Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2023-11-09 21:34:17 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new.17445 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source" Thu Nov 9 21:34:17 2023 rev:709 rq:1124342 version:6.6.1 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2023-10-27 22:28:04.143241290 +0200 +++ /work/SRC/openSUSE:Factory/.kernel-source.new.17445/dtb-aarch64.changes 2023-11-09 21:34:18.650480883 +0100 @@ -1,0 +2,184 @@ +Thu Nov 9 06:27:25 CET 2023 - jsl...@suse.cz + +- Linux 6.6.1 (bsc#1012628). +- ASoC: SOF: sof-pci-dev: Fix community key quirk detection + (bsc#1012628). +- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection + (bsc#1012628). +- serial: core: Fix runtime PM handling for pending tx + (bsc#1012628). +- misc: pci_endpoint_test: Add deviceID for J721S2 PCIe EP device + support (bsc#1012628). +- dt-bindings: serial: rs485: Add rs485-rts-active-high + (bsc#1012628). +- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks + (bsc#1012628). +- tty: 8250: Add support for Intashield IX cards (bsc#1012628). +- tty: 8250: Add support for additional Brainboxes PX cards + (bsc#1012628). +- tty: 8250: Fix up PX-803/PX-857 (bsc#1012628). +- tty: 8250: Fix port count of PX-257 (bsc#1012628). +- tty: 8250: Add support for Intashield IS-100 (bsc#1012628). +- tty: 8250: Add support for Brainboxes UP cards (bsc#1012628). +- tty: 8250: Add support for additional Brainboxes UC cards + (bsc#1012628). +- tty: 8250: Remove UC-257 and UC-431 (bsc#1012628). +- tty: n_gsm: fix race condition in status line change on dead + connections (bsc#1012628). +- Bluetooth: hci_bcm4377: Mark bcm4378/bcm4387 as BROKEN_LE_CODED + (bsc#1012628). +- usb: raw-gadget: properly handle interrupted requests + (bsc#1012628). +- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() + (bsc#1012628). +- usb: typec: tcpm: Add additional checks for contaminant + (bsc#1012628). +- usb: storage: set 1.50 as the lower bcdDevice for older "Super + Top" compatibility (bsc#1012628). +- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD + device (bsc#1012628). +- ALSA: usb-audio: add quirk flag to enable native DSD for + McIntosh devices (bsc#1012628). +- eventfs: Use simple_recursive_removal() to clean up dentries + (bsc#1012628). +- eventfs: Delete eventfs_inode when the last dentry is freed + (bsc#1012628). +- eventfs: Save ownership and mode (bsc#1012628). +- eventfs: Remove "is_freed" union with rcu head (bsc#1012628). +- tracing: Have trace_event_file have ref counters (bsc#1012628). +- perf evlist: Avoid frequency mode for the dummy event + (bsc#1012628). +- power: supply: core: Use blocking_notifier_call_chain to avoid + RCU complaint (bsc#1012628). +- drm/amd/display: Don't use fsleep for PSR exit waits + (bsc#1012628). +- commit 758e4f0 + +------------------------------------------------------------------- +Sun Nov 5 23:08:29 CET 2023 - mkube...@suse.cz + +- update patch metadata +- update upstream reference + - patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch +- commit 93ae682 + +------------------------------------------------------------------- +Thu Nov 2 22:44:53 CET 2023 - mkube...@suse.cz + +- series.conf: cleanup +- update upstream references and move into sorted section: + - patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch + - patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch + - patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch +- commit 157ac85 + +------------------------------------------------------------------- +Thu Nov 2 09:35:14 CET 2023 - jsl...@suse.cz + +- kbuild: dummy-tools: pretend we understand + -fpatchable-function-entry (ppc64le-build-fix). +- Delete + patches.rpmify/kbuild-dummy-tools-Add-support-for-fpatchable-functi.patch. + Replace the latter with the former (upstream accepted solution). +- commit 8050c17 + +------------------------------------------------------------------- +Wed Nov 1 15:54:26 CET 2023 - sch...@suse.de + +- riscv: enable CONFIG_PCI_HOST_GENERIC + Needed for the pci host controller emulated by qemu. +- commit ebb7db3 + +------------------------------------------------------------------- +Wed Nov 1 07:13:07 CET 2023 - jsl...@suse.cz + +- Delete patches.rpmify/x86-Let-AS_WRUSS-depend-on-X86_64.patch. +- Update config files. + This effectively reverts 9ab2e0780c8a2fb9a84db5bad59fbe3ab526a6c3. The + patch was not accepted upstream: + https://lore.kernel.org/all/20231031140504.GCZUEJkMPXSrEDh3MA@fat_crate.local/ + Instead, we merged the packaging branch which fixes this in + rpm/check-for-config-changes instead. +- rpm/check-for-config-changes: add AS_WRUSS to IGNORED_CONFIGS_RE + Add AS_WRUSS as an IGNORED_CONFIGS_RE entry in check-for-config-changes + to fix build on x86_32. + There was a fix submitted to upstream but it was not accepted: + https://lore.kernel.org/all/20231031140504.GCZUEJkMPXSrEDh3MA@fat_crate.local/ + So carry this in IGNORED_CONFIGS_RE instead. +- commit ce5bc31 + +------------------------------------------------------------------- +Tue Oct 31 22:55:40 CET 2023 - p...@tesarici.cz + +- config: enable NFS_V4_2_READ_PLUS (bsc#1216736) + This option was introduced and disabled by default because of unresolved + issues. As stated in mainline commit 9cf2744d2491 ("NFS: Enable the + READ_PLUS operation by default") which changes the upstream default to + enabled, these issues are addressed so that it is safe to enable the + option and as it allows to transfer sparse files more efficiently, it is + desirable to do so. +- commit c4f1dc1 + +------------------------------------------------------------------- +Tue Oct 31 10:57:23 CET 2023 - jsl...@suse.cz + +- x86: Let AS_WRUSS depend on X86_64 (i386-build-fix). +- Update config files. +- commit 9ab2e07 + +------------------------------------------------------------------- +Mon Oct 30 12:36:34 CET 2023 - jsl...@suse.cz + +- kbuild: dummy-tools: pretend we understand + -fpatchable-function-entry (ppc64le-build-fix). +- Update config files. +- commit 2c8a930 + +------------------------------------------------------------------- +Mon Oct 30 09:35:27 CET 2023 - msucha...@suse.de + +- kbuild: dummy-tools: Add support for -fpatchable-function-entry (dummy-tools). + Update config files. +- commit 494c209 + +------------------------------------------------------------------- +Mon Oct 30 07:50:05 CET 2023 - jsl...@suse.cz + +- Delete + patches.suse/ACPI-video-Add-backlight-native-DMI-quirk-for-Lenovo.patch. + Already present in 6.6-rc1. This was applied twice due to too few + context in the diff. But it did not hurt... +- commit 2a844dc + +------------------------------------------------------------------- +Mon Oct 30 06:12:00 CET 2023 - mkube...@suse.cz + +- Update to 6.6 final +- refresh configs (headers only) +- commit e0904b6 + +------------------------------------------------------------------- +Sun Oct 29 21:45:54 CET 2023 - mkube...@suse.cz + +- update and reenable armv7hl configs + Where possible, new values are copied from arm64. The rest is guessed, + mostly based on existing values of similar config options. +- armv7hl specific config options: + - TI_ICSS_IEP=m +- commit 09e0fd1 + +------------------------------------------------------------------- +Fri Oct 27 10:37:50 CEST 2023 - vkarasu...@suse.de + +- Update + patches.kernel.org/6.5.9-016-x86-sev-Disable-MMIO-emulation-from-user-mode.patch + (bsc#1012628 bsc#1212649 CVE-2023-46813). +- Update + patches.kernel.org/6.5.9-017-x86-sev-Check-IOBM-for-IOIO-exceptions-from-use.patch + (bsc#1012628 bsc#1212649 CVE-2023-46813). +- Update + patches.kernel.org/6.5.9-018-x86-sev-Check-for-user-space-IOIO-pointing-to-k.patch + (bsc#1012628 bsc#1212649 CVE-2023-46813). +- commit b854e69 + +------------------------------------------------------------------- @@ -430,0 +615,16 @@ +Mon Oct 23 00:16:06 CEST 2023 - mkube...@suse.cz + +- Update to 6.6-rc7 +- refresh configs +- commit 4a117b4 + +------------------------------------------------------------------- +Fri Oct 20 18:39:43 CEST 2023 - dmuel...@suse.com + +- config.conf: Reenable arm64 +- Update config files: + * Same settings like x86_64, plus all ARM specific errata turned on + * rest all mod +- commit 5e5e96e + +------------------------------------------------------------------- @@ -777,0 +978,7 @@ +Thu Oct 19 15:06:34 CEST 2023 - mbrug...@suse.com + +- arm64: Update config files. + Make iMX93 clock and pinctrl driver build-in. +- commit 897b0cf + +------------------------------------------------------------------- @@ -791,0 +999,7 @@ +Sun Oct 15 22:46:40 CEST 2023 - mkube...@suse.cz + +- Update to 6.6-rc6 +- refresh configs +- commit 8f5995d + +------------------------------------------------------------------- @@ -799 +1013 @@ -- commit e8bd3c1 +- commit 41037b9 @@ -1073 +1287,11 @@ -- commit 3169a10 +- commit d26c540 + +------------------------------------------------------------------- +Sun Oct 8 23:06:37 CEST 2023 - mkube...@suse.cz + +- Update to 6.6-rc5 +- update configs + - IMA_BLACKLIST_KEYRING=n + - IMA_LOAD_X509=n + - IPU_BRIDGE=m (new on riscv64) +- commit a59832f @@ -1684,0 +1909,8 @@ +Mon Oct 2 06:34:04 CEST 2023 - mkube...@suse.cz + +- Update to 6.6-rc4 +- eliminate 1 patch + - patches.suse/Revert-101bd907b424-misc-rtsx-judge-ASPM-Mode-to-set.patch (0e4cac557531) +- commit 019d4ec + +------------------------------------------------------------------- @@ -2082,0 +2315,6 @@ +Sun Sep 24 23:36:19 CEST 2023 - mkube...@suse.cz + +- Update to 6.6-rc3 +- commit 15b4ad8 + +------------------------------------------------------------------- @@ -2620,0 +2859,44 @@ +Tue Sep 19 10:16:48 CEST 2023 - sch...@suse.de + +- riscv: enable CONFIG_MEDIA_PLATFORM_SUPPORT + - MEDIA_PLATFORM_SUPPORT=y + - V4L2_H264=m + - V4L2_VP9=m + - MEDIA_PLATFORM_DRIVERS=y + - V4L_PLATFORM_DRIVERS=y + - SDR_PLATFORM_DRIVERS=y + - DVB_PLATFORM_DRIVERS=y + - V4L_MEM2MEM_DRIVERS=y + - VIDEO_MEM2MEM_DEINTERLACE=m + - VIDEO_MUX=m + - VIDEO_CADENCE_CSI2RX=m + - VIDEO_CADENCE_CSI2TX=m + - VIDEO_CAFE_CCIC=m + - VIDEO_RCAR_ISP=m + - VIDEO_RCAR_CSI2=m + - VIDEO_RCAR_VIN=m + - VIDEO_RZG2L_CSI2=m + - VIDEO_RZG2L_CRU=m + - VIDEO_RENESAS_FCP=m + - VIDEO_RENESAS_FDP1=m + - VIDEO_RENESAS_JPU=m + - VIDEO_RENESAS_VSP1=m + - VIDEO_RCAR_DRIF=m + - VIDEO_SUN4I_CSI=m + - VIDEO_SUN6I_CSI=m + - VIDEO_SUN6I_MIPI_CSI2=m + - VIDEO_SUN8I_A83T_MIPI_CSI2=m + - VIDEO_SUN8I_DEINTERLACE=m + - VIDEO_SUN8I_ROTATE=m + - VIDEO_HANTRO=m + - VIDEO_HANTRO_SUNXI=y + - VIDEO_XILINX=m + - VIDEO_XILINX_CSI2RXSS=m + - VIDEO_XILINX_TPG=m + - VIDEO_XILINX_VTC=m + - SMS_SDIO_DRV=m + - SMS_SIANO_DEBUGFS=n + - VIDEO_SUN6I_ISP=m +- commit 337896e + +------------------------------------------------------------------- @@ -2636 +2918 @@ -- commit 08fb080 +- commit 8c848c4 ++++ 174 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.17445/dtb-aarch64.changes dtb-armv6l.changes: same change dtb-armv7l.changes: same change dtb-riscv64.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-kvmsmall.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change Old: ---- linux-6.5.tar.sign linux-6.5.tar.xz New: ---- linux-6.6.tar.sign linux-6.6.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.262871955 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.266872102 +0100 @@ -16,8 +16,8 @@ # -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -25,9 +25,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-aarch64 -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change dtb-riscv64.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.426877999 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.426877999 +0100 @@ -17,8 +17,8 @@ # needssslcertforbuild -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0-only Group: System/Kernel -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -385,10 +385,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb # END COMMON DEPS -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %obsolete_rebuilds %name %define kmp_target_cpu %_target_cpu @@ -1305,8 +1305,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %obsolete_rebuilds %name-base %ifarch %ix86 kernel-debug.spec: same change ++++++ kernel-default.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.518881389 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.522881537 +0100 @@ -17,8 +17,8 @@ # needssslcertforbuild -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: The Standard Kernel License: GPL-2.0-only Group: System/Kernel -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -385,10 +385,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb # END COMMON DEPS -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %ifarch %ix86 Provides: kernel-trace = 3.13 Obsoletes: kernel-trace <= 3.13 @@ -1342,8 +1342,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %ifarch %ix86 Provides: kernel-trace-base = 3.13 ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.554882716 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.558882863 +0100 @@ -16,8 +16,8 @@ # -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %define build_html 1 %define build_pdf 0 @@ -30,9 +30,9 @@ Summary: Kernel Documentation License: GPL-2.0-only Group: Documentation/Man -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -83,7 +83,7 @@ %endif URL: https://www.kernel.org/ Provides: %name = %version-%source_rel -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb BuildArch: noarch Source0: https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc ++++++ kernel-kvmsmall.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.598884337 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.602884484 +0100 @@ -17,8 +17,8 @@ # needssslcertforbuild -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: The Small Developer Kernel for KVM License: GPL-2.0-only Group: System/Kernel -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -385,10 +385,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb # END COMMON DEPS -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %obsolete_rebuilds %name %define kmp_target_cpu %_target_cpu @@ -1309,8 +1309,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %obsolete_rebuilds %name-base %ifarch %ix86 kernel-lpae.spec: same change ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.694887875 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.694887875 +0100 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 6.5.9 +%define patchversion 6.6.1 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -44,7 +44,7 @@ %endif %endif %endif -BuildRequires: kernel%kernel_flavor-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +BuildRequires: kernel%kernel_flavor-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %if 0%{?rhel_version} BuildRequires: kernel @@ -56,9 +56,9 @@ Summary: package kernel and initrd for OBS VM builds License: GPL-2.0-only Group: SLES -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.730889202 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.730889202 +0100 @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 6.5.9 +%define patchversion 6.6.1 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -32,9 +32,9 @@ Summary: Basic QA tests for the kernel License: GPL-2.0-only Group: SLES -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.770890676 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.774890823 +0100 @@ -17,8 +17,8 @@ # needssslcertforbuild -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: Kernel with PAE Support License: GPL-2.0-only Group: System/Kernel -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -385,10 +385,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb # END COMMON DEPS -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %ifarch %ix86 Provides: kernel-desktop = 4.3 Obsoletes: kernel-desktop <= 4.3 @@ -1325,8 +1325,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %ifarch %ix86 Provides: kernel-desktop-base = 4.3 ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.806892002 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.810892150 +0100 @@ -16,8 +16,8 @@ # -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -30,9 +30,9 @@ %endif Name: kernel-source -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -49,7 +49,7 @@ BuildRequires: sed Requires(post): coreutils sed Provides: %name = %version-%source_rel -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb Provides: linux Provides: multiversion(kernel) Source0: https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.846893477 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.846893477 +0100 @@ -24,10 +24,10 @@ Summary: Kernel Symbol Versions (modversions) License: GPL-2.0-only Group: Development/Sources -Version: 6.5.9 +Version: 6.6.1 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -52,7 +52,7 @@ %endif Requires: pesign-obs-integration Provides: %name = %version-%source_rel -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb Provides: multiversion(kernel) Source: README.KSYMS Requires: kernel-devel%variant = %version-%source_rel ++++++ kernel-vanilla.spec ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:29.882894803 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:29.882894803 +0100 @@ -17,8 +17,8 @@ # needssslcertforbuild -%define srcversion 6.5 -%define patchversion 6.5.9 +%define srcversion 6.6 +%define patchversion 6.6.1 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: The Standard Kernel - without any SUSE patches License: GPL-2.0-only Group: System/Kernel -Version: 6.5.9 +Version: 6.6.1 %if 0%{?is_kotd} -Release: <RELEASE>.g29edc7c +Release: <RELEASE>.g1fcc265 %else Release: 0 %endif @@ -385,10 +385,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb # END COMMON DEPS -Provides: %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %obsolete_rebuilds %name %define kmp_target_cpu %_target_cpu @@ -1302,8 +1302,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 -Provides: kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +Provides: kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb +Provides: kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb %obsolete_rebuilds %name-base %ifarch %ix86 kernel-zfcpdump.spec: same change ++++++ check-for-config-changes ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:30.118903500 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:30.122903648 +0100 @@ -7,6 +7,7 @@ declare -a IGNORED_CONFIGS_RE=( 'AS_HAS_[A-Z0-9_]*' 'AS_VERSION' + 'AS_WRUSS' # x86_32 'BUILTIN_RETURN_ADDRESS_STRIPS_PAC' 'CC_CAN_[A-Z_]*' 'CC_HAS_[A-Z_]*' @@ -18,13 +19,13 @@ 'G*CC[0-9]*_NO_[A-Z_]*' 'HAVE_[A-Z]*_COMPILER' 'LD_VERSION' + 'OBJTOOL' 'PAHOLE_HAS_[A-Z0-9_]*' 'PAHOLE_VERSION' 'RISCV_ISA_[A-Z_]*' 'TOOLCHAIN_HAS_[A-Z_]*' 'TOOLCHAIN_NEEDS_[A-Z_]*' 'TOOLS_SUPPORT_[A-Z_]*' - 'OBJTOOL' ) declare -a SED_ARGS=() ++++++ config.sh ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:30.214907038 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:30.218907185 +0100 @@ -1,5 +1,5 @@ # The version of the main tarball to use -SRCVERSION=6.5 +SRCVERSION=6.6 # variant of the kernel-source package, either empty or "-rt" VARIANT= # enable kernel module compression ++++++ config.tar.bz2 ++++++ ++++ 7135 lines of diff (skipped) ++++++ linux-6.5.tar.xz -> linux-6.6.tar.xz ++++++ /work/SRC/openSUSE:Factory/kernel-source/linux-6.5.tar.xz /work/SRC/openSUSE:Factory/.kernel-source.new.17445/linux-6.6.tar.xz differ: char 15, line 1 ++++++ patches.kernel.org.tar.bz2 ++++++ ++++ 203476 lines of diff (skipped) ++++++ patches.rpmify.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch new/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch --- old/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch 2023-09-19 13:00:47.000000000 +0200 +++ new/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,70 +0,0 @@ -From 4d15c9fa058e6dee09324cfc93f48858d4296019 Mon Sep 17 00:00:00 2001 -From: Michal Suchanek <msucha...@suse.de> -Date: Tue, 18 Jul 2023 18:58:43 +0200 -Subject: [PATCH] Revert "kbuild: Hack for depmod not handling X.Y versions" - -References: bsc#1212835 -Patch-mainline: v6.6-rc1 -Git-commit: 4d15c9fa058e6dee09324cfc93f48858d4296019 - -Remove hack for ancient version of module-init-tools that was added in -Linux 3.0. - -Since then module-init-tools was replaced with kmod. - -This hack adds an additional indirection, and causes confusing errors -to be printed when depmod fails. - -Reverts commit 8fc62e594253 ("kbuild: Do not write to builddir in modules_install") -Reverts commit bfe5424a8b31 ("kbuild: Hack for depmod not handling X.Y versions") - -Link: https://lore.kernel.org/linux-modules/CAK7LNAQMs3QBYfWcLkmOQdbbq7cj=7wWbK=awhdtc2raskh...@mail.gmail.com/ - -Signed-off-by: Michal Suchanek <msucha...@suse.de> -Signed-off-by: Masahiro Yamada <masahi...@kernel.org> ---- - scripts/depmod.sh | 27 +-------------------------- - 1 file changed, 1 insertion(+), 26 deletions(-) - -diff --git a/scripts/depmod.sh b/scripts/depmod.sh -index 3643b4f896ed..fca689ba4f21 100755 ---- a/scripts/depmod.sh -+++ b/scripts/depmod.sh -@@ -23,33 +23,8 @@ if [ -z $(command -v $DEPMOD) ]; then - exit 0 - fi - --# older versions of depmod require the version string to start with three --# numbers, so we cheat with a symlink here --depmod_hack_needed=true --tmp_dir=$(mktemp -d ${TMPDIR:-/tmp}/depmod.XXXXXX) --mkdir -p "$tmp_dir/lib/modules/$KERNELRELEASE" --if "$DEPMOD" -b "$tmp_dir" $KERNELRELEASE 2>/dev/null; then -- if test -e "$tmp_dir/lib/modules/$KERNELRELEASE/modules.dep" -o \ -- -e "$tmp_dir/lib/modules/$KERNELRELEASE/modules.dep.bin"; then -- depmod_hack_needed=false -- fi --fi --rm -rf "$tmp_dir" --if $depmod_hack_needed; then -- symlink="$INSTALL_MOD_PATH/lib/modules/99.98.$KERNELRELEASE" -- ln -s "$KERNELRELEASE" "$symlink" -- KERNELRELEASE=99.98.$KERNELRELEASE --fi -- - set -- -ae -F System.map - if test -n "$INSTALL_MOD_PATH"; then - set -- "$@" -b "$INSTALL_MOD_PATH" - fi --"$DEPMOD" "$@" "$KERNELRELEASE" --ret=$? -- --if $depmod_hack_needed; then -- rm -f "$symlink" --fi -- --exit $ret -+exec "$DEPMOD" "$@" "$KERNELRELEASE" --- -2.41.0 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch new/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch --- old/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch 2023-11-05 23:08:29.000000000 +0100 @@ -0,0 +1,45 @@ +From: "Jiri Slaby (SUSE)" <jirisl...@kernel.org> +Date: Mon, 30 Oct 2023 12:34:16 +0100 +Subject: kbuild: dummy-tools: pretend we understand -fpatchable-function-entry +Git-commit: 1bfaa37fd3486e66131de9cb87747c84b4c89a05 +Patch-mainline: v6.7-rc1 +References: ppc64le-build-fix + +Commit 0f71dcfb4aef ("powerpc/ftrace: Add support for +-fpatchable-function-entry") added a script to check for +-fpatchable-function-entry compiler support. The script expects compiler +to emit the section __patchable_function_entries and few nops after a +function entry. + +If the compiler understands and emits the above, +CONFIG_ARCH_USING_PATCHABLE_FUNCTION_ENTRY is set. + +So teach dummy-tools' gcc about this. + +Signed-off-by: Jiri Slaby (SUSE) <jirisl...@kernel.org> +Reviewed-by: Nathan Chancellor <nat...@kernel.org> +Signed-off-by: Masahiro Yamada <masahi...@kernel.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + scripts/dummy-tools/gcc | 10 ++++++++++ + 1 file changed, 10 insertions(+) + +--- a/scripts/dummy-tools/gcc ++++ b/scripts/dummy-tools/gcc +@@ -91,6 +91,16 @@ if arg_contain -S "$@"; then + fi + exit 0 + fi ++ ++ # For arch/powerpc/tools/gcc-check-fpatchable-function-entry.sh ++ if arg_contain -m64 "$@" && arg_contain -fpatchable-function-entry=2 "$@"; then ++ echo "func:" ++ echo ".section __patchable_function_entries" ++ echo ".localentry" ++ echo " nop" ++ echo " nop" ++ exit 0 ++ fi + fi + + # To set GCC_PLUGINS ++++++ patches.suse.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch new/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch --- old/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch 2023-11-02 22:52:53.000000000 +0100 @@ -1,8 +1,7 @@ From 49bd201996152822e3f5f9aa3a7f8da3518a7b42 Mon Sep 17 00:00:00 2001 From: Thomas Zimmermann <tzimmerm...@suse.de> Date: Thu, 10 Nov 2022 09:27:41 +0100 -Subject: [PATCH] bsc#1204315: Disable sysfb before creating simple-framebuffer - from DT +Subject: [PATCH] bsc#1204315: Disable sysfb before creating simple-framebuffer from DT Patch-mainline: Never, internal workaround References: bsc#1204315 @@ -15,8 +14,6 @@ drivers/of/platform.c | 2 ++ 1 file changed, 2 insertions(+) -diff --git a/drivers/of/platform.c b/drivers/of/platform.c -index 3507095a69f6..278d6d6fa516 100644 --- a/drivers/of/platform.c +++ b/drivers/of/platform.c @@ -20,6 +20,7 @@ @@ -25,9 +22,9 @@ #include <linux/platform_device.h> +#include <linux/sysfb.h> - const struct of_device_id of_default_bus_match_table[] = { - { .compatible = "simple-bus", }, -@@ -583,6 +584,7 @@ static int __init of_platform_default_populate_init(void) + #include "of_private.h" + +@@ -620,6 +621,7 @@ static int __init of_platform_default_populate_init(void) of_node_put(node); } @@ -35,6 +32,3 @@ node = of_get_compatible_child(of_chosen, "simple-framebuffer"); of_platform_device_create(node, NULL, NULL); of_node_put(node); --- -2.38.0 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch new/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch --- old/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,193 +0,0 @@ -From e77673d14f2cec6d47d2da4e58dce87c2d66e54f Mon Sep 17 00:00:00 2001 -From: Mukul Joshi <mukul.jo...@amd.com> -Date: Fri, 9 Jun 2023 11:11:53 -0400 -Subject: drm/amdgpu: Update invalid PTE flag setting -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit -Git-commit: e77673d14f2cec6d47d2da4e58dce87c2d66e54f -Patch-mainline: v6.6-rc1 -References: boo#1215470 - -Update the invalid PTE flag setting with TF enabled. -This is to ensure, in addition to transitioning the -retry fault to a no-retry fault, it also causes the -wavefront to enter the trap handler. With the current -setting, the fault only transitions to a no-retry fault. -Additionally, have 2 sets of invalid PTE settings, one for -TF enabled, the other for TF disabled. The setting with -TF disabled, doesn't work with TF enabled. - -Signed-off-by: Mukul Joshi <mukul.jo...@amd.com> -Acked-by: Christian König <christian.koe...@amd.com> -Reviewed-by: Felix Kuehling <felix.kuehl...@amd.com> -Signed-off-by: Alex Deucher <alexander.deuc...@amd.com> -Acked-by: Thomas Zimmermann <tzimmerm...@suse.com> ---- - drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h | 2 ++ - drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c | 2 +- - drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h | 6 +++++ - drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c | 31 +++++++++++++++++++++++ - drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c | 1 + - drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c | 1 + - drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c | 1 + - drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c | 1 + - drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c | 1 + - 9 files changed, 45 insertions(+), 1 deletion(-) - -diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h b/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h -index 56d73fade5685..fdc25cd559b60 100644 ---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h -+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h -@@ -331,6 +331,8 @@ struct amdgpu_gmc { - u64 VM_CONTEXT_PAGE_TABLE_END_ADDR_LO32[16]; - u64 VM_CONTEXT_PAGE_TABLE_END_ADDR_HI32[16]; - u64 MC_VM_MX_L1_TLB_CNTL; -+ -+ u64 noretry_flags; - }; - - #define amdgpu_gmc_flush_gpu_tlb(adev, vmid, vmhub, type) ((adev)->gmc.gmc_funcs->flush_gpu_tlb((adev), (vmid), (vmhub), (type))) -diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c -index 291977b93b1df..8eda8f7ac612b 100644 ---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c -+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c -@@ -2604,7 +2604,7 @@ bool amdgpu_vm_handle_fault(struct amdgpu_device *adev, u32 pasid, - /* Intentionally setting invalid PTE flag - * combination to force a no-retry-fault - */ -- flags = AMDGPU_PTE_SNOOPED | AMDGPU_PTE_PRT; -+ flags = AMDGPU_VM_NORETRY_FLAGS; - value = 0; - } else if (amdgpu_vm_fault_stop == AMDGPU_VM_FAULT_STOP_NEVER) { - /* Redirect the access to the dummy page */ -diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h -index 9c85d494f2a24..b81fcb962d8fd 100644 ---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h -+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h -@@ -84,7 +84,13 @@ struct amdgpu_mem_stats; - /* PDE Block Fragment Size for VEGA10 */ - #define AMDGPU_PDE_BFS(a) ((uint64_t)a << 59) - -+/* Flag combination to set no-retry with TF disabled */ -+#define AMDGPU_VM_NORETRY_FLAGS (AMDGPU_PTE_EXECUTABLE | AMDGPU_PDE_PTE | \ -+ AMDGPU_PTE_TF) - -+/* Flag combination to set no-retry with TF enabled */ -+#define AMDGPU_VM_NORETRY_FLAGS_TF (AMDGPU_PTE_VALID | AMDGPU_PTE_SYSTEM | \ -+ AMDGPU_PTE_PRT) - /* For GFX9 */ - #define AMDGPU_PTE_MTYPE_VG10(a) ((uint64_t)(a) << 57) - #define AMDGPU_PTE_MTYPE_VG10_MASK AMDGPU_PTE_MTYPE_VG10(3ULL) -diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c -index dea1a64be44d0..24ddf6a0512a7 100644 ---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c -+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c -@@ -778,6 +778,27 @@ int amdgpu_vm_pde_update(struct amdgpu_vm_update_params *params, - 1, 0, flags); - } - -+/** -+ * amdgpu_vm_pte_update_noretry_flags - Update PTE no-retry flags -+ * -+ * @adev - amdgpu_device pointer -+ * @flags: pointer to PTE flags -+ * -+ * Update PTE no-retry flags when TF is enabled. -+ */ -+static void amdgpu_vm_pte_update_noretry_flags(struct amdgpu_device *adev, -+ uint64_t *flags) -+{ -+ /* -+ * Update no-retry flags with the corresponding TF -+ * no-retry combination. -+ */ -+ if ((*flags & AMDGPU_VM_NORETRY_FLAGS) == AMDGPU_VM_NORETRY_FLAGS) { -+ *flags &= ~AMDGPU_VM_NORETRY_FLAGS; -+ *flags |= adev->gmc.noretry_flags; -+ } -+} -+ - /* - * amdgpu_vm_pte_update_flags - figure out flags for PTE updates - * -@@ -804,6 +825,16 @@ static void amdgpu_vm_pte_update_flags(struct amdgpu_vm_update_params *params, - flags |= AMDGPU_PTE_EXECUTABLE; - } - -+ /* -+ * Update no-retry flags to use the no-retry flag combination -+ * with TF enabled. The AMDGPU_VM_NORETRY_FLAGS flag combination -+ * does not work when TF is enabled. So, replace them with -+ * AMDGPU_VM_NORETRY_FLAGS_TF flag combination which works for -+ * all cases. -+ */ -+ if (level == AMDGPU_VM_PTB) -+ amdgpu_vm_pte_update_noretry_flags(adev, &flags); -+ - /* APUs mapping system memory may need different MTYPEs on different - * NUMA nodes. Only do this for contiguous ranges that can be assumed - * to be on the same NUMA node. -diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c -index 0c8a479895761..13b89f78d07d3 100644 ---- a/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c -+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c -@@ -751,6 +751,7 @@ static int gmc_v10_0_early_init(void *handle) - adev->gmc.private_aperture_start = 0x1000000000000000ULL; - adev->gmc.private_aperture_end = - adev->gmc.private_aperture_start + (4ULL << 30) - 1; -+ adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF; - - return 0; - } -diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c -index c571f0d959946..c68ecb7dfa397 100644 ---- a/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c -+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c -@@ -651,6 +651,7 @@ static int gmc_v11_0_early_init(void *handle) - adev->gmc.private_aperture_start = 0x1000000000000000ULL; - adev->gmc.private_aperture_end = - adev->gmc.private_aperture_start + (4ULL << 30) - 1; -+ adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF; - - return 0; - } -diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c -index acd2b407860f7..027b146030376 100644 ---- a/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c -+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c -@@ -942,6 +942,7 @@ static int gmc_v7_0_early_init(void *handle) - adev->gmc.shared_aperture_end + 1; - adev->gmc.private_aperture_end = - adev->gmc.private_aperture_start + (4ULL << 30) - 1; -+ adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF; - - return 0; - } -diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c -index 85dead2a57021..581ed922dbe3f 100644 ---- a/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c -+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c -@@ -1056,6 +1056,7 @@ static int gmc_v8_0_early_init(void *handle) - adev->gmc.shared_aperture_end + 1; - adev->gmc.private_aperture_end = - adev->gmc.private_aperture_start + (4ULL << 30) - 1; -+ adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF; - - return 0; - } -diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c -index 67e669e0141cc..ebdbc823fae36 100644 ---- a/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c -+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c -@@ -1622,6 +1622,7 @@ static int gmc_v9_0_early_init(void *handle) - adev->gmc.private_aperture_start = 0x1000000000000000ULL; - adev->gmc.private_aperture_end = - adev->gmc.private_aperture_start + (4ULL << 30) - 1; -+ adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF; - - return 0; - } --- -2.42.0 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch new/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch --- old/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch 2023-11-02 22:52:53.000000000 +0100 @@ -1,8 +1,7 @@ From b5123d0553f4ed5e734f6457696cdd30228d1eee Mon Sep 17 00:00:00 2001 From: David Howells <dhowe...@redhat.com> Date: Tue, 27 Feb 2018 10:04:55 +0000 -Subject: [PATCH 2/3] efi: Add an EFI_SECURE_BOOT flag to indicate secure - boot mode +Subject: [PATCH 2/3] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode Patch-mainline: Never, Fedora Core 32 References: jsc#SLE-9870 @@ -22,16 +21,16 @@ Acked-by: Lee, Chun-Yi <j...@suse.com> Signed-off-by: Chester Lin <c...@suse.com> --- - arch/x86/kernel/setup.c | 14 +------------- - drivers/firmware/efi/Makefile | 1 + - drivers/firmware/efi/secureboot.c | 38 ++++++++++++++++++++++++++++++++++++++ - include/linux/efi.h | 19 ++++++++++++------- + arch/x86/kernel/setup.c | 14 +----------- + drivers/firmware/efi/Makefile | 1 + + drivers/firmware/efi/secureboot.c | 38 +++++++++++++++++++++++++++++++ + include/linux/efi.h | 19 ++++++++++------ 4 files changed, 52 insertions(+), 20 deletions(-) create mode 100644 drivers/firmware/efi/secureboot.c --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c -@@ -1114,19 +1114,7 @@ void __init setup_arch(char **cmdline_p) +@@ -1192,19 +1192,7 @@ void __init setup_arch(char **cmdline_p) /* Allocate bigger log buffer */ setup_log_buf(1); @@ -54,7 +53,7 @@ --- a/drivers/firmware/efi/Makefile +++ b/drivers/firmware/efi/Makefile -@@ -27,6 +27,7 @@ obj-$(CONFIG_EFI_FAKE_MEMMAP) += fake_m +@@ -25,6 +25,7 @@ subdir-$(CONFIG_EFI_STUB) += libstub obj-$(CONFIG_EFI_BOOTLOADER_CONTROL) += efibc.o obj-$(CONFIG_EFI_TEST) += test/ obj-$(CONFIG_EFI_DEV_PATH_PARSER) += dev-path-parser.o @@ -105,7 +104,7 @@ +} --- a/include/linux/efi.h +++ b/include/linux/efi.h -@@ -847,6 +847,14 @@ extern int __init efi_setup_pcdp_console +@@ -870,6 +870,14 @@ extern int __init efi_setup_pcdp_console(char *); #define EFI_MEM_ATTR 10 /* Did firmware publish an EFI_MEMORY_ATTRIBUTES table? */ #define EFI_MEM_NO_SOFT_RESERVE 11 /* Is the kernel configured to ignore soft reservations? */ #define EFI_PRESERVE_BS_REGIONS 12 /* Are EFI boot-services memory segments available? */ @@ -120,7 +119,7 @@ #ifdef CONFIG_EFI /* -@@ -871,6 +879,8 @@ static inline bool efi_rt_services_suppo +@@ -894,6 +902,8 @@ static inline bool efi_rt_services_supported(unsigned int mask) return (efi.runtime_supported_mask & mask) == mask; } extern void efi_find_mirror(void); @@ -129,7 +128,7 @@ #else static inline bool efi_enabled(int feature) { -@@ -890,6 +900,8 @@ static inline bool efi_rt_services_suppo +@@ -913,6 +923,8 @@ static inline bool efi_rt_services_supported(unsigned int mask) } static inline void efi_find_mirror(void) {} @@ -138,8 +137,8 @@ #endif extern int efi_status_to_err(efi_status_t status); -@@ -1105,13 +1117,6 @@ static inline bool efi_runtime_disabled( - extern void efi_call_virt_check_flags(unsigned long flags, const char *call); +@@ -1132,13 +1144,6 @@ static inline bool efi_runtime_disabled(void) { return true; } + extern void efi_call_virt_check_flags(unsigned long flags, const void *caller); extern unsigned long efi_call_virt_save_flags(void); -enum efi_secureboot_mode { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch new/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch --- old/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch 2023-11-02 22:52:53.000000000 +0100 @@ -15,15 +15,15 @@ --- a/kernel/crash_core.c +++ b/kernel/crash_core.c -@@ -10,6 +10,7 @@ - #include <linux/utsname.h> - #include <linux/vmalloc.h> - #include <linux/sizes.h> +@@ -13,6 +13,7 @@ + #include <linux/kexec.h> + #include <linux/memory.h> + #include <linux/cpuhotplug.h> +#include <linux/suse_version.h> #include <asm/page.h> #include <asm/sections.h> -@@ -416,6 +417,7 @@ static int __init crash_save_vmcoreinfo_init(void) +@@ -607,6 +608,7 @@ static int __init crash_save_vmcoreinfo_init(void) } VMCOREINFO_OSRELEASE(init_uts_ns.name.release); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/add-suse-supported-flag.patch new/patches.suse/add-suse-supported-flag.patch --- old/patches.suse/add-suse-supported-flag.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/add-suse-supported-flag.patch 2023-11-02 22:52:53.000000000 +0100 @@ -22,7 +22,7 @@ Makefile | 5 + include/linux/module.h | 3 + include/linux/panic.h | 18 ++ - init/Kconfig.suse | 18 ++ + init/Kconfig.suse | 19 ++ kernel/ksysfs.c | 27 +++ kernel/module/main.c | 49 ++++++ kernel/module/sysfs.c | 29 +++ @@ -30,11 +30,11 @@ kernel/sysctl.c | 9 + scripts/Makefile.modpost | 6 + scripts/mod/modpost.c | 166 +++++++++++++++++- - 14 files changed, 386 insertions(+), 44 deletions(-) + 14 files changed, 387 insertions(+), 44 deletions(-) --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt -@@ -6605,6 +6605,14 @@ +@@ -6717,6 +6717,14 @@ conditions, including corrupt stacks and bad/missing unwinder metadata. @@ -48,10 +48,10 @@ + usbcore.authorized_default= [USB] Default USB device authorization: - (default -1 = authorized except for wireless USB, + (default -1 = authorized (same as 1), --- a/Documentation/admin-guide/sysctl/kernel.rst +++ b/Documentation/admin-guide/sysctl/kernel.rst -@@ -1412,26 +1412,27 @@ tainted +@@ -1431,26 +1431,27 @@ tainted Non-zero if the kernel has been tainted. Numeric values, which can be ORed together. The letters are seen in "Tainted" line of Oops reports. @@ -242,7 +242,7 @@ + --- a/kernel/ksysfs.c +++ b/kernel/ksysfs.c -@@ -237,6 +237,30 @@ static struct bin_attribute notes_attr __ro_after_init = { +@@ -249,6 +249,30 @@ static struct bin_attribute notes_attr __ro_after_init = { struct kobject *kernel_kobj; EXPORT_SYMBOL_GPL(kernel_kobj); @@ -273,7 +273,7 @@ static struct attribute * kernel_attrs[] = { &fscaps_attr.attr, &uevent_seqnum_attr.attr, -@@ -259,6 +283,9 @@ static struct attribute * kernel_attrs[] = { +@@ -274,6 +298,9 @@ static struct attribute * kernel_attrs[] = { #ifndef CONFIG_TINY_RCU &rcu_expedited_attr.attr, &rcu_normal_attr.attr, @@ -352,7 +352,7 @@ #ifdef CONFIG_MODULE_UNLOAD &modinfo_refcnt, #endif -@@ -3337,6 +3383,9 @@ void print_modules(void) +@@ -3352,6 +3398,9 @@ void print_modules(void) pr_cont(" [last unloaded: %s%s]", last_unloaded_module.name, last_unloaded_module.taints); pr_cont("\n"); @@ -434,7 +434,7 @@ .data = &panic_on_oops, --- a/scripts/Makefile.modpost +++ b/scripts/Makefile.modpost -@@ -57,6 +57,11 @@ ifneq ($(findstring i,$(filter-out --%,$(MAKEFLAGS))),) +@@ -58,6 +58,11 @@ ifneq ($(findstring i,$(filter-out --%,$(MAKEFLAGS))),) modpost-args += -n endif @@ -446,7 +446,7 @@ # Read out modules.order to pass in modpost. # Otherwise, allmodconfig would fail with "Argument list too long". ifdef KBUILD_MODULES -@@ -127,6 +132,7 @@ endif +@@ -128,6 +133,7 @@ endif modpost-args += -e $(addprefix -i , $(KBUILD_EXTRA_SYMBOLS)) @@ -469,7 +469,7 @@ #include "../../include/linux/license.h" #include "../../include/linux/module_symbol.h" -@@ -1692,6 +1694,133 @@ static void mod_set_crcs(struct module *mod) +@@ -1684,6 +1686,133 @@ static void mod_set_crcs(struct module *mod) free(buf); } @@ -603,7 +603,7 @@ static void read_symbols(const char *modname) { const char *symname; -@@ -1978,6 +2107,15 @@ static void add_exported_symbols(struct buffer *buf, struct module *mod) +@@ -1970,6 +2099,15 @@ static void add_exported_symbols(struct buffer *buf, struct module *mod) } } @@ -619,7 +619,7 @@ /** * Record CRCs for unresolved symbols **/ -@@ -2132,6 +2270,9 @@ static void write_mod_c_file(struct module *mod) +@@ -2124,6 +2262,9 @@ static void write_mod_c_file(struct module *mod) add_header(&buf, mod); add_exported_symbols(&buf, mod); @@ -629,7 +629,7 @@ add_versions(&buf, mod); add_depends(&buf, mod); add_moddevtable(&buf, mod); -@@ -2149,6 +2290,17 @@ static void write_mod_c_file(struct module *mod) +@@ -2141,6 +2282,17 @@ static void write_mod_c_file(struct module *mod) free(buf.p); } @@ -647,7 +647,7 @@ /* parse Module.symvers file. line format: * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace **/ -@@ -2268,11 +2420,14 @@ int main(int argc, char **argv) +@@ -2260,11 +2412,14 @@ int main(int argc, char **argv) char *missing_namespace_deps = NULL; char *unused_exports_white_list = NULL; char *dump_write = NULL, *files_source = NULL; @@ -658,12 +658,12 @@ LIST_HEAD(dump_lists); struct dump_list *dl, *dl2; -- while ((opt = getopt(argc, argv, "ei:mnT:to:au:WwENd:")) != -1) { -+ while ((opt = getopt(argc, argv, "ei:mnT:to:au:WwENd:S:")) != -1) { +- while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:")) != -1) { ++ while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:S:")) != -1) { switch (opt) { case 'e': external_module = true; -@@ -2318,11 +2473,20 @@ int main(int argc, char **argv) +@@ -2313,11 +2468,20 @@ int main(int argc, char **argv) case 'd': missing_namespace_deps = optarg; break; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch new/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch --- old/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,50 +0,0 @@ -From cb0aacde1e2c734119a53ecb313093e30b821f28 Mon Sep 17 00:00:00 2001 -From: Juerg Haefliger <juerg.haefli...@canonical.com> -Date: Tue, 20 Jun 2023 07:40:31 +0200 -Subject: [PATCH] drm/msm/adreno: Add missing MODULE_FIRMWARE macros -References: bsc#1213614 -Git-commit: cb0aacde1e2c734119a53ecb313093e30b821f28 -Patch-mainline: v6.6-rc1 - -The driver references some firmware files that don't have corresponding -MODULE_FIRMWARE macros and thus won't be listed via modinfo. Fix that. - -Signed-off-by: Juerg Haefliger <juerg.haefli...@canonical.com> -Reviewed-by: Dmitry Baryshkov <dmitry.barysh...@linaro.org> -Reviewed-by: Joel Fernandes (Google) <j...@joelfernandes.org> -Patchwork: https://patchwork.freedesktop.org/patch/543290/ -[rob: drop a690_gmu.bin as a690 is using same fw as a660 now] -Signed-off-by: Rob Clark <robdcl...@chromium.org> -Acked-by: Chester Lin <c...@suse.com> ---- - drivers/gpu/drm/msm/adreno/adreno_device.c | 10 ++++++++++ - 1 file changed, 10 insertions(+) - -diff --git a/drivers/gpu/drm/msm/adreno/adreno_device.c b/drivers/gpu/drm/msm/adreno/adreno_device.c -index 6e3c1368c5e1..8253e3d588d3 100644 ---- a/drivers/gpu/drm/msm/adreno/adreno_device.c -+++ b/drivers/gpu/drm/msm/adreno/adreno_device.c -@@ -395,10 +395,20 @@ MODULE_FIRMWARE("qcom/a530_zap.mdt"); - MODULE_FIRMWARE("qcom/a530_zap.b00"); - MODULE_FIRMWARE("qcom/a530_zap.b01"); - MODULE_FIRMWARE("qcom/a530_zap.b02"); -+MODULE_FIRMWARE("qcom/a540_gpmu.fw2"); - MODULE_FIRMWARE("qcom/a619_gmu.bin"); - MODULE_FIRMWARE("qcom/a630_sqe.fw"); - MODULE_FIRMWARE("qcom/a630_gmu.bin"); - MODULE_FIRMWARE("qcom/a630_zap.mbn"); -+MODULE_FIRMWARE("qcom/a640_gmu.bin"); -+MODULE_FIRMWARE("qcom/a650_gmu.bin"); -+MODULE_FIRMWARE("qcom/a650_sqe.fw"); -+MODULE_FIRMWARE("qcom/a660_gmu.bin"); -+MODULE_FIRMWARE("qcom/a660_sqe.fw"); -+MODULE_FIRMWARE("qcom/leia_pfp_470.fw"); -+MODULE_FIRMWARE("qcom/leia_pm4_470.fw"); -+MODULE_FIRMWARE("qcom/yamato_pfp.fw"); -+MODULE_FIRMWARE("qcom/yamato_pm4.fw"); - - static inline bool _rev_match(uint8_t entry, uint8_t id) - { --- -2.40.0 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch new/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch --- old/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch 2023-11-02 22:52:53.000000000 +0100 @@ -1,9 +1,8 @@ From: Maximilian Luz <luzmaximil...@gmail.com> Date: Sun, 27 Aug 2023 23:14:06 +0200 Subject: firmware: Add support for Qualcomm UEFI Secure Application -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git Git-commit: 759e7a2b62eb3ef3c93ffeb5cca788a09627d7d9 -Patch-mainline: Queued in linux-next +Patch-mainline: v6.7-rc1 References: bsc#1215268 On platforms using the Qualcomm UEFI Secure Application (uefisecapp), diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch new/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch --- old/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch 2023-11-02 22:52:53.000000000 +0100 @@ -2,9 +2,8 @@ Date: Sun, 27 Aug 2023 23:14:05 +0200 Subject: firmware: qcom_scm: Add support for Qualcomm Secure Execution Environment SCM interface -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git Git-commit: 00b1248606ba3979ccae30ed11df8cdc1a84245a -Patch-mainline: Queued in linux-next +Patch-mainline: v6.7-rc1 References: bsc#1215268 Add support for SCM calls to Secure OS and the Secure Execution diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch new/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch --- old/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch 2023-11-02 22:52:53.000000000 +0100 @@ -51,7 +51,7 @@ --- a/Makefile +++ b/Makefile -@@ -1183,6 +1183,15 @@ export extmod_prefix = $(if $(KBUILD_EXTMOD),$(KBUILD_EXTMOD)/) +@@ -1108,6 +1108,15 @@ export extmod_prefix = $(if $(KBUILD_EXTMOD),$(KBUILD_EXTMOD)/) export MODORDER := $(extmod_prefix)modules.order export MODULES_NSDEPS := $(extmod_prefix)modules.nsdeps @@ -67,7 +67,7 @@ ifeq ($(KBUILD_EXTMOD),) build-dir := . -@@ -1277,7 +1286,8 @@ PHONY += prepare archprepare +@@ -1202,7 +1211,8 @@ PHONY += prepare archprepare archprepare: outputmakefile archheaders archscripts scripts include/config/kernel.release \ asm-generic $(version_h) include/generated/utsrelease.h \ @@ -171,7 +171,7 @@ config SUSE_KERNEL_SUPPORTED bool "Enable enterprise support facility" depends on SUSE_KERNEL -@@ -18,3 +103,4 @@ config SUSE_KERNEL_SUPPORTED +@@ -19,3 +104,4 @@ config SUSE_KERNEL_SUPPORTED If you aren't building a kernel for an enterprise distribution, say n. @@ -313,9 +313,9 @@ #include "../../include/linux/module_symbol.h" +#include "../../include/generated/uapi/linux/suse_version.h" + static bool module_enabled; /* Are we using CONFIG_MODVERSIONS? */ - static bool modversions; -@@ -2214,6 +2215,14 @@ static void write_buf(struct buffer *b, const char *fname) +@@ -2206,6 +2207,14 @@ static void write_buf(struct buffer *b, const char *fname) } } @@ -330,7 +330,7 @@ static void write_if_changed(struct buffer *b, const char *fname) { char *tmp; -@@ -2277,6 +2286,7 @@ static void write_mod_c_file(struct module *mod) +@@ -2269,6 +2278,7 @@ static void write_mod_c_file(struct module *mod) add_depends(&buf, mod); add_moddevtable(&buf, mod); add_srcversion(&buf, mod); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch new/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch --- old/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch 2023-11-02 22:52:53.000000000 +0100 @@ -1,9 +1,8 @@ From: Maximilian Luz <luzmaximil...@gmail.com> Date: Sun, 27 Aug 2023 23:14:04 +0200 Subject: lib/ucs2_string: Add UCS-2 strscpy function -Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git Git-commit: e4c89f9380017b6b2e63836e2de1af8eb4535384 -Patch-mainline: Queued in linux-next +Patch-mainline: v6.7-rc1 References: bsc#1215268 Add a ucs2_strscpy() function for UCS-2 strings. The behavior is diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch new/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch --- old/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,55 +0,0 @@ -From: Steve French <stfre...@microsoft.com> -Date: Tue, 12 Sep 2023 14:08:36 -0500 -Subject: smb3: move server check earlier when setting channel sequence number -Git-commit: 05d0f8f55ad60854cb706798da94276a33590445 -Patch-mainline: 6.6-rc2 -References: git-fixes - -Smatch warning pointed out by Dan Carpenter: - - fs/smb/client/smb2pdu.c:105 smb2_hdr_assemble() - warn: variable dereferenced before check 'server' (see line 95) - -Fixes: 09ee7a3bf866 ("[SMB3] send channel sequence number in SMB3 requests after reconnects") -Reported-by: Dan Carpenter <dan.carpen...@linaro.org> -Signed-off-by: Steve French <stfre...@microsoft.com> -Signed-off-by: Jiri Slaby <jsl...@suse.cz> ---- - fs/smb/client/smb2pdu.c | 25 +++++++++++++++---------- - 1 file changed, 15 insertions(+), 10 deletions(-) - ---- a/fs/smb/client/smb2pdu.c -+++ b/fs/smb/client/smb2pdu.c -@@ -92,17 +92,22 @@ smb2_hdr_assemble(struct smb2_hdr *shdr, - shdr->ProtocolId = SMB2_PROTO_NUMBER; - shdr->StructureSize = cpu_to_le16(64); - shdr->Command = smb2_cmd; -- if (server->dialect >= SMB30_PROT_ID) { -- /* After reconnect SMB3 must set ChannelSequence on subsequent reqs */ -- smb3_hdr = (struct smb3_hdr_req *)shdr; -- /* if primary channel is not set yet, use default channel for chan sequence num */ -- if (CIFS_SERVER_IS_CHAN(server)) -- smb3_hdr->ChannelSequence = -- cpu_to_le16(server->primary_server->channel_sequence_num); -- else -- smb3_hdr->ChannelSequence = cpu_to_le16(server->channel_sequence_num); -- } -+ - if (server) { -+ /* After reconnect SMB3 must set ChannelSequence on subsequent reqs */ -+ if (server->dialect >= SMB30_PROT_ID) { -+ smb3_hdr = (struct smb3_hdr_req *)shdr; -+ /* -+ * if primary channel is not set yet, use default -+ * channel for chan sequence num -+ */ -+ if (CIFS_SERVER_IS_CHAN(server)) -+ smb3_hdr->ChannelSequence = -+ cpu_to_le16(server->primary_server->channel_sequence_num); -+ else -+ smb3_hdr->ChannelSequence = -+ cpu_to_le16(server->channel_sequence_num); -+ } - spin_lock(&server->req_lock); - /* Request up to 10 credits but don't go over the limit. */ - if (server->credits >= server->max_credits) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch new/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch --- old/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch 2023-10-25 12:31:37.000000000 +0200 +++ new/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch 2023-11-02 22:52:53.000000000 +0100 @@ -30,19 +30,20 @@ Signed-off-by: Kalle Valo <quic_kv...@quicinc.com> Acked-by: Takashi Iwai <ti...@suse.de> --- - drivers/net/wireless/ath/ath11k/ahb.c | 12 +-- - drivers/net/wireless/ath/ath11k/core.c | 35 +++++----- - drivers/net/wireless/ath/ath11k/core.h | 2 - drivers/net/wireless/ath/ath11k/hif.h | 12 +-- - drivers/net/wireless/ath/ath11k/mhi.c | 19 +++++ - drivers/net/wireless/ath/ath11k/mhi.h | 4 - - drivers/net/wireless/ath/ath11k/pci.c | 112 +++++++++++++++++++++++++++++++-- - drivers/net/wireless/ath/ath11k/pci.h | 2 - 8 files changed, 159 insertions(+), 39 deletions(-) + drivers/net/wireless/ath/ath11k/ahb.c | 8 +- + drivers/net/wireless/ath/ath11k/core.c | 35 ++++---- + drivers/net/wireless/ath/ath11k/core.h | 2 + + drivers/net/wireless/ath/ath11k/hif.h | 12 +-- + drivers/net/wireless/ath/ath11k/mhi.c | 19 ++++- + drivers/net/wireless/ath/ath11k/mhi.h | 4 +- + drivers/net/wireless/ath/ath11k/pci.c | 112 +++++++++++++++++++++++-- + drivers/net/wireless/ath/ath11k/pci.h | 2 + + drivers/net/wireless/ath/ath11k/qmi.c | 4 +- + 9 files changed, 159 insertions(+), 39 deletions(-) --- a/drivers/net/wireless/ath/ath11k/ahb.c +++ b/drivers/net/wireless/ath/ath11k/ahb.c -@@ -399,7 +399,7 @@ static void ath11k_ahb_stop(struct ath11 +@@ -400,7 +400,7 @@ static void ath11k_ahb_stop(struct ath11k_base *ab) ath11k_ce_cleanup_pipes(ab); } @@ -51,7 +52,7 @@ { struct ath11k_ahb *ab_ahb = ath11k_ahb_priv(ab); int ret; -@@ -411,11 +411,11 @@ static int ath11k_ahb_power_up(struct at +@@ -412,11 +412,11 @@ static int ath11k_ahb_power_up(struct ath11k_base *ab) return ret; } @@ -64,19 +65,8 @@ + return rproc_shutdown(ab_ahb->tgt_rproc); } - static int ath11k_ahb_fwreset_from_cold_boot(struct ath11k_base *ab) -@@ -437,8 +437,8 @@ static int ath11k_ahb_fwreset_from_cold_ - } - - /* reset the firmware */ -- ath11k_ahb_power_down(ab); -- ath11k_ahb_power_up(ab); -+ ath11k_ahb_power_down(ab, false); -+ ath11k_ahb_power_up(ab, false); - - ath11k_dbg(ab, ATH11K_DBG_AHB, "exited from cold boot mode\n"); - return 0; -@@ -1287,7 +1287,7 @@ static int ath11k_ahb_remove(struct plat + static void ath11k_ahb_init_qmi_ce_config(struct ath11k_base *ab) +@@ -1262,7 +1262,7 @@ static int ath11k_ahb_remove(struct platform_device *pdev) struct ath11k_base *ab = platform_get_drvdata(pdev); if (test_bit(ATH11K_FLAG_QMI_FAIL, &ab->dev_flags)) { @@ -87,7 +77,7 @@ goto qmi_fail; --- a/drivers/net/wireless/ath/ath11k/core.c +++ b/drivers/net/wireless/ath/ath11k/core.c -@@ -779,12 +779,6 @@ int ath11k_core_suspend(struct ath11k_ba +@@ -799,12 +799,6 @@ int ath11k_core_suspend(struct ath11k_base *ab) return ret; } @@ -100,7 +90,7 @@ ret = ath11k_dp_rx_pktlog_stop(ab, false); if (ret) { ath11k_warn(ab, "failed to stop dp rx pktlog during suspend: %d\n", -@@ -798,7 +792,7 @@ int ath11k_core_suspend(struct ath11k_ba +@@ -818,7 +812,7 @@ int ath11k_core_suspend(struct ath11k_base *ab) ath11k_hif_irq_disable(ab); ath11k_hif_ce_irq_disable(ab); @@ -109,7 +99,7 @@ if (ret) { ath11k_warn(ab, "failed to suspend hif: %d\n", ret); return ret; -@@ -813,6 +807,7 @@ int ath11k_core_resume(struct ath11k_bas +@@ -833,6 +827,7 @@ int ath11k_core_resume(struct ath11k_base *ab) int ret; struct ath11k_pdev *pdev; struct ath11k *ar; @@ -117,7 +107,7 @@ if (!ab->hw_params.supports_suspend) return -EOPNOTSUPP; -@@ -825,11 +820,18 @@ int ath11k_core_resume(struct ath11k_bas +@@ -845,11 +840,18 @@ int ath11k_core_resume(struct ath11k_base *ab) if (!ar || ar->state != ATH11K_STATE_OFF) return 0; @@ -137,7 +127,7 @@ ath11k_hif_ce_irq_enable(ab); ath11k_hif_irq_enable(ab); -@@ -841,12 +843,6 @@ int ath11k_core_resume(struct ath11k_bas +@@ -861,12 +863,6 @@ int ath11k_core_resume(struct ath11k_base *ab) return ret; } @@ -150,7 +140,7 @@ return 0; } EXPORT_SYMBOL(ath11k_core_resume); -@@ -1403,7 +1399,7 @@ static int ath11k_core_soc_create(struct +@@ -1423,7 +1419,7 @@ static int ath11k_core_soc_create(struct ath11k_base *ab) goto err_qmi_deinit; } @@ -159,7 +149,7 @@ if (ret) { ath11k_err(ab, "failed to power up :%d\n", ret); goto err_debugfs_reg; -@@ -1879,6 +1875,8 @@ static void ath11k_core_restart(struct w +@@ -1899,6 +1895,8 @@ static void ath11k_core_restart(struct work_struct *work) if (!ab->is_reset) ath11k_core_post_reconfigure_recovery(ab); @@ -168,7 +158,7 @@ } static void ath11k_core_reset(struct work_struct *work) -@@ -1945,8 +1943,8 @@ static void ath11k_core_reset(struct wor +@@ -1965,8 +1963,8 @@ static void ath11k_core_reset(struct work_struct *work) time_left = wait_for_completion_timeout(&ab->recovery_start, ATH11K_RECOVER_START_TIMEOUT_HZ); @@ -179,7 +169,7 @@ ath11k_dbg(ab, ATH11K_DBG_BOOT, "reset started\n"); } -@@ -2012,7 +2010,7 @@ void ath11k_core_deinit(struct ath11k_ba +@@ -2032,7 +2030,7 @@ void ath11k_core_deinit(struct ath11k_base *ab) mutex_unlock(&ab->core_lock); @@ -188,7 +178,7 @@ ath11k_mac_destroy(ab); ath11k_core_soc_destroy(ab); } -@@ -2064,6 +2062,7 @@ struct ath11k_base *ath11k_core_alloc(st +@@ -2084,6 +2082,7 @@ struct ath11k_base *ath11k_core_alloc(struct device *dev, size_t priv_size, timer_setup(&ab->rx_replenish_retry, ath11k_ce_rx_replenish_retry, 0); init_completion(&ab->htc_suspend); init_completion(&ab->wow.wakeup_completed); @@ -220,7 +210,7 @@ int (*suspend)(struct ath11k_base *ab); int (*resume)(struct ath11k_base *ab); int (*map_service_to_pipe)(struct ath11k_base *sc, u16 service_id, -@@ -64,14 +64,14 @@ static inline void ath11k_hif_irq_disabl +@@ -64,14 +64,14 @@ static inline void ath11k_hif_irq_disable(struct ath11k_base *sc) sc->hif.ops->irq_disable(sc); } @@ -241,7 +231,7 @@ static inline int ath11k_hif_suspend(struct ath11k_base *ab) --- a/drivers/net/wireless/ath/ath11k/mhi.c +++ b/drivers/net/wireless/ath/ath11k/mhi.c -@@ -488,9 +488,14 @@ int ath11k_mhi_start(struct ath11k_pci * +@@ -488,9 +488,14 @@ int ath11k_mhi_start(struct ath11k_pci *ab_pci) return 0; } @@ -258,7 +248,7 @@ mhi_unprepare_after_power_down(ab_pci->mhi_ctrl); } -@@ -525,3 +530,13 @@ int ath11k_mhi_resume(struct ath11k_pci +@@ -525,3 +530,13 @@ int ath11k_mhi_resume(struct ath11k_pci *ab_pci) return 0; } @@ -283,7 +273,7 @@ int ath11k_mhi_register(struct ath11k_pci *ar_pci); void ath11k_mhi_unregister(struct ath11k_pci *ar_pci); void ath11k_mhi_set_mhictrl_reset(struct ath11k_base *ab); -@@ -26,4 +26,6 @@ void ath11k_mhi_clear_vector(struct ath1 +@@ -26,4 +26,6 @@ void ath11k_mhi_clear_vector(struct ath11k_base *ab); int ath11k_mhi_suspend(struct ath11k_pci *ar_pci); int ath11k_mhi_resume(struct ath11k_pci *ar_pci); @@ -292,7 +282,7 @@ #endif --- a/drivers/net/wireless/ath/ath11k/pci.c +++ b/drivers/net/wireless/ath/ath11k/pci.c -@@ -622,7 +622,7 @@ static int ath11k_pci_power_up(struct at +@@ -625,7 +625,7 @@ static int ath11k_pci_power_up(struct ath11k_base *ab) return 0; } @@ -301,7 +291,7 @@ { struct ath11k_pci *ab_pci = ath11k_pci_priv(ab); -@@ -633,11 +633,111 @@ static void ath11k_pci_power_down(struct +@@ -636,11 +636,111 @@ static void ath11k_pci_power_down(struct ath11k_base *ab) ath11k_pci_msi_disable(ab_pci); @@ -414,7 +404,7 @@ static int ath11k_pci_hif_suspend(struct ath11k_base *ab) { struct ath11k_pci *ar_pci = ath11k_pci_priv(ab); -@@ -685,8 +785,8 @@ static const struct ath11k_hif_ops ath11 +@@ -688,8 +788,8 @@ static const struct ath11k_hif_ops ath11k_pci_hif_ops = { .read32 = ath11k_pcic_read32, .write32 = ath11k_pcic_write32, .read = ath11k_pcic_read, @@ -425,7 +415,7 @@ .suspend = ath11k_pci_hif_suspend, .resume = ath11k_pci_hif_resume, .irq_enable = ath11k_pcic_ext_irq_enable, -@@ -934,7 +1034,7 @@ static void ath11k_pci_remove(struct pci +@@ -938,7 +1038,7 @@ static void ath11k_pci_remove(struct pci_dev *pdev) ath11k_pci_set_irq_affinity_hint(ab_pci, NULL); if (test_bit(ATH11K_FLAG_QMI_FAIL, &ab->dev_flags)) { @@ -434,7 +424,7 @@ ath11k_debugfs_soc_destroy(ab); ath11k_qmi_deinit_service(ab); goto qmi_fail; -@@ -962,7 +1062,7 @@ static void ath11k_pci_shutdown(struct p +@@ -966,7 +1066,7 @@ static void ath11k_pci_shutdown(struct pci_dev *pdev) struct ath11k_pci *ab_pci = ath11k_pci_priv(ab); ath11k_pci_set_irq_affinity_hint(ab_pci, NULL); @@ -454,3 +444,16 @@ }; static inline struct ath11k_pci *ath11k_pci_priv(struct ath11k_base *ab) +--- a/drivers/net/wireless/ath/ath11k/qmi.c ++++ b/drivers/net/wireless/ath/ath11k/qmi.c +@@ -2859,8 +2859,8 @@ int ath11k_qmi_fwreset_from_cold_boot(struct ath11k_base *ab) + } + + /* reset the firmware */ +- ath11k_hif_power_down(ab); +- ath11k_hif_power_up(ab); ++ ath11k_hif_power_down(ab, false); ++ ath11k_hif_power_up(ab, false); + ath11k_dbg(ab, ATH11K_DBG_QMI, "exit wait for cold boot done\n"); + return 0; + } ++++++ series.conf ++++++ ++++ 2252 lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/series.conf ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.17445/series.conf ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.q7tRpk/_old 2023-11-09 21:34:32.074975583 +0100 +++ /var/tmp/diff_new_pack.q7tRpk/_new 2023-11-09 21:34:32.078975730 +0100 @@ -1,4 +1,4 @@ -2023-10-25 10:31:37 +0000 -GIT Revision: 29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6 +2023-11-09 05:27:56 +0000 +GIT Revision: 1fcc265d62f50cb2666f9c9b4876e08a6222b8cb GIT Branch: stable