summaryrefslogtreecommitdiff
path: root/sys-kernel/linux-sources-redcore-lts-legacy/files
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2020-04-23 20:00:12 +0100
committerV3n3RiX <venerix@redcorelinux.org>2020-04-23 20:00:12 +0100
commit91d5ba0b080cfb82c31c9e8ded192c4909f57de5 (patch)
tree3400e60daedc1c5b4b66ffb3725b395c26c3a2cb /sys-kernel/linux-sources-redcore-lts-legacy/files
parentf16898044470d366e9b9061e9cff05ac2668b88c (diff)
sys-kernel/linux-{image,sources}-redcore-lts-legacy : version bump (v4.19.118)
Diffstat (limited to 'sys-kernel/linux-sources-redcore-lts-legacy/files')
-rw-r--r--sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-revert_52918ed5fcf05d97d257f4131e19479da18f5d16.patch60
-rw-r--r--sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch8
2 files changed, 0 insertions, 68 deletions
diff --git a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-revert_52918ed5fcf05d97d257f4131e19479da18f5d16.patch b/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-revert_52918ed5fcf05d97d257f4131e19479da18f5d16.patch
deleted file mode 100644
index a19726f3..00000000
--- a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-revert_52918ed5fcf05d97d257f4131e19479da18f5d16.patch
+++ /dev/null
@@ -1,60 +0,0 @@
-diff -Nur a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
---- a/arch/x86/kvm/svm.c 2020-03-05 15:42:23.000000000 +0000
-+++ b/arch/x86/kvm/svm.c 2020-03-09 23:13:11.593860862 +0000
-@@ -1298,47 +1298,6 @@
- control->pause_filter_count, old);
- }
-
--/*
-- * The default MMIO mask is a single bit (excluding the present bit),
-- * which could conflict with the memory encryption bit. Check for
-- * memory encryption support and override the default MMIO mask if
-- * memory encryption is enabled.
-- */
--static __init void svm_adjust_mmio_mask(void)
--{
-- unsigned int enc_bit, mask_bit;
-- u64 msr, mask;
--
-- /* If there is no memory encryption support, use existing mask */
-- if (cpuid_eax(0x80000000) < 0x8000001f)
-- return;
--
-- /* If memory encryption is not enabled, use existing mask */
-- rdmsrl(MSR_K8_SYSCFG, msr);
-- if (!(msr & MSR_K8_SYSCFG_MEM_ENCRYPT))
-- return;
--
-- enc_bit = cpuid_ebx(0x8000001f) & 0x3f;
-- mask_bit = boot_cpu_data.x86_phys_bits;
--
-- /* Increment the mask bit if it is the same as the encryption bit */
-- if (enc_bit == mask_bit)
-- mask_bit++;
--
-- /*
-- * If the mask bit location is below 52, then some bits above the
-- * physical addressing limit will always be reserved, so use the
-- * rsvd_bits() function to generate the mask. This mask, along with
-- * the present bit, will be used to generate a page fault with
-- * PFER.RSV = 1.
-- *
-- * If the mask bit location is 52 (or above), then clear the mask.
-- */
-- mask = (mask_bit < 52) ? rsvd_bits(mask_bit, 51) | PT_PRESENT_MASK : 0;
--
-- kvm_mmu_set_mmio_spte_mask(mask, PT_WRITABLE_MASK | PT_USER_MASK);
--}
--
- static __init int svm_hardware_setup(void)
- {
- int cpu;
-@@ -1393,8 +1352,6 @@
- }
- }
-
-- svm_adjust_mmio_mask();
--
- for_each_possible_cpu(cpu) {
- r = svm_cpu_init(cpu);
- if (r)
diff --git a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch b/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch
index 9237058b..99ed91c7 100644
--- a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch
+++ b/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch
@@ -86,14 +86,6 @@ diff -Nur a/fs/exec.c b/fs/exec.c
#include <linux/uaccess.h>
#include <asm/mmu_context.h>
-@@ -1382,6 +1383,7 @@
- /* An exec changes our domain. We are no longer part of the thread
- group */
- current->self_exec_id++;
-+
- flush_signal_handlers(current, 0);
- }
- EXPORT_SYMBOL(setup_new_exec);
diff -Nur a/fs/proc/meminfo.c b/fs/proc/meminfo.c
--- a/fs/proc/meminfo.c 2019-06-11 11:20:57.000000000 +0100
+++ b/fs/proc/meminfo.c 2019-06-19 19:34:58.729369555 +0100