Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2022-01-26 21:26:24 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new.1938 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source" Wed Jan 26 21:26:24 2022 rev:628 rq:948468 version:5.16.2 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2022-01-20 00:11:47.918553199 +0100 +++ /work/SRC/openSUSE:Factory/.kernel-source.new.1938/dtb-aarch64.changes 2022-01-26 21:26:25.922220942 +0100 @@ -1,0 +2,129 @@ +Mon Jan 24 19:27:48 CET 2022 - jsl...@suse.cz + +- Update + patches.kernel.org/5.16.2-005-vfs-fs_context-fix-up-param-length-parsing-in-.patch + (bsc#1012628 CVE-2022-0185 bsc#1194517). + Add CVE reference. +- commit 0d710a8 + +------------------------------------------------------------------- +Mon Jan 24 11:55:17 CET 2022 - ti...@suse.de + +- s390/mm: fix 2KB pgtable release race (bsc#1188896). +- commit 6f62d73 + +------------------------------------------------------------------- +Fri Jan 21 15:46:35 CET 2022 - ti...@suse.de + +- HID: wacom: Avoid using stale array indicies to read contact + count (bsc#1194667). +- HID: wacom: Ignore the confidence flag when a touch is removed + (bsc#1194667). +- HID: wacom: Reset expected and received contact counts at the + same time (bsc#1194667). +- commit 07a970c + +------------------------------------------------------------------- +Fri Jan 21 07:20:43 CET 2022 - jsl...@suse.cz + +- Linux 5.16.2 (bsc#1012628). +- ALSA: hda/realtek: Re-order quirk entries for Lenovo + (bsc#1012628). +- ALSA: hda/realtek: Add quirk for Legion Y9000X 2020 + (bsc#1012628). +- ALSA: hda/tegra: Fix Tegra194 HDA reset failure (bsc#1012628). +- ALSA: hda: ALC287: Add Lenovo IdeaPad Slim 9i 14ITL5 speaker + quirk (bsc#1012628). +- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus + Master after reboot from Windows (bsc#1012628). +- ALSA: hda/realtek: Use ALC285_FIXUP_HP_GPIO_LED on another HP + laptop (bsc#1012628). +- ALSA: hda/realtek: Add speaker fixup for some Yoga 15ITL5 + devices (bsc#1012628). +- perf annotate: Avoid TUI crash when navigating in the annotation + of recursive functions (bsc#1012628). +- firmware: qemu_fw_cfg: fix kobject leak in probe error path + (bsc#1012628). +- firmware: qemu_fw_cfg: fix NULL-pointer deref on duplicate + entries (bsc#1012628). +- firmware: qemu_fw_cfg: fix sysfs information leak (bsc#1012628). +- rtlwifi: rtl8192cu: Fix WARNING when calling local_irq_restore() + with interrupts enabled (bsc#1012628). +- media: uvcvideo: fix division by zero at stream start + (bsc#1012628). +- video: vga16fb: Only probe for EGA and VGA 16 color graphic + cards (bsc#1012628). +- 9p: fix enodata when reading growing file (bsc#1012628). +- 9p: only copy valid iattrs in 9P2000.L setattr implementation + (bsc#1012628). +- NFSD: Fix zero-length NFSv3 WRITEs (bsc#1012628). +- remoteproc: qcom: pas: Add missing power-domain "mxc" for CDSP + (bsc#1012628). +- KVM: s390: Clarify SIGP orders versus STOP/RESTART + (bsc#1012628). +- KVM: x86: don't print when fail to read/write pv eoi memory + (bsc#1012628). +- KVM: x86: Register Processor Trace interrupt hook iff PT + enabled in guest (bsc#1012628). +- KVM: x86: Register perf callbacks after calling vendor's + hardware_setup() (bsc#1012628). +- perf: Protect perf_guest_cbs with RCU (bsc#1012628). +- vfs: fs_context: fix up param length parsing in + legacy_parse_param (bsc#1012628). +- remoteproc: qcom: pil_info: Don't memcpy_toio more than is + provided (bsc#1012628). +- orangefs: Fix the size of a memory allocation in + orangefs_bufmap_alloc() (bsc#1012628). +- drm/amd/display: explicitly set is_dsc_supported to false + before use (bsc#1012628). +- devtmpfs regression fix: reconfigure on each mount + (bsc#1012628). +- commit 6fa29ec + +------------------------------------------------------------------- +Thu Jan 20 13:26:28 CET 2022 - msucha...@suse.de + +- kernel-binary.spec: Do not use the default certificate path (bsc#1194943). + Using the the default path is broken since Linux 5.17 +- commit 68b36f0 + +------------------------------------------------------------------- +Thu Jan 20 07:34:06 CET 2022 - jsl...@suse.cz + +- disable the Bluetooth patch again + The kernel is currently tested whether the patch is needed at all. As + 95655456e7ce in upstream might fix the issue too (but differently). +- commit c3bbaae + +------------------------------------------------------------------- +Wed Jan 19 14:00:26 CET 2022 - mkube...@suse.cz + +- series.conf: cleanup +- move mainline patches into sorted section: + - patches.suse/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch + - patches.suse/0001-usb-Add-Xen-pvUSB-protocol-description.patch + - patches.suse/0002-usb-Introduce-Xen-pvUSB-frontend-xen-hcd.patch +- update upstream references and move into sorted section: + - patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch + - patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch + - patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch + No effect on expanded tree. +- commit 607f978 + +------------------------------------------------------------------- +Wed Jan 19 13:46:39 CET 2022 - mkube...@suse.cz + +- Refresh and reenable + patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch. +- commit a7b7c0d + +------------------------------------------------------------------- +Mon Jan 17 17:00:18 CET 2022 - je...@suse.com + +- series.conf: Add sorted section header/footer + Even though we don't carry many patches in the stable or master + branches, having the sorted section header/footer allows the automated + tools to work. +- commit 05f8150 + +------------------------------------------------------------------- @@ -73,0 +203,7 @@ + +------------------------------------------------------------------- +Thu Jan 13 11:42:05 CET 2022 - ti...@suse.de + +- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch. + Adapt the uapi version for the latest kernel-firmware-20220111. +- commit 2f088f6 dtb-armv6l.changes: same change dtb-armv7l.changes: same change dtb-riscv64.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-kvmsmall.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.362190330 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.366190302 +0100 @@ -17,7 +17,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-aarch64 -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change dtb-riscv64.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.458189668 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.462189640 +0100 @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0-only Group: System/Kernel -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 -Provides: kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 +Provides: kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 # END COMMON DEPS -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc @@ -529,7 +529,11 @@ %endif if [ %CONFIG_MODULE_SIG = "y" ]; then - test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + if [ -n "%certs" ] ; then + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "%_sourcedir/.kernel_signing_key.pem" + else + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + fi fi case %cpu_arch in @@ -605,16 +609,6 @@ %_sourcedir/modversions --unpack . < $_ fi -# copy module signing certificate(s). We use the default path and trick -# certs/Makefile to not regenerate the certificate. It is done this way so -# that the kernel-source package can be rebuilt even without the certificate -echo Signing certificates "%certs" -if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then - mkdir -p certs - touch certs/x509.genkey - cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem -fi - %if "%CONFIG_KMSG_IDS" == "y" chmod +x ../scripts/kmsg-doc MAKE_ARGS="$MAKE_ARGS D=2" ++++++ kernel-debug.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.490189447 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.494189420 +0100 @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Summary: A Debug Version of the Kernel License: GPL-2.0-only Group: System/Kernel -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 -Provides: kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 +Provides: kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 # END COMMON DEPS -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 %ifarch ppc64 Provides: kernel-kdump = 2.6.28 Obsoletes: kernel-kdump <= 2.6.28 @@ -535,7 +535,11 @@ %endif if [ %CONFIG_MODULE_SIG = "y" ]; then - test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + if [ -n "%certs" ] ; then + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "%_sourcedir/.kernel_signing_key.pem" + else + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + fi fi case %cpu_arch in @@ -611,16 +615,6 @@ %_sourcedir/modversions --unpack . < $_ fi -# copy module signing certificate(s). We use the default path and trick -# certs/Makefile to not regenerate the certificate. It is done this way so -# that the kernel-source package can be rebuilt even without the certificate -echo Signing certificates "%certs" -if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then - mkdir -p certs - touch certs/x509.genkey - cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem -fi - %if "%CONFIG_KMSG_IDS" == "y" chmod +x ../scripts/kmsg-doc MAKE_ARGS="$MAKE_ARGS D=2" ++++++ kernel-default.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.518189254 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.522189227 +0100 @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Summary: The Standard Kernel License: GPL-2.0-only Group: System/Kernel -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 -Provides: kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 +Provides: kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 # END COMMON DEPS -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 %ifarch %ix86 Provides: kernel-smp = 2.6.17 Obsoletes: kernel-smp <= 2.6.17 @@ -578,7 +578,11 @@ %endif if [ %CONFIG_MODULE_SIG = "y" ]; then - test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + if [ -n "%certs" ] ; then + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "%_sourcedir/.kernel_signing_key.pem" + else + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + fi fi case %cpu_arch in @@ -654,16 +658,6 @@ %_sourcedir/modversions --unpack . < $_ fi -# copy module signing certificate(s). We use the default path and trick -# certs/Makefile to not regenerate the certificate. It is done this way so -# that the kernel-source package can be rebuilt even without the certificate -echo Signing certificates "%certs" -if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then - mkdir -p certs - touch certs/x509.genkey - cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem -fi - %if "%CONFIG_KMSG_IDS" == "y" chmod +x ../scripts/kmsg-doc MAKE_ARGS="$MAKE_ARGS D=2" ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.542189089 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.546189061 +0100 @@ -17,7 +17,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -31,9 +31,9 @@ Summary: Kernel Documentation License: GPL-2.0-only Group: Documentation/Man -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -64,7 +64,7 @@ %endif Url: http://www.kernel.org/ Provides: %name = %version-%source_rel -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 BuildArch: noarch BuildRoot: %{_tmppath}/%{name}-%{version}-build Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz ++++++ kernel-kvmsmall.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.566188923 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.570188896 +0100 @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Summary: The Small Developer Kernel for KVM License: GPL-2.0-only Group: System/Kernel -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 -Provides: kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 +Provides: kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 # END COMMON DEPS -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc @@ -533,7 +533,11 @@ %endif if [ %CONFIG_MODULE_SIG = "y" ]; then - test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + if [ -n "%certs" ] ; then + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "%_sourcedir/.kernel_signing_key.pem" + else + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + fi fi case %cpu_arch in @@ -609,16 +613,6 @@ %_sourcedir/modversions --unpack . < $_ fi -# copy module signing certificate(s). We use the default path and trick -# certs/Makefile to not regenerate the certificate. It is done this way so -# that the kernel-source package can be rebuilt even without the certificate -echo Signing certificates "%certs" -if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then - mkdir -p certs - touch certs/x509.genkey - cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem -fi - %if "%CONFIG_KMSG_IDS" == "y" chmod +x ../scripts/kmsg-doc MAKE_ARGS="$MAKE_ARGS D=2" kernel-lpae.spec: same change ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.630188482 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.634188454 +0100 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 @@ -45,7 +45,7 @@ %endif %endif %endif -BuildRequires: kernel%kernel_flavor-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +BuildRequires: kernel%kernel_flavor-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 %if 0%{?rhel_version} BuildRequires: kernel @@ -64,9 +64,9 @@ Summary: package kernel and initrd for OBS VM builds License: GPL-2.0-only Group: SLES -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.654188316 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.658188289 +0100 @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -36,9 +36,9 @@ Summary: Basic QA tests for the kernel License: GPL-2.0-only Group: SLES -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.682188123 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.686188095 +0100 @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Summary: Kernel with PAE Support License: GPL-2.0-only Group: System/Kernel -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 -Provides: kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 +Provides: kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 # END COMMON DEPS -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 %ifarch %ix86 Provides: kernel-bigsmp = 2.6.17 Obsoletes: kernel-bigsmp <= 2.6.17 @@ -555,7 +555,11 @@ %endif if [ %CONFIG_MODULE_SIG = "y" ]; then - test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + if [ -n "%certs" ] ; then + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "%_sourcedir/.kernel_signing_key.pem" + else + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + fi fi case %cpu_arch in @@ -631,16 +635,6 @@ %_sourcedir/modversions --unpack . < $_ fi -# copy module signing certificate(s). We use the default path and trick -# certs/Makefile to not regenerate the certificate. It is done this way so -# that the kernel-source package can be rebuilt even without the certificate -echo Signing certificates "%certs" -if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then - mkdir -p certs - touch certs/x509.genkey - cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem -fi - %if "%CONFIG_KMSG_IDS" == "y" chmod +x ../scripts/kmsg-doc MAKE_ARGS="$MAKE_ARGS D=2" ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.714187903 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.718187875 +0100 @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 @@ -35,9 +35,9 @@ Summary: The Linux Kernel Sources License: GPL-2.0-only Group: Development/Sources -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -48,7 +48,7 @@ BuildRequires: sed Requires(post): coreutils sed Provides: %name = %version-%source_rel -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 Provides: linux Provides: multiversion(kernel) Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.750187654 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.754187627 +0100 @@ -24,10 +24,10 @@ Summary: Kernel Symbol Versions (modversions) License: GPL-2.0-only Group: Development/Sources -Version: 5.16.1 +Version: 5.16.2 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -52,7 +52,7 @@ %endif Requires: pesign-obs-integration Provides: %name = %version-%source_rel -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 Provides: multiversion(kernel) Source: README.KSYMS Requires: kernel-devel%variant = %version-%source_rel ++++++ kernel-vanilla.spec ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:30.774187489 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:30.778187461 +0100 @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.1 +%define patchversion 5.16.2 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Summary: The Standard Kernel - without any SUSE patches License: GPL-2.0-only Group: System/Kernel -Version: 5.16.1 +Version: 5.16.2 %if 0%{?is_kotd} -Release: <RELEASE>.g7cbe369 +Release: <RELEASE>.g0d710a8 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 -Provides: kernel-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: kernel-%build_flavor-base-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 +Provides: kernel-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 # END COMMON DEPS -Provides: %name-srchash-7cbe369418ce4fc6ed2822b6987b2838804522c7 +Provides: %name-srchash-0d710a8d2a5b8208b23d7e03120dfa2837f640a5 %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc @@ -526,7 +526,11 @@ %endif if [ %CONFIG_MODULE_SIG = "y" ]; then - test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + if [ -n "%certs" ] ; then + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "%_sourcedir/.kernel_signing_key.pem" + else + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + fi fi case %cpu_arch in @@ -602,16 +606,6 @@ %_sourcedir/modversions --unpack . < $_ fi -# copy module signing certificate(s). We use the default path and trick -# certs/Makefile to not regenerate the certificate. It is done this way so -# that the kernel-source package can be rebuilt even without the certificate -echo Signing certificates "%certs" -if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then - mkdir -p certs - touch certs/x509.genkey - cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem -fi - %if "%CONFIG_KMSG_IDS" == "y" chmod +x ../scripts/kmsg-doc MAKE_ARGS="$MAKE_ARGS D=2" kernel-zfcpdump.spec: same change ++++++ kernel-binary.spec.in ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:31.130185034 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:31.130185034 +0100 @@ -398,7 +398,11 @@ %endif if [ %CONFIG_MODULE_SIG = "y" ]; then - test -n "%certs" || ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + if [ -n "%certs" ] ; then + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "%_sourcedir/.kernel_signing_key.pem" + else + ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "" + fi fi case %cpu_arch in @@ -474,16 +478,6 @@ %_sourcedir/modversions --unpack . < $_ fi -# copy module signing certificate(s). We use the default path and trick -# certs/Makefile to not regenerate the certificate. It is done this way so -# that the kernel-source package can be rebuilt even without the certificate -echo Signing certificates "%certs" -if [ -f %_sourcedir/.kernel_signing_key.pem ] ; then - mkdir -p certs - touch certs/x509.genkey - cp "%_sourcedir/.kernel_signing_key.pem" certs/signing_key.pem -fi - %if "%CONFIG_KMSG_IDS" == "y" chmod +x ../scripts/kmsg-doc MAKE_ARGS="$MAKE_ARGS D=2" ++++++ patches.kernel.org.tar.bz2 ++++++ ++++ 2527 lines of diff (skipped) ++++++ patches.suse.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch new/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch --- old/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 2022-01-16 12:27:11.000000000 +0100 +++ new/patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch 2022-01-24 11:55:17.000000000 +0100 @@ -2,9 +2,8 @@ From: Takashi Iwai <ti...@suse.de> Date: Tue, 16 Nov 2021 07:54:14 +0100 Subject: [PATCH] ALSA: usb-audio: Add minimal-mute notion in dB mapping table +Patch-mainline: v5.17-rc1 Git-commit: 85b741c1cb6854478fd1aa13ac231e2c1baf4c4b -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git -Patch-mainline: Queued in subsystem maintainer repository References: bsc#1192375 Some devices do mute the volume at the minimal volume, and for such diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch new/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch --- old/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 2022-01-16 12:27:11.000000000 +0100 +++ new/patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch 2022-01-24 11:55:17.000000000 +0100 @@ -2,9 +2,8 @@ From: Takashi Iwai <ti...@suse.de> Date: Tue, 16 Nov 2021 07:54:15 +0100 Subject: [PATCH] ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink +Patch-mainline: v5.17-rc1 Git-commit: 02eb1d098e26f34c8f047b0b1cee6f4433a34bd1 -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git -Patch-mainline: Queued in subsystem maintainer repository References: bsc#1192375 Bose Revolve+ SoundLink (0a57:40fa) advertises invalid dB level for diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch new/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch --- old/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch 2022-01-16 12:27:11.000000000 +0100 +++ new/patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch 2022-01-24 11:55:17.000000000 +0100 @@ -2,9 +2,8 @@ From: Takashi Iwai <ti...@suse.de> Date: Tue, 16 Nov 2021 07:54:13 +0100 Subject: [PATCH] ALSA: usb-audio: Use int for dB map values +Patch-mainline: v5.17-rc1 Git-commit: fd23116d7b8dffa05f42a857eee6ee9cce238d24 -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git -Patch-mainline: Queued in subsystem maintainer repository References: bsc#1192375 The values in usbmix_dB_map should be rather signed while we're using diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch new/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch --- old/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch 2022-01-16 12:27:11.000000000 +0100 +++ new/patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch 2022-01-24 11:55:17.000000000 +0100 @@ -12,6 +12,9 @@ Also 8087:0aa7 requires the same workaround, as reported in bko#215167, so modified the quirk entry as well. +mkubecek: refreshed after mainline commit 95655456e7ce ("Bluetooth: +btintel: Fix broken LED quirk for legacy ROM devices") + Fixes: 83f2dafe2a62 ("Bluetooth: btintel: Refactoring setup routine for legacy ROM sku") Buglink: https://bugzilla.opensuse.org/show_bug.cgi?id=1193124 BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=215167 @@ -22,22 +25,20 @@ problem v2->v3: add 8087:0aa7 entry, too - drivers/bluetooth/btusb.c | 6 ++++-- - 1 file changed, 4 insertions(+), 2 deletions(-) + drivers/bluetooth/btusb.c | 2 ++ + 1 file changed, 2 insertions(+) --- a/drivers/bluetooth/btusb.c +++ b/drivers/bluetooth/btusb.c -@@ -366,9 +366,11 @@ static const struct usb_device_id blackl - { USB_DEVICE(0x8087, 0x07da), .driver_info = BTUSB_CSR }, - { USB_DEVICE(0x8087, 0x07dc), .driver_info = BTUSB_INTEL_COMBINED | - BTUSB_INTEL_BROKEN_INITIAL_NCMD }, -- { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL_COMBINED }, -+ { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL_COMBINED | -+ BTUSB_INTEL_BROKEN_INITIAL_NCMD }, +@@ -388,9 +388,11 @@ static const struct usb_device_id blacklist_table[] = { + BTUSB_INTEL_BROKEN_INITIAL_NCMD | + BTUSB_INTEL_BROKEN_SHUTDOWN_LED }, + { USB_DEVICE(0x8087, 0x0a2a), .driver_info = BTUSB_INTEL_COMBINED | ++ BTUSB_INTEL_BROKEN_INITIAL_NCMD | + BTUSB_INTEL_BROKEN_SHUTDOWN_LED }, { USB_DEVICE(0x8087, 0x0a2b), .driver_info = BTUSB_INTEL_COMBINED }, -- { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL_COMBINED }, -+ { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL_COMBINED | -+ BTUSB_INTEL_BROKEN_INITIAL_NCMD }, + { USB_DEVICE(0x8087, 0x0aa7), .driver_info = BTUSB_INTEL_COMBINED | ++ BTUSB_INTEL_BROKEN_INITIAL_NCMD | + BTUSB_INTEL_BROKEN_SHUTDOWN_LED }, { USB_DEVICE(0x8087, 0x0aaa), .driver_info = BTUSB_INTEL_COMBINED }, - /* Other Intel Bluetooth devices */ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch new/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch --- old/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch 2022-01-24 11:55:17.000000000 +0100 @@ -0,0 +1,49 @@ +From 20f3cf5f860f9f267a6a6e5642d3d0525edb1814 Mon Sep 17 00:00:00 2001 +From: Jason Gerecke <killert...@gmail.com> +Date: Tue, 18 Jan 2022 14:38:41 -0800 +Subject: [PATCH] HID: wacom: Avoid using stale array indicies to read contact count +Git-commit: 20f3cf5f860f9f267a6a6e5642d3d0525edb1814 +Patch-mainline: v5.17-rc1 +References: bsc#1194667 + +If we ever see a touch report with contact count data we initialize +several variables used to read the contact count in the pre-report +phase. These variables are never reset if we process a report which +doesn't contain a contact count, however. This can cause the pre- +report function to trigger a read of arbitrary memory (e.g. NULL +if we're lucky) and potentially crash the driver. + +This commit restores resetting of the variables back to default +"none" values that were used prior to the commit mentioned +below. + +Link: https://github.com/linuxwacom/input-wacom/issues/276 +Fixes: 003f50ab673c (HID: wacom: Update last_slot_field during pre_report phase) +Cc: sta...@vger.kernel.org +Signed-off-by: Jason Gerecke <jason.gere...@wacom.com> +Reviewed-by: Ping Cheng <ping.ch...@wacom.com> +Signed-off-by: Jiri Kosina <jkos...@suse.cz> +Acked-by: Takashi Iwai <ti...@suse.de> + +--- + drivers/hid/wacom_wac.c | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/drivers/hid/wacom_wac.c b/drivers/hid/wacom_wac.c +index 92b52b1de526..a7176fc0635d 100644 +--- a/drivers/hid/wacom_wac.c ++++ b/drivers/hid/wacom_wac.c +@@ -2682,6 +2682,10 @@ static void wacom_wac_finger_pre_report(struct hid_device *hdev, + + hid_data->confidence = true; + ++ hid_data->cc_report = 0; ++ hid_data->cc_index = -1; ++ hid_data->cc_value_index = -1; ++ + for (i = 0; i < report->maxfield; i++) { + struct hid_field *field = report->field[i]; + int j; +-- +2.31.1 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch new/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch --- old/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch 2022-01-24 11:55:17.000000000 +0100 @@ -0,0 +1,85 @@ +From df03e9bd6d4806619b4cdc91a3d7695818a8e2b7 Mon Sep 17 00:00:00 2001 +From: Jason Gerecke <killert...@gmail.com> +Date: Tue, 18 Jan 2022 14:37:56 -0800 +Subject: [PATCH] HID: wacom: Ignore the confidence flag when a touch is removed +Git-commit: df03e9bd6d4806619b4cdc91a3d7695818a8e2b7 +Patch-mainline: v5.17-rc1 +References: bsc#1194667 + +AES hardware may internally re-classify a contact that it thought was +intentional as a palm. Intentional contacts are reported as "down" with +the confidence bit set. When this re-classification occurs, however, the +state transitions to "up" with the confidence bit cleared. This kind of +transition appears to be legal according to Microsoft docs, but we do +not handle it correctly. Because the confidence bit is clear, we don't +call `wacom_wac_finger_slot` and update userspace. This causes hung +touches that confuse userspace and interfere with pen arbitration. + +This commit adds a special case to ignore the confidence flag if a contact +is reported as removed. This ensures we do not leave a hung touch if one +of these re-classification events occured. Ideally we'd have some way to +also let userspace know that the touch has been re-classified as a palm +and needs to be canceled, but that's not possible right now :) + +Link: https://github.com/linuxwacom/input-wacom/issues/288 +Fixes: 7fb0413baa7f (HID: wacom: Use "Confidence" flag to prevent reporting invalid contacts) +Cc: sta...@vger.kernel.org +Signed-off-by: Jason Gerecke <jason.gere...@wacom.com> +Reviewed-by: Ping Cheng <ping.ch...@wacom.com> +Signed-off-by: Jiri Kosina <jkos...@suse.cz> +Acked-by: Takashi Iwai <ti...@suse.de> + +--- + drivers/hid/wacom_wac.c | 29 ++++++++++++++++++++++++++--- + 1 file changed, 26 insertions(+), 3 deletions(-) + +diff --git a/drivers/hid/wacom_wac.c b/drivers/hid/wacom_wac.c +index 5978399ae7d2..92b52b1de526 100644 +--- a/drivers/hid/wacom_wac.c ++++ b/drivers/hid/wacom_wac.c +@@ -2588,6 +2588,24 @@ static void wacom_wac_finger_slot(struct wacom_wac *wacom_wac, + } + } + ++static bool wacom_wac_slot_is_active(struct input_dev *dev, int key) ++{ ++ struct input_mt *mt = dev->mt; ++ struct input_mt_slot *s; ++ ++ if (!mt) ++ return false; ++ ++ for (s = mt->slots; s != mt->slots + mt->num_slots; s++) { ++ if (s->key == key && ++ input_mt_get_value(s, ABS_MT_TRACKING_ID) >= 0) { ++ return true; ++ } ++ } ++ ++ return false; ++} ++ + static void wacom_wac_finger_event(struct hid_device *hdev, + struct hid_field *field, struct hid_usage *usage, __s32 value) + { +@@ -2638,9 +2656,14 @@ static void wacom_wac_finger_event(struct hid_device *hdev, + } + + if (usage->usage_index + 1 == field->report_count) { +- if (equivalent_usage == wacom_wac->hid_data.last_slot_field && +- wacom_wac->hid_data.confidence) +- wacom_wac_finger_slot(wacom_wac, wacom_wac->touch_input); ++ if (equivalent_usage == wacom_wac->hid_data.last_slot_field) { ++ bool touch_removed = wacom_wac_slot_is_active(wacom_wac->touch_input, ++ wacom_wac->hid_data.id) && !wacom_wac->hid_data.tipswitch; ++ ++ if (wacom_wac->hid_data.confidence || touch_removed) { ++ wacom_wac_finger_slot(wacom_wac, wacom_wac->touch_input); ++ } ++ } + } + } + +-- +2.31.1 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch new/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch --- old/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch 2022-01-24 11:55:17.000000000 +0100 @@ -0,0 +1,75 @@ +From 546e41ac994cc185ef3de610ca849a294b5df3ba Mon Sep 17 00:00:00 2001 +From: Jason Gerecke <killert...@gmail.com> +Date: Tue, 18 Jan 2022 14:37:55 -0800 +Subject: [PATCH] HID: wacom: Reset expected and received contact counts at the same time +Git-commit: 546e41ac994cc185ef3de610ca849a294b5df3ba +Patch-mainline: v5.17-rc1 +References: bsc#1194667 + +These two values go hand-in-hand and must be valid for the driver to +behave correctly. We are currently lazy about updating the values and +rely on the "expected" code flow to take care of making sure they're +valid at the point they're needed. The "expected" flow changed somewhat +with commit f8b6a74719b5 ("HID: wacom: generic: Support multiple tools +per report"), however. This led to problems with the DTH-2452 due (in +part) to *all* contacts being fully processed -- even those past the +expected contact count. Specifically, the received count gets reset to +0 once all expected fingers are processed, but not the expected count. +The rest of the contacts in the report are then *also* processed since +now the driver thinks we've only processed 0 of N expected contacts. + +Later commits such as 7fb0413baa7f (HID: wacom: Use "Confidence" flag to +prevent reporting invalid contacts) worked around the DTH-2452 issue by +skipping the invalid contacts at the end of the report, but this is not +a complete fix. The confidence flag cannot be relied on when a contact +is removed (see the following patch), and dealing with that condition +re-introduces the DTH-2452 issue unless we also address this contact +count laziness. By resetting expected and received counts at the same +time we ensure the driver understands that there are 0 more contacts +expected in the report. Similarly, we also make sure to reset the +received count if for some reason we're out of sync in the pre-report +phase. + +Link: https://github.com/linuxwacom/input-wacom/issues/288 +Fixes: f8b6a74719b5 ("HID: wacom: generic: Support multiple tools per report") +Cc: sta...@vger.kernel.org +Signed-off-by: Jason Gerecke <jason.gere...@wacom.com> +Reviewed-by: Ping Cheng <ping.ch...@wacom.com> +Signed-off-by: Jiri Kosina <jkos...@suse.cz> +Acked-by: Takashi Iwai <ti...@suse.de> + +--- + drivers/hid/wacom_wac.c | 6 +++++- + 1 file changed, 5 insertions(+), 1 deletion(-) + +diff --git a/drivers/hid/wacom_wac.c b/drivers/hid/wacom_wac.c +index 2a4cc39962e7..5978399ae7d2 100644 +--- a/drivers/hid/wacom_wac.c ++++ b/drivers/hid/wacom_wac.c +@@ -2692,11 +2692,14 @@ static void wacom_wac_finger_pre_report(struct hid_device *hdev, + hid_data->cc_index >= 0) { + struct hid_field *field = report->field[hid_data->cc_index]; + int value = field->value[hid_data->cc_value_index]; +- if (value) ++ if (value) { + hid_data->num_expected = value; ++ hid_data->num_received = 0; ++ } + } + else { + hid_data->num_expected = wacom_wac->features.touch_max; ++ hid_data->num_received = 0; + } + } + +@@ -2724,6 +2727,7 @@ static void wacom_wac_finger_report(struct hid_device *hdev, + + input_sync(input); + wacom_wac->hid_data.num_received = 0; ++ wacom_wac->hid_data.num_expected = 0; + + /* keep touch state for pen event */ + wacom_wac->shared->touch_down = wacom_wac_finger_count_touches(wacom_wac); +-- +2.31.1 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/iwlwifi-module-firmware-ucode-fix.patch new/patches.suse/iwlwifi-module-firmware-ucode-fix.patch --- old/patches.suse/iwlwifi-module-firmware-ucode-fix.patch 2022-01-16 12:27:11.000000000 +0100 +++ new/patches.suse/iwlwifi-module-firmware-ucode-fix.patch 2022-01-24 11:55:17.000000000 +0100 @@ -10,33 +10,38 @@ As a temporary fix, correct the ucode version in MODULE_FIRMWARE(). +[ update for 5.16: some firmwares are *-66 and some with *-67 with the + latest kernel-firmware package as of 20220111 -- tiwai ] + Signed-off-by: Takashi Iwai <ti...@suse.de> --- - drivers/net/wireless/intel/iwlwifi/cfg/22000.c | 8 +++++++- - 1 file changed, 7 insertions(+), 1 deletion(-) + drivers/net/wireless/intel/iwlwifi/cfg/22000.c | 14 +++++++------- + 1 file changed, 7 insertions(+), 7 deletions(-) --- a/drivers/net/wireless/intel/iwlwifi/cfg/22000.c +++ b/drivers/net/wireless/intel/iwlwifi/cfg/22000.c -@@ -850,6 +850,10 @@ const struct iwl_cfg iwl_cfg_bz_a0_mr_a0 +@@ -879,16 +879,16 @@ const struct iwl_cfg iwl_cfg_gl_a0_fm_a0 .num_rbds = IWL_NUM_RBDS_AX210_HE, }; -+/* Re-define API_MAX as *-64.ucode doesn't exist (boo#1191417) */ -+#undef IWL_22000_UCODE_API_MAX -+#define IWL_22000_UCODE_API_MAX 63 -+ - MODULE_FIRMWARE(IWL_QU_B_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); +-MODULE_FIRMWARE(IWL_QU_B_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); ++MODULE_FIRMWARE(IWL_QU_B_HR_B_MODULE_FIRMWARE(66)); MODULE_FIRMWARE(IWL_QNJ_B_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); - MODULE_FIRMWARE(IWL_QU_C_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); -@@ -861,7 +865,9 @@ MODULE_FIRMWARE(IWL_CC_A_MODULE_FIRMWARE - MODULE_FIRMWARE(IWL_SO_A_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); - MODULE_FIRMWARE(IWL_SO_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); +-MODULE_FIRMWARE(IWL_QU_C_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); +-MODULE_FIRMWARE(IWL_QU_B_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); ++MODULE_FIRMWARE(IWL_QU_C_HR_B_MODULE_FIRMWARE(66)); ++MODULE_FIRMWARE(IWL_QU_B_JF_B_MODULE_FIRMWARE(66)); + MODULE_FIRMWARE(IWL_QUZ_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); +-MODULE_FIRMWARE(IWL_QUZ_A_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); +-MODULE_FIRMWARE(IWL_QNJ_B_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); ++MODULE_FIRMWARE(IWL_QUZ_A_JF_B_MODULE_FIRMWARE(66)); ++MODULE_FIRMWARE(IWL_QNJ_B_JF_B_MODULE_FIRMWARE(66)); + MODULE_FIRMWARE(IWL_CC_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); +-MODULE_FIRMWARE(IWL_SO_A_JF_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); +-MODULE_FIRMWARE(IWL_SO_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); ++MODULE_FIRMWARE(IWL_SO_A_JF_B_MODULE_FIRMWARE(64)); ++MODULE_FIRMWARE(IWL_SO_A_HR_B_MODULE_FIRMWARE(64)); MODULE_FIRMWARE(IWL_SO_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); --MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); -+/* FIXME: only iwlwifi-ty-a0-gf-a0-* has *-66.ucode as of now while others are with *-63.ucode */ -+/* MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); */ -+MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(66)); + MODULE_FIRMWARE(IWL_TY_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); MODULE_FIRMWARE(IWL_SNJ_A_GF4_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); - MODULE_FIRMWARE(IWL_SNJ_A_GF_A_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); - MODULE_FIRMWARE(IWL_SNJ_A_HR_B_MODULE_FIRMWARE(IWL_22000_UCODE_API_MAX)); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch new/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch --- old/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch 2022-01-24 11:55:17.000000000 +0100 @@ -0,0 +1,114 @@ +From c2c224932fd0ee6854d6ebfc8d059c2bcad86606 Mon Sep 17 00:00:00 2001 +From: Alexander Gordeev <agord...@linux.ibm.com> +Date: Thu, 4 Nov 2021 07:14:44 +0100 +Subject: [PATCH] s390/mm: fix 2KB pgtable release race +Git-commit: c2c224932fd0ee6854d6ebfc8d059c2bcad86606 +Patch-mainline: v5.17-rc1 +References: bsc#1188896 + +There is a race on concurrent 2KB-pgtables release paths when +both upper and lower halves of the containing parent page are +freed, one via page_table_free_rcu() + __tlb_remove_table(), +and the other via page_table_free(). The race might lead to a +corruption as result of remove of list item in page_table_free() +concurrently with __free_page() in __tlb_remove_table(). + +Let's assume first the lower and next the upper 2KB-pgtables are +freed from a page. Since both halves of the page are allocated +the tracking byte (bits 24-31 of the page _refcount) has value +of 0x03 initially: + +CPU0 CPU1 +---- ---- + +page_table_free_rcu() // lower half +{ + // _refcount[31..24] == 0x03 + ... + atomic_xor_bits(&page->_refcount, + 0x11U << (0 + 24)); + // _refcount[31..24] <= 0x12 + ... + table = table | (1U << 0); + tlb_remove_table(tlb, table); +} +... +__tlb_remove_table() +{ + // _refcount[31..24] == 0x12 + mask = _table & 3; + // mask <= 0x01 + ... + + page_table_free() // upper half + { + // _refcount[31..24] == 0x12 + ... + atomic_xor_bits( + &page->_refcount, + 1U << (1 + 24)); + // _refcount[31..24] <= 0x10 + // mask <= 0x10 + ... + atomic_xor_bits(&page->_refcount, + mask << (4 + 24)); + // _refcount[31..24] <= 0x00 + // mask <= 0x00 + ... + if (mask != 0) // == false + break; + fallthrough; + ... + if (mask & 3) // == false + ... + else + __free_page(page); list_del(&page->lru); + ^^^^^^^^^^^^^^^^^^ RACE! ^^^^^^^^^^^^^^^^^^^^^ +} ... + } + +The problem is page_table_free() releases the page as result of +lower nibble unset and __tlb_remove_table() observing zero too +early. With this update page_table_free() will use the similar +logic as page_table_free_rcu() + __tlb_remove_table(), and mark +the fragment as pending for removal in the upper nibble until +after the list_del(). + +In other words, the parent page is considered as unreferenced and +safe to release only when the lower nibble is cleared already and +unsetting a bit in upper nibble results in that nibble turned zero. + +Cc: sta...@vger.kernel.org +Suggested-by: Vlastimil Babka <vba...@suse.com> +Reviewed-by: Gerald Schaefer <gerald.schae...@linux.ibm.com> +Signed-off-by: Alexander Gordeev <agord...@linux.ibm.com> +Signed-off-by: Heiko Carstens <h...@linux.ibm.com> +Acked-by: Takashi Iwai <ti...@suse.de> +--- + arch/s390/mm/pgalloc.c | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +diff --git a/arch/s390/mm/pgalloc.c b/arch/s390/mm/pgalloc.c +index 82a2617362d5..457c80924542 100644 +--- a/arch/s390/mm/pgalloc.c ++++ b/arch/s390/mm/pgalloc.c +@@ -244,13 +244,15 @@ void page_table_free(struct mm_struct *mm, unsigned long *table) + /* Free 2K page table fragment of a 4K page */ + bit = ((unsigned long) table & ~PAGE_MASK)/(PTRS_PER_PTE*sizeof(pte_t)); + spin_lock_bh(&mm->context.lock); +- mask = atomic_xor_bits(&page->_refcount, 1U << (bit + 24)); ++ mask = atomic_xor_bits(&page->_refcount, 0x11U << (bit + 24)); + mask >>= 24; + if (mask & 3) + list_add(&page->lru, &mm->context.pgtable_list); + else + list_del(&page->lru); + spin_unlock_bh(&mm->context.lock); ++ mask = atomic_xor_bits(&page->_refcount, 0x10U << (bit + 24)); ++ mask >>= 24; + if (mask != 0) + return; + } else { +-- +2.31.1 + ++++++ series.conf ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:31.678181256 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:31.682181229 +0100 @@ -65,6 +65,35 @@ patches.kernel.org/5.16.1-036-staging-greybus-fix-stack-size-warning-with-UB.patch patches.kernel.org/5.16.1-037-parisc-Fix-pdc_toc_pim_11-and-pdc_toc_pim_20-d.patch patches.kernel.org/5.16.1-038-Linux-5.16.1.patch + patches.kernel.org/5.16.2-001-devtmpfs-regression-fix-reconfigure-on-each-mo.patch + patches.kernel.org/5.16.2-002-drm-amd-display-explicitly-set-is_dsc_supporte.patch + patches.kernel.org/5.16.2-003-orangefs-Fix-the-size-of-a-memory-allocation-i.patch + patches.kernel.org/5.16.2-004-remoteproc-qcom-pil_info-Don-t-memcpy_toio-mor.patch + patches.kernel.org/5.16.2-005-vfs-fs_context-fix-up-param-length-parsing-in-.patch + patches.kernel.org/5.16.2-006-perf-Protect-perf_guest_cbs-with-RCU.patch + patches.kernel.org/5.16.2-007-KVM-x86-Register-perf-callbacks-after-calling-.patch + patches.kernel.org/5.16.2-008-KVM-x86-Register-Processor-Trace-interrupt-hoo.patch + patches.kernel.org/5.16.2-009-KVM-x86-don-t-print-when-fail-to-read-write-pv.patch + patches.kernel.org/5.16.2-010-KVM-s390-Clarify-SIGP-orders-versus-STOP-RESTA.patch + patches.kernel.org/5.16.2-011-remoteproc-qcom-pas-Add-missing-power-domain-m.patch + patches.kernel.org/5.16.2-012-NFSD-Fix-zero-length-NFSv3-WRITEs.patch + patches.kernel.org/5.16.2-013-9p-only-copy-valid-iattrs-in-9P2000.L-setattr-.patch + patches.kernel.org/5.16.2-014-9p-fix-enodata-when-reading-growing-file.patch + patches.kernel.org/5.16.2-015-video-vga16fb-Only-probe-for-EGA-and-VGA-16-co.patch + patches.kernel.org/5.16.2-016-media-uvcvideo-fix-division-by-zero-at-stream-.patch + patches.kernel.org/5.16.2-017-rtlwifi-rtl8192cu-Fix-WARNING-when-calling-loc.patch + patches.kernel.org/5.16.2-018-firmware-qemu_fw_cfg-fix-sysfs-information-lea.patch + patches.kernel.org/5.16.2-019-firmware-qemu_fw_cfg-fix-NULL-pointer-deref-on.patch + patches.kernel.org/5.16.2-020-firmware-qemu_fw_cfg-fix-kobject-leak-in-probe.patch + patches.kernel.org/5.16.2-021-perf-annotate-Avoid-TUI-crash-when-navigating-.patch + patches.kernel.org/5.16.2-022-ALSA-hda-realtek-Add-speaker-fixup-for-some-Yo.patch + patches.kernel.org/5.16.2-023-ALSA-hda-realtek-Use-ALC285_FIXUP_HP_GPIO_LED-.patch + patches.kernel.org/5.16.2-024-ALSA-hda-realtek-Fix-silent-output-on-Gigabyte.patch + patches.kernel.org/5.16.2-025-ALSA-hda-ALC287-Add-Lenovo-IdeaPad-Slim-9i-14I.patch + patches.kernel.org/5.16.2-026-ALSA-hda-tegra-Fix-Tegra194-HDA-reset-failure.patch + patches.kernel.org/5.16.2-027-ALSA-hda-realtek-Add-quirk-for-Legion-Y9000X-2.patch + patches.kernel.org/5.16.2-028-ALSA-hda-realtek-Re-order-quirk-entries-for-Le.patch + patches.kernel.org/5.16.2-029-Linux-5.16.2.patch ######################################################## # Build fixes that apply to the vanilla kernel too. @@ -76,6 +105,36 @@ patches.rpmify/powerpc-64-BE-option-to-use-ELFv2-ABI-for-big-endian.patch ######################################################## + # The sorted section should contain all patches that are + # either mainline backports or are already in a known + # subystem maintainer repository so that they can be + # sorted by git-sort scripts. Out-of-tree patches (which + # includes any patch without Git-commit tag) belong + # either into the "on the way to mainline" section below + # or into one of the subsystem sections. + # + # The sorted section should be small or empty on the + # stable or master branches. + ######################################################## + + ######################################################## + # sorted patches + ######################################################## + patches.suse/s390-mm-fix-2KB-pgtable-release-race.patch + patches.suse/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch + patches.suse/0001-usb-Add-Xen-pvUSB-protocol-description.patch + patches.suse/0002-usb-Introduce-Xen-pvUSB-frontend-xen-hcd.patch + patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch + patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch + patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch + patches.suse/HID-wacom-Reset-expected-and-received-contact-counts.patch + patches.suse/HID-wacom-Ignore-the-confidence-flag-when-a-touch-is.patch + patches.suse/HID-wacom-Avoid-using-stale-array-indicies-to-read-c.patch + ######################################################## + # end of sorted patches + ######################################################## + + ######################################################## # Unsorted patches on their way to mainline # # (SLE/Leap: this section is only for patches which @@ -87,10 +146,6 @@ # to get into mainline any time soon (or ever) belong # to area specific sections below. ######################################################## - patches.suse/ALSA-usb-audio-Use-int-for-dB-map-values.patch - patches.suse/ALSA-usb-audio-Add-minimal-mute-notion-in-dB-mapping.patch - patches.suse/ALSA-usb-audio-Fix-dB-level-of-Bose-Revolve-SoundLin.patch - patches.suse/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch +tiwai patches.suse/Bluetooth-Apply-initial-command-workaround-for-more-.patch ######################################################## @@ -172,8 +227,6 @@ # Virtualization ######################################################## patches.suse/suse-hv-guest-os-id.patch - patches.suse/0001-usb-Add-Xen-pvUSB-protocol-description.patch - patches.suse/0002-usb-Introduce-Xen-pvUSB-frontend-xen-hcd.patch ######################################################## # Other core patches ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.bnQyAg/_old 2022-01-26 21:26:31.698181118 +0100 +++ /var/tmp/diff_new_pack.bnQyAg/_new 2022-01-26 21:26:31.702181091 +0100 @@ -1,4 +1,4 @@ -2022-01-16 11:29:22 +0000 -GIT Revision: 7cbe369418ce4fc6ed2822b6987b2838804522c7 +2022-01-24 18:27:48 +0000 +GIT Revision: 0d710a8d2a5b8208b23d7e03120dfa2837f640a5 GIT Branch: stable