Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2020-10-20 15:59:48 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new.3486 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source" Tue Oct 20 15:59:48 2020 rev:557 rq:842044 version:5.8.15 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2020-10-08 13:10:18.175070239 +0200 +++ /work/SRC/openSUSE:Factory/.kernel-source.new.3486/dtb-aarch64.changes 2020-10-20 16:00:25.001725850 +0200 @@ -1,0 +2,247 @@ +Thu Oct 15 10:09:30 CEST 2020 - jsl...@suse.cz + +- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp + on GCC 10 compiled kernels (bsc#1176907). +- commit c680e93 + +------------------------------------------------------------------- +Thu Oct 15 09:19:08 CEST 2020 - jsl...@suse.cz + +- Bluetooth: L2CAP: Fix calling sk_filter on non-socket based + channel (bsc#1177724 CVE-2020-12351). +- commit 8f9e7d2 + +------------------------------------------------------------------- +Thu Oct 15 08:47:37 CEST 2020 - ti...@suse.de + +- Bluetooth: A2MP: Fix not initializing all members + (CVE-2020-12352 bsc#1177725). +- commit c64c556 + +------------------------------------------------------------------- +Wed Oct 14 13:33:46 CEST 2020 - ti...@suse.de + +- Update config files: CONFIG_PINCTRL_AMD=y for fixing dependency (bsc#1177049) +- commit f9a8fb6 + +------------------------------------------------------------------- +Wed Oct 14 13:13:19 CEST 2020 - jsl...@suse.cz + +- platform/x86: intel-vbtn: Revert "Fix SW_TABLET_MODE always + reporting 1 on the HP Pavilion 11 x360" (git-fixes). +- net_sched: check error pointer in tcf_dump_walker() (git-fixes). +- net_sched: remove a redundant goto chain check (git-fixes). +- net: qrtr: ns: Fix the incorrect usage of rcu_read_lock() + (git-fixes). +- commit db08e19 + +------------------------------------------------------------------- +Wed Oct 14 12:46:24 CEST 2020 - jsl...@suse.cz + +- platform/x86: intel-vbtn: Switch to an allow-list for + SW_TABLET_MODE reporting (bsc#1012628 bsc#1175599) +- commit 4144623 + +------------------------------------------------------------------- +Wed Oct 14 12:39:26 CEST 2020 - jsl...@suse.cz + +- Linux 5.8.15 (bsc#1012628). +- net_sched: commit action insertions together (bsc#1012628). +- net_sched: defer tcf_idr_insert() in tcf_action_init_1() + (bsc#1012628). +- net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read + locks (bsc#1012628). +- net: usb: rtl8150: set random MAC address when + set_ethernet_addr() fails (bsc#1012628). +- Input: ati_remote2 - add missing newlines when printing module + parameters (bsc#1012628). +- tty/vt: Do not warn when huge selection requested (bsc#1012628). +- net/mlx5e: Fix driver's declaration to support GRE offload + (bsc#1012628). +- net/tls: race causes kernel panic (bsc#1012628). +- net: bridge: fdb: don't flush ext_learn entries (bsc#1012628). +- net/core: check length before updating Ethertype in + skb_mpls_{push,pop} (bsc#1012628). +- netlink: fix policy dump leak (bsc#1012628). +- tcp: fix receive window update in tcp_add_backlog() + (bsc#1012628). +- mm: khugepaged: recalculate min_free_kbytes after memory + hotplug as expected by khugepaged (bsc#1012628). +- mm: validate inode in mapping_set_error() (bsc#1012628). +- mmc: core: don't set limits.discard_granularity as 0 + (bsc#1012628). +- perf: Fix task_function_call() error handling (bsc#1012628). +- afs: Fix deadlock between writeback and truncate (bsc#1012628). +- net: mscc: ocelot: divide watermark value by 60 when writing + to SYS_ATOP (bsc#1012628). +- net: mscc: ocelot: extend watermark encoding function + (bsc#1012628). +- net: mscc: ocelot: split writes to pause frame enable bit and + to thresholds (bsc#1012628). +- net: mscc: ocelot: rename ocelot_board.c to ocelot_vsc7514.c + (bsc#1012628). +- rxrpc: Fix server keyring leak (bsc#1012628). +- rxrpc: The server keyring isn't network-namespaced + (bsc#1012628). +- rxrpc: Fix some missing _bh annotations on locking + conn->state_lock (bsc#1012628). +- rxrpc: Downgrade the BUG() for unsupported token type in + rxrpc_read() (bsc#1012628). +- rxrpc: Fix rxkad token xdr encoding (bsc#1012628). +- net: mvneta: fix double free of txq->buf (bsc#1012628). +- vhost-vdpa: fix page pinning leakage in error path + (bsc#1012628). +- vhost-vdpa: fix vhost_vdpa_map() on error condition + (bsc#1012628). +- net: hinic: fix DEVLINK build errors (bsc#1012628). +- net: stmmac: Modify configuration method of EEE timers + (bsc#1012628). +- net/mlx5e: Fix race condition on nhe->n pointer in neigh update + (bsc#1012628). +- net/mlx5e: Fix VLAN create flow (bsc#1012628). +- net/mlx5e: Fix VLAN cleanup flow (bsc#1012628). +- net/mlx5e: Fix return status when setting unsupported FEC mode + (bsc#1012628). +- net/mlx5e: Add resiliency in Striding RQ mode for packets + larger than MTU (bsc#1012628). +- net/mlx5: Fix request_irqs error flow (bsc#1012628). +- net/mlx5: Add retry mechanism to the command entry index + allocation (bsc#1012628). +- net/mlx5: poll cmd EQ in case of command timeout (bsc#1012628). +- net/mlx5: Avoid possible free of command entry while timeout + comp handler (bsc#1012628). +- net/mlx5: Fix a race when moving command interface to polling + mode (bsc#1012628). +- pipe: Fix memory leaks in create_pipe_files() (bsc#1012628). +- octeontx2-pf: Fix synchnorization issue in mbox (bsc#1012628). +- octeontx2-pf: Fix the device state on error (bsc#1012628). +- octeontx2-pf: Fix TCP/UDP checksum offload for IPv6 frames + (bsc#1012628). +- octeontx2-af: Fix enable/disable of default NPC entries + (bsc#1012628). +- net: phy: realtek: fix rtl8211e rx/tx delay config + (bsc#1012628). +- virtio-net: don't disable guest csum when disable LRO + (bsc#1012628). +- net: usb: ax88179_178a: fix missing stop entry in driver_info + (bsc#1012628). +- r8169: fix RTL8168f/RTL8411 EPHY config (bsc#1012628). +- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error + path (bsc#1012628). +- mdio: fix mdio-thunder.c dependency & build error (bsc#1012628). +- bonding: set dev->needed_headroom in bond_setup_by_slave() + (bsc#1012628). +- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop + (bsc#1012628). +- net: stmmac: Fix clock handling on remove path (bsc#1012628). +- vmxnet3: fix cksum offload issues for non-udp tunnels + (bsc#1012628). +- ice: fix memory leak in ice_vsi_setup (bsc#1012628). +- ice: fix memory leak if register_netdev_fails (bsc#1012628). +- iavf: Fix incorrect adapter get in iavf_resume (bsc#1012628). +- iavf: use generic power management (bsc#1012628). +- xfrm: Use correct address family in xfrm_state_find + (bsc#1012628). +- net: dsa: felix: convert TAS link speed based on phylink speed + (bsc#1012628). +- hinic: fix wrong return value of mac-set cmd (bsc#1012628). +- hinic: add log in exception handling processes (bsc#1012628). +- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP + (bsc#1012628). +- platform/x86: fix kconfig dependency warning for LG_LAPTOP + (bsc#1012628). +- net: stmmac: removed enabling eee in EEE set callback + (bsc#1012628). +- xsk: Do not discard packet when NETDEV_TX_BUSY (bsc#1012628). +- xfrm: clone whole liftime_cur structure in xfrm_do_migrate + (bsc#1012628). +- xfrm: clone XFRMA_SEC_CTX in xfrm_do_migrate (bsc#1012628). +- xfrm: clone XFRMA_REPLAY_ESN_VAL in xfrm_do_migrate + (bsc#1012628). +- xfrm: clone XFRMA_SET_MARK in xfrm_do_migrate (bsc#1012628). +- iommu/vt-d: Fix lockdep splat in iommu_flush_dev_iotlb() + (bsc#1012628). +- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all + locks (bsc#1012628). +- drm/amd/display: fix return value check for hdcp_work + (bsc#1012628). +- drm/amd/pm: Removed fixed clock in auto mode DPM (bsc#1012628). +- io_uring: fix potential ABBA deadlock in ->show_fdinfo() + (bsc#1012628). +- btrfs: move btrfs_scratch_superblocks into + btrfs_dev_replace_finishing (bsc#1012628). +- drm/amdgpu: prevent double kfree ttm->sg (bsc#1012628). +- openvswitch: handle DNAT tuple collision (bsc#1012628). +- net: team: fix memory leak in __team_options_register + (bsc#1012628). +- team: set dev->needed_headroom in team_setup_by_port() + (bsc#1012628). +- sctp: fix sctp_auth_init_hmacs() error path (bsc#1012628). +- i2c: owl: Clear NACK and BUS error bits (bsc#1012628). +- i2c: meson: fixup rate calculation with filter delay + (bsc#1012628). +- i2c: meson: keep peripheral clock enabled (bsc#1012628). +- i2c: meson: fix clock setting overwrite (bsc#1012628). +- cifs: Fix incomplete memory allocation on setxattr path + (bsc#1012628). +- espintcp: restore IP CB before handing the packet to xfrm + (bsc#1012628). +- xfrmi: drop ignore_df check before updating pmtu (bsc#1012628). +- nvme-tcp: check page by sendpage_ok() before calling + kernel_sendpage() (bsc#1012628). +- tcp: use sendpage_ok() to detect misused .sendpage + (bsc#1012628). +- net: introduce helper sendpage_ok() in include/linux/net.h + (bsc#1012628). +- mm/khugepaged: fix filemap page_to_pgoff(page) != offset + (bsc#1012628). ++++ 50 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.3486/dtb-aarch64.changes dtb-armv6l.changes: same change dtb-armv7l.changes: same change dtb-riscv64.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-kvmsmall.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.365793266 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.365793266 +0200 @@ -17,7 +17,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-aarch64 -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change dtb-riscv64.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.481793320 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.485793322 +0200 @@ -18,7 +18,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 %define compress_modules xz @@ -68,9 +68,9 @@ Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0 Group: System/Kernel -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -179,10 +179,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed -Provides: kernel-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: kernel-%build_flavor-base-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 +Provides: kernel-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 # END COMMON DEPS -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh ++++++ kernel-debug.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.517793338 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.521793340 +0200 @@ -18,7 +18,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 %define compress_modules xz @@ -68,9 +68,9 @@ Summary: A Debug Version of the Kernel License: GPL-2.0 Group: System/Kernel -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -179,10 +179,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed -Provides: kernel-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: kernel-%build_flavor-base-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 +Provides: kernel-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 # END COMMON DEPS -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 %ifarch ppc64 Provides: kernel-kdump = 2.6.28 Obsoletes: kernel-kdump <= 2.6.28 ++++++ kernel-default.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.553793355 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.557793357 +0200 @@ -18,7 +18,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 %define compress_modules xz @@ -68,9 +68,9 @@ Summary: The Standard Kernel License: GPL-2.0 Group: System/Kernel -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -179,10 +179,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed -Provides: kernel-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: kernel-%build_flavor-base-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 +Provides: kernel-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 # END COMMON DEPS -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 %ifarch %ix86 Provides: kernel-smp = 2.6.17 Obsoletes: kernel-smp <= 2.6.17 ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.577793366 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.581793368 +0200 @@ -17,7 +17,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -31,9 +31,9 @@ Summary: Kernel Documentation License: GPL-2.0 Group: Documentation/Man -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -63,7 +63,7 @@ %endif Url: http://www.kernel.org/ Provides: %name = %version-%source_rel -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 BuildArch: noarch BuildRoot: %{_tmppath}/%{name}-%{version}-build Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz ++++++ kernel-kvmsmall.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.609793381 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.613793383 +0200 @@ -18,7 +18,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 %define compress_modules xz @@ -68,9 +68,9 @@ Summary: The Small Developer Kernel for KVM License: GPL-2.0 Group: System/Kernel -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -179,10 +179,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed -Provides: kernel-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: kernel-%build_flavor-base-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 +Provides: kernel-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 # END COMMON DEPS -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh kernel-lpae.spec: same change ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.669793410 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.669793410 +0200 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 @@ -45,7 +45,7 @@ %endif %endif %endif -BuildRequires: kernel%kernel_flavor-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +BuildRequires: kernel%kernel_flavor-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 %if 0%{?rhel_version} BuildRequires: kernel @@ -64,9 +64,9 @@ Summary: package kernel and initrd for OBS VM builds License: GPL-2.0 Group: SLES -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.693793421 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.697793423 +0200 @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -36,9 +36,9 @@ Summary: Basic QA tests for the kernel License: GPL-2.0 Group: SLES -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.721793434 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.725793436 +0200 @@ -18,7 +18,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 %define compress_modules xz @@ -68,9 +68,9 @@ Summary: Kernel with PAE Support License: GPL-2.0 Group: System/Kernel -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -179,10 +179,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed -Provides: kernel-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: kernel-%build_flavor-base-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 +Provides: kernel-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 # END COMMON DEPS -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 %ifarch %ix86 Provides: kernel-bigsmp = 2.6.17 Obsoletes: kernel-bigsmp <= 2.6.17 ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.753793449 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.757793451 +0200 @@ -18,7 +18,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 @@ -30,9 +30,9 @@ Summary: The Linux Kernel Sources License: GPL-2.0 Group: Development/Sources -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -43,7 +43,7 @@ BuildRequires: sed Requires(post): coreutils sed Provides: %name = %version-%source_rel -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 Provides: linux Provides: multiversion(kernel) Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.797793470 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.797793470 +0200 @@ -24,10 +24,10 @@ Summary: Kernel Symbol Versions (modversions) License: GPL-2.0 Group: Development/Sources -Version: 5.8.14 +Version: 5.8.15 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -52,7 +52,7 @@ %endif Requires: pesign-obs-integration Provides: %name = %version-%source_rel -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 Provides: multiversion(kernel) Source: README.KSYMS Requires: kernel-devel%variant = %version-%source_rel ++++++ kernel-vanilla.spec ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:47.829793485 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:47.833793487 +0200 @@ -18,7 +18,7 @@ %define srcversion 5.8 -%define patchversion 5.8.14 +%define patchversion 5.8.15 %define variant %{nil} %define vanilla_only 0 %define compress_modules xz @@ -68,9 +68,9 @@ Summary: The Standard Kernel - without any SUSE patches License: GPL-2.0 Group: System/Kernel -Version: 5.8.14 +Version: 5.8.15 %if 0%{?is_kotd} -Release: <RELEASE>.gcea47bb +Release: <RELEASE>.gc680e93 %else Release: 0 %endif @@ -179,10 +179,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed -Provides: kernel-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: kernel-%build_flavor-base-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 +Provides: kernel-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 # END COMMON DEPS -Provides: %name-srchash-cea47bbdbcc737161b624f5c96605ac282ec8fed +Provides: %name-srchash-c680e9353e2ed383d01d7da7cf68fd65898a2432 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh kernel-zfcpdump.spec: same change ++++++ config.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/i386/pae new/config/i386/pae --- old/config/i386/pae 2020-10-07 08:23:04.000000000 +0200 +++ new/config/i386/pae 2020-10-14 13:33:46.000000000 +0200 @@ -4544,7 +4544,7 @@ CONFIG_GENERIC_PINCONF=y # CONFIG_DEBUG_PINCTRL is not set CONFIG_PINCTRL_AXP209=m -CONFIG_PINCTRL_AMD=m +CONFIG_PINCTRL_AMD=y CONFIG_PINCTRL_DA9062=m # CONFIG_PINCTRL_MCP23S08 is not set # CONFIG_PINCTRL_SINGLE is not set diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/x86_64/default new/config/x86_64/default --- old/config/x86_64/default 2020-10-07 08:23:04.000000000 +0200 +++ new/config/x86_64/default 2020-10-14 13:33:46.000000000 +0200 @@ -4547,7 +4547,7 @@ CONFIG_PINCONF=y CONFIG_GENERIC_PINCONF=y # CONFIG_DEBUG_PINCTRL is not set -CONFIG_PINCTRL_AMD=m +CONFIG_PINCTRL_AMD=y CONFIG_PINCTRL_DA9062=m # CONFIG_PINCTRL_MCP23S08 is not set # CONFIG_PINCTRL_SX150X is not set ++++++ patches.kernel.org.tar.bz2 ++++++ ++++ 13282 lines of diff (skipped) ++++++ patches.suse.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/Bluetooth-A2MP-Fix-not-initializing-all-members.patch new/patches.suse/Bluetooth-A2MP-Fix-not-initializing-all-members.patch --- old/patches.suse/Bluetooth-A2MP-Fix-not-initializing-all-members.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/Bluetooth-A2MP-Fix-not-initializing-all-members.patch 2020-10-15 10:10:08.000000000 +0200 @@ -0,0 +1,125 @@ +From eddb7732119d53400f48a02536a84c509692faa8 Mon Sep 17 00:00:00 2001 +From: Luiz Augusto von Dentz <luiz.von.de...@intel.com> +Date: Thu, 6 Aug 2020 11:17:11 -0700 +Subject: [PATCH] Bluetooth: A2MP: Fix not initializing all members +Git-commit: eddb7732119d53400f48a02536a84c509692faa8 +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git +Patch-mainline: Queued in subsystem maintainer repository +References: CVE-2020-12352 bsc#1177725 + +This fixes various places where a stack variable is used uninitialized. + +Signed-off-by: Luiz Augusto von Dentz <luiz.von.de...@intel.com> +Signed-off-by: Marcel Holtmann <mar...@holtmann.org> +Acked-by: Takashi Iwai <ti...@suse.de> + +--- + net/bluetooth/a2mp.c | 22 +++++++++++++++++++++- + 1 file changed, 21 insertions(+), 1 deletion(-) + +diff --git a/net/bluetooth/a2mp.c b/net/bluetooth/a2mp.c +index 26526be579c7..da7fd7c8c2dc 100644 +--- a/net/bluetooth/a2mp.c ++++ b/net/bluetooth/a2mp.c +@@ -226,6 +226,9 @@ static int a2mp_discover_rsp(struct amp_mgr *mgr, struct sk_buff *skb, + struct a2mp_info_req req; + + found = true; ++ ++ memset(&req, 0, sizeof(req)); ++ + req.id = cl->id; + a2mp_send(mgr, A2MP_GETINFO_REQ, __next_ident(mgr), + sizeof(req), &req); +@@ -305,6 +308,8 @@ static int a2mp_getinfo_req(struct amp_mgr *mgr, struct sk_buff *skb, + if (!hdev || hdev->dev_type != HCI_AMP) { + struct a2mp_info_rsp rsp; + ++ memset(&rsp, 0, sizeof(rsp)); ++ + rsp.id = req->id; + rsp.status = A2MP_STATUS_INVALID_CTRL_ID; + +@@ -348,6 +353,8 @@ static int a2mp_getinfo_rsp(struct amp_mgr *mgr, struct sk_buff *skb, + if (!ctrl) + return -ENOMEM; + ++ memset(&req, 0, sizeof(req)); ++ + req.id = rsp->id; + a2mp_send(mgr, A2MP_GETAMPASSOC_REQ, __next_ident(mgr), sizeof(req), + &req); +@@ -376,6 +383,8 @@ static int a2mp_getampassoc_req(struct amp_mgr *mgr, struct sk_buff *skb, + struct a2mp_amp_assoc_rsp rsp; + rsp.id = req->id; + ++ memset(&rsp, 0, sizeof(rsp)); ++ + if (tmp) { + rsp.status = A2MP_STATUS_COLLISION_OCCURED; + amp_mgr_put(tmp); +@@ -464,7 +473,6 @@ static int a2mp_createphyslink_req(struct amp_mgr *mgr, struct sk_buff *skb, + struct a2mp_cmd *hdr) + { + struct a2mp_physlink_req *req = (void *) skb->data; +- + struct a2mp_physlink_rsp rsp; + struct hci_dev *hdev; + struct hci_conn *hcon; +@@ -475,6 +483,8 @@ static int a2mp_createphyslink_req(struct amp_mgr *mgr, struct sk_buff *skb, + + BT_DBG("local_id %d, remote_id %d", req->local_id, req->remote_id); + ++ memset(&rsp, 0, sizeof(rsp)); ++ + rsp.local_id = req->remote_id; + rsp.remote_id = req->local_id; + +@@ -553,6 +563,8 @@ static int a2mp_discphyslink_req(struct amp_mgr *mgr, struct sk_buff *skb, + + BT_DBG("local_id %d remote_id %d", req->local_id, req->remote_id); + ++ memset(&rsp, 0, sizeof(rsp)); ++ + rsp.local_id = req->remote_id; + rsp.remote_id = req->local_id; + rsp.status = A2MP_STATUS_SUCCESS; +@@ -675,6 +687,8 @@ static int a2mp_chan_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb) + if (err) { + struct a2mp_cmd_rej rej; + ++ memset(&rej, 0, sizeof(rej)); ++ + rej.reason = cpu_to_le16(0); + hdr = (void *) skb->data; + +@@ -898,6 +912,8 @@ void a2mp_send_getinfo_rsp(struct hci_dev *hdev) + + BT_DBG("%s mgr %p", hdev->name, mgr); + ++ memset(&rsp, 0, sizeof(rsp)); ++ + rsp.id = hdev->id; + rsp.status = A2MP_STATUS_INVALID_CTRL_ID; + +@@ -995,6 +1011,8 @@ void a2mp_send_create_phy_link_rsp(struct hci_dev *hdev, u8 status) + if (!mgr) + return; + ++ memset(&rsp, 0, sizeof(rsp)); ++ + hs_hcon = hci_conn_hash_lookup_state(hdev, AMP_LINK, BT_CONNECT); + if (!hs_hcon) { + rsp.status = A2MP_STATUS_UNABLE_START_LINK_CREATION; +@@ -1027,6 +1045,8 @@ void a2mp_discover_amp(struct l2cap_chan *chan) + + mgr->bredr_chan = chan; + ++ memset(&req, 0, sizeof(req)); ++ + req.mtu = cpu_to_le16(L2CAP_A2MP_DEFAULT_MTU); + req.ext_feat = 0; + a2mp_send(mgr, A2MP_DISCOVER_REQ, 1, sizeof(req), &req); +-- +2.16.4 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch new/patches.suse/Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch --- old/patches.suse/Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch 2020-10-15 10:10:08.000000000 +0200 @@ -0,0 +1,79 @@ +From: Luiz Augusto von Dentz <luiz.von.de...@intel.com> +Date: Thu, 6 Aug 2020 11:17:12 -0700 +Subject: Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git +Git-commit: f19425641cb2572a33cb074d5e30283720bd4d22 +Patch-mainline: Queued in subsystem maintainer repository +References: bsc#1177724 CVE-2020-12351 + +Only sockets will have the chan->data set to an actual sk, channels +like A2MP would have its own data which would likely cause a crash when +calling sk_filter, in order to fix this a new callback has been +introduced so channels can implement their own filtering if necessary. + +Signed-off-by: Luiz Augusto von Dentz <luiz.von.de...@intel.com> +Signed-off-by: Marcel Holtmann <mar...@holtmann.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + include/net/bluetooth/l2cap.h | 2 ++ + net/bluetooth/l2cap_core.c | 7 ++++--- + net/bluetooth/l2cap_sock.c | 14 ++++++++++++++ + 3 files changed, 20 insertions(+), 3 deletions(-) + +--- a/include/net/bluetooth/l2cap.h ++++ b/include/net/bluetooth/l2cap.h +@@ -665,6 +665,8 @@ struct l2cap_ops { + struct sk_buff *(*alloc_skb) (struct l2cap_chan *chan, + unsigned long hdr_len, + unsigned long len, int nb); ++ int (*filter) (struct l2cap_chan * chan, ++ struct sk_buff *skb); + }; + + struct l2cap_conn { +--- a/net/bluetooth/l2cap_core.c ++++ b/net/bluetooth/l2cap_core.c +@@ -7301,9 +7301,10 @@ static int l2cap_data_rcv(struct l2cap_c + goto drop; + } + +- if ((chan->mode == L2CAP_MODE_ERTM || +- chan->mode == L2CAP_MODE_STREAMING) && sk_filter(chan->data, skb)) +- goto drop; ++ if (chan->ops->filter) { ++ if (chan->ops->filter(chan, skb)) ++ goto drop; ++ } + + if (!control->sframe) { + int err; +--- a/net/bluetooth/l2cap_sock.c ++++ b/net/bluetooth/l2cap_sock.c +@@ -1663,6 +1663,19 @@ static void l2cap_sock_suspend_cb(struct + sk->sk_state_change(sk); + } + ++static int l2cap_sock_filter(struct l2cap_chan *chan, struct sk_buff *skb) ++{ ++ struct sock *sk = chan->data; ++ ++ switch (chan->mode) { ++ case L2CAP_MODE_ERTM: ++ case L2CAP_MODE_STREAMING: ++ return sk_filter(sk, skb); ++ } ++ ++ return 0; ++} ++ + static const struct l2cap_ops l2cap_chan_ops = { + .name = "L2CAP Socket Interface", + .new_connection = l2cap_sock_new_connection_cb, +@@ -1678,6 +1691,7 @@ static const struct l2cap_ops l2cap_chan + .get_sndtimeo = l2cap_sock_get_sndtimeo_cb, + .get_peer_pid = l2cap_sock_get_peer_pid_cb, + .alloc_skb = l2cap_sock_alloc_skb_cb, ++ .filter = l2cap_sock_filter, + }; + + static void l2cap_sock_destruct(struct sock *sk) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/net-qrtr-ns-Fix-the-incorrect-usage-of-rcu_read_lock.patch new/patches.suse/net-qrtr-ns-Fix-the-incorrect-usage-of-rcu_read_lock.patch --- old/patches.suse/net-qrtr-ns-Fix-the-incorrect-usage-of-rcu_read_lock.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/net-qrtr-ns-Fix-the-incorrect-usage-of-rcu_read_lock.patch 2020-10-15 10:10:08.000000000 +0200 @@ -0,0 +1,206 @@ +From: Manivannan Sadhasivam <manivannan.sadhasi...@linaro.org> +Date: Mon, 5 Oct 2020 12:46:42 +0530 +Subject: net: qrtr: ns: Fix the incorrect usage of rcu_read_lock() +Git-commit: 082bb94fe18e54cc64026a623d94ed6bc7242a5f +Patch-mainline: 5.9 +References: git-fixes + +The rcu_read_lock() is not supposed to lock the kernel_sendmsg() API +since it has the lock_sock() in qrtr_sendmsg() which will sleep. Hence, +fix it by excluding the locking for kernel_sendmsg(). + +While at it, let's also use radix_tree_deref_retry() to confirm the +validity of the pointer returned by radix_tree_deref_slot() and use +radix_tree_iter_resume() to resume iterating the tree properly before +releasing the lock as suggested by Doug. + +Fixes: a7809ff90ce6 ("net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks") +Reported-by: Douglas Anderson <diand...@chromium.org> +Reviewed-by: Douglas Anderson <diand...@chromium.org> +Tested-by: Douglas Anderson <diand...@chromium.org> +Tested-by: Alex Elder <el...@linaro.org> +Signed-off-by: Manivannan Sadhasivam <manivannan.sadhasi...@linaro.org> +Signed-off-by: David S. Miller <da...@davemloft.net> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + net/qrtr/ns.c | 76 ++++++++++++++++++++++++++++++++++++++++++++++++---------- + 1 file changed, 64 insertions(+), 12 deletions(-) + +--- a/net/qrtr/ns.c ++++ b/net/qrtr/ns.c +@@ -193,7 +193,7 @@ static int announce_servers(struct socka + struct qrtr_server *srv; + struct qrtr_node *node; + void __rcu **slot; +- int ret = 0; ++ int ret; + + node = node_get(qrtr_ns.local_node); + if (!node) +@@ -203,18 +203,27 @@ static int announce_servers(struct socka + /* Announce the list of servers registered in this node */ + radix_tree_for_each_slot(slot, &node->servers, &iter, 0) { + srv = radix_tree_deref_slot(slot); ++ if (!srv) ++ continue; ++ if (radix_tree_deref_retry(srv)) { ++ slot = radix_tree_iter_retry(&iter); ++ continue; ++ } ++ slot = radix_tree_iter_resume(slot, &iter); ++ rcu_read_unlock(); + + ret = service_announce_new(sq, srv); + if (ret < 0) { + pr_err("failed to announce new service\n"); +- goto err_out; ++ return ret; + } ++ ++ rcu_read_lock(); + } + +-err_out: + rcu_read_unlock(); + +- return ret; ++ return 0; + } + + static struct qrtr_server *server_add(unsigned int service, +@@ -339,7 +348,7 @@ static int ctrl_cmd_bye(struct sockaddr_ + struct qrtr_node *node; + void __rcu **slot; + struct kvec iv; +- int ret = 0; ++ int ret; + + iv.iov_base = &pkt; + iv.iov_len = sizeof(pkt); +@@ -352,7 +361,16 @@ static int ctrl_cmd_bye(struct sockaddr_ + /* Advertise removal of this client to all servers of remote node */ + radix_tree_for_each_slot(slot, &node->servers, &iter, 0) { + srv = radix_tree_deref_slot(slot); ++ if (!srv) ++ continue; ++ if (radix_tree_deref_retry(srv)) { ++ slot = radix_tree_iter_retry(&iter); ++ continue; ++ } ++ slot = radix_tree_iter_resume(slot, &iter); ++ rcu_read_unlock(); + server_del(node, srv->port); ++ rcu_read_lock(); + } + rcu_read_unlock(); + +@@ -368,6 +386,14 @@ static int ctrl_cmd_bye(struct sockaddr_ + rcu_read_lock(); + radix_tree_for_each_slot(slot, &local_node->servers, &iter, 0) { + srv = radix_tree_deref_slot(slot); ++ if (!srv) ++ continue; ++ if (radix_tree_deref_retry(srv)) { ++ slot = radix_tree_iter_retry(&iter); ++ continue; ++ } ++ slot = radix_tree_iter_resume(slot, &iter); ++ rcu_read_unlock(); + + sq.sq_family = AF_QIPCRTR; + sq.sq_node = srv->node; +@@ -379,14 +405,14 @@ static int ctrl_cmd_bye(struct sockaddr_ + ret = kernel_sendmsg(qrtr_ns.sock, &msg, &iv, 1, sizeof(pkt)); + if (ret < 0) { + pr_err("failed to send bye cmd\n"); +- goto err_out; ++ return ret; + } ++ rcu_read_lock(); + } + +-err_out: + rcu_read_unlock(); + +- return ret; ++ return 0; + } + + static int ctrl_cmd_del_client(struct sockaddr_qrtr *from, +@@ -404,7 +430,7 @@ static int ctrl_cmd_del_client(struct so + struct list_head *li; + void __rcu **slot; + struct kvec iv; +- int ret = 0; ++ int ret; + + iv.iov_base = &pkt; + iv.iov_len = sizeof(pkt); +@@ -447,6 +473,14 @@ static int ctrl_cmd_del_client(struct so + rcu_read_lock(); + radix_tree_for_each_slot(slot, &local_node->servers, &iter, 0) { + srv = radix_tree_deref_slot(slot); ++ if (!srv) ++ continue; ++ if (radix_tree_deref_retry(srv)) { ++ slot = radix_tree_iter_retry(&iter); ++ continue; ++ } ++ slot = radix_tree_iter_resume(slot, &iter); ++ rcu_read_unlock(); + + sq.sq_family = AF_QIPCRTR; + sq.sq_node = srv->node; +@@ -458,14 +492,14 @@ static int ctrl_cmd_del_client(struct so + ret = kernel_sendmsg(qrtr_ns.sock, &msg, &iv, 1, sizeof(pkt)); + if (ret < 0) { + pr_err("failed to send del client cmd\n"); +- goto err_out; ++ return ret; + } ++ rcu_read_lock(); + } + +-err_out: + rcu_read_unlock(); + +- return ret; ++ return 0; + } + + static int ctrl_cmd_new_server(struct sockaddr_qrtr *from, +@@ -571,16 +605,34 @@ static int ctrl_cmd_new_lookup(struct so + rcu_read_lock(); + radix_tree_for_each_slot(node_slot, &nodes, &node_iter, 0) { + node = radix_tree_deref_slot(node_slot); ++ if (!node) ++ continue; ++ if (radix_tree_deref_retry(node)) { ++ node_slot = radix_tree_iter_retry(&node_iter); ++ continue; ++ } ++ node_slot = radix_tree_iter_resume(node_slot, &node_iter); + + radix_tree_for_each_slot(srv_slot, &node->servers, + &srv_iter, 0) { + struct qrtr_server *srv; + + srv = radix_tree_deref_slot(srv_slot); ++ if (!srv) ++ continue; ++ if (radix_tree_deref_retry(srv)) { ++ srv_slot = radix_tree_iter_retry(&srv_iter); ++ continue; ++ } ++ + if (!server_match(srv, &filter)) + continue; + ++ srv_slot = radix_tree_iter_resume(srv_slot, &srv_iter); ++ ++ rcu_read_unlock(); + lookup_notify(from, srv, true); ++ rcu_read_lock(); + } + } + rcu_read_unlock(); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/net_sched-check-error-pointer-in-tcf_dump_walker.patch new/patches.suse/net_sched-check-error-pointer-in-tcf_dump_walker.patch --- old/patches.suse/net_sched-check-error-pointer-in-tcf_dump_walker.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/net_sched-check-error-pointer-in-tcf_dump_walker.patch 2020-10-15 10:10:08.000000000 +0200 @@ -0,0 +1,44 @@ +From: Cong Wang <xiyou.wangc...@gmail.com> +Date: Fri, 2 Oct 2020 12:13:34 -0700 +Subject: net_sched: check error pointer in tcf_dump_walker() +Git-commit: 580e4273d7a883ececfefa692c1f96bdbacb99b5 +Patch-mainline: 5.9 +References: git-fixes + +Although we take RTNL on dump path, it is possible to +skip RTNL on insertion path. So the following race condition +is possible: + +rtnl_lock() // no rtnl lock + mutex_lock(&idrinfo->lock); + // insert ERR_PTR(-EBUSY) + mutex_unlock(&idrinfo->lock); +tc_dump_action() +rtnl_unlock() + +So we have to skip those temporary -EBUSY entries on dump path +too. + +Reported-and-tested-by: syzbot+b47bc4f247856fb4d...@syzkaller.appspotmail.com +Fixes: 0fedc63fadf0 ("net_sched: commit action insertions together") +Cc: Vlad Buslov <vla...@mellanox.com> +Cc: Jamal Hadi Salim <j...@mojatatu.com> +Cc: Jiri Pirko <j...@resnulli.us> +Signed-off-by: Cong Wang <xiyou.wangc...@gmail.com> +Signed-off-by: David S. Miller <da...@davemloft.net> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + net/sched/act_api.c | 2 ++ + 1 file changed, 2 insertions(+) + +--- a/net/sched/act_api.c ++++ b/net/sched/act_api.c +@@ -235,6 +235,8 @@ static int tcf_dump_walker(struct tcf_id + index++; + if (index < s_i) + continue; ++ if (IS_ERR(p)) ++ continue; + + if (jiffy_since && + time_after(jiffy_since, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/net_sched-remove-a-redundant-goto-chain-check.patch new/patches.suse/net_sched-remove-a-redundant-goto-chain-check.patch --- old/patches.suse/net_sched-remove-a-redundant-goto-chain-check.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/net_sched-remove-a-redundant-goto-chain-check.patch 2020-10-15 10:10:08.000000000 +0200 @@ -0,0 +1,54 @@ +From: Cong Wang <xiyou.wangc...@gmail.com> +Date: Mon, 28 Sep 2020 11:31:03 -0700 +Subject: net_sched: remove a redundant goto chain check +Git-commit: 1aad8049909a6d3379175ef2824a68ac35c0b564 +Patch-mainline: 5.9 +References: git-fixes + +All TC actions call tcf_action_check_ctrlact() to validate +goto chain, so this check in tcf_action_init_1() is actually +redundant. Remove it to save troubles of leaking memory. + +Fixes: e49d8c22f126 ("net_sched: defer tcf_idr_insert() in tcf_action_init_1()") +Reported-by: Vlad Buslov <vla...@mellanox.com> +Suggested-by: Davide Caratti <dcara...@redhat.com> +Cc: Jamal Hadi Salim <j...@mojatatu.com> +Cc: Jiri Pirko <j...@resnulli.us> +Signed-off-by: Cong Wang <xiyou.wangc...@gmail.com> +Reviewed-by: Davide Caratti <dcara...@redhat.com> +Signed-off-by: David S. Miller <da...@davemloft.net> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + net/sched/act_api.c | 14 -------------- + 1 file changed, 14 deletions(-) + +--- a/net/sched/act_api.c ++++ b/net/sched/act_api.c +@@ -722,13 +722,6 @@ int tcf_action_destroy(struct tc_action + return ret; + } + +-static int tcf_action_destroy_1(struct tc_action *a, int bind) +-{ +- struct tc_action *actions[] = { a, NULL }; +- +- return tcf_action_destroy(actions, bind); +-} +- + static int tcf_action_put(struct tc_action *p) + { + return __tcf_action_put(p, false); +@@ -1000,13 +993,6 @@ struct tc_action *tcf_action_init_1(stru + if (err < 0) + goto err_mod; + +- if (TC_ACT_EXT_CMP(a->tcfa_action, TC_ACT_GOTO_CHAIN) && +- !rcu_access_pointer(a->goto_chain)) { +- tcf_action_destroy_1(a, bind); +- NL_SET_ERR_MSG(extack, "can't use goto chain with NULL chain"); +- return ERR_PTR(-EINVAL); +- } +- + if (!name && tb[TCA_ACT_COOKIE]) + tcf_set_action_cookie(&a->act_cookie, cookie); + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/platform-x86-intel-vbtn-Revert-Fix-SW_TABLET_MODE-al.patch new/patches.suse/platform-x86-intel-vbtn-Revert-Fix-SW_TABLET_MODE-al.patch --- old/patches.suse/platform-x86-intel-vbtn-Revert-Fix-SW_TABLET_MODE-al.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/platform-x86-intel-vbtn-Revert-Fix-SW_TABLET_MODE-al.patch 2020-10-15 10:10:08.000000000 +0200 @@ -0,0 +1,50 @@ +From: Andy Shevchenko <andriy.shevche...@linux.intel.com> +Date: Fri, 2 Oct 2020 17:29:59 +0300 +Subject: platform/x86: intel-vbtn: Revert "Fix SW_TABLET_MODE always reporting + 1 on the HP Pavilion 11 x360" +Git-commit: 21d64817c72470ed69483f59279ce557c0658826 +Patch-mainline: 5.9 +References: git-fixes + +After discussion, see the Link tag, it appears that this is not good enough. +So, revert it now and apply a better fix. + +This reverts commit d823346876a970522ff9e4d2b323c9b734dcc4de. + +Link: https://lore.kernel.org/platform-driver-x86/s5hft71klxl.wl-ti...@suse.de/ +Signed-off-by: Andy Shevchenko <andriy.shevche...@linux.intel.com> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + drivers/platform/x86/intel-vbtn.c | 12 ++++-------- + 1 file changed, 4 insertions(+), 8 deletions(-) + +--- a/drivers/platform/x86/intel-vbtn.c ++++ b/drivers/platform/x86/intel-vbtn.c +@@ -15,13 +15,9 @@ + #include <linux/platform_device.h> + #include <linux/suspend.h> + +-/* Returned when NOT in tablet mode on some HP Stream x360 11 models */ +-#define VGBS_TABLET_MODE_FLAG_ALT 0x10 + /* When NOT in tablet mode, VGBS returns with the flag 0x40 */ +-#define VGBS_TABLET_MODE_FLAG 0x40 +-#define VGBS_DOCK_MODE_FLAG 0x80 +- +-#define VGBS_TABLET_MODE_FLAGS (VGBS_TABLET_MODE_FLAG | VGBS_TABLET_MODE_FLAG_ALT) ++#define TABLET_MODE_FLAG 0x40 ++#define DOCK_MODE_FLAG 0x80 + + MODULE_LICENSE("GPL"); + MODULE_AUTHOR("AceLan Kao"); +@@ -76,9 +72,9 @@ static void detect_tablet_mode(struct pl + if (ACPI_FAILURE(status)) + return; + +- m = !(vgbs & VGBS_TABLET_MODE_FLAGS); ++ m = !(vgbs & TABLET_MODE_FLAG); + input_report_switch(priv->input_dev, SW_TABLET_MODE, m); +- m = (vgbs & VGBS_DOCK_MODE_FLAG) ? 1 : 0; ++ m = (vgbs & DOCK_MODE_FLAG) ? 1 : 0; + input_report_switch(priv->input_dev, SW_DOCK, m); + } + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/platform-x86-intel-vbtn-Switch-to-an-allow-list.patch new/patches.suse/platform-x86-intel-vbtn-Switch-to-an-allow-list.patch --- old/patches.suse/platform-x86-intel-vbtn-Switch-to-an-allow-list.patch 2020-10-07 08:22:07.000000000 +0200 +++ new/patches.suse/platform-x86-intel-vbtn-Switch-to-an-allow-list.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,129 +0,0 @@ -From: Hans de Goede <hdego...@redhat.com> -Subject: [PATCH v2] platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting -Date: Fri, 2 Oct 2020 21:23:07 +0200 -Message-id: <20201002192307.30681-1-hdego...@redhat.com> -Patch-mainline: Submitted, platform-x86 ML -References: bsc#1175599 - -2 recent commits: -cfae58ed681c ("platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE -on the 9 / "Laptop" chasis-type") -1fac39fd0316 ("platform/x86: intel-vbtn: Also handle tablet-mode switch on -"Detachable" and "Portable" chassis-types") - -Enabled reporting of SW_TABLET_MODE on more devices since the vbtn ACPI -interface is used by the firmware on some of those devices to report this. - -Testing has shown that unconditionally enabling SW_TABLET_MODE reporting -on all devices with a chassis type of 8 ("Portable") or 10 ("Notebook") -which support the VGBS method is a very bad idea. - -Many of these devices are normal laptops (non 2-in-1) models with a VGBS -which always returns 0, which we translate to SW_TABLET_MODE=1. This in -turn causes userspace (libinput) to suppress events from the builtin -keyboard and touchpad, making the laptop essentially unusable. - -Since the problem of wrongly reporting SW_TABLET_MODE=1 in combination -with libinput, leads to a non-usable system. Where as OTOH many people will -not even notice when SW_TABLET_MODE is not being reported, this commit -changes intel_vbtn_has_switches() to use a DMI based allow-list. - -The new DMI based allow-list matches on the 31 ("Convertible") and -32 ("Detachable") chassis-types, as these clearly are 2-in-1s and -so far if they support the intel-vbtn ACPI interface they all have -properly working SW_TABLET_MODE reporting. - -Besides these 2 generic matches, it also contains model specific matches -for 2-in-1 models which use a different chassis-type and which are known -to have properly working SW_TABLET_MODE reporting. - -This has been tested on the following 2-in-1 devices: - -Dell Venue 11 Pro 7130 vPro -HP Pavilion X2 10-p002nd -HP Stream x360 Convertible PC 11 -Medion E1239T - -Fixes: cfae58ed681c ("platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / "Laptop" chasis-type") -Buglink: https://forum.manjaro.org/t/keyboard-and-touchpad-only-work-on-kernel-5-6/22668 -Buglink: https://bugzilla.opensuse.org/show_bug.cgi?id=1175599 -Cc: Barnabás Pőcze <po...@protonmail.com> -Cc: Takashi Iwai <ti...@suse.de> -Signed-off-by: Hans de Goede <hdego...@redhat.com> -Acked-by: Takashi Iwai <ti...@suse.de> - ---- - drivers/platform/x86/intel-vbtn.c | 52 +++++++++++++++++++++++++------ - 1 file changed, 43 insertions(+), 9 deletions(-) - -diff --git a/drivers/platform/x86/intel-vbtn.c b/drivers/platform/x86/intel-vbtn.c -index e85d8e58320c..f5901b0b07cd 100644 ---- a/drivers/platform/x86/intel-vbtn.c -+++ b/drivers/platform/x86/intel-vbtn.c -@@ -167,20 +167,54 @@ static bool intel_vbtn_has_buttons(acpi_handle handle) - return ACPI_SUCCESS(status); - } - -+/* -+ * There are several laptops (non 2-in-1) models out there which support VGBS, -+ * but simply always return 0, which we translate to SW_TABLET_MODE=1. This in -+ * turn causes userspace (libinput) to suppress events from the builtin -+ * keyboard and touchpad, making the laptop essentially unusable. -+ * -+ * Since the problem of wrongly reporting SW_TABLET_MODE=1 in combination -+ * with libinput, leads to a non-usable system. Where as OTOH many people will -+ * not even notice when SW_TABLET_MODE is not being reported, a DMI based allow -+ * list is used here. This list mainly matches on the chassis-type of 2-in-1s. -+ * -+ * There are also some 2-in-1s which use the intel-vbtn ACPI interface to report -+ * SW_TABLET_MODE with a chassis-type of 8 ("Portable") or 10 ("Notebook"), -+ * these are matched on a per model basis, since many normal laptops with a -+ * possible broken VGBS ACPI-method also use these chassis-types. -+ */ -+static const struct dmi_system_id dmi_switches_allow_list[] = { -+ { -+ .matches = { -+ DMI_EXACT_MATCH(DMI_CHASSIS_TYPE, "31" /* Convertible */), -+ }, -+ }, -+ { -+ .matches = { -+ DMI_EXACT_MATCH(DMI_CHASSIS_TYPE, "32" /* Detachable */), -+ }, -+ }, -+ { -+ .matches = { -+ DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."), -+ DMI_MATCH(DMI_PRODUCT_NAME, "Venue 11 Pro 7130"), -+ }, -+ }, -+ { -+ .matches = { -+ DMI_MATCH(DMI_SYS_VENDOR, "Hewlett-Packard"), -+ DMI_MATCH(DMI_PRODUCT_NAME, "HP Stream x360 Convertible PC 11"), -+ }, -+ }, -+ {} /* Array terminator */ -+}; -+ - static bool intel_vbtn_has_switches(acpi_handle handle) - { -- const char *chassis_type = dmi_get_system_info(DMI_CHASSIS_TYPE); - unsigned long long vgbs; - acpi_status status; - -- /* -- * Some normal laptops have a VGBS method despite being non-convertible -- * and their VGBS method always returns 0, causing detect_tablet_mode() -- * to report SW_TABLET_MODE=1 to userspace, which causes issues. -- * These laptops have a DMI chassis_type of 9 ("Laptop"), do not report -- * switches on any devices with a DMI chassis_type of 9. -- */ -- if (chassis_type && strcmp(chassis_type, "9") == 0) -+ if (!dmi_check_system(dmi_switches_allow_list)) - return false; - - status = acpi_evaluate_integer(handle, "VGBS", NULL, &vgbs); --- -2.28.0 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/x86-unwind-orc-Fix-inactive-tasks-with-stack-pointer.patch new/patches.suse/x86-unwind-orc-Fix-inactive-tasks-with-stack-pointer.patch --- old/patches.suse/x86-unwind-orc-Fix-inactive-tasks-with-stack-pointer.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/x86-unwind-orc-Fix-inactive-tasks-with-stack-pointer.patch 2020-10-15 10:10:08.000000000 +0200 @@ -0,0 +1,138 @@ +From: Jiri Slaby <jsl...@suse.cz> +Date: Wed, 14 Oct 2020 07:30:51 +0200 +Subject: x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC + 10 compiled kernels +Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git#x86/urgent +Git-commit: f2ac57a4c49d40409c21c82d23b5706df9b438af +Patch-mainline: Queued in subsystem maintainer repository +References: bsc#1176907 + +GCC 10 optimizes the scheduler code differently than its predecessors. + +When CONFIG_DEBUG_SECTION_MISMATCH=y, the Makefile forces GCC not +to inline some functions (-fno-inline-functions-called-once). Before GCC +10, "no-inlined" __schedule() starts with the usual prologue: + + push %bp + mov %sp, %bp + +So the ORC unwinder simply picks stack pointer from %bp and +unwinds from __schedule() just perfectly: + + $ cat /proc/1/stack + [<0>] ep_poll+0x3e9/0x450 + [<0>] do_epoll_wait+0xaa/0xc0 + [<0>] __x64_sys_epoll_wait+0x1a/0x20 + [<0>] do_syscall_64+0x33/0x40 + [<0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 + +But now, with GCC 10, there is no %bp prologue in __schedule(): + + $ cat /proc/1/stack + <nothing> + +The ORC entry of the point in __schedule() is: + + sp:sp+88 bp:last_sp-48 type:call end:0 + +In this case, nobody subtracts sizeof "struct inactive_task_frame" in +__unwind_start(). The struct is put on the stack by __switch_to_asm() and +only then __switch_to_asm() stores %sp to task->thread.sp. But we start +unwinding from a point in __schedule() (stored in frame->ret_addr by +'call') and not in __switch_to_asm(). + +So for these example values in __unwind_start(): + + sp=ffff94b50001fdc8 bp=ffff8e1f41d29340 ip=__schedule+0x1f0 + +The stack is: + + ffff94b50001fdc8: ffff8e1f41578000 # struct inactive_task_frame + ffff94b50001fdd0: 0000000000000000 + ffff94b50001fdd8: ffff8e1f41d29340 + ffff94b50001fde0: ffff8e1f41611d40 # ... + ffff94b50001fde8: ffffffff93c41920 # bx + ffff94b50001fdf0: ffff8e1f41d29340 # bp + ffff94b50001fdf8: ffffffff9376cad0 # ret_addr (and end of the struct) + +0xffffffff9376cad0 is __schedule+0x1f0 (after the call to +__switch_to_asm). Now follow those 88 bytes from the ORC entry (sp+88). +The entry is correct, __schedule() really pushes 48 bytes (8*7) + 32 bytes +via subq to store some local values (like 4U below). So to unwind, look +at the offset 88-sizeof(long) = 0x50 from here: + + ffff94b50001fe00: ffff8e1f41578618 + ffff94b50001fe08: 00000cc000000255 + ffff94b50001fe10: 0000000500000004 + ffff94b50001fe18: 7793fab6956b2d00 # NOTE (see below) + ffff94b50001fe20: ffff8e1f41578000 + ffff94b50001fe28: ffff8e1f41578000 + ffff94b50001fe30: ffff8e1f41578000 + ffff94b50001fe38: ffff8e1f41578000 + ffff94b50001fe40: ffff94b50001fed8 + ffff94b50001fe48: ffff8e1f41577ff0 + ffff94b50001fe50: ffffffff9376cf12 + +Here ^^^^^^^^^^^^^^^^ is the correct ret addr from +__schedule(). It translates to schedule+0x42 (insn after a call to +__schedule()). + +BUT, unwind_next_frame() tries to take the address starting from +0xffff94b50001fdc8. That is exactly from thread.sp+88-sizeof(long) = +0xffff94b50001fdc8+88-8 = 0xffff94b50001fe18, which is garbage marked as +NOTE above. So this quits the unwinding as 7793fab6956b2d00 is obviously +not a kernel address. + +There was a fix to skip 'struct inactive_task_frame' in +unwind_get_return_address_ptr in the following commit: + + 187b96db5ca7 ("x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks") + +But we need to skip the struct already in the unwinder proper. So +subtract the size (increase the stack pointer) of the structure in +__unwind_start() directly. This allows for removal of the code added by +commit 187b96db5ca7 completely, as the address is now at +'(unsigned long *)state->sp - 1', the same as in the generic case. + +[ mingo: Cleaned up the changelog a bit, for better readability. ] + +Fixes: ee9f8fce9964 ("x86/unwind: Add the ORC unwinder") +Bug: https://bugzilla.suse.com/show_bug.cgi?id=1176907 +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +Signed-off-by: Ingo Molnar <mi...@kernel.org> +Link: https://lore.kernel.org/r/20201014053051.24199-1-jsl...@suse.cz +--- + arch/x86/kernel/unwind_orc.c | 9 +-------- + 1 file changed, 1 insertion(+), 8 deletions(-) + +--- a/arch/x86/kernel/unwind_orc.c ++++ b/arch/x86/kernel/unwind_orc.c +@@ -320,19 +320,12 @@ EXPORT_SYMBOL_GPL(unwind_get_return_addr + + unsigned long *unwind_get_return_address_ptr(struct unwind_state *state) + { +- struct task_struct *task = state->task; +- + if (unwind_done(state)) + return NULL; + + if (state->regs) + return &state->regs->ip; + +- if (task != current && state->sp == task->thread.sp) { +- struct inactive_task_frame *frame = (void *)task->thread.sp; +- return &frame->ret_addr; +- } +- + if (state->sp) + return (unsigned long *)state->sp - 1; + +@@ -662,7 +655,7 @@ void __unwind_start(struct unwind_state + } else { + struct inactive_task_frame *frame = (void *)task->thread.sp; + +- state->sp = task->thread.sp; ++ state->sp = task->thread.sp + sizeof(*frame); + state->bp = READ_ONCE_NOCHECK(frame->bp); + state->ip = READ_ONCE_NOCHECK(frame->ret_addr); + state->signal = (void *)state->ip == ret_from_fork; ++++++ series.conf ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:50.721794855 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:50.725794857 +0200 @@ -1939,6 +1939,130 @@ patches.kernel.org/5.8.14-084-epoll-EPOLL_CTL_ADD-close-the-race-in-decision.patch patches.kernel.org/5.8.14-085-ep_create_wakeup_source-dentry-name-can-change.patch patches.kernel.org/5.8.14-086-Linux-5.8.14.patch + patches.kernel.org/5.8.15-001-fbdev-newport_con-Move-FONT_EXTRA_WORDS-macros.patch + patches.kernel.org/5.8.15-002-Fonts-Support-FONT_EXTRA_WORDS-macros-for-buil.patch + patches.kernel.org/5.8.15-003-fbcon-Fix-global-out-of-bounds-read-in-fbcon_g.patch + patches.kernel.org/5.8.15-004-Revert-ravb-Fixed-to-be-able-to-unload-modules.patch + patches.kernel.org/5.8.15-005-bpf-Fix-scalar32_min_max_or-bounds-tracking.patch + patches.kernel.org/5.8.15-006-crypto-arm64-Use-x16-with-indirect-branch-to-b.patch + patches.kernel.org/5.8.15-007-exfat-fix-use-of-uninitialized-spinlock-on-err.patch + patches.kernel.org/5.8.15-008-net-wireless-nl80211-fix-out-of-bounds-access-.patch + patches.kernel.org/5.8.15-009-drm-nouveau-device-return-error-for-unknown-ch.patch + patches.kernel.org/5.8.15-010-drm-nouveau-mem-guard-against-NULL-pointer-acc.patch + patches.kernel.org/5.8.15-011-partitions-ibm-fix-non-DASD-devices.patch + patches.kernel.org/5.8.15-012-block-scsi-ioctl-Fix-kernel-infoleak-in-scsi_p.patch + patches.kernel.org/5.8.15-013-vhost-Don-t-call-access_ok-when-using-IOTLB.patch + patches.kernel.org/5.8.15-014-vhost-Use-vhost_get_used_size-in-vhost_vring_s.patch + patches.kernel.org/5.8.15-015-usermodehelper-reset-umask-to-default-before-e.patch + patches.kernel.org/5.8.15-016-splice-teach-splice-pipe-reading-about-empty-p.patch + patches.kernel.org/5.8.15-017-Platform-OLPC-Fix-memleak-in-olpc_ec_probe.patch + patches.kernel.org/5.8.15-018-platform-x86-intel-vbtn-Fix-SW_TABLET_MODE-alw.patch + patches.kernel.org/5.8.15-019-platform-x86-thinkpad_acpi-initialize-tp_nvram.patch + patches.kernel.org/5.8.15-020-platform-x86-asus-wmi-Fix-SW_TABLET_MODE-alway.patch + patches.kernel.org/5.8.15-021-bpf-Fix-sysfs-export-of-empty-BTF-section.patch + patches.kernel.org/5.8.15-022-bpf-Prevent-.BTF-section-elimination.patch + patches.kernel.org/5.8.15-023-r8169-consider-that-PHY-reset-may-still-be-in-.patch + patches.kernel.org/5.8.15-024-platform-x86-intel-vbtn-Switch-to-an-allow-lis.patch + patches.kernel.org/5.8.15-025-platform-x86-thinkpad_acpi-re-initialize-ACPI-.patch + patches.kernel.org/5.8.15-026-nvme-core-put-ctrl-ref-when-module-ref-get-fai.patch + patches.kernel.org/5.8.15-027-macsec-avoid-use-after-free-in-macsec_handle_f.patch + patches.kernel.org/5.8.15-028-RISC-V-Make-sure-memblock-reserves-the-memory-.patch + patches.kernel.org/5.8.15-029-gpiolib-Disable-compat-read-code-in-UML-case.patch + patches.kernel.org/5.8.15-030-mm-khugepaged-fix-filemap-page_to_pgoff-page-o.patch + patches.kernel.org/5.8.15-031-net-introduce-helper-sendpage_ok-in-include-li.patch + patches.kernel.org/5.8.15-032-tcp-use-sendpage_ok-to-detect-misused-.sendpag.patch + patches.kernel.org/5.8.15-033-nvme-tcp-check-page-by-sendpage_ok-before-call.patch + patches.kernel.org/5.8.15-034-xfrmi-drop-ignore_df-check-before-updating-pmt.patch + patches.kernel.org/5.8.15-035-espintcp-restore-IP-CB-before-handing-the-pack.patch + patches.kernel.org/5.8.15-036-cifs-Fix-incomplete-memory-allocation-on-setxa.patch + patches.kernel.org/5.8.15-037-i2c-meson-fix-clock-setting-overwrite.patch + patches.kernel.org/5.8.15-038-i2c-meson-keep-peripheral-clock-enabled.patch + patches.kernel.org/5.8.15-039-i2c-meson-fixup-rate-calculation-with-filter-d.patch + patches.kernel.org/5.8.15-040-i2c-owl-Clear-NACK-and-BUS-error-bits.patch + patches.kernel.org/5.8.15-041-sctp-fix-sctp_auth_init_hmacs-error-path.patch + patches.kernel.org/5.8.15-042-team-set-dev-needed_headroom-in-team_setup_by_.patch + patches.kernel.org/5.8.15-043-net-team-fix-memory-leak-in-__team_options_reg.patch + patches.kernel.org/5.8.15-044-openvswitch-handle-DNAT-tuple-collision.patch + patches.kernel.org/5.8.15-045-drm-amdgpu-prevent-double-kfree-ttm-sg.patch + patches.kernel.org/5.8.15-046-btrfs-move-btrfs_scratch_superblocks-into-btrf.patch + patches.kernel.org/5.8.15-047-io_uring-fix-potential-ABBA-deadlock-in-show_f.patch + patches.kernel.org/5.8.15-048-drm-amd-pm-Removed-fixed-clock-in-auto-mode-DP.patch + patches.kernel.org/5.8.15-049-drm-amd-display-fix-return-value-check-for-hdc.patch + patches.kernel.org/5.8.15-050-btrfs-move-btrfs_rm_dev_replace_free_srcdev-ou.patch + patches.kernel.org/5.8.15-051-iommu-vt-d-Fix-lockdep-splat-in-iommu_flush_de.patch + patches.kernel.org/5.8.15-052-xfrm-clone-XFRMA_SET_MARK-in-xfrm_do_migrate.patch + patches.kernel.org/5.8.15-053-xfrm-clone-XFRMA_REPLAY_ESN_VAL-in-xfrm_do_mig.patch + patches.kernel.org/5.8.15-054-xfrm-clone-XFRMA_SEC_CTX-in-xfrm_do_migrate.patch + patches.kernel.org/5.8.15-055-xfrm-clone-whole-liftime_cur-structure-in-xfrm.patch + patches.kernel.org/5.8.15-056-xsk-Do-not-discard-packet-when-NETDEV_TX_BUSY.patch + patches.kernel.org/5.8.15-057-net-stmmac-removed-enabling-eee-in-EEE-set-cal.patch + patches.kernel.org/5.8.15-058-platform-x86-fix-kconfig-dependency-warning-fo.patch + patches.kernel.org/5.8.15-059-platform-x86-fix-kconfig-dependency-warning-fo.patch + patches.kernel.org/5.8.15-060-hinic-add-log-in-exception-handling-processes.patch + patches.kernel.org/5.8.15-061-hinic-fix-wrong-return-value-of-mac-set-cmd.patch + patches.kernel.org/5.8.15-062-net-dsa-felix-convert-TAS-link-speed-based-on-.patch + patches.kernel.org/5.8.15-063-xfrm-Use-correct-address-family-in-xfrm_state_.patch + patches.kernel.org/5.8.15-064-iavf-use-generic-power-management.patch + patches.kernel.org/5.8.15-065-iavf-Fix-incorrect-adapter-get-in-iavf_resume.patch + patches.kernel.org/5.8.15-066-ice-fix-memory-leak-if-register_netdev_fails.patch + patches.kernel.org/5.8.15-067-ice-fix-memory-leak-in-ice_vsi_setup.patch + patches.kernel.org/5.8.15-068-vmxnet3-fix-cksum-offload-issues-for-non-udp-t.patch + patches.kernel.org/5.8.15-069-net-stmmac-Fix-clock-handling-on-remove-path.patch + patches.kernel.org/5.8.15-070-net-ethernet-cavium-octeon_mgmt-use-phy_start-.patch + patches.kernel.org/5.8.15-071-bonding-set-dev-needed_headroom-in-bond_setup_.patch + patches.kernel.org/5.8.15-072-mdio-fix-mdio-thunder.c-dependency-build-error.patch + patches.kernel.org/5.8.15-073-mlxsw-spectrum_acl-Fix-mlxsw_sp_acl_tcam_group.patch + patches.kernel.org/5.8.15-074-r8169-fix-RTL8168f-RTL8411-EPHY-config.patch + patches.kernel.org/5.8.15-075-net-usb-ax88179_178a-fix-missing-stop-entry-in.patch + patches.kernel.org/5.8.15-076-virtio-net-don-t-disable-guest-csum-when-disab.patch + patches.kernel.org/5.8.15-077-net-phy-realtek-fix-rtl8211e-rx-tx-delay-confi.patch + patches.kernel.org/5.8.15-078-octeontx2-af-Fix-enable-disable-of-default-NPC.patch + patches.kernel.org/5.8.15-079-octeontx2-pf-Fix-TCP-UDP-checksum-offload-for-.patch + patches.kernel.org/5.8.15-080-octeontx2-pf-Fix-the-device-state-on-error.patch + patches.kernel.org/5.8.15-081-octeontx2-pf-Fix-synchnorization-issue-in-mbox.patch + patches.kernel.org/5.8.15-082-pipe-Fix-memory-leaks-in-create_pipe_files.patch + patches.kernel.org/5.8.15-083-net-mlx5-Fix-a-race-when-moving-command-interf.patch + patches.kernel.org/5.8.15-084-net-mlx5-Avoid-possible-free-of-command-entry-.patch + patches.kernel.org/5.8.15-085-net-mlx5-poll-cmd-EQ-in-case-of-command-timeou.patch + patches.kernel.org/5.8.15-086-net-mlx5-Add-retry-mechanism-to-the-command-en.patch + patches.kernel.org/5.8.15-087-net-mlx5-Fix-request_irqs-error-flow.patch + patches.kernel.org/5.8.15-088-net-mlx5e-Add-resiliency-in-Striding-RQ-mode-f.patch + patches.kernel.org/5.8.15-089-net-mlx5e-Fix-return-status-when-setting-unsup.patch + patches.kernel.org/5.8.15-090-net-mlx5e-Fix-VLAN-cleanup-flow.patch + patches.kernel.org/5.8.15-091-net-mlx5e-Fix-VLAN-create-flow.patch + patches.kernel.org/5.8.15-092-net-mlx5e-Fix-race-condition-on-nhe-n-pointer-.patch + patches.kernel.org/5.8.15-093-net-stmmac-Modify-configuration-method-of-EEE-.patch + patches.kernel.org/5.8.15-094-net-hinic-fix-DEVLINK-build-errors.patch + patches.kernel.org/5.8.15-095-vhost-vdpa-fix-vhost_vdpa_map-on-error-conditi.patch + patches.kernel.org/5.8.15-096-vhost-vdpa-fix-page-pinning-leakage-in-error-p.patch + patches.kernel.org/5.8.15-097-net-mvneta-fix-double-free-of-txq-buf.patch + patches.kernel.org/5.8.15-098-rxrpc-Fix-rxkad-token-xdr-encoding.patch + patches.kernel.org/5.8.15-099-rxrpc-Downgrade-the-BUG-for-unsupported-token-.patch + patches.kernel.org/5.8.15-100-rxrpc-Fix-some-missing-_bh-annotations-on-lock.patch + patches.kernel.org/5.8.15-101-rxrpc-The-server-keyring-isn-t-network-namespa.patch + patches.kernel.org/5.8.15-102-rxrpc-Fix-server-keyring-leak.patch + patches.kernel.org/5.8.15-103-net-mscc-ocelot-rename-ocelot_board.c-to-ocelo.patch + patches.kernel.org/5.8.15-104-net-mscc-ocelot-split-writes-to-pause-frame-en.patch + patches.kernel.org/5.8.15-105-net-mscc-ocelot-extend-watermark-encoding-func.patch + patches.kernel.org/5.8.15-106-net-mscc-ocelot-divide-watermark-value-by-60-w.patch + patches.kernel.org/5.8.15-107-afs-Fix-deadlock-between-writeback-and-truncat.patch + patches.kernel.org/5.8.15-108-perf-Fix-task_function_call-error-handling.patch + patches.kernel.org/5.8.15-109-mmc-core-don-t-set-limits.discard_granularity-.patch + patches.kernel.org/5.8.15-110-mm-validate-inode-in-mapping_set_error.patch + patches.kernel.org/5.8.15-111-mm-khugepaged-recalculate-min_free_kbytes-afte.patch + patches.kernel.org/5.8.15-112-tcp-fix-receive-window-update-in-tcp_add_backl.patch + patches.kernel.org/5.8.15-113-netlink-fix-policy-dump-leak.patch + patches.kernel.org/5.8.15-114-net-core-check-length-before-updating-Ethertyp.patch + patches.kernel.org/5.8.15-115-net-bridge-fdb-don-t-flush-ext_learn-entries.patch + patches.kernel.org/5.8.15-116-net-tls-race-causes-kernel-panic.patch + patches.kernel.org/5.8.15-117-net-mlx5e-Fix-driver-s-declaration-to-support-.patch + patches.kernel.org/5.8.15-118-tty-vt-Do-not-warn-when-huge-selection-request.patch + patches.kernel.org/5.8.15-119-Input-ati_remote2-add-missing-newlines-when-pr.patch + patches.kernel.org/5.8.15-120-net-usb-rtl8150-set-random-MAC-address-when-se.patch + patches.kernel.org/5.8.15-121-net-qrtr-ns-Protect-radix_tree_deref_slot-usin.patch + patches.kernel.org/5.8.15-122-net_sched-defer-tcf_idr_insert-in-tcf_action_i.patch + patches.kernel.org/5.8.15-123-net_sched-commit-action-insertions-together.patch + patches.kernel.org/5.8.15-124-Linux-5.8.15.patch ######################################################## # Build fixes that apply to the vanilla kernel too. @@ -1973,6 +2097,13 @@ patches.suse/r8169-add-support-for-RTL8125B.patch patches.suse/RDMA-bnxt_re-Remove-set-but-not-used-variable-qplib_.patch patches.suse/mptcp-sendmsg-reset-iter-on-error-redux.patch + patches.suse/net-qrtr-ns-Fix-the-incorrect-usage-of-rcu_read_lock.patch + patches.suse/net_sched-remove-a-redundant-goto-chain-check.patch + patches.suse/net_sched-check-error-pointer-in-tcf_dump_walker.patch + patches.suse/platform-x86-intel-vbtn-Revert-Fix-SW_TABLET_MODE-al.patch + patches.suse/Bluetooth-A2MP-Fix-not-initializing-all-members.patch + patches.suse/Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch + patches.suse/x86-unwind-orc-Fix-inactive-tasks-with-stack-pointer.patch ######################################################## # kbuild/module infrastructure fixes @@ -2112,7 +2243,6 @@ ######################################################## # Other drivers ######################################################## - patches.suse/platform-x86-intel-vbtn-Switch-to-an-allow-list.patch ######################################################## # Debugging ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.eqNyr0/_old 2020-10-20 16:02:50.761794874 +0200 +++ /var/tmp/diff_new_pack.eqNyr0/_new 2020-10-20 16:02:50.761794874 +0200 @@ -1,3 +1,3 @@ -2020-10-07 06:23:04 +0000 -GIT Revision: cea47bbdbcc737161b624f5c96605ac282ec8fed +2020-10-15 08:10:08 +0000 +GIT Revision: c680e9353e2ed383d01d7da7cf68fd65898a2432 GIT Branch: stable