Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kernel-source for openSUSE:Factory 
checked in at 2023-11-09 21:34:17
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kernel-source (Old)
 and      /work/SRC/openSUSE:Factory/.kernel-source.new.17445 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kernel-source"

Thu Nov  9 21:34:17 2023 rev:709 rq:1124342 version:6.6.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes        
2023-10-27 22:28:04.143241290 +0200
+++ /work/SRC/openSUSE:Factory/.kernel-source.new.17445/dtb-aarch64.changes     
2023-11-09 21:34:18.650480883 +0100
@@ -1,0 +2,184 @@
+Thu Nov  9 06:27:25 CET 2023 - jsl...@suse.cz
+
+- Linux 6.6.1 (bsc#1012628).
+- ASoC: SOF: sof-pci-dev: Fix community key quirk detection
+  (bsc#1012628).
+- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection
+  (bsc#1012628).
+- serial: core: Fix runtime PM handling for pending tx
+  (bsc#1012628).
+- misc: pci_endpoint_test: Add deviceID for J721S2 PCIe EP device
+  support (bsc#1012628).
+- dt-bindings: serial: rs485: Add rs485-rts-active-high
+  (bsc#1012628).
+- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks
+  (bsc#1012628).
+- tty: 8250: Add support for Intashield IX cards (bsc#1012628).
+- tty: 8250: Add support for additional Brainboxes PX cards
+  (bsc#1012628).
+- tty: 8250: Fix up PX-803/PX-857 (bsc#1012628).
+- tty: 8250: Fix port count of PX-257 (bsc#1012628).
+- tty: 8250: Add support for Intashield IS-100 (bsc#1012628).
+- tty: 8250: Add support for Brainboxes UP cards (bsc#1012628).
+- tty: 8250: Add support for additional Brainboxes UC cards
+  (bsc#1012628).
+- tty: 8250: Remove UC-257 and UC-431 (bsc#1012628).
+- tty: n_gsm: fix race condition in status line change on dead
+  connections (bsc#1012628).
+- Bluetooth: hci_bcm4377: Mark bcm4378/bcm4387 as BROKEN_LE_CODED
+  (bsc#1012628).
+- usb: raw-gadget: properly handle interrupted requests
+  (bsc#1012628).
+- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
+  (bsc#1012628).
+- usb: typec: tcpm: Add additional checks for contaminant
+  (bsc#1012628).
+- usb: storage: set 1.50 as the lower bcdDevice for older "Super
+  Top" compatibility (bsc#1012628).
+- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD
+  device (bsc#1012628).
+- ALSA: usb-audio: add quirk flag to enable native DSD for
+  McIntosh devices (bsc#1012628).
+- eventfs: Use simple_recursive_removal() to clean up dentries
+  (bsc#1012628).
+- eventfs: Delete eventfs_inode when the last dentry is freed
+  (bsc#1012628).
+- eventfs: Save ownership and mode (bsc#1012628).
+- eventfs: Remove "is_freed" union with rcu head (bsc#1012628).
+- tracing: Have trace_event_file have ref counters (bsc#1012628).
+- perf evlist: Avoid frequency mode for the dummy event
+  (bsc#1012628).
+- power: supply: core: Use blocking_notifier_call_chain to avoid
+  RCU complaint (bsc#1012628).
+- drm/amd/display: Don't use fsleep for PSR exit waits
+  (bsc#1012628).
+- commit 758e4f0
+
+-------------------------------------------------------------------
+Sun Nov  5 23:08:29 CET 2023 - mkube...@suse.cz
+
+- update patch metadata
+- update upstream reference
+  - patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch
+- commit 93ae682
+
+-------------------------------------------------------------------
+Thu Nov  2 22:44:53 CET 2023 - mkube...@suse.cz
+
+- series.conf: cleanup
+- update upstream references and move into sorted section:
+  - patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch
+  - patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch
+  - patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch
+- commit 157ac85
+
+-------------------------------------------------------------------
+Thu Nov  2 09:35:14 CET 2023 - jsl...@suse.cz
+
+- kbuild: dummy-tools: pretend we understand
+  -fpatchable-function-entry (ppc64le-build-fix).
+- Delete
+  patches.rpmify/kbuild-dummy-tools-Add-support-for-fpatchable-functi.patch.
+  Replace the latter with the former (upstream accepted solution).
+- commit 8050c17
+
+-------------------------------------------------------------------
+Wed Nov  1 15:54:26 CET 2023 - sch...@suse.de
+
+- riscv: enable CONFIG_PCI_HOST_GENERIC
+  Needed for the pci host controller emulated by qemu.
+- commit ebb7db3
+
+-------------------------------------------------------------------
+Wed Nov  1 07:13:07 CET 2023 - jsl...@suse.cz
+
+- Delete patches.rpmify/x86-Let-AS_WRUSS-depend-on-X86_64.patch.
+- Update config files.
+  This effectively reverts 9ab2e0780c8a2fb9a84db5bad59fbe3ab526a6c3. The
+  patch was not accepted upstream:
+  
https://lore.kernel.org/all/20231031140504.GCZUEJkMPXSrEDh3MA@fat_crate.local/
+  Instead, we merged the packaging branch which fixes this in
+  rpm/check-for-config-changes instead.
+- rpm/check-for-config-changes: add AS_WRUSS to IGNORED_CONFIGS_RE
+  Add AS_WRUSS as an IGNORED_CONFIGS_RE entry in check-for-config-changes
+  to fix build on x86_32.
+  There was a fix submitted to upstream but it was not accepted:
+  
https://lore.kernel.org/all/20231031140504.GCZUEJkMPXSrEDh3MA@fat_crate.local/
+  So carry this in IGNORED_CONFIGS_RE instead.
+- commit ce5bc31
+
+-------------------------------------------------------------------
+Tue Oct 31 22:55:40 CET 2023 - p...@tesarici.cz
+
+- config: enable NFS_V4_2_READ_PLUS (bsc#1216736)
+  This option was introduced and disabled by default because of unresolved
+  issues. As stated in mainline commit 9cf2744d2491 ("NFS: Enable the
+  READ_PLUS operation by default") which changes the upstream default to
+  enabled, these issues are addressed so that it is safe to enable the
+  option and as it allows to transfer sparse files more efficiently, it is
+  desirable to do so.
+- commit c4f1dc1
+
+-------------------------------------------------------------------
+Tue Oct 31 10:57:23 CET 2023 - jsl...@suse.cz
+
+- x86: Let AS_WRUSS depend on X86_64 (i386-build-fix).
+- Update config files.
+- commit 9ab2e07
+
+-------------------------------------------------------------------
+Mon Oct 30 12:36:34 CET 2023 - jsl...@suse.cz
+
+- kbuild: dummy-tools: pretend we understand
+  -fpatchable-function-entry (ppc64le-build-fix).
+- Update config files.
+- commit 2c8a930
+
+-------------------------------------------------------------------
+Mon Oct 30 09:35:27 CET 2023 - msucha...@suse.de
+
+- kbuild: dummy-tools: Add support for -fpatchable-function-entry 
(dummy-tools).
+  Update config files.
+- commit 494c209
+
+-------------------------------------------------------------------
+Mon Oct 30 07:50:05 CET 2023 - jsl...@suse.cz
+
+- Delete
+  patches.suse/ACPI-video-Add-backlight-native-DMI-quirk-for-Lenovo.patch.
+  Already present in 6.6-rc1. This was applied twice due to too few
+  context in the diff. But it did not hurt...
+- commit 2a844dc
+
+-------------------------------------------------------------------
+Mon Oct 30 06:12:00 CET 2023 - mkube...@suse.cz
+
+- Update to 6.6 final
+- refresh configs (headers only)
+- commit e0904b6
+
+-------------------------------------------------------------------
+Sun Oct 29 21:45:54 CET 2023 - mkube...@suse.cz
+
+- update and reenable armv7hl configs
+  Where possible, new values are copied from arm64. The rest is guessed,
+  mostly based on existing values of similar config options.
+- armv7hl specific config options:
+  - TI_ICSS_IEP=m
+- commit 09e0fd1
+
+-------------------------------------------------------------------
+Fri Oct 27 10:37:50 CEST 2023 - vkarasu...@suse.de
+
+- Update
+  
patches.kernel.org/6.5.9-016-x86-sev-Disable-MMIO-emulation-from-user-mode.patch
+  (bsc#1012628 bsc#1212649 CVE-2023-46813).
+- Update
+  
patches.kernel.org/6.5.9-017-x86-sev-Check-IOBM-for-IOIO-exceptions-from-use.patch
+  (bsc#1012628 bsc#1212649 CVE-2023-46813).
+- Update
+  
patches.kernel.org/6.5.9-018-x86-sev-Check-for-user-space-IOIO-pointing-to-k.patch
+  (bsc#1012628 bsc#1212649 CVE-2023-46813).
+- commit b854e69
+
+-------------------------------------------------------------------
@@ -430,0 +615,16 @@
+Mon Oct 23 00:16:06 CEST 2023 - mkube...@suse.cz
+
+- Update to 6.6-rc7
+- refresh configs
+- commit 4a117b4
+
+-------------------------------------------------------------------
+Fri Oct 20 18:39:43 CEST 2023 - dmuel...@suse.com
+
+- config.conf: Reenable arm64
+- Update config files:
+  * Same settings like x86_64, plus all ARM specific errata turned on
+  * rest all mod
+- commit 5e5e96e
+
+-------------------------------------------------------------------
@@ -777,0 +978,7 @@
+Thu Oct 19 15:06:34 CEST 2023 - mbrug...@suse.com
+
+- arm64: Update config files.
+  Make iMX93 clock and pinctrl driver build-in.
+- commit 897b0cf
+
+-------------------------------------------------------------------
@@ -791,0 +999,7 @@
+Sun Oct 15 22:46:40 CEST 2023 - mkube...@suse.cz
+
+- Update to 6.6-rc6
+- refresh configs
+- commit 8f5995d
+
+-------------------------------------------------------------------
@@ -799 +1013 @@
-- commit e8bd3c1
+- commit 41037b9
@@ -1073 +1287,11 @@
-- commit 3169a10
+- commit d26c540
+
+-------------------------------------------------------------------
+Sun Oct  8 23:06:37 CEST 2023 - mkube...@suse.cz
+
+- Update to 6.6-rc5
+- update configs
+  - IMA_BLACKLIST_KEYRING=n
+  - IMA_LOAD_X509=n
+  - IPU_BRIDGE=m (new on riscv64)
+- commit a59832f
@@ -1684,0 +1909,8 @@
+Mon Oct  2 06:34:04 CEST 2023 - mkube...@suse.cz
+
+- Update to 6.6-rc4
+- eliminate 1 patch
+  - patches.suse/Revert-101bd907b424-misc-rtsx-judge-ASPM-Mode-to-set.patch 
(0e4cac557531)
+- commit 019d4ec
+
+-------------------------------------------------------------------
@@ -2082,0 +2315,6 @@
+Sun Sep 24 23:36:19 CEST 2023 - mkube...@suse.cz
+
+- Update to 6.6-rc3
+- commit 15b4ad8
+
+-------------------------------------------------------------------
@@ -2620,0 +2859,44 @@
+Tue Sep 19 10:16:48 CEST 2023 - sch...@suse.de
+
+- riscv: enable CONFIG_MEDIA_PLATFORM_SUPPORT
+   - MEDIA_PLATFORM_SUPPORT=y
+   - V4L2_H264=m
+   - V4L2_VP9=m
+   - MEDIA_PLATFORM_DRIVERS=y
+   - V4L_PLATFORM_DRIVERS=y
+   - SDR_PLATFORM_DRIVERS=y
+   - DVB_PLATFORM_DRIVERS=y
+   - V4L_MEM2MEM_DRIVERS=y
+   - VIDEO_MEM2MEM_DEINTERLACE=m
+   - VIDEO_MUX=m
+   - VIDEO_CADENCE_CSI2RX=m
+   - VIDEO_CADENCE_CSI2TX=m
+   - VIDEO_CAFE_CCIC=m
+   - VIDEO_RCAR_ISP=m
+   - VIDEO_RCAR_CSI2=m
+   - VIDEO_RCAR_VIN=m
+   - VIDEO_RZG2L_CSI2=m
+   - VIDEO_RZG2L_CRU=m
+   - VIDEO_RENESAS_FCP=m
+   - VIDEO_RENESAS_FDP1=m
+   - VIDEO_RENESAS_JPU=m
+   - VIDEO_RENESAS_VSP1=m
+   - VIDEO_RCAR_DRIF=m
+   - VIDEO_SUN4I_CSI=m
+   - VIDEO_SUN6I_CSI=m
+   - VIDEO_SUN6I_MIPI_CSI2=m
+   - VIDEO_SUN8I_A83T_MIPI_CSI2=m
+   - VIDEO_SUN8I_DEINTERLACE=m
+   - VIDEO_SUN8I_ROTATE=m
+   - VIDEO_HANTRO=m
+   - VIDEO_HANTRO_SUNXI=y
+   - VIDEO_XILINX=m
+   - VIDEO_XILINX_CSI2RXSS=m
+   - VIDEO_XILINX_TPG=m
+   - VIDEO_XILINX_VTC=m
+   - SMS_SDIO_DRV=m
+   - SMS_SIANO_DEBUGFS=n
+   - VIDEO_SUN6I_ISP=m
+- commit 337896e
+
+-------------------------------------------------------------------
@@ -2636 +2918 @@
-- commit 08fb080
+- commit 8c848c4
++++ 174 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes
++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.17445/dtb-aarch64.changes
dtb-armv6l.changes: same change
dtb-armv7l.changes: same change
dtb-riscv64.changes: same change
kernel-64kb.changes: same change
kernel-debug.changes: same change
kernel-default.changes: same change
kernel-docs.changes: same change
kernel-kvmsmall.changes: same change
kernel-lpae.changes: same change
kernel-obs-build.changes: same change
kernel-obs-qa.changes: same change
kernel-pae.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-vanilla.changes: same change
kernel-zfcpdump.changes: same change

Old:
----
  linux-6.5.tar.sign
  linux-6.5.tar.xz

New:
----
  linux-6.6.tar.sign
  linux-6.6.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dtb-aarch64.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.262871955 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.266872102 +0100
@@ -16,8 +16,8 @@
 #
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -25,9 +25,9 @@
 %(chmod +x 
%_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
 
 Name:           dtb-aarch64
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif

dtb-armv6l.spec: same change
dtb-armv7l.spec: same change
dtb-riscv64.spec: same change
++++++ kernel-64kb.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.426877999 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.426877999 +0100
@@ -17,8 +17,8 @@
 # needssslcertforbuild
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        Kernel with 64kb PAGE_SIZE
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -385,10 +385,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 # END COMMON DEPS
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 %obsolete_rebuilds %name
 
 %define kmp_target_cpu %_target_cpu
@@ -1305,8 +1305,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

kernel-debug.spec: same change
++++++ kernel-default.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.518881389 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.522881537 +0100
@@ -17,8 +17,8 @@
 # needssslcertforbuild
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        The Standard Kernel
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -385,10 +385,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 # END COMMON DEPS
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 %ifarch %ix86
 Provides:       kernel-trace = 3.13
 Obsoletes:      kernel-trace <= 3.13
@@ -1342,8 +1342,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 
 %ifarch %ix86
 Provides:       kernel-trace-base = 3.13

++++++ kernel-docs.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.554882716 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.558882863 +0100
@@ -16,8 +16,8 @@
 #
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 %define build_html 1
 %define build_pdf 0
@@ -30,9 +30,9 @@
 Summary:        Kernel Documentation
 License:        GPL-2.0-only
 Group:          Documentation/Man
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -83,7 +83,7 @@
 %endif
 URL:            https://www.kernel.org/
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 BuildArch:      noarch
 Source0:        
https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc

++++++ kernel-kvmsmall.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.598884337 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.602884484 +0100
@@ -17,8 +17,8 @@
 # needssslcertforbuild
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        The Small Developer Kernel for KVM
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -385,10 +385,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 # END COMMON DEPS
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 %obsolete_rebuilds %name
 
 %define kmp_target_cpu %_target_cpu
@@ -1309,8 +1309,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

kernel-lpae.spec: same change
++++++ kernel-obs-build.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.694887875 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.694887875 +0100
@@ -19,7 +19,7 @@
 
 #!BuildIgnore: post-build-checks
 
-%define patchversion 6.5.9
+%define patchversion 6.6.1
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -44,7 +44,7 @@
 %endif
 %endif
 %endif
-BuildRequires:  
kernel%kernel_flavor-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+BuildRequires:  
kernel%kernel_flavor-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 
 %if 0%{?rhel_version}
 BuildRequires:  kernel
@@ -56,9 +56,9 @@
 Summary:        package kernel and initrd for OBS VM builds
 License:        GPL-2.0-only
 Group:          SLES
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif

++++++ kernel-obs-qa.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.730889202 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.730889202 +0100
@@ -17,7 +17,7 @@
 # needsrootforbuild
 
 
-%define patchversion 6.5.9
+%define patchversion 6.6.1
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -32,9 +32,9 @@
 Summary:        Basic QA tests for the kernel
 License:        GPL-2.0-only
 Group:          SLES
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif

++++++ kernel-pae.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.770890676 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.774890823 +0100
@@ -17,8 +17,8 @@
 # needssslcertforbuild
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        Kernel with PAE Support
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -385,10 +385,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 # END COMMON DEPS
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 %ifarch %ix86
 Provides:       kernel-desktop = 4.3
 Obsoletes:      kernel-desktop <= 4.3
@@ -1325,8 +1325,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 
 %ifarch %ix86
 Provides:       kernel-desktop-base = 4.3

++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.806892002 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.810892150 +0100
@@ -16,8 +16,8 @@
 #
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -30,9 +30,9 @@
 %endif
 
 Name:           kernel-source
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -49,7 +49,7 @@
 BuildRequires:  sed
 Requires(post): coreutils sed
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 Provides:       linux
 Provides:       multiversion(kernel)
 Source0:        
https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz

++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.846893477 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.846893477 +0100
@@ -24,10 +24,10 @@
 Summary:        Kernel Symbol Versions (modversions)
 License:        GPL-2.0-only
 Group:          Development/Sources
-Version:        6.5.9
+Version:        6.6.1
 %if %using_buildservice
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -52,7 +52,7 @@
 %endif
 Requires:       pesign-obs-integration
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 Provides:       multiversion(kernel)
 Source:         README.KSYMS
 Requires:       kernel-devel%variant = %version-%source_rel

++++++ kernel-vanilla.spec ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:29.882894803 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:29.882894803 +0100
@@ -17,8 +17,8 @@
 # needssslcertforbuild
 
 
-%define srcversion 6.5
-%define patchversion 6.5.9
+%define srcversion 6.6
+%define patchversion 6.6.1
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        The Standard Kernel - without any SUSE patches
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.5.9
+Version:        6.6.1
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g29edc7c
+Release:        <RELEASE>.g1fcc265
 %else
 Release:        0
 %endif
@@ -385,10 +385,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 # END COMMON DEPS
-Provides:       %name-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       %name-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 %obsolete_rebuilds %name
 
 %define kmp_target_cpu %_target_cpu
@@ -1302,8 +1302,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
-Provides:       kernel-srchash-29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+Provides:       
kernel-%build_flavor-base-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
+Provides:       kernel-srchash-1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

kernel-zfcpdump.spec: same change
++++++ check-for-config-changes ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:30.118903500 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:30.122903648 +0100
@@ -7,6 +7,7 @@
 declare -a IGNORED_CONFIGS_RE=(
        'AS_HAS_[A-Z0-9_]*'
        'AS_VERSION'
+       'AS_WRUSS' # x86_32
        'BUILTIN_RETURN_ADDRESS_STRIPS_PAC'
        'CC_CAN_[A-Z_]*'
        'CC_HAS_[A-Z_]*'
@@ -18,13 +19,13 @@
        'G*CC[0-9]*_NO_[A-Z_]*'
        'HAVE_[A-Z]*_COMPILER'
        'LD_VERSION'
+       'OBJTOOL'
        'PAHOLE_HAS_[A-Z0-9_]*'
        'PAHOLE_VERSION'
        'RISCV_ISA_[A-Z_]*'
        'TOOLCHAIN_HAS_[A-Z_]*'
        'TOOLCHAIN_NEEDS_[A-Z_]*'
        'TOOLS_SUPPORT_[A-Z_]*'
-       'OBJTOOL'
 )
 
 declare -a SED_ARGS=()

++++++ config.sh ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:30.214907038 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:30.218907185 +0100
@@ -1,5 +1,5 @@
 # The version of the main tarball to use
-SRCVERSION=6.5
+SRCVERSION=6.6
 # variant of the kernel-source package, either empty or "-rt"
 VARIANT=
 # enable kernel module compression

++++++ config.tar.bz2 ++++++
++++ 7135 lines of diff (skipped)

++++++ linux-6.5.tar.xz -> linux-6.6.tar.xz ++++++
/work/SRC/openSUSE:Factory/kernel-source/linux-6.5.tar.xz 
/work/SRC/openSUSE:Factory/.kernel-source.new.17445/linux-6.6.tar.xz differ: 
char 15, line 1


++++++ patches.kernel.org.tar.bz2 ++++++
++++ 203476 lines of diff (skipped)

++++++ patches.rpmify.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch 
new/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch
--- 
old/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch   
    2023-09-19 13:00:47.000000000 +0200
+++ 
new/patches.rpmify/Revert-kbuild-Hack-for-depmod-not-handling-X.Y-versi.patch   
    1970-01-01 01:00:00.000000000 +0100
@@ -1,70 +0,0 @@
-From 4d15c9fa058e6dee09324cfc93f48858d4296019 Mon Sep 17 00:00:00 2001
-From: Michal Suchanek <msucha...@suse.de>
-Date: Tue, 18 Jul 2023 18:58:43 +0200
-Subject: [PATCH] Revert "kbuild: Hack for depmod not handling X.Y versions"
-
-References: bsc#1212835
-Patch-mainline: v6.6-rc1
-Git-commit: 4d15c9fa058e6dee09324cfc93f48858d4296019
-
-Remove hack for ancient version of module-init-tools that was added in
-Linux 3.0.
-
-Since then module-init-tools was replaced with kmod.
-
-This hack adds an additional indirection, and causes confusing errors
-to be printed when depmod fails.
-
-Reverts commit 8fc62e594253 ("kbuild: Do not write to builddir in 
modules_install")
-Reverts commit bfe5424a8b31 ("kbuild: Hack for depmod not handling X.Y 
versions")
-
-Link: 
https://lore.kernel.org/linux-modules/CAK7LNAQMs3QBYfWcLkmOQdbbq7cj=7wWbK=awhdtc2raskh...@mail.gmail.com/
-
-Signed-off-by: Michal Suchanek <msucha...@suse.de>
-Signed-off-by: Masahiro Yamada <masahi...@kernel.org>
----
- scripts/depmod.sh | 27 +--------------------------
- 1 file changed, 1 insertion(+), 26 deletions(-)
-
-diff --git a/scripts/depmod.sh b/scripts/depmod.sh
-index 3643b4f896ed..fca689ba4f21 100755
---- a/scripts/depmod.sh
-+++ b/scripts/depmod.sh
-@@ -23,33 +23,8 @@ if [ -z $(command -v $DEPMOD) ]; then
-       exit 0
- fi
- 
--# older versions of depmod require the version string to start with three
--# numbers, so we cheat with a symlink here
--depmod_hack_needed=true
--tmp_dir=$(mktemp -d ${TMPDIR:-/tmp}/depmod.XXXXXX)
--mkdir -p "$tmp_dir/lib/modules/$KERNELRELEASE"
--if "$DEPMOD" -b "$tmp_dir" $KERNELRELEASE 2>/dev/null; then
--      if test -e "$tmp_dir/lib/modules/$KERNELRELEASE/modules.dep" -o \
--              -e "$tmp_dir/lib/modules/$KERNELRELEASE/modules.dep.bin"; then
--              depmod_hack_needed=false
--      fi
--fi
--rm -rf "$tmp_dir"
--if $depmod_hack_needed; then
--      symlink="$INSTALL_MOD_PATH/lib/modules/99.98.$KERNELRELEASE"
--      ln -s "$KERNELRELEASE" "$symlink"
--      KERNELRELEASE=99.98.$KERNELRELEASE
--fi
--
- set -- -ae -F System.map
- if test -n "$INSTALL_MOD_PATH"; then
-       set -- "$@" -b "$INSTALL_MOD_PATH"
- fi
--"$DEPMOD" "$@" "$KERNELRELEASE"
--ret=$?
--
--if $depmod_hack_needed; then
--      rm -f "$symlink"
--fi
--
--exit $ret
-+exec "$DEPMOD" "$@" "$KERNELRELEASE"
--- 
-2.41.0
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch 
new/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch
--- 
old/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch   
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.rpmify/kbuild-dummy-tools-pretend-we-understand-fpatchable-.patch   
    2023-11-05 23:08:29.000000000 +0100
@@ -0,0 +1,45 @@
+From: "Jiri Slaby (SUSE)" <jirisl...@kernel.org>
+Date: Mon, 30 Oct 2023 12:34:16 +0100
+Subject: kbuild: dummy-tools: pretend we understand -fpatchable-function-entry
+Git-commit: 1bfaa37fd3486e66131de9cb87747c84b4c89a05
+Patch-mainline: v6.7-rc1
+References: ppc64le-build-fix
+
+Commit 0f71dcfb4aef ("powerpc/ftrace: Add support for
+-fpatchable-function-entry") added a script to check for
+-fpatchable-function-entry compiler support. The script expects compiler
+to emit the section __patchable_function_entries and few nops after a
+function entry.
+
+If the compiler understands and emits the above,
+CONFIG_ARCH_USING_PATCHABLE_FUNCTION_ENTRY is set.
+
+So teach dummy-tools' gcc about this.
+
+Signed-off-by: Jiri Slaby (SUSE) <jirisl...@kernel.org>
+Reviewed-by: Nathan Chancellor <nat...@kernel.org>
+Signed-off-by: Masahiro Yamada <masahi...@kernel.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ scripts/dummy-tools/gcc |   10 ++++++++++
+ 1 file changed, 10 insertions(+)
+
+--- a/scripts/dummy-tools/gcc
++++ b/scripts/dummy-tools/gcc
+@@ -91,6 +91,16 @@ if arg_contain -S "$@"; then
+               fi
+               exit 0
+       fi
++
++      # For arch/powerpc/tools/gcc-check-fpatchable-function-entry.sh
++      if arg_contain -m64 "$@" && arg_contain -fpatchable-function-entry=2 
"$@"; then
++              echo "func:"
++              echo ".section __patchable_function_entries"
++              echo ".localentry"
++              echo "  nop"
++              echo "  nop"
++              exit 0
++      fi
+ fi
+ 
+ # To set GCC_PLUGINS

++++++ patches.suse.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch
 
new/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch
--- 
old/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch
    2023-10-25 12:31:37.000000000 +0200
+++ 
new/patches.suse/0001-bsc-1204315-Disable-sysfb-before-creating-simple-fra.patch
    2023-11-02 22:52:53.000000000 +0100
@@ -1,8 +1,7 @@
 From 49bd201996152822e3f5f9aa3a7f8da3518a7b42 Mon Sep 17 00:00:00 2001
 From: Thomas Zimmermann <tzimmerm...@suse.de>
 Date: Thu, 10 Nov 2022 09:27:41 +0100
-Subject: [PATCH] bsc#1204315: Disable sysfb before creating simple-framebuffer
- from DT
+Subject: [PATCH] bsc#1204315: Disable sysfb before creating simple-framebuffer 
from DT
 Patch-mainline: Never, internal workaround
 References: bsc#1204315
 
@@ -15,8 +14,6 @@
  drivers/of/platform.c | 2 ++
  1 file changed, 2 insertions(+)
 
-diff --git a/drivers/of/platform.c b/drivers/of/platform.c
-index 3507095a69f6..278d6d6fa516 100644
 --- a/drivers/of/platform.c
 +++ b/drivers/of/platform.c
 @@ -20,6 +20,7 @@
@@ -25,9 +22,9 @@
  #include <linux/platform_device.h>
 +#include <linux/sysfb.h>
  
- const struct of_device_id of_default_bus_match_table[] = {
-       { .compatible = "simple-bus", },
-@@ -583,6 +584,7 @@ static int __init of_platform_default_populate_init(void)
+ #include "of_private.h"
+ 
+@@ -620,6 +621,7 @@ static int __init of_platform_default_populate_init(void)
                        of_node_put(node);
                }
  
@@ -35,6 +32,3 @@
                node = of_get_compatible_child(of_chosen, "simple-framebuffer");
                of_platform_device_create(node, NULL, NULL);
                of_node_put(node);
--- 
-2.38.0
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch 
new/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch
--- old/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch      
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/0001-drm-amdgpu-Update-invalid-PTE-flag-setting.patch      
1970-01-01 01:00:00.000000000 +0100
@@ -1,193 +0,0 @@
-From e77673d14f2cec6d47d2da4e58dce87c2d66e54f Mon Sep 17 00:00:00 2001
-From: Mukul Joshi <mukul.jo...@amd.com>
-Date: Fri, 9 Jun 2023 11:11:53 -0400
-Subject: drm/amdgpu: Update invalid PTE flag setting
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-Git-commit: e77673d14f2cec6d47d2da4e58dce87c2d66e54f
-Patch-mainline: v6.6-rc1
-References: boo#1215470
-
-Update the invalid PTE flag setting with TF enabled.
-This is to ensure, in addition to transitioning the
-retry fault to a no-retry fault, it also causes the
-wavefront to enter the trap handler. With the current
-setting, the fault only transitions to a no-retry fault.
-Additionally, have 2 sets of invalid PTE settings, one for
-TF enabled, the other for TF disabled. The setting with
-TF disabled, doesn't work with TF enabled.
-
-Signed-off-by: Mukul Joshi <mukul.jo...@amd.com>
-Acked-by: Christian König <christian.koe...@amd.com>
-Reviewed-by: Felix Kuehling <felix.kuehl...@amd.com>
-Signed-off-by: Alex Deucher <alexander.deuc...@amd.com>
-Acked-by: Thomas Zimmermann <tzimmerm...@suse.com>
----
- drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h   |  2 ++
- drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c    |  2 +-
- drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h    |  6 +++++
- drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c | 31 +++++++++++++++++++++++
- drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c    |  1 +
- drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c    |  1 +
- drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c     |  1 +
- drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c     |  1 +
- drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c     |  1 +
- 9 files changed, 45 insertions(+), 1 deletion(-)
-
-diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h 
b/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h
-index 56d73fade5685..fdc25cd559b60 100644
---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h
-+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_gmc.h
-@@ -331,6 +331,8 @@ struct amdgpu_gmc {
-       u64 VM_CONTEXT_PAGE_TABLE_END_ADDR_LO32[16];
-       u64 VM_CONTEXT_PAGE_TABLE_END_ADDR_HI32[16];
-       u64 MC_VM_MX_L1_TLB_CNTL;
-+
-+      u64 noretry_flags;
- };
- 
- #define amdgpu_gmc_flush_gpu_tlb(adev, vmid, vmhub, type) 
((adev)->gmc.gmc_funcs->flush_gpu_tlb((adev), (vmid), (vmhub), (type)))
-diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c 
b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c
-index 291977b93b1df..8eda8f7ac612b 100644
---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c
-+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c
-@@ -2604,7 +2604,7 @@ bool amdgpu_vm_handle_fault(struct amdgpu_device *adev, 
u32 pasid,
-               /* Intentionally setting invalid PTE flag
-                * combination to force a no-retry-fault
-                */
--              flags = AMDGPU_PTE_SNOOPED | AMDGPU_PTE_PRT;
-+              flags = AMDGPU_VM_NORETRY_FLAGS;
-               value = 0;
-       } else if (amdgpu_vm_fault_stop == AMDGPU_VM_FAULT_STOP_NEVER) {
-               /* Redirect the access to the dummy page */
-diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h 
b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h
-index 9c85d494f2a24..b81fcb962d8fd 100644
---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h
-+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h
-@@ -84,7 +84,13 @@ struct amdgpu_mem_stats;
- /* PDE Block Fragment Size for VEGA10 */
- #define AMDGPU_PDE_BFS(a)     ((uint64_t)a << 59)
- 
-+/* Flag combination to set no-retry with TF disabled */
-+#define AMDGPU_VM_NORETRY_FLAGS       (AMDGPU_PTE_EXECUTABLE | AMDGPU_PDE_PTE 
| \
-+                              AMDGPU_PTE_TF)
- 
-+/* Flag combination to set no-retry with TF enabled */
-+#define AMDGPU_VM_NORETRY_FLAGS_TF (AMDGPU_PTE_VALID | AMDGPU_PTE_SYSTEM | \
-+                                 AMDGPU_PTE_PRT)
- /* For GFX9 */
- #define AMDGPU_PTE_MTYPE_VG10(a)      ((uint64_t)(a) << 57)
- #define AMDGPU_PTE_MTYPE_VG10_MASK    AMDGPU_PTE_MTYPE_VG10(3ULL)
-diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c 
b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c
-index dea1a64be44d0..24ddf6a0512a7 100644
---- a/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c
-+++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_vm_pt.c
-@@ -778,6 +778,27 @@ int amdgpu_vm_pde_update(struct amdgpu_vm_update_params 
*params,
-                                       1, 0, flags);
- }
- 
-+/**
-+ * amdgpu_vm_pte_update_noretry_flags - Update PTE no-retry flags
-+ *
-+ * @adev - amdgpu_device pointer
-+ * @flags: pointer to PTE flags
-+ *
-+ * Update PTE no-retry flags when TF is enabled.
-+ */
-+static void amdgpu_vm_pte_update_noretry_flags(struct amdgpu_device *adev,
-+                                              uint64_t *flags)
-+{
-+      /*
-+       * Update no-retry flags with the corresponding TF
-+       * no-retry combination.
-+       */
-+      if ((*flags & AMDGPU_VM_NORETRY_FLAGS) == AMDGPU_VM_NORETRY_FLAGS) {
-+              *flags &= ~AMDGPU_VM_NORETRY_FLAGS;
-+              *flags |= adev->gmc.noretry_flags;
-+      }
-+}
-+
- /*
-  * amdgpu_vm_pte_update_flags - figure out flags for PTE updates
-  *
-@@ -804,6 +825,16 @@ static void amdgpu_vm_pte_update_flags(struct 
amdgpu_vm_update_params *params,
-               flags |= AMDGPU_PTE_EXECUTABLE;
-       }
- 
-+      /*
-+       * Update no-retry flags to use the no-retry flag combination
-+       * with TF enabled. The AMDGPU_VM_NORETRY_FLAGS flag combination
-+       * does not work when TF is enabled. So, replace them with
-+       * AMDGPU_VM_NORETRY_FLAGS_TF flag combination which works for
-+       * all cases.
-+       */
-+      if (level == AMDGPU_VM_PTB)
-+              amdgpu_vm_pte_update_noretry_flags(adev, &flags);
-+
-       /* APUs mapping system memory may need different MTYPEs on different
-        * NUMA nodes. Only do this for contiguous ranges that can be assumed
-        * to be on the same NUMA node.
-diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c 
b/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c
-index 0c8a479895761..13b89f78d07d3 100644
---- a/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c
-+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c
-@@ -751,6 +751,7 @@ static int gmc_v10_0_early_init(void *handle)
-       adev->gmc.private_aperture_start = 0x1000000000000000ULL;
-       adev->gmc.private_aperture_end =
-               adev->gmc.private_aperture_start + (4ULL << 30) - 1;
-+      adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF;
- 
-       return 0;
- }
-diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c 
b/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c
-index c571f0d959946..c68ecb7dfa397 100644
---- a/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c
-+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c
-@@ -651,6 +651,7 @@ static int gmc_v11_0_early_init(void *handle)
-       adev->gmc.private_aperture_start = 0x1000000000000000ULL;
-       adev->gmc.private_aperture_end =
-               adev->gmc.private_aperture_start + (4ULL << 30) - 1;
-+      adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF;
- 
-       return 0;
- }
-diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c 
b/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c
-index acd2b407860f7..027b146030376 100644
---- a/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c
-+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v7_0.c
-@@ -942,6 +942,7 @@ static int gmc_v7_0_early_init(void *handle)
-               adev->gmc.shared_aperture_end + 1;
-       adev->gmc.private_aperture_end =
-               adev->gmc.private_aperture_start + (4ULL << 30) - 1;
-+      adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF;
- 
-       return 0;
- }
-diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c 
b/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c
-index 85dead2a57021..581ed922dbe3f 100644
---- a/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c
-+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v8_0.c
-@@ -1056,6 +1056,7 @@ static int gmc_v8_0_early_init(void *handle)
-               adev->gmc.shared_aperture_end + 1;
-       adev->gmc.private_aperture_end =
-               adev->gmc.private_aperture_start + (4ULL << 30) - 1;
-+      adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF;
- 
-       return 0;
- }
-diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c 
b/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c
-index 67e669e0141cc..ebdbc823fae36 100644
---- a/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c
-+++ b/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c
-@@ -1622,6 +1622,7 @@ static int gmc_v9_0_early_init(void *handle)
-       adev->gmc.private_aperture_start = 0x1000000000000000ULL;
-       adev->gmc.private_aperture_end =
-               adev->gmc.private_aperture_start + (4ULL << 30) - 1;
-+      adev->gmc.noretry_flags = AMDGPU_VM_NORETRY_FLAGS_TF;
- 
-       return 0;
- }
--- 
-2.42.0
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch
 
new/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch
--- 
old/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch
    2023-10-25 12:31:37.000000000 +0200
+++ 
new/patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch
    2023-11-02 22:52:53.000000000 +0100
@@ -1,8 +1,7 @@
 From b5123d0553f4ed5e734f6457696cdd30228d1eee Mon Sep 17 00:00:00 2001
 From: David Howells <dhowe...@redhat.com>
 Date: Tue, 27 Feb 2018 10:04:55 +0000
-Subject: [PATCH 2/3] efi: Add an EFI_SECURE_BOOT flag to indicate secure
- boot mode
+Subject: [PATCH 2/3] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot 
mode
 Patch-mainline: Never, Fedora Core 32
 References: jsc#SLE-9870
 
@@ -22,16 +21,16 @@
 Acked-by: Lee, Chun-Yi <j...@suse.com>
 Signed-off-by: Chester Lin <c...@suse.com>
 ---
- arch/x86/kernel/setup.c           |   14 +-------------
- drivers/firmware/efi/Makefile     |    1 +
- drivers/firmware/efi/secureboot.c |   38 
++++++++++++++++++++++++++++++++++++++
- include/linux/efi.h               |   19 ++++++++++++-------
+ arch/x86/kernel/setup.c           | 14 +-----------
+ drivers/firmware/efi/Makefile     |  1 +
+ drivers/firmware/efi/secureboot.c | 38 +++++++++++++++++++++++++++++++
+ include/linux/efi.h               | 19 ++++++++++------
  4 files changed, 52 insertions(+), 20 deletions(-)
  create mode 100644 drivers/firmware/efi/secureboot.c
 
 --- a/arch/x86/kernel/setup.c
 +++ b/arch/x86/kernel/setup.c
-@@ -1114,19 +1114,7 @@ void __init setup_arch(char **cmdline_p)
+@@ -1192,19 +1192,7 @@ void __init setup_arch(char **cmdline_p)
        /* Allocate bigger log buffer */
        setup_log_buf(1);
  
@@ -54,7 +53,7 @@
  
 --- a/drivers/firmware/efi/Makefile
 +++ b/drivers/firmware/efi/Makefile
-@@ -27,6 +27,7 @@ obj-$(CONFIG_EFI_FAKE_MEMMAP)                += fake_m
+@@ -25,6 +25,7 @@ subdir-$(CONFIG_EFI_STUB)            += libstub
  obj-$(CONFIG_EFI_BOOTLOADER_CONTROL)  += efibc.o
  obj-$(CONFIG_EFI_TEST)                        += test/
  obj-$(CONFIG_EFI_DEV_PATH_PARSER)     += dev-path-parser.o
@@ -105,7 +104,7 @@
 +}
 --- a/include/linux/efi.h
 +++ b/include/linux/efi.h
-@@ -847,6 +847,14 @@ extern int __init efi_setup_pcdp_console
+@@ -870,6 +870,14 @@ extern int __init efi_setup_pcdp_console(char *);
  #define EFI_MEM_ATTR          10      /* Did firmware publish an 
EFI_MEMORY_ATTRIBUTES table? */
  #define EFI_MEM_NO_SOFT_RESERVE       11      /* Is the kernel configured to 
ignore soft reservations? */
  #define EFI_PRESERVE_BS_REGIONS       12      /* Are EFI boot-services memory 
segments available? */
@@ -120,7 +119,7 @@
  
  #ifdef CONFIG_EFI
  /*
-@@ -871,6 +879,8 @@ static inline bool efi_rt_services_suppo
+@@ -894,6 +902,8 @@ static inline bool efi_rt_services_supported(unsigned int 
mask)
        return (efi.runtime_supported_mask & mask) == mask;
  }
  extern void efi_find_mirror(void);
@@ -129,7 +128,7 @@
  #else
  static inline bool efi_enabled(int feature)
  {
-@@ -890,6 +900,8 @@ static inline bool efi_rt_services_suppo
+@@ -913,6 +923,8 @@ static inline bool efi_rt_services_supported(unsigned int 
mask)
  }
  
  static inline void efi_find_mirror(void) {}
@@ -138,8 +137,8 @@
  #endif
  
  extern int efi_status_to_err(efi_status_t status);
-@@ -1105,13 +1117,6 @@ static inline bool efi_runtime_disabled(
- extern void efi_call_virt_check_flags(unsigned long flags, const char *call);
+@@ -1132,13 +1144,6 @@ static inline bool efi_runtime_disabled(void) { return 
true; }
+ extern void efi_call_virt_check_flags(unsigned long flags, const void 
*caller);
  extern unsigned long efi_call_virt_save_flags(void);
  
 -enum efi_secureboot_mode {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch 
new/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch
--- old/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch    
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/add-product-identifying-information-to-vmcoreinfo.patch    
2023-11-02 22:52:53.000000000 +0100
@@ -15,15 +15,15 @@
 
 --- a/kernel/crash_core.c
 +++ b/kernel/crash_core.c
-@@ -10,6 +10,7 @@
- #include <linux/utsname.h>
- #include <linux/vmalloc.h>
- #include <linux/sizes.h>
+@@ -13,6 +13,7 @@
+ #include <linux/kexec.h>
+ #include <linux/memory.h>
+ #include <linux/cpuhotplug.h>
 +#include <linux/suse_version.h>
  
  #include <asm/page.h>
  #include <asm/sections.h>
-@@ -416,6 +417,7 @@ static int __init crash_save_vmcoreinfo_init(void)
+@@ -607,6 +608,7 @@ static int __init crash_save_vmcoreinfo_init(void)
        }
  
        VMCOREINFO_OSRELEASE(init_uts_ns.name.release);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/patches.suse/add-suse-supported-flag.patch 
new/patches.suse/add-suse-supported-flag.patch
--- old/patches.suse/add-suse-supported-flag.patch      2023-10-25 
12:31:37.000000000 +0200
+++ new/patches.suse/add-suse-supported-flag.patch      2023-11-02 
22:52:53.000000000 +0100
@@ -22,7 +22,7 @@
  Makefile                                      |   5 +
  include/linux/module.h                        |   3 +
  include/linux/panic.h                         |  18 ++
- init/Kconfig.suse                             |  18 ++
+ init/Kconfig.suse                             |  19 ++
  kernel/ksysfs.c                               |  27 +++
  kernel/module/main.c                          |  49 ++++++
  kernel/module/sysfs.c                         |  29 +++
@@ -30,11 +30,11 @@
  kernel/sysctl.c                               |   9 +
  scripts/Makefile.modpost                      |   6 +
  scripts/mod/modpost.c                         | 166 +++++++++++++++++-
- 14 files changed, 386 insertions(+), 44 deletions(-)
+ 14 files changed, 387 insertions(+), 44 deletions(-)
 
 --- a/Documentation/admin-guide/kernel-parameters.txt
 +++ b/Documentation/admin-guide/kernel-parameters.txt
-@@ -6605,6 +6605,14 @@
+@@ -6717,6 +6717,14 @@
                        conditions, including corrupt stacks and
                        bad/missing unwinder metadata.
  
@@ -48,10 +48,10 @@
 +
        usbcore.authorized_default=
                        [USB] Default USB device authorization:
-                       (default -1 = authorized except for wireless USB,
+                       (default -1 = authorized (same as 1),
 --- a/Documentation/admin-guide/sysctl/kernel.rst
 +++ b/Documentation/admin-guide/sysctl/kernel.rst
-@@ -1412,26 +1412,27 @@ tainted
+@@ -1431,26 +1431,27 @@ tainted
  Non-zero if the kernel has been tainted. Numeric values, which can be
  ORed together. The letters are seen in "Tainted" line of Oops reports.
  
@@ -242,7 +242,7 @@
 +
 --- a/kernel/ksysfs.c
 +++ b/kernel/ksysfs.c
-@@ -237,6 +237,30 @@ static struct bin_attribute notes_attr __ro_after_init  = 
{
+@@ -249,6 +249,30 @@ static struct bin_attribute notes_attr __ro_after_init  = 
{
  struct kobject *kernel_kobj;
  EXPORT_SYMBOL_GPL(kernel_kobj);
  
@@ -273,7 +273,7 @@
  static struct attribute * kernel_attrs[] = {
        &fscaps_attr.attr,
        &uevent_seqnum_attr.attr,
-@@ -259,6 +283,9 @@ static struct attribute * kernel_attrs[] = {
+@@ -274,6 +298,9 @@ static struct attribute * kernel_attrs[] = {
  #ifndef CONFIG_TINY_RCU
        &rcu_expedited_attr.attr,
        &rcu_normal_attr.attr,
@@ -352,7 +352,7 @@
  #ifdef CONFIG_MODULE_UNLOAD
        &modinfo_refcnt,
  #endif
-@@ -3337,6 +3383,9 @@ void print_modules(void)
+@@ -3352,6 +3398,9 @@ void print_modules(void)
                pr_cont(" [last unloaded: %s%s]", last_unloaded_module.name,
                        last_unloaded_module.taints);
        pr_cont("\n");
@@ -434,7 +434,7 @@
                .data           = &panic_on_oops,
 --- a/scripts/Makefile.modpost
 +++ b/scripts/Makefile.modpost
-@@ -57,6 +57,11 @@ ifneq ($(findstring i,$(filter-out --%,$(MAKEFLAGS))),)
+@@ -58,6 +58,11 @@ ifneq ($(findstring i,$(filter-out --%,$(MAKEFLAGS))),)
  modpost-args += -n
  endif
  
@@ -446,7 +446,7 @@
  # Read out modules.order to pass in modpost.
  # Otherwise, allmodconfig would fail with "Argument list too long".
  ifdef KBUILD_MODULES
-@@ -127,6 +132,7 @@ endif
+@@ -128,6 +133,7 @@ endif
  
  modpost-args += -e $(addprefix -i , $(KBUILD_EXTRA_SYMBOLS))
  
@@ -469,7 +469,7 @@
  #include "../../include/linux/license.h"
  #include "../../include/linux/module_symbol.h"
  
-@@ -1692,6 +1694,133 @@ static void mod_set_crcs(struct module *mod)
+@@ -1684,6 +1686,133 @@ static void mod_set_crcs(struct module *mod)
        free(buf);
  }
  
@@ -603,7 +603,7 @@
  static void read_symbols(const char *modname)
  {
        const char *symname;
-@@ -1978,6 +2107,15 @@ static void add_exported_symbols(struct buffer *buf, 
struct module *mod)
+@@ -1970,6 +2099,15 @@ static void add_exported_symbols(struct buffer *buf, 
struct module *mod)
        }
  }
  
@@ -619,7 +619,7 @@
  /**
   * Record CRCs for unresolved symbols
   **/
-@@ -2132,6 +2270,9 @@ static void write_mod_c_file(struct module *mod)
+@@ -2124,6 +2262,9 @@ static void write_mod_c_file(struct module *mod)
  
        add_header(&buf, mod);
        add_exported_symbols(&buf, mod);
@@ -629,7 +629,7 @@
        add_versions(&buf, mod);
        add_depends(&buf, mod);
        add_moddevtable(&buf, mod);
-@@ -2149,6 +2290,17 @@ static void write_mod_c_file(struct module *mod)
+@@ -2141,6 +2282,17 @@ static void write_mod_c_file(struct module *mod)
        free(buf.p);
  }
  
@@ -647,7 +647,7 @@
  /* parse Module.symvers file. line format:
   * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace
   **/
-@@ -2268,11 +2420,14 @@ int main(int argc, char **argv)
+@@ -2260,11 +2412,14 @@ int main(int argc, char **argv)
        char *missing_namespace_deps = NULL;
        char *unused_exports_white_list = NULL;
        char *dump_write = NULL, *files_source = NULL;
@@ -658,12 +658,12 @@
        LIST_HEAD(dump_lists);
        struct dump_list *dl, *dl2;
  
--      while ((opt = getopt(argc, argv, "ei:mnT:to:au:WwENd:")) != -1) {
-+      while ((opt = getopt(argc, argv, "ei:mnT:to:au:WwENd:S:")) != -1) {
+-      while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:")) != -1) {
++      while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:S:")) != -1) {
                switch (opt) {
                case 'e':
                        external_module = true;
-@@ -2318,11 +2473,20 @@ int main(int argc, char **argv)
+@@ -2313,11 +2468,20 @@ int main(int argc, char **argv)
                case 'd':
                        missing_namespace_deps = optarg;
                        break;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch 
new/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch
--- old/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch    
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/drm-msm-adreno-Add-missing-MODULE_FIRMWARE-macros.patch    
1970-01-01 01:00:00.000000000 +0100
@@ -1,50 +0,0 @@
-From cb0aacde1e2c734119a53ecb313093e30b821f28 Mon Sep 17 00:00:00 2001
-From: Juerg Haefliger <juerg.haefli...@canonical.com>
-Date: Tue, 20 Jun 2023 07:40:31 +0200
-Subject: [PATCH] drm/msm/adreno: Add missing MODULE_FIRMWARE macros
-References: bsc#1213614
-Git-commit: cb0aacde1e2c734119a53ecb313093e30b821f28
-Patch-mainline: v6.6-rc1
-
-The driver references some firmware files that don't have corresponding
-MODULE_FIRMWARE macros and thus won't be listed via modinfo. Fix that.
-
-Signed-off-by: Juerg Haefliger <juerg.haefli...@canonical.com>
-Reviewed-by: Dmitry Baryshkov <dmitry.barysh...@linaro.org>
-Reviewed-by: Joel Fernandes (Google) <j...@joelfernandes.org>
-Patchwork: https://patchwork.freedesktop.org/patch/543290/
-[rob: drop a690_gmu.bin as a690 is using same fw as a660 now]
-Signed-off-by: Rob Clark <robdcl...@chromium.org>
-Acked-by: Chester Lin <c...@suse.com>
----
- drivers/gpu/drm/msm/adreno/adreno_device.c | 10 ++++++++++
- 1 file changed, 10 insertions(+)
-
-diff --git a/drivers/gpu/drm/msm/adreno/adreno_device.c 
b/drivers/gpu/drm/msm/adreno/adreno_device.c
-index 6e3c1368c5e1..8253e3d588d3 100644
---- a/drivers/gpu/drm/msm/adreno/adreno_device.c
-+++ b/drivers/gpu/drm/msm/adreno/adreno_device.c
-@@ -395,10 +395,20 @@ MODULE_FIRMWARE("qcom/a530_zap.mdt");
- MODULE_FIRMWARE("qcom/a530_zap.b00");
- MODULE_FIRMWARE("qcom/a530_zap.b01");
- MODULE_FIRMWARE("qcom/a530_zap.b02");
-+MODULE_FIRMWARE("qcom/a540_gpmu.fw2");
- MODULE_FIRMWARE("qcom/a619_gmu.bin");
- MODULE_FIRMWARE("qcom/a630_sqe.fw");
- MODULE_FIRMWARE("qcom/a630_gmu.bin");
- MODULE_FIRMWARE("qcom/a630_zap.mbn");
-+MODULE_FIRMWARE("qcom/a640_gmu.bin");
-+MODULE_FIRMWARE("qcom/a650_gmu.bin");
-+MODULE_FIRMWARE("qcom/a650_sqe.fw");
-+MODULE_FIRMWARE("qcom/a660_gmu.bin");
-+MODULE_FIRMWARE("qcom/a660_sqe.fw");
-+MODULE_FIRMWARE("qcom/leia_pfp_470.fw");
-+MODULE_FIRMWARE("qcom/leia_pm4_470.fw");
-+MODULE_FIRMWARE("qcom/yamato_pfp.fw");
-+MODULE_FIRMWARE("qcom/yamato_pm4.fw");
- 
- static inline bool _rev_match(uint8_t entry, uint8_t id)
- {
--- 
-2.40.0
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch 
new/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch
--- old/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch 
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/firmware-Add-support-for-Qualcomm-UEFI-Secure-Applic.patch 
2023-11-02 22:52:53.000000000 +0100
@@ -1,9 +1,8 @@
 From: Maximilian Luz <luzmaximil...@gmail.com>
 Date: Sun, 27 Aug 2023 23:14:06 +0200
 Subject: firmware: Add support for Qualcomm UEFI Secure Application
-Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
 Git-commit: 759e7a2b62eb3ef3c93ffeb5cca788a09627d7d9
-Patch-mainline: Queued in linux-next
+Patch-mainline: v6.7-rc1
 References: bsc#1215268
 
 On platforms using the Qualcomm UEFI Secure Application (uefisecapp),
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch 
new/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch
--- old/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch 
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/firmware-qcom_scm-Add-support-for-Qualcomm-Secure-Ex.patch 
2023-11-02 22:52:53.000000000 +0100
@@ -2,9 +2,8 @@
 Date: Sun, 27 Aug 2023 23:14:05 +0200
 Subject: firmware: qcom_scm: Add support for Qualcomm Secure Execution
  Environment SCM interface
-Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
 Git-commit: 00b1248606ba3979ccae30ed11df8cdc1a84245a
-Patch-mainline: Queued in linux-next
+Patch-mainline: v6.7-rc1
 References: bsc#1215268
 
 Add support for SCM calls to Secure OS and the Secure Execution
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch
 
new/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch
--- 
old/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch
   2023-10-25 12:31:37.000000000 +0200
+++ 
new/patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch
   2023-11-02 22:52:53.000000000 +0100
@@ -51,7 +51,7 @@
 
 --- a/Makefile
 +++ b/Makefile
-@@ -1183,6 +1183,15 @@ export extmod_prefix = $(if 
$(KBUILD_EXTMOD),$(KBUILD_EXTMOD)/)
+@@ -1108,6 +1108,15 @@ export extmod_prefix = $(if 
$(KBUILD_EXTMOD),$(KBUILD_EXTMOD)/)
  export MODORDER := $(extmod_prefix)modules.order
  export MODULES_NSDEPS := $(extmod_prefix)modules.nsdeps
  
@@ -67,7 +67,7 @@
  ifeq ($(KBUILD_EXTMOD),)
  
  build-dir     := .
-@@ -1277,7 +1286,8 @@ PHONY += prepare archprepare
+@@ -1202,7 +1211,8 @@ PHONY += prepare archprepare
  
  archprepare: outputmakefile archheaders archscripts scripts 
include/config/kernel.release \
        asm-generic $(version_h) include/generated/utsrelease.h \
@@ -171,7 +171,7 @@
  config SUSE_KERNEL_SUPPORTED
        bool "Enable enterprise support facility"
        depends on SUSE_KERNEL
-@@ -18,3 +103,4 @@ config SUSE_KERNEL_SUPPORTED
+@@ -19,3 +104,4 @@ config SUSE_KERNEL_SUPPORTED
          If you aren't building a kernel for an enterprise distribution,
          say n.
  
@@ -313,9 +313,9 @@
  #include "../../include/linux/module_symbol.h"
 +#include "../../include/generated/uapi/linux/suse_version.h"
  
+ static bool module_enabled;
  /* Are we using CONFIG_MODVERSIONS? */
- static bool modversions;
-@@ -2214,6 +2215,14 @@ static void write_buf(struct buffer *b, const char 
*fname)
+@@ -2206,6 +2207,14 @@ static void write_buf(struct buffer *b, const char 
*fname)
        }
  }
  
@@ -330,7 +330,7 @@
  static void write_if_changed(struct buffer *b, const char *fname)
  {
        char *tmp;
-@@ -2277,6 +2286,7 @@ static void write_mod_c_file(struct module *mod)
+@@ -2269,6 +2278,7 @@ static void write_mod_c_file(struct module *mod)
        add_depends(&buf, mod);
        add_moddevtable(&buf, mod);
        add_srcversion(&buf, mod);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch 
new/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch
--- old/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch   
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/lib-ucs2_string-Add-UCS-2-strscpy-function.patch   
2023-11-02 22:52:53.000000000 +0100
@@ -1,9 +1,8 @@
 From: Maximilian Luz <luzmaximil...@gmail.com>
 Date: Sun, 27 Aug 2023 23:14:04 +0200
 Subject: lib/ucs2_string: Add UCS-2 strscpy function
-Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
 Git-commit: e4c89f9380017b6b2e63836e2de1af8eb4535384
-Patch-mainline: Queued in linux-next
+Patch-mainline: v6.7-rc1
 References: bsc#1215268
 
 Add a ucs2_strscpy() function for UCS-2 strings. The behavior is
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch 
new/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch
--- old/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch 
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/smb3-move-server-check-earlier-when-setting-channel-.patch 
1970-01-01 01:00:00.000000000 +0100
@@ -1,55 +0,0 @@
-From: Steve French <stfre...@microsoft.com>
-Date: Tue, 12 Sep 2023 14:08:36 -0500
-Subject: smb3: move server check earlier when setting channel sequence number
-Git-commit: 05d0f8f55ad60854cb706798da94276a33590445
-Patch-mainline: 6.6-rc2
-References: git-fixes
-
-Smatch warning pointed out by Dan Carpenter:
-
-    fs/smb/client/smb2pdu.c:105 smb2_hdr_assemble()
-    warn: variable dereferenced before check 'server' (see line 95)
-
-Fixes: 09ee7a3bf866 ("[SMB3] send channel sequence number in SMB3 requests 
after reconnects")
-Reported-by: Dan Carpenter <dan.carpen...@linaro.org>
-Signed-off-by: Steve French <stfre...@microsoft.com>
-Signed-off-by: Jiri Slaby <jsl...@suse.cz>
----
- fs/smb/client/smb2pdu.c |   25 +++++++++++++++----------
- 1 file changed, 15 insertions(+), 10 deletions(-)
-
---- a/fs/smb/client/smb2pdu.c
-+++ b/fs/smb/client/smb2pdu.c
-@@ -92,17 +92,22 @@ smb2_hdr_assemble(struct smb2_hdr *shdr,
-       shdr->ProtocolId = SMB2_PROTO_NUMBER;
-       shdr->StructureSize = cpu_to_le16(64);
-       shdr->Command = smb2_cmd;
--      if (server->dialect >= SMB30_PROT_ID) {
--              /* After reconnect SMB3 must set ChannelSequence on subsequent 
reqs */
--              smb3_hdr = (struct smb3_hdr_req *)shdr;
--              /* if primary channel is not set yet, use default channel for 
chan sequence num */
--              if (CIFS_SERVER_IS_CHAN(server))
--                      smb3_hdr->ChannelSequence =
--                              
cpu_to_le16(server->primary_server->channel_sequence_num);
--              else
--                      smb3_hdr->ChannelSequence = 
cpu_to_le16(server->channel_sequence_num);
--      }
-+
-       if (server) {
-+              /* After reconnect SMB3 must set ChannelSequence on subsequent 
reqs */
-+              if (server->dialect >= SMB30_PROT_ID) {
-+                      smb3_hdr = (struct smb3_hdr_req *)shdr;
-+                      /*
-+                       * if primary channel is not set yet, use default
-+                       * channel for chan sequence num
-+                       */
-+                      if (CIFS_SERVER_IS_CHAN(server))
-+                              smb3_hdr->ChannelSequence =
-+                                      
cpu_to_le16(server->primary_server->channel_sequence_num);
-+                      else
-+                              smb3_hdr->ChannelSequence =
-+                                      
cpu_to_le16(server->channel_sequence_num);
-+              }
-               spin_lock(&server->req_lock);
-               /* Request up to 10 credits but don't go over the limit. */
-               if (server->credits >= server->max_credits)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch 
new/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch
--- old/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch 
2023-10-25 12:31:37.000000000 +0200
+++ new/patches.suse/wifi-ath11k-add-support-for-suspend-in-power-down-st.patch 
2023-11-02 22:52:53.000000000 +0100
@@ -30,19 +30,20 @@
 Signed-off-by: Kalle Valo <quic_kv...@quicinc.com>
 Acked-by: Takashi Iwai <ti...@suse.de>
 ---
- drivers/net/wireless/ath/ath11k/ahb.c  |   12 +--
- drivers/net/wireless/ath/ath11k/core.c |   35 +++++-----
- drivers/net/wireless/ath/ath11k/core.h |    2 
- drivers/net/wireless/ath/ath11k/hif.h  |   12 +--
- drivers/net/wireless/ath/ath11k/mhi.c  |   19 +++++
- drivers/net/wireless/ath/ath11k/mhi.h  |    4 -
- drivers/net/wireless/ath/ath11k/pci.c  |  112 
+++++++++++++++++++++++++++++++--
- drivers/net/wireless/ath/ath11k/pci.h  |    2 
- 8 files changed, 159 insertions(+), 39 deletions(-)
+ drivers/net/wireless/ath/ath11k/ahb.c  |   8 +-
+ drivers/net/wireless/ath/ath11k/core.c |  35 ++++----
+ drivers/net/wireless/ath/ath11k/core.h |   2 +
+ drivers/net/wireless/ath/ath11k/hif.h  |  12 +--
+ drivers/net/wireless/ath/ath11k/mhi.c  |  19 ++++-
+ drivers/net/wireless/ath/ath11k/mhi.h  |   4 +-
+ drivers/net/wireless/ath/ath11k/pci.c  | 112 +++++++++++++++++++++++--
+ drivers/net/wireless/ath/ath11k/pci.h  |   2 +
+ drivers/net/wireless/ath/ath11k/qmi.c  |   4 +-
+ 9 files changed, 159 insertions(+), 39 deletions(-)
 
 --- a/drivers/net/wireless/ath/ath11k/ahb.c
 +++ b/drivers/net/wireless/ath/ath11k/ahb.c
-@@ -399,7 +399,7 @@ static void ath11k_ahb_stop(struct ath11
+@@ -400,7 +400,7 @@ static void ath11k_ahb_stop(struct ath11k_base *ab)
        ath11k_ce_cleanup_pipes(ab);
  }
  
@@ -51,7 +52,7 @@
  {
        struct ath11k_ahb *ab_ahb = ath11k_ahb_priv(ab);
        int ret;
-@@ -411,11 +411,11 @@ static int ath11k_ahb_power_up(struct at
+@@ -412,11 +412,11 @@ static int ath11k_ahb_power_up(struct ath11k_base *ab)
        return ret;
  }
  
@@ -64,19 +65,8 @@
 +      return rproc_shutdown(ab_ahb->tgt_rproc);
  }
  
- static int ath11k_ahb_fwreset_from_cold_boot(struct ath11k_base *ab)
-@@ -437,8 +437,8 @@ static int ath11k_ahb_fwreset_from_cold_
-       }
- 
-       /* reset the firmware */
--      ath11k_ahb_power_down(ab);
--      ath11k_ahb_power_up(ab);
-+      ath11k_ahb_power_down(ab, false);
-+      ath11k_ahb_power_up(ab, false);
- 
-       ath11k_dbg(ab, ATH11K_DBG_AHB, "exited from cold boot mode\n");
-       return 0;
-@@ -1287,7 +1287,7 @@ static int ath11k_ahb_remove(struct plat
+ static void ath11k_ahb_init_qmi_ce_config(struct ath11k_base *ab)
+@@ -1262,7 +1262,7 @@ static int ath11k_ahb_remove(struct platform_device 
*pdev)
        struct ath11k_base *ab = platform_get_drvdata(pdev);
  
        if (test_bit(ATH11K_FLAG_QMI_FAIL, &ab->dev_flags)) {
@@ -87,7 +77,7 @@
                goto qmi_fail;
 --- a/drivers/net/wireless/ath/ath11k/core.c
 +++ b/drivers/net/wireless/ath/ath11k/core.c
-@@ -779,12 +779,6 @@ int ath11k_core_suspend(struct ath11k_ba
+@@ -799,12 +799,6 @@ int ath11k_core_suspend(struct ath11k_base *ab)
                return ret;
        }
  
@@ -100,7 +90,7 @@
        ret = ath11k_dp_rx_pktlog_stop(ab, false);
        if (ret) {
                ath11k_warn(ab, "failed to stop dp rx pktlog during suspend: 
%d\n",
-@@ -798,7 +792,7 @@ int ath11k_core_suspend(struct ath11k_ba
+@@ -818,7 +812,7 @@ int ath11k_core_suspend(struct ath11k_base *ab)
        ath11k_hif_irq_disable(ab);
        ath11k_hif_ce_irq_disable(ab);
  
@@ -109,7 +99,7 @@
        if (ret) {
                ath11k_warn(ab, "failed to suspend hif: %d\n", ret);
                return ret;
-@@ -813,6 +807,7 @@ int ath11k_core_resume(struct ath11k_bas
+@@ -833,6 +827,7 @@ int ath11k_core_resume(struct ath11k_base *ab)
        int ret;
        struct ath11k_pdev *pdev;
        struct ath11k *ar;
@@ -117,7 +107,7 @@
  
        if (!ab->hw_params.supports_suspend)
                return -EOPNOTSUPP;
-@@ -825,11 +820,18 @@ int ath11k_core_resume(struct ath11k_bas
+@@ -845,11 +840,18 @@ int ath11k_core_resume(struct ath11k_base *ab)
        if (!ar || ar->state != ATH11K_STATE_OFF)
                return 0;
  
@@ -137,7 +127,7 @@
  
        ath11k_hif_ce_irq_enable(ab);
        ath11k_hif_irq_enable(ab);
-@@ -841,12 +843,6 @@ int ath11k_core_resume(struct ath11k_bas
+@@ -861,12 +863,6 @@ int ath11k_core_resume(struct ath11k_base *ab)
                return ret;
        }
  
@@ -150,7 +140,7 @@
        return 0;
  }
  EXPORT_SYMBOL(ath11k_core_resume);
-@@ -1403,7 +1399,7 @@ static int ath11k_core_soc_create(struct
+@@ -1423,7 +1419,7 @@ static int ath11k_core_soc_create(struct ath11k_base *ab)
                goto err_qmi_deinit;
        }
  
@@ -159,7 +149,7 @@
        if (ret) {
                ath11k_err(ab, "failed to power up :%d\n", ret);
                goto err_debugfs_reg;
-@@ -1879,6 +1875,8 @@ static void ath11k_core_restart(struct w
+@@ -1899,6 +1895,8 @@ static void ath11k_core_restart(struct work_struct *work)
  
        if (!ab->is_reset)
                ath11k_core_post_reconfigure_recovery(ab);
@@ -168,7 +158,7 @@
  }
  
  static void ath11k_core_reset(struct work_struct *work)
-@@ -1945,8 +1943,8 @@ static void ath11k_core_reset(struct wor
+@@ -1965,8 +1963,8 @@ static void ath11k_core_reset(struct work_struct *work)
        time_left = wait_for_completion_timeout(&ab->recovery_start,
                                                
ATH11K_RECOVER_START_TIMEOUT_HZ);
  
@@ -179,7 +169,7 @@
  
        ath11k_dbg(ab, ATH11K_DBG_BOOT, "reset started\n");
  }
-@@ -2012,7 +2010,7 @@ void ath11k_core_deinit(struct ath11k_ba
+@@ -2032,7 +2030,7 @@ void ath11k_core_deinit(struct ath11k_base *ab)
  
        mutex_unlock(&ab->core_lock);
  
@@ -188,7 +178,7 @@
        ath11k_mac_destroy(ab);
        ath11k_core_soc_destroy(ab);
  }
-@@ -2064,6 +2062,7 @@ struct ath11k_base *ath11k_core_alloc(st
+@@ -2084,6 +2082,7 @@ struct ath11k_base *ath11k_core_alloc(struct device 
*dev, size_t priv_size,
        timer_setup(&ab->rx_replenish_retry, ath11k_ce_rx_replenish_retry, 0);
        init_completion(&ab->htc_suspend);
        init_completion(&ab->wow.wakeup_completed);
@@ -220,7 +210,7 @@
        int (*suspend)(struct ath11k_base *ab);
        int (*resume)(struct ath11k_base *ab);
        int (*map_service_to_pipe)(struct ath11k_base *sc, u16 service_id,
-@@ -64,14 +64,14 @@ static inline void ath11k_hif_irq_disabl
+@@ -64,14 +64,14 @@ static inline void ath11k_hif_irq_disable(struct 
ath11k_base *sc)
        sc->hif.ops->irq_disable(sc);
  }
  
@@ -241,7 +231,7 @@
  static inline int ath11k_hif_suspend(struct ath11k_base *ab)
 --- a/drivers/net/wireless/ath/ath11k/mhi.c
 +++ b/drivers/net/wireless/ath/ath11k/mhi.c
-@@ -488,9 +488,14 @@ int ath11k_mhi_start(struct ath11k_pci *
+@@ -488,9 +488,14 @@ int ath11k_mhi_start(struct ath11k_pci *ab_pci)
        return 0;
  }
  
@@ -258,7 +248,7 @@
        mhi_unprepare_after_power_down(ab_pci->mhi_ctrl);
  }
  
-@@ -525,3 +530,13 @@ int ath11k_mhi_resume(struct ath11k_pci
+@@ -525,3 +530,13 @@ int ath11k_mhi_resume(struct ath11k_pci *ab_pci)
  
        return 0;
  }
@@ -283,7 +273,7 @@
  int ath11k_mhi_register(struct ath11k_pci *ar_pci);
  void ath11k_mhi_unregister(struct ath11k_pci *ar_pci);
  void ath11k_mhi_set_mhictrl_reset(struct ath11k_base *ab);
-@@ -26,4 +26,6 @@ void ath11k_mhi_clear_vector(struct ath1
+@@ -26,4 +26,6 @@ void ath11k_mhi_clear_vector(struct ath11k_base *ab);
  int ath11k_mhi_suspend(struct ath11k_pci *ar_pci);
  int ath11k_mhi_resume(struct ath11k_pci *ar_pci);
  
@@ -292,7 +282,7 @@
  #endif
 --- a/drivers/net/wireless/ath/ath11k/pci.c
 +++ b/drivers/net/wireless/ath/ath11k/pci.c
-@@ -622,7 +622,7 @@ static int ath11k_pci_power_up(struct at
+@@ -625,7 +625,7 @@ static int ath11k_pci_power_up(struct ath11k_base *ab)
        return 0;
  }
  
@@ -301,7 +291,7 @@
  {
        struct ath11k_pci *ab_pci = ath11k_pci_priv(ab);
  
-@@ -633,11 +633,111 @@ static void ath11k_pci_power_down(struct
+@@ -636,11 +636,111 @@ static void ath11k_pci_power_down(struct ath11k_base 
*ab)
  
        ath11k_pci_msi_disable(ab_pci);
  
@@ -414,7 +404,7 @@
  static int ath11k_pci_hif_suspend(struct ath11k_base *ab)
  {
        struct ath11k_pci *ar_pci = ath11k_pci_priv(ab);
-@@ -685,8 +785,8 @@ static const struct ath11k_hif_ops ath11
+@@ -688,8 +788,8 @@ static const struct ath11k_hif_ops ath11k_pci_hif_ops = {
        .read32 = ath11k_pcic_read32,
        .write32 = ath11k_pcic_write32,
        .read = ath11k_pcic_read,
@@ -425,7 +415,7 @@
        .suspend = ath11k_pci_hif_suspend,
        .resume = ath11k_pci_hif_resume,
        .irq_enable = ath11k_pcic_ext_irq_enable,
-@@ -934,7 +1034,7 @@ static void ath11k_pci_remove(struct pci
+@@ -938,7 +1038,7 @@ static void ath11k_pci_remove(struct pci_dev *pdev)
        ath11k_pci_set_irq_affinity_hint(ab_pci, NULL);
  
        if (test_bit(ATH11K_FLAG_QMI_FAIL, &ab->dev_flags)) {
@@ -434,7 +424,7 @@
                ath11k_debugfs_soc_destroy(ab);
                ath11k_qmi_deinit_service(ab);
                goto qmi_fail;
-@@ -962,7 +1062,7 @@ static void ath11k_pci_shutdown(struct p
+@@ -966,7 +1066,7 @@ static void ath11k_pci_shutdown(struct pci_dev *pdev)
        struct ath11k_pci *ab_pci = ath11k_pci_priv(ab);
  
        ath11k_pci_set_irq_affinity_hint(ab_pci, NULL);
@@ -454,3 +444,16 @@
  };
  
  static inline struct ath11k_pci *ath11k_pci_priv(struct ath11k_base *ab)
+--- a/drivers/net/wireless/ath/ath11k/qmi.c
++++ b/drivers/net/wireless/ath/ath11k/qmi.c
+@@ -2859,8 +2859,8 @@ int ath11k_qmi_fwreset_from_cold_boot(struct ath11k_base 
*ab)
+       }
+ 
+       /* reset the firmware */
+-      ath11k_hif_power_down(ab);
+-      ath11k_hif_power_up(ab);
++      ath11k_hif_power_down(ab, false);
++      ath11k_hif_power_up(ab, false);
+       ath11k_dbg(ab, ATH11K_DBG_QMI, "exit wait for cold boot done\n");
+       return 0;
+ }

++++++ series.conf ++++++
++++ 2252 lines (skipped)
++++ between /work/SRC/openSUSE:Factory/kernel-source/series.conf
++++ and /work/SRC/openSUSE:Factory/.kernel-source.new.17445/series.conf

++++++ source-timestamp ++++++
--- /var/tmp/diff_new_pack.q7tRpk/_old  2023-11-09 21:34:32.074975583 +0100
+++ /var/tmp/diff_new_pack.q7tRpk/_new  2023-11-09 21:34:32.078975730 +0100
@@ -1,4 +1,4 @@
-2023-10-25 10:31:37 +0000
-GIT Revision: 29edc7cd9a87ec6d4ca952c6a054bd93cbd5cce6
+2023-11-09 05:27:56 +0000
+GIT Revision: 1fcc265d62f50cb2666f9c9b4876e08a6222b8cb
 GIT Branch: stable
 

Reply via email to