commit kernel-source for openSUSE:Factory
Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2017-12-31 19:29:30 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "kernel-source" Sun Dec 31 19:29:30 2017 rev:397 rq:559853 version:4.14.9 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2017-12-23 12:19:16.652194308 +0100 +++ /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes 2017-12-31 19:29:39.769258654 +0100 @@ -1,0 +2,303 @@ +Mon Dec 25 16:42:48 CET 2017 - jslaby@suse.cz + +- Linux 4.14.9 (bnc#1012628). +- x86/asm: Remove unnecessary \n\t in front of CC_SET() from + asm templates (bnc#1012628). +- ACPI / APEI: adjust a local variable type in + ghes_ioremap_pfn_irq() (bnc#1012628). +- x86/fpu/debug: Remove unused 'x86_fpu_state' and + 'x86_fpu_deactivate_state' tracepoints (bnc#1012628). +- bitops: Add clear/set_bit32() to linux/bitops.h (bnc#1012628). +- x86/cpuid: Add generic table for CPUID dependencies + (bnc#1012628). +- x86/fpu: Parse clearcpuid= as early XSAVE argument + (bnc#1012628). +- x86/fpu: Make XSAVE check the base CPUID features before + enabling (bnc#1012628). +- x86/fpu: Remove the explicit clearing of XSAVE dependent + features (bnc#1012628). +- x86/platform/UV: Convert timers to use timer_setup() + (bnc#1012628). +- x86/cpuid: Prevent out of bound access in do_clear_cpu_cap() + (bnc#1012628). +- mm/sparsemem: Allocate mem_section at runtime for + CONFIG_SPARSEMEM_EXTREME=y (bnc#1012628). +- x86/kasan: Use the same shadow offset for 4- and 5-level paging + (bnc#1012628). +- x86/xen: Provide pre-built page tables only for CONFIG_XEN_PV=y + and CONFIG_XEN_PVH=y (bnc#1012628). +- x86/xen: Drop 5-level paging support code from the XEN_PV code + (bnc#1012628). +- ACPI / APEI: remove the unused dead-code for SEA/NMI + notification type (bnc#1012628). +- x86/asm: Don't use the confusing '.ifeq' directive + (bnc#1012628). +- x86/build: Beautify build log of syscall headers (bnc#1012628). +- x86/mm/64: Rename the register_page_bootmem_memmap() 'size' + parameter to 'nr_pages' (bnc#1012628). +- x86/cpufeatures: Enable new SSE/AVX/AVX512 CPU features + (bnc#1012628). +- x86/mm: Relocate page fault error codes to traps.h + (bnc#1012628). +- x86/boot: Relocate definition of the initial state of CR0 + (bnc#1012628). +- ptrace,x86: Make user_64bit_mode() available to 32-bit builds + (bnc#1012628). +- x86/entry/64: Remove the restore_c_regs_and_iret label + (bnc#1012628). +- x86/entry/64: Split the IRET-to-user and IRET-to-kernel paths + (bnc#1012628). +- x86/entry/64: Move SWAPGS into the common IRET-to-usermode path + (bnc#1012628). +- x86/entry/64: Simplify reg restore code in the standard IRET + paths (bnc#1012628). +- x86/entry/64: Shrink paranoid_exit_restore and make labels local + (bnc#1012628). +- x86/entry/64: Use pop instead of movq in + syscall_return_via_sysret (bnc#1012628). +- x86/entry/64: Merge the fast and slow SYSRET paths + (bnc#1012628). +- x86/entry/64: Use POP instead of MOV to restore regs on NMI + return (bnc#1012628). +- x86/entry/64: Remove the RESTORE_..._REGS infrastructure + (bnc#1012628). +- xen, x86/entry/64: Add xen NMI trap entry (bnc#1012628). +- x86/entry/64: De-Xen-ify our NMI code (bnc#1012628). +- x86/entry/32: Pull the MSR_IA32_SYSENTER_CS update code out + of native_load_sp0() (bnc#1012628). +- x86/entry/64: Pass SP0 directly to load_sp0() (bnc#1012628). +- x86/entry: Add task_top_of_stack() to find the top of a task's + stack (bnc#1012628). +- x86/xen/64, x86/entry/64: Clean up SP code in + cpu_initialize_context() (bnc#1012628). +- x86/entry/64: Stop initializing TSS.sp0 at boot (bnc#1012628). +- x86/entry/64: Remove all remaining direct thread_struct::sp0 + reads (bnc#1012628). +- x86/entry/32: Fix cpu_current_top_of_stack initialization at + boot (bnc#1012628). +- x86/entry/64: Remove thread_struct::sp0 (bnc#1012628). +- x86/traps: Use a new on_thread_stack() helper to clean up an + assertion (bnc#1012628). +- x86/entry/64: Shorten TEST instructions (bnc#1012628). +- x86/cpuid: Replace set/clear_bit32() (bnc#1012628). +- bitops: Revert cbe96375025e ("bitops: Add clear/set_bit32() + to linux/bitops.h") (bnc#1012628). +- x86/mm: Define _PAGE_TABLE using _KERNPG_TABLE (bnc#1012628). +- x86/cpufeatures: Re-tabulate the X86_FEATURE definitions + (bnc#1012628). +- x86/cpufeatures: Fix various details in the feature definitions + (bnc#1012628). +- selftests/x86/ldt_gdt: Add infrastructure to test + set_thread_area() (bnc#1012628). +- selftests/x86/ldt_gdt: Run most existing LDT test cases against + the GDT as well (bnc#1012628). +- ACPI / APEI: Replace ioremap_page_range() with fixmap + (bnc#1012628). +- x86/virt, x86/platform: Merge 'struct x86_hyper' into 'struct + x86_platform' and 'struct x86_init' (bnc#1012628). +- x86/virt: Add enum for hypervisors to replace x86_hyper + (bnc#1012628). +- drivers/misc/intel/pti: Rename the header file to free up the + namespace (bnc#1012628). +- x86/cpufeature: Add User-Mode Instruction Prevention definitions + (bnc#1012628). +- x86: Make X86_BUG_FXSAVE_LEAK detectable in CPUID on AMD + (bnc#1012628). +- perf/x86: Enable free running PEBS for REGS_USER/INTR + (bnc#1012628). +- bpf: fix build issues on um due to mising bpf_perf_event.h + (bnc#1012628). +- locking/barriers: Add implicit smp_read_barrier_depends() + to READ_ONCE() (bnc#1012628). +- locking/barriers: Convert users of lockless_dereference() + to READ_ONCE() (bnc#1012628). +- x86/mm/kasan: Don't use vmemmap_populate() to initialize shadow + (bnc#1012628). +- x86/entry/64/paravirt: Use paravirt-safe macro to access eflags + (bnc#1012628). +- x86/unwinder/orc: Dont bail on stack overflow (bnc#1012628). +- x86/unwinder: Handle stack overflows more gracefully + (bnc#1012628). +- x86/irq: Remove an old outdated comment about context tracking + races (bnc#1012628). +- x86/irq/64: Print the offending IP in the stack overflow warning + (bnc#1012628). +- x86/entry/64: Allocate and enable the SYSENTER stack + (bnc#1012628). +- x86/dumpstack: Add get_stack_info() support for the SYSENTER + stack (bnc#1012628). +- x86/entry/gdt: Put per-CPU GDT remaps in ascending order + (bnc#1012628). +- x86/mm/fixmap: Generalize the GDT fixmap mechanism, introduce + struct cpu_entry_area (bnc#1012628). +- x86/kasan/64: Teach KASAN about the cpu_entry_area + (bnc#1012628). +- x86/entry: Fix assumptions that the HW TSS is at the beginning + of cpu_tss (bnc#1012628). +- x86/dumpstack: Handle stack overflow on all stacks + (bnc#1012628). +- x86/entry: Move SYSENTER_stack to the beginning of struct + tss_struct (bnc#1012628). +- x86/entry: Remap the TSS into the CPU entry area (bnc#1012628). +- x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 + (bnc#1012628). +- x86/espfix/64: Stop assuming that pt_regs is on the entry stack + (bnc#1012628). +- x86/entry/64: Use a per-CPU trampoline stack for IDT entries + (bnc#1012628). +- x86/entry/64: Return to userspace from the trampoline stack + (bnc#1012628). +- x86/entry/64: Create a per-CPU SYSCALL entry trampoline + (bnc#1012628). +- x86/entry/64: Move the IST stacks into struct cpu_entry_area + (bnc#1012628). +- x86/entry/64: Remove the SYSENTER stack canary (bnc#1012628). +- x86/entry: Clean up the SYSENTER_stack code (bnc#1012628). +- x86/entry/64: Make cpu_entry_area.tss read-only (bnc#1012628). +- x86/paravirt: Dont patch flush_tlb_single (bnc#1012628). +- x86/paravirt: Provide a way to check for hypervisors + (bnc#1012628). +- x86/cpufeatures: Make CPU bugs sticky (bnc#1012628). +- optee: fix invalid of_node_put() in optee_driver_init() + (bnc#1012628). +- backlight: pwm_bl: Fix overflow condition (bnc#1012628). +- drm: Add retries for lspcon mode detection (bnc#1012628). +- clk: sunxi-ng: nm: Check if requested rate is supported by + fractional clock (bnc#1012628). +- clk: sunxi-ng: sun5i: Fix bit offset of audio PLL post-divider + (bnc#1012628). +- crypto: crypto4xx - increase context and scatter ring buffer + elements (bnc#1012628). +- crypto: lrw - Fix an error handling path in 'create()' + (bnc#1012628). +- rtc: pl031: make interrupt optional (bnc#1012628). +- kvm, mm: account kvm related kmem slabs to kmemcg (bnc#1012628). +- net: phy: at803x: Change error to EINVAL for invalid MAC + (bnc#1012628). +- PCI: Avoid bus reset if bridge itself is broken (bnc#1012628). +- scsi: cxgb4i: fix Tx skb leak (bnc#1012628). +- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from + RAID1 volume created on two SATA drive (bnc#1012628). +- PCI: Create SR-IOV virtfn/physfn links before attaching driver + (bnc#1012628). +- PM / OPP: Move error message to debug level (bnc#1012628). +- igb: check memory allocation failure (bnc#1012628). +- i40e: use the safe hash table iterator when deleting mac filters + (bnc#1012628). +- iio: st_sensors: add register mask for status register + (bnc#1012628). +- ixgbe: fix use of uninitialized padding (bnc#1012628). +- IB/rxe: check for allocation failure on elem (bnc#1012628). +- block,bfq: Disable writeback throttling (bnc#1012628). +- md: always set THREAD_WAKEUP and wake up wqueue if thread + existed (bnc#1012628). +- ip_gre: check packet length and mtu correctly in erspan tx + (bnc#1012628). +- ipv6: grab rt->rt6i_ref before allocating pcpu rt (bnc#1012628). +- leds: pca955x: Don't invert requested value in ++++ 106 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes dtb-armv6l.changes: same change dtb-armv7l.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-syzkaller.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.091813187 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.095811854 +0100 @@ -17,7 +17,7 @@ %define srcversion 4.14 -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb}) Name: dtb-aarch64 -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.171786508 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.171786508 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.14 -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0 Group: System/Kernel -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif kernel-debug.spec: same change kernel-default.spec: same change ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.243762495 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.243762495 +0100 @@ -17,7 +17,7 @@ %define srcversion 4.14 -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -31,9 +31,9 @@ Summary: Kernel Documentation License: GPL-2.0 Group: Documentation/Man -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif ++++++ kernel-lpae.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.263755825 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.267754491 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.14 -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel for LPAE enabled systems License: GPL-2.0 Group: System/Kernel -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.291746486 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.291746486 +0100 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %define vanilla_only 0 @@ -57,9 +57,9 @@ Summary: package kernel and initrd for OBS VM builds License: GPL-2.0 Group: SLES -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.315738483 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.315738483 +0100 @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -36,9 +36,9 @@ Summary: Basic QA tests for the kernel License: GPL-2.0 Group: SLES -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.339730479 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.343729144 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.14 -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel with PAE Support License: GPL-2.0 Group: System/Kernel -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.363722475 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.367721140 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.14 -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %define vanilla_only 0 @@ -30,9 +30,9 @@ Summary: The Linux Kernel Sources License: GPL-2.0 Group: Development/Sources -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.387714471 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.391713136 +0100 @@ -24,10 +24,10 @@ Summary: Kernel Symbol Versions (modversions) License: GPL-2.0 Group: Development/Sources -Version: 4.14.8 +Version: 4.14.9 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif ++++++ kernel-syzkaller.spec ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:56.411706466 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:56.411706466 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.14 -%define patchversion 4.14.8 +%define patchversion 4.14.9 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel used for fuzzing by syzkaller License: GPL-2.0 Group: System/Kernel -Version: 4.14.8 +Version: 4.14.9 %if 0%{?is_kotd} -Release: <RELEASE>.g674981b +Release: <RELEASE>.g9423ca2 %else Release: 0 %endif kernel-vanilla.spec: same change kernel-zfcpdump.spec: same change ++++++ config.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/i386/default new/config/i386/default --- old/config/i386/default 2017-12-11 09:31:51.000000000 +0100 +++ new/config/i386/default 2017-12-21 11:54:37.000000000 +0100 @@ -323,6 +323,7 @@ CONFIG_SPEAKUP_SYNTH_DTLK=m CONFIG_SPEAKUP_SYNTH_KEYPC=m # CONFIG_SPI_FSL_SPI is not set +# CONFIG_SPI_INTEL_SPI_PLATFORM is not set # CONFIG_STAGING_BOARD is not set # CONFIG_STX104 is not set # CONFIG_SYSTEMPORT is not set diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/i386/pae new/config/i386/pae --- old/config/i386/pae 2017-12-11 09:31:51.000000000 +0100 +++ new/config/i386/pae 2017-12-21 11:54:37.000000000 +0100 @@ -2038,9 +2038,8 @@ CONFIG_MTD_SPI_NOR=m CONFIG_MTD_MT81xx_NOR=m CONFIG_MTD_SPI_NOR_USE_4K_SECTORS=y -CONFIG_SPI_INTEL_SPI=m -CONFIG_SPI_INTEL_SPI_PCI=m -CONFIG_SPI_INTEL_SPI_PLATFORM=m +# CONFIG_SPI_INTEL_SPI_PCI is not set +# CONFIG_SPI_INTEL_SPI_PLATFORM is not set CONFIG_MTD_UBI=m CONFIG_MTD_UBI_WL_THRESHOLD=4096 CONFIG_MTD_UBI_BEB_LIMIT=20 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/x86_64/default new/config/x86_64/default --- old/config/x86_64/default 2017-12-11 09:31:51.000000000 +0100 +++ new/config/x86_64/default 2017-12-21 11:54:37.000000000 +0100 @@ -2039,9 +2039,8 @@ CONFIG_MTD_SPI_NOR=m CONFIG_MTD_MT81xx_NOR=m CONFIG_MTD_SPI_NOR_USE_4K_SECTORS=y -CONFIG_SPI_INTEL_SPI=m -CONFIG_SPI_INTEL_SPI_PCI=m -CONFIG_SPI_INTEL_SPI_PLATFORM=m +# CONFIG_SPI_INTEL_SPI_PCI is not set +# CONFIG_SPI_INTEL_SPI_PLATFORM is not set CONFIG_MTD_UBI=m CONFIG_MTD_UBI_WL_THRESHOLD=4096 CONFIG_MTD_UBI_BEB_LIMIT=20 ++++++ patches.kernel.org.tar.bz2 ++++++ ++++ 20454 lines of diff (skipped) ++++++ patches.suse.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0001-objtool-Don-t-report-end-of-section-error-after-an-e.patch new/patches.suse/0001-objtool-Don-t-report-end-of-section-error-after-an-e.patch --- old/patches.suse/0001-objtool-Don-t-report-end-of-section-error-after-an-e.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0001-objtool-Don-t-report-end-of-section-error-after-an-e.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,45 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:30 -0500 -Subject: objtool: Don't report end of section error after an empty unwind hint -Git-commit: 00d96180dc38ef872ac471c2d3e14b067cbd895d -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -If asm code specifies an UNWIND_HINT_EMPTY hint, don't warn if the -section ends unexpectedly. This can happen with the xen-head.S code -because the hypercall_page is "text" but it's all zeros. - -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Jiri Slaby <jslaby@suse.cz> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/ddafe199dd8797e40e3c2777373347eba1d65572.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - tools/objtool/check.c | 7 +++++-- - 1 file changed, 5 insertions(+), 2 deletions(-) - ---- a/tools/objtool/check.c -+++ b/tools/objtool/check.c -@@ -1752,11 +1752,14 @@ static int validate_branch(struct objtoo - if (insn->dead_end) - return 0; - -- insn = next_insn; -- if (!insn) { -+ if (!next_insn) { -+ if (state.cfa.base == CFI_UNDEFINED) -+ return 0; - WARN("%s: unexpected end of section", sec->name); - return 1; - } -+ -+ insn = next_insn; - } - - return 0; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0002-x86-head-Remove-confusing-comment.patch new/patches.suse/0002-x86-head-Remove-confusing-comment.patch --- old/patches.suse/0002-x86-head-Remove-confusing-comment.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0002-x86-head-Remove-confusing-comment.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,42 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:31 -0500 -Subject: x86/head: Remove confusing comment -Git-commit: 17270717e80de33a884ad328fea5f407d87f6d6a -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -This comment is actively wrong and confusing. It refers to the -registers' stack offsets after the pt_regs has been constructed on the -stack, but this code is *before* that. - -At this point the stack just has the standard iret frame, for which no -comment should be needed. - -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Jiri Slaby <jslaby@suse.cz> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/a3c267b770fc56c9b86df9c11c552848248aace2.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/kernel/head_64.S | 4 ---- - 1 file changed, 4 deletions(-) - ---- a/arch/x86/kernel/head_64.S -+++ b/arch/x86/kernel/head_64.S -@@ -270,10 +270,6 @@ bad_address: - - __INIT - ENTRY(early_idt_handler_array) -- # 104(%rsp) %rflags -- # 96(%rsp) %cs -- # 88(%rsp) %rip -- # 80(%rsp) error code - i = 0 - .rept NUM_EXCEPTION_VECTORS - .ifeq (EXCEPTION_ERRCODE_MASK >> i) & 1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0003-x86-head-Remove-unused-bad_address-code.patch new/patches.suse/0003-x86-head-Remove-unused-bad_address-code.patch --- old/patches.suse/0003-x86-head-Remove-unused-bad_address-code.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0003-x86-head-Remove-unused-bad_address-code.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,36 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:32 -0500 -Subject: x86/head: Remove unused 'bad_address' code -Git-commit: a8b88e84d124bc92c4808e72b8b8c0e0bb538630 -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -It's no longer possible for this code to be executed, so remove it. - -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Jiri Slaby <jslaby@suse.cz> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/32a46fe92d2083700599b36872b26e7dfd7b7965.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/kernel/head_64.S | 3 --- - 1 file changed, 3 deletions(-) - ---- a/arch/x86/kernel/head_64.S -+++ b/arch/x86/kernel/head_64.S -@@ -265,9 +265,6 @@ ENDPROC(start_cpu0) - .quad init_thread_union + THREAD_SIZE - SIZEOF_PTREGS - __FINITDATA - --bad_address: -- jmp bad_address -- - __INIT - ENTRY(early_idt_handler_array) - i = 0 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0004-x86-head-Fix-head-ELF-function-annotations.patch new/patches.suse/0004-x86-head-Fix-head-ELF-function-annotations.patch --- old/patches.suse/0004-x86-head-Fix-head-ELF-function-annotations.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0004-x86-head-Fix-head-ELF-function-annotations.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,54 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:33 -0500 -Subject: x86/head: Fix head ELF function annotations -Git-commit: 015a2ea5478680fc5216d56b7ff306f2a74efaf9 -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -These functions aren't callable C-type functions, so don't annotate them -as such. - -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Jiri Slaby <jslaby@suse.cz> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/36eb182738c28514f8bf95e403d89b6413a88883.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/kernel/head_64.S | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - ---- a/arch/x86/kernel/head_64.S -+++ b/arch/x86/kernel/head_64.S -@@ -234,7 +234,7 @@ ENTRY(secondary_startup_64) - pushq %rax # target address in negative space - lretq - .Lafter_lret: --ENDPROC(secondary_startup_64) -+END(secondary_startup_64) - - #include "verify_cpu.S" - -@@ -277,7 +277,7 @@ ENTRY(early_idt_handler_array) - i = i + 1 - .fill early_idt_handler_array + i*EARLY_IDT_HANDLER_SIZE - ., 1, 0xcc - .endr --ENDPROC(early_idt_handler_array) -+END(early_idt_handler_array) - - early_idt_handler_common: - /* -@@ -320,7 +320,7 @@ early_idt_handler_common: - 20: - decl early_recursion_flag(%rip) - jmp restore_regs_and_iret --ENDPROC(early_idt_handler_common) -+END(early_idt_handler_common) - - __INITDATA - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0005-x86-boot-Annotate-verify_cpu-as-a-callable-function.patch new/patches.suse/0005-x86-boot-Annotate-verify_cpu-as-a-callable-function.patch --- old/patches.suse/0005-x86-boot-Annotate-verify_cpu-as-a-callable-function.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0005-x86-boot-Annotate-verify_cpu-as-a-callable-function.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,40 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:34 -0500 -Subject: x86/boot: Annotate verify_cpu() as a callable function -Git-commit: e93db75a0054b23a874a12c63376753544f3fe9e -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -verify_cpu() is a callable function. Annotate it as such. - -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Jiri Slaby <jslaby@suse.cz> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/293024b8a080832075312f38c07ccc970fc70292.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/kernel/verify_cpu.S | 3 ++- - 1 file changed, 2 insertions(+), 1 deletion(-) - ---- a/arch/x86/kernel/verify_cpu.S -+++ b/arch/x86/kernel/verify_cpu.S -@@ -33,7 +33,7 @@ - #include <asm/cpufeatures.h> - #include <asm/msr-index.h> - --verify_cpu: -+ENTRY(verify_cpu) - pushf # Save caller passed flags - push $0 # Kill any dangerous flags - popf -@@ -139,3 +139,4 @@ verify_cpu: - popf # Restore caller passed flags - xorl %eax, %eax - ret -+ENDPROC(verify_cpu) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0006-x86-xen-Fix-xen-head-ELF-annotations.patch new/patches.suse/0006-x86-xen-Fix-xen-head-ELF-annotations.patch --- old/patches.suse/0006-x86-xen-Fix-xen-head-ELF-annotations.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0006-x86-xen-Fix-xen-head-ELF-annotations.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,44 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:35 -0500 -Subject: x86/xen: Fix xen head ELF annotations -Git-commit: 2582d3df95c76d3b686453baf90b64d57e87d1e8 -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -Mark the ends of the startup_xen and hypercall_page code sections. - -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Jiri Slaby <jslaby@suse.cz> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/3a80a394d30af43d9cefa1a29628c45ed8420c97.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/xen/xen-head.S | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - ---- a/arch/x86/xen/xen-head.S -+++ b/arch/x86/xen/xen-head.S -@@ -33,7 +33,7 @@ ENTRY(startup_xen) - mov $init_thread_union+THREAD_SIZE, %_ASM_SP - - jmp xen_start_kernel -- -+END(startup_xen) - __FINIT - #endif - -@@ -47,7 +47,7 @@ ENTRY(hypercall_page) - .type xen_hypercall_##n, @function; .size xen_hypercall_##n, 32 - #include <asm/xen-hypercalls.h> - #undef HYPERCALL -- -+END(hypercall_page) - .popsection - - ELFNOTE(Xen, XEN_ELFNOTE_GUEST_OS, .asciz "linux") diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0007-x86-xen-Add-unwind-hint-annotations.patch new/patches.suse/0007-x86-xen-Add-unwind-hint-annotations.patch --- old/patches.suse/0007-x86-xen-Add-unwind-hint-annotations.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0007-x86-xen-Add-unwind-hint-annotations.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,58 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:36 -0500 -Subject: x86/xen: Add unwind hint annotations -Git-commit: abbe1cac6214d81d2f4e149aba64a8760703144e -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -Add unwind hint annotations to the xen head code so the ORC unwinder can -read head_64.o. - -hypercall_page needs empty annotations at 32-byte intervals to match the -'xen_hypercall_*' ELF functions at those locations. - -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Jiri Slaby <jslaby@suse.cz> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/70ed2eb516fe9266be766d953f93c2571bca88cc.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/xen/xen-head.S | 7 ++++++- - 1 file changed, 6 insertions(+), 1 deletion(-) - ---- a/arch/x86/xen/xen-head.S -+++ b/arch/x86/xen/xen-head.S -@@ -9,6 +9,7 @@ - #include <asm/boot.h> - #include <asm/asm.h> - #include <asm/page_types.h> -+#include <asm/unwind_hints.h> - - #include <xen/interface/elfnote.h> - #include <xen/interface/features.h> -@@ -19,6 +20,7 @@ - #ifdef CONFIG_XEN_PV - __INIT - ENTRY(startup_xen) -+ UNWIND_HINT_EMPTY - cld - - /* Clear .bss */ -@@ -40,7 +42,10 @@ END(startup_xen) - .pushsection .text - .balign PAGE_SIZE - ENTRY(hypercall_page) -- .skip PAGE_SIZE -+ .rept (PAGE_SIZE / 32) -+ UNWIND_HINT_EMPTY -+ .skip 32 -+ .endr - - #define HYPERCALL(n) \ - .equ xen_hypercall_##n, hypercall_page + __HYPERVISOR_##n * 32; \ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/0008-x86-head-Add-unwind-hint-annotations.patch new/patches.suse/0008-x86-head-Add-unwind-hint-annotations.patch --- old/patches.suse/0008-x86-head-Add-unwind-hint-annotations.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/0008-x86-head-Add-unwind-hint-annotations.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,120 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Mon, 18 Sep 2017 21:43:37 -0500 -Subject: x86/head: Add unwind hint annotations -Git-commit: 2704fbb672d0d9a19414907fda7949283dcef6a1 -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -Jiri Slaby reported an ORC issue when unwinding from an idle task. The -stack was: - - ffffffff811083c2 do_idle+0x142/0x1e0 - ffffffff8110861d cpu_startup_entry+0x5d/0x60 - ffffffff82715f58 start_kernel+0x3ff/0x407 - ffffffff827153e8 x86_64_start_kernel+0x14e/0x15d - ffffffff810001bf secondary_startup_64+0x9f/0xa0 - -The ORC unwinder errored out at secondary_startup_64 because the head -code isn't annotated yet so there wasn't a corresponding ORC entry. - -Fix that and any other head-related unwinding issues by adding unwind -hints to the head code. - -Reported-by: Jiri Slaby <jslaby@suse.cz> -Tested-by: Jiri Slaby <jslaby@suse.cz> -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com> -Cc: Juergen Gross <jgross@suse.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/78ef000a2f68f545d6eef44ee912edceaad82ccf.1505764066... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/kernel/Makefile | 1 - - arch/x86/kernel/head_64.S | 14 ++++++++++++-- - 2 files changed, 12 insertions(+), 3 deletions(-) - ---- a/arch/x86/kernel/Makefile -+++ b/arch/x86/kernel/Makefile -@@ -26,7 +26,6 @@ KASAN_SANITIZE_dumpstack.o := n - KASAN_SANITIZE_dumpstack_$(BITS).o := n - KASAN_SANITIZE_stacktrace.o := n - --OBJECT_FILES_NON_STANDARD_head_$(BITS).o := y - OBJECT_FILES_NON_STANDARD_relocate_kernel_$(BITS).o := y - OBJECT_FILES_NON_STANDARD_ftrace_$(BITS).o := y - OBJECT_FILES_NON_STANDARD_test_nx.o := y ---- a/arch/x86/kernel/head_64.S -+++ b/arch/x86/kernel/head_64.S -@@ -49,6 +49,7 @@ L3_START_KERNEL = pud_index(__START_KERN - .code64 - .globl startup_64 - startup_64: -+ UNWIND_HINT_EMPTY - /* - * At this point the CPU runs in 64bit mode CS.L = 1 CS.D = 0, - * and someone has loaded an identity mapped page table -@@ -88,6 +89,7 @@ startup_64: - addq $(early_top_pgt - __START_KERNEL_map), %rax - jmp 1f - ENTRY(secondary_startup_64) -+ UNWIND_HINT_EMPTY - /* - * At this point the CPU runs in 64bit mode CS.L = 1 CS.D = 0, - * and someone has loaded a mapped page table. -@@ -132,6 +134,7 @@ ENTRY(secondary_startup_64) - movq $1f, %rax - jmp *%rax - 1: -+ UNWIND_HINT_EMPTY - - /* Check if nx is implemented */ - movl $0x80000001, %eax -@@ -246,6 +249,7 @@ END(secondary_startup_64) - */ - ENTRY(start_cpu0) - movq initial_stack(%rip), %rsp -+ UNWIND_HINT_EMPTY - jmp .Ljump_to_C_code - ENDPROC(start_cpu0) - #endif -@@ -270,13 +274,18 @@ ENTRY(early_idt_handler_array) - i = 0 - .rept NUM_EXCEPTION_VECTORS - .ifeq (EXCEPTION_ERRCODE_MASK >> i) & 1 -- pushq $0 # Dummy error code, to make stack frame uniform -+ UNWIND_HINT_IRET_REGS -+ pushq $0 # Dummy error code, to make stack frame uniform -+ .else -+ UNWIND_HINT_IRET_REGS offset=8 - .endif - pushq $i # 72(%rsp) Vector number - jmp early_idt_handler_common -+ UNWIND_HINT_IRET_REGS - i = i + 1 - .fill early_idt_handler_array + i*EARLY_IDT_HANDLER_SIZE - ., 1, 0xcc - .endr -+ UNWIND_HINT_IRET_REGS offset=16 - END(early_idt_handler_array) - - early_idt_handler_common: -@@ -305,6 +314,7 @@ early_idt_handler_common: - pushq %r13 /* pt_regs->r13 */ - pushq %r14 /* pt_regs->r14 */ - pushq %r15 /* pt_regs->r15 */ -+ UNWIND_HINT_REGS - - cmpq $14,%rsi /* Page fault? */ - jnz 10f -@@ -427,7 +437,7 @@ ENTRY(phys_base) - EXPORT_SYMBOL(phys_base) - - #include "../../x86/xen/xen-head.S" -- -+ - __PAGE_ALIGNED_BSS - NEXT_PAGE(empty_zero_page) - .skip PAGE_SIZE diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/dm-mpath-accept-failed-paths new/patches.suse/dm-mpath-accept-failed-paths --- old/patches.suse/dm-mpath-accept-failed-paths 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/dm-mpath-accept-failed-paths 2017-12-25 16:42:48.000000000 +0100 @@ -37,7 +37,7 @@ + if (!pgpath->path.dev) + return ERR_PTR(-ENODEV); + - if (unlikely(lockless_dereference(m->current_pg) != pg)) { + if (unlikely(READ_ONCE(m->current_pg) != pg)) { /* Only update current_pgpath if pg changed */ spin_lock_irqsave(&m->lock, flags); @@ -469,7 +473,7 @@ static int multipath_clone_and_map(struc diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/objtool-Print-top-level-commands-on-incorrect-usage.patch new/patches.suse/objtool-Print-top-level-commands-on-incorrect-usage.patch --- old/patches.suse/objtool-Print-top-level-commands-on-incorrect-usage.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/objtool-Print-top-level-commands-on-incorrect-usage.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,61 +0,0 @@ -From: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com> -Date: Sat, 14 Oct 2017 20:17:54 +0530 -Subject: objtool: Print top level commands on incorrect usage -Git-commit: 6a93bb7e4a7d6670677d5b0eb980936eb9cc5d2e -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -Print top-level objtool commands, along with the error on incorrect -command line usage. Objtool command line parser exit's with code 129, -for incorrect usage. Convert the cmd_usage() exit code also, to maintain -consistency across objtool. - -After the patch: - - $ ./objtool -j - - Unknown option: -j - - usage: objtool COMMAND [ARGS] - - Commands: - check Perform stack metadata validation on an object file - orc Generate in-place ORC unwind tables for an object file - - $ echo $? - 129 - -Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com> -Acked-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/1507992474-16142-1-git-send-email-kamalesh@linux.vn... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - tools/objtool/objtool.c | 6 ++---- - 1 file changed, 2 insertions(+), 4 deletions(-) - ---- a/tools/objtool/objtool.c -+++ b/tools/objtool/objtool.c -@@ -70,7 +70,7 @@ static void cmd_usage(void) - - printf("\n"); - -- exit(1); -+ exit(129); - } - - static void handle_options(int *argc, const char ***argv) -@@ -86,9 +86,7 @@ static void handle_options(int *argc, co - break; - } else { - fprintf(stderr, "Unknown option: %s\n", cmd); -- fprintf(stderr, "\n Usage: %s\n", -- objtool_usage_string); -- exit(1); -+ cmd_usage(); - } - - (*argv)++; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/suse-hv-guest-os-id.patch new/patches.suse/suse-hv-guest-os-id.patch --- old/patches.suse/suse-hv-guest-os-id.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/suse-hv-guest-os-id.patch 2017-12-25 16:42:48.000000000 +0100 @@ -15,16 +15,16 @@ --- a/arch/x86/hyperv/hv_init.c +++ b/arch/x86/hyperv/hv_init.c -@@ -113,6 +113,8 @@ void hyperv_init(void) +@@ -112,6 +112,8 @@ void hyperv_init(void) { u64 guest_id; union hv_x64_msr_hypercall_contents hypercall_msr; + __u8 d1 = 0x10; /* SuSE */ + __u16 d2 = 0x0; /* -d of a.b.c-d */ - if (x86_hyper != &x86_hyper_ms_hyperv) + if (x86_hyper_type != X86_HYPER_MS_HYPERV) return; -@@ -122,7 +124,7 @@ void hyperv_init(void) +@@ -131,7 +133,7 @@ void hyperv_init(void) * 1. Register the guest ID * 2. Enable the hypercall and register the hypercall page */ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/x86-unwind-Make-CONFIG_UNWINDER_ORC-y-the-default-in.patch new/patches.suse/x86-unwind-Make-CONFIG_UNWINDER_ORC-y-the-default-in.patch --- old/patches.suse/x86-unwind-Make-CONFIG_UNWINDER_ORC-y-the-default-in.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/x86-unwind-Make-CONFIG_UNWINDER_ORC-y-the-default-in.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,78 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Fri, 13 Oct 2017 15:02:01 -0500 -Subject: x86/unwind: Make CONFIG_UNWINDER_ORC=y the default in kconfig for - 64-bit -Git-commit: fc72ae40e30327aa24eb88a24b9c7058f938bd36 -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -The ORC unwinder has been stable in testing so far. Give it much wider -testing by making it the default in kconfig for x86_64. It's not yet -supported for 32-bit, so leave frame pointers as the default there. - -Suggested-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/9b1237bbe7244ed9cdf8db2dcb1253e37e1c341e.1507924831... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/Kconfig.debug | 33 +++++++++++++++++---------------- - 1 file changed, 17 insertions(+), 16 deletions(-) - ---- a/arch/x86/Kconfig.debug -+++ b/arch/x86/Kconfig.debug -@@ -359,27 +359,13 @@ config PUNIT_ATOM_DEBUG - - choice - prompt "Choose kernel unwinder" -- default UNWINDER_FRAME_POINTER -+ default UNWINDER_ORC if X86_64 -+ default UNWINDER_FRAME_POINTER if X86_32 - ---help--- - This determines which method will be used for unwinding kernel stack - traces for panics, oopses, bugs, warnings, perf, /proc/<pid>/stack, - livepatch, lockdep, and more. - --config UNWINDER_FRAME_POINTER -- bool "Frame pointer unwinder" -- select FRAME_POINTER -- ---help--- -- This option enables the frame pointer unwinder for unwinding kernel -- stack traces. -- -- The unwinder itself is fast and it uses less RAM than the ORC -- unwinder, but the kernel text size will grow by ~3% and the kernel's -- overall performance will degrade by roughly 5-10%. -- -- This option is recommended if you want to use the livepatch -- consistency model, as this is currently the only way to get a -- reliable stack trace (CONFIG_HAVE_RELIABLE_STACKTRACE). -- - config UNWINDER_ORC - bool "ORC unwinder" - depends on X86_64 -@@ -396,6 +382,21 @@ config UNWINDER_ORC - Enabling this option will increase the kernel's runtime memory usage - by roughly 2-4MB, depending on your kernel config. - -+config UNWINDER_FRAME_POINTER -+ bool "Frame pointer unwinder" -+ select FRAME_POINTER -+ ---help--- -+ This option enables the frame pointer unwinder for unwinding kernel -+ stack traces. -+ -+ The unwinder itself is fast and it uses less RAM than the ORC -+ unwinder, but the kernel text size will grow by ~3% and the kernel's -+ overall performance will degrade by roughly 5-10%. -+ -+ This option is recommended if you want to use the livepatch -+ consistency model, as this is currently the only way to get a -+ reliable stack trace (CONFIG_HAVE_RELIABLE_STACKTRACE). -+ - config UNWINDER_GUESS - bool "Guess unwinder" - depends on EXPERT diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/x86-unwind-Rename-unwinder-config-options-to-CONFIG_.patch new/patches.suse/x86-unwind-Rename-unwinder-config-options-to-CONFIG_.patch --- old/patches.suse/x86-unwind-Rename-unwinder-config-options-to-CONFIG_.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/x86-unwind-Rename-unwinder-config-options-to-CONFIG_.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,238 +0,0 @@ -From: Josh Poimboeuf <jpoimboe@redhat.com> -Date: Fri, 13 Oct 2017 15:02:00 -0500 -Subject: x86/unwind: Rename unwinder config options to 'CONFIG_UNWINDER_*' -Git-commit: 11af847446ed0d131cf24d16a7ef3d5ea7a49554 -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -Rename the unwinder config options from: - - CONFIG_ORC_UNWINDER - CONFIG_FRAME_POINTER_UNWINDER - CONFIG_GUESS_UNWINDER - -to: - - CONFIG_UNWINDER_ORC - CONFIG_UNWINDER_FRAME_POINTER - CONFIG_UNWINDER_GUESS - -... in order to give them a more logical config namespace. - -Suggested-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Link: http://lkml.kernel.org/r/73972fc7e2762e91912c6b9584582703d6f1b8cc.1507924831... -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - Documentation/x86/orc-unwinder.txt | 2 +- - Makefile | 4 ++-- - arch/x86/Kconfig | 2 +- - arch/x86/Kconfig.debug | 10 +++++----- - arch/x86/configs/tiny.config | 4 ++-- - arch/x86/configs/x86_64_defconfig | 2 +- - arch/x86/include/asm/module.h | 2 +- - arch/x86/include/asm/unwind.h | 8 ++++---- - arch/x86/kernel/Makefile | 6 +++--- - include/asm-generic/vmlinux.lds.h | 2 +- - lib/Kconfig.debug | 2 +- - scripts/Makefile.build | 2 +- - 12 files changed, 23 insertions(+), 23 deletions(-) - ---- a/Documentation/x86/orc-unwinder.txt -+++ b/Documentation/x86/orc-unwinder.txt -@@ -4,7 +4,7 @@ ORC unwinder - Overview - -------- - --The kernel CONFIG_ORC_UNWINDER option enables the ORC unwinder, which is -+The kernel CONFIG_UNWINDER_ORC option enables the ORC unwinder, which is - similar in concept to a DWARF unwinder. The difference is that the - format of the ORC data is much simpler than DWARF, which in turn allows - the ORC unwinder to be much simpler and faster. ---- a/Makefile -+++ b/Makefile -@@ -939,8 +939,8 @@ ifdef CONFIG_STACK_VALIDATION - ifeq ($(has_libelf),1) - objtool_target := tools/objtool FORCE - else -- ifdef CONFIG_ORC_UNWINDER -- $(error "Cannot generate ORC metadata for CONFIG_ORC_UNWINDER=y, please install libelf-dev, libelf-devel or elfutils-libelf-devel") -+ ifdef CONFIG_UNWINDER_ORC -+ $(error "Cannot generate ORC metadata for CONFIG_UNWINDER_ORC=y, please install libelf-dev, libelf-devel or elfutils-libelf-devel") - else - $(warning "Cannot use CONFIG_STACK_VALIDATION=y, please install libelf-dev, libelf-devel or elfutils-libelf-devel") - endif ---- a/arch/x86/Kconfig -+++ b/arch/x86/Kconfig -@@ -171,7 +171,7 @@ config X86 - select HAVE_PERF_USER_STACK_DUMP - select HAVE_RCU_TABLE_FREE - select HAVE_REGS_AND_STACK_ACCESS_API -- select HAVE_RELIABLE_STACKTRACE if X86_64 && FRAME_POINTER_UNWINDER && STACK_VALIDATION -+ select HAVE_RELIABLE_STACKTRACE if X86_64 && UNWINDER_FRAME_POINTER && STACK_VALIDATION - select HAVE_STACK_VALIDATION if X86_64 - select HAVE_SYSCALL_TRACEPOINTS - select HAVE_UNSTABLE_SCHED_CLOCK ---- a/arch/x86/Kconfig.debug -+++ b/arch/x86/Kconfig.debug -@@ -359,13 +359,13 @@ config PUNIT_ATOM_DEBUG - - choice - prompt "Choose kernel unwinder" -- default FRAME_POINTER_UNWINDER -+ default UNWINDER_FRAME_POINTER - ---help--- - This determines which method will be used for unwinding kernel stack - traces for panics, oopses, bugs, warnings, perf, /proc/<pid>/stack, - livepatch, lockdep, and more. - --config FRAME_POINTER_UNWINDER -+config UNWINDER_FRAME_POINTER - bool "Frame pointer unwinder" - select FRAME_POINTER - ---help--- -@@ -380,7 +380,7 @@ config FRAME_POINTER_UNWINDER - consistency model, as this is currently the only way to get a - reliable stack trace (CONFIG_HAVE_RELIABLE_STACKTRACE). - --config ORC_UNWINDER -+config UNWINDER_ORC - bool "ORC unwinder" - depends on X86_64 - select STACK_VALIDATION -@@ -396,7 +396,7 @@ config ORC_UNWINDER - Enabling this option will increase the kernel's runtime memory usage - by roughly 2-4MB, depending on your kernel config. - --config GUESS_UNWINDER -+config UNWINDER_GUESS - bool "Guess unwinder" - depends on EXPERT - ---help--- -@@ -411,7 +411,7 @@ config GUESS_UNWINDER - endchoice - - config FRAME_POINTER -- depends on !ORC_UNWINDER && !GUESS_UNWINDER -+ depends on !UNWINDER_ORC && !UNWINDER_GUESS - bool - - endmenu ---- a/arch/x86/configs/tiny.config -+++ b/arch/x86/configs/tiny.config -@@ -1,5 +1,5 @@ - CONFIG_NOHIGHMEM=y - # CONFIG_HIGHMEM4G is not set - # CONFIG_HIGHMEM64G is not set --CONFIG_GUESS_UNWINDER=y --# CONFIG_FRAME_POINTER_UNWINDER is not set -+CONFIG_UNWINDER_GUESS=y -+# CONFIG_UNWINDER_FRAME_POINTER is not set ---- a/arch/x86/configs/x86_64_defconfig -+++ b/arch/x86/configs/x86_64_defconfig -@@ -299,7 +299,7 @@ CONFIG_DEBUG_STACKOVERFLOW=y - # CONFIG_DEBUG_RODATA_TEST is not set - CONFIG_DEBUG_BOOT_PARAMS=y - CONFIG_OPTIMIZE_INLINING=y --CONFIG_ORC_UNWINDER=y -+CONFIG_UNWINDER_ORC=y - CONFIG_SECURITY=y - CONFIG_SECURITY_NETWORK=y - CONFIG_SECURITY_SELINUX=y ---- a/arch/x86/include/asm/module.h -+++ b/arch/x86/include/asm/module.h -@@ -6,7 +6,7 @@ - #include <asm/orc_types.h> - - struct mod_arch_specific { --#ifdef CONFIG_ORC_UNWINDER -+#ifdef CONFIG_UNWINDER_ORC - unsigned int num_orcs; - int *orc_unwind_ip; - struct orc_entry *orc_unwind; ---- a/arch/x86/include/asm/unwind.h -+++ b/arch/x86/include/asm/unwind.h -@@ -13,11 +13,11 @@ struct unwind_state { - struct task_struct *task; - int graph_idx; - bool error; --#if defined(CONFIG_ORC_UNWINDER) -+#if defined(CONFIG_UNWINDER_ORC) - bool signal, full_regs; - unsigned long sp, bp, ip; - struct pt_regs *regs; --#elif defined(CONFIG_FRAME_POINTER_UNWINDER) -+#elif defined(CONFIG_UNWINDER_FRAME_POINTER) - bool got_irq; - unsigned long *bp, *orig_sp, ip; - struct pt_regs *regs; -@@ -51,7 +51,7 @@ void unwind_start(struct unwind_state *s - __unwind_start(state, task, regs, first_frame); - } - --#if defined(CONFIG_ORC_UNWINDER) || defined(CONFIG_FRAME_POINTER_UNWINDER) -+#if defined(CONFIG_UNWINDER_ORC) || defined(CONFIG_UNWINDER_FRAME_POINTER) - static inline struct pt_regs *unwind_get_entry_regs(struct unwind_state *state) - { - if (unwind_done(state)) -@@ -66,7 +66,7 @@ static inline struct pt_regs *unwind_get - } - #endif - --#ifdef CONFIG_ORC_UNWINDER -+#ifdef CONFIG_UNWINDER_ORC - void unwind_init(void); - void unwind_module_init(struct module *mod, void *orc_ip, size_t orc_ip_size, - void *orc, size_t orc_size); ---- a/arch/x86/kernel/Makefile -+++ b/arch/x86/kernel/Makefile -@@ -127,9 +127,9 @@ obj-$(CONFIG_PERF_EVENTS) += perf_regs. - obj-$(CONFIG_TRACING) += tracepoint.o - obj-$(CONFIG_SCHED_MC_PRIO) += itmt.o - --obj-$(CONFIG_ORC_UNWINDER) += unwind_orc.o --obj-$(CONFIG_FRAME_POINTER_UNWINDER) += unwind_frame.o --obj-$(CONFIG_GUESS_UNWINDER) += unwind_guess.o -+obj-$(CONFIG_UNWINDER_ORC) += unwind_orc.o -+obj-$(CONFIG_UNWINDER_FRAME_POINTER) += unwind_frame.o -+obj-$(CONFIG_UNWINDER_GUESS) += unwind_guess.o - - ### - # 64 bit specific files ---- a/include/asm-generic/vmlinux.lds.h -+++ b/include/asm-generic/vmlinux.lds.h -@@ -687,7 +687,7 @@ - #define BUG_TABLE - #endif - --#ifdef CONFIG_ORC_UNWINDER -+#ifdef CONFIG_UNWINDER_ORC - #define ORC_UNWIND_TABLE \ - . = ALIGN(4); \ - .orc_unwind_ip : AT(ADDR(.orc_unwind_ip) - LOAD_OFFSET) { \ ---- a/lib/Kconfig.debug -+++ b/lib/Kconfig.debug -@@ -376,7 +376,7 @@ config STACK_VALIDATION - that runtime stack traces are more reliable. - - This is also a prerequisite for generation of ORC unwind data, which -- is needed for CONFIG_ORC_UNWINDER. -+ is needed for CONFIG_UNWINDER_ORC. - - For more information, see - tools/objtool/Documentation/stack-validation.txt. ---- a/scripts/Makefile.build -+++ b/scripts/Makefile.build -@@ -260,7 +260,7 @@ ifneq ($(SKIP_STACK_VALIDATION),1) - - __objtool_obj := $(objtree)/tools/objtool/objtool - --objtool_args = $(if $(CONFIG_ORC_UNWINDER),orc generate,check) -+objtool_args = $(if $(CONFIG_UNWINDER_ORC),orc generate,check) - - ifndef CONFIG_FRAME_POINTER - objtool_args += --no-fp diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/x86-unwinder-Make-CONFIG_UNWINDER_ORC-y-the-default-.patch new/patches.suse/x86-unwinder-Make-CONFIG_UNWINDER_ORC-y-the-default-.patch --- old/patches.suse/x86-unwinder-Make-CONFIG_UNWINDER_ORC-y-the-default-.patch 2017-12-20 11:40:41.000000000 +0100 +++ new/patches.suse/x86-unwinder-Make-CONFIG_UNWINDER_ORC-y-the-default-.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,32 +0,0 @@ -From: Ingo Molnar <mingo@kernel.org> -Date: Thu, 12 Oct 2017 09:24:30 +0200 -Subject: x86/unwinder: Make CONFIG_UNWINDER_ORC=y the default in the 64-bit - defconfig -Git-commit: 1e4078f0bba46ad61b69548abe6a6faf63b89380 -Patch-mainline: 4.15-rc1 -References: bnc#1058115 - -Increase testing coverage by turning on the primary x86 unwinder for -the 64-bit defconfig. - -Cc: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Cc: Thomas Gleixner <tglx@linutronix.de> -Cc: linux-kernel@vger.kernel.org -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Jiri Slaby <jslaby@suse.cz> ---- - arch/x86/configs/x86_64_defconfig | 1 + - 1 file changed, 1 insertion(+) - ---- a/arch/x86/configs/x86_64_defconfig -+++ b/arch/x86/configs/x86_64_defconfig -@@ -299,6 +299,7 @@ CONFIG_DEBUG_STACKOVERFLOW=y - # CONFIG_DEBUG_RODATA_TEST is not set - CONFIG_DEBUG_BOOT_PARAMS=y - CONFIG_OPTIMIZE_INLINING=y -+CONFIG_ORC_UNWINDER=y - CONFIG_SECURITY=y - CONFIG_SECURITY_NETWORK=y - CONFIG_SECURITY_SELINUX=y ++++++ series.conf ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:57.991179529 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:57.995178195 +0100 @@ -830,6 +830,182 @@ patches.kernel.org/4.14.8-176-ath10k-fix-build-errors-with-CONFIG_PM.patch patches.kernel.org/4.14.8-177-usb-musb-da8xx-fix-babble-condition-handling.patch patches.kernel.org/4.14.8-178-Linux-4.14.8.patch + patches.kernel.org/4.14.9-001-x86-asm-Remove-unnecessary-n-t-in-front-of-CC_.patch + patches.kernel.org/4.14.9-002-objtool-Don-t-report-end-of-section-error-afte.patch + patches.kernel.org/4.14.9-003-x86-head-Remove-confusing-comment.patch + patches.kernel.org/4.14.9-004-x86-head-Remove-unused-bad_address-code.patch + patches.kernel.org/4.14.9-005-x86-head-Fix-head-ELF-function-annotations.patch + patches.kernel.org/4.14.9-006-x86-boot-Annotate-verify_cpu-as-a-callable-fun.patch + patches.kernel.org/4.14.9-007-x86-xen-Fix-xen-head-ELF-annotations.patch + patches.kernel.org/4.14.9-008-x86-xen-Add-unwind-hint-annotations.patch + patches.kernel.org/4.14.9-009-x86-head-Add-unwind-hint-annotations.patch + patches.kernel.org/4.14.9-010-ACPI-APEI-adjust-a-local-variable-type-in-ghes.patch + patches.kernel.org/4.14.9-011-x86-unwinder-Make-CONFIG_UNWINDER_ORC-y-the-de.patch + patches.kernel.org/4.14.9-012-x86-fpu-debug-Remove-unused-x86_fpu_state-and-.patch + patches.kernel.org/4.14.9-013-x86-unwind-Rename-unwinder-config-options-to-C.patch + patches.kernel.org/4.14.9-014-x86-unwind-Make-CONFIG_UNWINDER_ORC-y-the-defa.patch + patches.kernel.org/4.14.9-015-bitops-Add-clear-set_bit32-to-linux-bitops.h.patch + patches.kernel.org/4.14.9-016-x86-cpuid-Add-generic-table-for-CPUID-dependen.patch + patches.kernel.org/4.14.9-017-x86-fpu-Parse-clearcpuid-as-early-XSAVE-argume.patch + patches.kernel.org/4.14.9-018-x86-fpu-Make-XSAVE-check-the-base-CPUID-featur.patch + patches.kernel.org/4.14.9-019-x86-fpu-Remove-the-explicit-clearing-of-XSAVE-.patch + patches.kernel.org/4.14.9-020-x86-platform-UV-Convert-timers-to-use-timer_se.patch + patches.kernel.org/4.14.9-021-objtool-Print-top-level-commands-on-incorrect-.patch + patches.kernel.org/4.14.9-022-x86-cpuid-Prevent-out-of-bound-access-in-do_cl.patch + patches.kernel.org/4.14.9-023-mm-sparsemem-Allocate-mem_section-at-runtime-f.patch + patches.kernel.org/4.14.9-024-x86-kasan-Use-the-same-shadow-offset-for-4-and.patch + patches.kernel.org/4.14.9-025-x86-xen-Provide-pre-built-page-tables-only-for.patch + patches.kernel.org/4.14.9-026-x86-xen-Drop-5-level-paging-support-code-from-.patch + patches.kernel.org/4.14.9-027-ACPI-APEI-remove-the-unused-dead-code-for-SEA-.patch + patches.kernel.org/4.14.9-028-x86-asm-Don-t-use-the-confusing-.ifeq-directiv.patch + patches.kernel.org/4.14.9-029-x86-build-Beautify-build-log-of-syscall-header.patch + patches.kernel.org/4.14.9-030-x86-mm-64-Rename-the-register_page_bootmem_mem.patch + patches.kernel.org/4.14.9-031-x86-cpufeatures-Enable-new-SSE-AVX-AVX512-CPU-.patch + patches.kernel.org/4.14.9-032-x86-mm-Relocate-page-fault-error-codes-to-trap.patch + patches.kernel.org/4.14.9-033-x86-boot-Relocate-definition-of-the-initial-st.patch + patches.kernel.org/4.14.9-034-ptrace-x86-Make-user_64bit_mode-available-to-3.patch + patches.kernel.org/4.14.9-035-x86-entry-64-Remove-the-restore_c_regs_and_ire.patch + patches.kernel.org/4.14.9-036-x86-entry-64-Split-the-IRET-to-user-and-IRET-t.patch + patches.kernel.org/4.14.9-037-x86-entry-64-Move-SWAPGS-into-the-common-IRET-.patch + patches.kernel.org/4.14.9-038-x86-entry-64-Simplify-reg-restore-code-in-the-.patch + patches.kernel.org/4.14.9-039-x86-entry-64-Shrink-paranoid_exit_restore-and-.patch + patches.kernel.org/4.14.9-040-x86-entry-64-Use-pop-instead-of-movq-in-syscal.patch + patches.kernel.org/4.14.9-041-x86-entry-64-Merge-the-fast-and-slow-SYSRET-pa.patch + patches.kernel.org/4.14.9-042-x86-entry-64-Use-POP-instead-of-MOV-to-restore.patch + patches.kernel.org/4.14.9-043-x86-entry-64-Remove-the-RESTORE_._REGS-infrast.patch + patches.kernel.org/4.14.9-044-xen-x86-entry-64-Add-xen-NMI-trap-entry.patch + patches.kernel.org/4.14.9-045-x86-entry-64-De-Xen-ify-our-NMI-code.patch + patches.kernel.org/4.14.9-046-x86-entry-32-Pull-the-MSR_IA32_SYSENTER_CS-upd.patch + patches.kernel.org/4.14.9-047-x86-entry-64-Pass-SP0-directly-to-load_sp0.patch + patches.kernel.org/4.14.9-048-x86-entry-Add-task_top_of_stack-to-find-the-to.patch + patches.kernel.org/4.14.9-049-x86-xen-64-x86-entry-64-Clean-up-SP-code-in-cp.patch + patches.kernel.org/4.14.9-050-x86-entry-64-Stop-initializing-TSS.sp0-at-boot.patch + patches.kernel.org/4.14.9-051-x86-entry-64-Remove-all-remaining-direct-threa.patch + patches.kernel.org/4.14.9-052-x86-entry-32-Fix-cpu_current_top_of_stack-init.patch + patches.kernel.org/4.14.9-053-x86-entry-64-Remove-thread_struct-sp0.patch + patches.kernel.org/4.14.9-054-x86-traps-Use-a-new-on_thread_stack-helper-to-.patch + patches.kernel.org/4.14.9-055-x86-entry-64-Shorten-TEST-instructions.patch + patches.kernel.org/4.14.9-056-x86-cpuid-Replace-set-clear_bit32.patch + patches.kernel.org/4.14.9-057-bitops-Revert-cbe96375025e-bitops-Add-clear-se.patch + patches.kernel.org/4.14.9-058-x86-mm-Define-_PAGE_TABLE-using-_KERNPG_TABLE.patch + patches.kernel.org/4.14.9-059-x86-cpufeatures-Re-tabulate-the-X86_FEATURE-de.patch + patches.kernel.org/4.14.9-060-x86-cpufeatures-Fix-various-details-in-the-fea.patch + patches.kernel.org/4.14.9-061-selftests-x86-ldt_gdt-Add-infrastructure-to-te.patch + patches.kernel.org/4.14.9-062-selftests-x86-ldt_gdt-Run-most-existing-LDT-te.patch + patches.kernel.org/4.14.9-063-ACPI-APEI-Replace-ioremap_page_range-with-fixm.patch + patches.kernel.org/4.14.9-064-x86-virt-x86-platform-Merge-struct-x86_hyper-i.patch + patches.kernel.org/4.14.9-065-x86-virt-Add-enum-for-hypervisors-to-replace-x.patch + patches.kernel.org/4.14.9-066-drivers-misc-intel-pti-Rename-the-header-file-.patch + patches.kernel.org/4.14.9-067-x86-cpufeature-Add-User-Mode-Instruction-Preve.patch + patches.kernel.org/4.14.9-068-x86-Make-X86_BUG_FXSAVE_LEAK-detectable-in-CPU.patch + patches.kernel.org/4.14.9-069-perf-x86-Enable-free-running-PEBS-for-REGS_USE.patch + patches.kernel.org/4.14.9-070-bpf-fix-build-issues-on-um-due-to-mising-bpf_p.patch + patches.kernel.org/4.14.9-071-locking-barriers-Add-implicit-smp_read_barrier.patch + patches.kernel.org/4.14.9-072-locking-barriers-Convert-users-of-lockless_der.patch + patches.kernel.org/4.14.9-073-x86-mm-kasan-Don-t-use-vmemmap_populate-to-ini.patch + patches.kernel.org/4.14.9-074-x86-entry-64-paravirt-Use-paravirt-safe-macro-.patch + patches.kernel.org/4.14.9-075-x86-unwinder-orc-Dont-bail-on-stack-overflow.patch + patches.kernel.org/4.14.9-076-x86-unwinder-Handle-stack-overflows-more-grace.patch + patches.kernel.org/4.14.9-077-x86-irq-Remove-an-old-outdated-comment-about-c.patch + patches.kernel.org/4.14.9-078-x86-irq-64-Print-the-offending-IP-in-the-stack.patch + patches.kernel.org/4.14.9-079-x86-entry-64-Allocate-and-enable-the-SYSENTER-.patch + patches.kernel.org/4.14.9-080-x86-dumpstack-Add-get_stack_info-support-for-t.patch + patches.kernel.org/4.14.9-081-x86-entry-gdt-Put-per-CPU-GDT-remaps-in-ascend.patch + patches.kernel.org/4.14.9-082-x86-mm-fixmap-Generalize-the-GDT-fixmap-mechan.patch + patches.kernel.org/4.14.9-083-x86-kasan-64-Teach-KASAN-about-the-cpu_entry_a.patch + patches.kernel.org/4.14.9-084-x86-entry-Fix-assumptions-that-the-HW-TSS-is-a.patch + patches.kernel.org/4.14.9-085-x86-dumpstack-Handle-stack-overflow-on-all-sta.patch + patches.kernel.org/4.14.9-086-x86-entry-Move-SYSENTER_stack-to-the-beginning.patch + patches.kernel.org/4.14.9-087-x86-entry-Remap-the-TSS-into-the-CPU-entry-are.patch + patches.kernel.org/4.14.9-088-x86-entry-64-Separate-cpu_current_top_of_stack.patch + patches.kernel.org/4.14.9-089-x86-espfix-64-Stop-assuming-that-pt_regs-is-on.patch + patches.kernel.org/4.14.9-090-x86-entry-64-Use-a-per-CPU-trampoline-stack-fo.patch + patches.kernel.org/4.14.9-091-x86-entry-64-Return-to-userspace-from-the-tram.patch + patches.kernel.org/4.14.9-092-x86-entry-64-Create-a-per-CPU-SYSCALL-entry-tr.patch + patches.kernel.org/4.14.9-093-x86-entry-64-Move-the-IST-stacks-into-struct-c.patch + patches.kernel.org/4.14.9-094-x86-entry-64-Remove-the-SYSENTER-stack-canary.patch + patches.kernel.org/4.14.9-095-x86-entry-Clean-up-the-SYSENTER_stack-code.patch + patches.kernel.org/4.14.9-096-x86-entry-64-Make-cpu_entry_area.tss-read-only.patch + patches.kernel.org/4.14.9-097-x86-paravirt-Dont-patch-flush_tlb_single.patch + patches.kernel.org/4.14.9-098-x86-paravirt-Provide-a-way-to-check-for-hyperv.patch + patches.kernel.org/4.14.9-099-x86-cpufeatures-Make-CPU-bugs-sticky.patch + patches.kernel.org/4.14.9-100-optee-fix-invalid-of_node_put-in-optee_driver_.patch + patches.kernel.org/4.14.9-101-backlight-pwm_bl-Fix-overflow-condition.patch + patches.kernel.org/4.14.9-102-drm-Add-retries-for-lspcon-mode-detection.patch + patches.kernel.org/4.14.9-103-clk-sunxi-ng-nm-Check-if-requested-rate-is-sup.patch + patches.kernel.org/4.14.9-104-clk-sunxi-ng-sun5i-Fix-bit-offset-of-audio-PLL.patch + patches.kernel.org/4.14.9-105-crypto-crypto4xx-increase-context-and-scatter-.patch + patches.kernel.org/4.14.9-106-crypto-lrw-Fix-an-error-handling-path-in-creat.patch + patches.kernel.org/4.14.9-107-rtc-pl031-make-interrupt-optional.patch + patches.kernel.org/4.14.9-108-kvm-mm-account-kvm-related-kmem-slabs-to-kmemc.patch + patches.kernel.org/4.14.9-109-net-phy-at803x-Change-error-to-EINVAL-for-inva.patch + patches.kernel.org/4.14.9-110-PCI-Avoid-bus-reset-if-bridge-itself-is-broken.patch + patches.kernel.org/4.14.9-111-scsi-cxgb4i-fix-Tx-skb-leak.patch + patches.kernel.org/4.14.9-112-scsi-mpt3sas-Fix-IO-error-occurs-on-pulling-ou.patch + patches.kernel.org/4.14.9-113-PCI-Create-SR-IOV-virtfn-physfn-links-before-a.patch + patches.kernel.org/4.14.9-114-PM-OPP-Move-error-message-to-debug-level.patch + patches.kernel.org/4.14.9-115-igb-check-memory-allocation-failure.patch + patches.kernel.org/4.14.9-116-i40e-use-the-safe-hash-table-iterator-when-del.patch + patches.kernel.org/4.14.9-117-iio-st_sensors-add-register-mask-for-status-re.patch + patches.kernel.org/4.14.9-118-ixgbe-fix-use-of-uninitialized-padding.patch + patches.kernel.org/4.14.9-119-IB-rxe-check-for-allocation-failure-on-elem.patch + patches.kernel.org/4.14.9-120-block-bfq-Disable-writeback-throttling.patch + patches.kernel.org/4.14.9-121-md-always-set-THREAD_WAKEUP-and-wake-up-wqueue.patch + patches.kernel.org/4.14.9-122-ip_gre-check-packet-length-and-mtu-correctly-i.patch + patches.kernel.org/4.14.9-123-ipv6-grab-rt-rt6i_ref-before-allocating-pcpu-r.patch + patches.kernel.org/4.14.9-124-leds-pca955x-Don-t-invert-requested-value-in-p.patch + patches.kernel.org/4.14.9-125-Bluetooth-hci_uart_set_flow_control-Fix-NULL-d.patch + patches.kernel.org/4.14.9-126-Bluetooth-hci_bcm-Fix-setting-of-irq-trigger-t.patch + patches.kernel.org/4.14.9-127-i40e-i40evf-spread-CPU-affinity-hints-across-o.patch + patches.kernel.org/4.14.9-128-PCI-AER-Report-non-fatal-errors-only-to-the-af.patch + patches.kernel.org/4.14.9-129-tracing-Exclude-generic-fields-from-histograms.patch + patches.kernel.org/4.14.9-130-ASoC-codecs-msm8916-wcd-analog-fix-micbias-lev.patch + patches.kernel.org/4.14.9-131-ASoC-img-parallel-out-Add-pm_runtime_get-put-t.patch + patches.kernel.org/4.14.9-132-powerpc-xmon-Avoid-tripping-SMP-hardlockup-wat.patch + patches.kernel.org/4.14.9-133-powerpc-watchdog-Do-not-trigger-SMP-crash-from.patch + patches.kernel.org/4.14.9-134-sctp-silence-warns-on-sctp_stream_init-allocat.patch + patches.kernel.org/4.14.9-135-ASoC-codecs-msm8916-wcd-analog-fix-module-auto.patch + patches.kernel.org/4.14.9-136-fm10k-fix-mis-ordered-parameters-in-declaratio.patch + patches.kernel.org/4.14.9-137-scsi-lpfc-Fix-secure-firmware-updates.patch + patches.kernel.org/4.14.9-138-scsi-lpfc-PLOGI-failures-during-NPIV-testing.patch + patches.kernel.org/4.14.9-139-scsi-lpfc-Fix-warning-messages-when-NVME_TARGE.patch + patches.kernel.org/4.14.9-140-i40e-fix-client-notify-of-VF-reset.patch + patches.kernel.org/4.14.9-141-vfio-pci-Virtualize-Maximum-Payload-Size.patch + patches.kernel.org/4.14.9-142-ARM-exynos_defconfig-Enable-UAS-support-for-Od.patch + patches.kernel.org/4.14.9-143-fm10k-ensure-we-process-SM-mbx-when-processing.patch + patches.kernel.org/4.14.9-144-ibmvnic-Set-state-UP.patch + patches.kernel.org/4.14.9-145-net-ipv6-send-NS-for-DAD-when-link-operational.patch + patches.kernel.org/4.14.9-146-RDMA-hns-Avoid-NULL-pointer-exception.patch + patches.kernel.org/4.14.9-147-staging-greybus-light-Release-memory-obtained-.patch + patches.kernel.org/4.14.9-148-clk-sunxi-ng-sun6i-Rename-HDMI-DDC-clock-to-av.patch + patches.kernel.org/4.14.9-149-tcp-fix-under-evaluated-ssthresh-in-TCP-Vegas.patch + patches.kernel.org/4.14.9-150-rtc-set-the-alarm-to-the-next-expiring-timer.patch + patches.kernel.org/4.14.9-151-cpuidle-fix-broadcast-control-when-broadcast-c.patch + patches.kernel.org/4.14.9-152-drm-vc4-Avoid-using-vrefresh-0-mode-in-DSI-hto.patch + patches.kernel.org/4.14.9-153-IB-opa_vnic-Properly-clear-Mac-Table-Digest.patch + patches.kernel.org/4.14.9-154-IB-opa_vnic-Properly-return-the-total-MACs-in-.patch + patches.kernel.org/4.14.9-155-thermal-drivers-hisi-Fix-missing-interrupt-ena.patch + patches.kernel.org/4.14.9-156-thermal-drivers-hisi-Fix-kernel-panic-on-alarm.patch + patches.kernel.org/4.14.9-157-thermal-drivers-hisi-Simplify-the-temperature-.patch + patches.kernel.org/4.14.9-158-thermal-drivers-hisi-Fix-multiple-alarm-interr.patch + patches.kernel.org/4.14.9-159-platform-x86-asus-wireless-send-an-EV_SYN-SYN_.patch + patches.kernel.org/4.14.9-160-mm-sparsemem-Fix-ARM64-boot-crash-when-CONFIG_.patch + patches.kernel.org/4.14.9-161-bpf-fix-branch-pruning-logic.patch + patches.kernel.org/4.14.9-162-bpf-fix-corruption-on-concurrent-perf_event_ou.patch + patches.kernel.org/4.14.9-163-bpf-s390x-do-not-reload-skb-pointers-in-non-sk.patch + patches.kernel.org/4.14.9-164-bpf-ppc64-do-not-reload-skb-pointers-in-non-sk.patch + patches.kernel.org/4.14.9-165-bpf-sparc-fix-usage-of-wrong-reg-for-load_skb_.patch + patches.kernel.org/4.14.9-166-bpf-verifier-fix-bounds-calculation-on-BPF_RSH.patch + patches.kernel.org/4.14.9-167-bpf-fix-incorrect-sign-extension-in-check_alu_.patch + patches.kernel.org/4.14.9-168-bpf-fix-incorrect-tracking-of-register-size-tr.patch + patches.kernel.org/4.14.9-169-bpf-fix-32-bit-ALU-op-verification.patch + patches.kernel.org/4.14.9-170-bpf-fix-missing-error-return-in-check_stack_bo.patch + patches.kernel.org/4.14.9-171-bpf-force-strict-alignment-checks-for-stack-po.patch + patches.kernel.org/4.14.9-172-bpf-don-t-prune-branches-when-a-scalar-is-repl.patch + patches.kernel.org/4.14.9-173-bpf-fix-integer-overflows.patch + patches.kernel.org/4.14.9-174-selftests-bpf-add-tests-for-recent-bugfixes.patch + patches.kernel.org/4.14.9-175-linux-compiler.h-Split-into-compiler.h-and-com.patch + patches.kernel.org/4.14.9-176-Linux-4.14.9.patch ######################################################## # Build fixes that apply to the vanilla kernel too. @@ -1207,21 +1383,8 @@ ######################################################## patches.suse/crasher.patch - # in upstream - patches.suse/0001-objtool-Don-t-report-end-of-section-error-after-an-e.patch - patches.suse/0002-x86-head-Remove-confusing-comment.patch - patches.suse/0003-x86-head-Remove-unused-bad_address-code.patch - patches.suse/0004-x86-head-Fix-head-ELF-function-annotations.patch - patches.suse/0005-x86-boot-Annotate-verify_cpu-as-a-callable-function.patch - patches.suse/0006-x86-xen-Fix-xen-head-ELF-annotations.patch - patches.suse/0007-x86-xen-Add-unwind-hint-annotations.patch - patches.suse/0008-x86-head-Add-unwind-hint-annotations.patch patches.suse/x86-stacktrace-Avoid-recording-save_stack_trace-wrap.patch - patches.suse/x86-unwinder-Make-CONFIG_UNWINDER_ORC-y-the-default-.patch - patches.suse/x86-unwind-Rename-unwinder-config-options-to-CONFIG_.patch - patches.suse/x86-unwind-Make-CONFIG_UNWINDER_ORC-y-the-default-in.patch - patches.suse/objtool-Print-top-level-commands-on-incorrect-usage.patch # submitted patches.suse/0001-x86-stacktrace-do-now-unwind-after-user-regs.patch ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.I765Kw/_old 2017-12-31 19:29:58.027167523 +0100 +++ /var/tmp/diff_new_pack.I765Kw/_new 2017-12-31 19:29:58.027167523 +0100 @@ -1,3 +1,3 @@ -2017-12-20 11:40:41 +0100 -GIT Revision: 674981bbd1c094487306428b2f30e762dcbdcfde +2017-12-25 16:42:48 +0100 +GIT Revision: 9423ca2d83e140041bbc69d74e99172f891f4d08 GIT Branch: stable
participants (1)
-
root@hilbert.suse.de