commit: 49d4dedd2db5c4f1379f79ae560bfca8c394c577 Author: Mike Pagano <mpagano <AT> gentoo <DOT> org> AuthorDate: Sun Dec 17 14:54:07 2023 +0000 Commit: Mike Pagano <mpagano <AT> gentoo <DOT> org> CommitDate: Sun Dec 17 14:54:07 2023 +0000 URL: https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=49d4dedd
Removed redundant patch Removed 1805_mm-disable-CONFIG-PER-VMA-LOCK-by-def.patch Reported fix is upstream at: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb49c455323ff8319a123dd312be9082c49a23a5 Reported-by: Kerin Millar Signed-off-by: Mike Pagano <mpagano <AT> gentoo.org> 0000_README | 4 --- 1805_mm-disable-CONFIG-PER-VMA-LOCK-by-def.patch | 35 ------------------------ 2 files changed, 39 deletions(-) diff --git a/0000_README b/0000_README index caebb97e..868b82dc 100644 --- a/0000_README +++ b/0000_README @@ -83,10 +83,6 @@ Patch: 1730_parisc-Disable-prctl.patch From: https://git.kernel.org/pub/scm/linux/kernel/git/deller/parisc-linux.git Desc: prctl: Temporarily disable prctl(PR_SET_MDWE) on parisc -Patch: 1805_mm-disable-CONFIG-PER-VMA-LOCK-by-def.patch -From: https://lore.kernel.org/all/20230703182150.2193578-1-sur...@google.com/ -Desc: mm: disable CONFIG_PER_VMA_LOCK by default until its fixed - Patch: 2000_BT-Check-key-sizes-only-if-Secure-Simple-Pairing-enabled.patch From: https://lore.kernel.org/linux-bluetooth/20190522070540.48895-1-mar...@holtmann.org/raw Desc: Bluetooth: Check key sizes only when Secure Simple Pairing is enabled. See bug #686758 diff --git a/1805_mm-disable-CONFIG-PER-VMA-LOCK-by-def.patch b/1805_mm-disable-CONFIG-PER-VMA-LOCK-by-def.patch deleted file mode 100644 index c98255a6..00000000 --- a/1805_mm-disable-CONFIG-PER-VMA-LOCK-by-def.patch +++ /dev/null @@ -1,35 +0,0 @@ -Subject: [PATCH 1/1] mm: disable CONFIG_PER_VMA_LOCK by default until its fixed -Date: Mon, 3 Jul 2023 11:21:50 -0700 [thread overview] -Message-ID: <20230703182150.2193578-1-sur...@google.com> (raw) - -A memory corruption was reported in [1] with bisection pointing to the -patch [2] enabling per-VMA locks for x86. -Disable per-VMA locks config to prevent this issue while the problem is -being investigated. This is expected to be a temporary measure. - -[1] https://bugzilla.kernel.org/show_bug.cgi?id=217624 -[2] https://lore.kernel.org/all/20230227173632.3292573-30-sur...@google.com - -Reported-by: Jiri Slaby <jirisl...@kernel.org> -Reported-by: Jacob Young <jacobly....@gmail.com> -Fixes: 0bff0aaea03e ("x86/mm: try VMA lock-based page fault handling first") -Signed-off-by: Suren Baghdasaryan <sur...@google.com> ---- - mm/Kconfig | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/mm/Kconfig b/mm/Kconfig -index 09130434e30d..de94b2497600 100644 ---- a/mm/Kconfig -+++ b/mm/Kconfig -@@ -1224,7 +1224,7 @@ config ARCH_SUPPORTS_PER_VMA_LOCK - def_bool n - - config PER_VMA_LOCK -- def_bool y -+ bool "Enable per-vma locking during page fault handling." - depends on ARCH_SUPPORTS_PER_VMA_LOCK && MMU && SMP - help - Allow per-vma locking during page fault handling. --- -2.41.0.255.g8b1d071c50-goog