Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2018-06-28 15:10:41 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source" Thu Jun 28 15:10:41 2018 rev:437 rq:619106 version:4.17.3 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2018-06-20 15:21:28.851571180 +0200 +++ /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes 2018-06-28 15:10:55.443867483 +0200 @@ -1,0 +2,204 @@ +Tue Jun 26 08:45:20 CEST 2018 - [email protected] + +- Linux 4.17.3 (bnc#1012628). +- net: aquantia: fix unsigned numvecs comparison with less than + zero (bnc#1012628). +- bonding: re-evaluate force_primary when the primary slave name + changes (bnc#1012628). +- cdc_ncm: avoid padding beyond end of skb (bnc#1012628). +- ipv6: allow PMTU exceptions to local routes (bnc#1012628). +- net: dsa: add error handling for pskb_trim_rcsum (bnc#1012628). +- net: phy: dp83822: use BMCR_ANENABLE instead of BMSR_ANEGCAPABLE + for DP83620 (bnc#1012628). +- net/sched: act_simple: fix parsing of TCA_DEF_DATA + (bnc#1012628). +- tcp: verify the checksum of the first data segment in a new + connection (bnc#1012628). +- tls: fix use-after-free in tls_push_record (bnc#1012628). +- tls: fix waitall behavior in tls_sw_recvmsg (bnc#1012628). +- udp: fix rx queue len reported by diag and proc interface + (bnc#1012628). +- net: in virtio_net_hdr only add VLAN_HLEN to csum_start if + payload holds vlan (bnc#1012628). +- hv_netvsc: Fix a network regression after ifdown/ifup + (bnc#1012628). +- ext4: fix hole length detection in ext4_ind_map_blocks() + (bnc#1012628). +- ext4: update mtime in ext4_punch_hole even if no blocks are + released (bnc#1012628). +- ext4: do not allow external inodes for inline data + (bnc#1012628). +- ext4: bubble errors from ext4_find_inline_data_nolock() up to + ext4_iget() (bnc#1012628). +- ext4: correctly handle a zero-length xattr with a non-zero + e_value_offs (bnc#1012628). +- ext4: fix fencepost error in check for inode count overflow + during resize (bnc#1012628). +- driver core: Don't ignore class_dir_create_and_add() failure + (bnc#1012628). +- Btrfs: allow empty subvol= again (bnc#1012628). +- Btrfs: fix clone vs chattr NODATASUM race (bnc#1012628). +- Btrfs: fix memory and mount leak in btrfs_ioctl_rm_dev_v2() + (bnc#1012628). +- btrfs: return error value if create_io_em failed in + cow_file_range (bnc#1012628). +- btrfs: scrub: Don't use inode pages for device replace + (bnc#1012628). +- ALSA: usb-audio: Disable the quirk for Nura headset + (bnc#1012628). +- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo + AIOs (bnc#1012628). +- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation + (bnc#1012628). +- ALSA: hda - Handle kzalloc() failure in + snd_hda_attach_pcm_stream() (bnc#1012628). +- ALSA: hda: add dock and led support for HP EliteBook 830 G5 + (bnc#1012628). +- ALSA: hda: add dock and led support for HP ProBook 640 G4 + (bnc#1012628). +- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: + Flags_read() (bnc#1012628). +- smb3: fix various xid leaks (bnc#1012628). +- smb3: on reconnect set PreviousSessionId field (bnc#1012628). +- CIFS: 511c54a2f69195b28afb9dd119f03787b1625bb4 adds a check + for session expiry (bnc#1012628). +- cifs: For SMB2 security informaion query, check for minimum + sized security descriptor instead of sizeof FileAllInformation + class (bnc#1012628). +- nbd: fix nbd device deletion (bnc#1012628). +- nbd: update size when connected (bnc#1012628). +- nbd: use bd_set_size when updating disk size (bnc#1012628). +- blk-mq: reinit q->tag_set_list entry only after grace period + (bnc#1012628). +- bdi: Move cgroup bdi_writeback to a dedicated low concurrency + workqueue (bnc#1012628). +- cpufreq: Fix new policy initialization during limits updates + via sysfs (bnc#1012628). +- cpufreq: ti-cpufreq: Fix an incorrect error return value + (bnc#1012628). +- cpufreq: governors: Fix long idle detection logic in load + calculation (bnc#1012628). +- libata: zpodd: small read overflow in eject_tray() + (bnc#1012628). +- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012628). +- nvme/pci: Sync controller reset for AER slot_reset + (bnc#1012628). +- w1: mxc_w1: Enable clock before calling clk_get_rate() on it + (bnc#1012628). +- x86/vector: Fix the args of vector_alloc tracepoint + (bnc#1012628). +- x86/apic/vector: Prevent hlist corruption and leaks + (bnc#1012628). +- x86/apic: Provide apic_ack_irq() (bnc#1012628). +- x86/ioapic: Use apic_ack_irq() (bnc#1012628). +- x86/platform/uv: Use apic_ack_irq() (bnc#1012628). +- irq_remapping: Use apic_ack_irq() (bnc#1012628). +- genirq/generic_pending: Do not lose pending affinity update + (bnc#1012628). +- genirq/affinity: Defer affinity setting if irq chip is busy + (bnc#1012628). +- genirq/migration: Avoid out of line call if pending is not set + (bnc#1012628). +- x86/intel_rdt: Enable CMT and MBM on new Skylake stepping + (bnc#1012628). +- media: uvcvideo: Prevent setting unavailable flags + (bnc#1012628). +- media: rc: ensure input/lirc device can be opened after register + (bnc#1012628). +- iwlwifi: fw: harden page loading code (bnc#1012628). +- orangefs: set i_size on new symlink (bnc#1012628). +- orangefs: report attributes_mask and attributes for statx + (bnc#1012628). +- HID: intel_ish-hid: ipc: register more pm callbacks to support + hibernation (bnc#1012628). +- HID: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro + large (bnc#1012628). +- fs/binfmt_misc.c: do not allow offset overflow (bnc#1012628). +- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset + (bnc#1012628). +- commit e8dc1b5 + +------------------------------------------------------------------- +Tue Jun 26 08:25:44 CEST 2018 - [email protected] + +- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, + too (bsc#1098626). +- commit cbe83fb + +------------------------------------------------------------------- +Mon Jun 25 21:22:28 CEST 2018 - [email protected] + +- Input: psmouse - fix button reporting for basic protocols + (bnc#1098392). +- commit 7faa585 + +------------------------------------------------------------------- +Mon Jun 25 11:24:43 CEST 2018 - [email protected] + +- vhost: fix info leak due to uninitialized memory (bsc#1092472 + CVE-2018-1118). +- commit 7372950 + +------------------------------------------------------------------- +Sat Jun 23 09:41:41 CEST 2018 - [email protected] + +- x86/stacktrace: Do not unwind after user regs (bnc#1058115). +- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115). +- x86/stacktrace: Clarify the reliable success paths + (bnc#1058115). +- x86/stacktrace: Do not fail for ORC with regs on stack + (bnc#1058115). +- x86/unwind/orc: Detect the end of the stack (bnc#1058115). +- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC + unwinder (bnc#1058115). +- Delete + patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch. +- Delete + patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch. +- Delete + patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch. +- Delete + patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch. +- Delete + patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch. + Replace the ORC patches by the upstream patches. Finally... +- commit 33a2d86 + +------------------------------------------------------------------- +Thu Jun 21 17:15:09 CEST 2018 - [email protected] + +- s390: Correct register corruption in critical section cleanup + (boo#1095717). +- commit 4594a9e + +------------------------------------------------------------------- +Wed Jun 20 11:08:17 CEST 2018 - [email protected] + +- ACPICA: AML parser: attempt to continue loading table after + error (bsc#1098074). +- commit fc39d10 + +------------------------------------------------------------------- +Mon Jun 18 18:27:58 CEST 2018 - [email protected] + +- macros.kernel-source: define linux_arch for KMPs (boo#1098050). + CONFIG_64BIT is no longer defined so KMP spec files need to include + %{?linux_make_arch} in any make call to build modules or descent into + the kernel directory for any reason. +- commit 5dc40af + +------------------------------------------------------------------- +Mon Jun 18 07:27:34 CEST 2018 - [email protected] + +- rpm: ignore CONFIG_GCC_VERSION when checking for oldconfig changes + Since 4.18-rc1, "make oldconfig" writes gcc version and capabilities into + generated .config. Thus whenever we build the package or run checks with + different gcc version than used to update config/*/*, check for "outdated + configs" fails. ++++ 7 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes dtb-armv6l.changes: same change dtb-armv7l.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-kvmsmall.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.575799330 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.583799316 +0200 @@ -17,7 +17,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols}) Name: dtb-aarch64 -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.647799198 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.651799191 +0200 @@ -18,7 +18,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0 Group: System/Kernel -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -165,10 +165,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 # END COMMON DEPS -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz Source2: source-post.sh @@ -1094,8 +1094,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %obsolete_rebuilds %name-base %ifarch %ix86 ++++++ kernel-debug.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.683799132 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.683799132 +0200 @@ -18,7 +18,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: A Debug Version of the Kernel License: GPL-2.0 Group: System/Kernel -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -165,10 +165,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 # END COMMON DEPS -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %ifarch ppc64 Provides: kernel-kdump = 2.6.28 Obsoletes: kernel-kdump <= 2.6.28 @@ -1100,8 +1100,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %ifarch ppc64 Provides: kernel-kdump-base = 2.6.28 ++++++ kernel-default.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.711799080 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.715799073 +0200 @@ -18,7 +18,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: The Standard Kernel License: GPL-2.0 Group: System/Kernel -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -165,10 +165,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 # END COMMON DEPS -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %ifarch %ix86 Provides: kernel-smp = 2.6.17 Obsoletes: kernel-smp <= 2.6.17 @@ -1143,8 +1143,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %ifarch %ix86 Provides: kernel-trace-base = 3.13 ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.727799051 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.731799044 +0200 @@ -17,7 +17,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -31,9 +31,9 @@ Summary: Kernel Documentation License: GPL-2.0 Group: Documentation/Man -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -63,7 +63,7 @@ %endif Url: http://www.kernel.org/ Provides: %name = %version-%source_rel -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 BuildArch: noarch BuildRoot: %{_tmppath}/%{name}-%{version}-build Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz ++++++ kernel-kvmsmall.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.743799022 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.751799007 +0200 @@ -18,7 +18,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: The Small Developer Kernel for KVM License: GPL-2.0 Group: System/Kernel -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -165,10 +165,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 # END COMMON DEPS -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz Source2: source-post.sh @@ -1098,8 +1098,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %obsolete_rebuilds %name-base %ifarch %ix86 kernel-lpae.spec: same change ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.779798955 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.779798955 +0200 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -45,7 +45,7 @@ %endif %endif %endif -BuildRequires: kernel%kernel_flavor-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +BuildRequires: kernel%kernel_flavor-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %if 0%{?rhel_version} BuildRequires: kernel @@ -64,9 +64,9 @@ Summary: package kernel and initrd for OBS VM builds License: GPL-2.0 Group: SLES -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.795798927 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.795798927 +0200 @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -36,9 +36,9 @@ Summary: Basic QA tests for the kernel License: GPL-2.0 Group: SLES -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.807798904 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.807798904 +0200 @@ -18,7 +18,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel with PAE Support License: GPL-2.0 Group: System/Kernel -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -165,10 +165,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 # END COMMON DEPS -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %ifarch %ix86 Provides: kernel-bigsmp = 2.6.17 Obsoletes: kernel-bigsmp <= 2.6.17 @@ -1120,8 +1120,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %ifarch %ix86 Provides: kernel-vmi-base = 2.6.38 ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.819798882 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.823798875 +0200 @@ -18,7 +18,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -30,9 +30,9 @@ Summary: The Linux Kernel Sources License: GPL-2.0 Group: Development/Sources -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -43,7 +43,7 @@ BuildRequires: sed Requires(post): coreutils sed Provides: %name = %version-%source_rel -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 Provides: linux Provides: multiversion(kernel) Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.835798853 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.839798845 +0200 @@ -24,10 +24,10 @@ Summary: Kernel Symbol Versions (modversions) License: GPL-2.0 Group: Development/Sources -Version: 4.17.2 +Version: 4.17.3 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -55,7 +55,7 @@ %endif Requires: pesign-obs-integration Provides: %name = %version-%source_rel -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 Provides: multiversion(kernel) Source: README.KSYMS Requires: kernel-devel%variant = %version-%source_rel ++++++ kernel-vanilla.spec ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.851798823 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.851798823 +0200 @@ -18,7 +18,7 @@ %define srcversion 4.17 -%define patchversion 4.17.2 +%define patchversion 4.17.3 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: The Standard Kernel - without any SUSE patches License: GPL-2.0 Group: System/Kernel -Version: 4.17.2 +Version: 4.17.3 %if 0%{?is_kotd} -Release: <RELEASE>.gddde22d +Release: <RELEASE>.ge8dc1b5 %else Release: 0 %endif @@ -165,10 +165,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 # END COMMON DEPS -Provides: %name-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: %name-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%srcversion.tar.xz Source2: source-post.sh @@ -1091,8 +1091,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc -Provides: kernel-srchash = ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +Provides: kernel-%build_flavor-base-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 +Provides: kernel-srchash = e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 %obsolete_rebuilds %name-base %ifarch %ix86 kernel-zfcpdump.spec: same change ++++++ check-for-config-changes ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:32.967798611 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:32.967798611 +0200 @@ -2,8 +2,8 @@ # lines 4 contains a timestamp... differences="$( - diff -bU0 <(sed -e '/^# .* is not set$/p' -e '/^$\|^#/d' "$1" | sort) \ - <(sed -e '/^# .* is not set$/p' -e '/^$\|^#/d' "$2" | sort) \ + diff -bU0 <(sed -e '/CONFIG_GCC_VERSION/ d' -e '/^# .* is not set$/p' -e '/^$\|^#/d' "$1" | sort) \ + <(sed -e '/CONFIG_GCC_VERSION/ d' -e '/^# .* is not set$/p' -e '/^$\|^#/d' "$2" | sort) \ | grep '^[-+][^-+]' )" || true if [ -n "$differences" ]; then ++++++ macros.kernel-source ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:33.259798075 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:33.259798075 +0200 @@ -2,6 +2,39 @@ %kernel_module_package_release 1 %kernel_module_package_buildreqs modutils kernel-syms +%cpu_arch %(case %_target_cpu in \ + # from rpm --eval '%ix86' \ + (i?86 | pentium3 | pentium4 | athlon | geode) \ + echo "i386" \ + ;; \ + (aarch64) \ + echo "arm64" \ + ;; \ + (*)\ + echo "%_target_cpu" \ + ;; \ +esac) + +%linux_arch %(case %cpu_arch in \ + (ppc*) \ + echo "powerpc" \ + ;; \ + (s390x) \ + echo "s390" \ + ;; \ + (arm64) \ + echo "arm64" \ + ;; \ + (armv*) \ + echo "arm" \ + ;; \ + (*) \ + echo "%cpu_arch" \ + ;; \ +esac) + +%linux_make_arch ARCH=%linux_arch + # Defines %flavors_to_build and %kernel_source() as a side effect. %_kernel_module_package(n:v:r:t:f:Xp:bc:) \ %{expand:%( \ @@ -16,7 +49,7 @@ (*) \ [ -z "%{-X}" -a -n "$flavors" ] && continue ;; \ esac \ - krel=$(make -si -C /usr/src/linux-obj/%_target_cpu/$flavor/ kernelrelease 2>/dev/null) \ + krel=$(make -si -C /usr/src/linux-obj/%_target_cpu/$flavor/ %linux_make_arch kernelrelease 2>/dev/null) \ kver=${krel%%-*} \ flavors_to_build="$flavors_to_build $flavor" \ echo "%%_suse_kernel_module_subpackage -n %{-n*}%{!-n:%name} -v %{-v*}%{!-v:%version} -r %{-r*}%{!-r:%release} %{-f} %{-p} %{-b} %{-c:-c} $flavor $kver" \ ++++++ patches.kernel.org.tar.bz2 ++++++ ++++ 5430 lines of diff (skipped) ++++++ patches.suse.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch new/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch --- old/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,45 @@ +From: Jiri Slaby <[email protected]> +Date: Fri, 18 May 2018 08:47:08 +0200 +Subject: x86/stacktrace: Do not unwind after user regs +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm +Git-commit: 0797a8d0d79769574550caa5ca5d89c237723250 +Patch-mainline: Queued in subsystem maintainer repository +References: bnc#1058115 + +Josh pointed out, that there is no way a frame can be after user regs. +So remove the last unwind and the check. + +Signed-off-by: Jiri Slaby <[email protected]> +Acked-by: Josh Poimboeuf <[email protected]> +Cc: Andy Lutomirski <[email protected]> +Cc: Borislav Petkov <[email protected]> +Cc: Brian Gerst <[email protected]> +Cc: Denys Vlasenko <[email protected]> +Cc: H. Peter Anvin <[email protected]> +Cc: Linus Torvalds <[email protected]> +Cc: Peter Zijlstra <[email protected]> +Cc: Thomas Gleixner <[email protected]> +Link: https://lkml.kernel.org/lkml/[email protected] +Signed-off-by: Ingo Molnar <[email protected]> +--- + arch/x86/kernel/stacktrace.c | 9 --------- + 1 file changed, 9 deletions(-) + +--- a/arch/x86/kernel/stacktrace.c ++++ b/arch/x86/kernel/stacktrace.c +@@ -113,15 +113,6 @@ __save_stack_trace_reliable(struct stack + if (!user_mode(regs)) + return -EINVAL; + +- /* +- * The last frame contains the user mode syscall +- * pt_regs. Skip it and finish the unwind. +- */ +- unwind_next_frame(&state); +- if (!unwind_done(&state)) { +- STACKTRACE_DUMP_ONCE(task); +- return -EINVAL; +- } + break; + } + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch new/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch --- old/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch 2018-06-16 12:33:07.000000000 +0200 +++ new/patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,37 +0,0 @@ -From: Jiri Slaby <[email protected]> -Date: Fri, 1 Dec 2017 08:20:00 +0100 -Subject: x86/stacktrace: do now unwind after user regs -Patch-mainline: submitted on 2017/12/5 -References: bnc#1058115 - -Josh pointed out, that there is no way a frame can be after user regs. -So remove the last unwind and the check. - -Signed-off-by: Jiri Slaby <[email protected]> -Cc: Thomas Gleixner <[email protected]> -Cc: Ingo Molnar <[email protected]> -Cc: "H. Peter Anvin" <[email protected]> -Cc: [email protected] -Cc: Josh Poimboeuf <[email protected]> ---- - arch/x86/kernel/stacktrace.c | 9 --------- - 1 file changed, 9 deletions(-) - ---- a/arch/x86/kernel/stacktrace.c -+++ b/arch/x86/kernel/stacktrace.c -@@ -113,15 +113,6 @@ __save_stack_trace_reliable(struct stack - if (!user_mode(regs)) - return -EINVAL; - -- /* -- * The last frame contains the user mode syscall -- * pt_regs. Skip it and finish the unwind. -- */ -- unwind_next_frame(&state); -- if (!unwind_done(&state)) { -- STACKTRACE_DUMP_ONCE(task); -- return -EINVAL; -- } - break; - } - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch new/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch --- old/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,74 @@ +From: Jiri Slaby <[email protected]> +Date: Fri, 18 May 2018 08:47:09 +0200 +Subject: x86/stacktrace: Remove STACKTRACE_DUMP_ONCE +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm +Git-commit: 17426923b03f098da83b8c1e044934a34959f69b +Patch-mainline: Queued in subsystem maintainer repository +References: bnc#1058115 + +The stack unwinding can sometimes fail yet. Especially with the +generated debug info. So do not yell at users -- live patching (the only +user of this interface) will inform the user about the failure +gracefully. + +And given this was the only user of the macro, remove the macro proper +too. + +Signed-off-by: Jiri Slaby <[email protected]> +Acked-by: Josh Poimboeuf <[email protected]> +Cc: Andy Lutomirski <[email protected]> +Cc: Borislav Petkov <[email protected]> +Cc: Brian Gerst <[email protected]> +Cc: Denys Vlasenko <[email protected]> +Cc: H. Peter Anvin <[email protected]> +Cc: Linus Torvalds <[email protected]> +Cc: Peter Zijlstra <[email protected]> +Cc: Thomas Gleixner <[email protected]> +Link: https://lkml.kernel.org/lkml/[email protected] +Signed-off-by: Ingo Molnar <[email protected]> +--- + arch/x86/kernel/stacktrace.c | 18 ++---------------- + 1 file changed, 2 insertions(+), 16 deletions(-) + +--- a/arch/x86/kernel/stacktrace.c ++++ b/arch/x86/kernel/stacktrace.c +@@ -81,16 +81,6 @@ EXPORT_SYMBOL_GPL(save_stack_trace_tsk); + + #ifdef CONFIG_HAVE_RELIABLE_STACKTRACE + +-#define STACKTRACE_DUMP_ONCE(task) ({ \ +- static bool __section(.data.unlikely) __dumped; \ +- \ +- if (!__dumped) { \ +- __dumped = true; \ +- WARN_ON(1); \ +- show_stack(task, NULL); \ +- } \ +-}) +- + static int __always_inline + __save_stack_trace_reliable(struct stack_trace *trace, + struct task_struct *task) +@@ -123,20 +113,16 @@ __save_stack_trace_reliable(struct stack + * generated code which __kernel_text_address() doesn't know + * about. + */ +- if (!addr) { +- STACKTRACE_DUMP_ONCE(task); ++ if (!addr) + return -EINVAL; +- } + + if (save_stack_address(trace, addr, false)) + return -EINVAL; + } + + /* Check for stack corruption */ +- if (unwind_error(&state)) { +- STACKTRACE_DUMP_ONCE(task); ++ if (unwind_error(&state)) + return -EINVAL; +- } + + if (trace->nr_entries < trace->max_entries) + trace->entries[trace->nr_entries++] = ULONG_MAX; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch new/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch --- old/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch 2018-06-16 12:33:07.000000000 +0200 +++ new/patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,56 +0,0 @@ -From: Jiri Slaby <[email protected]> -Date: Thu, 14 Dec 2017 22:54:20 +0100 -Subject: x86/stacktrace: make clear the success paths -Patch-mainline: submitted on 2017/12/5 -References: bnc#1058115 - -Make clear which path is for user tasks and for kthreads and idle -tasks. This will allow easier plug-in of ORC unwinder in the next -patches. - -Signed-off-by: Jiri Slaby <[email protected]> -Cc: Thomas Gleixner <[email protected]> -Cc: Ingo Molnar <[email protected]> -Cc: "H. Peter Anvin" <[email protected]> -Cc: [email protected] -Cc: Josh Poimboeuf <[email protected]> ---- - arch/x86/kernel/stacktrace.c | 13 ++++++++++--- - 1 file changed, 10 insertions(+), 3 deletions(-) - ---- a/arch/x86/kernel/stacktrace.c -+++ b/arch/x86/kernel/stacktrace.c -@@ -104,16 +104,18 @@ __save_stack_trace_reliable(struct stack - - regs = unwind_get_entry_regs(&state, NULL); - if (regs) { -+ /* Success path for user tasks */ -+ if (user_mode(regs)) -+ goto success; -+ - /* - * Kernel mode registers on the stack indicate an - * in-kernel interrupt or exception (e.g., preemption - * or a page fault), which can make frame pointers - * unreliable. - */ -- if (!user_mode(regs)) -- return -EINVAL; - -- break; -+ return -EINVAL; - } - - addr = unwind_get_return_address(&state); -@@ -138,6 +140,11 @@ __save_stack_trace_reliable(struct stack - return -EINVAL; - } - -+ /* Success path for non-user tasks, i.e. kthreads and idle tasks */ -+ if (!(task->flags & (PF_KTHREAD | PF_IDLE))) -+ return -EINVAL; -+ -+success: - if (trace->nr_entries < trace->max_entries) - trace->entries[trace->nr_entries++] = ULONG_MAX; - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch new/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch --- old/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,75 @@ +From: Jiri Slaby <[email protected]> +Date: Fri, 18 May 2018 08:47:10 +0200 +Subject: x86/stacktrace: Clarify the reliable success paths +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm +Git-commit: 441ccc3580f45340715fd8f5c4db795b06326404 +Patch-mainline: Queued in subsystem maintainer repository +References: bnc#1058115 + +Make clear which path is for user tasks and for kthreads and idle +tasks. This will allow easier plug-in of the ORC unwinder in the next +patches. + +Note that we added a check for unwind error to the top of the loop, so +that an error is returned also for user tasks (the 'goto success' would +skip the check after the loop otherwise). + +Signed-off-by: Jiri Slaby <[email protected]> +Acked-by: Josh Poimboeuf <[email protected]> +Cc: Andy Lutomirski <[email protected]> +Cc: Borislav Petkov <[email protected]> +Cc: Brian Gerst <[email protected]> +Cc: Denys Vlasenko <[email protected]> +Cc: H. Peter Anvin <[email protected]> +Cc: Linus Torvalds <[email protected]> +Cc: Peter Zijlstra <[email protected]> +Cc: Thomas Gleixner <[email protected]> +Link: https://lkml.kernel.org/lkml/[email protected] +Signed-off-by: Ingo Molnar <[email protected]> +--- + arch/x86/kernel/stacktrace.c | 16 ++++++++++++---- + 1 file changed, 12 insertions(+), 4 deletions(-) + +--- a/arch/x86/kernel/stacktrace.c ++++ b/arch/x86/kernel/stacktrace.c +@@ -89,21 +89,24 @@ __save_stack_trace_reliable(struct stack + struct pt_regs *regs; + unsigned long addr; + +- for (unwind_start(&state, task, NULL, NULL); !unwind_done(&state); ++ for (unwind_start(&state, task, NULL, NULL); ++ !unwind_done(&state) && !unwind_error(&state); + unwind_next_frame(&state)) { + + regs = unwind_get_entry_regs(&state, NULL); + if (regs) { ++ /* Success path for user tasks */ ++ if (user_mode(regs)) ++ goto success; ++ + /* + * Kernel mode registers on the stack indicate an + * in-kernel interrupt or exception (e.g., preemption + * or a page fault), which can make frame pointers + * unreliable. + */ +- if (!user_mode(regs)) +- return -EINVAL; + +- break; ++ return -EINVAL; + } + + addr = unwind_get_return_address(&state); +@@ -124,6 +127,11 @@ __save_stack_trace_reliable(struct stack + if (unwind_error(&state)) + return -EINVAL; + ++ /* Success path for non-user tasks, i.e. kthreads and idle tasks */ ++ if (!(task->flags & (PF_KTHREAD | PF_IDLE))) ++ return -EINVAL; ++ ++success: + if (trace->nr_entries < trace->max_entries) + trace->entries[trace->nr_entries++] = ULONG_MAX; + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch new/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch --- old/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch 2018-06-16 12:33:07.000000000 +0200 +++ new/patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,47 +0,0 @@ -From: Jiri Slaby <[email protected]> -Date: Fri, 1 Dec 2017 08:28:36 +0100 -Subject: x86/stacktrace: remove STACKTRACE_DUMP_ONCE from - __save_stack_trace_reliable -Patch-mainline: submitted on 2017/12/5 -References: bnc#1058115 - -The stack unwinding can sometimes fail yet. Especially with the -generated debug info. So do not yell at users -- live patching (the only -user of this interface) will inform the user about the failure -gracefully. - -Signed-off-by: Jiri Slaby <[email protected]> -Cc: Thomas Gleixner <[email protected]> -Cc: Ingo Molnar <[email protected]> -Cc: "H. Peter Anvin" <[email protected]> -Cc: [email protected] -Cc: Josh Poimboeuf <[email protected]> ---- - arch/x86/kernel/stacktrace.c | 8 ++------ - 1 file changed, 2 insertions(+), 6 deletions(-) - ---- a/arch/x86/kernel/stacktrace.c -+++ b/arch/x86/kernel/stacktrace.c -@@ -125,20 +125,16 @@ __save_stack_trace_reliable(struct stack - * generated code which __kernel_text_address() doesn't know - * about. - */ -- if (!addr) { -- STACKTRACE_DUMP_ONCE(task); -+ if (!addr) - return -EINVAL; -- } - - if (save_stack_address(trace, addr, false)) - return -EINVAL; - } - - /* Check for stack corruption */ -- if (unwind_error(&state)) { -- STACKTRACE_DUMP_ONCE(task); -+ if (unwind_error(&state)) - return -EINVAL; -- } - - /* Success path for non-user tasks, i.e. kthreads and idle tasks */ - if (!(task->flags & (PF_KTHREAD | PF_IDLE))) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch new/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch --- old/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,49 @@ +From: Jiri Slaby <[email protected]> +Date: Fri, 18 May 2018 08:47:11 +0200 +Subject: x86/stacktrace: Do not fail for ORC with regs on stack +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm +Git-commit: 0c414367c04eeb00c3ebfee0b74c9e7f3b95fd62 +Patch-mainline: Queued in subsystem maintainer repository +References: bnc#1058115 + +save_stack_trace_reliable now returns "non reliable" when there are +kernel pt_regs on stack. This means an interrupt or exception happened +somewhere down the route. It is a problem for the frame pointer +unwinder, because the frame might not have been set up yet when the irq +happened, so the unwinder might fail to unwind from the interrupted +function. + +With ORC, this is not a problem, as ORC has out-of-band data. We can +find ORC data even for the IP in the interrupted function and always +unwind one level up reliably. + +So lift the check to apply only when CONFIG_FRAME_POINTER=y is enabled. + +Signed-off-by: Jiri Slaby <[email protected]> +Acked-by: Josh Poimboeuf <[email protected]> +Cc: Andy Lutomirski <[email protected]> +Cc: Borislav Petkov <[email protected]> +Cc: Brian Gerst <[email protected]> +Cc: Denys Vlasenko <[email protected]> +Cc: H. Peter Anvin <[email protected]> +Cc: Linus Torvalds <[email protected]> +Cc: Peter Zijlstra <[email protected]> +Cc: Thomas Gleixner <[email protected]> +Link: https://lkml.kernel.org/lkml/[email protected] +Signed-off-by: Ingo Molnar <[email protected]> +--- + arch/x86/kernel/stacktrace.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +--- a/arch/x86/kernel/stacktrace.c ++++ b/arch/x86/kernel/stacktrace.c +@@ -106,7 +106,8 @@ __save_stack_trace_reliable(struct stack + * unreliable. + */ + +- return -EINVAL; ++ if (IS_ENABLED(CONFIG_FRAME_POINTER)) ++ return -EINVAL; + } + + addr = unwind_get_return_address(&state); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch new/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch --- old/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch 2018-06-16 12:33:07.000000000 +0200 +++ new/patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,43 +0,0 @@ -From: Jiri Slaby <[email protected]> -Date: Wed, 29 Nov 2017 15:43:35 +0100 -Subject: x86/stacktrace: do not fail for ORC with regs on stack -Patch-mainline: submitted on 2017/12/5 -References: bnc#1058115 - -save_stack_trace_reliable now returns "non reliable" when there are -kernel pt_regs on stack. This means an interrupt or exception happened -somewhere down the route. It is a problem for frame pointer unwinder, -because the frame might not have been set up yet when the irq happened, -so the unwinder might fail to unwind from the interrupted function. - -With ORC, this is not a problem, as ORC has out-of-band data. We can -find ORC data even for the IP in the interrupted function and always -unwind one level up reliably. - -So lift the check to apply only when CONFIG_FRAME_POINTER is enabled. - -[v2] -- rewrite the code in favor of Josh's suggestions - -Signed-off-by: Jiri Slaby <[email protected]> -Cc: Thomas Gleixner <[email protected]> -Cc: Ingo Molnar <[email protected]> -Cc: "H. Peter Anvin" <[email protected]> -Cc: [email protected] -Cc: Josh Poimboeuf <[email protected]> ---- - arch/x86/kernel/stacktrace.c | 3 ++- - 1 file changed, 2 insertions(+), 1 deletion(-) - ---- a/arch/x86/kernel/stacktrace.c -+++ b/arch/x86/kernel/stacktrace.c -@@ -115,7 +115,8 @@ __save_stack_trace_reliable(struct stack - * unreliable. - */ - -- return -EINVAL; -+ if (IS_ENABLED(CONFIG_FRAME_POINTER)) -+ return -EINVAL; - } - - addr = unwind_get_return_address(&state); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch new/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch --- old/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch 2018-06-16 12:33:07.000000000 +0200 +++ new/patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,32 +0,0 @@ -From: Jiri Slaby <[email protected]> -Date: Wed, 4 Oct 2017 11:14:26 +0200 -Subject: x86/stacktrace: orc, mark it as reliable -Patch-mainline: submitted on 2017/12/5 -References: bnc#1058115 - -In SUSE, we need a reliable stack unwinder for kernel live patching, but -we do not want to enable frame pointers for performance reasons. So -after the previous patches to make the ORC reliable, mark ORC as a -reliable stack unwinder on x86. - -Signed-off-by: Jiri Slaby <[email protected]> -Cc: Josh Poimboeuf <[email protected]> -Cc: Thomas Gleixner <[email protected]> -Cc: Ingo Molnar <[email protected]> -Cc: "H. Peter Anvin" <[email protected]> -Cc: [email protected] ---- - arch/x86/Kconfig | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - ---- a/arch/x86/Kconfig -+++ b/arch/x86/Kconfig -@@ -172,7 +172,7 @@ config X86 - select HAVE_PERF_USER_STACK_DUMP - select HAVE_RCU_TABLE_FREE - select HAVE_REGS_AND_STACK_ACCESS_API -- select HAVE_RELIABLE_STACKTRACE if X86_64 && UNWINDER_FRAME_POINTER && STACK_VALIDATION -+ select HAVE_RELIABLE_STACKTRACE if X86_64 && (UNWINDER_FRAME_POINTER || UNWINDER_ORC) && STACK_VALIDATION - select HAVE_STACK_VALIDATION if X86_64 - select HAVE_SYSCALL_TRACEPOINTS - select HAVE_UNSTABLE_SCHED_CLOCK diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch new/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch --- old/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,358 @@ +From: Josh Poimboeuf <[email protected]> +Date: Fri, 18 May 2018 08:47:12 +0200 +Subject: x86/unwind/orc: Detect the end of the stack +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm +Git-commit: d31a580266eeb1f355df90fde8a71f480e30ad70 +Patch-mainline: Queued in subsystem maintainer repository +References: bnc#1058115 + +The existing UNWIND_HINT_EMPTY annotations happen to be good indicators +of where entry code calls into C code for the first time. So also use +them to mark the end of the stack for the ORC unwinder. + +Use that information to set unwind->error if the ORC unwinder doesn't +unwind all the way to the end. This will be needed for enabling +HAVE_RELIABLE_STACKTRACE for the ORC unwinder so we can use it with the +livepatch consistency model. + +Thanks to Jiri Slaby for teaching the ORCs about the unwind hints. + +Signed-off-by: Josh Poimboeuf <[email protected]> +Signed-off-by: Jiri Slaby <[email protected]> +Acked-by: Josh Poimboeuf <[email protected]> +Cc: Andy Lutomirski <[email protected]> +Cc: Borislav Petkov <[email protected]> +Cc: Brian Gerst <[email protected]> +Cc: Denys Vlasenko <[email protected]> +Cc: H. Peter Anvin <[email protected]> +Cc: Linus Torvalds <[email protected]> +Cc: Peter Zijlstra <[email protected]> +Cc: Thomas Gleixner <[email protected]> +Link: https://lkml.kernel.org/lkml/[email protected] +Signed-off-by: Ingo Molnar <[email protected]> +--- + arch/x86/entry/entry_64.S | 1 + arch/x86/include/asm/orc_types.h | 2 + arch/x86/include/asm/unwind_hints.h | 16 ++++--- + arch/x86/kernel/unwind_orc.c | 52 ++++++++++++++----------- + tools/objtool/arch/x86/include/asm/orc_types.h | 2 + tools/objtool/check.c | 1 + tools/objtool/check.h | 2 + tools/objtool/orc_dump.c | 3 - + tools/objtool/orc_gen.c | 2 + 9 files changed, 52 insertions(+), 29 deletions(-) + +--- a/arch/x86/entry/entry_64.S ++++ b/arch/x86/entry/entry_64.S +@@ -414,6 +414,7 @@ ENTRY(ret_from_fork) + + 1: + /* kernel thread */ ++ UNWIND_HINT_EMPTY + movq %r12, %rdi + CALL_NOSPEC %rbx + /* +--- a/arch/x86/include/asm/orc_types.h ++++ b/arch/x86/include/asm/orc_types.h +@@ -88,6 +88,7 @@ struct orc_entry { + unsigned sp_reg:4; + unsigned bp_reg:4; + unsigned type:2; ++ unsigned end:1; + } __packed; + + /* +@@ -101,6 +102,7 @@ struct unwind_hint { + s16 sp_offset; + u8 sp_reg; + u8 type; ++ u8 end; + }; + #endif /* __ASSEMBLY__ */ + +--- a/arch/x86/include/asm/unwind_hints.h ++++ b/arch/x86/include/asm/unwind_hints.h +@@ -26,7 +26,7 @@ + * the debuginfo as necessary. It will also warn if it sees any + * inconsistencies. + */ +-.macro UNWIND_HINT sp_reg=ORC_REG_SP sp_offset=0 type=ORC_TYPE_CALL ++.macro UNWIND_HINT sp_reg=ORC_REG_SP sp_offset=0 type=ORC_TYPE_CALL end=0 + #ifdef CONFIG_STACK_VALIDATION + .Lunwind_hint_ip_\@: + .pushsection .discard.unwind_hints +@@ -35,12 +35,14 @@ + .short \sp_offset + .byte \sp_reg + .byte \type ++ .byte \end ++ .balign 4 + .popsection + #endif + .endm + + .macro UNWIND_HINT_EMPTY +- UNWIND_HINT sp_reg=ORC_REG_UNDEFINED ++ UNWIND_HINT sp_reg=ORC_REG_UNDEFINED end=1 + .endm + + .macro UNWIND_HINT_REGS base=%rsp offset=0 indirect=0 extra=1 iret=0 +@@ -86,19 +88,21 @@ + + #else /* !__ASSEMBLY__ */ + +-#define UNWIND_HINT(sp_reg, sp_offset, type) \ ++#define UNWIND_HINT(sp_reg, sp_offset, type, end) \ + "987: \n\t" \ + ".pushsection .discard.unwind_hints\n\t" \ + /* struct unwind_hint */ \ + ".long 987b - .\n\t" \ +- ".short " __stringify(sp_offset) "\n\t" \ ++ ".short " __stringify(sp_offset) "\n\t" \ + ".byte " __stringify(sp_reg) "\n\t" \ + ".byte " __stringify(type) "\n\t" \ ++ ".byte " __stringify(end) "\n\t" \ ++ ".balign 4 \n\t" \ + ".popsection\n\t" + +-#define UNWIND_HINT_SAVE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_SAVE) ++#define UNWIND_HINT_SAVE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_SAVE, 0) + +-#define UNWIND_HINT_RESTORE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_RESTORE) ++#define UNWIND_HINT_RESTORE UNWIND_HINT(0, 0, UNWIND_HINT_TYPE_RESTORE, 0) + + #endif /* __ASSEMBLY__ */ + +--- a/arch/x86/kernel/unwind_orc.c ++++ b/arch/x86/kernel/unwind_orc.c +@@ -198,7 +198,7 @@ static int orc_sort_cmp(const void *_a, + * whitelisted .o files which didn't get objtool generation. + */ + orc_a = cur_orc_table + (a - cur_orc_ip_table); +- return orc_a->sp_reg == ORC_REG_UNDEFINED ? -1 : 1; ++ return orc_a->sp_reg == ORC_REG_UNDEFINED && !orc_a->end ? -1 : 1; + } + + #ifdef CONFIG_MODULES +@@ -352,7 +352,7 @@ static bool deref_stack_iret_regs(struct + + bool unwind_next_frame(struct unwind_state *state) + { +- unsigned long ip_p, sp, orig_ip, prev_sp = state->sp; ++ unsigned long ip_p, sp, orig_ip = state->ip, prev_sp = state->sp; + enum stack_type prev_type = state->stack_info.type; + struct orc_entry *orc; + bool indirect = false; +@@ -363,9 +363,9 @@ bool unwind_next_frame(struct unwind_sta + /* Don't let modules unload while we're reading their ORC data. */ + preempt_disable(); + +- /* Have we reached the end? */ ++ /* End-of-stack check for user tasks: */ + if (state->regs && user_mode(state->regs)) +- goto done; ++ goto the_end; + + /* + * Find the orc_entry associated with the text address. +@@ -374,9 +374,16 @@ bool unwind_next_frame(struct unwind_sta + * calls and calls to noreturn functions. + */ + orc = orc_find(state->signal ? state->ip : state->ip - 1); +- if (!orc || orc->sp_reg == ORC_REG_UNDEFINED) +- goto done; +- orig_ip = state->ip; ++ if (!orc) ++ goto err; ++ ++ /* End-of-stack check for kernel threads: */ ++ if (orc->sp_reg == ORC_REG_UNDEFINED) { ++ if (!orc->end) ++ goto err; ++ ++ goto the_end; ++ } + + /* Find the previous frame's stack: */ + switch (orc->sp_reg) { +@@ -402,7 +409,7 @@ bool unwind_next_frame(struct unwind_sta + if (!state->regs || !state->full_regs) { + orc_warn("missing regs for base reg R10 at ip %pB\n", + (void *)state->ip); +- goto done; ++ goto err; + } + sp = state->regs->r10; + break; +@@ -411,7 +418,7 @@ bool unwind_next_frame(struct unwind_sta + if (!state->regs || !state->full_regs) { + orc_warn("missing regs for base reg R13 at ip %pB\n", + (void *)state->ip); +- goto done; ++ goto err; + } + sp = state->regs->r13; + break; +@@ -420,7 +427,7 @@ bool unwind_next_frame(struct unwind_sta + if (!state->regs || !state->full_regs) { + orc_warn("missing regs for base reg DI at ip %pB\n", + (void *)state->ip); +- goto done; ++ goto err; + } + sp = state->regs->di; + break; +@@ -429,7 +436,7 @@ bool unwind_next_frame(struct unwind_sta + if (!state->regs || !state->full_regs) { + orc_warn("missing regs for base reg DX at ip %pB\n", + (void *)state->ip); +- goto done; ++ goto err; + } + sp = state->regs->dx; + break; +@@ -437,12 +444,12 @@ bool unwind_next_frame(struct unwind_sta + default: + orc_warn("unknown SP base reg %d for ip %pB\n", + orc->sp_reg, (void *)state->ip); +- goto done; ++ goto err; + } + + if (indirect) { + if (!deref_stack_reg(state, sp, &sp)) +- goto done; ++ goto err; + } + + /* Find IP, SP and possibly regs: */ +@@ -451,7 +458,7 @@ bool unwind_next_frame(struct unwind_sta + ip_p = sp - sizeof(long); + + if (!deref_stack_reg(state, ip_p, &state->ip)) +- goto done; ++ goto err; + + state->ip = ftrace_graph_ret_addr(state->task, &state->graph_idx, + state->ip, (void *)ip_p); +@@ -465,7 +472,7 @@ bool unwind_next_frame(struct unwind_sta + if (!deref_stack_regs(state, sp, &state->ip, &state->sp)) { + orc_warn("can't dereference registers at %p for ip %pB\n", + (void *)sp, (void *)orig_ip); +- goto done; ++ goto err; + } + + state->regs = (struct pt_regs *)sp; +@@ -477,7 +484,7 @@ bool unwind_next_frame(struct unwind_sta + if (!deref_stack_iret_regs(state, sp, &state->ip, &state->sp)) { + orc_warn("can't dereference iret registers at %p for ip %pB\n", + (void *)sp, (void *)orig_ip); +- goto done; ++ goto err; + } + + state->regs = (void *)sp - IRET_FRAME_OFFSET; +@@ -500,18 +507,18 @@ bool unwind_next_frame(struct unwind_sta + + case ORC_REG_PREV_SP: + if (!deref_stack_reg(state, sp + orc->bp_offset, &state->bp)) +- goto done; ++ goto err; + break; + + case ORC_REG_BP: + if (!deref_stack_reg(state, state->bp + orc->bp_offset, &state->bp)) +- goto done; ++ goto err; + break; + + default: + orc_warn("unknown BP base reg %d for ip %pB\n", + orc->bp_reg, (void *)orig_ip); +- goto done; ++ goto err; + } + + /* Prevent a recursive loop due to bad ORC data: */ +@@ -520,13 +527,16 @@ bool unwind_next_frame(struct unwind_sta + state->sp <= prev_sp) { + orc_warn("stack going in the wrong direction? ip=%pB\n", + (void *)orig_ip); +- goto done; ++ goto err; + } + + preempt_enable(); + return true; + +-done: ++err: ++ state->error = true; ++ ++the_end: + preempt_enable(); + state->stack_info.type = STACK_TYPE_UNKNOWN; + return false; +--- a/tools/objtool/arch/x86/include/asm/orc_types.h ++++ b/tools/objtool/arch/x86/include/asm/orc_types.h +@@ -88,6 +88,7 @@ struct orc_entry { + unsigned sp_reg:4; + unsigned bp_reg:4; + unsigned type:2; ++ unsigned end:1; + } __packed; + + /* +@@ -101,6 +102,7 @@ struct unwind_hint { + s16 sp_offset; + u8 sp_reg; + u8 type; ++ u8 end; + }; + #endif /* __ASSEMBLY__ */ + +--- a/tools/objtool/check.c ++++ b/tools/objtool/check.c +@@ -1134,6 +1134,7 @@ static int read_unwind_hints(struct objt + + cfa->offset = hint->sp_offset; + insn->state.type = hint->type; ++ insn->state.end = hint->end; + } + + return 0; +--- a/tools/objtool/check.h ++++ b/tools/objtool/check.h +@@ -31,7 +31,7 @@ struct insn_state { + int stack_size; + unsigned char type; + bool bp_scratch; +- bool drap; ++ bool drap, end; + int drap_reg, drap_offset; + struct cfi_reg vals[CFI_NUM_REGS]; + }; +--- a/tools/objtool/orc_dump.c ++++ b/tools/objtool/orc_dump.c +@@ -203,7 +203,8 @@ int orc_dump(const char *_objname) + + print_reg(orc[i].bp_reg, orc[i].bp_offset); + +- printf(" type:%s\n", orc_type_name(orc[i].type)); ++ printf(" type:%s end:%d\n", ++ orc_type_name(orc[i].type), orc[i].end); + } + + elf_end(elf); +--- a/tools/objtool/orc_gen.c ++++ b/tools/objtool/orc_gen.c +@@ -31,6 +31,8 @@ int create_orc(struct objtool_file *file + struct cfi_reg *cfa = &insn->state.cfa; + struct cfi_reg *bp = &insn->state.regs[CFI_BP]; + ++ orc->end = insn->state.end; ++ + if (cfa->base == CFI_UNDEFINED) { + orc->sp_reg = ORC_REG_UNDEFINED; + continue; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch new/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch --- old/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,40 @@ +From: Jiri Slaby <[email protected]> +Date: Fri, 18 May 2018 08:47:13 +0200 +Subject: x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/asm +Git-commit: 6415b38bae2641ab6e173ffa4ff6a453b60ba99b +Patch-mainline: Queued in subsystem maintainer repository +References: bnc#1058115 + +In SUSE, we need a reliable stack unwinder for kernel live patching, but +we do not want to enable frame pointers for performance reasons. So +after the previous patches to make the ORC reliable, mark ORC as a +reliable stack unwinder on x86. + +Signed-off-by: Jiri Slaby <[email protected]> +Acked-by: Josh Poimboeuf <[email protected]> +Cc: Andy Lutomirski <[email protected]> +Cc: Borislav Petkov <[email protected]> +Cc: Brian Gerst <[email protected]> +Cc: Denys Vlasenko <[email protected]> +Cc: H. Peter Anvin <[email protected]> +Cc: Linus Torvalds <[email protected]> +Cc: Peter Zijlstra <[email protected]> +Cc: Thomas Gleixner <[email protected]> +Link: https://lkml.kernel.org/lkml/[email protected] +Signed-off-by: Ingo Molnar <[email protected]> +--- + arch/x86/Kconfig | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +--- a/arch/x86/Kconfig ++++ b/arch/x86/Kconfig +@@ -179,7 +179,7 @@ config X86 + select HAVE_PERF_USER_STACK_DUMP + select HAVE_RCU_TABLE_FREE + select HAVE_REGS_AND_STACK_ACCESS_API +- select HAVE_RELIABLE_STACKTRACE if X86_64 && UNWINDER_FRAME_POINTER && STACK_VALIDATION ++ select HAVE_RELIABLE_STACKTRACE if X86_64 && (UNWINDER_FRAME_POINTER || UNWINDER_ORC) && STACK_VALIDATION + select HAVE_STACK_VALIDATION if X86_64 + select HAVE_SYSCALL_TRACEPOINTS + select HAVE_UNSTABLE_SCHED_CLOCK diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch new/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch --- old/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,59 @@ +From: Dmitry Torokhov <[email protected]> +Date: Mon, 25 Jun 2018 12:09:57 -0700 +Subject: Input: psmouse - fix button reporting for basic protocols +Patch-mainline: submitted on 2018/06/25 +References: bnc#1098392 + +The commit ba667650c568 ("Input: psmouse - clean up code") was pretty +brain-dead and broke extra buttons reporting for variety of PS/2 mice: +Genius, Thinkmouse and Intellimouse Explorer. We need to actually inspect +the data coming from the device when reporting events. + +Fixes: ba667650c568 ("Input: psmouse - clean up code") +Reported-by: Jiri Slaby <[email protected]> +Cc: [email protected] +Signed-off-by: Dmitry Torokhov <[email protected]> +Signed-off-by: Jiri Slaby <[email protected]> +--- + drivers/input/mouse/psmouse-base.c | 12 ++++++------ + 1 file changed, 6 insertions(+), 6 deletions(-) + +--- a/drivers/input/mouse/psmouse-base.c ++++ b/drivers/input/mouse/psmouse-base.c +@@ -192,8 +192,8 @@ psmouse_ret_t psmouse_process_byte(struc + else + input_report_rel(dev, REL_WHEEL, -wheel); + +- input_report_key(dev, BTN_SIDE, BIT(4)); +- input_report_key(dev, BTN_EXTRA, BIT(5)); ++ input_report_key(dev, BTN_SIDE, packet[3] & BIT(4)); ++ input_report_key(dev, BTN_EXTRA, packet[3] & BIT(5)); + break; + } + break; +@@ -203,13 +203,13 @@ psmouse_ret_t psmouse_process_byte(struc + input_report_rel(dev, REL_WHEEL, -(s8) packet[3]); + + /* Extra buttons on Genius NewNet 3D */ +- input_report_key(dev, BTN_SIDE, BIT(6)); +- input_report_key(dev, BTN_EXTRA, BIT(7)); ++ input_report_key(dev, BTN_SIDE, packet[0] & BIT(6)); ++ input_report_key(dev, BTN_EXTRA, packet[0] & BIT(7)); + break; + + case PSMOUSE_THINKPS: + /* Extra button on ThinkingMouse */ +- input_report_key(dev, BTN_EXTRA, BIT(3)); ++ input_report_key(dev, BTN_EXTRA, packet[0] & BIT(3)); + + /* + * Without this bit of weirdness moving up gives wildly +@@ -223,7 +223,7 @@ psmouse_ret_t psmouse_process_byte(struc + * Cortron PS2 Trackball reports SIDE button in the + * 4th bit of the first byte. + */ +- input_report_key(dev, BTN_SIDE, BIT(3)); ++ input_report_key(dev, BTN_SIDE, packet[0] & BIT(3)); + packet[0] |= BIT(3); + break; + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2 new/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2 --- old/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,38 @@ +From: Takashi Iwai <[email protected]> +Date: Fri, 22 Jun 2018 10:59:17 +0200 +Subject: [PATCH] platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, too +Message-Id: <[email protected]> +Patch-mainline: Submitted, platform-driver-x86 ML +References: bsc#1098626 + +The commit 5d9f40b56630 ("platform/x86: ideapad-laptop: Add +Y520-15IKBN to no_hw_rfkill") added the entry for Y20-15IKBN, and it +turned out that another variant, Y20-15IKBM, also requires the +no_hw_rfkill. + +Trim the last letter from the string so that it matches to both +Y20-15IKBN and Y20-15IKBM models. + +Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=1098626 +Cc: <[email protected]> +Signed-off-by: Takashi Iwai <[email protected]> + +--- + drivers/platform/x86/ideapad-laptop.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +--- a/drivers/platform/x86/ideapad-laptop.c ++++ b/drivers/platform/x86/ideapad-laptop.c +@@ -1080,10 +1080,10 @@ static const struct dmi_system_id no_hw_ + }, + }, + { +- .ident = "Lenovo Legion Y520-15IKBN", ++ .ident = "Lenovo Legion Y520-15IKB", + .matches = { + DMI_MATCH(DMI_SYS_VENDOR, "LENOVO"), +- DMI_MATCH(DMI_PRODUCT_VERSION, "Lenovo Y520-15IKBN"), ++ DMI_MATCH(DMI_PRODUCT_VERSION, "Lenovo Y520-15IKB"), + }, + }, + { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch new/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch --- old/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch 2018-06-26 08:45:20.000000000 +0200 @@ -0,0 +1,53 @@ +From 891f6a726cacbb87e5b06076693ffab53bd378d7 Mon Sep 17 00:00:00 2001 +From: Christian Borntraeger <[email protected]> +Date: Thu, 21 Jun 2018 14:49:38 +0200 +Subject: [PATCH] s390: Correct register corruption in critical section cleanup + +References: boo#1095717 +Patch-mainline: queued +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux.git +Git-commit: 891f6a726cacbb87e5b06076693ffab53bd378d7 + +In the critical section cleanup we must not mess with r1. For march=z9 +or older, larl + ex (instead of exrl) are used with r1 as a temporary +register. This can clobber r1 in several interrupt handlers. Fix this by +using r11 as a temp register. r11 is being saved by all callers of +cleanup_critical. + +Fixes: 6dd85fbb87 ("s390: move expoline assembler macros to a header") +Cc: [email protected] #v4.16 +Reported-by: Oliver Kurz <[email protected]> +Reported-by: Petr Tesařík <[email protected]> +Signed-off-by: Christian Borntraeger <[email protected]> +Reviewed-by: Hendrik Brueckner <[email protected]> +Signed-off-by: Martin Schwidefsky <[email protected]> +Acked-by: Michal Suchanek <[email protected]> +--- + arch/s390/kernel/entry.S | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/arch/s390/kernel/entry.S b/arch/s390/kernel/entry.S +index f03402efab4b..3891805bfcdd 100644 +--- a/arch/s390/kernel/entry.S ++++ b/arch/s390/kernel/entry.S +@@ -1265,7 +1265,7 @@ cleanup_critical: + jl 0f + clg %r9,BASED(.Lcleanup_table+104) # .Lload_fpu_regs_end + jl .Lcleanup_load_fpu_regs +-0: BR_EX %r14 ++0: BR_EX %r14,%r11 + + .align 8 + .Lcleanup_table: +@@ -1301,7 +1301,7 @@ cleanup_critical: + ni __SIE_PROG0C+3(%r9),0xfe # no longer in SIE + lctlg %c1,%c1,__LC_USER_ASCE # load primary asce + larl %r9,sie_exit # skip forward to sie_exit +- BR_EX %r14 ++ BR_EX %r14,%r11 + #endif + + .Lcleanup_system_call: +-- +2.13.6 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch new/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch --- old/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch 2018-06-16 12:33:07.000000000 +0200 +++ new/patches.suse/socket-close-race-condition-between-sock_close-and-s.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,89 +0,0 @@ -From: Cong Wang <[email protected]> -Date: Thu, 7 Jun 2018 13:39:49 -0700 -Subject: socket: close race condition between sock_close() and sockfs_setattr() -Patch-mainline: v4.18-rc1 -Git-commit: 6d8c50dcb029872b298eea68cc6209c866fd3e14 -References: CVE-2018-12232 bsc#1097593 - -fchownat() doesn't even hold refcnt of fd until it figures out -fd is really needed (otherwise is ignored) and releases it after -it resolves the path. This means sock_close() could race with -sockfs_setattr(), which leads to a NULL pointer dereference -since typically we set sock->sk to NULL in ->release(). - -As pointed out by Al, this is unique to sockfs. So we can fix this -in socket layer by acquiring inode_lock in sock_close() and -checking against NULL in sockfs_setattr(). - -sock_release() is called in many places, only the sock_close() -path matters here. And fortunately, this should not affect normal -sock_close() as it is only called when the last fd refcnt is gone. -It only affects sock_close() with a parallel sockfs_setattr() in -progress, which is not common. - -Fixes: 86741ec25462 ("net: core: Add a UID field to struct sock.") -Reported-by: shankarapailoor <[email protected]> -Cc: Tetsuo Handa <[email protected]> -Cc: Lorenzo Colitti <[email protected]> -Cc: Al Viro <[email protected]> -Signed-off-by: Cong Wang <[email protected]> -Signed-off-by: David S. Miller <[email protected]> -Acked-by: Michal Kubecek <[email protected]> - ---- - net/socket.c | 18 +++++++++++++++--- - 1 file changed, 15 insertions(+), 3 deletions(-) - ---- a/net/socket.c -+++ b/net/socket.c -@@ -537,7 +537,10 @@ static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr) - if (!err && (iattr->ia_valid & ATTR_UID)) { - struct socket *sock = SOCKET_I(d_inode(dentry)); - -- sock->sk->sk_uid = iattr->ia_uid; -+ if (sock->sk) -+ sock->sk->sk_uid = iattr->ia_uid; -+ else -+ err = -ENOENT; - } - - return err; -@@ -586,12 +589,16 @@ EXPORT_SYMBOL(sock_alloc); - * an inode not a file. - */ - --void sock_release(struct socket *sock) -+static void __sock_release(struct socket *sock, struct inode *inode) - { - if (sock->ops) { - struct module *owner = sock->ops->owner; - -+ if (inode) -+ inode_lock(inode); - sock->ops->release(sock); -+ if (inode) -+ inode_unlock(inode); - sock->ops = NULL; - module_put(owner); - } -@@ -605,6 +612,11 @@ void sock_release(struct socket *sock) - } - sock->file = NULL; - } -+ -+void sock_release(struct socket *sock) -+{ -+ __sock_release(sock, NULL); -+} - EXPORT_SYMBOL(sock_release); - - void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags) -@@ -1146,7 +1158,7 @@ static int sock_mmap(struct file *file, struct vm_area_struct *vma) - - static int sock_close(struct inode *inode, struct file *filp) - { -- sock_release(SOCKET_I(inode)); -+ __sock_release(SOCKET_I(inode), inode); - return 0; - } - ++++++ series.conf ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:33.567797510 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:33.567797510 +0200 @@ -89,6 +89,77 @@ patches.kernel.org/4.17.2-044-crypto-vmx-Remove-overly-verbose-printk-from-A.patch patches.kernel.org/4.17.2-045-crypto-omap-sham-fix-memleak.patch patches.kernel.org/4.17.2-046-Linux-4.17.2.patch + patches.kernel.org/4.17.3-001-net-aquantia-fix-unsigned-numvecs-comparison-w.patch + patches.kernel.org/4.17.3-002-bonding-re-evaluate-force_primary-when-the-pri.patch + patches.kernel.org/4.17.3-003-cdc_ncm-avoid-padding-beyond-end-of-skb.patch + patches.kernel.org/4.17.3-004-ipv6-allow-PMTU-exceptions-to-local-routes.patch + patches.kernel.org/4.17.3-005-net-dsa-add-error-handling-for-pskb_trim_rcsum.patch + patches.kernel.org/4.17.3-006-net-phy-dp83822-use-BMCR_ANENABLE-instead-of-B.patch + patches.kernel.org/4.17.3-007-net-sched-act_simple-fix-parsing-of-TCA_DEF_DA.patch + patches.kernel.org/4.17.3-008-tcp-verify-the-checksum-of-the-first-data-segm.patch + patches.kernel.org/4.17.3-009-tls-fix-use-after-free-in-tls_push_record.patch + patches.kernel.org/4.17.3-010-tls-fix-waitall-behavior-in-tls_sw_recvmsg.patch + patches.kernel.org/4.17.3-011-socket-close-race-condition-between-sock_close.patch + patches.kernel.org/4.17.3-012-udp-fix-rx-queue-len-reported-by-diag-and-proc.patch + patches.kernel.org/4.17.3-013-net-in-virtio_net_hdr-only-add-VLAN_HLEN-to-cs.patch + patches.kernel.org/4.17.3-014-hv_netvsc-Fix-a-network-regression-after-ifdow.patch + patches.kernel.org/4.17.3-015-ACPICA-AML-parser-attempt-to-continue-loading-.patch + patches.kernel.org/4.17.3-016-ext4-fix-hole-length-detection-in-ext4_ind_map.patch + patches.kernel.org/4.17.3-017-ext4-update-mtime-in-ext4_punch_hole-even-if-n.patch + patches.kernel.org/4.17.3-018-ext4-do-not-allow-external-inodes-for-inline-d.patch + patches.kernel.org/4.17.3-019-ext4-bubble-errors-from-ext4_find_inline_data_.patch + patches.kernel.org/4.17.3-020-ext4-correctly-handle-a-zero-length-xattr-with.patch + patches.kernel.org/4.17.3-021-ext4-fix-fencepost-error-in-check-for-inode-co.patch + patches.kernel.org/4.17.3-022-driver-core-Don-t-ignore-class_dir_create_and_.patch + patches.kernel.org/4.17.3-023-Btrfs-allow-empty-subvol-again.patch + patches.kernel.org/4.17.3-024-Btrfs-fix-clone-vs-chattr-NODATASUM-race.patch + patches.kernel.org/4.17.3-025-Btrfs-fix-memory-and-mount-leak-in-btrfs_ioctl.patch + patches.kernel.org/4.17.3-026-btrfs-return-error-value-if-create_io_em-faile.patch + patches.kernel.org/4.17.3-027-btrfs-scrub-Don-t-use-inode-pages-for-device-r.patch + patches.kernel.org/4.17.3-028-ALSA-usb-audio-Disable-the-quirk-for-Nura-head.patch + patches.kernel.org/4.17.3-029-ALSA-hda-realtek-Enable-mic-mute-hotkey-for-se.patch + patches.kernel.org/4.17.3-030-ALSA-hda-conexant-Add-fixup-for-HP-Z2-G4-works.patch + patches.kernel.org/4.17.3-031-ALSA-hda-Handle-kzalloc-failure-in-snd_hda_att.patch + patches.kernel.org/4.17.3-032-ALSA-hda-add-dock-and-led-support-for-HP-Elite.patch + patches.kernel.org/4.17.3-033-ALSA-hda-add-dock-and-led-support-for-HP-ProBo.patch + patches.kernel.org/4.17.3-034-x86-MCE-Fix-stack-out-of-bounds-write-in-mce-i.patch + patches.kernel.org/4.17.3-035-smb3-fix-various-xid-leaks.patch + patches.kernel.org/4.17.3-036-smb3-on-reconnect-set-PreviousSessionId-field.patch + patches.kernel.org/4.17.3-037-CIFS-511c54a2f69195b28afb9dd119f03787b1625bb4-.patch + patches.kernel.org/4.17.3-038-cifs-For-SMB2-security-informaion-query-check-.patch + patches.kernel.org/4.17.3-039-nbd-fix-nbd-device-deletion.patch + patches.kernel.org/4.17.3-040-nbd-update-size-when-connected.patch + patches.kernel.org/4.17.3-041-nbd-use-bd_set_size-when-updating-disk-size.patch + patches.kernel.org/4.17.3-042-blk-mq-reinit-q-tag_set_list-entry-only-after-.patch + patches.kernel.org/4.17.3-043-bdi-Move-cgroup-bdi_writeback-to-a-dedicated-l.patch + patches.kernel.org/4.17.3-044-cpufreq-Fix-new-policy-initialization-during-l.patch + patches.kernel.org/4.17.3-045-cpufreq-ti-cpufreq-Fix-an-incorrect-error-retu.patch + patches.kernel.org/4.17.3-046-cpufreq-governors-Fix-long-idle-detection-logi.patch + patches.kernel.org/4.17.3-047-libata-zpodd-small-read-overflow-in-eject_tray.patch + patches.kernel.org/4.17.3-048-libata-Drop-SanDisk-SD7UB3Q-G1001-NOLPM-quirk.patch + patches.kernel.org/4.17.3-049-nvme-pci-Sync-controller-reset-for-AER-slot_re.patch + patches.kernel.org/4.17.3-050-w1-mxc_w1-Enable-clock-before-calling-clk_get_.patch + patches.kernel.org/4.17.3-051-x86-vector-Fix-the-args-of-vector_alloc-tracep.patch + patches.kernel.org/4.17.3-052-x86-apic-vector-Prevent-hlist-corruption-and-l.patch + patches.kernel.org/4.17.3-053-x86-apic-Provide-apic_ack_irq.patch + patches.kernel.org/4.17.3-054-x86-ioapic-Use-apic_ack_irq.patch + patches.kernel.org/4.17.3-055-x86-platform-uv-Use-apic_ack_irq.patch + patches.kernel.org/4.17.3-056-irq_remapping-Use-apic_ack_irq.patch + patches.kernel.org/4.17.3-057-genirq-generic_pending-Do-not-lose-pending-aff.patch + patches.kernel.org/4.17.3-058-genirq-affinity-Defer-affinity-setting-if-irq-.patch + patches.kernel.org/4.17.3-059-genirq-migration-Avoid-out-of-line-call-if-pen.patch + patches.kernel.org/4.17.3-060-x86-intel_rdt-Enable-CMT-and-MBM-on-new-Skylak.patch + patches.kernel.org/4.17.3-061-media-uvcvideo-Prevent-setting-unavailable-fla.patch + patches.kernel.org/4.17.3-062-media-rc-ensure-input-lirc-device-can-be-opene.patch + patches.kernel.org/4.17.3-063-iwlwifi-fw-harden-page-loading-code.patch + patches.kernel.org/4.17.3-064-orangefs-set-i_size-on-new-symlink.patch + patches.kernel.org/4.17.3-065-orangefs-report-attributes_mask-and-attributes.patch + patches.kernel.org/4.17.3-066-HID-intel_ish-hid-ipc-register-more-pm-callbac.patch + patches.kernel.org/4.17.3-067-HID-wacom-Correct-logical-maximum-Y-for-2nd-ge.patch + patches.kernel.org/4.17.3-068-vhost-fix-info-leak-due-to-uninitialized-memor.patch + patches.kernel.org/4.17.3-069-fs-binfmt_misc.c-do-not-allow-offset-overflow.patch + patches.kernel.org/4.17.3-070-mm-page_alloc-do-not-break-__GFP_THISNODE-by-z.patch + patches.kernel.org/4.17.3-071-Linux-4.17.3.patch ######################################################## # Build fixes that apply to the vanilla kernel too. @@ -217,6 +288,8 @@ # S/390 ######################################################## + patches.suse/s390-fix-random-crashes-illegal-operation-0001-ilc-1.patch + ######################################################## # VM/FS patches ######################################################## @@ -268,7 +341,6 @@ ######################################################## # Networking Core ######################################################## - patches.suse/socket-close-race-condition-between-sock_close-and-s.patch ######################################################## # Netfilter @@ -405,6 +477,7 @@ # Input & Console ######################################################## patches.suse/HID-redragon-Fix-modifier-keys-for-Redragon-Asura-Ke.patch + patches.suse/input-psmouse-fix-button-reporting-for-basic-protoco.patch ########################################################## # Sound @@ -419,6 +492,8 @@ ######################################################## patches.suse/mtd-spi-nor-intel-spi-Fix-atomic-sequence-handling + patches.suse/platform-x86-ideapad-laptop-Apply-no_hw_rfkill-to-Y2 + ######################################################## # Other drivers we have added to the tree ######################################################## @@ -470,12 +545,12 @@ ######################################################## patches.suse/crasher.patch - # submitted - patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch - patches.suse/0002-x86-stacktrace-make-clear-the-success-paths.patch - patches.suse/0003-x86-stacktrace-remove-STACKTRACE_DUMP_ONCE-from-__sa.patch - patches.suse/0004-x86-stacktrace-do-not-fail-for-ORC-with-regs-on-stac.patch - patches.suse/0005-x86-stacktrace-orc-mark-it-as-reliable.patch + patches.suse/0001-x86-stacktrace-Do-not-unwind-after-user-regs.patch + patches.suse/0002-x86-stacktrace-Remove-STACKTRACE_DUMP_ONCE.patch + patches.suse/0003-x86-stacktrace-Clarify-the-reliable-success-paths.patch + patches.suse/0004-x86-stacktrace-Do-not-fail-for-ORC-with-regs-on-stac.patch + patches.suse/0005-x86-unwind-orc-Detect-the-end-of-the-stack.patch + patches.suse/0006-x86-stacktrace-Enable-HAVE_RELIABLE_STACKTRACE-for-t.patch ######################################################## # Kdump ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.j4p4zx/_old 2018-06-28 15:11:33.599797451 +0200 +++ /var/tmp/diff_new_pack.j4p4zx/_new 2018-06-28 15:11:33.599797451 +0200 @@ -1,3 +1,3 @@ -2018-06-16 12:58:03 +0200 -GIT Revision: ddde22df2f7bdef9ba4a6fec7f559f2f71929acc +2018-06-26 08:45:20 +0200 +GIT Revision: e8dc1b5f84d0410c70dbdc114e864152fabbf5d7 GIT Branch: stable
