Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kernel-source for openSUSE:Factory 
checked in at 2021-11-22 23:03:56
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kernel-source (Old)
 and      /work/SRC/openSUSE:Factory/.kernel-source.new.1895 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kernel-source"

Mon Nov 22 23:03:56 2021 rev:620 rq:932460 version:5.15.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes        
2021-11-18 10:32:59.951860814 +0100
+++ /work/SRC/openSUSE:Factory/.kernel-source.new.1895/dtb-aarch64.changes      
2021-11-22 23:04:21.965895382 +0100
@@ -1,0 +2,1600 @@
+Fri Nov 19 07:08:33 CET 2021 - jsl...@suse.cz
+
+- blacklist.conf: add one arm64's w/o prerequisites
+- commit 404f576
+
+-------------------------------------------------------------------
+Fri Nov 19 07:08:26 CET 2021 - jsl...@suse.cz
+
+- samples/bpf: Fix incorrect use of strlen in xdp_redirect_cpu
+  (git-fixes).
+- commit a48a8e6
+
+-------------------------------------------------------------------
+Fri Nov 19 07:07:48 CET 2021 - jsl...@suse.cz
+
+- selftests: net: switch to socat in the GSO GRE test (git-fixes).
+- KVM: Fix steal time asm constraints (git-fixes).
+- commit 24aa787
+
+-------------------------------------------------------------------
+Thu Nov 18 20:53:01 CET 2021 - jsl...@suse.cz
+
+- Linux 5.15.3 (bsc#1012628).
+- xhci: Fix USB 3.1 enumeration issues by increasing roothub
+  power-on-good delay (bsc#1012628).
+- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp
+  platform (bsc#1012628).
+- Input: iforce - fix control-message timeout (bsc#1012628).
+- Input: elantench - fix misreporting trackpoint coordinates
+  (bsc#1012628).
+- libata: fix read log timeout value (bsc#1012628).
+- ocfs2: fix data corruption on truncate (bsc#1012628).
+- scsi: scsi_ioctl: Validate command size (bsc#1012628).
+- scsi: core: Avoid leaving shost->last_reset with stale value
+  if EH does not run (bsc#1012628).
+- scsi: core: Remove command size deduction from
+  scsi_setup_scsi_cmnd() (bsc#1012628).
+- scsi: lpfc: Don't release final kref on Fport node while ABTS
+  outstanding (bsc#1012628).
+- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines
+  (bsc#1012628).
+- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1012628).
+- scsi: qla2xxx: Fix kernel crash when accessing port_speed
+  sysfs file (bsc#1012628).
+- scsi: qla2xxx: Fix use after free in eh_abort path
+  (bsc#1012628).
+- ce/gf100: fix incorrect CE0 address calculation on some GPUs
+  (bsc#1012628).
+- char: xillybus: fix msg_ep UAF in xillyusb_probe()
+  (bsc#1012628).
+- mmc: mtk-sd: Add wait dma stop done flow (bsc#1012628).
+- mmc: dw_mmc: Dont wait for DRTO on Write RSP error
+  (bsc#1012628).
+- exfat: fix incorrect loading of i_blocks for large files
+  (bsc#1012628).
+- io-wq: remove worker to owner tw dependency (bsc#1012628).
+- parisc: Fix set_fixmap() on PA1.x CPUs (bsc#1012628).
+- parisc: Fix ptrace check on syscall return (bsc#1012628).
+- tpm: Check for integer overflow in tpm2_map_response_body()
+  (bsc#1012628).
+- firmware/psci: fix application of sizeof to pointer
+  (bsc#1012628).
+- crypto: s5p-sss - Add error handling in s5p_aes_probe()
+  (bsc#1012628).
+- media: rkvdec: Do not override sizeimage for output format
+  (bsc#1012628).
+- media: ite-cir: IR receiver stop working after receive overflow
+  (bsc#1012628).
+- media: rkvdec: Support dynamic resolution changes (bsc#1012628).
+- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog
+  receivers (bsc#1012628).
+- media: v4l2-ioctl: Fix check_ext_ctrls (bsc#1012628).
+- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14
+  (bsc#1012628).
+- ALSA: hda/realtek: Add a quirk for HP OMEN 15 mute LED
+  (bsc#1012628).
+- ALSA: hda/realtek: Add quirk for Clevo PC70HS (bsc#1012628).
+- ALSA: hda/realtek: Headset fixup for Clevo NH77HJQ
+  (bsc#1012628).
+- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N
+  (bsc#1012628).
+- ALSA: hda/realtek: Add quirk for ASUS UX550VE (bsc#1012628).
+- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED
+  (bsc#1012628).
+- ALSA: ua101: fix division by zero at probe (bsc#1012628).
+- ALSA: 6fire: fix control and bulk message timeouts
+  (bsc#1012628).
+- ALSA: line6: fix control and interrupt message timeouts
+  (bsc#1012628).
+- ALSA: mixer: oss: Fix racy access to slots (bsc#1012628).
+- ALSA: mixer: fix deadlock in snd_mixer_oss_set_volume
+  (bsc#1012628).
+- ALSA: usb-audio: Line6 HX-Stomp XL USB_ID for 48k-fixed quirk
+  (bsc#1012628).
+- ALSA: usb-audio: Add registration quirk for JBL Quantum 400
+  (bsc#1012628).
+- ALSA: hda: Free card instance properly at probe errors
+  (bsc#1012628).
+- ALSA: synth: missing check for possible NULL after the call
+  to kstrdup (bsc#1012628).
+- ALSA: pci: rme: Fix unaligned buffer addresses (bsc#1012628).
+- ALSA: PCM: Fix NULL dereference at mmap checks (bsc#1012628).
+- ALSA: timer: Fix use-after-free problem (bsc#1012628).
+- ALSA: timer: Unconditionally unlink slave instances, too
+  (bsc#1012628).
+- Revert "ext4: enforce buffer head state assertion in
+  ext4_da_map_blocks" (bsc#1012628).
+- ext4: fix lazy initialization next schedule time computation
+  in more granular unit (bsc#1012628).
+- ext4: ensure enough credits in ext4_ext_shift_path_extents
+  (bsc#1012628).
+- ext4: refresh the ext4_ext_path struct after dropping i_data_sem
+  (bsc#1012628).
+- fuse: fix page stealing (bsc#1012628).
+- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in
+  mem_encrypt_identity.c (bsc#1012628).
+- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL
+  (bsc#1012628).
+- x86/irq: Ensure PI wakeup handler is unregistered before module
+  unload (bsc#1012628).
+- x86/iopl: Fake iopl(3) CLI/STI usage (bsc#1012628).
+- btrfs: clear MISSING device status bit in btrfs_close_one_device
+  (bsc#1012628).
+- btrfs: fix lost error handling when replaying directory deletes
+  (bsc#1012628).
+- btrfs: call btrfs_check_rw_degradable only if there is a
+  missing device (bsc#1012628).
+- KVM: x86/mmu: Drop a redundant, broken remote TLB flush
+  (bsc#1012628).
+- KVM: VMX: Unregister posted interrupt wakeup handler on hardware
+  unsetup (bsc#1012628).
+- KVM: PPC: Tick accounting should defer vtime accounting 'til
+  after IRQ handling (bsc#1012628).
+- ia64: kprobes: Fix to pass correct trampoline address to the
+  handler (bsc#1012628).
+- selinux: fix race condition when computing ocontext SIDs
+  (bsc#1012628).
+- ipmi:watchdog: Set panic count to proper value on a panic
+  (bsc#1012628).
+- md/raid1: only allocate write behind bio for WriteMostly device
+  (bsc#1012628).
+- hwmon: (pmbus/lm25066) Add offset coefficients (bsc#1012628).
+- regulator: s5m8767: do not use reset value as DVS voltage if
+  GPIO DVS is disabled (bsc#1012628).
+- regulator: dt-bindings: samsung,s5m8767: correct
+  s5m8767,pmic-buck-default-dvs-idx property (bsc#1012628).
+- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell
+  (bsc#1012628).
+- mwifiex: fix division by zero in fw download path (bsc#1012628).
+- ath6kl: fix division by zero in send path (bsc#1012628).
+- ath6kl: fix control-message timeout (bsc#1012628).
+- ath10k: fix control-message timeout (bsc#1012628).
+- ath10k: fix division by zero in send path (bsc#1012628).
+- PCI: Mark Atheros QCA6174 to avoid bus reset (bsc#1012628).
+- rtl8187: fix control-message timeouts (bsc#1012628).
+- evm: mark evm_fixmode as __ro_after_init (bsc#1012628).
+- ifb: Depend on netfilter alternatively to tc (bsc#1012628).
+- platform/surface: aggregator_registry: Add support for Surface
+  Laptop Studio (bsc#1012628).
+- mt76: mt7615: fix skb use-after-free on mac reset (bsc#1012628).
+- HID: surface-hid: Use correct event registry for managing HID
+  events (bsc#1012628).
+- HID: surface-hid: Allow driver matching for target ID 1 devices
+  (bsc#1012628).
+- wcn36xx: Fix HT40 capability for 2Ghz band (bsc#1012628).
+- wcn36xx: Fix tx_status mechanism (bsc#1012628).
+- wcn36xx: Fix (QoS) null data frame bitrate/modulation
+  (bsc#1012628).
+- PM: sleep: Do not let "syscore" devices runtime-suspend during
+  system transitions (bsc#1012628).
+- mwifiex: Read a PCI register after writing the TX ring write
+  pointer (bsc#1012628).
+- mwifiex: Try waking the firmware until we get an interrupt
+  (bsc#1012628).
+- libata: fix checking of DMA state (bsc#1012628).
+- dma-buf: fix and rework dma_buf_poll v7 (bsc#1012628).
+- wcn36xx: handle connection loss indication (bsc#1012628).
+- rsi: fix occasional initialisation failure with BT coex
+  (bsc#1012628).
+- rsi: fix key enabled check causing unwanted encryption for
+  vap_id > 0 (bsc#1012628).
+- rsi: fix rate mask set leading to P2P failure (bsc#1012628).
+- rsi: Fix module dev_oper_mode parameter description
+  (bsc#1012628).
+- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake
+  server (bsc#1012628).
+- perf/x86/intel/uncore: Fix invalid unit check (bsc#1012628).
+- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints
+  (bsc#1012628).
+- RDMA/qedr: Fix NULL deref for query_qp on the GSI QP
+  (bsc#1012628).
+- ASoC: tegra: Set default card name for Trimslice (bsc#1012628).
+- ASoC: tegra: Restore AC97 support (bsc#1012628).
+- signal: Remove the bogus sigkill_pending in ptrace_stop
+  (bsc#1012628).
+- memory: renesas-rpc-if: Correct QSPI data transfer in Manual
+  mode (bsc#1012628).
++++ 1417 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes
++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.1895/dtb-aarch64.changes
dtb-armv6l.changes: same change
dtb-armv7l.changes: same change
dtb-riscv64.changes: same change
kernel-64kb.changes: same change
kernel-debug.changes: same change
kernel-default.changes: same change
kernel-docs.changes: same change
kernel-kvmsmall.changes: same change
kernel-lpae.changes: same change
kernel-obs-build.changes: same change
kernel-obs-qa.changes: same change
kernel-pae.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-vanilla.changes: same change
kernel-zfcpdump.changes: same change

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dtb-aarch64.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:26.989878526 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:26.989878526 +0100
@@ -17,7 +17,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -29,9 +29,9 @@
 %(chmod +x 
%_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
 
 Name:           dtb-aarch64
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif

dtb-armv6l.spec: same change
dtb-armv7l.spec: same change
dtb-riscv64.spec: same change
++++++ kernel-64kb.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.065878271 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.069878257 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        Kernel with 64kb PAGE_SIZE
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-26a203b53de5bda52f512344a49e138964e43912
-Provides:       kernel-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       
kernel-%build_flavor-base-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
+Provides:       kernel-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 # END COMMON DEPS
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc

++++++ kernel-debug.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.089878190 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.089878190 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        A Debug Version of the Kernel
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-26a203b53de5bda52f512344a49e138964e43912
-Provides:       kernel-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       
kernel-%build_flavor-base-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
+Provides:       kernel-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 # END COMMON DEPS
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 %ifarch ppc64
 Provides:       kernel-kdump = 2.6.28
 Obsoletes:      kernel-kdump <= 2.6.28

++++++ kernel-default.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.109878123 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.113878109 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        The Standard Kernel
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-26a203b53de5bda52f512344a49e138964e43912
-Provides:       kernel-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       
kernel-%build_flavor-base-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
+Provides:       kernel-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 # END COMMON DEPS
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 %ifarch %ix86
 Provides:       kernel-smp = 2.6.17
 Obsoletes:      kernel-smp <= 2.6.17

++++++ kernel-docs.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.129878055 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.129878055 +0100
@@ -17,7 +17,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -31,9 +31,9 @@
 Summary:        Kernel Documentation
 License:        GPL-2.0-only
 Group:          Documentation/Man
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -64,7 +64,7 @@
 %endif
 Url:            http://www.kernel.org/
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 BuildArch:      noarch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

++++++ kernel-kvmsmall.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.145878002 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.149877989 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        The Small Developer Kernel for KVM
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-26a203b53de5bda52f512344a49e138964e43912
-Provides:       kernel-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       
kernel-%build_flavor-base-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
+Provides:       kernel-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 # END COMMON DEPS
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc

kernel-lpae.spec: same change
++++++ kernel-obs-build.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.189877854 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.189877854 +0100
@@ -19,7 +19,7 @@
 
 #!BuildIgnore: post-build-checks
 
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -45,7 +45,7 @@
 %endif
 %endif
 %endif
-BuildRequires:  
kernel%kernel_flavor-srchash-26a203b53de5bda52f512344a49e138964e43912
+BuildRequires:  
kernel%kernel_flavor-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 
 %if 0%{?rhel_version}
 BuildRequires:  kernel
@@ -64,9 +64,9 @@
 Summary:        package kernel and initrd for OBS VM builds
 License:        GPL-2.0-only
 Group:          SLES
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif

++++++ kernel-obs-qa.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.205877801 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.209877787 +0100
@@ -17,7 +17,7 @@
 # needsrootforbuild
 
 
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -36,9 +36,9 @@
 Summary:        Basic QA tests for the kernel
 License:        GPL-2.0-only
 Group:          SLES
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif

++++++ kernel-pae.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.225877734 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.229877720 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        Kernel with PAE Support
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-26a203b53de5bda52f512344a49e138964e43912
-Provides:       kernel-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       
kernel-%build_flavor-base-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
+Provides:       kernel-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 # END COMMON DEPS
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 %ifarch %ix86
 Provides:       kernel-bigsmp = 2.6.17
 Obsoletes:      kernel-bigsmp <= 2.6.17

++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.245877666 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.245877666 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -35,9 +35,9 @@
 Summary:        The Linux Kernel Sources
 License:        GPL-2.0-only
 Group:          Development/Sources
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -48,7 +48,7 @@
 BuildRequires:  sed
 Requires(post): coreutils sed
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 Provides:       linux
 Provides:       multiversion(kernel)
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
@@ -117,7 +117,6 @@
 Source113:      patches.kabi.tar.bz2
 Source120:      kabi.tar.bz2
 Source121:      sysctl.tar.bz2
-BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 BuildArch:      noarch
 Prefix:         /usr/src
 # Source is only complete with devel files.
@@ -128,6 +127,10 @@
 Recommends:     flex
 Recommends:     libelf-devel
 Recommends:     openssl-devel
+# dracut no longer carries installkernel
+%if 0%{?suse_version} > 1500
+Recommends:     kernel-install-tools
+%endif
 %obsolete_rebuilds %name
 
 %(chmod +x 
%_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})

++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.273877572 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.277877559 +0100
@@ -24,10 +24,10 @@
 Summary:        Kernel Symbol Versions (modversions)
 License:        GPL-2.0-only
 Group:          Development/Sources
-Version:        5.15.2
+Version:        5.15.3
 %if %using_buildservice
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -52,7 +52,7 @@
 %endif
 Requires:       pesign-obs-integration
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 Provides:       multiversion(kernel)
 Source:         README.KSYMS
 Requires:       kernel-devel%variant = %version-%source_rel

++++++ kernel-vanilla.spec ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:27.297877492 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:27.297877492 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 5.15
-%define patchversion 5.15.2
+%define patchversion 5.15.3
 %define variant %{nil}
 %define vanilla_only 0
 %define compress_modules zstd
@@ -107,9 +107,9 @@
 Summary:        The Standard Kernel - without any SUSE patches
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        5.15.2
+Version:        5.15.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g26a203b
+Release:        <RELEASE>.g404f576
 %else
 Release:        0
 %endif
@@ -231,10 +231,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-26a203b53de5bda52f512344a49e138964e43912
-Provides:       kernel-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       
kernel-%build_flavor-base-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
+Provides:       kernel-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 # END COMMON DEPS
-Provides:       %name-srchash-26a203b53de5bda52f512344a49e138964e43912
+Provides:       %name-srchash-404f5765cf33979eeecf4977ac79a5f0a515722e
 %obsolete_rebuilds %name
 Source0:        
http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc

kernel-zfcpdump.spec: same change
++++++ config.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/arm64/default new/config/arm64/default
--- old/config/arm64/default    2021-11-11 09:07:33.000000000 +0100
+++ new/config/arm64/default    2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/arm64 5.15.1 Kernel Configuration
+# Linux/arm64 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
@@ -11935,9 +11935,9 @@
 # CONFIG_KASAN is not set
 CONFIG_HAVE_ARCH_KFENCE=y
 CONFIG_KFENCE=y
-CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_SAMPLE_INTERVAL=0
 CONFIG_KFENCE_NUM_OBJECTS=255
+CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_STRESS_TEST_FAULTS=0
 # end of Memory Debugging
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/armv6hl/default new/config/armv6hl/default
--- old/config/armv6hl/default  2021-11-11 09:07:33.000000000 +0100
+++ new/config/armv6hl/default  2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/arm 5.15.1 Kernel Configuration
+# Linux/arm 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/armv7hl/default new/config/armv7hl/default
--- old/config/armv7hl/default  2021-11-11 09:07:33.000000000 +0100
+++ new/config/armv7hl/default  2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/arm 5.15.1 Kernel Configuration
+# Linux/arm 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
@@ -6811,11 +6811,11 @@
 CONFIG_DRM=y
 CONFIG_DRM_MIPI_DBI=m
 CONFIG_DRM_MIPI_DSI=y
-CONFIG_DRM_DP_AUX_BUS=y
+CONFIG_DRM_DP_AUX_BUS=m
 CONFIG_DRM_DP_AUX_CHARDEV=y
 # CONFIG_DRM_DEBUG_MM is not set
 # CONFIG_DRM_DEBUG_SELFTEST is not set
-CONFIG_DRM_KMS_HELPER=y
+CONFIG_DRM_KMS_HELPER=m
 # CONFIG_DRM_DEBUG_DP_MST_TOPOLOGY_REFS is not set
 CONFIG_DRM_FBDEV_EMULATION=y
 CONFIG_DRM_FBDEV_OVERALLOC=100
@@ -6834,7 +6834,7 @@
 #
 CONFIG_DRM_I2C_CH7006=m
 CONFIG_DRM_I2C_SIL164=m
-CONFIG_DRM_I2C_NXP_TDA998X=y
+CONFIG_DRM_I2C_NXP_TDA998X=m
 CONFIG_DRM_I2C_NXP_TDA9950=m
 # end of I2C encoder or helper chips
 
@@ -6956,7 +6956,7 @@
 CONFIG_DRM_PANEL_BOE_TV101WUM_NL6=m
 CONFIG_DRM_PANEL_DSI_CM=m
 CONFIG_DRM_PANEL_LVDS=m
-CONFIG_DRM_PANEL_SIMPLE=y
+CONFIG_DRM_PANEL_SIMPLE=m
 CONFIG_DRM_PANEL_ELIDA_KD35T133=m
 CONFIG_DRM_PANEL_FEIXIN_K101_IM2BA02=m
 CONFIG_DRM_PANEL_FEIYANG_FY07024DI26A30D=m
@@ -7119,11 +7119,11 @@
 CONFIG_FB_CFB_COPYAREA=y
 CONFIG_FB_CFB_IMAGEBLIT=y
 CONFIG_FB_CFB_REV_PIXELS_IN_BYTE=y
-CONFIG_FB_SYS_FILLRECT=y
-CONFIG_FB_SYS_COPYAREA=y
+CONFIG_FB_SYS_FILLRECT=m
+CONFIG_FB_SYS_COPYAREA=m
 CONFIG_FB_SYS_IMAGEBLIT=y
 # CONFIG_FB_FOREIGN_ENDIAN is not set
-CONFIG_FB_SYS_FOPS=y
+CONFIG_FB_SYS_FOPS=m
 CONFIG_FB_DEFERRED_IO=y
 CONFIG_FB_BACKLIGHT=m
 CONFIG_FB_MODE_HELPERS=y
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/armv7hl/lpae new/config/armv7hl/lpae
--- old/config/armv7hl/lpae     2021-11-11 09:07:33.000000000 +0100
+++ new/config/armv7hl/lpae     2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/arm 5.15.1 Kernel Configuration
+# Linux/arm 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
@@ -6587,11 +6587,11 @@
 CONFIG_DRM=y
 CONFIG_DRM_MIPI_DBI=m
 CONFIG_DRM_MIPI_DSI=y
-CONFIG_DRM_DP_AUX_BUS=y
+CONFIG_DRM_DP_AUX_BUS=m
 CONFIG_DRM_DP_AUX_CHARDEV=y
 # CONFIG_DRM_DEBUG_MM is not set
 # CONFIG_DRM_DEBUG_SELFTEST is not set
-CONFIG_DRM_KMS_HELPER=y
+CONFIG_DRM_KMS_HELPER=m
 # CONFIG_DRM_DEBUG_DP_MST_TOPOLOGY_REFS is not set
 CONFIG_DRM_FBDEV_EMULATION=y
 CONFIG_DRM_FBDEV_OVERALLOC=100
@@ -6610,7 +6610,7 @@
 #
 CONFIG_DRM_I2C_CH7006=m
 CONFIG_DRM_I2C_SIL164=m
-CONFIG_DRM_I2C_NXP_TDA998X=y
+CONFIG_DRM_I2C_NXP_TDA998X=m
 CONFIG_DRM_I2C_NXP_TDA9950=m
 # end of I2C encoder or helper chips
 
@@ -6731,7 +6731,7 @@
 CONFIG_DRM_PANEL_BOE_TV101WUM_NL6=m
 CONFIG_DRM_PANEL_DSI_CM=m
 CONFIG_DRM_PANEL_LVDS=m
-CONFIG_DRM_PANEL_SIMPLE=y
+CONFIG_DRM_PANEL_SIMPLE=m
 CONFIG_DRM_PANEL_ELIDA_KD35T133=m
 CONFIG_DRM_PANEL_FEIXIN_K101_IM2BA02=m
 CONFIG_DRM_PANEL_FEIYANG_FY07024DI26A30D=m
@@ -6887,11 +6887,11 @@
 CONFIG_FB_CFB_FILLRECT=y
 CONFIG_FB_CFB_COPYAREA=y
 CONFIG_FB_CFB_IMAGEBLIT=y
-CONFIG_FB_SYS_FILLRECT=y
-CONFIG_FB_SYS_COPYAREA=y
-CONFIG_FB_SYS_IMAGEBLIT=y
+CONFIG_FB_SYS_FILLRECT=m
+CONFIG_FB_SYS_COPYAREA=m
+CONFIG_FB_SYS_IMAGEBLIT=m
 # CONFIG_FB_FOREIGN_ENDIAN is not set
-CONFIG_FB_SYS_FOPS=y
+CONFIG_FB_SYS_FOPS=m
 CONFIG_FB_DEFERRED_IO=y
 CONFIG_FB_BACKLIGHT=m
 CONFIG_FB_MODE_HELPERS=y
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/i386/pae new/config/i386/pae
--- old/config/i386/pae 2021-11-11 09:07:33.000000000 +0100
+++ new/config/i386/pae 2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/i386 5.15.1 Kernel Configuration
+# Linux/i386 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
@@ -10436,9 +10436,9 @@
 CONFIG_CC_HAS_WORKING_NOSANITIZE_ADDRESS=y
 CONFIG_HAVE_ARCH_KFENCE=y
 CONFIG_KFENCE=y
-CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_SAMPLE_INTERVAL=0
 CONFIG_KFENCE_NUM_OBJECTS=255
+CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_STRESS_TEST_FAULTS=0
 # end of Memory Debugging
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/ppc64/default new/config/ppc64/default
--- old/config/ppc64/default    2021-11-11 09:07:33.000000000 +0100
+++ new/config/ppc64/default    2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/powerpc 5.15.1 Kernel Configuration
+# Linux/powerpc 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/ppc64le/default new/config/ppc64le/default
--- old/config/ppc64le/default  2021-11-11 09:07:33.000000000 +0100
+++ new/config/ppc64le/default  2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/powerpc 5.15.1 Kernel Configuration
+# Linux/powerpc 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/riscv64/default new/config/riscv64/default
--- old/config/riscv64/default  2021-11-11 09:07:33.000000000 +0100
+++ new/config/riscv64/default  2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/riscv 5.15.1 Kernel Configuration
+# Linux/riscv 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
@@ -9136,9 +9136,9 @@
 # CONFIG_KASAN is not set
 CONFIG_HAVE_ARCH_KFENCE=y
 CONFIG_KFENCE=y
-CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_SAMPLE_INTERVAL=0
 CONFIG_KFENCE_NUM_OBJECTS=255
+CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_STRESS_TEST_FAULTS=0
 # end of Memory Debugging
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/s390x/default new/config/s390x/default
--- old/config/s390x/default    2021-11-11 09:07:33.000000000 +0100
+++ new/config/s390x/default    2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/s390 5.15.1 Kernel Configuration
+# Linux/s390 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
@@ -4428,9 +4428,9 @@
 # CONFIG_KASAN is not set
 CONFIG_HAVE_ARCH_KFENCE=y
 CONFIG_KFENCE=y
-CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_SAMPLE_INTERVAL=0
 CONFIG_KFENCE_NUM_OBJECTS=255
+CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_STRESS_TEST_FAULTS=0
 # end of Memory Debugging
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/s390x/zfcpdump new/config/s390x/zfcpdump
--- old/config/s390x/zfcpdump   2021-11-11 09:07:33.000000000 +0100
+++ new/config/s390x/zfcpdump   2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/s390 5.15.1 Kernel Configuration
+# Linux/s390 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/x86_64/default new/config/x86_64/default
--- old/config/x86_64/default   2021-11-11 09:07:33.000000000 +0100
+++ new/config/x86_64/default   2021-11-19 09:35:25.000000000 +0100
@@ -1,6 +1,6 @@
 #
 # Automatically generated file; DO NOT EDIT.
-# Linux/x86_64 5.15.1 Kernel Configuration
+# Linux/x86_64 5.15.3 Kernel Configuration
 #
 CONFIG_CC_VERSION_TEXT="gcc (scripts/dummy-tools/gcc)"
 CONFIG_CC_IS_GCC=y
@@ -849,6 +849,7 @@
 CONFIG_ARCH_USE_MEMREMAP_PROT=y
 # CONFIG_LOCK_EVENT_COUNTS is not set
 CONFIG_ARCH_HAS_MEM_ENCRYPT=y
+CONFIG_ARCH_HAS_CC_PLATFORM=y
 CONFIG_HAVE_STATIC_CALL=y
 CONFIG_HAVE_STATIC_CALL_INLINE=y
 CONFIG_HAVE_PREEMPT_DYNAMIC=y
@@ -10412,9 +10413,9 @@
 # CONFIG_KASAN is not set
 CONFIG_HAVE_ARCH_KFENCE=y
 CONFIG_KFENCE=y
-CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_SAMPLE_INTERVAL=0
 CONFIG_KFENCE_NUM_OBJECTS=255
+CONFIG_KFENCE_STATIC_KEYS=y
 CONFIG_KFENCE_STRESS_TEST_FAULTS=0
 # end of Memory Debugging
 

++++++ kernel-source.spec.in ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:28.213874418 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:28.213874418 +0100
@@ -117,7 +117,6 @@
 Source113:      patches.kabi.tar.bz2
 Source120:      kabi.tar.bz2
 Source121:      sysctl.tar.bz2
-BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 BuildArch:      noarch
 Prefix:         /usr/src
 # Source is only complete with devel files.
@@ -128,6 +127,10 @@
 Recommends:     flex
 Recommends:     libelf-devel
 Recommends:     openssl-devel
+# dracut no longer carries installkernel
+%if 0%{?suse_version} > 1500
+Recommends:     kernel-install-tools
+%endif
 %obsolete_rebuilds %name
 
 %(chmod +x %_sourcedir/{@SCRIPTS@})

++++++ patches.kernel.org.tar.bz2 ++++++
++++ 77032 lines of diff (skipped)

++++++ patches.suse.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 
new/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch
--- old/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 
2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,52 @@
+From 85b741c1cb6854478fd1aa13ac231e2c1baf4c4b Mon Sep 17 00:00:00 2001
+From: Takashi Iwai <ti...@suse.de>
+Date: Tue, 16 Nov 2021 07:54:14 +0100
+Subject: [PATCH] ALSA: usb-audio: Add minimal-mute notion in dB mapping table
+Git-commit: 85b741c1cb6854478fd1aa13ac231e2c1baf4c4b
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git
+Patch-mainline: Queued in subsystem maintainer repository
+References: bsc#1192375
+
+Some devices do mute the volume at the minimal volume, and for such
+devices, we need to set SNDRV_CTL_TLVT_DB_MINMAX_MUTE to the TLV
+information.  It corresponds to setting usb_mixer_elem_info.min_mute
+flag in the USB-audio driver.
+
+This patch adds a new field min_mute in usbmix_dB_map so that the
+mixer map entry can pass the flag.
+
+Link: https://lore.kernel.org/r/20211116065415.11159-3-ti...@suse.de
+Signed-off-by: Takashi Iwai <ti...@suse.de>
+
+---
+ sound/usb/mixer.c      | 1 +
+ sound/usb/mixer_maps.c | 1 +
+ 2 files changed, 2 insertions(+)
+
+diff --git a/sound/usb/mixer.c b/sound/usb/mixer.c
+index 6e7bac8203ba..5b9fd07ce2a2 100644
+--- a/sound/usb/mixer.c
++++ b/sound/usb/mixer.c
+@@ -145,6 +145,7 @@ static inline void check_mapped_dB(const struct 
usbmix_name_map *p,
+       if (p && p->dB) {
+               cval->dBmin = p->dB->min;
+               cval->dBmax = p->dB->max;
++              cval->min_mute = p->dB->min_mute;
+               cval->initialized = 1;
+       }
+ }
+diff --git a/sound/usb/mixer_maps.c b/sound/usb/mixer_maps.c
+index 92c06b1bb979..9d71c569b148 100644
+--- a/sound/usb/mixer_maps.c
++++ b/sound/usb/mixer_maps.c
+@@ -8,6 +8,7 @@
+ struct usbmix_dB_map {
+       int min;
+       int max;
++      bool min_mute;
+ };
+ 
+ struct usbmix_name_map {
+-- 
+2.26.2
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 
new/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch
--- old/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 
2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,57 @@
+From 02eb1d098e26f34c8f047b0b1cee6f4433a34bd1 Mon Sep 17 00:00:00 2001
+From: Takashi Iwai <ti...@suse.de>
+Date: Tue, 16 Nov 2021 07:54:15 +0100
+Subject: [PATCH] ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink
+Git-commit: 02eb1d098e26f34c8f047b0b1cee6f4433a34bd1
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git
+Patch-mainline: Queued in subsystem maintainer repository
+References: bsc#1192375
+
+Bose Revolve+ SoundLink (0a57:40fa) advertises invalid dB level for
+the speaker volume.  This patch provides the correction in the mixer
+map quirk table entry.
+
+Note that this requires the prerequisite change to add min_mute flag
+to the dB map table.
+
+Buglink: https://bugzilla.suse.com/show_bug.cgi?id=1192375
+Link: https://lore.kernel.org/r/20211116065415.11159-4-ti...@suse.de
+Signed-off-by: Takashi Iwai <ti...@suse.de>
+
+---
+ sound/usb/mixer_maps.c | 12 ++++++++++++
+ 1 file changed, 12 insertions(+)
+
+diff --git a/sound/usb/mixer_maps.c b/sound/usb/mixer_maps.c
+index 9d71c569b148..5d391f62351b 100644
+--- a/sound/usb/mixer_maps.c
++++ b/sound/usb/mixer_maps.c
+@@ -337,6 +337,13 @@ static const struct usbmix_name_map bose_companion5_map[] 
= {
+       { 0 }   /* terminator */
+ };
+ 
++/* Bose Revolve+ SoundLink, correction of dB maps */
++static const struct usbmix_dB_map bose_soundlink_dB = {-8283, -0, true};
++static const struct usbmix_name_map bose_soundlink_map[] = {
++      { 2, NULL, .dB = &bose_soundlink_dB },
++      { 0 }   /* terminator */
++};
++
+ /* Sennheiser Communications Headset [PC 8], the dB value is reported as -6 
negative maximum  */
+ static const struct usbmix_dB_map sennheiser_pc8_dB = {-9500, 0};
+ static const struct usbmix_name_map sennheiser_pc8_map[] = {
+@@ -522,6 +529,11 @@ static const struct usbmix_ctl_map usbmix_ctl_maps[] = {
+               .id = USB_ID(0x05a7, 0x1020),
+               .map = bose_companion5_map,
+       },
++      {
++              /* Bose Revolve+ SoundLink */
++              .id = USB_ID(0x05a7, 0x40fa),
++              .map = bose_soundlink_map,
++      },
+       {
+               /* Corsair Virtuoso SE (wired mode) */
+               .id = USB_ID(0x1b1c, 0x0a3d),
+-- 
+2.26.2
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch 
new/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch
--- old/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch     
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch     
2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,38 @@
+From fd23116d7b8dffa05f42a857eee6ee9cce238d24 Mon Sep 17 00:00:00 2001
+From: Takashi Iwai <ti...@suse.de>
+Date: Tue, 16 Nov 2021 07:54:13 +0100
+Subject: [PATCH] ALSA: usb-audio: Use int for dB map values
+Git-commit: fd23116d7b8dffa05f42a857eee6ee9cce238d24
+Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git
+Patch-mainline: Queued in subsystem maintainer repository
+References: bsc#1192375
+
+The values in usbmix_dB_map should be rather signed while we're using
+u32.  As the copied target (usb_mixer_elem_info.dBmin and dBmax) is
+int, let's make them also int.
+
+Link: https://lore.kernel.org/r/20211116065415.11159-2-ti...@suse.de
+Signed-off-by: Takashi Iwai <ti...@suse.de>
+
+---
+ sound/usb/mixer_maps.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/sound/usb/mixer_maps.c b/sound/usb/mixer_maps.c
+index 55eea90ee993..92c06b1bb979 100644
+--- a/sound/usb/mixer_maps.c
++++ b/sound/usb/mixer_maps.c
+@@ -6,8 +6,8 @@
+  */
+ 
+ struct usbmix_dB_map {
+-      u32 min;
+-      u32 max;
++      int min;
++      int max;
+ };
+ 
+ struct usbmix_name_map {
+-- 
+2.26.2
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_from_.patch 
new/patches.suse/Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_from_.patch
--- old/patches.suse/Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_from_.patch 
2021-11-07 19:50:45.000000000 +0100
+++ new/patches.suse/Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_from_.patch 
1970-01-01 01:00:00.000000000 +0100
@@ -1,95 +0,0 @@
-From 99c23da0eed4fd20cae8243f2b51e10e66aa0951 Mon Sep 17 00:00:00 2001
-From: Takashi Iwai <ti...@suse.de>
-Date: Sat, 28 Aug 2021 18:18:18 +0200
-Subject: [PATCH] Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
-Git-commit: 99c23da0eed4fd20cae8243f2b51e10e66aa0951
-Patch-mainline: v5.16-rc1
-References: CVE-2021-3640 bsc#1188172
-
-The sco_send_frame() also takes lock_sock() during memcpy_from_msg()
-call that may be endlessly blocked by a task with userfaultd
-technique, and this will result in a hung task watchdog trigger.
-
-Just like the similar fix for hci_sock_sendmsg() in commit
-92c685dc5de0 ("Bluetooth: reorganize functions..."), this patch moves
-the  memcpy_from_msg() out of lock_sock() for addressing the hang.
-
-This should be the last piece for fixing CVE-2021-3640 after a few
-already queued fixes.
-
-Signed-off-by: Takashi Iwai <ti...@suse.de>
-Signed-off-by: Marcel Holtmann <mar...@holtmann.org>
-
----
- net/bluetooth/sco.c | 24 ++++++++++++++++--------
- 1 file changed, 16 insertions(+), 8 deletions(-)
-
-diff --git a/net/bluetooth/sco.c b/net/bluetooth/sco.c
-index 98a881586512..b62c91c627e2 100644
---- a/net/bluetooth/sco.c
-+++ b/net/bluetooth/sco.c
-@@ -280,7 +280,8 @@ static int sco_connect(struct hci_dev *hdev, struct sock 
*sk)
-       return err;
- }
- 
--static int sco_send_frame(struct sock *sk, struct msghdr *msg, int len)
-+static int sco_send_frame(struct sock *sk, void *buf, int len,
-+                        unsigned int msg_flags)
- {
-       struct sco_conn *conn = sco_pi(sk)->conn;
-       struct sk_buff *skb;
-@@ -292,15 +293,11 @@ static int sco_send_frame(struct sock *sk, struct msghdr 
*msg, int len)
- 
-       BT_DBG("sk %p len %d", sk, len);
- 
--      skb = bt_skb_send_alloc(sk, len, msg->msg_flags & MSG_DONTWAIT, &err);
-+      skb = bt_skb_send_alloc(sk, len, msg_flags & MSG_DONTWAIT, &err);
-       if (!skb)
-               return err;
- 
--      if (memcpy_from_msg(skb_put(skb, len), msg, len)) {
--              kfree_skb(skb);
--              return -EFAULT;
--      }
--
-+      memcpy(skb_put(skb, len), buf, len);
-       hci_send_sco(conn->hcon, skb);
- 
-       return len;
-@@ -725,6 +722,7 @@ static int sco_sock_sendmsg(struct socket *sock, struct 
msghdr *msg,
-                           size_t len)
- {
-       struct sock *sk = sock->sk;
-+      void *buf;
-       int err;
- 
-       BT_DBG("sock %p, sk %p", sock, sk);
-@@ -736,14 +734,24 @@ static int sco_sock_sendmsg(struct socket *sock, struct 
msghdr *msg,
-       if (msg->msg_flags & MSG_OOB)
-               return -EOPNOTSUPP;
- 
-+      buf = kmalloc(len, GFP_KERNEL);
-+      if (!buf)
-+              return -ENOMEM;
-+
-+      if (memcpy_from_msg(buf, msg, len)) {
-+              kfree(buf);
-+              return -EFAULT;
-+      }
-+
-       lock_sock(sk);
- 
-       if (sk->sk_state == BT_CONNECTED)
--              err = sco_send_frame(sk, msg, len);
-+              err = sco_send_frame(sk, buf, len, msg->msg_flags);
-       else
-               err = -ENOTCONN;
- 
-       release_sock(sk);
-+      kfree(buf);
-       return err;
- }
- 
--- 
-2.26.2
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/Input-i8042-Add-deferred-probe-support.patch 
new/patches.suse/Input-i8042-Add-deferred-probe-support.patch
--- old/patches.suse/Input-i8042-Add-deferred-probe-support.patch       
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/Input-i8042-Add-deferred-probe-support.patch       
2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,268 @@
+From: Takashi Iwai <ti...@suse.de>
+Subject: [PATCH] Input: i8042 - Add deferred probe support
+Patch-mainline: No, testing
+References: bsc#1190256
+
+We've got a bug report about the non-working keyboard on ASUS ZenBook
+UX425UA.  It seems that the PS/2 device isn't ready immediately at
+boot but takes some seconds to get ready.  Until now, the only
+workaround is to defer the probe, but it's available only when the
+driver is a module.  However, many distros, including openSUSE as in
+the original report, build the PS/2 input drivers into kernel, hence
+it won't work easily.
+
+This patch adds the support for the deferred probe for i8042 stuff as
+a workaround of the problem above.  When the deferred probe mode is
+enabled and the device couldn't be probed, it'll be repeated with the
+standard deferred probe mechanism.
+
+The deferred probe mode is enabled either via the new option
+i8042.probe_defer or via the quirk table entry.  As of this patch, the
+quirk table contains only ASUS ZenBook UX425UA.
+
+The deferred probe part is based on Fabio's initial work.
+
+Buglink: https://bugzilla.suse.com/show_bug.cgi?id=1190256
+Link: https://lore.kernel.org/r/s5ho890n1rh.wl-ti...@suse.de
+Co-developed-by: Fabio Estevam <feste...@gmail.com>
+Signed-off-by: Fabio Estevam <feste...@gmail.com>
+Signed-off-by: Takashi Iwai <ti...@suse.de>
+
+---
+ .../admin-guide/kernel-parameters.txt         |  2 +
+ drivers/input/serio/i8042-x86ia64io.h         | 14 +++++
+ drivers/input/serio/i8042.c                   | 54 ++++++++++++-------
+ 3 files changed, 51 insertions(+), 19 deletions(-)
+
+diff --git a/Documentation/admin-guide/kernel-parameters.txt 
b/Documentation/admin-guide/kernel-parameters.txt
+index 756bfb7d5235..11f504a4a562 100644
+--- a/Documentation/admin-guide/kernel-parameters.txt
++++ b/Documentation/admin-guide/kernel-parameters.txt
+@@ -1685,6 +1685,8 @@
+                       architectures force reset to be always executed
+       i8042.unlock    [HW] Unlock (ignore) the keylock
+       i8042.kbdreset  [HW] Reset device connected to KBD port
++      i8042.probe_defer
++                      [HW] Allow deferred probing upon i8042 probe errors
+ 
+       i810=           [HW,DRM]
+ 
+diff --git a/drivers/input/serio/i8042-x86ia64io.h 
b/drivers/input/serio/i8042-x86ia64io.h
+index a5a003553646..41335a1d7001 100644
+--- a/drivers/input/serio/i8042-x86ia64io.h
++++ b/drivers/input/serio/i8042-x86ia64io.h
+@@ -981,6 +981,17 @@ static const struct dmi_system_id __initconst 
i8042_dmi_kbdreset_table[] = {
+       { }
+ };
+ 
++static const struct dmi_system_id i8042_dmi_probe_defer_table[] __initconst = 
{
++      {
++              /* ASUS ZenBook UX425UA */
++              .matches = {
++                      DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
++                      DMI_MATCH(DMI_PRODUCT_NAME, "ZenBook UX425UA"),
++              },
++      },
++      { }
++};
++
+ #endif /* CONFIG_X86 */
+ 
+ #ifdef CONFIG_PNP
+@@ -1301,6 +1312,9 @@ static int __init i8042_platform_init(void)
+       if (dmi_check_system(i8042_dmi_kbdreset_table))
+               i8042_kbdreset = true;
+ 
++      if (dmi_check_system(i8042_dmi_probe_defer_table))
++              i8042_probe_defer = true;
++
+       /*
+        * A20 was already enabled during early kernel init. But some buggy
+        * BIOSes (in MSI Laptops) require A20 to be enabled using 8042 to
+diff --git a/drivers/input/serio/i8042.c b/drivers/input/serio/i8042.c
+index 0b9f1d0a8f8b..ea0c52ca95c4 100644
+--- a/drivers/input/serio/i8042.c
++++ b/drivers/input/serio/i8042.c
+@@ -45,6 +45,10 @@ static bool i8042_unlock;
+ module_param_named(unlock, i8042_unlock, bool, 0);
+ MODULE_PARM_DESC(unlock, "Ignore keyboard lock.");
+ 
++static bool i8042_probe_defer;
++module_param_named(probe_defer, i8042_probe_defer, bool, 0);
++MODULE_PARM_DESC(probe_defer, "Allow deferred probing.");
++
+ enum i8042_controller_reset_mode {
+       I8042_RESET_NEVER,
+       I8042_RESET_ALWAYS,
+@@ -711,7 +715,7 @@ static int i8042_set_mux_mode(bool multiplex, unsigned 
char *mux_version)
+  * LCS/Telegraphics.
+  */
+ 
+-static int __init i8042_check_mux(void)
++static int i8042_check_mux(void)
+ {
+       unsigned char mux_version;
+ 
+@@ -740,10 +744,10 @@ static int __init i8042_check_mux(void)
+ /*
+  * The following is used to test AUX IRQ delivery.
+  */
+-static struct completion i8042_aux_irq_delivered __initdata;
+-static bool i8042_irq_being_tested __initdata;
++static struct completion i8042_aux_irq_delivered;
++static bool i8042_irq_being_tested;
+ 
+-static irqreturn_t __init i8042_aux_test_irq(int irq, void *dev_id)
++static irqreturn_t i8042_aux_test_irq(int irq, void *dev_id)
+ {
+       unsigned long flags;
+       unsigned char str, data;
+@@ -770,7 +774,7 @@ static irqreturn_t __init i8042_aux_test_irq(int irq, void 
*dev_id)
+  * verifies success by readinng CTR. Used when testing for presence of AUX
+  * port.
+  */
+-static int __init i8042_toggle_aux(bool on)
++static int i8042_toggle_aux(bool on)
+ {
+       unsigned char param;
+       int i;
+@@ -798,7 +802,7 @@ static int __init i8042_toggle_aux(bool on)
+  * the presence of an AUX interface.
+  */
+ 
+-static int __init i8042_check_aux(void)
++static int i8042_check_aux(void)
+ {
+       int retval = -1;
+       bool irq_registered = false;
+@@ -1005,7 +1009,7 @@ static int i8042_controller_init(void)
+ 
+               if (i8042_command(&ctr[n++ % 2], I8042_CMD_CTL_RCTR)) {
+                       pr_err("Can't read CTR while initializing i8042\n");
+-                      return -EIO;
++                      return i8042_probe_defer ? -EPROBE_DEFER : -EIO;
+               }
+ 
+       } while (n < 2 || ctr[0] != ctr[1]);
+@@ -1320,7 +1324,7 @@ static void i8042_shutdown(struct platform_device *dev)
+       i8042_controller_reset(false);
+ }
+ 
+-static int __init i8042_create_kbd_port(void)
++static int i8042_create_kbd_port(void)
+ {
+       struct serio *serio;
+       struct i8042_port *port = &i8042_ports[I8042_KBD_PORT_NO];
+@@ -1349,7 +1353,7 @@ static int __init i8042_create_kbd_port(void)
+       return 0;
+ }
+ 
+-static int __init i8042_create_aux_port(int idx)
++static int i8042_create_aux_port(int idx)
+ {
+       struct serio *serio;
+       int port_no = idx < 0 ? I8042_AUX_PORT_NO : I8042_MUX_PORT_NO + idx;
+@@ -1386,13 +1390,13 @@ static int __init i8042_create_aux_port(int idx)
+       return 0;
+ }
+ 
+-static void __init i8042_free_kbd_port(void)
++static void i8042_free_kbd_port(void)
+ {
+       kfree(i8042_ports[I8042_KBD_PORT_NO].serio);
+       i8042_ports[I8042_KBD_PORT_NO].serio = NULL;
+ }
+ 
+-static void __init i8042_free_aux_ports(void)
++static void i8042_free_aux_ports(void)
+ {
+       int i;
+ 
+@@ -1402,7 +1406,7 @@ static void __init i8042_free_aux_ports(void)
+       }
+ }
+ 
+-static void __init i8042_register_ports(void)
++static void i8042_register_ports(void)
+ {
+       int i;
+ 
+@@ -1443,7 +1447,7 @@ static void i8042_free_irqs(void)
+       i8042_aux_irq_registered = i8042_kbd_irq_registered = false;
+ }
+ 
+-static int __init i8042_setup_aux(void)
++static int i8042_setup_aux(void)
+ {
+       int (*aux_enable)(void);
+       int error;
+@@ -1485,7 +1489,7 @@ static int __init i8042_setup_aux(void)
+       return error;
+ }
+ 
+-static int __init i8042_setup_kbd(void)
++static int i8042_setup_kbd(void)
+ {
+       int error;
+ 
+@@ -1535,7 +1539,7 @@ static int i8042_kbd_bind_notifier(struct notifier_block 
*nb,
+       return 0;
+ }
+ 
+-static int __init i8042_probe(struct platform_device *dev)
++static int i8042_probe(struct platform_device *dev)
+ {
+       int error;
+ 
+@@ -1600,6 +1604,7 @@ static struct platform_driver i8042_driver = {
+               .pm     = &i8042_pm_ops,
+ #endif
+       },
++      .probe          = i8042_probe,
+       .remove         = i8042_remove,
+       .shutdown       = i8042_shutdown,
+ };
+@@ -1610,7 +1615,6 @@ static struct notifier_block 
i8042_kbd_bind_notifier_block = {
+ 
+ static int __init i8042_init(void)
+ {
+-      struct platform_device *pdev;
+       int err;
+ 
+       dbg_init();
+@@ -1626,17 +1630,29 @@ static int __init i8042_init(void)
+       /* Set this before creating the dev to allow i8042_command to work 
right away */
+       i8042_present = true;
+ 
+-      pdev = platform_create_bundle(&i8042_driver, i8042_probe, NULL, 0, 
NULL, 0);
+-      if (IS_ERR(pdev)) {
+-              err = PTR_ERR(pdev);
++      err = platform_driver_register(&i8042_driver);
++      if (err)
+               goto err_platform_exit;
++
++      i8042_platform_device = platform_device_alloc("i8042", -1);
++      if (!i8042_platform_device) {
++              err = -ENOMEM;
++              goto err_unregister_driver;
+       }
+ 
++      err = platform_device_add(i8042_platform_device);
++      if (err)
++              goto err_free_device;
++
+       bus_register_notifier(&serio_bus, &i8042_kbd_bind_notifier_block);
+       panic_blink = i8042_panic_blink;
+ 
+       return 0;
+ 
++err_free_device:
++      platform_device_put(i8042_platform_device);
++err_unregister_driver:
++      platform_driver_unregister(&i8042_driver);
+  err_platform_exit:
+       i8042_platform_exit();
+       return err;
+-- 
+2.26.2
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/Input-i8042-Add-quirk-for-Fujitsu-Lifebook-T725.patch 
new/patches.suse/Input-i8042-Add-quirk-for-Fujitsu-Lifebook-T725.patch
--- old/patches.suse/Input-i8042-Add-quirk-for-Fujitsu-Lifebook-T725.patch      
2021-11-07 19:50:45.000000000 +0100
+++ new/patches.suse/Input-i8042-Add-quirk-for-Fujitsu-Lifebook-T725.patch      
1970-01-01 01:00:00.000000000 +0100
@@ -1,55 +0,0 @@
-From: Takashi Iwai <ti...@suse.de>
-Subject: [PATCH] Input: i8042 - Add quirk for Fujitsu Lifebook T725
-Date: Wed,  3 Nov 2021 08:00:19 +0100
-Message-id: <20211103070019.13374-1-ti...@suse.de>
-Patch-mainline: Submitted, linux-input ML
-References: bsc#1191980
-
-Fujitsu Lifebook T725 laptop requires, like a few other similar
-models, the nomux and notimeout options to probe the touchpad
-properly.  This patch adds the corresponding quirk entries.
-
-Buglink: https://bugzilla.suse.com/show_bug.cgi?id=1191980
-Tested-by: Neal Gompa <ngomp...@gmail.com>
-Cc: <sta...@vger.kernel.org>
-Signed-off-by: Takashi Iwai <ti...@suse.de>
-
----
- drivers/input/serio/i8042-x86ia64io.h | 14 ++++++++++++++
- 1 file changed, 14 insertions(+)
-
-diff --git a/drivers/input/serio/i8042-x86ia64io.h 
b/drivers/input/serio/i8042-x86ia64io.h
-index a5a003553646..aedd05541044 100644
---- a/drivers/input/serio/i8042-x86ia64io.h
-+++ b/drivers/input/serio/i8042-x86ia64io.h
-@@ -272,6 +272,13 @@ static const struct dmi_system_id __initconst 
i8042_dmi_nomux_table[] = {
-                       DMI_MATCH(DMI_PRODUCT_NAME, "LifeBook S6230"),
-               },
-       },
-+      {
-+              /* Fujitsu Lifebook T725 laptop */
-+              .matches = {
-+                      DMI_MATCH(DMI_SYS_VENDOR, "FUJITSU"),
-+                      DMI_MATCH(DMI_PRODUCT_NAME, "LIFEBOOK T725"),
-+              },
-+      },
-       {
-               /* Fujitsu Lifebook U745 */
-               .matches = {
-@@ -840,6 +847,13 @@ static const struct dmi_system_id __initconst 
i8042_dmi_notimeout_table[] = {
-                       DMI_MATCH(DMI_PRODUCT_NAME, "LIFEBOOK AH544"),
-               },
-       },
-+      {
-+              /* Fujitsu Lifebook T725 laptop */
-+              .matches = {
-+                      DMI_MATCH(DMI_SYS_VENDOR, "FUJITSU"),
-+                      DMI_MATCH(DMI_PRODUCT_NAME, "LIFEBOOK T725"),
-+              },
-+      },
-       {
-               /* Fujitsu U574 laptop */
-               /* https://bugzilla.kernel.org/show_bug.cgi?id=69731 */
--- 
-2.26.2
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/KVM-Fix-steal-time-asm-constraints.patch 
new/patches.suse/KVM-Fix-steal-time-asm-constraints.patch
--- old/patches.suse/KVM-Fix-steal-time-asm-constraints.patch   1970-01-01 
01:00:00.000000000 +0100
+++ new/patches.suse/KVM-Fix-steal-time-asm-constraints.patch   2021-11-19 
09:35:39.000000000 +0100
@@ -0,0 +1,40 @@
+From: David Woodhouse <d...@amazon.co.uk>
+Date: Sun, 14 Nov 2021 08:59:02 +0000
+Subject: KVM: Fix steal time asm constraints
+Git-commit: 964b7aa0b040bdc6ec1c543ee620cda3f8b4c68a
+Patch-mainline: v5.16-rc1
+References: git-fixes
+
+In 64-bit mode, x86 instruction encoding allows us to use the low 8 bits
+of any GPR as an 8-bit operand. In 32-bit mode, however, we can only use
+the [abcd] registers. For which, GCC has the "q" constraint instead of
+the less restrictive "r".
+
+Also fix st->preempted, which is an input/output operand rather than an
+input.
+
+Fixes: 7e2175ebd695 ("KVM: x86: Fix recording of guest steal time / preempted 
status")
+Reported-by: kernel test robot <l...@intel.com>
+Signed-off-by: David Woodhouse <d...@amazon.co.uk>
+Message-Id: <89bf72db1b859990355f9c40713a34e0d2d86c98.ca...@infradead.org>
+Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ arch/x86/kvm/x86.c |    6 +++---
+ 1 file changed, 3 insertions(+), 3 deletions(-)
+
+--- a/arch/x86/kvm/x86.c
++++ b/arch/x86/kvm/x86.c
+@@ -3242,9 +3242,9 @@ static void record_steal_time(struct kvm
+                            "xor %1, %1\n"
+                            "2:\n"
+                            _ASM_EXTABLE_UA(1b, 2b)
+-                           : "+r" (st_preempted),
+-                             "+&r" (err)
+-                           : "m" (st->preempted));
++                           : "+q" (st_preempted),
++                             "+&r" (err),
++                             "+m" (st->preempted));
+               if (err)
+                       goto out;
+ 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/random-fix-crash-on-multiple-early-calls-to-add_bootloader_randomness.patch
 
new/patches.suse/random-fix-crash-on-multiple-early-calls-to-add_bootloader_randomness.patch
--- 
old/patches.suse/random-fix-crash-on-multiple-early-calls-to-add_bootloader_randomness.patch
        1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.suse/random-fix-crash-on-multiple-early-calls-to-add_bootloader_randomness.patch
        2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,62 @@
+From: Dominik Brodowski <li...@dominikbrodowski.net>
+Date: Fri, 5 Nov 2021 07:04:36 +0100
+Subject: random: fix crash on multiple early calls to
+ add_bootloader_randomness()
+Patch-mainline: Not yet, in maintainer queue.
+References: bsc#1184924
+
+If add_bootloader_randomness() or add_hwgenerator_randomness() is
+called for the first time during early boot, crng_init equals 0. Then,
+crng_fast_load() gets called -- which is safe to do even if the input
+pool is not yet properly set up.
+
+If the added entropy suffices to increase crng_init to 1, future calls
+to add_bootloader_randomness() or add_hwgenerator_randomness() used to
+progress to credit_entropy_bits(). However, if the input pool is not yet
+properly set up, the cmpxchg call within that function can lead to an
+infinite recursion. This is not only a hypothetical problem, as qemu
+on arm64 may provide bootloader entropy via EFI and via devicetree.
+
+As crng_global_init_time is set to != 0 once the input pool is properly
+set up, check (also) for this condition to determine which branch to take.
+
+Calls to crng_fast_load() do not modify the input pool; therefore, the
+entropy_count for the input pool must not be modified at that early
+stage.
+
+Reported-by: Ivan T. Ivanov <iiva...@suse.de>
+Fixes: 18b915ac6b0a ("efi/random: Treat EFI_RNG_PROTOCOL output as bootloader 
randomness")
+Tested-by: Ivan T. Ivanov <iiva...@suse.de>
+Signed-off-by: Dominik Brodowski <li...@dominikbrodowski.net>
+Acked-by: Ivan T. Ivanov <iiva...@suse.de>
+---
+ drivers/char/random.c |   11 ++++++++---
+ 1 file changed, 8 insertions(+), 3 deletions(-)
+
+--- a/drivers/char/random.c
++++ b/drivers/char/random.c
+@@ -1763,8 +1763,8 @@ static void __init init_std_data(struct
+ }
+ 
+ /*
+- * Note that setup_arch() may call add_device_randomness()
+- * long before we get here. This allows seeding of the pools
++ * add_device_randomness() or add_bootloader_randomness() may be
++ * called long before we get here. This allows seeding of the pools
+  * with some platform dependent data very early in the boot
+  * process. But it limits our options here. We must use
+  * statically allocated structures that already have all
+@@ -2274,7 +2274,12 @@ void add_hwgenerator_randomness(const ch
+ {
+       struct entropy_store *poolp = &input_pool;
+ 
+-      if (unlikely(crng_init == 0)) {
++      /* We cannot do much with the input pool until it is set up in
++       * rand_initalize(); therefore just mix into the crng state.
++       * As this does not affect the input pool, we cannot credit
++       * entropy for this.
++       */
++      if (unlikely(crng_init == 0 || crng_global_init_time == 0)) {
+               crng_fast_load(buffer, count);
+               return;
+       }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/rtw89-Fix-crash-by-loading-compressed-firmware-file.patch 
new/patches.suse/rtw89-Fix-crash-by-loading-compressed-firmware-file.patch
--- old/patches.suse/rtw89-Fix-crash-by-loading-compressed-firmware-file.patch  
2021-11-07 19:50:45.000000000 +0100
+++ new/patches.suse/rtw89-Fix-crash-by-loading-compressed-firmware-file.patch  
1970-01-01 01:00:00.000000000 +0100
@@ -1,79 +0,0 @@
-From: Takashi Iwai <ti...@suse.de>
-Subject: [PATCH] rtw89: Fix crash by loading compressed firmware file
-Date: Fri,  5 Nov 2021 08:17:25 +0100
-Message-id: <20211105071725.31539-1-ti...@suse.de>
-Patch-mainline: Submitted, linux-wireless ML
-References: bsc#1188303
-
-When a firmware is loaded in the compressed format or via user-mode
-helper, it's mapped in read-only, and the rtw89 driver crashes at
-rtw89_fw_download() when it tries to modify some data.
-
-This patch is an attemp to avoid the crash by re-allocating the data
-via vmalloc() for the data modification.
-
-Buglink: https://bugzilla.opensuse.org/show_bug.cgi?id=1188303
-Signed-off-by: Takashi Iwai <ti...@suse.de>
-
----
- drivers/net/wireless/realtek/rtw89/core.h |  3 ++-
- drivers/net/wireless/realtek/rtw89/fw.c   | 15 ++++++++++-----
- 2 files changed, 12 insertions(+), 6 deletions(-)
-
-diff --git a/drivers/net/wireless/realtek/rtw89/core.h 
b/drivers/net/wireless/realtek/rtw89/core.h
-index c2885e4dd882..048855e05697 100644
---- a/drivers/net/wireless/realtek/rtw89/core.h
-+++ b/drivers/net/wireless/realtek/rtw89/core.h
-@@ -2309,7 +2309,8 @@ struct rtw89_fw_suit {
-       RTW89_FW_VER_CODE((s)->major_ver, (s)->minor_ver, (s)->sub_ver, 
(s)->sub_idex)
- 
- struct rtw89_fw_info {
--      const struct firmware *firmware;
-+      const void *firmware;
-+      size_t firmware_size;
-       struct rtw89_dev *rtwdev;
-       struct completion completion;
-       u8 h2c_seq;
-diff --git a/drivers/net/wireless/realtek/rtw89/fw.c 
b/drivers/net/wireless/realtek/rtw89/fw.c
-index 212aaf577d3c..b59fecaeea25 100644
---- a/drivers/net/wireless/realtek/rtw89/fw.c
-+++ b/drivers/net/wireless/realtek/rtw89/fw.c
-@@ -124,8 +124,8 @@ int rtw89_mfw_recognize(struct rtw89_dev *rtwdev, enum 
rtw89_fw_type type,
-                       struct rtw89_fw_suit *fw_suit)
- {
-       struct rtw89_fw_info *fw_info = &rtwdev->fw;
--      const u8 *mfw = fw_info->firmware->data;
--      u32 mfw_len = fw_info->firmware->size;
-+      const u8 *mfw = fw_info->firmware;
-+      u32 mfw_len = fw_info->firmware_size;
-       const struct rtw89_mfw_hdr *mfw_hdr = (const struct rtw89_mfw_hdr *)mfw;
-       const struct rtw89_mfw_info *mfw_info;
-       int i;
-@@ -489,7 +489,10 @@ static void rtw89_load_firmware_cb(const struct firmware 
*firmware, void *contex
-               return;
-       }
- 
--      fw->firmware = firmware;
-+      fw->firmware = vmalloc(firmware->size);
-+      if (fw->firmware)
-+              memcpy((void *)fw->firmware, firmware->data, firmware->size);
-+      release_firmware(firmware);
-       complete_all(&fw->completion);
- }
- 
-@@ -518,8 +521,10 @@ void rtw89_unload_firmware(struct rtw89_dev *rtwdev)
- 
-       rtw89_wait_firmware_completion(rtwdev);
- 
--      if (fw->firmware)
--              release_firmware(fw->firmware);
-+      if (fw->firmware) {
-+              vfree(fw->firmware);
-+              fw->firmware = NULL;
-+      }
- }
- 
- #define H2C_CAM_LEN 60
--- 
-2.26.2
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/rtw89-update-partition-size-of-firmware-header-on-sk.patch 
new/patches.suse/rtw89-update-partition-size-of-firmware-header-on-sk.patch
--- old/patches.suse/rtw89-update-partition-size-of-firmware-header-on-sk.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/rtw89-update-partition-size-of-firmware-header-on-sk.patch 
2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,64 @@
+From: Ping-Ke Shih <pks...@realtek.com>
+Subject: [PATCH 1/3] rtw89: update partition size of firmware header on 
skb->data
+Date: Thu, 11 Nov 2021 10:14:55 +0800
+Message-id: <20211111021457.13776-2-pks...@realtek.com>
+Patch-mainline: Submitted, linux-wireless ML
+References: bsc#1188303
+
+The partition size is used to tell hardware the size of piece we are going
+to send a firmware. The old code updates the size in constant buffer of
+firmware, and leads system crash.
+
+To fix this, update the size on skb->data after we copy the firmware data
+into skb.
+
+Fixes: e3ec7017f6a2 ("rtw89: add Realtek 802.11ax driver")
+Reported-by: Takashi Iwai <ti...@suse.de>
+Signed-off-by: Ping-Ke Shih <pks...@realtek.com>
+Signed-off-by: Takashi Iwai <ti...@suse.de>
+
+---
+ drivers/net/wireless/realtek/rtw89/fw.c | 2 +-
+ drivers/net/wireless/realtek/rtw89/fw.h | 6 ++++--
+ 2 files changed, 5 insertions(+), 3 deletions(-)
+
+diff --git a/drivers/net/wireless/realtek/rtw89/fw.c 
b/drivers/net/wireless/realtek/rtw89/fw.c
+index 212aaf577d3c5..65ef3dc9d0614 100644
+--- a/drivers/net/wireless/realtek/rtw89/fw.c
++++ b/drivers/net/wireless/realtek/rtw89/fw.c
+@@ -91,7 +91,6 @@ static int rtw89_fw_hdr_parser(struct rtw89_dev *rtwdev, 
const u8 *fw, u32 len,
+       info->section_num = GET_FW_HDR_SEC_NUM(fw);
+       info->hdr_len = RTW89_FW_HDR_SIZE +
+                       info->section_num * RTW89_FW_SECTION_HDR_SIZE;
+-      SET_FW_HDR_PART_SIZE(fw, FWDL_SECTION_PER_PKT_LEN);
+ 
+       bin = fw + info->hdr_len;
+ 
+@@ -275,6 +274,7 @@ static int __rtw89_fw_download_hdr(struct rtw89_dev 
*rtwdev, const u8 *fw, u32 l
+       }
+ 
+       skb_put_data(skb, fw, len);
++      SET_FW_HDR_PART_SIZE(skb->data, FWDL_SECTION_PER_PKT_LEN);
+       rtw89_h2c_pkt_set_hdr_fwdl(rtwdev, skb, FWCMD_TYPE_H2C,
+                                  H2C_CAT_MAC, H2C_CL_MAC_FWDL,
+                                  H2C_FUNC_MAC_FWHDR_DL, len);
+diff --git a/drivers/net/wireless/realtek/rtw89/fw.h 
b/drivers/net/wireless/realtek/rtw89/fw.h
+index 7ee0d93233107..36e8d0da6c1e7 100644
+--- a/drivers/net/wireless/realtek/rtw89/fw.h
++++ b/drivers/net/wireless/realtek/rtw89/fw.h
+@@ -282,8 +282,10 @@ struct rtw89_h2creg_sch_tx_en {
+       le32_get_bits(*((__le32 *)(fwhdr) + 6), GENMASK(15, 8))
+ #define GET_FW_HDR_CMD_VERSERION(fwhdr)       \
+       le32_get_bits(*((__le32 *)(fwhdr) + 7), GENMASK(31, 24))
+-#define SET_FW_HDR_PART_SIZE(fwhdr, val)      \
+-      le32p_replace_bits((__le32 *)(fwhdr) + 7, val, GENMASK(15, 0))
++static inline void SET_FW_HDR_PART_SIZE(void *fwhdr, u32 val)
++{
++      le32p_replace_bits((__le32 *)fwhdr + 7, val, GENMASK(15, 0));
++}
+ 
+ #define SET_CTRL_INFO_MACID(table, val) \
+       le32p_replace_bits((__le32 *)(table) + 0, val, GENMASK(6, 0))
+-- 
+2.25.1
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/samples-bpf-Fix-incorrect-use-of-strlen-in-xdp_redir.patch 
new/patches.suse/samples-bpf-Fix-incorrect-use-of-strlen-in-xdp_redir.patch
--- old/patches.suse/samples-bpf-Fix-incorrect-use-of-strlen-in-xdp_redir.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/samples-bpf-Fix-incorrect-use-of-strlen-in-xdp_redir.patch 
2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,49 @@
+From: Kumar Kartikeya Dwivedi <mem...@gmail.com>
+Date: Fri, 12 Nov 2021 07:33:01 +0530
+Subject: samples/bpf: Fix incorrect use of strlen in xdp_redirect_cpu
+Git-commit: 2453afe3845523d9dfe89dbfb3d71abfa095e260
+Patch-mainline: v5.16-rc1
+References: git-fixes
+
+Commit b599015f044d ("samples/bpf: Fix application of sizeof to pointer")
+tried to fix a bug where sizeof was incorrectly applied to a pointer instead
+of the array string was being copied to, to find the destination buffer size,
+but ended up using strlen, which is still incorrect. However, on closer look
+ifname_buf has no other use, hence directly use optarg.
+
+Fixes: b599015f044d ("samples/bpf: Fix application of sizeof to pointer")
+Fixes: e531a220cc59 ("samples: bpf: Convert xdp_redirect_cpu to XDP samples 
helper")
+Signed-off-by: Kumar Kartikeya Dwivedi <mem...@gmail.com>
+Signed-off-by: Daniel Borkmann <dan...@iogearbox.net>
+Reviewed-by: Alexander Lobakin <alexandr.loba...@intel.com>
+Tested-by: Alexander Lobakin <alexandr.loba...@intel.com>
+Link: https://lore.kernel.org/bpf/20211112020301.528357-1-mem...@gmail.com
+Signed-off-by: Alexei Starovoitov <a...@kernel.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ samples/bpf/xdp_redirect_cpu_user.c |    5 ++---
+ 1 file changed, 2 insertions(+), 3 deletions(-)
+
+--- a/samples/bpf/xdp_redirect_cpu_user.c
++++ b/samples/bpf/xdp_redirect_cpu_user.c
+@@ -309,7 +309,6 @@ int main(int argc, char **argv)
+       const char *mprog_filename = NULL, *mprog_name = NULL;
+       struct xdp_redirect_cpu *skel;
+       struct bpf_map_info info = {};
+-      char ifname_buf[IF_NAMESIZE];
+       struct bpf_cpumap_val value;
+       __u32 infosz = sizeof(info);
+       int ret = EXIT_FAIL_OPTION;
+@@ -390,10 +389,10 @@ int main(int argc, char **argv)
+               case 'd':
+                       if (strlen(optarg) >= IF_NAMESIZE) {
+                               fprintf(stderr, "-d/--dev name too long\n");
++                              usage(argv, long_options, __doc__, mask, true, 
skel->obj);
+                               goto end_cpu;
+                       }
+-                      safe_strncpy(ifname_buf, optarg, strlen(ifname_buf));
+-                      ifindex = if_nametoindex(ifname_buf);
++                      ifindex = if_nametoindex(optarg);
+                       if (!ifindex)
+                               ifindex = strtoul(optarg, NULL, 0);
+                       if (!ifindex) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/selftests-net-switch-to-socat-in-the-GSO-GRE-test.patch 
new/patches.suse/selftests-net-switch-to-socat-in-the-GSO-GRE-test.patch
--- old/patches.suse/selftests-net-switch-to-socat-in-the-GSO-GRE-test.patch    
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/selftests-net-switch-to-socat-in-the-GSO-GRE-test.patch    
2021-11-19 09:35:39.000000000 +0100
@@ -0,0 +1,74 @@
+From: Jakub Kicinski <k...@kernel.org>
+Date: Thu, 11 Nov 2021 08:29:29 -0800
+Subject: selftests: net: switch to socat in the GSO GRE test
+Git-commit: 0cda7d4bac5fd29dceb13df26083333fa99d6bb4
+Patch-mainline: v5.16-rc1
+References: git-fixes
+
+Commit a985442fdecb ("selftests: net: properly support IPv6 in GSO GRE test")
+is not compatible with:
+
+  Ncat: Version 7.80 ( https://nmap.org/ncat )
+
+(which is distributed with Fedora/Red Hat), tests fail with:
+
+  nc: invalid option -- 'N'
+
+Let's switch to socat which is far more dependable.
+
+Fixes: 025efa0a82df ("selftests: add simple GSO GRE test")
+Fixes: a985442fdecb ("selftests: net: properly support IPv6 in GSO GRE test")
+Tested-by: Andrea Righi <andrea.ri...@canonical.com>
+Link: https://lore.kernel.org/r/20211111162929.530470-1-k...@kernel.org
+Signed-off-by: Jakub Kicinski <k...@kernel.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ tools/testing/selftests/net/gre_gso.sh |   16 +++++++++-------
+ 1 file changed, 9 insertions(+), 7 deletions(-)
+
+--- a/tools/testing/selftests/net/gre_gso.sh
++++ b/tools/testing/selftests/net/gre_gso.sh
+@@ -118,16 +118,18 @@ gre_gst_test_checks()
+       local addr=$2
+       local proto=$3
+ 
+-      $NS_EXEC nc $proto -kl $port >/dev/null &
++      [ "$proto" == 6 ] && addr="[$addr]"
++
++      $NS_EXEC socat - tcp${proto}-listen:$port,reuseaddr,fork >/dev/null &
+       PID=$!
+       while ! $NS_EXEC ss -ltn | grep -q $port; do ((i++)); sleep 0.01; done
+ 
+-      cat $TMPFILE | timeout 1 nc $proto -N $addr $port
++      cat $TMPFILE | timeout 1 socat -u STDIN TCP:$addr:$port
+       log_test $? 0 "$name - copy file w/ TSO"
+ 
+       ethtool -K veth0 tso off
+ 
+-      cat $TMPFILE | timeout 1 nc $proto -N $addr $port
++      cat $TMPFILE | timeout 1 socat -u STDIN TCP:$addr:$port
+       log_test $? 0 "$name - copy file w/ GSO"
+ 
+       ethtool -K veth0 tso on
+@@ -155,8 +157,8 @@ gre6_gso_test()
+ 
+       sleep 2
+ 
+-      gre_gst_test_checks GREv6/v4 172.16.2.2
+-      gre_gst_test_checks GREv6/v6 2001:db8:1::2 -6
++      gre_gst_test_checks GREv6/v4 172.16.2.2 4
++      gre_gst_test_checks GREv6/v6 2001:db8:1::2 6
+ 
+       cleanup
+ }
+@@ -212,8 +214,8 @@ if [ ! -x "$(command -v ip)" ]; then
+       exit $ksft_skip
+ fi
+ 
+-if [ ! -x "$(command -v nc)" ]; then
+-      echo "SKIP: Could not run test without nc tool"
++if [ ! -x "$(command -v socat)" ]; then
++      echo "SKIP: Could not run test without socat tool"
+       exit $ksft_skip
+ fi
+ 

++++++ series.conf ++++++
++++ 971 lines (skipped)
++++ between /work/SRC/openSUSE:Factory/kernel-source/series.conf
++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.1895/series.conf

++++++ source-timestamp ++++++
--- /var/tmp/diff_new_pack.ROCPBz/_old  2021-11-22 23:04:29.329870674 +0100
+++ /var/tmp/diff_new_pack.ROCPBz/_new  2021-11-22 23:04:29.329870674 +0100
@@ -1,3 +1,3 @@
-2021-11-13 14:10:12 +0000
-GIT Revision: 26a203b53de5bda52f512344a49e138964e43912
+2021-11-19 08:35:39 +0000
+GIT Revision: 404f5765cf33979eeecf4977ac79a5f0a515722e
 GIT Branch: stable

Reply via email to