Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2024-09-26 18:52:48 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new.29891 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source" Thu Sep 26 18:52:48 2024 rev:749 rq:1203745 version:6.11.0 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2024-09-20 17:09:39.529851827 +0200 +++ /work/SRC/openSUSE:Factory/.kernel-source.new.29891/dtb-aarch64.changes 2024-09-26 18:53:11.500846383 +0200 @@ -1,0 +2,28 @@ +Wed Sep 25 07:56:07 CEST 2024 - jsl...@suse.cz + +- Revert "PCI: Extend ACS configurability" (bsc#1229019). +- commit 4b97d57 + +------------------------------------------------------------------- +Tue Sep 24 17:38:26 CEST 2024 - jsl...@suse.cz + +- block: Fix elv_iosched_local_module handling of "none" scheduler + (bsc#1230925). +- commit d8cfa46 + +------------------------------------------------------------------- +Fri Sep 20 07:42:16 CEST 2024 - jsl...@suse.cz + +- drm/amdgpu/display: Fix a mistake in revert commit (bsc#1228093 +- commit 39574a1 + +------------------------------------------------------------------- +Fri Sep 20 07:38:51 CEST 2024 - jsl...@suse.cz + +- Refresh patches.suse/ALSA-hda-Enhance-pm_blacklist-option.patch. +- Refresh + patches.suse/ALSA-hda-Keep-PM-disablement-for-deny-listed-instanc.patch. + Update upstream status. +- commit 2244c0f + +------------------------------------------------------------------- @@ -223,0 +252,75 @@ +Wed Sep 18 11:20:50 CEST 2024 - ti...@suse.de + +- e1000e: avoid failing the system during pm_suspend + (bsc#1230629). +- commit 91fa7f0 + +------------------------------------------------------------------- +Sun Sep 15 23:18:36 CEST 2024 - mkube...@suse.cz + +- update to 6.11 final +- refresh configs (headers only) +- commit 78175ea + +------------------------------------------------------------------- +Sun Sep 15 23:12:52 CEST 2024 - mkube...@suse.cz + +- config: update and reenable armv6hl configs +- options mirrored from armv7hl or other architectures +- commit 8ea4570 + +------------------------------------------------------------------- +Sun Sep 15 23:10:29 CEST 2024 - mkube...@suse.cz + +- config: update and reenable armv7hl configs +- options mirrored from arm64 or other architectures except + - TURRIS_OMNIA_MCU=m + - TURRIS_OMNIA_MCU_GPIO=y + - TURRIS_OMNIA_MCU_SYSOFF_WAKEUP=y + - TURRIS_OMNIA_MCU_WATCHDOG=y + - TURRIS_OMNIA_MCU_TRNG=y +- commit 3bfbb8e + +------------------------------------------------------------------- +Sun Sep 15 22:56:06 CEST 2024 - mkube...@suse.cz + +- config: update and reenable arm64 configs +- options mirrored from other architectures except + - COMPRESSED_INSTALL=n + - PCIE_ROCKCHIP_DW_EP=y + - QCOM_TZMEM_MODE_GENERIC=1 + - MARVELL_CN10K_DPI=m + - NET_AIROHA=m + - I2C_MT7621=m + - PINCTRL_IMX_SCMI=m + - PINCTRL_IMX91=y + - PINCTRL_MA35D1=n + - PINCTRL_SM4250_LPASS_LPI=m + - REGULATOR_QCOM_PM8008=m + - REGULATOR_RZG2L_VBCTRL=m + - DRM_STM_LVDS=m + - STM32_DMA3=m + - EC_LENOVO_YOGA_C630=m + - COMMON_CLK_C3_PLL=m + - COMMON_CLK_C3_PERIPHERALS=m + - CLK_QCM2290_GPUCC=m + - IPQ_NSSCC_QCA8K=m + - SM_CAMCC_7150=m + - SM_CAMCC_8650=m + - SM_DISPCC_7150=m + - SM_VIDEOCC_7150=m + - QCOM_CPUCP_MBOX=m + - QCOM_PD_MAPPER=m + - MEDIATEK_MT6359_AUXADC=m + - PWM_AXI_PWMGEN=m + - STM32MP_EXTI=m + - RESET_IMX8MP_AUDIOMIX=m + - PHY_AIROHA_PCIE=m + - PHY_FSL_IMX8QM_HSIO=m + - INTERCONNECT_MTK=y + - INTERCONNECT_QCOM_MSM8953=m + - BATTERY_LENOVO_YOGA_C630=m + - UCSI_LENOVO_YOGA_C630=m +- commit 7f8bc5b + +------------------------------------------------------------------- @@ -891,0 +995,7 @@ +Mon Sep 9 00:01:32 CEST 2024 - mkube...@suse.cz + +- update to 6.11-rc7 +- refresh configs +- commit 5661bfe + +------------------------------------------------------------------- @@ -1228 +1338,5 @@ -- commit c4aa454 +- ALSA: hda: Enhance pm_blacklist option (bsc#1226449 + bsc#1230132). +- ALSA: hda: Keep PM disablement for deny-listed instance + (bsc#1226449 bsc#1230132). +- commit e30ed12 @@ -1500,0 +1615,8 @@ +Mon Sep 2 21:00:41 CEST 2024 - msucha...@suse.de + +- Update config files (jsc#PED-10537). + ppc64le: NR_CPUS=8192 + This alings with x86. +- commit 20a31e9 + +------------------------------------------------------------------- @@ -1512,0 +1635,4 @@ + This temporary fix is replaced with better ones: + a7aeb03888b92304e2fc7d4d1c242f54a312561b + e835d5144f5ef78e4f8828c63e2f0d61144f283a +- Delete patches.suse/fix-amdgpu-freezes.patch (bsc#1225147) @@ -1514 +1640 @@ -- commit 00250c7 +- commit 361ed7d @@ -1535,0 +1662,7 @@ +Sun Sep 1 17:58:03 CEST 2024 - mkube...@suse.cz + +- update to 6.11-rc6 +- refresh configs +- commit f1c4491 + +------------------------------------------------------------------- @@ -2011,0 +2145,8 @@ +Sun Aug 25 21:45:15 CEST 2024 - mkube...@suse.cz + +- update to 6.11-rc5 +- update configs + - RANDOMIZE_IDENTITY_BASE=n (s390x only) +- commit 74d649b + +------------------------------------------------------------------- @@ -2030 +2171 @@ -- commit 95a0f0b +- commit 295e3d0 @@ -2039,0 +2181,6 @@ +Mon Aug 19 10:53:19 CEST 2024 - jsl...@suse.cz + +- drm/amd/display: Fix a typo in revert commit (bsc#1228093 +- commit 5ad0c94 + +------------------------------------------------------------------- @@ -2102,0 +2250,10 @@ +Mon Aug 19 01:40:09 CEST 2024 - mkube...@suse.cz + +- update to 6.11-rc4 +- drop 1 mainline patch + - patches.suse/drm-amd-display-Take-Synaptics-Cascaded-Topology-int.patch (338567d17627) +- update configs + - NETFS_DEBUG=n (=y in */debug) +- commit 7b0cb95 + +------------------------------------------------------------------- @@ -2124,0 +2282,7 @@ +Thu Aug 15 08:44:28 CEST 2024 - mho...@suse.com + +- disable CONFIG_MEMCG_V1 (jsc#PED-10113) + cgroup v1 is deprecated for a long time +- commit 81d83d0 + +------------------------------------------------------------------- @@ -2620,0 +2785,6 @@ +Mon Aug 12 00:16:53 CEST 2024 - mkube...@suse.cz + +- update to 6.11-rc3 +- commit b7fed99 + +------------------------------------------------------------------- @@ -2890,0 +3061,8 @@ +Mon Aug 5 00:09:34 CEST 2024 - mkube...@suse.cz + +- update to 6.11-rc2 +- update configs + - FBNIC=m (x86_64 only) +- commit 5b048b7 + +------------------------------------------------------------------- @@ -4277,0 +4456,19 @@ +Sat Aug 3 12:44:18 CEST 2024 - mkube...@suse.cz + +- config: disable PROC_PID_CPUSET also in arm configs + kernel-source commit 80a84db74f07 ("Update config files (bsc#1228801)") + disabled PROC_PID_CPUSET in all currently enabled configs. Disable this + config options also in arm configs which are disabled at the moment and are + going to be reenabled once updated for the 6.11 cycle. +- commit 0d4db5c + +------------------------------------------------------------------- +Fri Aug 2 14:35:32 CEST 2024 - mkou...@suse.com + +- Update config files (bsc#1228801) + cpuset filesystem is a relic older than cgroup v1, keep it around (to + have cpuset controller) but disable CONFIG_PROC_PID_CPUSET to hide + /proc/$pid/cpuset that serves nothing nowadays. +- commit 80a84db + +------------------------------------------------------------------- @@ -4324,0 +4522,144 @@ + +------------------------------------------------------------------- +Mon Jul 29 09:35:47 CEST 2024 - mkube...@suse.cz + +- update to 6.11-rc1 +- drop 12 patches (all stable) + - patches.kernel.org/* +- refresh + - patches.rpmify/BTF-Don-t-break-ABI-when-debuginfo-is-disabled.patch + - patches.suse/add-suse-supported-flag.patch + - patches.suse/drm-amd-display-Take-Synaptics-Cascaded-Topology-int.patch + - patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch + - patches.suse/kernel-add-release-status-to-kernel-build.patch + - patches.suse/panic-do-not-print-uninitialized-taint_flags.patch + - patches.suse/vfs-add-super_operations-get_inode_dev +- disable ARM architectures (need config update) +- new config options + - General setup + - CONFIG_MEMCG_V1=y + - Memory Management options + - CONFIG_SLAB_BUCKETS=y + - NVME Support + - CONFIG_NVME_TARGET_DEBUGFS=n + - Misc devices + - CONFIG_KEBA_CP500=m + - Multiple devices driver support (RAID and LVM) + - CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG_PLATFORM_KEYRING=y + - Network device support + - CONFIG_IDPF_SINGLEQ=n + - CONFIG_NET_VENDOR_META=y + - CONFIG_TEHUTI_TN40=m + - CONFIG_RTL8192DU=m + - GPIO Support + - CONFIG_GPIO_SLOPPY_LOGIC_ANALYZER=n + - CONFIG_GPIO_VIRTUSER=m + - CONFIG_POWER_SEQUENCING=m + - CONFIG_POWER_SEQUENCING=m + - Power supply class support + - CONFIG_BATTERY_MAX1720X=m + - CONFIG_CHARGER_CROS_CONTROL=m + - Hardware Monitoring support + - CONFIG_SENSORS_CROS_EC=m + - CONFIG_SENSORS_MP2891=m + - CONFIG_SENSORS_MP2993=m + - CONFIG_SENSORS_MP5920=m + - CONFIG_SENSORS_MP9941=m + - CONFIG_SENSORS_SPD5118=m + - CONFIG_SENSORS_SPD5118_DETECT=y + - Multifunction device drivers + - CONFIG_MFD_CS40L50_I2C=n + - CONFIG_MFD_CS40L50_SPI=n + - Multimedia support + - CONFIG_VIDEO_GC05A2=m + - CONFIG_VIDEO_GC08A3=m + - CONFIG_VIDEO_IMX283=m + - Graphics support + - CONFIG_DRM_AMD_ISP=y + - CONFIG_DRM_I915_REPLAY_GPU_HANGS_API=n + - CONFIG_BACKLIGHT_LM3509=m + - Sound card support + - CONFIG_SND_HDA_CODEC_SENARYTECH=m + - CONFIG_SND_SOC_AK4619=n + - CONFIG_SND_SOC_CS530X_I2C=n + - CONFIG_SND_SOC_ES8311=n + - CONFIG_SND_SOC_RT1320_SDW=m + - CONFIG_SND_SOC_WCD937X_SDW=n + - LED Support + - CONFIG_LEDS_CROS_EC=m + - CONFIG_LEDS_SPI_BYTE=m + - CONFIG_LEDS_KTD202X=m + - CONFIG_LEDS_TRIGGER_INPUT_EVENTS=m + - vDPA drivers + - CONFIG_OCTEONEP_VDPA=m + - CONFIG_CZNIC_PLATFORMS=y + - CONFIG_CZNIC_PLATFORMS=y + - X86 Platform Specific Device Drivers + - CONFIG_DELL_PC=m + - CONFIG_INTEL_PLR_TPMI=m ++++ 66 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.29891/dtb-aarch64.changes dtb-armv6l.changes: same change dtb-armv7l.changes: same change dtb-riscv64.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-kvmsmall.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change Old: ---- linux-6.10.tar.sign linux-6.10.tar.xz New: ---- linux-6.11.tar.sign linux-6.11.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.313253351 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.313253351 +0200 @@ -16,8 +16,8 @@ # -%define srcversion 6.10 -%define patchversion 6.10.11 +%define srcversion 6.11 +%define patchversion 6.11.0 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -25,9 +25,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-aarch64 -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change dtb-riscv64.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.477260153 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.481260319 +0200 @@ -17,9 +17,9 @@ # needssslcertforbuild -%define srcversion 6.10 -%define patchversion 6.10.11 -%define git_commit bd33620bc42c8ee17ac16edda89043075c0b0049 +%define srcversion 6.11 +%define patchversion 6.11.0 +%define git_commit b87e8860163b37f36aaa069d6a77d6e0ffa005ae %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -37,9 +37,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: kernel-64kb -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif kernel-debug.spec: same change kernel-default.spec: same change ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.609265628 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.609265628 +0200 @@ -16,9 +16,9 @@ # -%define srcversion 6.10 -%define patchversion 6.10.11 -%define git_commit bd33620bc42c8ee17ac16edda89043075c0b0049 +%define srcversion 6.11 +%define patchversion 6.11.0 +%define git_commit b87e8860163b37f36aaa069d6a77d6e0ffa005ae %define variant %{nil} %define build_html 1 %define build_pdf 0 @@ -28,9 +28,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: kernel-docs -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif ++++++ kernel-kvmsmall.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.649267287 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.653267453 +0200 @@ -17,9 +17,9 @@ # needssslcertforbuild -%define srcversion 6.10 -%define patchversion 6.10.11 -%define git_commit bd33620bc42c8ee17ac16edda89043075c0b0049 +%define srcversion 6.11 +%define patchversion 6.11.0 +%define git_commit b87e8860163b37f36aaa069d6a77d6e0ffa005ae %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -37,9 +37,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: kernel-kvmsmall -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif kernel-lpae.spec: same change ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.733270771 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.733270771 +0200 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 6.10.11 +%define patchversion 6.11.0 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -38,16 +38,16 @@ %endif %endif %endif -%global kernel_package kernel%kernel_flavor-srchash-bd33620bc42c8ee17ac16edda89043075c0b0049 +%global kernel_package kernel%kernel_flavor-srchash-b87e8860163b37f36aaa069d6a77d6e0ffa005ae %endif %if 0%{?rhel_version} %global kernel_package kernel %endif Name: kernel-obs-build -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.777272597 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.777272597 +0200 @@ -17,15 +17,15 @@ # needsrootforbuild -%define patchversion 6.10.11 +%define patchversion 6.11.0 %define variant %{nil} %include %_sourcedir/kernel-spec-macros Name: kernel-obs-qa -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.817274255 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.821274421 +0200 @@ -17,9 +17,9 @@ # needssslcertforbuild -%define srcversion 6.10 -%define patchversion 6.10.11 -%define git_commit bd33620bc42c8ee17ac16edda89043075c0b0049 +%define srcversion 6.11 +%define patchversion 6.11.0 +%define git_commit b87e8860163b37f36aaa069d6a77d6e0ffa005ae %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -37,9 +37,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: kernel-pae -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.857275914 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.857275914 +0200 @@ -16,9 +16,9 @@ # -%define srcversion 6.10 -%define patchversion 6.10.11 -%define git_commit bd33620bc42c8ee17ac16edda89043075c0b0049 +%define srcversion 6.11 +%define patchversion 6.11.0 +%define git_commit b87e8860163b37f36aaa069d6a77d6e0ffa005ae %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -26,9 +26,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: kernel-source -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.901277739 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.901277739 +0200 @@ -16,16 +16,16 @@ # -%define git_commit bd33620bc42c8ee17ac16edda89043075c0b0049 +%define git_commit b87e8860163b37f36aaa069d6a77d6e0ffa005ae %define variant %{nil} %include %_sourcedir/kernel-spec-macros Name: kernel-syms -Version: 6.10.11 +Version: 6.11.0 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif ++++++ kernel-vanilla.spec ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:21.937279232 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:21.941279398 +0200 @@ -17,9 +17,9 @@ # needssslcertforbuild -%define srcversion 6.10 -%define patchversion 6.10.11 -%define git_commit bd33620bc42c8ee17ac16edda89043075c0b0049 +%define srcversion 6.11 +%define patchversion 6.11.0 +%define git_commit b87e8860163b37f36aaa069d6a77d6e0ffa005ae %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -37,9 +37,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: kernel-vanilla -Version: 6.10.11 +Version: 6.11.0 %if 0%{?is_kotd} -Release: <RELEASE>.gbd33620 +Release: <RELEASE>.gb87e886 %else Release: 0 %endif kernel-zfcpdump.spec: same change ++++++ config.sh ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:22.237291676 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:22.241291842 +0200 @@ -1,5 +1,5 @@ # The version of the main tarball to use -SRCVERSION=6.10 +SRCVERSION=6.11 # variant of the kernel-source package, either empty or "-rt" VARIANT= # enable kernel module compression ++++++ config.tar.bz2 ++++++ ++++ 5485 lines of diff (skipped) ++++++ linux-6.10.tar.xz -> linux-6.11.tar.xz ++++++ /work/SRC/openSUSE:Factory/kernel-source/linux-6.10.tar.xz /work/SRC/openSUSE:Factory/.kernel-source.new.29891/linux-6.11.tar.xz differ: char 15, line 1 ++++++ patches.kernel.org.tar.bz2 ++++++ ++++ 209818 lines of diff (skipped) ++++++ patches.rpmify.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.rpmify/BTF-Don-t-break-ABI-when-debuginfo-is-disabled.patch new/patches.rpmify/BTF-Don-t-break-ABI-when-debuginfo-is-disabled.patch --- old/patches.rpmify/BTF-Don-t-break-ABI-when-debuginfo-is-disabled.patch 2024-05-30 22:53:36.000000000 +0200 +++ new/patches.rpmify/BTF-Don-t-break-ABI-when-debuginfo-is-disabled.patch 2024-07-29 09:35:47.000000000 +0200 @@ -1,35 +1,32 @@ -From 3ade2c9958731789f7ec4ff4e71f1d058d041c5d Mon Sep 17 00:00:00 2001 From: Michal Suchanek <msucha...@suse.de> Date: Fri, 11 Feb 2022 18:25:37 +0100 -Subject: [PATCH] BTF: Don't break ABI when debuginfo is disabled. - -Patch-mainline: Never, SUSE-specific +Subject: BTF: Don't break ABI when debuginfo is disabled. +Patch-mainline: Never, SUSE specific References: jsc#SLE-18805 Disabling BTF removes a member from struct modinfo breaking ABI all over the place. We expect that disabling debuginfo builds the same kernel but -with BTF disabling debuginfo also disables BTF causing this brekage. +with BTF disabling debuginfo also disables BTF causing this breakage. Simply include the BTF member in struct modinfo always. Signed-off-by: Michal Suchanek <msucha...@suse.de> --- - include/linux/module.h | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) + include/linux/module.h | 2 -- + 1 file changed, 2 deletions(-) -diff --git a/include/linux/module.h b/include/linux/module.h -index 12d310f7c0fc..8e2ed15b5d24 100644 --- a/include/linux/module.h +++ b/include/linux/module.h -@@ -470,7 +470,7 @@ struct module { +@@ -507,12 +507,10 @@ struct module { unsigned int num_bpf_raw_events; struct bpf_raw_event_map *bpf_raw_events; #endif -#ifdef CONFIG_DEBUG_INFO_BTF_MODULES -+#if 1 unsigned int btf_data_size; + unsigned int btf_base_data_size; void *btf_data; - #endif --- -2.31.1 - + void *btf_base_data; +-#endif + #ifdef CONFIG_JUMP_LABEL + struct jump_entry *jump_entries; + unsigned int num_jump_entries; ++++++ patches.suse.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/ALSA-hda-Enhance-pm_blacklist-option.patch new/patches.suse/ALSA-hda-Enhance-pm_blacklist-option.patch --- old/patches.suse/ALSA-hda-Enhance-pm_blacklist-option.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/ALSA-hda-Enhance-pm_blacklist-option.patch 2024-09-25 07:56:07.000000000 +0200 @@ -1,10 +1,8 @@ -From 3bb668264db5c68a02b557b3052644181bb4f4be Mon Sep 17 00:00:00 2001 From: Takashi Iwai <ti...@suse.de> Date: Mon, 29 Jul 2024 16:15:17 +0200 -Subject: [PATCH] ALSA: hda: Enhance pm_blacklist option +Subject: ALSA: hda: Enhance pm_blacklist option Git-commit: 3bb668264db5c68a02b557b3052644181bb4f4be -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git -Patch-mainline: Queued in subsystem maintainer repository +Patch-mainline: v6.12-rc1 References: bsc#1226449 bsc#1230132 We want sometimes to keep the runtime PM disabled persistently just @@ -24,12 +22,10 @@ Acked-by: Takashi Iwai <ti...@suse.de> --- - Documentation/sound/alsa-configuration.rst | 3 +++ - sound/pci/hda/hda_intel.c | 14 ++++++++++---- + Documentation/sound/alsa-configuration.rst | 3 +++ + sound/pci/hda/hda_intel.c | 14 ++++++++++---- 2 files changed, 13 insertions(+), 4 deletions(-) -diff --git a/Documentation/sound/alsa-configuration.rst b/Documentation/sound/alsa-configuration.rst -index 829c672d9fe6..04254474fa04 100644 --- a/Documentation/sound/alsa-configuration.rst +++ b/Documentation/sound/alsa-configuration.rst @@ -1059,6 +1059,9 @@ power_save @@ -42,11 +38,9 @@ align_buffer_size Force rounding of buffer/period sizes to multiples of 128 bytes. This is more efficient in terms of memory access but isn't -diff --git a/sound/pci/hda/hda_intel.c b/sound/pci/hda/hda_intel.c -index 440f1b37e071..ca5953445636 100644 --- a/sound/pci/hda/hda_intel.c +++ b/sound/pci/hda/hda_intel.c -@@ -175,8 +175,8 @@ module_param(power_save, xint, 0644); +@@ -176,8 +176,8 @@ module_param(power_save, xint, 0644); MODULE_PARM_DESC(power_save, "Automatic power-saving timeout " "(in second, 0 = disable)."); @@ -57,7 +51,7 @@ MODULE_PARM_DESC(pm_blacklist, "Enable power-management denylist"); /* reset the HD-audio controller in power save mode. -@@ -188,7 +188,7 @@ module_param(power_save_controller, bool, 0644); +@@ -189,7 +189,7 @@ module_param(power_save_controller, bool MODULE_PARM_DESC(power_save_controller, "Reset controller in power save mode."); #else /* CONFIG_PM */ #define power_save 0 @@ -66,7 +60,7 @@ #define power_save_controller false #endif /* CONFIG_PM */ -@@ -930,6 +930,9 @@ static int __maybe_unused param_set_xint(const char *val, const struct kernel_pa +@@ -931,6 +931,9 @@ static int __maybe_unused param_set_xint if (ret || prev == power_save) return ret; @@ -76,7 +70,7 @@ mutex_lock(&card_list_lock); list_for_each_entry(hda, &card_list, list) { chip = &hda->chip; -@@ -2247,7 +2250,7 @@ static void set_default_power_save(struct azx *chip) +@@ -2255,7 +2258,7 @@ static void set_default_power_save(struc struct hda_intel *hda = container_of(chip, struct hda_intel, chip); int val = power_save; @@ -85,7 +79,7 @@ const struct snd_pci_quirk *q; q = snd_pci_quirk_lookup(chip->pci, power_save_denylist); -@@ -2257,6 +2260,9 @@ static void set_default_power_save(struct azx *chip) +@@ -2265,6 +2268,9 @@ static void set_default_power_save(struc val = 0; hda->runtime_pm_disabled = 1; } @@ -95,6 +89,3 @@ } snd_hda_set_power_save(&chip->bus, val * 1000); } --- -2.43.0 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/ALSA-hda-Keep-PM-disablement-for-deny-listed-instanc.patch new/patches.suse/ALSA-hda-Keep-PM-disablement-for-deny-listed-instanc.patch --- old/patches.suse/ALSA-hda-Keep-PM-disablement-for-deny-listed-instanc.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/ALSA-hda-Keep-PM-disablement-for-deny-listed-instanc.patch 2024-09-25 07:56:07.000000000 +0200 @@ -1,10 +1,8 @@ -From 8abe0423ddd3ca7b9cea09c0a39249f65e646768 Mon Sep 17 00:00:00 2001 From: Takashi Iwai <ti...@suse.de> Date: Mon, 29 Jul 2024 16:15:16 +0200 -Subject: [PATCH] ALSA: hda: Keep PM disablement for deny-listed instance +Subject: ALSA: hda: Keep PM disablement for deny-listed instance Git-commit: 8abe0423ddd3ca7b9cea09c0a39249f65e646768 -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git -Patch-mainline: Queued in subsystem maintainer repository +Patch-mainline: v6.12-rc1 References: bsc#1226449 bsc#1230132 We have a runtime PM deny-list for the devices that show the problems @@ -21,17 +19,14 @@ Link: https://patch.msgid.link/20240729141519.18398-1-ti...@suse.de Signed-off-by: Takashi Iwai <ti...@suse.de> - --- - sound/pci/hda/hda_intel.c | 5 ++++- - sound/pci/hda/hda_intel.h | 1 + + sound/pci/hda/hda_intel.c | 5 ++++- + sound/pci/hda/hda_intel.h | 1 + 2 files changed, 5 insertions(+), 1 deletion(-) -diff --git a/sound/pci/hda/hda_intel.c b/sound/pci/hda/hda_intel.c -index b33602e64d17..440f1b37e071 100644 --- a/sound/pci/hda/hda_intel.c +++ b/sound/pci/hda/hda_intel.c -@@ -933,7 +933,8 @@ static int __maybe_unused param_set_xint(const char *val, const struct kernel_pa +@@ -934,7 +934,8 @@ static int __maybe_unused param_set_xint mutex_lock(&card_list_lock); list_for_each_entry(hda, &card_list, list) { chip = &hda->chip; @@ -41,7 +36,7 @@ continue; snd_hda_set_power_save(&chip->bus, power_save * 1000); } -@@ -2243,6 +2244,7 @@ static const struct snd_pci_quirk power_save_denylist[] = { +@@ -2251,6 +2252,7 @@ static const struct snd_pci_quirk power_ static void set_default_power_save(struct azx *chip) { @@ -49,7 +44,7 @@ int val = power_save; if (pm_blacklist) { -@@ -2253,6 +2255,7 @@ static void set_default_power_save(struct azx *chip) +@@ -2261,6 +2263,7 @@ static void set_default_power_save(struc dev_info(chip->card->dev, "device %04x:%04x is on the power_save denylist, forcing power_save to 0\n", q->subvendor, q->subdevice); val = 0; @@ -57,8 +52,6 @@ } } snd_hda_set_power_save(&chip->bus, val * 1000); -diff --git a/sound/pci/hda/hda_intel.h b/sound/pci/hda/hda_intel.h -index 0f39418f9328..2d1725f86ef1 100644 --- a/sound/pci/hda/hda_intel.h +++ b/sound/pci/hda/hda_intel.h @@ -22,6 +22,7 @@ struct hda_intel { @@ -69,6 +62,3 @@ /* vga_switcheroo setup */ unsigned int use_vga_switcheroo:1; --- -2.43.0 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/Revert-PCI-Extend-ACS-configurability.patch new/patches.suse/Revert-PCI-Extend-ACS-configurability.patch --- old/patches.suse/Revert-PCI-Extend-ACS-configurability.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/Revert-PCI-Extend-ACS-configurability.patch 2024-09-25 07:56:07.000000000 +0200 @@ -0,0 +1,274 @@ +From: Jiri Slaby <jsl...@suse.cz> +Date: Wed, 25 Sep 2024 07:54:42 +0200 +Subject: Revert "PCI: Extend ACS configurability" +Patch-mainline: Never, temporary workaround +References: bsc#1229019 + +This reverts commit 47c8846a49baa8c0b7a6a3e7e7eacd6e8d119d25 as it +breaks (pseudo) ACS on platforms without real ACS. + +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + Documentation/admin-guide/kernel-parameters.txt | 32 ----- + drivers/pci/pci.c | 148 +++++++++--------------- + 2 files changed, 58 insertions(+), 122 deletions(-) + +--- a/Documentation/admin-guide/kernel-parameters.txt ++++ b/Documentation/admin-guide/kernel-parameters.txt +@@ -4581,38 +4581,6 @@ + bridges without forcing it upstream. Note: + this removes isolation between devices and + may put more devices in an IOMMU group. +- config_acs= +- Format: +- <ACS flags>@<pci_dev>[; ...] +- Specify one or more PCI devices (in the format +- specified above) optionally prepended with flags +- and separated by semicolons. The respective +- capabilities will be enabled, disabled or +- unchanged based on what is specified in +- flags. +- +- ACS Flags is defined as follows: +- bit-0 : ACS Source Validation +- bit-1 : ACS Translation Blocking +- bit-2 : ACS P2P Request Redirect +- bit-3 : ACS P2P Completion Redirect +- bit-4 : ACS Upstream Forwarding +- bit-5 : ACS P2P Egress Control +- bit-6 : ACS Direct Translated P2P +- Each bit can be marked as: +- '0' â force disabled +- '1' â force enabled +- 'x' â unchanged +- For example, +- pci=config_acs=10x +- would configure all devices that support +- ACS to enable P2P Request Redirect, disable +- Translation Blocking, and leave Source +- Validation unchanged from whatever power-up +- or firmware set it to. +- +- Note: this may remove isolation between devices +- and may put more devices in an IOMMU group. + force_floating [S390] Force usage of floating interrupts. + nomio [S390] Do not use MIO instructions. + norid [S390] ignore the RID field and force use of +--- a/drivers/pci/pci.c ++++ b/drivers/pci/pci.c +@@ -946,67 +946,30 @@ void pci_request_acs(void) + } + + static const char *disable_acs_redir_param; +-static const char *config_acs_param; + +-struct pci_acs { +- u16 cap; +- u16 ctrl; +- u16 fw_ctrl; +-}; +- +-static void __pci_config_acs(struct pci_dev *dev, struct pci_acs *caps, +- const char *p, u16 mask, u16 flags) ++/** ++ * pci_disable_acs_redir - disable ACS redirect capabilities ++ * @dev: the PCI device ++ * ++ * For only devices specified in the disable_acs_redir parameter. ++ */ ++static void pci_disable_acs_redir(struct pci_dev *dev) + { +- char *delimit; + int ret = 0; ++ const char *p; ++ int pos; ++ u16 ctrl; + +- if (!p) ++ if (!disable_acs_redir_param) + return; + ++ p = disable_acs_redir_param; + while (*p) { +- if (!mask) { +- /* Check for ACS flags */ +- delimit = strstr(p, "@"); +- if (delimit) { +- int end; +- u32 shift = 0; +- +- end = delimit - p - 1; +- +- while (end > -1) { +- if (*(p + end) == '0') { +- mask |= 1 << shift; +- shift++; +- end--; +- } else if (*(p + end) == '1') { +- mask |= 1 << shift; +- flags |= 1 << shift; +- shift++; +- end--; +- } else if ((*(p + end) == 'x') || (*(p + end) == 'X')) { +- shift++; +- end--; +- } else { +- pci_err(dev, "Invalid ACS flags... Ignoring\n"); +- return; +- } +- } +- p = delimit + 1; +- } else { +- pci_err(dev, "ACS Flags missing\n"); +- return; +- } +- } +- +- if (mask & ~(PCI_ACS_SV | PCI_ACS_TB | PCI_ACS_RR | PCI_ACS_CR | +- PCI_ACS_UF | PCI_ACS_EC | PCI_ACS_DT)) { +- pci_err(dev, "Invalid ACS flags specified\n"); +- return; +- } +- + ret = pci_dev_str_match(dev, p, &p); + if (ret < 0) { +- pr_info_once("PCI: Can't parse ACS command line parameter\n"); ++ pr_info_once("PCI: Can't parse disable_acs_redir parameter: %s\n", ++ disable_acs_redir_param); ++ + break; + } else if (ret == 1) { + /* Found a match */ +@@ -1026,38 +989,56 @@ static void __pci_config_acs(struct pci_ + if (!pci_dev_specific_disable_acs_redir(dev)) + return; + +- pci_dbg(dev, "ACS mask = %#06x\n", mask); +- pci_dbg(dev, "ACS flags = %#06x\n", flags); ++ pos = dev->acs_cap; ++ if (!pos) { ++ pci_warn(dev, "cannot disable ACS redirect for this hardware as it does not have ACS capabilities\n"); ++ return; ++ } ++ ++ pci_read_config_word(dev, pos + PCI_ACS_CTRL, &ctrl); + +- /* If mask is 0 then we copy the bit from the firmware setting. */ +- caps->ctrl = (caps->ctrl & ~mask) | (caps->fw_ctrl & mask); +- caps->ctrl |= flags; ++ /* P2P Request & Completion Redirect */ ++ ctrl &= ~(PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_EC); + +- pci_info(dev, "Configured ACS to %#06x\n", caps->ctrl); ++ pci_write_config_word(dev, pos + PCI_ACS_CTRL, ctrl); ++ ++ pci_info(dev, "disabled ACS redirect\n"); + } + + /** + * pci_std_enable_acs - enable ACS on devices using standard ACS capabilities + * @dev: the PCI device +- * @caps: default ACS controls + */ +-static void pci_std_enable_acs(struct pci_dev *dev, struct pci_acs *caps) ++static void pci_std_enable_acs(struct pci_dev *dev) + { ++ int pos; ++ u16 cap; ++ u16 ctrl; ++ ++ pos = dev->acs_cap; ++ if (!pos) ++ return; ++ ++ pci_read_config_word(dev, pos + PCI_ACS_CAP, &cap); ++ pci_read_config_word(dev, pos + PCI_ACS_CTRL, &ctrl); ++ + /* Source Validation */ +- caps->ctrl |= (caps->cap & PCI_ACS_SV); ++ ctrl |= (cap & PCI_ACS_SV); + + /* P2P Request Redirect */ +- caps->ctrl |= (caps->cap & PCI_ACS_RR); ++ ctrl |= (cap & PCI_ACS_RR); + + /* P2P Completion Redirect */ +- caps->ctrl |= (caps->cap & PCI_ACS_CR); ++ ctrl |= (cap & PCI_ACS_CR); + + /* Upstream Forwarding */ +- caps->ctrl |= (caps->cap & PCI_ACS_UF); ++ ctrl |= (cap & PCI_ACS_UF); + + /* Enable Translation Blocking for external devices and noats */ + if (pci_ats_disabled() || dev->external_facing || dev->untrusted) +- caps->ctrl |= (caps->cap & PCI_ACS_TB); ++ ctrl |= (cap & PCI_ACS_TB); ++ ++ pci_write_config_word(dev, pos + PCI_ACS_CTRL, ctrl); + } + + /** +@@ -1066,33 +1047,23 @@ static void pci_std_enable_acs(struct pc + */ + static void pci_enable_acs(struct pci_dev *dev) + { +- struct pci_acs caps; +- int pos; +- +- pos = dev->acs_cap; +- if (!pos) +- return; ++ if (!pci_acs_enable) ++ goto disable_acs_redir; + +- pci_read_config_word(dev, pos + PCI_ACS_CAP, &caps.cap); +- pci_read_config_word(dev, pos + PCI_ACS_CTRL, &caps.ctrl); +- caps.fw_ctrl = caps.ctrl; ++ if (!pci_dev_specific_enable_acs(dev)) ++ goto disable_acs_redir; + +- /* If an iommu is present we start with kernel default caps */ +- if (pci_acs_enable) { +- if (pci_dev_specific_enable_acs(dev)) +- pci_std_enable_acs(dev, &caps); +- } ++ pci_std_enable_acs(dev); + ++disable_acs_redir: + /* +- * Always apply caps from the command line, even if there is no iommu. +- * Trust that the admin has a reason to change the ACS settings. ++ * Note: pci_disable_acs_redir() must be called even if ACS was not ++ * enabled by the kernel because it may have been enabled by ++ * platform firmware. So if we are told to disable it, we should ++ * always disable it after setting the kernel's default ++ * preferences. + */ +- __pci_config_acs(dev, &caps, disable_acs_redir_param, +- PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_EC, +- ~(PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_EC)); +- __pci_config_acs(dev, &caps, config_acs_param, 0, 0); +- +- pci_write_config_word(dev, pos + PCI_ACS_CTRL, caps.ctrl); ++ pci_disable_acs_redir(dev); + } + + /** +@@ -6903,8 +6874,6 @@ static int __init pci_setup(char *str) + pci_add_flags(PCI_SCAN_ALL_PCIE_DEVS); + } else if (!strncmp(str, "disable_acs_redir=", 18)) { + disable_acs_redir_param = str + 18; +- } else if (!strncmp(str, "config_acs=", 11)) { +- config_acs_param = str + 11; + } else { + pr_err("PCI: Unknown option `%s'\n", str); + } +@@ -6929,7 +6898,6 @@ static int __init pci_realloc_setup_para + resource_alignment_param = kstrdup(resource_alignment_param, + GFP_KERNEL); + disable_acs_redir_param = kstrdup(disable_acs_redir_param, GFP_KERNEL); +- config_acs_param = kstrdup(config_acs_param, GFP_KERNEL); + + return 0; + } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/add-suse-supported-flag.patch new/patches.suse/add-suse-supported-flag.patch --- old/patches.suse/add-suse-supported-flag.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/add-suse-supported-flag.patch 2024-09-25 07:56:07.000000000 +0200 @@ -34,7 +34,7 @@ --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt -@@ -6800,6 +6800,14 @@ +@@ -6976,6 +6976,14 @@ conditions, including corrupt stacks and bad/missing unwinder metadata. @@ -51,7 +51,7 @@ (default -1 = authorized (same as 1), --- a/Documentation/admin-guide/sysctl/kernel.rst +++ b/Documentation/admin-guide/sysctl/kernel.rst -@@ -1458,26 +1458,27 @@ tainted +@@ -1485,26 +1485,27 @@ tainted Non-zero if the kernel has been tainted. Numeric values, which can be ORed together. The letters are seen in "Tainted" line of Oops reports. @@ -158,7 +158,7 @@ easier. --- a/Makefile +++ b/Makefile -@@ -356,6 +356,11 @@ else # !mixed-build +@@ -353,6 +353,11 @@ else # !mixed-build include $(srctree)/scripts/Kbuild.include @@ -172,7 +172,7 @@ KERNELVERSION = $(VERSION)$(if $(PATCHLEVEL),.$(PATCHLEVEL)$(if $(SUBLEVEL),.$(SUBLEVEL)))$(EXTRAVERSION) --- a/include/linux/module.h +++ b/include/linux/module.h -@@ -609,6 +609,9 @@ bool is_module_address(unsigned long addr); +@@ -622,6 +622,9 @@ bool is_module_address(unsigned long addr); bool __is_module_percpu_address(unsigned long addr, unsigned long *can_addr); bool is_module_percpu_address(unsigned long addr); bool is_module_text_address(unsigned long addr); @@ -214,8 +214,8 @@ +#endif + struct taint_flag { - char c_true; /* character printed when tainted */ - char c_false; /* character printed when not tainted */ + char c_true; /* character printed when tainted */ + char c_false; /* character printed when not tainted */ --- a/init/Kconfig.suse +++ b/init/Kconfig.suse @@ -1,2 +1,21 @@ @@ -242,7 +242,7 @@ + --- a/kernel/ksysfs.c +++ b/kernel/ksysfs.c -@@ -249,6 +249,30 @@ static struct bin_attribute notes_attr __ro_after_init = { +@@ -251,6 +251,30 @@ static struct bin_attribute notes_attr __ro_after_init = { struct kobject *kernel_kobj; EXPORT_SYMBOL_GPL(kernel_kobj); @@ -273,7 +273,7 @@ static struct attribute * kernel_attrs[] = { &fscaps_attr.attr, &uevent_seqnum_attr.attr, -@@ -274,6 +298,9 @@ static struct attribute * kernel_attrs[] = { +@@ -278,6 +302,9 @@ static struct attribute * kernel_attrs[] = { #ifndef CONFIG_TINY_RCU &rcu_expedited_attr.attr, &rcu_normal_attr.attr, @@ -285,7 +285,7 @@ }; --- a/kernel/module/main.c +++ b/kernel/module/main.c -@@ -88,6 +88,22 @@ struct symsearch { +@@ -90,6 +90,22 @@ struct symsearch { enum mod_license license; }; @@ -308,7 +308,7 @@ /* * Bounds of module memory, for speeding up __module_address. * Protected by module_mutex. -@@ -976,6 +992,33 @@ static ssize_t show_taint(struct module_attribute *mattr, +@@ -978,6 +994,33 @@ static ssize_t show_taint(struct module_attribute *mattr, static struct module_attribute modinfo_taint = __ATTR(taint, 0444, show_taint, NULL); @@ -342,7 +342,7 @@ struct module_attribute *modinfo_attrs[] = { &module_uevent, &modinfo_version, -@@ -987,6 +1030,9 @@ struct module_attribute *modinfo_attrs[] = { +@@ -989,6 +1032,9 @@ struct module_attribute *modinfo_attrs[] = { #endif &modinfo_initsize, &modinfo_taint, @@ -352,7 +352,7 @@ #ifdef CONFIG_MODULE_UNLOAD &modinfo_refcnt, #endif -@@ -3352,6 +3398,9 @@ void print_modules(void) +@@ -3380,6 +3426,9 @@ void print_modules(void) pr_cont(" [last unloaded: %s%s]", last_unloaded_module.name, last_unloaded_module.taints); pr_cont("\n"); @@ -364,7 +364,7 @@ #ifdef CONFIG_MODULE_DEBUGFS --- a/kernel/module/sysfs.c +++ b/kernel/module/sysfs.c -@@ -399,8 +399,37 @@ int mod_sysfs_setup(struct module *mod, +@@ -388,8 +388,37 @@ int mod_sysfs_setup(struct module *mod, add_sect_attrs(mod, info); add_notes_attrs(mod, info); @@ -404,19 +404,19 @@ out_unreg_param: --- a/kernel/panic.c +++ b/kernel/panic.c -@@ -483,6 +483,9 @@ const struct taint_flag taint_flags[TAINT_FLAGS_COUNT] = { - [ TAINT_AUX ] = { 'X', ' ', true }, - [ TAINT_RANDSTRUCT ] = { 'T', ' ', true }, - [ TAINT_TEST ] = { 'N', ' ', true }, +@@ -502,6 +502,9 @@ const struct taint_flag taint_flags[TAINT_FLAGS_COUNT] = { + TAINT_FLAG(AUX, 'X', ' ', true), + TAINT_FLAG(RANDSTRUCT, 'T', ' ', true), + TAINT_FLAG(TEST, 'N', ' ', true), +#ifdef CONFIG_SUSE_KERNEL_SUPPORTED -+ [ TAINT_NO_SUPPORT ] = { 'n', ' ', true }, ++ TAINT_FLAG(NO_SUPPORT, 'n', ' ', true), +#endif }; - /** + #undef TAINT_FLAG --- a/kernel/sysctl.c +++ b/kernel/sysctl.c -@@ -1818,6 +1818,15 @@ static struct ctl_table kern_table[] = { +@@ -1813,6 +1813,15 @@ static struct ctl_table kern_table[] = { .extra1 = &pid_max_min, .extra2 = &pid_max_max, }, @@ -456,7 +456,7 @@ quiet_cmd_modpost = MODPOST $@ --- a/scripts/mod/modpost.c +++ b/scripts/mod/modpost.c -@@ -17,10 +17,12 @@ +@@ -17,6 +17,7 @@ #include <stdio.h> #include <ctype.h> #include <string.h> @@ -464,12 +464,15 @@ #include <limits.h> #include <stdbool.h> #include <errno.h> +@@ -24,6 +25,7 @@ + #include <hashtable.h> + #include <list.h> #include "modpost.h" +#include "../../include/generated/autoconf.h" #include "../../include/linux/license.h" static bool module_enabled; -@@ -1601,6 +1603,133 @@ static void mod_set_crcs(struct module *mod) +@@ -1546,6 +1548,133 @@ static void mod_set_crcs(struct module *mod) free(buf); } @@ -603,7 +606,7 @@ static void read_symbols(const char *modname) { const char *symname; -@@ -1887,6 +2016,15 @@ static void add_exported_symbols(struct buffer *buf, struct module *mod) +@@ -1833,6 +1962,15 @@ static void add_exported_symbols(struct buffer *buf, struct module *mod) } } @@ -619,7 +622,7 @@ /** * Record CRCs for unresolved symbols **/ -@@ -2041,6 +2179,9 @@ static void write_mod_c_file(struct module *mod) +@@ -1987,6 +2125,9 @@ static void write_mod_c_file(struct module *mod) add_header(&buf, mod); add_exported_symbols(&buf, mod); @@ -629,7 +632,7 @@ add_versions(&buf, mod); add_depends(&buf, mod); add_moddevtable(&buf, mod); -@@ -2058,6 +2199,17 @@ static void write_mod_c_file(struct module *mod) +@@ -2004,6 +2145,17 @@ static void write_mod_c_file(struct module *mod) free(buf.p); } @@ -647,7 +650,7 @@ /* parse Module.symvers file. line format: * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace **/ -@@ -2177,11 +2329,14 @@ int main(int argc, char **argv) +@@ -2123,11 +2275,14 @@ int main(int argc, char **argv) char *missing_namespace_deps = NULL; char *unused_exports_white_list = NULL; char *dump_write = NULL, *files_source = NULL; @@ -663,7 +666,7 @@ switch (opt) { case 'e': external_module = true; -@@ -2230,11 +2385,20 @@ int main(int argc, char **argv) +@@ -2176,11 +2331,20 @@ int main(int argc, char **argv) case 'd': missing_namespace_deps = optarg; break; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/block-Fix-elv_iosched_local_module-handling-of-none-.patch new/patches.suse/block-Fix-elv_iosched_local_module-handling-of-none-.patch --- old/patches.suse/block-Fix-elv_iosched_local_module-handling-of-none-.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/block-Fix-elv_iosched_local_module-handling-of-none-.patch 2024-09-25 07:56:07.000000000 +0200 @@ -0,0 +1,42 @@ +From: Damien Le Moal <dlem...@kernel.org> +Date: Tue, 17 Sep 2024 22:32:31 +0900 +Subject: block: Fix elv_iosched_local_module handling of "none" scheduler +Patch-mainline: Submitted, <20240917133231.134806-1-dlem...@kernel.org> +References: bsc#1230925 + +Commit 734e1a860312 ("block: Prevent deadlocks when switching +elevators") introduced the function elv_iosched_load_module() to allow +loading an elevator module outside of elv_iosched_store() with the +target device queue not frozen, to avoid deadlocks. However, the "none" +scheduler does not have a module and as a result, +elv_iosched_load_module() always returns an error when trying to switch +to this valid scheduler. + +Fix this by ignoring the return value of the request_module() call +done by elv_iosched_load_module(). This restores the behavior before +commit 734e1a860312, which was to ignore the request_module() result and +instead rely on elevator_change() to handle the "none" scheduler case. + +Reported-by: Shin'ichiro Kawasaki <shinichiro.kawas...@wdc.com> +Fixes: 734e1a860312 ("block: Prevent deadlocks when switching elevators") +Cc: sta...@vger.kernel.org +Signed-off-by: Damien Le Moal <dlem...@kernel.org> +Reviewed-by: Christoph Hellwig <h...@lst.de> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + block/elevator.c | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +--- a/block/elevator.c ++++ b/block/elevator.c +@@ -715,7 +715,9 @@ int elv_iosched_load_module(struct gendi + + strscpy(elevator_name, buf, sizeof(elevator_name)); + +- return request_module("%s-iosched", strstrip(elevator_name)); ++ request_module("%s-iosched", strstrip(elevator_name)); ++ ++ return 0; + } + + ssize_t elv_iosched_store(struct gendisk *disk, const char *buf, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/drm-amd-display-Fix-MST-BW-calculation-Regression.patch new/patches.suse/drm-amd-display-Fix-MST-BW-calculation-Regression.patch --- old/patches.suse/drm-amd-display-Fix-MST-BW-calculation-Regression.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/drm-amd-display-Fix-MST-BW-calculation-Regression.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,163 +0,0 @@ -From: Fangzhi Zuo <jerry....@amd.com> -Date: Mon, 29 Jul 2024 10:23:03 -0400 -Subject: drm/amd/display: Fix MST BW calculation Regression -Git-commit: 338567d17627064dba63cf063459605e782f71d2 -Patch-mainline: 6.11-rc4 -References: bsc#1228093 #3495 - -[Why & How] -Revert commit 8b2cb32cf0c6 -("drm/amd/display: FEC overhead should be checked once for mst slot nums") -Because causes bw calculation regression - -Cc: mario.limoncie...@amd.com -Cc: alexander.deuc...@amd.com -Reported-by: jirisl...@kernel.org -Closes: https://gitlab.freedesktop.org/drm/amd/-/issues/3495 -Closes: https://bugzilla.suse.com/show_bug.cgi?id=1228093 -Reviewed-by: Wayne Lin <wayne....@amd.com> -Signed-off-by: Fangzhi Zuo <jerry....@amd.com> -Signed-off-by: Tom Chung <chiahsuan.ch...@amd.com> -Tested-by: Daniel Wheeler <daniel.whee...@amd.com> -Signed-off-by: Alex Deucher <alexander.deuc...@amd.com> -(cherry picked from commit 12dbb3ed212fc7655fce421542a5add637f8af7a) -Cc: sta...@vger.kernel.org -Signed-off-by: Jiri Slaby <jsl...@suse.cz> ---- - drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c | 37 ++++++++---- - drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.h | 3 - 2 files changed, 30 insertions(+), 10 deletions(-) - ---- a/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c -+++ b/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c -@@ -798,12 +798,25 @@ struct dsc_mst_fairness_params { - struct amdgpu_dm_connector *aconnector; - }; - --static int kbps_to_peak_pbn(int kbps) -+static uint16_t get_fec_overhead_multiplier(struct dc_link *dc_link) -+{ -+ u8 link_coding_cap; -+ uint16_t fec_overhead_multiplier_x1000 = PBN_FEC_OVERHEAD_MULTIPLIER_8B_10B; -+ -+ link_coding_cap = dc_link_dp_mst_decide_link_encoding_format(dc_link); -+ if (link_coding_cap == DP_128b_132b_ENCODING) -+ fec_overhead_multiplier_x1000 = PBN_FEC_OVERHEAD_MULTIPLIER_128B_132B; -+ -+ return fec_overhead_multiplier_x1000; -+} -+ -+static int kbps_to_peak_pbn(int kbps, uint16_t fec_overhead_multiplier_x1000) - { - u64 peak_kbps = kbps; - - peak_kbps *= 1006; -- peak_kbps = div_u64(peak_kbps, 1000); -+ peak_kbps *= fec_overhead_multiplier_x1000; -+ peak_kbps = div_u64(peak_kbps, 1000 * 1000); - return (int) DIV64_U64_ROUND_UP(peak_kbps * 64, (54 * 8 * 1000)); - } - -@@ -904,11 +917,12 @@ static int increase_dsc_bpp(struct drm_a - int link_timeslots_used; - int fair_pbn_alloc; - int ret = 0; -+ uint16_t fec_overhead_multiplier_x1000 = get_fec_overhead_multiplier(dc_link); - - for (i = 0; i < count; i++) { - if (vars[i + k].dsc_enabled) { - initial_slack[i] = -- kbps_to_peak_pbn(params[i].bw_range.max_kbps) - vars[i + k].pbn; -+ kbps_to_peak_pbn(params[i].bw_range.max_kbps, fec_overhead_multiplier_x1000) - vars[i + k].pbn; - bpp_increased[i] = false; - remaining_to_increase += 1; - } else { -@@ -1004,6 +1018,7 @@ static int try_disable_dsc(struct drm_at - int next_index; - int remaining_to_try = 0; - int ret; -+ uint16_t fec_overhead_multiplier_x1000 = get_fec_overhead_multiplier(dc_link); - - for (i = 0; i < count; i++) { - if (vars[i + k].dsc_enabled -@@ -1033,7 +1048,7 @@ static int try_disable_dsc(struct drm_at - if (next_index == -1) - break; - -- vars[next_index].pbn = kbps_to_peak_pbn(params[next_index].bw_range.stream_kbps); -+ vars[next_index].pbn = kbps_to_peak_pbn(params[next_index].bw_range.stream_kbps, fec_overhead_multiplier_x1000); - ret = drm_dp_atomic_find_time_slots(state, - params[next_index].port->mgr, - params[next_index].port, -@@ -1046,8 +1061,7 @@ static int try_disable_dsc(struct drm_at - vars[next_index].dsc_enabled = false; - vars[next_index].bpp_x16 = 0; - } else { -- vars[next_index].pbn = kbps_to_peak_pbn( -- params[next_index].bw_range.max_kbps); -+ vars[next_index].pbn = kbps_to_peak_pbn(params[next_index].bw_range.stream_kbps, fec_overhead_multiplier_x1000); - ret = drm_dp_atomic_find_time_slots(state, - params[next_index].port->mgr, - params[next_index].port, -@@ -1076,6 +1090,7 @@ static int compute_mst_dsc_configs_for_l - int count = 0; - int i, k, ret; - bool debugfs_overwrite = false; -+ uint16_t fec_overhead_multiplier_x1000 = get_fec_overhead_multiplier(dc_link); - - memset(params, 0, sizeof(params)); - -@@ -1140,7 +1155,7 @@ static int compute_mst_dsc_configs_for_l - /* Try no compression */ - for (i = 0; i < count; i++) { - vars[i + k].aconnector = params[i].aconnector; -- vars[i + k].pbn = kbps_to_peak_pbn(params[i].bw_range.stream_kbps); -+ vars[i + k].pbn = kbps_to_peak_pbn(params[i].bw_range.stream_kbps, fec_overhead_multiplier_x1000); - vars[i + k].dsc_enabled = false; - vars[i + k].bpp_x16 = 0; - ret = drm_dp_atomic_find_time_slots(state, params[i].port->mgr, params[i].port, -@@ -1159,7 +1174,7 @@ static int compute_mst_dsc_configs_for_l - /* Try max compression */ - for (i = 0; i < count; i++) { - if (params[i].compression_possible && params[i].clock_force_enable != DSC_CLK_FORCE_DISABLE) { -- vars[i + k].pbn = kbps_to_peak_pbn(params[i].bw_range.min_kbps); -+ vars[i + k].pbn = kbps_to_peak_pbn(params[i].bw_range.min_kbps, fec_overhead_multiplier_x1000); - vars[i + k].dsc_enabled = true; - vars[i + k].bpp_x16 = params[i].bw_range.min_target_bpp_x16; - ret = drm_dp_atomic_find_time_slots(state, params[i].port->mgr, -@@ -1167,7 +1182,7 @@ static int compute_mst_dsc_configs_for_l - if (ret < 0) - return ret; - } else { -- vars[i + k].pbn = kbps_to_peak_pbn(params[i].bw_range.stream_kbps); -+ vars[i + k].pbn = kbps_to_peak_pbn(params[i].bw_range.stream_kbps, fec_overhead_multiplier_x1000); - vars[i + k].dsc_enabled = false; - vars[i + k].bpp_x16 = 0; - ret = drm_dp_atomic_find_time_slots(state, params[i].port->mgr, -@@ -1653,11 +1668,13 @@ enum dc_status dm_dp_mst_is_port_support - */ - int pbn_div, slot_num, max_slot_num; - enum dc_link_encoding_format link_encoding; -+ uint16_t fec_overhead_multiplier_x1000 = -+ get_fec_overhead_multiplier(stream->link); - uint32_t stream_kbps = - dc_bandwidth_in_kbps_from_timing(&stream->timing, - dc_link_get_highest_encoding_format(stream->link)); - -- pbn = kbps_to_peak_pbn(stream_kbps); -+ pbn = kbps_to_peak_pbn(stream_kbps, fec_overhead_multiplier_x1000); - pbn_div = dm_mst_get_pbn_divider(stream->link); - slot_num = DIV_ROUND_UP(pbn, pbn_div); - ---- a/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.h -+++ b/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.h -@@ -46,6 +46,9 @@ - #define SYNAPTICS_CASCADED_HUB_ID 0x5A - #define IS_SYNAPTICS_CASCADED_PANAMERA(devName, data) ((IS_SYNAPTICS_PANAMERA(devName) && ((int)data[2] == SYNAPTICS_CASCADED_HUB_ID)) ? 1 : 0) - -+#define PBN_FEC_OVERHEAD_MULTIPLIER_8B_10B 1031 -+#define PBN_FEC_OVERHEAD_MULTIPLIER_128B_132B 1000 -+ - enum mst_msg_ready_type { - NONE_MSG_RDY_EVENT = 0, - DOWN_REP_MSG_RDY_EVENT = 1, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/e1000e-avoid-failing-the-system-during-pm_suspend.patch new/patches.suse/e1000e-avoid-failing-the-system-during-pm_suspend.patch --- old/patches.suse/e1000e-avoid-failing-the-system-during-pm_suspend.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/e1000e-avoid-failing-the-system-during-pm_suspend.patch 2024-09-25 07:56:07.000000000 +0200 @@ -0,0 +1,104 @@ +From 0a6ad4d9e1690c7faa3a53f762c877e477093657 Mon Sep 17 00:00:00 2001 +From: Vitaly Lifshits <vitaly.lifsh...@intel.com> +Date: Tue, 6 Aug 2024 16:23:48 +0300 +Subject: [PATCH] e1000e: avoid failing the system during pm_suspend +Git-commit: 0a6ad4d9e1690c7faa3a53f762c877e477093657 +Patch-mainline: v6.12-rc1 +References: bsc#1230629 + +Occasionally when the system goes into pm_suspend, the suspend might fail +due to a PHY access error on the network adapter. Previously, this would +have caused the whole system to fail to go to a low power state. +An example of this was reported in the following Bugzilla: +https://bugzilla.kernel.org/show_bug.cgi?id=205015 + +[ 1663.694828] e1000e 0000:00:19.0 eth0: Failed to disable ULP +[ 1664.731040] asix 2-3:1.0 eth1: link up, 100Mbps, full-duplex, lpa 0xC1E1 +[ 1665.093513] e1000e 0000:00:19.0 eth0: Hardware Error +[ 1665.596760] e1000e 0000:00:19.0: pci_pm_resume+0x0/0x80 returned 0 after 2975399 usecs + +and then the system never recovers from it, and all the following suspend failed due to this +[22909.393854] PM: pci_pm_suspend(): e1000e_pm_suspend+0x0/0x760 [e1000e] returns -2 +[22909.393858] PM: dpm_run_callback(): pci_pm_suspend+0x0/0x160 returns -2 +[22909.393861] PM: Device 0000:00:1f.6 failed to suspend async: error -2 + +This can be avoided by changing the return values of __e1000_shutdown and +e1000e_pm_suspend functions so that they always return 0 (success). This +is consistent with what other drivers do. + +If the e1000e driver encounters a hardware error during suspend, potential +side effects include slightly higher power draw or non-working wake on +LAN. This is preferred to a system-level suspend failure, and a warning +message is written to the system log, so that the user can be aware that +the LAN controller experienced a problem during suspend. + +Link: https://bugzilla.kernel.org/show_bug.cgi?id=205015 +Suggested-by: Dima Ruinskiy <dima.ruins...@intel.com> +Signed-off-by: Vitaly Lifshits <vitaly.lifsh...@intel.com> +Tested-by: Mor Bar-Gabay <morx.bar.ga...@intel.com> +Signed-off-by: Tony Nguyen <anthony.l.ngu...@intel.com> +Acked-by: Takashi Iwai <ti...@suse.de> + +--- + drivers/net/ethernet/intel/e1000e/netdev.c | 19 +++++++++++-------- + 1 file changed, 11 insertions(+), 8 deletions(-) + +diff --git a/drivers/net/ethernet/intel/e1000e/netdev.c b/drivers/net/ethernet/intel/e1000e/netdev.c +index 360ee26557f7..f103249b12fa 100644 +--- a/drivers/net/ethernet/intel/e1000e/netdev.c ++++ b/drivers/net/ethernet/intel/e1000e/netdev.c +@@ -6671,8 +6671,10 @@ static int __e1000_shutdown(struct pci_dev *pdev, bool runtime) + if (adapter->flags2 & FLAG2_HAS_PHY_WAKEUP) { + /* enable wakeup by the PHY */ + retval = e1000_init_phy_wakeup(adapter, wufc); +- if (retval) +- return retval; ++ if (retval) { ++ e_err("Failed to enable wakeup\n"); ++ goto skip_phy_configurations; ++ } + } else { + /* enable wakeup by the MAC */ + ew32(WUFC, wufc); +@@ -6693,8 +6695,10 @@ static int __e1000_shutdown(struct pci_dev *pdev, bool runtime) + * or broadcast. + */ + retval = e1000_enable_ulp_lpt_lp(hw, !runtime); +- if (retval) +- return retval; ++ if (retval) { ++ e_err("Failed to enable ULP\n"); ++ goto skip_phy_configurations; ++ } + } + } + +@@ -6726,6 +6730,7 @@ static int __e1000_shutdown(struct pci_dev *pdev, bool runtime) + hw->phy.ops.release(hw); + } + ++skip_phy_configurations: + /* Release control of h/w to f/w. If f/w is AMT enabled, this + * would have already happened in close and is redundant. + */ +@@ -6968,15 +6973,13 @@ static int e1000e_pm_suspend(struct device *dev) + e1000e_pm_freeze(dev); + + rc = __e1000_shutdown(pdev, false); +- if (rc) { +- e1000e_pm_thaw(dev); +- } else { ++ if (!rc) { + /* Introduce S0ix implementation */ + if (adapter->flags2 & FLAG2_ENABLE_S0IX_FLOWS) + e1000e_s0ix_entry_flow(adapter); + } + +- return rc; ++ return 0; + } + + static int e1000e_pm_resume(struct device *dev) +-- +2.43.0 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch new/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch --- old/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch 2024-09-25 07:56:07.000000000 +0200 @@ -51,7 +51,7 @@ --- a/Makefile +++ b/Makefile -@@ -1097,6 +1097,15 @@ export extmod_prefix = $(if $(KBUILD_EXTMOD),$(KBUILD_EXTMOD)/) +@@ -1114,6 +1114,15 @@ export extmod_prefix = $(if $(KBUILD_EXTMOD),$(KBUILD_EXTMOD)/) export MODORDER := $(extmod_prefix)modules.order export MODULES_NSDEPS := $(extmod_prefix)modules.nsdeps @@ -67,7 +67,7 @@ ifeq ($(KBUILD_EXTMOD),) build-dir := . -@@ -1191,7 +1200,8 @@ PHONY += prepare archprepare +@@ -1208,7 +1217,8 @@ PHONY += prepare archprepare archprepare: outputmakefile archheaders archscripts scripts include/config/kernel.release \ asm-generic $(version_h) include/generated/utsrelease.h \ @@ -186,22 +186,24 @@ static char dump_stack_arch_desc_str[128]; -@@ -54,13 +55,13 @@ void __init dump_stack_set_arch_desc(const char *fmt, ...) +@@ -54,7 +55,7 @@ void __init dump_stack_set_arch_desc(const char *fmt, ...) */ void dump_stack_print_info(const char *log_lvl) { -- printk("%sCPU: %d PID: %d Comm: %.20s %s%s %s %.*s" BUILD_ID_FMT "\n", -+ printk("%sCPU: %d PID: %d Comm: %.20s %s%s %s %.*s %s" BUILD_ID_FMT "\n", - log_lvl, raw_smp_processor_id(), current->pid, current->comm, - kexec_crash_loaded() ? "Kdump: loaded " : "", +- printk("%sCPU: %d UID: %u PID: %d Comm: %.20s %s%s %s %.*s" BUILD_ID_FMT "\n", ++ printk("%sCPU: %d UID: %u PID: %d Comm: %.20s %s%s %s %.*s %s" BUILD_ID_FMT "\n", + log_lvl, raw_smp_processor_id(), + __kuid_val(current_real_cred()->euid), + current->pid, current->comm, +@@ -62,7 +63,7 @@ void dump_stack_print_info(const char *log_lvl) print_tainted(), init_utsname()->release, (int)strcspn(init_utsname()->version, " "), - init_utsname()->version, BUILD_ID_VAL); + init_utsname()->version, SUSE_PRODUCT_SHORTNAME, BUILD_ID_VAL); - if (dump_stack_arch_desc_str[0] != '\0') - printk("%sHardware name: %s\n", + if (get_taint()) + printk("%s%s\n", log_lvl, print_tainted_verbose()); --- /dev/null +++ b/scripts/gen-suse_version_h.sh @@ -0,0 +1,100 @@ @@ -315,7 +317,7 @@ static bool module_enabled; /* Are we using CONFIG_MODVERSIONS? */ -@@ -2123,6 +2124,14 @@ static void write_buf(struct buffer *b, const char *fname) +@@ -2120,6 +2121,14 @@ static void write_buf(struct buffer *b, const char *fname) } } @@ -330,7 +332,7 @@ static void write_if_changed(struct buffer *b, const char *fname) { char *tmp; -@@ -2186,6 +2195,7 @@ static void write_mod_c_file(struct module *mod) +@@ -2183,6 +2192,7 @@ static void write_mod_c_file(struct module *mod) add_depends(&buf, mod); add_moddevtable(&buf, mod); add_srcversion(&buf, mod); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/kernel-add-release-status-to-kernel-build.patch new/patches.suse/kernel-add-release-status-to-kernel-build.patch --- old/patches.suse/kernel-add-release-status-to-kernel-build.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/kernel-add-release-status-to-kernel-build.patch 2024-09-25 07:56:07.000000000 +0200 @@ -19,7 +19,7 @@ --- a/init/Kconfig.suse +++ b/init/Kconfig.suse -@@ -87,4 +87,10 @@ config SUSE_KERNEL_SUPPORTED +@@ -104,4 +104,10 @@ config SUSE_KERNEL_SUPPORTED If you aren't building a kernel for an enterprise distribution, say n. @@ -32,7 +32,7 @@ endmenu --- a/kernel/ksysfs.c +++ b/kernel/ksysfs.c -@@ -211,6 +211,7 @@ EXPORT_SYMBOL_GPL(kernel_kobj); +@@ -254,6 +254,7 @@ EXPORT_SYMBOL_GPL(kernel_kobj); #ifdef CONFIG_SUSE_KERNEL_SUPPORTED const char *supported_printable(int taint) { @@ -40,7 +40,7 @@ int mask = (1 << TAINT_PROPRIETARY_MODULE) | (1 << TAINT_NO_SUPPORT); if ((taint & mask) == mask) return "No, Proprietary and Unsupported modules are loaded"; -@@ -222,6 +223,9 @@ const char *supported_printable(int taint) +@@ -265,6 +266,9 @@ const char *supported_printable(int taint) return "Yes, External"; else return "Yes"; @@ -52,14 +52,16 @@ static ssize_t supported_show(struct kobject *kobj, --- a/lib/dump_stack.c +++ b/lib/dump_stack.c -@@ -55,13 +55,19 @@ void __init dump_stack_set_arch_desc(const char *fmt, ...) +@@ -55,7 +55,7 @@ void __init dump_stack_set_arch_desc(const char *fmt, ...) */ void dump_stack_print_info(const char *log_lvl) { -- printk("%sCPU: %d PID: %d Comm: %.20s %s%s %s %.*s %s" BUILD_ID_FMT "\n", -+ printk("%sCPU: %d PID: %d Comm: %.20s %s%s %s %.*s %s%s" BUILD_ID_FMT "\n", - log_lvl, raw_smp_processor_id(), current->pid, current->comm, - kexec_crash_loaded() ? "Kdump: loaded " : "", +- printk("%sCPU: %d UID: %u PID: %d Comm: %.20s %s%s %s %.*s %s" BUILD_ID_FMT "\n", ++ printk("%sCPU: %d UID: %u PID: %d Comm: %.20s %s%s %s %.*s %s%s" BUILD_ID_FMT "\n", + log_lvl, raw_smp_processor_id(), + __kuid_val(current_real_cred()->euid), + current->pid, current->comm, +@@ -63,7 +63,13 @@ void dump_stack_print_info(const char *log_lvl) print_tainted(), init_utsname()->release, (int)strcspn(init_utsname()->version, " "), @@ -72,5 +74,5 @@ +#endif + BUILD_ID_VAL); - if (dump_stack_arch_desc_str[0] != '\0') - printk("%sHardware name: %s\n", + if (get_taint()) + printk("%s%s\n", log_lvl, print_tainted_verbose()); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/panic-do-not-print-uninitialized-taint_flags.patch new/patches.suse/panic-do-not-print-uninitialized-taint_flags.patch --- old/patches.suse/panic-do-not-print-uninitialized-taint_flags.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/panic-do-not-print-uninitialized-taint_flags.patch 2024-09-25 07:56:07.000000000 +0200 @@ -17,18 +17,17 @@ Suggested-by: Michal Kubecek <mkube...@suse.cz> Signed-off-by: Jessica Yu <j...@suse.de> --- - kernel/panic.c | 3 +++ - 1 file changed, 3 insertions(+) + kernel/panic.c | 2 ++ + 1 file changed, 2 insertions(+) --- a/kernel/panic.c +++ b/kernel/panic.c -@@ -412,6 +412,9 @@ const char *print_tainted(void) - s = buf + sprintf(buf, "Tainted: "); - for (i = 0; i < TAINT_FLAGS_COUNT; i++) { - const struct taint_flag *t = &taint_flags[i]; -+ -+ if (!t->c_true) -+ continue; - *s++ = test_bit(i, &tainted_mask) ? - t->c_true : t->c_false; - } +@@ -525,6 +525,8 @@ static void print_tainted_seq(struct seq_buf *s, bool verbose) + bool is_set = test_bit(i, &tainted_mask); + char c = is_set ? t->c_true : t->c_false; + ++ if (!c) ++ continue; + if (verbose) { + if (is_set) { + seq_buf_printf(s, "%s[%c]=%s", sep, c, t->desc); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/scsi-ufs-qcom-Add-UFSHCD_QUIRK_BROKEN_LSDBS_CAP-for-.patch new/patches.suse/scsi-ufs-qcom-Add-UFSHCD_QUIRK_BROKEN_LSDBS_CAP-for-.patch --- old/patches.suse/scsi-ufs-qcom-Add-UFSHCD_QUIRK_BROKEN_LSDBS_CAP-for-.patch 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/scsi-ufs-qcom-Add-UFSHCD_QUIRK_BROKEN_LSDBS_CAP-for-.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,57 +0,0 @@ -From: Manivannan Sadhasivam <manivannan.sadhasi...@linaro.org> -Date: Fri, 16 Aug 2024 11:55:11 +0530 -Subject: scsi: ufs: qcom: Add UFSHCD_QUIRK_BROKEN_LSDBS_CAP for SM8550 SoC -Git-commit: ea593e028a9cc523557b4084a61d87ae69e2f270 -Patch-mainline: 6.11-rc5 -References: git-fixes - -SM8550 SoC has the UFSHCI 4.0 compliant UFS controller and only supports -legacy single doorbell mode without MCQ. But due to a hardware bug, it -reports 1 in the 'Legacy Queue & Single Doorbell Support (LSDBS)' field of -the Controller Capabilities register. This field is supposed to read as 0 -if legacy single doorbell mode is supported and 1 otherwise. - -Starting with commit 0c60eb0cc320 ("scsi: ufs: core: Check LSDBS cap when -!mcq"), ufshcd driver is now relying on the LSDBS field to decide when to -use the legacy doorbell mode if MCQ is not supported. And this ends up -breaking UFS on SM8550: - -ufshcd-qcom 1d84000.ufs: ufshcd_init: failed to initialize (legacy doorbell mode not supported) -ufshcd-qcom 1d84000.ufs: error -EINVAL: Initialization failed with error -22 - -So use the UFSHCD_QUIRK_BROKEN_LSDBS_CAP quirk for SM8550 SoC so that the -ufshcd driver could use legacy doorbell mode correctly. - -Fixes: 0c60eb0cc320 ("scsi: ufs: core: Check LSDBS cap when !mcq") -Tested-by: Amit Pundir <amit.pun...@linaro.org> -Reviewed-by: Bart Van Assche <bvanass...@acm.org> -Signed-off-by: Manivannan Sadhasivam <manivannan.sadhasi...@linaro.org> -Link: https://lore.kernel.org/r/20240816-ufs-bug-fix-v3-2-e6fe0e18e...@linaro.org -Signed-off-by: Martin K. Petersen <martin.peter...@oracle.com> -Signed-off-by: Jiri Slaby <jsl...@suse.cz> ---- - drivers/ufs/host/ufs-qcom.c | 6 +++++- - 1 file changed, 5 insertions(+), 1 deletion(-) - ---- a/drivers/ufs/host/ufs-qcom.c -+++ b/drivers/ufs/host/ufs-qcom.c -@@ -857,6 +857,9 @@ static void ufs_qcom_advertise_quirks(st - - if (host->hw_ver.major > 0x3) - hba->quirks |= UFSHCD_QUIRK_REINIT_AFTER_MAX_GEAR_SWITCH; -+ -+ if (of_device_is_compatible(hba->dev->of_node, "qcom,sm8550-ufshc")) -+ hba->quirks |= UFSHCD_QUIRK_BROKEN_LSDBS_CAP; - } - - static void ufs_qcom_set_phy_gear(struct ufs_qcom_host *host) -@@ -1845,7 +1848,8 @@ static void ufs_qcom_remove(struct platf - } - - static const struct of_device_id ufs_qcom_of_match[] __maybe_unused = { -- { .compatible = "qcom,ufshc"}, -+ { .compatible = "qcom,ufshc" }, -+ { .compatible = "qcom,sm8550-ufshc" }, - {}, - }; - MODULE_DEVICE_TABLE(of, ufs_qcom_of_match); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/vfs-add-super_operations-get_inode_dev new/patches.suse/vfs-add-super_operations-get_inode_dev --- old/patches.suse/vfs-add-super_operations-get_inode_dev 2024-09-19 09:33:24.000000000 +0200 +++ new/patches.suse/vfs-add-super_operations-get_inode_dev 2024-09-25 07:56:07.000000000 +0200 @@ -46,7 +46,7 @@ --- a/fs/eventpoll.c +++ b/fs/eventpoll.c -@@ -1019,7 +1019,7 @@ static void ep_show_fdinfo(struct seq_file *m, struct file *f) +@@ -1055,7 +1055,7 @@ static void ep_show_fdinfo(struct seq_file *m, struct file *f) epi->ffd.fd, epi->event.events, (long long)epi->event.data, (long long)epi->ffd.file->f_pos, @@ -127,7 +127,7 @@ flc->flc_owner, flc->flc_flags, flc->flc_type, flc->flc_pid); } -@@ -2818,8 +2820,8 @@ static void lock_get_status(struct seq_file *f, struct file_lock_core *flc, +@@ -2817,8 +2819,8 @@ static void lock_get_status(struct seq_file *f, struct file_lock_core *flc, if (inode) { /* userspace relies on this representation of dev_t */ seq_printf(f, "%d %02x:%02x:%lu ", pid, @@ -151,7 +151,7 @@ --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c -@@ -2740,10 +2740,11 @@ static void nfs4_show_fname(struct seq_file *s, struct nfsd_file *f) +@@ -2744,10 +2744,11 @@ static void nfs4_show_fname(struct seq_file *s, struct nfsd_file *f) static void nfs4_show_superblock(struct seq_file *s, struct nfsd_file *f) { struct inode *inode = file_inode(f->nf_file); @@ -187,7 +187,7 @@ --- a/fs/notify/fdinfo.c +++ b/fs/notify/fdinfo.c -@@ -85,7 +85,7 @@ static void inotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) +@@ -81,7 +81,7 @@ static void inotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) inode = igrab(fsnotify_conn_inode(mark->connector)); if (inode) { seq_printf(m, "inotify wd:%x ino:%lx sdev:%x mask:%x ignored_mask:0 ", @@ -196,7 +196,7 @@ inotify_mark_user_mask(mark)); show_mark_fhandle(m, inode); seq_putc(m, '\n'); -@@ -112,7 +112,7 @@ static void fanotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) +@@ -108,7 +108,7 @@ static void fanotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) if (!inode) return; seq_printf(m, "fanotify ino:%lx sdev:%x mflags:%x mask:%x ignored_mask:%x ", @@ -218,8 +218,8 @@ --- a/fs/proc/task_mmu.c +++ b/fs/proc/task_mmu.c -@@ -275,7 +275,7 @@ show_map_vma(struct seq_file *m, struct vm_area_struct *vma) - if (file) { +@@ -335,7 +335,7 @@ show_map_vma(struct seq_file *m, struct vm_area_struct *vma) + if (vma->vm_file) { const struct inode *inode = file_user_inode(vma->vm_file); - dev = inode->i_sb->s_dev; @@ -267,7 +267,7 @@ stat->nlink = inode->i_nlink; --- a/include/linux/fs.h +++ b/include/linux/fs.h -@@ -2186,6 +2186,7 @@ struct super_operations { +@@ -2203,6 +2203,7 @@ struct super_operations { long (*free_cached_objects)(struct super_block *, struct shrink_control *); void (*shutdown)(struct super_block *sb); @@ -275,9 +275,9 @@ }; /* -@@ -3613,4 +3614,12 @@ extern int vfs_fadvise(struct file *file, loff_t offset, loff_t len, - extern int generic_fadvise(struct file *file, loff_t offset, loff_t len, - int advice); +@@ -3659,4 +3660,12 @@ static inline bool vfs_empty_path(int dfd, const char __user *path) + + bool generic_atomic_write_valid(struct iov_iter *iter, loff_t pos); +static inline dev_t inode_get_dev(const struct inode *inode) +{ @@ -368,7 +368,7 @@ __entry->mode = inode->i_mode; --- a/init/do_mounts.c +++ b/init/do_mounts.c -@@ -169,7 +169,7 @@ static int __init do_mount_root(const char *name, const char *fs, +@@ -168,7 +168,7 @@ static int __init do_mount_root(const char *name, const char *fs, init_chdir("/root"); s = current->fs->pwd.dentry->d_sb; @@ -448,7 +448,7 @@ if (n->type == AUDIT_TYPE_UNKNOWN) --- a/kernel/events/core.c +++ b/kernel/events/core.c -@@ -8751,7 +8751,7 @@ static void perf_event_mmap_event(struct perf_mmap_event *mmap_event) +@@ -8801,7 +8801,7 @@ static void perf_event_mmap_event(struct perf_mmap_event *mmap_event) goto cpy_name; } inode = file_inode(vma->vm_file); @@ -459,7 +459,7 @@ maj = MAJOR(dev); --- a/mm/memory-failure.c +++ b/mm/memory-failure.c -@@ -216,7 +216,7 @@ static int hwpoison_filter_dev(struct page *p) +@@ -239,7 +239,7 @@ static int hwpoison_filter_dev(struct page *p) if (mapping == NULL || mapping->host == NULL) return -EINVAL; ++++++ series.conf ++++++ ++++ 2399 lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/series.conf ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.29891/series.conf ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.y1eNY3/_old 2024-09-26 18:53:23.765355051 +0200 +++ /var/tmp/diff_new_pack.y1eNY3/_new 2024-09-26 18:53:23.769355217 +0200 @@ -1,4 +1,4 @@ -2024-09-19 07:33:24 +0000 -GIT Revision: bd33620bc42c8ee17ac16edda89043075c0b0049 +2024-09-25 07:09:20 +0000 +GIT Revision: b87e8860163b37f36aaa069d6a77d6e0ffa005ae GIT Branch: stable