Flags_read() (bnc#1012628).
+- smb3: fix various xid leaks (bnc#1012628).
+- smb3: on reconnect set PreviousSessionId field (bnc#1012628).
+- CIFS: 511c54a2f69195b28afb9dd119f03787b1625bb4 adds a check
+  for session expiry (bnc#1012628).
+- cifs: For SMB2 security informaion query, check for minimum
+  sized security descriptor instead of sizeof FileAllInformation
+  class (bnc#1012628).
+- nbd: fix nbd device deletion (bnc#1012628).
+- nbd: update size when connected (bnc#1012628).
+- nbd: use bd_set_size when updating disk size (bnc#1012628).
+- blk-mq: reinit q->tag_set_list entry only after grace period
+  (bnc#1012628).
+- bdi: Move cgroup bdi_writeback to a dedicated low concurrency
+  workqueue (bnc#1012628).
+- cpufreq: Fix new policy initialization during limits updates
+  via sysfs (bnc#1012628).
+- cpufreq: ti-cpufreq: Fix an incorrect error return value
+  (bnc#1012628).
+- cpufreq: governors: Fix long idle detection logic in load
+  calculation (bnc#1012628).
+- libata: zpodd: small read overflow in eject_tray()
+  (bnc#1012628).
+- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012628).
+- nvme/pci: Sync controller reset for AER slot_reset
+  (bnc#1012628).
+- w1: mxc_w1: Enable clock before calling clk_get_rate() on it
+  (bnc#1012628).
+- x86/vector: Fix the args of vector_alloc tracepoint
+  (bnc#1012628).
+- x86/apic/vector: Prevent hlist corruption and leaks
+  (bnc#1012628).
+- x86/apic: Provide apic_ack_irq() (bnc#1012628).
+- x86/ioapic: Use apic_ack_irq() (bnc#1012628).
+- x86/platform/uv: Use apic_ack_irq() (bnc#1012628).
+- irq_remapping: Use apic_ack_irq() (bnc#1012628).
+- genirq/generic_pending: Do not lose pending affinity update
+  (bnc#1012628).
+- genirq/affinity: Defer affinity setting if irq chip is busy
+  (bnc#1012628).
+- genirq/migration: Avoid out of line call if pending is not set
+  (bnc#1012628).
+- x86/intel_rdt: Enable CMT and MBM on new Skylake stepping
+  (bnc#1012628).
+- media: uvcvideo: Prevent setting unavailable flags
+  (bnc#1012628).
+- media: rc: ensure input/lirc device can be opened after register
+  (bnc#1012628).
+- iwlwifi: fw: harden page loading code (bnc#1012628).
+- orangefs: set i_size on new symlink (bnc#1012628).
+- orangefs: report attributes_mask and attributes for statx
+  (bnc#1012628).
+- HID: intel_ish-hid: ipc: register more pm callbacks to support
+  hibernation (bnc#1012628).
+- HID: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro
+  large (bnc#1012628).
+- fs/binfmt_misc.c: do not allow offset overflow (bnc#1012628).
+- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset
+  (bnc#1012628).
+- commit e8dc1b5
+
+-------------------------------------------------------------------
+Tue Jun 26 08:25:44 CEST 2018 - [email protected]
+
+- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM,
+  too (bsc#1098626).
+- commit cbe83fb
+
+-------------------------------------------------------------------
+Mon Jun 25 21:22:28 CEST 2018 - [email protected]
+
+- Input: psmouse - fix button reporting for basic protocols
+  (bnc#1098392).
+- commit 7faa585
+
+-------------------------------------------------------------------
+Mon Jun 25 11:24:43 CEST 2018 - [email protected]
+
+- vhost: fix info leak due to uninitialized memory (bsc#1092472
+  CVE-2018-1118).
+- commit 7372950
+
+-------------------------------------------------------------------
+Sat Jun 23 09:41:41 CEST 2018 - [email protected]
+
+- x86/stacktrace: Do not unwind after user regs (bnc#1058115).
+- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115).
+- x86/stacktrace: Clarify the reliable success paths
+  (bnc#1058115).
+- x86/stacktrace: Do not fail for ORC with regs on stack
+  (bnc#1058115).
+- x86/unwind/orc: Detect the end of the stack (bnc#1058115).
+- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC
+  unwinder (bnc#1058115).
+- Delete
+  patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch.
+- Delete
+  patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch.
+- Delete
+  patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch.
+- Delete
+  patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch.
+- Delete
+  patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch.
+  Replace the ORC patches by the upstream patches. Finally...
+- commit 33a2d86
+
+-------------------------------------------------------------------
+Thu Jun 21 17:15:09 CEST 2018 - [email protected]
+
+- s390: Correct register corruption in critical section cleanup
+  (boo#1095717).
+- commit 4594a9e
+
+-------------------------------------------------------------------
+Wed Jun 20 11:08:17 CEST 2018 - [email protected]
+
+- ACPICA: AML parser: attempt to continue loading table after
+  error (bsc#1098074).
+- commit fc39d10
+
+-------------------------------------------------------------------
+Mon Jun 18 18:27:58 CEST 2018 - [email protected]
+
+- macros.kernel-source: define linux_arch for KMPs (boo#1098050).
+  CONFIG_64BIT is no longer defined so KMP spec files need to include
+  %{?linux_make_arch} in any make call to build modules or descent into
+  the kernel directory for any reason.
+- commit 5dc40af
+
+-------------------------------------------------------------------
+Mon Jun 18 07:27:34 CEST 2018 - [email protected]
+
+- rpm: ignore CONFIG_GCC_VERSION when checking for oldconfig changes
+  Since 4.18-rc1, "make oldconfig" writes gcc version and capabilities into
+  generated .config. Thus whenever we build the package or run checks with
+  different gcc version than used to update config/*/*, check for "outdated
+  configs" fails.
++++ 7 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes
++++ and /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes
dtb-armv6l.changes: same change
dtb-armv7l.changes: same change
kernel-64kb.changes: same change
kernel-debug.changes: same change
kernel-default.changes: same change
kernel-docs.changes: same change
kernel-kvmsmall.changes: same change
kernel-lpae.changes: same change
kernel-obs-build.changes: same change
kernel-obs-qa.changes: same change
kernel-pae.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-vanilla.changes: same change
kernel-zfcpdump.changes: same change

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dtb-aarch64.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.575799330 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.583799316 +0200
@@ -17,7 +17,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -29,9 +29,9 @@
 %(chmod +x 
%_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols})
 
 Name:           dtb-aarch64
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif

dtb-armv6l.spec: same change
dtb-armv7l.spec: same change
++++++ kernel-64kb.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.647799198 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.651799191 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        Kernel with 64kb PAGE_SIZE
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -165,10 +165,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 # END COMMON DEPS
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz
 Source2:        source-post.sh
@@ -1094,8 +1094,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

++++++ kernel-debug.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.683799132 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.683799132 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        A Debug Version of the Kernel
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -165,10 +165,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 # END COMMON DEPS
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 %ifarch ppc64
 Provides:       kernel-kdump = 2.6.28
 Obsoletes:      kernel-kdump <= 2.6.28
@@ -1100,8 +1100,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 
 %ifarch ppc64
 Provides:       kernel-kdump-base = 2.6.28

++++++ kernel-default.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.711799080 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.715799073 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        The Standard Kernel
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -165,10 +165,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 # END COMMON DEPS
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 %ifarch %ix86
 Provides:       kernel-smp = 2.6.17
 Obsoletes:      kernel-smp <= 2.6.17
@@ -1143,8 +1143,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 
 %ifarch %ix86
 Provides:       kernel-trace-base = 3.13

++++++ kernel-docs.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.727799051 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.731799044 +0200
@@ -17,7 +17,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -31,9 +31,9 @@
 Summary:        Kernel Documentation
 License:        GPL-2.0
 Group:          Documentation/Man
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -63,7 +63,7 @@
 %endif
 Url:            http://www.kernel.org/
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 BuildArch:      noarch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 Source0:        
http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz

++++++ kernel-kvmsmall.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.743799022 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.751799007 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        The Small Developer Kernel for KVM
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -165,10 +165,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 # END COMMON DEPS
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz
 Source2:        source-post.sh
@@ -1098,8 +1098,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

kernel-lpae.spec: same change
++++++ kernel-obs-build.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.779798955 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.779798955 +0200
@@ -19,7 +19,7 @@
 
 #!BuildIgnore: post-build-checks
 
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -45,7 +45,7 @@
 %endif
 %endif
 %endif
-BuildRequires:  kernel%kernel_flavor-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+BuildRequires:  kernel%kernel_flavor-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 
 %if 0%{?rhel_version}
 BuildRequires:  kernel
@@ -64,9 +64,9 @@
 Summary:        package kernel and initrd for OBS VM builds
 License:        GPL-2.0
 Group:          SLES
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif

++++++ kernel-obs-qa.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.795798927 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.795798927 +0200
@@ -17,7 +17,7 @@
 # needsrootforbuild
 
 
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -36,9 +36,9 @@
 Summary:        Basic QA tests for the kernel
 License:        GPL-2.0
 Group:          SLES
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif

++++++ kernel-pae.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.807798904 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.807798904 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        Kernel with PAE Support
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -165,10 +165,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 # END COMMON DEPS
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 %ifarch %ix86
 Provides:       kernel-bigsmp = 2.6.17
 Obsoletes:      kernel-bigsmp <= 2.6.17
@@ -1120,8 +1120,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 
 %ifarch %ix86
 Provides:       kernel-vmi-base = 2.6.38

++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.819798882 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.823798875 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -30,9 +30,9 @@
 Summary:        The Linux Kernel Sources
 License:        GPL-2.0
 Group:          Development/Sources
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -43,7 +43,7 @@
 BuildRequires:  sed
 Requires(post): coreutils sed
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 Provides:       linux
 Provides:       multiversion(kernel)
 Source0:        
http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz

++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.835798853 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.839798845 +0200
@@ -24,10 +24,10 @@
 Summary:        Kernel Symbol Versions (modversions)
 License:        GPL-2.0
 Group:          Development/Sources
-Version:        4.17.2
+Version:        4.17.3
 %if %using_buildservice
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -55,7 +55,7 @@
 %endif
 Requires:       pesign-obs-integration
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 Provides:       multiversion(kernel)
 Source:         README.KSYMS
 Requires:       kernel-devel%variant = %version-%source_rel

++++++ kernel-vanilla.spec ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.851798823 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.851798823 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.17
-%define patchversion 4.17.2
+%define patchversion 4.17.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        The Standard Kernel - without any SUSE patches
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.17.2
+Version:        4.17.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gddde22d
+Release:        <RELEASE>.ge8dc1b5
 %else
 Release:        0
 %endif
@@ -165,10 +165,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 # END COMMON DEPS
-Provides:       %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz
 Source2:        source-post.sh
@@ -1091,8 +1091,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       kernel-%build_flavor-base-srchash = 
ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
-Provides:       kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+Provides:       kernel-%build_flavor-base-srchash = 
e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
+Provides:       kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

kernel-zfcpdump.spec: same change
++++++ check-for-config-changes ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:32.967798611 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:32.967798611 +0200
@@ -2,8 +2,8 @@
 
 # lines 4 contains a timestamp...
 differences="$(
-    diff -bU0 <(sed -e '/^# .* is not set$/p' -e '/^$\|^#/d' "$1" | sort) \
-             <(sed -e '/^# .* is not set$/p' -e '/^$\|^#/d' "$2" | sort) \
+    diff -bU0 <(sed -e '/CONFIG_GCC_VERSION/ d' -e '/^# .* is not set$/p' -e 
'/^$\|^#/d' "$1" | sort) \
+             <(sed -e '/CONFIG_GCC_VERSION/ d' -e '/^# .* is not set$/p' -e 
'/^$\|^#/d' "$2" | sort) \
     | grep '^[-+][^-+]'
 )" || true
 if [ -n "$differences" ]; then

++++++ macros.kernel-source ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:33.259798075 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:33.259798075 +0200
@@ -2,6 +2,39 @@
 %kernel_module_package_release 1
 %kernel_module_package_buildreqs modutils kernel-syms
 
+%cpu_arch %(case %_target_cpu in \
+    # from rpm --eval '%ix86' \
+    (i?86 | pentium3 | pentium4 | athlon | geode) \
+        echo "i386" \
+        ;; \
+    (aarch64) \
+        echo "arm64" \
+        ;; \
+    (*)\
+        echo "%_target_cpu" \
+        ;; \
+esac)
+
+%linux_arch %(case %cpu_arch in \
+    (ppc*) \
+        echo "powerpc" \
+        ;; \
+    (s390x) \
+        echo "s390" \
+        ;; \
+    (arm64) \
+        echo "arm64" \
+        ;; \
+    (armv*) \
+        echo "arm" \
+        ;; \
+    (*) \
+        echo "%cpu_arch" \
+        ;; \
+esac)
+
+%linux_make_arch ARCH=%linux_arch
+
 # Defines %flavors_to_build and %kernel_source() as a side effect.
 %_kernel_module_package(n:v:r:t:f:Xp:bc:) \
 %{expand:%( \
@@ -16,7 +49,7 @@
            (*) \
                [ -z "%{-X}" -a -n "$flavors" ] && continue ;; \
            esac \
-           krel=$(make -si -C /usr/src/linux-obj/%_target_cpu/$flavor/ 
kernelrelease 2>/dev/null) \
+           krel=$(make -si -C /usr/src/linux-obj/%_target_cpu/$flavor/ 
%linux_make_arch kernelrelease 2>/dev/null) \
            kver=${krel%%-*} \
            flavors_to_build="$flavors_to_build $flavor" \
            echo "%%_suse_kernel_module_subpackage -n %{-n*}%{!-n:%name} -v 
%{-v*}%{!-v:%version} -r %{-r*}%{!-r:%release} %{-f} %{-p} %{-b} %{-c:-c} 
$flavor $kver" \

++++++ patches.kernel.org.tar.bz2 ++++++
++++ 5430 lines of diff (skipped)

++++++ patches.suse.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch 
new/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch
--- old/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch    
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch    
2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,45 @@
+From: Jiri Slaby <[email protected]>
+Date: Fri, 18 May 2018 08:47:08 +0200
+Subject: x86/stacktrace: Do not unwind after user regs
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm
+Git-commit: 0797a8d0d79769574550caa5ca5d89c237723250
+Patch-mainline: Queued in subsystem maintainer repository
+References: bnc#1058115
+
+Josh pointed out, that there is no way a frame can be after user regs.
+So remove the last unwind and the check.
+
+Signed-off-by: Jiri Slaby <[email protected]>
+Acked-by: Josh Poimboeuf <[email protected]>
+Cc: Andy Lutomirski <[email protected]>
+Cc: Borislav Petkov <[email protected]>
+Cc: Brian Gerst <[email protected]>
+Cc: Denys Vlasenko <[email protected]>
+Cc: H. Peter Anvin <[email protected]>
+Cc: Linus Torvalds <[email protected]>
+Cc: Peter Zijlstra <[email protected]>
+Cc: Thomas Gleixner <[email protected]>
+Link: https://lkml.kernel.org/lkml/[email protected]
+Signed-off-by: Ingo Molnar <[email protected]>
+---
+ arch/x86/kernel/stacktrace.c |    9 ---------
+ 1 file changed, 9 deletions(-)
+
+--- a/arch/x86/kernel/stacktrace.c
++++ b/arch/x86/kernel/stacktrace.c
+@@ -113,15 +113,6 @@ __save_stack_trace_reliable(struct stack
+                       if (!user_mode(regs))
+                               return -EINVAL;
+ 
+-                      /*
+-                       * The last frame contains the user mode syscall
+-                       * pt_regs.  Skip it and finish the unwind.
+-                       */
+-                      unwind_next_frame(&state);
+-                      if (!unwind_done(&state)) {
+-                              STACKTRACE_DUMP_ONCE(task);
+-                              return -EINVAL;
+-                      }
+                       break;
+               }
+ 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch 
new/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch
--- old/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch    
2018-06-16 12:33:07.000000000 +0200
+++ new/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch    
1970-01-01 01:00:00.000000000 +0100
@@ -1,37 +0,0 @@
-From: Jiri Slaby <[email protected]>
-Date: Fri, 1 Dec 2017 08:20:00 +0100
-Subject: x86/stacktrace: do now unwind after user regs
-Patch-mainline: submitted on 2017/12/5
-References: bnc#1058115
-
-Josh pointed out, that there is no way a frame can be after user regs.
-So remove the last unwind and the check.
-
-Signed-off-by: Jiri Slaby <[email protected]>
-Cc: Thomas Gleixner <[email protected]>
-Cc: Ingo Molnar <[email protected]>
-Cc: "H. Peter Anvin" <[email protected]>
-Cc: [email protected]
-Cc: Josh Poimboeuf <[email protected]>
----
- arch/x86/kernel/stacktrace.c |    9 ---------
- 1 file changed, 9 deletions(-)
-
---- a/arch/x86/kernel/stacktrace.c
-+++ b/arch/x86/kernel/stacktrace.c
-@@ -113,15 +113,6 @@ __save_stack_trace_reliable(struct stack
-                       if (!user_mode(regs))
-                               return -EINVAL;
- 
--                      /*
--                       * The last frame contains the user mode syscall
--                       * pt_regs.  Skip it and finish the unwind.
--                       */
--                      unwind_next_frame(&state);
--                      if (!unwind_done(&state)) {
--                              STACKTRACE_DUMP_ONCE(task);
--                              return -EINVAL;
--                      }
-                       break;
-               }
- 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch 
new/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch
--- old/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch      
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch      
2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,74 @@
+From: Jiri Slaby <[email protected]>
+Date: Fri, 18 May 2018 08:47:09 +0200
+Subject: x86/stacktrace: Remove STACKTRACE_DUMP_ONCE
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm
+Git-commit: 17426923b03f098da83b8c1e044934a34959f69b
+Patch-mainline: Queued in subsystem maintainer repository
+References: bnc#1058115
+
+The stack unwinding can sometimes fail yet. Especially with the
+generated debug info. So do not yell at users -- live patching (the only
+user of this interface) will inform the user about the failure
+gracefully.
+
+And given this was the only user of the macro, remove the macro proper
+too.
+
+Signed-off-by: Jiri Slaby <[email protected]>
+Acked-by: Josh Poimboeuf <[email protected]>
+Cc: Andy Lutomirski <[email protected]>
+Cc: Borislav Petkov <[email protected]>
+Cc: Brian Gerst <[email protected]>
+Cc: Denys Vlasenko <[email protected]>
+Cc: H. Peter Anvin <[email protected]>
+Cc: Linus Torvalds <[email protected]>
+Cc: Peter Zijlstra <[email protected]>
+Cc: Thomas Gleixner <[email protected]>
+Link: https://lkml.kernel.org/lkml/[email protected]
+Signed-off-by: Ingo Molnar <[email protected]>
+---
+ arch/x86/kernel/stacktrace.c |   18 ++----------------
+ 1 file changed, 2 insertions(+), 16 deletions(-)
+
+--- a/arch/x86/kernel/stacktrace.c
++++ b/arch/x86/kernel/stacktrace.c
+@@ -81,16 +81,6 @@ EXPORT_SYMBOL_GPL(save_stack_trace_tsk);
+ 
+ #ifdef CONFIG_HAVE_RELIABLE_STACKTRACE
+ 
+-#define STACKTRACE_DUMP_ONCE(task) ({                         \
+-      static bool __section(.data.unlikely) __dumped;         \
+-                                                              \
+-      if (!__dumped) {                                        \
+-              __dumped = true;                                \
+-              WARN_ON(1);                                     \
+-              show_stack(task, NULL);                         \
+-      }                                                       \
+-})
+-
+ static int __always_inline
+ __save_stack_trace_reliable(struct stack_trace *trace,
+                           struct task_struct *task)
+@@ -123,20 +113,16 @@ __save_stack_trace_reliable(struct stack
+                * generated code which __kernel_text_address() doesn't know
+                * about.
+                */
+-              if (!addr) {
+-                      STACKTRACE_DUMP_ONCE(task);
++              if (!addr)
+                       return -EINVAL;
+-              }
+ 
+               if (save_stack_address(trace, addr, false))
+                       return -EINVAL;
+       }
+ 
+       /* Check for stack corruption */
+-      if (unwind_error(&state)) {
+-              STACKTRACE_DUMP_ONCE(task);
++      if (unwind_error(&state))
+               return -EINVAL;
+-      }
+ 
+       if (trace->nr_entries < trace->max_entries)
+               trace->entries[trace->nr_entries++] = ULONG_MAX;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch 
new/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch
--- old/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch     
2018-06-16 12:33:07.000000000 +0200
+++ new/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch     
1970-01-01 01:00:00.000000000 +0100
@@ -1,56 +0,0 @@
-From: Jiri Slaby <[email protected]>
-Date: Thu, 14 Dec 2017 22:54:20 +0100
-Subject: x86/stacktrace: make clear the success paths
-Patch-mainline: submitted on 2017/12/5
-References: bnc#1058115
-
-Make clear which path is for user tasks and for kthreads and idle
-tasks. This will allow easier plug-in of ORC unwinder in the next
-patches.
-
-Signed-off-by: Jiri Slaby <[email protected]>
-Cc: Thomas Gleixner <[email protected]>
-Cc: Ingo Molnar <[email protected]>
-Cc: "H. Peter Anvin" <[email protected]>
-Cc: [email protected]
-Cc: Josh Poimboeuf <[email protected]>
----
- arch/x86/kernel/stacktrace.c |   13 ++++++++++---
- 1 file changed, 10 insertions(+), 3 deletions(-)
-
---- a/arch/x86/kernel/stacktrace.c
-+++ b/arch/x86/kernel/stacktrace.c
-@@ -104,16 +104,18 @@ __save_stack_trace_reliable(struct stack
- 
-               regs = unwind_get_entry_regs(&state, NULL);
-               if (regs) {
-+                      /* Success path for user tasks */
-+                      if (user_mode(regs))
-+                              goto success;
-+
-                       /*
-                        * Kernel mode registers on the stack indicate an
-                        * in-kernel interrupt or exception (e.g., preemption
-                        * or a page fault), which can make frame pointers
-                        * unreliable.
-                        */
--                      if (!user_mode(regs))
--                              return -EINVAL;
- 
--                      break;
-+                      return -EINVAL;
-               }
- 
-               addr = unwind_get_return_address(&state);
-@@ -138,6 +140,11 @@ __save_stack_trace_reliable(struct stack
-               return -EINVAL;
-       }
- 
-+      /* Success path for non-user tasks, i.e. kthreads and idle tasks */
-+      if (!(task->flags & (PF_KTHREAD | PF_IDLE)))
-+              return -EINVAL;
-+
-+success:
-       if (trace->nr_entries < trace->max_entries)
-               trace->entries[trace->nr_entries++] = ULONG_MAX;
- 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch 
new/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch
--- 
old/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch   
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch   
    2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,75 @@
+From: Jiri Slaby <[email protected]>
+Date: Fri, 18 May 2018 08:47:10 +0200
+Subject: x86/stacktrace: Clarify the reliable success paths
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm
+Git-commit: 441ccc3580f45340715fd8f5c4db795b06326404
+Patch-mainline: Queued in subsystem maintainer repository
+References: bnc#1058115
+
+Make clear which path is for user tasks and for kthreads and idle
+tasks. This will allow easier plug-in of the ORC unwinder in the next
+patches.
+
+Note that we added a check for unwind error to the top of the loop, so
+that an error is returned also for user tasks (the 'goto success' would
+skip the check after the loop otherwise).
+
+Signed-off-by: Jiri Slaby <[email protected]>
+Acked-by: Josh Poimboeuf <[email protected]>
+Cc: Andy Lutomirski <[email protected]>
+Cc: Borislav Petkov <[email protected]>
+Cc: Brian Gerst <[email protected]>
+Cc: Denys Vlasenko <[email protected]>
+Cc: H. Peter Anvin <[email protected]>
+Cc: Linus Torvalds <[email protected]>
+Cc: Peter Zijlstra <[email protected]>
+Cc: Thomas Gleixner <[email protected]>
+Link: https://lkml.kernel.org/lkml/[email protected]
+Signed-off-by: Ingo Molnar <[email protected]>
+---
+ arch/x86/kernel/stacktrace.c |   16 ++++++++++++----
+ 1 file changed, 12 insertions(+), 4 deletions(-)
+
+--- a/arch/x86/kernel/stacktrace.c
++++ b/arch/x86/kernel/stacktrace.c
+@@ -89,21 +89,24 @@ __save_stack_trace_reliable(struct stack
+       struct pt_regs *regs;
+       unsigned long addr;
+ 
+-      for (unwind_start(&state, task, NULL, NULL); !unwind_done(&state);
++      for (unwind_start(&state, task, NULL, NULL);
++           !unwind_done(&state) && !unwind_error(&state);
+            unwind_next_frame(&state)) {
+ 
+               regs = unwind_get_entry_regs(&state, NULL);
+               if (regs) {
++                      /* Success path for user tasks */
++                      if (user_mode(regs))
++                              goto success;
++
+                       /*
+                        * Kernel mode registers on the stack indicate an
+                        * in-kernel interrupt or exception (e.g., preemption
+                        * or a page fault), which can make frame pointers
+                        * unreliable.
+                        */
+-                      if (!user_mode(regs))
+-                              return -EINVAL;
+ 
+-                      break;
++                      return -EINVAL;
+               }
+ 
+               addr = unwind_get_return_address(&state);
+@@ -124,6 +127,11 @@ __save_stack_trace_reliable(struct stack
+       if (unwind_error(&state))
+               return -EINVAL;
+ 
++      /* Success path for non-user tasks, i.e. kthreads and idle tasks */
++      if (!(task->flags & (PF_KTHREAD | PF_IDLE)))
++              return -EINVAL;
++
++success:
+       if (trace->nr_entries < trace->max_entries)
+               trace->entries[trace->nr_entries++] = ULONG_MAX;
+ 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch
 
new/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch
--- 
old/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch
    2018-06-16 12:33:07.000000000 +0200
+++ 
new/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch
    1970-01-01 01:00:00.000000000 +0100
@@ -1,47 +0,0 @@
-From: Jiri Slaby <[email protected]>
-Date: Fri, 1 Dec 2017 08:28:36 +0100
-Subject: x86/stacktrace: remove STACKTRACE_DUMP_ONCE from
- __save_stack_trace_reliable
-Patch-mainline: submitted on 2017/12/5
-References: bnc#1058115
-
-The stack unwinding can sometimes fail yet. Especially with the
-generated debug info. So do not yell at users -- live patching (the only
-user of this interface) will inform the user about the failure
-gracefully.
-
-Signed-off-by: Jiri Slaby <[email protected]>
-Cc: Thomas Gleixner <[email protected]>
-Cc: Ingo Molnar <[email protected]>
-Cc: "H. Peter Anvin" <[email protected]>
-Cc: [email protected]
-Cc: Josh Poimboeuf <[email protected]>
----
- arch/x86/kernel/stacktrace.c |    8 ++------
- 1 file changed, 2 insertions(+), 6 deletions(-)
-
---- a/arch/x86/kernel/stacktrace.c
-+++ b/arch/x86/kernel/stacktrace.c
-@@ -125,20 +125,16 @@ __save_stack_trace_reliable(struct stack
-                * generated code which __kernel_text_address() doesn't know
-                * about.
-                */
--              if (!addr) {
--                      STACKTRACE_DUMP_ONCE(task);
-+              if (!addr)
-                       return -EINVAL;
--              }
- 
-               if (save_stack_address(trace, addr, false))
-                       return -EINVAL;
-       }
- 
-       /* Check for stack corruption */
--      if (unwind_error(&state)) {
--              STACKTRACE_DUMP_ONCE(task);
-+      if (unwind_error(&state))
-               return -EINVAL;
--      }
- 
-       /* Success path for non-user tasks, i.e. kthreads and idle tasks */
-       if (!(task->flags & (PF_KTHREAD | PF_IDLE)))
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch
 
new/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch
--- 
old/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch
    2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,49 @@
+From: Jiri Slaby <[email protected]>
+Date: Fri, 18 May 2018 08:47:11 +0200
+Subject: x86/stacktrace: Do not fail for ORC with regs on stack
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm
+Git-commit: 0c414367c04eeb00c3ebfee0b74c9e7f3b95fd62
+Patch-mainline: Queued in subsystem maintainer repository
+References: bnc#1058115
+
+save_stack_trace_reliable now returns "non reliable" when there are
+kernel pt_regs on stack. This means an interrupt or exception happened
+somewhere down the route. It is a problem for the frame pointer
+unwinder, because the frame might not have been set up yet when the irq
+happened, so the unwinder might fail to unwind from the interrupted
+function.
+
+With ORC, this is not a problem, as ORC has out-of-band data. We can
+find ORC data even for the IP in the interrupted function and always
+unwind one level up reliably.
+
+So lift the check to apply only when CONFIG_FRAME_POINTER=y is enabled.
+
+Signed-off-by: Jiri Slaby <[email protected]>
+Acked-by: Josh Poimboeuf <[email protected]>
+Cc: Andy Lutomirski <[email protected]>
+Cc: Borislav Petkov <[email protected]>
+Cc: Brian Gerst <[email protected]>
+Cc: Denys Vlasenko <[email protected]>
+Cc: H. Peter Anvin <[email protected]>
+Cc: Linus Torvalds <[email protected]>
+Cc: Peter Zijlstra <[email protected]>
+Cc: Thomas Gleixner <[email protected]>
+Link: https://lkml.kernel.org/lkml/[email protected]
+Signed-off-by: Ingo Molnar <[email protected]>
+---
+ arch/x86/kernel/stacktrace.c |    3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+--- a/arch/x86/kernel/stacktrace.c
++++ b/arch/x86/kernel/stacktrace.c
+@@ -106,7 +106,8 @@ __save_stack_trace_reliable(struct stack
+                        * unreliable.
+                        */
+ 
+-                      return -EINVAL;
++                      if (IS_ENABLED(CONFIG_FRAME_POINTER))
++                              return -EINVAL;
+               }
+ 
+               addr = unwind_get_return_address(&state);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch
 
new/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch
--- 
old/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch
    2018-06-16 12:33:07.000000000 +0200
+++ 
new/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch
    1970-01-01 01:00:00.000000000 +0100
@@ -1,43 +0,0 @@
-From: Jiri Slaby <[email protected]>
-Date: Wed, 29 Nov 2017 15:43:35 +0100
-Subject: x86/stacktrace: do not fail for ORC with regs on stack
-Patch-mainline: submitted on 2017/12/5
-References: bnc#1058115
-
-save_stack_trace_reliable now returns "non reliable" when there are
-kernel pt_regs on stack. This means an interrupt or exception happened
-somewhere down the route. It is a problem for frame pointer unwinder,
-because the frame might not have been set up yet when the irq happened,
-so the unwinder might fail to unwind from the interrupted function.
-
-With ORC, this is not a problem, as ORC has out-of-band data. We can
-find ORC data even for the IP in the interrupted function and always
-unwind one level up reliably.
-
-So lift the check to apply only when CONFIG_FRAME_POINTER is enabled.
-
-[v2]
-- rewrite the code in favor of Josh's suggestions
-
-Signed-off-by: Jiri Slaby <[email protected]>
-Cc: Thomas Gleixner <[email protected]>
-Cc: Ingo Molnar <[email protected]>
-Cc: "H. Peter Anvin" <[email protected]>
-Cc: [email protected]
-Cc: Josh Poimboeuf <[email protected]>
----
- arch/x86/kernel/stacktrace.c |    3 ++-
- 1 file changed, 2 insertions(+), 1 deletion(-)
-
---- a/arch/x86/kernel/stacktrace.c
-+++ b/arch/x86/kernel/stacktrace.c
-@@ -115,7 +115,8 @@ __save_stack_trace_reliable(struct stack
-                        * unreliable.
-                        */
- 
--                      return -EINVAL;
-+                      if (IS_ENABLED(CONFIG_FRAME_POINTER))
-+                              return -EINVAL;
-               }
- 
-               addr = unwind_get_return_address(&state);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch 
new/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch
--- old/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch  
2018-06-16 12:33:07.000000000 +0200
+++ new/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch  
1970-01-01 01:00:00.000000000 +0100
@@ -1,32 +0,0 @@
-From: Jiri Slaby <[email protected]>
-Date: Wed, 4 Oct 2017 11:14:26 +0200
-Subject: x86/stacktrace: orc, mark it as reliable
-Patch-mainline: submitted on 2017/12/5
-References: bnc#1058115
-
-In SUSE, we need a reliable stack unwinder for kernel live patching, but
-we do not want to enable frame pointers for performance reasons. So
-after the previous patches to make the ORC reliable, mark ORC as a
-reliable stack unwinder on x86.
-
-Signed-off-by: Jiri Slaby <[email protected]>
-Cc: Josh Poimboeuf <[email protected]>
-Cc: Thomas Gleixner <[email protected]>
-Cc: Ingo Molnar <[email protected]>
-Cc: "H. Peter Anvin" <[email protected]>
-Cc: [email protected]
----
- arch/x86/Kconfig |    2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/arch/x86/Kconfig
-+++ b/arch/x86/Kconfig
-@@ -172,7 +172,7 @@ config X86
-       select HAVE_PERF_USER_STACK_DUMP
-       select HAVE_RCU_TABLE_FREE
-       select HAVE_REGS_AND_STACK_ACCESS_API
--      select HAVE_RELIABLE_STACKTRACE         if X86_64 && 
UNWINDER_FRAME_POINTER && STACK_VALIDATION
-+      select HAVE_RELIABLE_STACKTRACE         if X86_64 && 
(UNWINDER_FRAME_POINTER || UNWINDER_ORC) && STACK_VALIDATION
-       select HAVE_STACK_VALIDATION            if X86_64
-       select HAVE_SYSCALL_TRACEPOINTS
-       select HAVE_UNSTABLE_SCHED_CLOCK
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch 
new/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch
--- old/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch      
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch      
2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,358 @@
+From: Josh Poimboeuf <[email protected]>
+Date: Fri, 18 May 2018 08:47:12 +0200
+Subject: x86/unwind/orc: Detect the end of the stack
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm
+Git-commit: d31a580266eeb1f355df90fde8a71f480e30ad70
+Patch-mainline: Queued in subsystem maintainer repository
+References: bnc#1058115
+
+The existing UNWIND_HINT_EMPTY annotations happen to be good indicators
+of where entry code calls into C code for the first time.  So also use
+them to mark the end of the stack for the ORC unwinder.
+
+Use that information to set unwind->error if the ORC unwinder doesn't
+unwind all the way to the end.  This will be needed for enabling
+HAVE_RELIABLE_STACKTRACE for the ORC unwinder so we can use it with the
+livepatch consistency model.
+
+Thanks to Jiri Slaby for teaching the ORCs about the unwind hints.
+
+Signed-off-by: Josh Poimboeuf <[email protected]>
+Signed-off-by: Jiri Slaby <[email protected]>
+Acked-by: Josh Poimboeuf <[email protected]>
+Cc: Andy Lutomirski <[email protected]>
+Cc: Borislav Petkov <[email protected]>
+Cc: Brian Gerst <[email protected]>
+Cc: Denys Vlasenko <[email protected]>
+Cc: H. Peter Anvin <[email protected]>
+Cc: Linus Torvalds <[email protected]>
+Cc: Peter Zijlstra <[email protected]>
+Cc: Thomas Gleixner <[email protected]>
+Link: https://lkml.kernel.org/lkml/[email protected]
+Signed-off-by: Ingo Molnar <[email protected]>
+---
+ arch/x86/entry/entry_64.S                      |    1 
+ arch/x86/include/asm/orc_types.h               |    2 
+ arch/x86/include/asm/unwind_hints.h            |   16 ++++---
+ arch/x86/kernel/unwind_orc.c                   |   52 
++++++++++++++-----------
+ tools/objtool/arch/x86/include/asm/orc_types.h |    2 
+ tools/objtool/check.c                          |    1 
+ tools/objtool/check.h                          |    2 
+ tools/objtool/orc_dump.c                       |    3 -
+ tools/objtool/orc_gen.c                        |    2 
+ 9 files changed, 52 insertions(+), 29 deletions(-)
+
+--- a/arch/x86/entry/entry_64.S
++++ b/arch/x86/entry/entry_64.S
+@@ -414,6 +414,7 @@ ENTRY(ret_from_fork)
+ 
+ 1:
+       /* kernel thread */
++      UNWIND_HINT_EMPTY
+       movq    %r12, %rdi
+       CALL_NOSPEC %rbx
+       /*
+--- a/arch/x86/include/asm/orc_types.h
++++ b/arch/x86/include/asm/orc_types.h
+@@ -88,6 +88,7 @@ struct orc_entry {
+       unsigned        sp_reg:4;
+       unsigned        bp_reg:4;
+       unsigned        type:2;
++      unsigned        end:1;
+ } __packed;
+ 
+ /*
+@@ -101,6 +102,7 @@ struct unwind_hint {
+       s16             sp_offset;
+       u8              sp_reg;
+       u8              type;
++      u8              end;
+ };
+ #endif /* __ASSEMBLY__ */
+ 
+--- a/arch/x86/include/asm/unwind_hints.h
++++ b/arch/x86/include/asm/unwind_hints.h
+@@ -26,7 +26,7 @@
+  * the debuginfo as necessary.  It will also warn if it sees any
+  * inconsistencies.
+  */
+-.macro UNWIND_HINT sp_reg=ORC_REG_SP sp_offset=0 type=ORC_TYPE_CALL
++.macro UNWIND_HINT sp_reg=ORC_REG_SP sp_offset=0 type=ORC_TYPE_CALL end=0
+ #ifdef CONFIG_STACK_VALIDATION
+ .Lunwind_hint_ip_\@:
+       .pushsection .discard.unwind_hints
+@@ -35,12 +35,14 @@
+               .short \sp_offset
+               .byte \sp_reg
+               .byte \type
++              .byte \end
++              .balign 4
+       .popsection
+ #endif
+ .endm
+ 
+ .macro UNWIND_HINT_EMPTY
+-      UNWIND_HINT sp_reg=ORC_REG_UNDEFINED
++      UNWIND_HINT sp_reg=ORC_REG_UNDEFINED end=1
+ .endm
+ 
+ .macro UNWIND_HINT_REGS base=%rsp offset=0 indirect=0 extra=1 iret=0
+@@ -86,19 +88,21 @@
+ 
+ #else /* !__ASSEMBLY__ */
+ 
+-#define UNWIND_HINT(sp_reg, sp_offset, type)                  \
++#define UNWIND_HINT(sp_reg, sp_offset, type, end)             \
+       "987: \n\t"                                             \
+       ".pushsection .discard.unwind_hints\n\t"                \
+       /* struct unwind_hint */                                \
+       ".long 987b - .\n\t"                                    \
+-      ".short " __stringify(sp_offset) "\n\t"         \
++      ".short " __stringify(sp_offset) "\n\t"                 \
+       ".byte " __stringify(sp_reg) "\n\t"                     \
+       ".byte " __stringify(type) "\n\t"                       \
++      ".byte " __stringify(end) "\n\t"                        \
++      ".balign 4 \n\t"                                        \
+       ".popsection\n\t"
+ 
+-#define UNWIND_HINT_SAVE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_SAVE)
++#define UNWIND_HINT_SAVE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_SAVE, 0)
+ 
+-#define UNWIND_HINT_RESTORE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_RESTORE)
++#define UNWIND_HINT_RESTORE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_RESTORE, 0)
+ 
+ #endif /* __ASSEMBLY__ */
+ 
+--- a/arch/x86/kernel/unwind_orc.c
++++ b/arch/x86/kernel/unwind_orc.c
+@@ -198,7 +198,7 @@ static int orc_sort_cmp(const void *_a,
+        * whitelisted .o files which didn't get objtool generation.
+        */
+       orc_a = cur_orc_table + (a - cur_orc_ip_table);
+-      return orc_a->sp_reg == ORC_REG_UNDEFINED ? -1 : 1;
++      return orc_a->sp_reg == ORC_REG_UNDEFINED && !orc_a->end ? -1 : 1;
+ }
+ 
+ #ifdef CONFIG_MODULES
+@@ -352,7 +352,7 @@ static bool deref_stack_iret_regs(struct
+ 
+ bool unwind_next_frame(struct unwind_state *state)
+ {
+-      unsigned long ip_p, sp, orig_ip, prev_sp = state->sp;
++      unsigned long ip_p, sp, orig_ip = state->ip, prev_sp = state->sp;
+       enum stack_type prev_type = state->stack_info.type;
+       struct orc_entry *orc;
+       bool indirect = false;
+@@ -363,9 +363,9 @@ bool unwind_next_frame(struct unwind_sta
+       /* Don't let modules unload while we're reading their ORC data. */
+       preempt_disable();
+ 
+-      /* Have we reached the end? */
++      /* End-of-stack check for user tasks: */
+       if (state->regs && user_mode(state->regs))
+-              goto done;
++              goto the_end;
+ 
+       /*
+        * Find the orc_entry associated with the text address.
+@@ -374,9 +374,16 @@ bool unwind_next_frame(struct unwind_sta
+        * calls and calls to noreturn functions.
+        */
+       orc = orc_find(state->signal ? state->ip : state->ip - 1);
+-      if (!orc || orc->sp_reg == ORC_REG_UNDEFINED)
+-              goto done;
+-      orig_ip = state->ip;
++      if (!orc)
++              goto err;
++
++      /* End-of-stack check for kernel threads: */
++      if (orc->sp_reg == ORC_REG_UNDEFINED) {
++              if (!orc->end)
++                      goto err;
++
++              goto the_end;
++      }
+ 
+       /* Find the previous frame's stack: */
+       switch (orc->sp_reg) {
+@@ -402,7 +409,7 @@ bool unwind_next_frame(struct unwind_sta
+               if (!state->regs || !state->full_regs) {
+                       orc_warn("missing regs for base reg R10 at ip %pB\n",
+                                (void *)state->ip);
+-                      goto done;
++                      goto err;
+               }
+               sp = state->regs->r10;
+               break;
+@@ -411,7 +418,7 @@ bool unwind_next_frame(struct unwind_sta
+               if (!state->regs || !state->full_regs) {
+                       orc_warn("missing regs for base reg R13 at ip %pB\n",
+                                (void *)state->ip);
+-                      goto done;
++                      goto err;
+               }
+               sp = state->regs->r13;
+               break;
+@@ -420,7 +427,7 @@ bool unwind_next_frame(struct unwind_sta
+               if (!state->regs || !state->full_regs) {
+                       orc_warn("missing regs for base reg DI at ip %pB\n",
+                                (void *)state->ip);
+-                      goto done;
++                      goto err;
+               }
+               sp = state->regs->di;
+               break;
+@@ -429,7 +436,7 @@ bool unwind_next_frame(struct unwind_sta
+               if (!state->regs || !state->full_regs) {
+                       orc_warn("missing regs for base reg DX at ip %pB\n",
+                                (void *)state->ip);
+-                      goto done;
++                      goto err;
+               }
+               sp = state->regs->dx;
+               break;
+@@ -437,12 +444,12 @@ bool unwind_next_frame(struct unwind_sta
+       default:
+               orc_warn("unknown SP base reg %d for ip %pB\n",
+                        orc->sp_reg, (void *)state->ip);
+-              goto done;
++              goto err;
+       }
+ 
+       if (indirect) {
+               if (!deref_stack_reg(state, sp, &sp))
+-                      goto done;
++                      goto err;
+       }
+ 
+       /* Find IP, SP and possibly regs: */
+@@ -451,7 +458,7 @@ bool unwind_next_frame(struct unwind_sta
+               ip_p = sp - sizeof(long);
+ 
+               if (!deref_stack_reg(state, ip_p, &state->ip))
+-                      goto done;
++                      goto err;
+ 
+               state->ip = ftrace_graph_ret_addr(state->task, 
&state->graph_idx,
+                                                 state->ip, (void *)ip_p);
+@@ -465,7 +472,7 @@ bool unwind_next_frame(struct unwind_sta
+               if (!deref_stack_regs(state, sp, &state->ip, &state->sp)) {
+                       orc_warn("can't dereference registers at %p for ip 
%pB\n",
+                                (void *)sp, (void *)orig_ip);
+-                      goto done;
++                      goto err;
+               }
+ 
+               state->regs = (struct pt_regs *)sp;
+@@ -477,7 +484,7 @@ bool unwind_next_frame(struct unwind_sta
+               if (!deref_stack_iret_regs(state, sp, &state->ip, &state->sp)) {
+                       orc_warn("can't dereference iret registers at %p for ip 
%pB\n",
+                                (void *)sp, (void *)orig_ip);
+-                      goto done;
++                      goto err;
+               }
+ 
+               state->regs = (void *)sp - IRET_FRAME_OFFSET;
+@@ -500,18 +507,18 @@ bool unwind_next_frame(struct unwind_sta
+ 
+       case ORC_REG_PREV_SP:
+               if (!deref_stack_reg(state, sp + orc->bp_offset, &state->bp))
+-                      goto done;
++                      goto err;
+               break;
+ 
+       case ORC_REG_BP:
+               if (!deref_stack_reg(state, state->bp + orc->bp_offset, 
&state->bp))
+-                      goto done;
++                      goto err;
+               break;
+ 
+       default:
+               orc_warn("unknown BP base reg %d for ip %pB\n",
+                        orc->bp_reg, (void *)orig_ip);
+-              goto done;
++              goto err;
+       }
+ 
+       /* Prevent a recursive loop due to bad ORC data: */
+@@ -520,13 +527,16 @@ bool unwind_next_frame(struct unwind_sta
+           state->sp <= prev_sp) {
+               orc_warn("stack going in the wrong direction? ip=%pB\n",
+                        (void *)orig_ip);
+-              goto done;
++              goto err;
+       }
+ 
+       preempt_enable();
+       return true;
+ 
+-done:
++err:
++      state->error = true;
++
++the_end:
+       preempt_enable();
+       state->stack_info.type = STACK_TYPE_UNKNOWN;
+       return false;
+--- a/tools/objtool/arch/x86/include/asm/orc_types.h
++++ b/tools/objtool/arch/x86/include/asm/orc_types.h
+@@ -88,6 +88,7 @@ struct orc_entry {
+       unsigned        sp_reg:4;
+       unsigned        bp_reg:4;
+       unsigned        type:2;
++      unsigned        end:1;
+ } __packed;
+ 
+ /*
+@@ -101,6 +102,7 @@ struct unwind_hint {
+       s16             sp_offset;
+       u8              sp_reg;
+       u8              type;
++      u8              end;
+ };
+ #endif /* __ASSEMBLY__ */
+ 
+--- a/tools/objtool/check.c
++++ b/tools/objtool/check.c
+@@ -1134,6 +1134,7 @@ static int read_unwind_hints(struct objt
+ 
+               cfa->offset = hint->sp_offset;
+               insn->state.type = hint->type;
++              insn->state.end = hint->end;
+       }
+ 
+       return 0;
+--- a/tools/objtool/check.h
++++ b/tools/objtool/check.h
+@@ -31,7 +31,7 @@ struct insn_state {
+       int stack_size;
+       unsigned char type;
+       bool bp_scratch;
+-      bool drap;
++      bool drap, end;
+       int drap_reg, drap_offset;
+       struct cfi_reg vals[CFI_NUM_REGS];
+ };
+--- a/tools/objtool/orc_dump.c
++++ b/tools/objtool/orc_dump.c
+@@ -203,7 +203,8 @@ int orc_dump(const char *_objname)
+ 
+               print_reg(orc[i].bp_reg, orc[i].bp_offset);
+ 
+-              printf(" type:%s\n", orc_type_name(orc[i].type));
++              printf(" type:%s end:%d\n",
++                     orc_type_name(orc[i].type), orc[i].end);
+       }
+ 
+       elf_end(elf);
+--- a/tools/objtool/orc_gen.c
++++ b/tools/objtool/orc_gen.c
+@@ -31,6 +31,8 @@ int create_orc(struct objtool_file *file
+               struct cfi_reg *cfa = &insn->state.cfa;
+               struct cfi_reg *bp = &insn->state.regs[CFI_BP];
+ 
++              orc->end = insn->state.end;
++
+               if (cfa->base == CFI_UNDEFINED) {
+                       orc->sp_reg = ORC_REG_UNDEFINED;
+                       continue;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch
 
new/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch
--- 
old/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch
    2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,40 @@
+From: Jiri Slaby <[email protected]>
+Date: Fri, 18 May 2018 08:47:13 +0200
+Subject: x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm
+Git-commit: 6415b38bae2641ab6e173ffa4ff6a453b60ba99b
+Patch-mainline: Queued in subsystem maintainer repository
+References: bnc#1058115
+
+In SUSE, we need a reliable stack unwinder for kernel live patching, but
+we do not want to enable frame pointers for performance reasons. So
+after the previous patches to make the ORC reliable, mark ORC as a
+reliable stack unwinder on x86.
+
+Signed-off-by: Jiri Slaby <[email protected]>
+Acked-by: Josh Poimboeuf <[email protected]>
+Cc: Andy Lutomirski <[email protected]>
+Cc: Borislav Petkov <[email protected]>
+Cc: Brian Gerst <[email protected]>
+Cc: Denys Vlasenko <[email protected]>
+Cc: H. Peter Anvin <[email protected]>
+Cc: Linus Torvalds <[email protected]>
+Cc: Peter Zijlstra <[email protected]>
+Cc: Thomas Gleixner <[email protected]>
+Link: https://lkml.kernel.org/lkml/[email protected]
+Signed-off-by: Ingo Molnar <[email protected]>
+---
+ arch/x86/Kconfig |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/arch/x86/Kconfig
++++ b/arch/x86/Kconfig
+@@ -179,7 +179,7 @@ config X86
+       select HAVE_PERF_USER_STACK_DUMP
+       select HAVE_RCU_TABLE_FREE
+       select HAVE_REGS_AND_STACK_ACCESS_API
+-      select HAVE_RELIABLE_STACKTRACE         if X86_64 && 
UNWINDER_FRAME_POINTER && STACK_VALIDATION
++      select HAVE_RELIABLE_STACKTRACE         if X86_64 && 
(UNWINDER_FRAME_POINTER || UNWINDER_ORC) && STACK_VALIDATION
+       select HAVE_STACK_VALIDATION            if X86_64
+       select HAVE_SYSCALL_TRACEPOINTS
+       select HAVE_UNSTABLE_SCHED_CLOCK
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch 
new/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch
--- old/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch 
2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,59 @@
+From: Dmitry Torokhov <[email protected]>
+Date: Mon, 25 Jun 2018 12:09:57 -0700
+Subject: Input: psmouse - fix button reporting for basic protocols
+Patch-mainline: submitted on 2018/06/25
+References: bnc#1098392
+
+The commit ba667650c568 ("Input: psmouse - clean up code") was pretty
+brain-dead and broke extra buttons reporting for variety of PS/2 mice:
+Genius, Thinkmouse and Intellimouse Explorer. We need to actually inspect
+the data coming from the device when reporting events.
+
+Fixes: ba667650c568 ("Input: psmouse - clean up code")
+Reported-by: Jiri Slaby <[email protected]>
+Cc: [email protected]
+Signed-off-by: Dmitry Torokhov <[email protected]>
+Signed-off-by: Jiri Slaby <[email protected]>
+---
+ drivers/input/mouse/psmouse-base.c |   12 ++++++------
+ 1 file changed, 6 insertions(+), 6 deletions(-)
+
+--- a/drivers/input/mouse/psmouse-base.c
++++ b/drivers/input/mouse/psmouse-base.c
+@@ -192,8 +192,8 @@ psmouse_ret_t psmouse_process_byte(struc
+                       else
+                               input_report_rel(dev, REL_WHEEL, -wheel);
+ 
+-                      input_report_key(dev, BTN_SIDE,  BIT(4));
+-                      input_report_key(dev, BTN_EXTRA, BIT(5));
++                      input_report_key(dev, BTN_SIDE,  packet[3] & BIT(4));
++                      input_report_key(dev, BTN_EXTRA, packet[3] & BIT(5));
+                       break;
+               }
+               break;
+@@ -203,13 +203,13 @@ psmouse_ret_t psmouse_process_byte(struc
+               input_report_rel(dev, REL_WHEEL, -(s8) packet[3]);
+ 
+               /* Extra buttons on Genius NewNet 3D */
+-              input_report_key(dev, BTN_SIDE,  BIT(6));
+-              input_report_key(dev, BTN_EXTRA, BIT(7));
++              input_report_key(dev, BTN_SIDE,  packet[0] & BIT(6));
++              input_report_key(dev, BTN_EXTRA, packet[0] & BIT(7));
+               break;
+ 
+       case PSMOUSE_THINKPS:
+               /* Extra button on ThinkingMouse */
+-              input_report_key(dev, BTN_EXTRA, BIT(3));
++              input_report_key(dev, BTN_EXTRA, packet[0] & BIT(3));
+ 
+               /*
+                * Without this bit of weirdness moving up gives wildly
+@@ -223,7 +223,7 @@ psmouse_ret_t psmouse_process_byte(struc
+                * Cortron PS2 Trackball reports SIDE button in the
+                * 4th bit of the first byte.
+                */
+-              input_report_key(dev, BTN_SIDE, BIT(3));
++              input_report_key(dev, BTN_SIDE, packet[0] & BIT(3));
+               packet[0] |= BIT(3);
+               break;
+ 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2 
new/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2
--- old/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2       
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2       
2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,38 @@
+From: Takashi Iwai <[email protected]>
+Date: Fri, 22 Jun 2018 10:59:17 +0200
+Subject: [PATCH] platform/x86: ideapad-laptop: Apply no_hw_rfkill to 
Y20-15IKBM, too
+Message-Id: <[email protected]>
+Patch-mainline: Submitted, platform-driver-x86 ML
+References: bsc#1098626
+
+The commit 5d9f40b56630 ("platform/x86: ideapad-laptop: Add
+Y520-15IKBN to no_hw_rfkill") added the entry for Y20-15IKBN, and it
+turned out that another variant, Y20-15IKBM, also requires the
+no_hw_rfkill.
+
+Trim the last letter from the string so that it matches to both
+Y20-15IKBN and Y20-15IKBM models.
+
+Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=1098626
+Cc: <[email protected]>
+Signed-off-by: Takashi Iwai <[email protected]>
+
+---
+ drivers/platform/x86/ideapad-laptop.c |    4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+--- a/drivers/platform/x86/ideapad-laptop.c
++++ b/drivers/platform/x86/ideapad-laptop.c
+@@ -1080,10 +1080,10 @@ static const struct dmi_system_id no_hw_
+               },
+       },
+       {
+-              .ident = "Lenovo Legion Y520-15IKBN",
++              .ident = "Lenovo Legion Y520-15IKB",
+               .matches = {
+                       DMI_MATCH(DMI_SYS_VENDOR, "LENOVO"),
+-                      DMI_MATCH(DMI_PRODUCT_VERSION, "Lenovo Y520-15IKBN"),
++                      DMI_MATCH(DMI_PRODUCT_VERSION, "Lenovo Y520-15IKB"),
+               },
+       },
+       {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch 
new/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch
--- old/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch 
2018-06-26 08:45:20.000000000 +0200
@@ -0,0 +1,53 @@
+From 891f6a726cacbb87e5b06076693ffab53bd378d7 Mon Sep 17 00:00:00 2001
+From: Christian Borntraeger <[email protected]>
+Date: Thu, 21 Jun 2018 14:49:38 +0200
+Subject: [PATCH] s390: Correct register corruption in critical section cleanup
+
+References: boo#1095717
+Patch-mainline: queued
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux.git
+Git-commit: 891f6a726cacbb87e5b06076693ffab53bd378d7
+
+In the critical section cleanup we must not mess with r1.  For march=z9
+or older, larl + ex (instead of exrl) are used with r1 as a temporary
+register. This can clobber r1 in several interrupt handlers. Fix this by
+using r11 as a temp register.  r11 is being saved by all callers of
+cleanup_critical.
+
+Fixes: 6dd85fbb87 ("s390: move expoline assembler macros to a header")
+Cc: [email protected] #v4.16
+Reported-by: Oliver Kurz <[email protected]>
+Reported-by: Petr Tesařík <[email protected]>
+Signed-off-by: Christian Borntraeger <[email protected]>
+Reviewed-by: Hendrik Brueckner <[email protected]>
+Signed-off-by: Martin Schwidefsky <[email protected]>
+Acked-by: Michal Suchanek <[email protected]>
+---
+ arch/s390/kernel/entry.S | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/arch/s390/kernel/entry.S b/arch/s390/kernel/entry.S
+index f03402efab4b..3891805bfcdd 100644
+--- a/arch/s390/kernel/entry.S
++++ b/arch/s390/kernel/entry.S
+@@ -1265,7 +1265,7 @@ cleanup_critical:
+       jl      0f
+       clg     %r9,BASED(.Lcleanup_table+104)  # .Lload_fpu_regs_end
+       jl      .Lcleanup_load_fpu_regs
+-0:    BR_EX   %r14
++0:    BR_EX   %r14,%r11
+ 
+       .align  8
+ .Lcleanup_table:
+@@ -1301,7 +1301,7 @@ cleanup_critical:
+       ni      __SIE_PROG0C+3(%r9),0xfe        # no longer in SIE
+       lctlg   %c1,%c1,__LC_USER_ASCE          # load primary asce
+       larl    %r9,sie_exit                    # skip forward to sie_exit
+-      BR_EX   %r14
++      BR_EX   %r14,%r11
+ #endif
+ 
+ .Lcleanup_system_call:
+-- 
+2.13.6
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch 
new/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch
--- old/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch 
2018-06-16 12:33:07.000000000 +0200
+++ new/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch 
1970-01-01 01:00:00.000000000 +0100
@@ -1,89 +0,0 @@
-From: Cong Wang <[email protected]>
-Date: Thu, 7 Jun 2018 13:39:49 -0700
-Subject: socket: close race condition between sock_close() and sockfs_setattr()
-Patch-mainline: v4.18-rc1
-Git-commit: 6d8c50dcb029872b298eea68cc6209c866fd3e14
-References: CVE-2018-12232 bsc#1097593
-
-fchownat() doesn't even hold refcnt of fd until it figures out
-fd is really needed (otherwise is ignored) and releases it after
-it resolves the path. This means sock_close() could race with
-sockfs_setattr(), which leads to a NULL pointer dereference
-since typically we set sock->sk to NULL in ->release().
-
-As pointed out by Al, this is unique to sockfs. So we can fix this
-in socket layer by acquiring inode_lock in sock_close() and
-checking against NULL in sockfs_setattr().
-
-sock_release() is called in many places, only the sock_close()
-path matters here. And fortunately, this should not affect normal
-sock_close() as it is only called when the last fd refcnt is gone.
-It only affects sock_close() with a parallel sockfs_setattr() in
-progress, which is not common.
-
-Fixes: 86741ec25462 ("net: core: Add a UID field to struct sock.")
-Reported-by: shankarapailoor <[email protected]>
-Cc: Tetsuo Handa <[email protected]>
-Cc: Lorenzo Colitti <[email protected]>
-Cc: Al Viro <[email protected]>
-Signed-off-by: Cong Wang <[email protected]>
-Signed-off-by: David S. Miller <[email protected]>
-Acked-by: Michal Kubecek <[email protected]>
-
----
- net/socket.c | 18 +++++++++++++++---
- 1 file changed, 15 insertions(+), 3 deletions(-)
-
---- a/net/socket.c
-+++ b/net/socket.c
-@@ -537,7 +537,10 @@ static int sockfs_setattr(struct dentry *dentry, struct 
iattr *iattr)
-       if (!err && (iattr->ia_valid & ATTR_UID)) {
-               struct socket *sock = SOCKET_I(d_inode(dentry));
- 
--              sock->sk->sk_uid = iattr->ia_uid;
-+              if (sock->sk)
-+                      sock->sk->sk_uid = iattr->ia_uid;
-+              else
-+                      err = -ENOENT;
-       }
- 
-       return err;
-@@ -586,12 +589,16 @@ EXPORT_SYMBOL(sock_alloc);
-  *    an inode not a file.
-  */
- 
--void sock_release(struct socket *sock)
-+static void __sock_release(struct socket *sock, struct inode *inode)
- {
-       if (sock->ops) {
-               struct module *owner = sock->ops->owner;
- 
-+              if (inode)
-+                      inode_lock(inode);
-               sock->ops->release(sock);
-+              if (inode)
-+                      inode_unlock(inode);
-               sock->ops = NULL;
-               module_put(owner);
-       }
-@@ -605,6 +612,11 @@ void sock_release(struct socket *sock)
-       }
-       sock->file = NULL;
- }
-+
-+void sock_release(struct socket *sock)
-+{
-+      __sock_release(sock, NULL);
-+}
- EXPORT_SYMBOL(sock_release);
- 
- void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
-@@ -1146,7 +1158,7 @@ static int sock_mmap(struct file *file, struct 
vm_area_struct *vma)
- 
- static int sock_close(struct inode *inode, struct file *filp)
- {
--      sock_release(SOCKET_I(inode));
-+      __sock_release(SOCKET_I(inode), inode);
-       return 0;
- }
- 

++++++ series.conf ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:33.567797510 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:33.567797510 +0200
@@ -89,6 +89,77 @@
        
patches.kernel.org/4.17.2-044-crypto-vmx-Remove-overly-verbose-printk-from-A.patch
        patches.kernel.org/4.17.2-045-crypto-omap-sham-fix-memleak.patch
        patches.kernel.org/4.17.2-046-Linux-4.17.2.patch
+       
patches.kernel.org/4.17.3-001-net-aquantia-fix-unsigned-numvecs-comparison-w.patch
+       
patches.kernel.org/4.17.3-002-bonding-re-evaluate-force_primary-when-the-pri.patch
+       
patches.kernel.org/4.17.3-003-cdc_ncm-avoid-padding-beyond-end-of-skb.patch
+       
patches.kernel.org/4.17.3-004-ipv6-allow-PMTU-exceptions-to-local-routes.patch
+       
patches.kernel.org/4.17.3-005-net-dsa-add-error-handling-for-pskb_trim_rcsum.patch
+       
patches.kernel.org/4.17.3-006-net-phy-dp83822-use-BMCR_ANENABLE-instead-of-B.patch
+       
patches.kernel.org/4.17.3-007-net-sched-act_simple-fix-parsing-of-TCA_DEF_DA.patch
+       
patches.kernel.org/4.17.3-008-tcp-verify-the-checksum-of-the-first-data-segm.patch
+       
patches.kernel.org/4.17.3-009-tls-fix-use-after-free-in-tls_push_record.patch
+       
patches.kernel.org/4.17.3-010-tls-fix-waitall-behavior-in-tls_sw_recvmsg.patch
+       
patches.kernel.org/4.17.3-011-socket-close-race-condition-between-sock_close.patch
+       
patches.kernel.org/4.17.3-012-udp-fix-rx-queue-len-reported-by-diag-and-proc.patch
+       
patches.kernel.org/4.17.3-013-net-in-virtio_net_hdr-only-add-VLAN_HLEN-to-cs.patch
+       
patches.kernel.org/4.17.3-014-hv_netvsc-Fix-a-network-regression-after-ifdow.patch
+       
patches.kernel.org/4.17.3-015-ACPICA-AML-parser-attempt-to-continue-loading-.patch
+       
patches.kernel.org/4.17.3-016-ext4-fix-hole-length-detection-in-ext4_ind_map.patch
+       
patches.kernel.org/4.17.3-017-ext4-update-mtime-in-ext4_punch_hole-even-if-n.patch
+       
patches.kernel.org/4.17.3-018-ext4-do-not-allow-external-inodes-for-inline-d.patch
+       
patches.kernel.org/4.17.3-019-ext4-bubble-errors-from-ext4_find_inline_data_.patch
+       
patches.kernel.org/4.17.3-020-ext4-correctly-handle-a-zero-length-xattr-with.patch
+       
patches.kernel.org/4.17.3-021-ext4-fix-fencepost-error-in-check-for-inode-co.patch
+       
patches.kernel.org/4.17.3-022-driver-core-Don-t-ignore-class_dir_create_and_.patch
+       patches.kernel.org/4.17.3-023-Btrfs-allow-empty-subvol-again.patch
+       
patches.kernel.org/4.17.3-024-Btrfs-fix-clone-vs-chattr-NODATASUM-race.patch
+       
patches.kernel.org/4.17.3-025-Btrfs-fix-memory-and-mount-leak-in-btrfs_ioctl.patch
+       
patches.kernel.org/4.17.3-026-btrfs-return-error-value-if-create_io_em-faile.patch
+       
patches.kernel.org/4.17.3-027-btrfs-scrub-Don-t-use-inode-pages-for-device-r.patch
+       
patches.kernel.org/4.17.3-028-ALSA-usb-audio-Disable-the-quirk-for-Nura-head.patch
+       
patches.kernel.org/4.17.3-029-ALSA-hda-realtek-Enable-mic-mute-hotkey-for-se.patch
+       
patches.kernel.org/4.17.3-030-ALSA-hda-conexant-Add-fixup-for-HP-Z2-G4-works.patch
+       
patches.kernel.org/4.17.3-031-ALSA-hda-Handle-kzalloc-failure-in-snd_hda_att.patch
+       
patches.kernel.org/4.17.3-032-ALSA-hda-add-dock-and-led-support-for-HP-Elite.patch
+       
patches.kernel.org/4.17.3-033-ALSA-hda-add-dock-and-led-support-for-HP-ProBo.patch
+       
patches.kernel.org/4.17.3-034-x86-MCE-Fix-stack-out-of-bounds-write-in-mce-i.patch
+       patches.kernel.org/4.17.3-035-smb3-fix-various-xid-leaks.patch
+       
patches.kernel.org/4.17.3-036-smb3-on-reconnect-set-PreviousSessionId-field.patch
+       
patches.kernel.org/4.17.3-037-CIFS-511c54a2f69195b28afb9dd119f03787b1625bb4-.patch
+       
patches.kernel.org/4.17.3-038-cifs-For-SMB2-security-informaion-query-check-.patch
+       patches.kernel.org/4.17.3-039-nbd-fix-nbd-device-deletion.patch
+       patches.kernel.org/4.17.3-040-nbd-update-size-when-connected.patch
+       
patches.kernel.org/4.17.3-041-nbd-use-bd_set_size-when-updating-disk-size.patch
+       
patches.kernel.org/4.17.3-042-blk-mq-reinit-q-tag_set_list-entry-only-after-.patch
+       
patches.kernel.org/4.17.3-043-bdi-Move-cgroup-bdi_writeback-to-a-dedicated-l.patch
+       
patches.kernel.org/4.17.3-044-cpufreq-Fix-new-policy-initialization-during-l.patch
+       
patches.kernel.org/4.17.3-045-cpufreq-ti-cpufreq-Fix-an-incorrect-error-retu.patch
+       
patches.kernel.org/4.17.3-046-cpufreq-governors-Fix-long-idle-detection-logi.patch
+       
patches.kernel.org/4.17.3-047-libata-zpodd-small-read-overflow-in-eject_tray.patch
+       
patches.kernel.org/4.17.3-048-libata-Drop-SanDisk-SD7UB3Q-G1001-NOLPM-quirk.patch
+       
patches.kernel.org/4.17.3-049-nvme-pci-Sync-controller-reset-for-AER-slot_re.patch
+       
patches.kernel.org/4.17.3-050-w1-mxc_w1-Enable-clock-before-calling-clk_get_.patch
+       
patches.kernel.org/4.17.3-051-x86-vector-Fix-the-args-of-vector_alloc-tracep.patch
+       
patches.kernel.org/4.17.3-052-x86-apic-vector-Prevent-hlist-corruption-and-l.patch
+       patches.kernel.org/4.17.3-053-x86-apic-Provide-apic_ack_irq.patch
+       patches.kernel.org/4.17.3-054-x86-ioapic-Use-apic_ack_irq.patch
+       patches.kernel.org/4.17.3-055-x86-platform-uv-Use-apic_ack_irq.patch
+       patches.kernel.org/4.17.3-056-irq_remapping-Use-apic_ack_irq.patch
+       
patches.kernel.org/4.17.3-057-genirq-generic_pending-Do-not-lose-pending-aff.patch
+       
patches.kernel.org/4.17.3-058-genirq-affinity-Defer-affinity-setting-if-irq-.patch
+       
patches.kernel.org/4.17.3-059-genirq-migration-Avoid-out-of-line-call-if-pen.patch
+       
patches.kernel.org/4.17.3-060-x86-intel_rdt-Enable-CMT-and-MBM-on-new-Skylak.patch
+       
patches.kernel.org/4.17.3-061-media-uvcvideo-Prevent-setting-unavailable-fla.patch
+       
patches.kernel.org/4.17.3-062-media-rc-ensure-input-lirc-device-can-be-opene.patch
+       patches.kernel.org/4.17.3-063-iwlwifi-fw-harden-page-loading-code.patch
+       patches.kernel.org/4.17.3-064-orangefs-set-i_size-on-new-symlink.patch
+       
patches.kernel.org/4.17.3-065-orangefs-report-attributes_mask-and-attributes.patch
+       
patches.kernel.org/4.17.3-066-HID-intel_ish-hid-ipc-register-more-pm-callbac.patch
+       
patches.kernel.org/4.17.3-067-HID-wacom-Correct-logical-maximum-Y-for-2nd-ge.patch
+       
patches.kernel.org/4.17.3-068-vhost-fix-info-leak-due-to-uninitialized-memor.patch
+       
patches.kernel.org/4.17.3-069-fs-binfmt_misc.c-do-not-allow-offset-overflow.patch
+       
patches.kernel.org/4.17.3-070-mm-page_alloc-do-not-break-__GFP_THISNODE-by-z.patch
+       patches.kernel.org/4.17.3-071-Linux-4.17.3.patch
 
        ########################################################
        # Build fixes that apply to the vanilla kernel too.
@@ -217,6 +288,8 @@
        # S/390
        ########################################################
 
+       patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch
+
        ########################################################
        # VM/FS patches
        ########################################################
@@ -268,7 +341,6 @@
        ########################################################
        # Networking Core
        ########################################################
-       patches.suse/socket-close-race-condition-between-sock_close-and-s.patch
 
        ########################################################
        # Netfilter
@@ -405,6 +477,7 @@
        # Input & Console
        ########################################################
        patches.suse/HID-redragon-Fix-modifier-keys-for-Redragon-Asura-Ke.patch
+       patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch
 
        ##########################################################
        # Sound
@@ -419,6 +492,8 @@
        ########################################################
        patches.suse/mtd-spi-nor-intel-spi-Fix-atomic-sequence-handling
 
+       patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2
+
        ########################################################
        # Other drivers we have added to the tree
        ########################################################
@@ -470,12 +545,12 @@
        ########################################################
        patches.suse/crasher.patch
 
-       # submitted
-       patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch
-       patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch
-       
patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch
-       
patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch
-       patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch
+       patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch
+       patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch
+       
patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch
+       
patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch
+       patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch
+       
patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch
 
        ########################################################
        # Kdump

++++++ source-timestamp ++++++
--- /var/tmp/diff_new_pack.j4p4zx/_old  2018-06-28 15:11:33.599797451 +0200
+++ /var/tmp/diff_new_pack.j4p4zx/_new  2018-06-28 15:11:33.599797451 +0200
@@ -1,3 +1,3 @@
-2018-06-16 12:58:03 +0200
-GIT Revision: ddde22df2f7bdef9ba4a6fec7f559f2f71929acc
+2018-06-26 08:45:20 +0200
+GIT Revision: e8dc1b5f84d0410c70dbdc114e864152fabbf5d7
 GIT Branch: stable


Reply via email to