diff options
Diffstat (limited to 'sys-kernel/linux-sources-redcore-lts')
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/Manifest | 3 | ||||
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/files/4.19-0002-Fix-Werror-build-failure-in-tools.patch | 27 | ||||
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/files/4.19-0016-unfuck-MuQSS-on-linux-4_19_20+.patch | 11 | ||||
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/files/4.19-ath10k-drop-WARN_ON-added-in-cd93b83ad927b2c7979e0add0343ace59328b461.patch | 74 | ||||
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/files/4.19-linux-hardened.patch | 220 | ||||
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/files/4.19-revert-patches-causing-instant-reboot.patch | 314 | ||||
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/files/4.19-uksm-linux-hardened.patch | 116 | ||||
-rw-r--r-- | sys-kernel/linux-sources-redcore-lts/linux-sources-redcore-lts-4.19.50.ebuild (renamed from sys-kernel/linux-sources-redcore-lts/linux-sources-redcore-lts-4.19.20-r2.ebuild) | 7 |
8 files changed, 192 insertions, 580 deletions
diff --git a/sys-kernel/linux-sources-redcore-lts/Manifest b/sys-kernel/linux-sources-redcore-lts/Manifest index 89a7e6c1..8b456e69 100644 --- a/sys-kernel/linux-sources-redcore-lts/Manifest +++ b/sys-kernel/linux-sources-redcore-lts/Manifest @@ -1,2 +1 @@ -DIST linux-4.14.95.tar.xz 101049552 BLAKE2B 48e55bc8b7844d2ede44254b884201f4a239afd45e680ac6c4fc5fae8550eb4a0ad714c4625421ddffea89b09f7841a347e1e032716178bda123abecbecaa28f SHA512 ab1e9c54a852adfa4b0fb451db8cdafecb3cf1adca9dcc0574c2c2a5e7edd9ba77a551ac27a4e16fcf23d89c8f278b04b5c522b7d7b4043ab0309084a3b35a89 -DIST linux-4.19.20.tar.xz 103142620 BLAKE2B a1dbb52aa6727906792741a80b49a26d62ecb40306e8545854967def16875fb1b8d5e09894dd310aa32060155006eecad5fe461c44074a8fecd90d4fc5dc47ce SHA512 1eac44b81c54f34faf782c9d6990703c463206d8c16716c4c3be5c7a7add3a8f4c5695f6191ffdf3a0ffdc549dda5f0ca154e6751fa024d2fae2684cc4e5e182 +DIST linux-4.19.50.tar.xz 103243308 BLAKE2B 9055ead21e6cac1d057690e715a11ac980ed6d847bec4019cb0ecd3dee653295cee1dc0d98bbd79b5d5c439d99fc5713fddb27ca3fcae78d9eff475d9a6411cb SHA512 61ca35f47994a0a904bbac1afa6d75c7ce9647f44cbb61ac0c564ddd9dc9a331d7b314df7d5ac265c4c85fd02b2bb8b72ec95bb1080e4010eb1177e6de3f55c7 diff --git a/sys-kernel/linux-sources-redcore-lts/files/4.19-0002-Fix-Werror-build-failure-in-tools.patch b/sys-kernel/linux-sources-redcore-lts/files/4.19-0002-Fix-Werror-build-failure-in-tools.patch index 35872156..0e6135a7 100644 --- a/sys-kernel/linux-sources-redcore-lts/files/4.19-0002-Fix-Werror-build-failure-in-tools.patch +++ b/sys-kernel/linux-sources-redcore-lts/files/4.19-0002-Fix-Werror-build-failure-in-tools.patch @@ -1,25 +1,12 @@ -From ba77544e4687e62fe9d8ca870ceb47ea87d1cbfe Mon Sep 17 00:00:00 2001 -From: Con Kolivas <kernel@kolivas.org> -Date: Sun, 18 Feb 2018 12:36:22 +1100 -Subject: [PATCH 02/16] Fix Werror build failure in tools. - ---- - tools/objtool/Makefile | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/tools/objtool/Makefile b/tools/objtool/Makefile -index c9d038f91af6..af41781c233a 100644 ---- a/tools/objtool/Makefile -+++ b/tools/objtool/Makefile -@@ -31,7 +31,7 @@ INCLUDES := -I$(srctree)/tools/include \ +diff -Nur a/tools/objtool/Makefile b/tools/objtool/Makefile +--- a/tools/objtool/Makefile 2019-06-11 11:20:57.000000000 +0100 ++++ b/tools/objtool/Makefile 2019-06-19 19:43:15.055901403 +0100 +@@ -35,7 +35,7 @@ -I$(srctree)/tools/arch/$(HOSTARCH)/include/uapi \ -I$(srctree)/tools/objtool/arch/$(ARCH)/include WARNINGS := $(EXTRA_WARNINGS) -Wno-switch-default -Wno-switch-enum -Wno-packed --CFLAGS += -Werror $(WARNINGS) $(KBUILD_HOSTCFLAGS) -g $(INCLUDES) -+CFLAGS += $(WARNINGS) $(KBUILD_HOSTCFLAGS) -g $(INCLUDES) - LDFLAGS += -lelf $(LIBSUBCMD) $(KBUILD_HOSTLDFLAGS) +-CFLAGS += -Werror $(WARNINGS) $(KBUILD_HOSTCFLAGS) -g $(INCLUDES) $(LIBELF_FLAGS) ++CFLAGS += $(WARNINGS) $(KBUILD_HOSTCFLAGS) -g $(INCLUDES) $(LIBELF_FLAGS) + LDFLAGS += $(LIBELF_LIBS) $(LIBSUBCMD) $(KBUILD_HOSTLDFLAGS) # Allow old libelf to be used: --- -2.17.1 - diff --git a/sys-kernel/linux-sources-redcore-lts/files/4.19-0016-unfuck-MuQSS-on-linux-4_19_20+.patch b/sys-kernel/linux-sources-redcore-lts/files/4.19-0016-unfuck-MuQSS-on-linux-4_19_20+.patch new file mode 100644 index 00000000..201ed408 --- /dev/null +++ b/sys-kernel/linux-sources-redcore-lts/files/4.19-0016-unfuck-MuQSS-on-linux-4_19_20+.patch @@ -0,0 +1,11 @@ +diff -Nur a/kernel/sched/MuQSS.c b/kernel/sched/MuQSS.c +--- a/kernel/sched/MuQSS.c 2019-06-19 19:58:03.175461132 +0100 ++++ b/kernel/sched/MuQSS.c 2019-06-19 20:00:22.120083431 +0100 +@@ -1013,6 +1013,7 @@ + + #ifdef CONFIG_SCHED_SMT + DEFINE_STATIC_KEY_FALSE(sched_smt_present); ++EXPORT_SYMBOL_GPL(sched_smt_present); + #endif + + /* diff --git a/sys-kernel/linux-sources-redcore-lts/files/4.19-ath10k-drop-WARN_ON-added-in-cd93b83ad927b2c7979e0add0343ace59328b461.patch b/sys-kernel/linux-sources-redcore-lts/files/4.19-ath10k-drop-WARN_ON-added-in-cd93b83ad927b2c7979e0add0343ace59328b461.patch deleted file mode 100644 index 4e810797..00000000 --- a/sys-kernel/linux-sources-redcore-lts/files/4.19-ath10k-drop-WARN_ON-added-in-cd93b83ad927b2c7979e0add0343ace59328b461.patch +++ /dev/null @@ -1,74 +0,0 @@ - -Triggers on resume .. - -[ 487.909349] WARNING: CPU: 0 PID: 2125 at drivers/net/wireless/ath/ath10k/mac.c:5625 ath10k_bss_info_changed+0xb33/0xd90 [ath10k_core] -[ 487.909350] Modules linked in: ctr ccm cmac af_packet arc4 xt_tcpudp xt_state xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bnep iptable_filter ip_tables x_tables bpfilter nls_utf8 nls_cp437 vfat fat amdgpu chash gpu_sched joydev uvcvideo iTCO_wdt snd_hda_codec_hdmi iTCO_vendor_support videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 snd_hda_codec_conexant intel_wmi_thunderbolt videobuf2_common btusb snd_hda_codec_generic radeon btrtl btbcm btintel ath10k_pci videodev bluetooth ath10k_core media i915 ttm ecdh_generic coretemp ath intel_rapl x86_pkg_temp_thermal rtsx_usb_ms intel_powerclamp mac80211 memstick kvm_intel kvmgt vfio_mdev mdev vfio_iommu_type1 vfio kvm snd_soc_skl snd_soc_skl_ipc snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi -[ 487.909390] cec snd_soc_core rc_core drm_kms_helper efi_pstore irqbypass cfg80211 snd_compress drm snd_pcm_dmaengine psmouse intel_gtt evdev snd_hda_intel mac_hid agpgart i2c_algo_bit snd_hda_codec r8169 pcspkr efivars fb_sys_fops syscopyarea sysfillrect sysimgblt i2c_i801 snd_hda_core hwmon i2c_core libphy snd_hwdep ideapad_laptop sparse_keymap intel_pch_thermal rfkill thermal wmi battery acpi_pad ac video pcc_cpufreq button ppdev sch_fq_codel fuse snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_timer snd soundcore lp parport_pc parport binfmt_misc sg ext4 crc32c_generic crc16 mbcache jbd2 fscrypto rtsx_usb_sdmmc mmc_core rtsx_usb sr_mod sd_mod cdrom crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel pcbc xhci_pci ahci xhci_hcd -[ 487.909436] libahci libata aesni_intel aes_x86_64 crypto_simd usbcore cryptd scsi_mod glue_helper serio_raw dm_mirror dm_region_hash dm_log dm_mod efivarfs unix sha256_mb sha256_ssse3 sha256_generic sha1_mb mcryptd sha1_ssse3 sha1_generic hmac ipv6 autofs4 -[ 487.909454] CPU: 0 PID: 2125 Comm: kworker/u8:21 Not tainted 4.19.2-fw1 #1 -[ 487.909455] Hardware name: LENOVO 80UD/LNVNB161216, BIOS 1TCN26WW(V2.07) 03/29/2018 -[ 487.909459] Workqueue: events_unbound async_run_entry_fn -[ 487.909466] RIP: 0010:ath10k_bss_info_changed+0xb33/0xd90 [ath10k_core] -[ 487.909468] Code: ff ff b8 a1 ff ff ff e9 e9 f7 ff ff b8 a1 ff ff ff e9 a5 f6 ff ff b8 a1 ff ff ff e9 ef f5 ff ff b8 a1 ff ff ff e9 4f f7 ff ff <0f> 0b e9 37 f8 ff ff b8 a1 ff ff ff e9 f6 fa ff ff b8 a1 ff ff ff -[ 487.909469] RSP: 0018:ffff9b9042e47cd8 EFLAGS: 00010282 -[ 487.909471] RAX: 00000000fffffffe RBX: ffff904af2fb1540 RCX: 0000000000000000 -[ 487.909472] RDX: ffff904af2fb18b8 RSI: ffff9b9042e47cf8 RDI: ffff904af4181380 -[ 487.909473] RBP: ffff904af4181380 R08: 0000000000200000 R09: 0000000000000000 -[ 487.909474] R10: 000000000000001f R11: ffff904ae2b4a600 R12: 0000000002000000 -[ 487.909475] R13: ffff904af4181388 R14: ffff904af2fb24d0 R15: ffff904af2fb1540 -[ 487.909477] FS: 0000000000000000(0000) GS:ffff904af7200000(0000) knlGS:0000000000000000 -[ 487.909478] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 -[ 487.909479] CR2: 00007fa6a8300510 CR3: 000000002000a002 CR4: 00000000003606f0 -[ 487.909480] Call Trace: -[ 487.909488] ? ath10k_conf_tx+0x12d/0x4c0 [ath10k_core] -[ 487.909503] ieee80211_bss_info_change_notify+0xa9/0x1c0 [mac80211] -[ 487.909521] ieee80211_reconfig+0x9d7/0x14f0 [mac80211] -[ 487.909538] wiphy_resume+0x7e/0x150 [cfg80211] -[ 487.909549] ? wiphy_namespace+0x10/0x10 [cfg80211] -[ 487.909553] dpm_run_callback+0x2e/0x130 -[ 487.909556] device_resume+0x97/0x190 -[ 487.909558] async_resume+0x19/0x40 -[ 487.909561] async_run_entry_fn+0x37/0xe0 -[ 487.909563] process_one_work+0x1e9/0x410 -[ 487.909565] worker_thread+0x2d/0x3d0 -[ 487.909567] ? process_one_work+0x410/0x410 -[ 487.909569] kthread+0x113/0x130 -[ 487.909572] ? kthread_park+0x90/0x90 -[ 487.909575] ret_from_fork+0x35/0x40 -[ 487.909577] ---[ end trace 56a3ea97193bc4c5 ]--- - -Introduced by: - -..... - -commit cd93b83ad927b2c7979e0add0343ace59328b461 -Author: Pradeep Kumar Chitrapu <pradeepc@codeaurora.org> -Date: Wed Jul 25 10:59:39 2018 +0300 - - ath10k: support for multicast rate control - - Issues a wmi command to firmware when multicast rate change is received with the - new BSS_CHANGED_MCAST_RATE flag. Also fixes the incorrect fixed_rate setting - for CCK rates which got introduced with addition of ath10k_rates_rev2 enum. - - Tested on QCA9984 with firmware ver 10.4-3.6-00104 - - Signed-off-by: Pradeep Kumar Chitrapu <pradeepc@codeaurora.org> - Signed-off-by: Kalle Valo <kvalo@codeaurora.org> - -..... - - -diff -Naur linux-4.19.2/drivers/net/wireless/ath/ath10k/mac.c linux-4.19.2-p/drivers/net/wireless/ath/ath10k/mac.c ---- linux-4.19.2/drivers/net/wireless/ath/ath10k/mac.c 2018-11-13 20:09:00.000000000 +0100 -+++ linux-4.19.2-p/drivers/net/wireless/ath/ath10k/mac.c 2018-11-15 01:41:51.896601274 +0100 -@@ -5621,8 +5621,7 @@ - arvif->vdev_id, ret); - } - -- if (changed & BSS_CHANGED_MCAST_RATE && -- !WARN_ON(ath10k_mac_vif_chan(arvif->vif, &def))) { -+ if (changed & BSS_CHANGED_MCAST_RATE && !ath10k_mac_vif_chan(arvif->vif, &def)) { - band = def.chan->band; - rateidx = vif->bss_conf.mcast_rate[band] - 1; - diff --git a/sys-kernel/linux-sources-redcore-lts/files/4.19-linux-hardened.patch b/sys-kernel/linux-sources-redcore-lts/files/4.19-linux-hardened.patch index 42ba2084..3cba43ca 100644 --- a/sys-kernel/linux-sources-redcore-lts/files/4.19-linux-hardened.patch +++ b/sys-kernel/linux-sources-redcore-lts/files/4.19-linux-hardened.patch @@ -1,5 +1,5 @@ diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt -index f5acf35c712f..191e7eb6b9ce 100644 +index a29301d6e6c6..d3a259e762fa 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -496,16 +496,6 @@ @@ -19,7 +19,7 @@ index f5acf35c712f..191e7eb6b9ce 100644 cio_ignore= [S390] See Documentation/s390/CommonIO for details. clk_ignore_unused -@@ -3105,6 +3095,11 @@ +@@ -3165,6 +3155,11 @@ the specified number of seconds. This is to be used if your oopses keep scrolling off the screen. @@ -71,10 +71,10 @@ index 37a679501ddc..59b747920f4d 100644 The value in this file affects behavior of handling NMI. When the diff --git a/Makefile b/Makefile -index f1859811dca1..432040e2d299 100644 +index f7e7e365e2ff..7c69091b65a0 100644 --- a/Makefile +++ b/Makefile -@@ -698,6 +698,9 @@ stackp-flags-$(CONFIG_STACKPROTECTOR_STRONG) := -fstack-protector-strong +@@ -693,6 +693,9 @@ stackp-flags-$(CONFIG_STACKPROTECTOR_STRONG) := -fstack-protector-strong KBUILD_CFLAGS += $(stackp-flags-y) ifeq ($(cc-name),clang) @@ -85,10 +85,10 @@ index f1859811dca1..432040e2d299 100644 KBUILD_CFLAGS += $(call cc-disable-warning, format-invalid-specifier) KBUILD_CFLAGS += $(call cc-disable-warning, gnu) diff --git a/arch/Kconfig b/arch/Kconfig -index 6801123932a5..d331769f18cd 100644 +index a336548487e6..bbe821420e7a 100644 --- a/arch/Kconfig +++ b/arch/Kconfig -@@ -598,7 +598,7 @@ config ARCH_MMAP_RND_BITS +@@ -599,7 +599,7 @@ config ARCH_MMAP_RND_BITS int "Number of bits to use for ASLR of mmap base address" if EXPERT range ARCH_MMAP_RND_BITS_MIN ARCH_MMAP_RND_BITS_MAX default ARCH_MMAP_RND_BITS_DEFAULT if ARCH_MMAP_RND_BITS_DEFAULT @@ -97,7 +97,7 @@ index 6801123932a5..d331769f18cd 100644 depends on HAVE_ARCH_MMAP_RND_BITS help This value can be used to select the number of bits to use to -@@ -632,7 +632,7 @@ config ARCH_MMAP_RND_COMPAT_BITS +@@ -633,7 +633,7 @@ config ARCH_MMAP_RND_COMPAT_BITS int "Number of bits to use for ASLR of mmap base address for compatible applications" if EXPERT range ARCH_MMAP_RND_COMPAT_BITS_MIN ARCH_MMAP_RND_COMPAT_BITS_MAX default ARCH_MMAP_RND_COMPAT_BITS_DEFAULT if ARCH_MMAP_RND_COMPAT_BITS_DEFAULT @@ -106,7 +106,7 @@ index 6801123932a5..d331769f18cd 100644 depends on HAVE_ARCH_MMAP_RND_COMPAT_BITS help This value can be used to select the number of bits to use to -@@ -837,6 +837,7 @@ config ARCH_HAS_REFCOUNT +@@ -838,6 +838,7 @@ config ARCH_HAS_REFCOUNT config REFCOUNT_FULL bool "Perform full reference count validation at the expense of speed" @@ -115,10 +115,10 @@ index 6801123932a5..d331769f18cd 100644 Enabling this switches the refcounting infrastructure from a fast unchecked atomic_t implementation to a fully state checked diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig -index 1b1a0e95c751..2397d505747f 100644 +index 8790a29d0af4..265c6edd859f 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig -@@ -1013,6 +1013,7 @@ endif +@@ -1031,6 +1031,7 @@ endif config ARM64_SW_TTBR0_PAN bool "Emulate Privileged Access Never using TTBR0_EL1 switching" @@ -126,7 +126,7 @@ index 1b1a0e95c751..2397d505747f 100644 help Enabling this option prevents the kernel from accessing user-space memory directly by pointing TTBR0_EL1 to a reserved -@@ -1188,6 +1189,7 @@ config RANDOMIZE_BASE +@@ -1206,6 +1207,7 @@ config RANDOMIZE_BASE bool "Randomize the address of the kernel image" select ARM64_MODULE_PLTS if MODULES select RELOCATABLE @@ -203,7 +203,7 @@ index 7f1628effe6d..38bd2f95a961 100644 /* diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig -index 44c6a82b7ce5..62aba195aae8 100644 +index e76d16ac2776..07dcedbb271e 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1189,8 +1189,7 @@ config VM86 @@ -216,7 +216,7 @@ index 44c6a82b7ce5..62aba195aae8 100644 depends on MODIFY_LDT_SYSCALL ---help--- This option is required by programs like Wine to run 16-bit -@@ -2280,7 +2279,7 @@ config COMPAT_VDSO +@@ -2274,7 +2273,7 @@ config COMPAT_VDSO choice prompt "vsyscall table for legacy applications" depends on X86_64 @@ -225,7 +225,7 @@ index 44c6a82b7ce5..62aba195aae8 100644 help Legacy user code that does not know how to find the vDSO expects to be able to issue three syscalls by calling fixed addresses in -@@ -2361,8 +2360,7 @@ config CMDLINE_OVERRIDE +@@ -2355,8 +2354,7 @@ config CMDLINE_OVERRIDE be set to 'N' under normal conditions. config MODIFY_LDT_SYSCALL @@ -403,10 +403,10 @@ index 79ec7add5f98..2950448e00ac 100644 native_write_cr4(cr4 ^ X86_CR4_PGE); /* write old PGE again and flush TLBs */ diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c -index 44c4ef3d989b..05943ca7b59a 100644 +index 1073118b9bf0..2e34aede5c36 100644 --- a/arch/x86/kernel/cpu/common.c +++ b/arch/x86/kernel/cpu/common.c -@@ -1730,7 +1730,6 @@ void cpu_init(void) +@@ -1748,7 +1748,6 @@ void cpu_init(void) wrmsrl(MSR_KERNEL_GS_BASE, 0); barrier(); @@ -415,7 +415,7 @@ index 44c4ef3d989b..05943ca7b59a 100644 /* diff --git a/arch/x86/kernel/process.c b/arch/x86/kernel/process.c -index 7d31192296a8..4f87550d814c 100644 +index b8b08e61ac73..42f763e0adf3 100644 --- a/arch/x86/kernel/process.c +++ b/arch/x86/kernel/process.c @@ -39,6 +39,8 @@ @@ -427,7 +427,7 @@ index 7d31192296a8..4f87550d814c 100644 #include "process.h" -@@ -779,7 +781,10 @@ unsigned long arch_align_stack(unsigned long sp) +@@ -783,7 +785,10 @@ unsigned long arch_align_stack(unsigned long sp) unsigned long arch_randomize_brk(struct mm_struct *mm) { @@ -567,10 +567,10 @@ index 15c1f5e12eb8..ff72cccec5b8 100644 struct list_head *cpu_list, local_list; diff --git a/drivers/ata/libata-core.c b/drivers/ata/libata-core.c -index b8c3f9e6af89..bf65bc091cb6 100644 +index adf28788cab5..cd4b3501eda9 100644 --- a/drivers/ata/libata-core.c +++ b/drivers/ata/libata-core.c -@@ -5157,7 +5157,7 @@ void ata_qc_free(struct ata_queued_cmd *qc) +@@ -5158,7 +5158,7 @@ void ata_qc_free(struct ata_queued_cmd *qc) struct ata_port *ap; unsigned int tag; @@ -579,7 +579,7 @@ index b8c3f9e6af89..bf65bc091cb6 100644 ap = qc->ap; qc->flags = 0; -@@ -5174,7 +5174,7 @@ void __ata_qc_complete(struct ata_queued_cmd *qc) +@@ -5175,7 +5175,7 @@ void __ata_qc_complete(struct ata_queued_cmd *qc) struct ata_port *ap; struct ata_link *link; @@ -589,7 +589,7 @@ index b8c3f9e6af89..bf65bc091cb6 100644 ap = qc->ap; link = qc->dev->link; diff --git a/drivers/char/Kconfig b/drivers/char/Kconfig -index 40728491f37b..b4f3ccfa2993 100644 +index 1df9cb8e659e..eb71148a4a69 100644 --- a/drivers/char/Kconfig +++ b/drivers/char/Kconfig @@ -9,7 +9,6 @@ source "drivers/tty/Kconfig" @@ -609,7 +609,7 @@ index 40728491f37b..b4f3ccfa2993 100644 Say Y here if you want to support the /dev/port device. The /dev/port device is similar to /dev/mem, but for I/O ports. diff --git a/drivers/tty/Kconfig b/drivers/tty/Kconfig -index 0840d27381ea..ae292fcedaca 100644 +index e0a04bfc873e..ec93f827c599 100644 --- a/drivers/tty/Kconfig +++ b/drivers/tty/Kconfig @@ -122,7 +122,6 @@ config UNIX98_PTYS @@ -621,7 +621,7 @@ index 0840d27381ea..ae292fcedaca 100644 A pseudo terminal (PTY) is a software device consisting of two halves: a master and a slave. The slave device behaves identical to diff --git a/drivers/tty/tty_io.c b/drivers/tty/tty_io.c -index e7d192ebecd7..1c682abd31ca 100644 +index ac8025cd4a1f..a89e48f53fba 100644 --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -172,6 +172,7 @@ static void free_tty_struct(struct tty_struct *tty) @@ -632,7 +632,7 @@ index e7d192ebecd7..1c682abd31ca 100644 kfree(tty); } -@@ -2175,11 +2176,19 @@ static int tty_fasync(int fd, struct file *filp, int on) +@@ -2177,11 +2178,19 @@ static int tty_fasync(int fd, struct file *filp, int on) * FIXME: may race normal receive processing */ @@ -652,7 +652,7 @@ index e7d192ebecd7..1c682abd31ca 100644 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN)) return -EPERM; if (get_user(ch, p)) -@@ -2863,6 +2872,7 @@ struct tty_struct *alloc_tty_struct(struct tty_driver *driver, int idx) +@@ -2865,6 +2874,7 @@ struct tty_struct *alloc_tty_struct(struct tty_driver *driver, int idx) tty->index = idx; tty_line_name(driver, idx, tty->name); tty->dev = tty_get_device(tty); @@ -661,7 +661,7 @@ index e7d192ebecd7..1c682abd31ca 100644 return tty; } diff --git a/drivers/usb/core/hub.c b/drivers/usb/core/hub.c -index cc62707c0251..21d78ae4b4ae 100644 +index eb24ec0e160d..68c93697cae9 100644 --- a/drivers/usb/core/hub.c +++ b/drivers/usb/core/hub.c @@ -41,6 +41,8 @@ @@ -673,7 +673,7 @@ index cc62707c0251..21d78ae4b4ae 100644 /* Protect struct usb_device->state and ->children members * Note: Both are also protected by ->dev.sem, except that ->state can * change to USB_STATE_NOTATTACHED even when the semaphore isn't held. */ -@@ -4933,6 +4935,12 @@ static void hub_port_connect(struct usb_hub *hub, int port1, u16 portstatus, +@@ -4940,6 +4942,12 @@ static void hub_port_connect(struct usb_hub *hub, int port1, u16 portstatus, goto done; return; } @@ -687,7 +687,7 @@ index cc62707c0251..21d78ae4b4ae 100644 unit_load = 150; else diff --git a/fs/exec.c b/fs/exec.c -index 1ebf6e5a521d..73b8d839927c 100644 +index 433b1257694a..f86201f25a4c 100644 --- a/fs/exec.c +++ b/fs/exec.c @@ -62,6 +62,7 @@ @@ -822,10 +822,10 @@ index f640dcbc880c..2b4f5d651f19 100644 { return true; diff --git a/include/linux/fs.h b/include/linux/fs.h -index 7b6084854bfe..cee4467da4a7 100644 +index d4e1b43a53c3..c925cbdd1d95 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h -@@ -3456,4 +3456,15 @@ extern void inode_nohighmem(struct inode *inode); +@@ -3466,4 +3466,15 @@ extern void inode_nohighmem(struct inode *inode); extern int vfs_fadvise(struct file *file, loff_t offset, loff_t len, int advice); @@ -935,7 +935,7 @@ index 069aa2ebef90..cb9e3637a620 100644 const struct kobj_ns_type_operations *kobj_child_ns_ops(struct kobject *parent); const struct kobj_ns_type_operations *kobj_ns_ops(struct kobject *kobj); diff --git a/include/linux/mm.h b/include/linux/mm.h -index e899460f1bc5..bca0cbed3269 100644 +index bdec425c8e14..58409dee149a 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -571,7 +571,7 @@ static inline int is_vmalloc_or_module_addr(const void *x) @@ -972,10 +972,10 @@ index 70b7123f38c7..09f3019489b2 100644 extern phys_addr_t per_cpu_ptr_to_phys(void *addr); diff --git a/include/linux/perf_event.h b/include/linux/perf_event.h -index 53c500f0ca79..15c236b8aba3 100644 +index 42fc852bf512..a6c5cacee3b5 100644 --- a/include/linux/perf_event.h +++ b/include/linux/perf_event.h -@@ -1179,6 +1179,11 @@ extern int perf_cpu_time_max_percent_handler(struct ctl_table *table, int write, +@@ -1184,6 +1184,11 @@ extern int perf_cpu_time_max_percent_handler(struct ctl_table *table, int write, int perf_event_max_stack_handler(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos); @@ -988,10 +988,10 @@ index 53c500f0ca79..15c236b8aba3 100644 { return sysctl_perf_event_paranoid > -1; diff --git a/include/linux/slab.h b/include/linux/slab.h -index ed9cbddeb4a6..e76e18c7165f 100644 +index d6393413ef09..f11e06e87a29 100644 --- a/include/linux/slab.h +++ b/include/linux/slab.h -@@ -178,8 +178,8 @@ void memcg_destroy_kmem_caches(struct mem_cgroup *); +@@ -180,8 +180,8 @@ void memcg_destroy_kmem_caches(struct mem_cgroup *); /* * Common kmalloc functions provided by all allocators */ @@ -1002,7 +1002,7 @@ index ed9cbddeb4a6..e76e18c7165f 100644 void kfree(const void *); void kzfree(const void *); size_t ksize(const void *); -@@ -352,7 +352,7 @@ static __always_inline unsigned int kmalloc_index(size_t size) +@@ -354,7 +354,7 @@ static __always_inline unsigned int kmalloc_index(size_t size) } #endif /* !CONFIG_SLOB */ @@ -1011,7 +1011,7 @@ index ed9cbddeb4a6..e76e18c7165f 100644 void *kmem_cache_alloc(struct kmem_cache *, gfp_t flags) __assume_slab_alignment __malloc; void kmem_cache_free(struct kmem_cache *, void *); -@@ -376,7 +376,7 @@ static __always_inline void kfree_bulk(size_t size, void **p) +@@ -378,7 +378,7 @@ static __always_inline void kfree_bulk(size_t size, void **p) } #ifdef CONFIG_NUMA @@ -1020,7 +1020,7 @@ index ed9cbddeb4a6..e76e18c7165f 100644 void *kmem_cache_alloc_node(struct kmem_cache *, gfp_t flags, int node) __assume_slab_alignment __malloc; #else static __always_inline void *__kmalloc_node(size_t size, gfp_t flags, int node) -@@ -498,7 +498,7 @@ static __always_inline void *kmalloc_large(size_t size, gfp_t flags) +@@ -500,7 +500,7 @@ static __always_inline void *kmalloc_large(size_t size, gfp_t flags) * for general use, and so are not documented here. For a full list of * potential flags, always refer to linux/gfp.h. */ @@ -1029,7 +1029,7 @@ index ed9cbddeb4a6..e76e18c7165f 100644 { if (__builtin_constant_p(size)) { if (size > KMALLOC_MAX_CACHE_SIZE) -@@ -538,7 +538,7 @@ static __always_inline unsigned int kmalloc_size(unsigned int n) +@@ -540,7 +540,7 @@ static __always_inline unsigned int kmalloc_size(unsigned int n) return 0; } @@ -1055,10 +1055,10 @@ index 3a1a1dbc6f49..ff38fec9eb76 100644 /* * Defragmentation by allocating from a remote node. diff --git a/include/linux/string.h b/include/linux/string.h -index 4a5a0eb7df51..be86cf21d0ce 100644 +index f58e1ef76572..516caa40676e 100644 --- a/include/linux/string.h +++ b/include/linux/string.h -@@ -235,10 +235,16 @@ void __read_overflow2(void) __compiletime_error("detected read beyond size of ob +@@ -238,10 +238,16 @@ void __read_overflow2(void) __compiletime_error("detected read beyond size of ob void __read_overflow3(void) __compiletime_error("detected read beyond size of object passed as 3rd parameter"); void __write_overflow(void) __compiletime_error("detected write beyond size of object passed as 1st parameter"); @@ -1076,7 +1076,7 @@ index 4a5a0eb7df51..be86cf21d0ce 100644 if (__builtin_constant_p(size) && p_size < size) __write_overflow(); if (p_size < size) -@@ -248,7 +254,7 @@ __FORTIFY_INLINE char *strncpy(char *p, const char *q, __kernel_size_t size) +@@ -251,7 +257,7 @@ __FORTIFY_INLINE char *strncpy(char *p, const char *q, __kernel_size_t size) __FORTIFY_INLINE char *strcat(char *p, const char *q) { @@ -1085,7 +1085,7 @@ index 4a5a0eb7df51..be86cf21d0ce 100644 if (p_size == (size_t)-1) return __builtin_strcat(p, q); if (strlcat(p, q, p_size) >= p_size) -@@ -259,7 +265,7 @@ __FORTIFY_INLINE char *strcat(char *p, const char *q) +@@ -262,7 +268,7 @@ __FORTIFY_INLINE char *strcat(char *p, const char *q) __FORTIFY_INLINE __kernel_size_t strlen(const char *p) { __kernel_size_t ret; @@ -1094,7 +1094,7 @@ index 4a5a0eb7df51..be86cf21d0ce 100644 /* Work around gcc excess stack consumption issue */ if (p_size == (size_t)-1 || -@@ -274,7 +280,7 @@ __FORTIFY_INLINE __kernel_size_t strlen(const char *p) +@@ -277,7 +283,7 @@ __FORTIFY_INLINE __kernel_size_t strlen(const char *p) extern __kernel_size_t __real_strnlen(const char *, __kernel_size_t) __RENAME(strnlen); __FORTIFY_INLINE __kernel_size_t strnlen(const char *p, __kernel_size_t maxlen) { @@ -1103,7 +1103,7 @@ index 4a5a0eb7df51..be86cf21d0ce 100644 __kernel_size_t ret = __real_strnlen(p, maxlen < p_size ? maxlen : p_size); if (p_size <= ret && maxlen != ret) fortify_panic(__func__); -@@ -286,8 +292,8 @@ extern size_t __real_strlcpy(char *, const char *, size_t) __RENAME(strlcpy); +@@ -289,8 +295,8 @@ extern size_t __real_strlcpy(char *, const char *, size_t) __RENAME(strlcpy); __FORTIFY_INLINE size_t strlcpy(char *p, const char *q, size_t size) { size_t ret; @@ -1114,7 +1114,7 @@ index 4a5a0eb7df51..be86cf21d0ce 100644 if (p_size == (size_t)-1 && q_size == (size_t)-1) return __real_strlcpy(p, q, size); ret = strlen(q); -@@ -307,8 +313,8 @@ __FORTIFY_INLINE size_t strlcpy(char *p, const char *q, size_t size) +@@ -310,8 +316,8 @@ __FORTIFY_INLINE size_t strlcpy(char *p, const char *q, size_t size) __FORTIFY_INLINE char *strncat(char *p, const char *q, __kernel_size_t count) { size_t p_len, copy_len; @@ -1125,7 +1125,7 @@ index 4a5a0eb7df51..be86cf21d0ce 100644 if (p_size == (size_t)-1 && q_size == (size_t)-1) return __builtin_strncat(p, q, count); p_len = strlen(p); -@@ -421,8 +427,8 @@ __FORTIFY_INLINE void *kmemdup(const void *p, size_t size, gfp_t gfp) +@@ -424,8 +430,8 @@ __FORTIFY_INLINE void *kmemdup(const void *p, size_t size, gfp_t gfp) /* defined after fortified strlen and memcpy to reuse them */ __FORTIFY_INLINE char *strcpy(char *p, const char *q) { @@ -1200,10 +1200,10 @@ index 398e9c95cd61..baab7195306a 100644 extern void *__vmalloc_node_flags(unsigned long size, int node, gfp_t flags); static inline void *__vmalloc_node_flags_caller(unsigned long size, int node, diff --git a/init/Kconfig b/init/Kconfig -index 864af10bb1b9..643bb9448bb9 100644 +index 47035b5a46f6..63b30636fdc0 100644 --- a/init/Kconfig +++ b/init/Kconfig -@@ -323,6 +323,7 @@ config USELIB +@@ -326,6 +326,7 @@ config USELIB config AUDIT bool "Auditing support" depends on NET @@ -1211,7 +1211,7 @@ index 864af10bb1b9..643bb9448bb9 100644 help Enable auditing infrastructure that can be used with another kernel subsystem, such as SELinux (which requires this for -@@ -1088,6 +1089,12 @@ config CC_OPTIMIZE_FOR_SIZE +@@ -1091,6 +1092,12 @@ config CC_OPTIMIZE_FOR_SIZE endchoice @@ -1224,7 +1224,7 @@ index 864af10bb1b9..643bb9448bb9 100644 config HAVE_LD_DEAD_CODE_DATA_ELIMINATION bool help -@@ -1374,8 +1381,7 @@ config SHMEM +@@ -1377,8 +1384,7 @@ config SHMEM which may be appropriate on small systems without swap. config AIO @@ -1234,7 +1234,7 @@ index 864af10bb1b9..643bb9448bb9 100644 help This option enables POSIX asynchronous I/O which may by used by some high performance threaded applications. Disabling -@@ -1592,7 +1598,7 @@ config VM_EVENT_COUNTERS +@@ -1595,7 +1601,7 @@ config VM_EVENT_COUNTERS config SLUB_DEBUG default y @@ -1243,7 +1243,7 @@ index 864af10bb1b9..643bb9448bb9 100644 depends on SLUB && SYSFS help SLUB has extensive debug support features. Disabling these can -@@ -1616,7 +1622,6 @@ config SLUB_MEMCG_SYSFS_ON +@@ -1619,7 +1625,6 @@ config SLUB_MEMCG_SYSFS_ON config COMPAT_BRK bool "Disable heap randomization" @@ -1251,7 +1251,7 @@ index 864af10bb1b9..643bb9448bb9 100644 help Randomizing heap placement makes heap exploits harder, but it also breaks ancient binaries (including anything libc5 based). -@@ -1663,7 +1668,6 @@ endchoice +@@ -1666,7 +1671,6 @@ endchoice config SLAB_MERGE_DEFAULT bool "Allow slab caches to be merged" @@ -1259,7 +1259,7 @@ index 864af10bb1b9..643bb9448bb9 100644 help For reduced kernel memory fragmentation, slab caches can be merged when they share the same size and other characteristics. -@@ -1676,9 +1680,9 @@ config SLAB_MERGE_DEFAULT +@@ -1679,9 +1683,9 @@ config SLAB_MERGE_DEFAULT command line. config SLAB_FREELIST_RANDOM @@ -1270,7 +1270,7 @@ index 864af10bb1b9..643bb9448bb9 100644 help Randomizes the freelist order used on creating new pages. This security feature reduces the predictability of the kernel slab -@@ -1687,12 +1691,56 @@ config SLAB_FREELIST_RANDOM +@@ -1690,12 +1694,56 @@ config SLAB_FREELIST_RANDOM config SLAB_FREELIST_HARDENED bool "Harden slab freelist metadata" depends on SLUB @@ -1342,20 +1342,20 @@ index 2a8058764aa6..14e7a763db43 100644 pr_err("audit: error setting audit state (%d)\n", audit_default); diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c -index 474525e3a9db..644a87f6ad28 100644 +index bad9985b8a08..453be8764a8c 100644 --- a/kernel/bpf/core.c +++ b/kernel/bpf/core.c -@@ -368,7 +368,7 @@ void bpf_prog_kallsyms_del_all(struct bpf_prog *fp) - #ifdef CONFIG_BPF_JIT +@@ -370,7 +370,7 @@ void bpf_prog_kallsyms_del_all(struct bpf_prog *fp) + /* All BPF JIT sysctl knobs here. */ int bpf_jit_enable __read_mostly = IS_BUILTIN(CONFIG_BPF_JIT_ALWAYS_ON); -int bpf_jit_harden __read_mostly; +int bpf_jit_harden __read_mostly = 2; int bpf_jit_kallsyms __read_mostly; + int bpf_jit_limit __read_mostly = BPF_JIT_LIMIT_DEFAULT; - static __always_inline void diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c -index 382c09dddf93..11f436e79170 100644 +index ede82382dd32..98591574df41 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -48,7 +48,7 @@ static DEFINE_SPINLOCK(prog_idr_lock); @@ -1385,7 +1385,7 @@ index 1e1c0236f55b..452062fe45ce 100644 /** diff --git a/kernel/events/core.c b/kernel/events/core.c -index 5a97f34bc14c..a4a4fc1e1586 100644 +index 171b83ebed4a..c38d8bf68b6b 100644 --- a/kernel/events/core.c +++ b/kernel/events/core.c @@ -397,8 +397,13 @@ static cpumask_var_t perf_online_mask; @@ -1402,7 +1402,7 @@ index 5a97f34bc14c..a4a4fc1e1586 100644 /* Minimum for 512 kiB + 1 user control page */ int sysctl_perf_event_mlock __read_mostly = 512 + (PAGE_SIZE / 1024); /* 'free' kiB per user */ -@@ -10410,6 +10415,9 @@ SYSCALL_DEFINE5(perf_event_open, +@@ -10462,6 +10467,9 @@ SYSCALL_DEFINE5(perf_event_open, if (flags & ~PERF_FLAG_ALL) return -EINVAL; @@ -1413,7 +1413,7 @@ index 5a97f34bc14c..a4a4fc1e1586 100644 if (err) return err; diff --git a/kernel/fork.c b/kernel/fork.c -index 64ef113e387e..42d257e43e04 100644 +index 69874db3fba8..44f666f2b7b7 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -103,6 +103,11 @@ @@ -1428,7 +1428,7 @@ index 64ef113e387e..42d257e43e04 100644 /* * Minimum number of threads to boot the kernel -@@ -1649,6 +1654,10 @@ static __latent_entropy struct task_struct *copy_process( +@@ -1674,6 +1679,10 @@ static __latent_entropy struct task_struct *copy_process( if ((clone_flags & (CLONE_NEWUSER|CLONE_FS)) == (CLONE_NEWUSER|CLONE_FS)) return ERR_PTR(-EINVAL); @@ -1439,7 +1439,7 @@ index 64ef113e387e..42d257e43e04 100644 /* * Thread groups must share signals as well, and detached threads * can only be started up within the thread group. -@@ -2476,6 +2485,12 @@ int ksys_unshare(unsigned long unshare_flags) +@@ -2503,6 +2512,12 @@ int ksys_unshare(unsigned long unshare_flags) if (unshare_flags & CLONE_NEWNS) unshare_flags |= CLONE_FS; @@ -1488,10 +1488,10 @@ index befc9321a89c..61e19256560c 100644 __rcu_process_callbacks(&rcu_sched_ctrlblk); __rcu_process_callbacks(&rcu_bh_ctrlblk); diff --git a/kernel/rcu/tree.c b/kernel/rcu/tree.c -index 15301ed19da6..2a799dea7016 100644 +index f7e89c989df7..527c170810fc 100644 --- a/kernel/rcu/tree.c +++ b/kernel/rcu/tree.c -@@ -2862,7 +2862,7 @@ __rcu_process_callbacks(struct rcu_state *rsp) +@@ -2870,7 +2870,7 @@ __rcu_process_callbacks(struct rcu_state *rsp) /* * Do RCU core processing for the current CPU. */ @@ -1501,10 +1501,10 @@ index 15301ed19da6..2a799dea7016 100644 struct rcu_state *rsp; diff --git a/kernel/sched/fair.c b/kernel/sched/fair.c -index 7137bc343b4a..104e0855a018 100644 +index 4a433608ba74..41d9b1656818 100644 --- a/kernel/sched/fair.c +++ b/kernel/sched/fair.c -@@ -9593,7 +9593,7 @@ static int idle_balance(struct rq *this_rq, struct rq_flags *rf) +@@ -9627,7 +9627,7 @@ static int idle_balance(struct rq *this_rq, struct rq_flags *rf) * run_rebalance_domains is triggered when needed from the scheduler tick. * Also triggered for nohz idle balancing (with nohz_balancing_kick set). */ @@ -1574,7 +1574,7 @@ index 6f584861d329..1943fe60f3b9 100644 void tasklet_init(struct tasklet_struct *t, diff --git a/kernel/sysctl.c b/kernel/sysctl.c -index cc02050fd0c4..cca161854186 100644 +index 9a85c7ae7362..20221265a603 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -67,6 +67,7 @@ @@ -1605,7 +1605,7 @@ index cc02050fd0c4..cca161854186 100644 extern int pid_max; extern int pid_max_min, pid_max_max; extern int percpu_pagelist_fraction; -@@ -116,33 +124,33 @@ extern int sysctl_nr_trim_pages; +@@ -116,35 +124,35 @@ extern int sysctl_nr_trim_pages; /* Constants used for minimum and maximum */ #ifdef CONFIG_LOCKUP_DETECTOR @@ -1620,13 +1620,17 @@ index cc02050fd0c4..cca161854186 100644 -static int __maybe_unused one = 1; -static int __maybe_unused two = 2; -static int __maybe_unused four = 4; +-static unsigned long zero_ul; -static unsigned long one_ul = 1; +-static unsigned long long_max = LONG_MAX; -static int one_hundred = 100; -static int one_thousand = 1000; +static int __maybe_unused one __read_only = 1; +static int __maybe_unused two __read_only = 2; +static int __maybe_unused four __read_only = 4; ++static unsigned long zero_ul __read_only; +static unsigned long one_ul __read_only = 1; ++static unsigned long long_max __read_only = LONG_MAX; +static int one_hundred __read_only = 100; +static int one_thousand __read_only = 1000; #ifdef CONFIG_PRINTK @@ -1653,7 +1657,7 @@ index cc02050fd0c4..cca161854186 100644 static const int cap_last_cap = CAP_LAST_CAP; /* -@@ -150,9 +158,12 @@ static const int cap_last_cap = CAP_LAST_CAP; +@@ -152,9 +160,12 @@ static const int cap_last_cap = CAP_LAST_CAP; * and hung_task_check_interval_secs */ #ifdef CONFIG_DETECT_HUNG_TASK @@ -1667,7 +1671,7 @@ index cc02050fd0c4..cca161854186 100644 #ifdef CONFIG_INOTIFY_USER #include <linux/inotify.h> #endif -@@ -296,19 +307,19 @@ static struct ctl_table sysctl_base_table[] = { +@@ -298,19 +309,19 @@ static struct ctl_table sysctl_base_table[] = { }; #ifdef CONFIG_SCHED_DEBUG @@ -1695,7 +1699,7 @@ index cc02050fd0c4..cca161854186 100644 #endif static struct ctl_table kern_table[] = { -@@ -514,6 +525,15 @@ static struct ctl_table kern_table[] = { +@@ -516,6 +527,15 @@ static struct ctl_table kern_table[] = { .proc_handler = proc_dointvec, }, #endif @@ -1711,7 +1715,7 @@ index cc02050fd0c4..cca161854186 100644 #ifdef CONFIG_PROC_SYSCTL { .procname = "tainted", -@@ -862,6 +882,37 @@ static struct ctl_table kern_table[] = { +@@ -864,6 +884,37 @@ static struct ctl_table kern_table[] = { .extra1 = &zero, .extra2 = &two, }, @@ -1790,7 +1794,7 @@ index 923414a246e9..6b9dbc257e34 100644 static DEFINE_MUTEX(userns_state_mutex); diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug -index 4966c4fbe7f7..7a685272c155 100644 +index 3dea52f7be9c..9074878fe25b 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -950,6 +950,7 @@ endmenu # "Debug lockups and hangs" @@ -1818,7 +1822,7 @@ index 4966c4fbe7f7..7a685272c155 100644 help Enable this to turn on extended checks in the linked-list walking routines. -@@ -1982,6 +1984,7 @@ config MEMTEST +@@ -1983,6 +1985,7 @@ config MEMTEST config BUG_ON_DATA_CORRUPTION bool "Trigger a BUG when data corruption is detected" select DEBUG_LIST @@ -1826,7 +1830,7 @@ index 4966c4fbe7f7..7a685272c155 100644 help Select this option if the kernel should BUG when it encounters data corruption in kernel memory structures when they get checked -@@ -2021,6 +2024,7 @@ config STRICT_DEVMEM +@@ -2022,6 +2025,7 @@ config STRICT_DEVMEM config IO_STRICT_DEVMEM bool "Filter I/O access to /dev/mem" depends on STRICT_DEVMEM @@ -1904,10 +1908,10 @@ index de64ea658716..8bff017856eb 100644 This is the portion of low virtual memory which should be protected from userspace allocation. Keeping a user from writing to low pages diff --git a/mm/mmap.c b/mm/mmap.c -index f7cd9cb966c0..fda49841f4f2 100644 +index 1480880ff814..0145114c44b4 100644 --- a/mm/mmap.c +++ b/mm/mmap.c -@@ -229,6 +229,13 @@ SYSCALL_DEFINE1(brk, unsigned long, brk) +@@ -230,6 +230,13 @@ SYSCALL_DEFINE1(brk, unsigned long, brk) newbrk = PAGE_ALIGN(brk); oldbrk = PAGE_ALIGN(mm->brk); @@ -1922,7 +1926,7 @@ index f7cd9cb966c0..fda49841f4f2 100644 goto set_brk; diff --git a/mm/page_alloc.c b/mm/page_alloc.c -index 9e45553cabd6..f5ec01e1498c 100644 +index 8e6932a140b8..1f9c55809c56 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -66,6 +66,7 @@ @@ -1949,7 +1953,7 @@ index 9e45553cabd6..f5ec01e1498c 100644 #ifdef CONFIG_GCC_PLUGIN_LATENT_ENTROPY volatile unsigned long latent_entropy __latent_entropy; EXPORT_SYMBOL(latent_entropy); -@@ -1027,6 +1037,13 @@ static __always_inline bool free_pages_prepare(struct page *page, +@@ -1055,6 +1065,13 @@ static __always_inline bool free_pages_prepare(struct page *page, debug_check_no_obj_freed(page_address(page), PAGE_SIZE << order); } @@ -1963,7 +1967,7 @@ index 9e45553cabd6..f5ec01e1498c 100644 arch_free_page(page, order); kernel_poison_pages(page, 1 << order, 0); kernel_map_pages(page, 1 << order, 0); -@@ -1267,6 +1284,21 @@ static void __init __free_pages_boot_core(struct page *page, unsigned int order) +@@ -1295,6 +1312,21 @@ static void __init __free_pages_boot_core(struct page *page, unsigned int order) __ClearPageReserved(p); set_page_count(p, 0); @@ -1985,7 +1989,7 @@ index 9e45553cabd6..f5ec01e1498c 100644 page_zone(page)->managed_pages += nr_pages; set_page_refcounted(page); __free_pages(page, order); -@@ -1855,8 +1887,8 @@ static inline int check_new_page(struct page *page) +@@ -1876,8 +1908,8 @@ static inline int check_new_page(struct page *page) static inline bool free_pages_prezeroed(void) { @@ -1996,7 +2000,7 @@ index 9e45553cabd6..f5ec01e1498c 100644 } #ifdef CONFIG_DEBUG_VM -@@ -1913,6 +1945,11 @@ static void prep_new_page(struct page *page, unsigned int order, gfp_t gfp_flags +@@ -1934,6 +1966,11 @@ static void prep_new_page(struct page *page, unsigned int order, gfp_t gfp_flags post_alloc_hook(page, order, gfp_flags); @@ -2009,10 +2013,10 @@ index 9e45553cabd6..f5ec01e1498c 100644 for (i = 0; i < (1 << order); i++) clear_highpage(page + i); diff --git a/mm/slab.h b/mm/slab.h -index 58c6c1c2a78e..86d7a6e7ad25 100644 +index 9632772e14be..802ff9ee8172 100644 --- a/mm/slab.h +++ b/mm/slab.h -@@ -313,7 +313,11 @@ static inline bool is_root_cache(struct kmem_cache *s) +@@ -314,7 +314,11 @@ static inline bool is_root_cache(struct kmem_cache *s) static inline bool slab_equal_or_root(struct kmem_cache *s, struct kmem_cache *p) { @@ -2024,7 +2028,7 @@ index 58c6c1c2a78e..86d7a6e7ad25 100644 } static inline const char *cache_name(struct kmem_cache *s) -@@ -365,18 +369,26 @@ static inline struct kmem_cache *cache_from_obj(struct kmem_cache *s, void *x) +@@ -366,18 +370,26 @@ static inline struct kmem_cache *cache_from_obj(struct kmem_cache *s, void *x) * to not do even the assignment. In that case, slab_equal_or_root * will also be a constant. */ @@ -2052,7 +2056,7 @@ index 58c6c1c2a78e..86d7a6e7ad25 100644 return s; } -@@ -401,7 +413,7 @@ static inline size_t slab_ksize(const struct kmem_cache *s) +@@ -402,7 +414,7 @@ static inline size_t slab_ksize(const struct kmem_cache *s) * back there or track user information then we can * only use the space before that information. */ @@ -2062,7 +2066,7 @@ index 58c6c1c2a78e..86d7a6e7ad25 100644 /* * Else we can use all the padding etc for the allocation diff --git a/mm/slab_common.c b/mm/slab_common.c -index 3a7ac4f15194..a567cc1807ae 100644 +index 4d3c2e76d1ba..7e943cb1eccd 100644 --- a/mm/slab_common.c +++ b/mm/slab_common.c @@ -27,10 +27,10 @@ @@ -2088,7 +2092,7 @@ index 3a7ac4f15194..a567cc1807ae 100644 static int __init setup_slab_nomerge(char *str) { diff --git a/mm/slub.c b/mm/slub.c -index 8da34a8af53d..f05bc9ca8489 100644 +index 09c0e24a06d8..26e8c45a889a 100644 --- a/mm/slub.c +++ b/mm/slub.c @@ -124,6 +124,16 @@ static inline int kmem_cache_debug(struct kmem_cache *s) @@ -2325,7 +2329,7 @@ index 8da34a8af53d..f05bc9ca8489 100644 #ifdef CONFIG_SLUB_DEBUG if (flags & SLAB_STORE_USER) /* -@@ -3559,6 +3661,10 @@ static int kmem_cache_open(struct kmem_cache *s, slab_flags_t flags) +@@ -3562,6 +3664,10 @@ static int kmem_cache_open(struct kmem_cache *s, slab_flags_t flags) #ifdef CONFIG_SLAB_FREELIST_HARDENED s->random = get_random_long(); #endif @@ -2336,7 +2340,7 @@ index 8da34a8af53d..f05bc9ca8489 100644 if (!calculate_sizes(s, -1)) goto error; -@@ -3835,6 +3941,8 @@ void __check_heap_object(const void *ptr, unsigned long n, struct page *page, +@@ -3838,6 +3944,8 @@ void __check_heap_object(const void *ptr, unsigned long n, struct page *page, offset -= s->red_left_pad; } @@ -2345,7 +2349,7 @@ index 8da34a8af53d..f05bc9ca8489 100644 /* Allow address range falling entirely within usercopy region. */ if (offset >= s->useroffset && offset - s->useroffset <= s->usersize && -@@ -3868,7 +3976,11 @@ static size_t __ksize(const void *object) +@@ -3871,7 +3979,11 @@ static size_t __ksize(const void *object) page = virt_to_head_page(object); if (unlikely(!PageSlab(page))) { @@ -2357,7 +2361,7 @@ index 8da34a8af53d..f05bc9ca8489 100644 return PAGE_SIZE << compound_order(page); } -@@ -4728,7 +4840,7 @@ enum slab_stat_type { +@@ -4731,7 +4843,7 @@ enum slab_stat_type { #define SO_TOTAL (1 << SL_TOTAL) #ifdef CONFIG_MEMCG @@ -2367,7 +2371,7 @@ index 8da34a8af53d..f05bc9ca8489 100644 static int __init setup_slub_memcg_sysfs(char *str) { diff --git a/mm/swap.c b/mm/swap.c -index 26fc9b5f1b6c..7c9312ca8982 100644 +index a3fc028e338e..4a1a899e430c 100644 --- a/mm/swap.c +++ b/mm/swap.c @@ -93,6 +93,13 @@ static void __put_compound_page(struct page *page) @@ -2385,10 +2389,10 @@ index 26fc9b5f1b6c..7c9312ca8982 100644 } diff --git a/net/core/dev.c b/net/core/dev.c -index af097ca9cb4f..fda1753e5b65 100644 +index 138951d28643..efc5c650c9d7 100644 --- a/net/core/dev.c +++ b/net/core/dev.c -@@ -4519,7 +4519,7 @@ int netif_rx_ni(struct sk_buff *skb) +@@ -4533,7 +4533,7 @@ int netif_rx_ni(struct sk_buff *skb) } EXPORT_SYMBOL(netif_rx_ni); @@ -2397,7 +2401,7 @@ index af097ca9cb4f..fda1753e5b65 100644 { struct softnet_data *sd = this_cpu_ptr(&softnet_data); -@@ -6302,7 +6302,7 @@ static int napi_poll(struct napi_struct *n, struct list_head *repoll) +@@ -6318,7 +6318,7 @@ static int napi_poll(struct napi_struct *n, struct list_head *repoll) return work; } @@ -2435,7 +2439,7 @@ index cb0c889e13aa..305f52f58c1a 100644 secure! diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c -index 5a5b3780456f..01eac2c6e7eb 100644 +index 858cbe56b100..61ade07a967a 100644 --- a/scripts/mod/modpost.c +++ b/scripts/mod/modpost.c @@ -35,6 +35,7 @@ static int vmlinux_section_warnings = 1; @@ -2467,9 +2471,9 @@ index 5a5b3780456f..01eac2c6e7eb 100644 } }; -@@ -1229,10 +1237,10 @@ static Elf_Sym *find_elf_symbol(struct elf_info *elf, Elf64_Sword addr, +@@ -1255,10 +1263,10 @@ static Elf_Sym *find_elf_symbol(struct elf_info *elf, Elf64_Sword addr, continue; - if (ELF_ST_TYPE(sym->st_info) == STT_SECTION) + if (!is_valid_name(elf, sym)) continue; - if (sym->st_value == addr) - return sym; @@ -2480,7 +2484,7 @@ index 5a5b3780456f..01eac2c6e7eb 100644 if (d < 0) d = addr - sym->st_value; if (d < distance) { -@@ -1391,7 +1399,11 @@ static void report_sec_mismatch(const char *modname, +@@ -1393,7 +1401,11 @@ static void report_sec_mismatch(const char *modname, char *prl_from; char *prl_to; @@ -2493,7 +2497,7 @@ index 5a5b3780456f..01eac2c6e7eb 100644 if (!sec_mismatch_verbose) return; -@@ -1515,6 +1527,14 @@ static void report_sec_mismatch(const char *modname, +@@ -1517,6 +1529,14 @@ static void report_sec_mismatch(const char *modname, fatal("There's a special handler for this mismatch type, " "we should never get here."); break; @@ -2508,7 +2512,7 @@ index 5a5b3780456f..01eac2c6e7eb 100644 } fprintf(stderr, "\n"); } -@@ -2526,6 +2546,14 @@ int main(int argc, char **argv) +@@ -2528,6 +2548,14 @@ int main(int argc, char **argv) } } free(buf.p); @@ -2670,7 +2674,7 @@ index 8af7a690eb40..6539694b0fd3 100644 - - If you are unsure how to answer this question, answer 0. diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c -index 3c3878f0d2fa..553e52f19f28 100644 +index 70bad15ed7a0..a157a3d57cdd 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -135,18 +135,7 @@ __setup("selinux=", selinux_enabled_setup); diff --git a/sys-kernel/linux-sources-redcore-lts/files/4.19-revert-patches-causing-instant-reboot.patch b/sys-kernel/linux-sources-redcore-lts/files/4.19-revert-patches-causing-instant-reboot.patch deleted file mode 100644 index a2127cff..00000000 --- a/sys-kernel/linux-sources-redcore-lts/files/4.19-revert-patches-causing-instant-reboot.patch +++ /dev/null @@ -1,314 +0,0 @@ -diff --git a/arch/x86/boot/compressed/head_64.S b/arch/x86/boot/compressed/head_64.S -index 8169e8b7a4dc..12915511be61 100644 ---- a/arch/x86/boot/compressed/head_64.S -+++ b/arch/x86/boot/compressed/head_64.S -@@ -305,48 +305,13 @@ ENTRY(startup_64) - /* Set up the stack */ - leaq boot_stack_end(%rbx), %rsp - -- /* -- * paging_prepare() and cleanup_trampoline() below can have GOT -- * references. Adjust the table with address we are running at. -- * -- * Zero RAX for adjust_got: the GOT was not adjusted before; -- * there's no adjustment to undo. -- */ -- xorq %rax, %rax -- -- /* -- * Calculate the address the binary is loaded at and use it as -- * a GOT adjustment. -- */ -- call 1f --1: popq %rdi -- subq $1b, %rdi -- -- call adjust_got -- - /* - * At this point we are in long mode with 4-level paging enabled, -- * but we might want to enable 5-level paging or vice versa. -- * -- * The problem is that we cannot do it directly. Setting or clearing -- * CR4.LA57 in long mode would trigger #GP. So we need to switch off -- * long mode and paging first. -- * -- * We also need a trampoline in lower memory to switch over from -- * 4- to 5-level paging for cases when the bootloader puts the kernel -- * above 4G, but didn't enable 5-level paging for us. -- * -- * The same trampoline can be used to switch from 5- to 4-level paging -- * mode, like when starting 4-level paging kernel via kexec() when -- * original kernel worked in 5-level paging mode. -- * -- * For the trampoline, we need the top page table to reside in lower -- * memory as we don't have a way to load 64-bit values into CR3 in -- * 32-bit mode. -+ * but we want to enable 5-level paging. - * -- * We go though the trampoline even if we don't have to: if we're -- * already in a desired paging mode. This way the trampoline code gets -- * tested on every boot. -+ * The problem is that we cannot do it directly. Setting LA57 in -+ * long mode would trigger #GP. So we need to switch off long mode -+ * first. - */ - - /* Make sure we have GDT with 32-bit code segment */ -@@ -371,32 +336,40 @@ ENTRY(startup_64) - /* Save the trampoline address in RCX */ - movq %rax, %rcx - -+ /* Check if we need to enable 5-level paging */ -+ cmpq $0, %rdx -+ jz lvl5 -+ -+ /* Clear additional page table */ -+ leaq lvl5_pgtable(%rbx), %rdi -+ xorq %rax, %rax -+ movq $(PAGE_SIZE/8), %rcx -+ rep stosq -+ - /* -- * Load the address of trampoline_return() into RDI. -- * It will be used by the trampoline to return to the main code. -+ * Setup current CR3 as the first and only entry in a new top level -+ * page table. - */ -- leaq trampoline_return(%rip), %rdi -+ movq %cr3, %rdi -+ leaq 0x7 (%rdi), %rax -+ movq %rax, lvl5_pgtable(%rbx) - - /* Switch to compatibility mode (CS.L = 0 CS.D = 1) via far return */ - pushq $__KERNEL32_CS -- leaq TRAMPOLINE_32BIT_CODE_OFFSET(%rax), %rax -+ leaq compatible_mode(%rip), %rax - pushq %rax - lretq --trampoline_return: -+lvl5: - /* Restore the stack, the 32-bit trampoline uses its own stack */ - leaq boot_stack_end(%rbx), %rsp - - /* - * cleanup_trampoline() would restore trampoline memory. - * -- * RDI is address of the page table to use instead of page table -- * in trampoline memory (if required). -- * - * RSI holds real mode data and needs to be preserved across - * this function call. - */ - pushq %rsi -- leaq top_pgtable(%rbx), %rdi - call cleanup_trampoline - popq %rsi - -@@ -404,21 +377,6 @@ trampoline_return: - pushq $0 - popfq - -- /* -- * Previously we've adjusted the GOT with address the binary was -- * loaded at. Now we need to re-adjust for relocation address. -- * -- * Calculate the address the binary is loaded at, so that we can -- * undo the previous GOT adjustment. -- */ -- call 1f --1: popq %rax -- subq $1b, %rax -- -- /* The new adjustment is the relocation address */ -- movq %rbx, %rdi -- call adjust_got -- - /* - * Copy the compressed kernel to the end of our buffer - * where decompression in place becomes safe. -@@ -519,6 +477,19 @@ relocated: - shrq $3, %rcx - rep stosq - -+/* -+ * Adjust our own GOT -+ */ -+ leaq _got(%rip), %rdx -+ leaq _egot(%rip), %rcx -+1: -+ cmpq %rcx, %rdx -+ jae 2f -+ addq %rbx, (%rdx) -+ addq $8, %rdx -+ jmp 1b -+2: -+ - /* - * Do the extraction, and jump to the new kernel.. - */ -@@ -537,36 +508,9 @@ relocated: - */ - jmp *%rax - --/* -- * Adjust the global offset table -- * -- * RAX is the previous adjustment of the table to undo (use 0 if it's the -- * first time we touch GOT). -- * RDI is the new adjustment to apply. -- */ --adjust_got: -- /* Walk through the GOT adding the address to the entries */ -- leaq _got(%rip), %rdx -- leaq _egot(%rip), %rcx --1: -- cmpq %rcx, %rdx -- jae 2f -- subq %rax, (%rdx) /* Undo previous adjustment */ -- addq %rdi, (%rdx) /* Apply the new adjustment */ -- addq $8, %rdx -- jmp 1b --2: -- ret -- - .code32 --/* -- * This is the 32-bit trampoline that will be copied over to low memory. -- * -- * RDI contains the return address (might be above 4G). -- * ECX contains the base address of the trampoline memory. -- * Non zero RDX on return means we need to enable 5-level paging. -- */ - ENTRY(trampoline_32bit_src) -+compatible_mode: - /* Set up data and stack segments */ - movl $__KERNEL_DS, %eax - movl %eax, %ds -@@ -580,61 +524,33 @@ ENTRY(trampoline_32bit_src) - btrl $X86_CR0_PG_BIT, %eax - movl %eax, %cr0 - -- /* Check what paging mode we want to be in after the trampoline */ -- cmpl $0, %edx -- jz 1f -+ /* Point CR3 to 5-level paging */ -+ leal lvl5_pgtable(%ebx), %eax -+ movl %eax, %cr3 - -- /* We want 5-level paging: don't touch CR3 if it already points to 5-level page tables */ -+ /* Enable PAE and LA57 mode */ - movl %cr4, %eax -- testl $X86_CR4_LA57, %eax -- jnz 3f -- jmp 2f --1: -- /* We want 4-level paging: don't touch CR3 if it already points to 4-level page tables */ -- movl %cr4, %eax -- testl $X86_CR4_LA57, %eax -- jz 3f --2: -- /* Point CR3 to the trampoline's new top level page table */ -- leal TRAMPOLINE_32BIT_PGTABLE_OFFSET(%ecx), %eax -- movl %eax, %cr3 --3: -- /* Enable PAE and LA57 (if required) paging modes */ -- movl $X86_CR4_PAE, %eax -- cmpl $0, %edx -- jz 1f -- orl $X86_CR4_LA57, %eax --1: -+ orl $(X86_CR4_PAE | X86_CR4_LA57), %eax - movl %eax, %cr4 - -- /* Calculate address of paging_enabled() once we are executing in the trampoline */ -- leal paging_enabled - trampoline_32bit_src + TRAMPOLINE_32BIT_CODE_OFFSET(%ecx), %eax -+ /* Calculate address we are running at */ -+ call 1f -+1: popl %edi -+ subl $1b, %edi - -- /* Prepare the stack for far return to Long Mode */ -+ /* Prepare stack for far return to Long Mode */ - pushl $__KERNEL_CS -- pushl %eax -+ leal lvl5(%edi), %eax -+ push %eax - -- /* Enable paging again */ -+ /* Enable paging back */ - movl $(X86_CR0_PG | X86_CR0_PE), %eax - movl %eax, %cr0 - - lret - -- .code64 --paging_enabled: -- /* Return from the trampoline */ -- jmp *%rdi -- -- /* -- * The trampoline code has a size limit. -- * Make sure we fail to compile if the trampoline code grows -- * beyond TRAMPOLINE_32BIT_CODE_SIZE bytes. -- */ -- .org trampoline_32bit_src + TRAMPOLINE_32BIT_CODE_SIZE -- -- .code32 - no_longmode: -- /* This isn't an x86-64 CPU, so hang intentionally, we cannot continue */ -+ /* This isn't an x86-64 CPU so hang */ - 1: - hlt - jmp 1b -@@ -695,10 +611,5 @@ boot_stack_end: - .balign 4096 - pgtable: - .fill BOOT_PGT_SIZE, 1, 0 -- --/* -- * The page table is going to be used instead of page table in the trampoline -- * memory. -- */ --top_pgtable: -+lvl5_pgtable: - .fill PAGE_SIZE, 1, 0 -diff --git a/arch/x86/boot/compressed/pgtable_64.c b/arch/x86/boot/compressed/pgtable_64.c -index a362fa0b849c..32af1cbcd903 100644 ---- a/arch/x86/boot/compressed/pgtable_64.c -+++ b/arch/x86/boot/compressed/pgtable_64.c -@@ -22,6 +22,14 @@ struct paging_config { - /* Buffer to preserve trampoline memory */ - static char trampoline_save[TRAMPOLINE_32BIT_SIZE]; - -+/* -+ * The page table is going to be used instead of page table in the trampoline -+ * memory. -+ * -+ * It must not be in BSS as BSS is cleared after cleanup_trampoline(). -+ */ -+static char top_pgtable[PAGE_SIZE] __aligned(PAGE_SIZE) __section(.data); -+ - /* - * Trampoline address will be printed by extract_kernel() for debugging - * purposes. -@@ -126,7 +134,7 @@ struct paging_config paging_prepare(void) - return paging_config; - } - --void cleanup_trampoline(void *pgtable) -+void cleanup_trampoline(void) - { - void *trampoline_pgtable; - -@@ -137,8 +145,8 @@ void cleanup_trampoline(void *pgtable) - * if it's there. - */ - if ((void *)__native_read_cr3() == trampoline_pgtable) { -- memcpy(pgtable, trampoline_pgtable, PAGE_SIZE); -- native_write_cr3((unsigned long)pgtable); -+ memcpy(top_pgtable, trampoline_pgtable, PAGE_SIZE); -+ native_write_cr3((unsigned long)top_pgtable); - } - - /* Restore trampoline memory */ diff --git a/sys-kernel/linux-sources-redcore-lts/files/4.19-uksm-linux-hardened.patch b/sys-kernel/linux-sources-redcore-lts/files/4.19-uksm-linux-hardened.patch index afb30db2..9237058b 100644 --- a/sys-kernel/linux-sources-redcore-lts/files/4.19-uksm-linux-hardened.patch +++ b/sys-kernel/linux-sources-redcore-lts/files/4.19-uksm-linux-hardened.patch @@ -1,6 +1,6 @@ diff -Nur a/Documentation/vm/00-INDEX b/Documentation/vm/00-INDEX ---- a/Documentation/vm/00-INDEX 2019-02-06 16:30:16.000000000 +0000 -+++ b/Documentation/vm/00-INDEX 2019-02-09 17:23:06.726863699 +0000 +--- a/Documentation/vm/00-INDEX 2019-06-11 11:20:57.000000000 +0100 ++++ b/Documentation/vm/00-INDEX 2019-06-19 19:34:58.729369555 +0100 @@ -18,6 +18,8 @@ - explains what hwpoison is ksm.rst @@ -12,7 +12,7 @@ diff -Nur a/Documentation/vm/00-INDEX b/Documentation/vm/00-INDEX numa.rst diff -Nur a/Documentation/vm/uksm.txt b/Documentation/vm/uksm.txt --- a/Documentation/vm/uksm.txt 1970-01-01 01:00:00.000000000 +0100 -+++ b/Documentation/vm/uksm.txt 2019-02-09 17:23:06.726863699 +0000 ++++ b/Documentation/vm/uksm.txt 2019-06-19 19:34:58.729369555 +0100 @@ -0,0 +1,61 @@ +The Ultra Kernel Samepage Merging feature +---------------------------------------------- @@ -76,8 +76,8 @@ diff -Nur a/Documentation/vm/uksm.txt b/Documentation/vm/uksm.txt +2016-09-10 UKSM 0.1.2.5 Fix a bug in dedup ratio calculation. +2017-02-26 UKSM 0.1.2.6 Fix a bug in hugetlbpage handling and a race bug with page migration. diff -Nur a/fs/exec.c b/fs/exec.c ---- a/fs/exec.c 2019-02-09 17:20:30.471820869 +0000 -+++ b/fs/exec.c 2019-02-09 17:26:11.522863979 +0000 +--- a/fs/exec.c 2019-06-19 19:33:03.485533722 +0100 ++++ b/fs/exec.c 2019-06-19 19:34:58.729369555 +0100 @@ -63,6 +63,7 @@ #include <linux/compat.h> #include <linux/vmalloc.h> @@ -95,8 +95,8 @@ diff -Nur a/fs/exec.c b/fs/exec.c } EXPORT_SYMBOL(setup_new_exec); diff -Nur a/fs/proc/meminfo.c b/fs/proc/meminfo.c ---- a/fs/proc/meminfo.c 2019-02-06 16:30:16.000000000 +0000 -+++ b/fs/proc/meminfo.c 2019-02-09 17:23:06.726863699 +0000 +--- a/fs/proc/meminfo.c 2019-06-11 11:20:57.000000000 +0100 ++++ b/fs/proc/meminfo.c 2019-06-19 19:34:58.729369555 +0100 @@ -106,6 +106,10 @@ global_zone_page_state(NR_KERNEL_STACK_KB)); show_val_kb(m, "PageTables: ", @@ -109,8 +109,8 @@ diff -Nur a/fs/proc/meminfo.c b/fs/proc/meminfo.c show_val_kb(m, "Quicklists: ", quicklist_total_size()); #endif diff -Nur a/include/asm-generic/pgtable.h b/include/asm-generic/pgtable.h ---- a/include/asm-generic/pgtable.h 2019-02-06 16:30:16.000000000 +0000 -+++ b/include/asm-generic/pgtable.h 2019-02-09 17:23:06.726863699 +0000 +--- a/include/asm-generic/pgtable.h 2019-06-11 11:20:57.000000000 +0100 ++++ b/include/asm-generic/pgtable.h 2019-06-19 19:34:58.739369890 +0100 @@ -817,12 +817,25 @@ extern void untrack_pfn_moved(struct vm_area_struct *vma); #endif @@ -148,8 +148,8 @@ diff -Nur a/include/asm-generic/pgtable.h b/include/asm-generic/pgtable.h static inline unsigned long my_zero_pfn(unsigned long addr) diff -Nur a/include/linux/ksm.h b/include/linux/ksm.h ---- a/include/linux/ksm.h 2019-02-06 16:30:16.000000000 +0000 -+++ b/include/linux/ksm.h 2019-02-09 17:23:06.726863699 +0000 +--- a/include/linux/ksm.h 2019-06-11 11:20:57.000000000 +0100 ++++ b/include/linux/ksm.h 2019-06-19 19:34:58.739369890 +0100 @@ -1,4 +1,4 @@ -/* SPDX-License-Identifier: GPL-2.0 */ +/* SPDX-License-Identifier: GPL-3.0 */ @@ -224,8 +224,8 @@ diff -Nur a/include/linux/ksm.h b/include/linux/ksm.h + #endif /* __LINUX_KSM_H */ diff -Nur a/include/linux/mm_types.h b/include/linux/mm_types.h ---- a/include/linux/mm_types.h 2019-02-06 16:30:16.000000000 +0000 -+++ b/include/linux/mm_types.h 2019-02-09 17:23:06.726863699 +0000 +--- a/include/linux/mm_types.h 2019-06-11 11:20:57.000000000 +0100 ++++ b/include/linux/mm_types.h 2019-06-19 19:34:58.739369890 +0100 @@ -323,6 +323,9 @@ struct mempolicy *vm_policy; /* NUMA policy for the VMA */ #endif @@ -237,8 +237,8 @@ diff -Nur a/include/linux/mm_types.h b/include/linux/mm_types.h struct core_thread { diff -Nur a/include/linux/mmzone.h b/include/linux/mmzone.h ---- a/include/linux/mmzone.h 2019-02-06 16:30:16.000000000 +0000 -+++ b/include/linux/mmzone.h 2019-02-09 17:23:06.726863699 +0000 +--- a/include/linux/mmzone.h 2019-06-11 11:20:57.000000000 +0100 ++++ b/include/linux/mmzone.h 2019-06-19 19:34:58.739369890 +0100 @@ -148,6 +148,9 @@ NR_ZSPAGES, /* allocated in zsmalloc */ #endif @@ -260,7 +260,7 @@ diff -Nur a/include/linux/mmzone.h b/include/linux/mmzone.h * @zone - pointer to struct zone variable diff -Nur a/include/linux/sradix-tree.h b/include/linux/sradix-tree.h --- a/include/linux/sradix-tree.h 1970-01-01 01:00:00.000000000 +0100 -+++ b/include/linux/sradix-tree.h 2019-02-09 17:23:06.726863699 +0000 ++++ b/include/linux/sradix-tree.h 2019-06-19 19:34:58.739369890 +0100 @@ -0,0 +1,77 @@ +#ifndef _LINUX_SRADIX_TREE_H +#define _LINUX_SRADIX_TREE_H @@ -341,7 +341,7 @@ diff -Nur a/include/linux/sradix-tree.h b/include/linux/sradix-tree.h +#endif /* _LINUX_SRADIX_TREE_H */ diff -Nur a/include/linux/uksm.h b/include/linux/uksm.h --- a/include/linux/uksm.h 1970-01-01 01:00:00.000000000 +0100 -+++ b/include/linux/uksm.h 2019-02-09 17:23:06.726863699 +0000 ++++ b/include/linux/uksm.h 2019-06-19 19:34:58.739369890 +0100 @@ -0,0 +1,149 @@ +#ifndef __LINUX_UKSM_H +#define __LINUX_UKSM_H @@ -493,8 +493,8 @@ diff -Nur a/include/linux/uksm.h b/include/linux/uksm.h +#endif /* !CONFIG_UKSM */ +#endif /* __LINUX_UKSM_H */ diff -Nur a/kernel/fork.c b/kernel/fork.c ---- a/kernel/fork.c 2019-02-09 17:20:30.481821193 +0000 -+++ b/kernel/fork.c 2019-02-09 17:23:06.736864024 +0000 +--- a/kernel/fork.c 2019-06-19 19:33:03.505534386 +0100 ++++ b/kernel/fork.c 2019-06-19 19:34:58.739369890 +0100 @@ -543,7 +543,7 @@ __vma_link_rb(mm, tmp, rb_link, rb_parent); rb_link = &tmp->vm_rb.rb_right; @@ -505,10 +505,10 @@ diff -Nur a/kernel/fork.c b/kernel/fork.c if (!(tmp->vm_flags & VM_WIPEONFORK)) retval = copy_page_range(mm, oldmm, mpnt); diff -Nur a/lib/Makefile b/lib/Makefile ---- a/lib/Makefile 2019-02-06 16:30:16.000000000 +0000 -+++ b/lib/Makefile 2019-02-09 17:23:06.736864024 +0000 -@@ -18,7 +18,7 @@ - KCOV_INSTRUMENT_dynamic_debug.o := n +--- a/lib/Makefile 2019-06-11 11:20:57.000000000 +0100 ++++ b/lib/Makefile 2019-06-19 19:34:58.739369890 +0100 +@@ -29,7 +29,7 @@ + endif lib-y := ctype.o string.o vsprintf.o cmdline.o \ - rbtree.o radix-tree.o timerqueue.o\ @@ -518,7 +518,7 @@ diff -Nur a/lib/Makefile b/lib/Makefile flex_proportions.o ratelimit.o show_mem.o \ diff -Nur a/lib/sradix-tree.c b/lib/sradix-tree.c --- a/lib/sradix-tree.c 1970-01-01 01:00:00.000000000 +0100 -+++ b/lib/sradix-tree.c 2019-02-09 17:23:06.736864024 +0000 ++++ b/lib/sradix-tree.c 2019-06-19 19:34:58.739369890 +0100 @@ -0,0 +1,476 @@ +#include <linux/errno.h> +#include <linux/mm.h> @@ -997,8 +997,8 @@ diff -Nur a/lib/sradix-tree.c b/lib/sradix-tree.c + return 0; +} diff -Nur a/mm/Kconfig b/mm/Kconfig ---- a/mm/Kconfig 2019-02-09 17:20:30.491821512 +0000 -+++ b/mm/Kconfig 2019-02-09 17:23:06.736864024 +0000 +--- a/mm/Kconfig 2019-06-19 19:33:03.515534719 +0100 ++++ b/mm/Kconfig 2019-06-19 19:34:58.739369890 +0100 @@ -307,6 +307,32 @@ See Documentation/vm/ksm.rst for more information: KSM is inactive until a program has madvised that an area is MADV_MERGEABLE, and @@ -1033,8 +1033,8 @@ diff -Nur a/mm/Kconfig b/mm/Kconfig config DEFAULT_MMAP_MIN_ADDR int "Low address space to protect from user allocation" diff -Nur a/mm/ksm.c b/mm/ksm.c ---- a/mm/ksm.c 2019-02-06 16:30:16.000000000 +0000 -+++ b/mm/ksm.c 2019-02-09 17:23:06.736864024 +0000 +--- a/mm/ksm.c 2019-06-11 11:20:57.000000000 +0100 ++++ b/mm/ksm.c 2019-06-19 19:34:58.739369890 +0100 @@ -842,17 +842,6 @@ return err; } @@ -1054,8 +1054,8 @@ diff -Nur a/mm/ksm.c b/mm/ksm.c /* * Only called through the sysfs control interface: diff -Nur a/mm/Makefile b/mm/Makefile ---- a/mm/Makefile 2019-02-06 16:30:16.000000000 +0000 -+++ b/mm/Makefile 2019-02-09 17:23:06.736864024 +0000 +--- a/mm/Makefile 2019-06-11 11:20:57.000000000 +0100 ++++ b/mm/Makefile 2019-06-19 19:34:58.739369890 +0100 @@ -64,7 +64,8 @@ obj-$(CONFIG_SPARSEMEM_VMEMMAP) += sparse-vmemmap.o obj-$(CONFIG_SLOB) += slob.o @@ -1067,8 +1067,8 @@ diff -Nur a/mm/Makefile b/mm/Makefile obj-$(CONFIG_SLAB) += slab.o obj-$(CONFIG_SLUB) += slub.o diff -Nur a/mm/memory.c b/mm/memory.c ---- a/mm/memory.c 2019-02-06 16:30:16.000000000 +0000 -+++ b/mm/memory.c 2019-02-09 17:23:06.736864024 +0000 +--- a/mm/memory.c 2019-06-11 11:20:57.000000000 +0100 ++++ b/mm/memory.c 2019-06-19 19:34:58.739369890 +0100 @@ -128,6 +128,25 @@ unsigned long highest_memmap_pfn __read_mostly; @@ -1134,7 +1134,7 @@ diff -Nur a/mm/memory.c b/mm/memory.c if (!PageAnon(page)) { if (pte_dirty(ptent)) { -@@ -2353,8 +2380,10 @@ +@@ -2359,8 +2386,10 @@ clear_page(kaddr); kunmap_atomic(kaddr); flush_dcache_page(dst); @@ -1146,7 +1146,7 @@ diff -Nur a/mm/memory.c b/mm/memory.c } static gfp_t __get_fault_gfp_mask(struct vm_area_struct *vma) -@@ -2503,6 +2532,7 @@ +@@ -2509,6 +2538,7 @@ vmf->address); if (!new_page) goto oom; @@ -1154,7 +1154,7 @@ diff -Nur a/mm/memory.c b/mm/memory.c } else { new_page = alloc_page_vma(GFP_HIGHUSER_MOVABLE, vma, vmf->address); -@@ -2529,7 +2559,9 @@ +@@ -2535,7 +2565,9 @@ mm_counter_file(old_page)); inc_mm_counter_fast(mm, MM_ANONPAGES); } @@ -1165,17 +1165,17 @@ diff -Nur a/mm/memory.c b/mm/memory.c } flush_cache_page(vma, vmf->address, pte_pfn(vmf->orig_pte)); diff -Nur a/mm/mmap.c b/mm/mmap.c ---- a/mm/mmap.c 2019-02-09 17:20:30.491821512 +0000 -+++ b/mm/mmap.c 2019-02-09 17:23:06.736864024 +0000 +--- a/mm/mmap.c 2019-06-19 19:33:03.515534719 +0100 ++++ b/mm/mmap.c 2019-06-19 19:35:33.710535047 +0100 @@ -45,6 +45,7 @@ #include <linux/moduleparam.h> #include <linux/pkeys.h> #include <linux/oom.h> +#include <linux/ksm.h> + #include <linux/sched/mm.h> #include <linux/uaccess.h> - #include <asm/cacheflush.h> -@@ -182,6 +183,7 @@ +@@ -183,6 +184,7 @@ if (vma->vm_file) fput(vma->vm_file); mpol_put(vma_policy(vma)); @@ -1183,7 +1183,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c vm_area_free(vma); return next; } -@@ -708,9 +710,16 @@ +@@ -709,9 +711,16 @@ long adjust_next = 0; int remove_next = 0; @@ -1200,7 +1200,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c if (end >= next->vm_end) { /* * vma expands, overlapping all the next, and -@@ -843,6 +852,7 @@ +@@ -844,6 +853,7 @@ end_changed = true; } vma->vm_pgoff = pgoff; @@ -1208,7 +1208,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c if (adjust_next) { next->vm_start += adjust_next << PAGE_SHIFT; next->vm_pgoff += adjust_next; -@@ -948,6 +958,7 @@ +@@ -949,6 +959,7 @@ if (remove_next == 2) { remove_next = 1; end = next->vm_end; @@ -1216,7 +1216,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c goto again; } else if (next) -@@ -974,10 +985,14 @@ +@@ -975,10 +986,14 @@ */ VM_WARN_ON(mm->highest_vm_end != vm_end_gap(vma)); } @@ -1231,7 +1231,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c validate_mm(mm); return 0; -@@ -1434,6 +1449,9 @@ +@@ -1435,6 +1450,9 @@ vm_flags |= calc_vm_prot_bits(prot, pkey) | calc_vm_flag_bits(flags) | mm->def_flags | VM_MAYREAD | VM_MAYWRITE | VM_MAYEXEC; @@ -1241,7 +1241,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c if (flags & MAP_LOCKED) if (!can_do_mlock()) return -EPERM; -@@ -1798,6 +1816,7 @@ +@@ -1799,6 +1817,7 @@ allow_write_access(file); } file = vma->vm_file; @@ -1249,7 +1249,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c out: perf_event_mmap(vma); -@@ -1840,6 +1859,7 @@ +@@ -1841,6 +1860,7 @@ if (vm_flags & VM_DENYWRITE) allow_write_access(file); free_vma: @@ -1257,7 +1257,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c vm_area_free(vma); unacct_error: if (charged) -@@ -2659,6 +2679,8 @@ +@@ -2663,6 +2683,8 @@ else err = vma_adjust(vma, vma->vm_start, addr, vma->vm_pgoff, new); @@ -1266,7 +1266,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c /* Success. */ if (!err) return 0; -@@ -2944,6 +2966,7 @@ +@@ -2948,6 +2970,7 @@ if ((flags & (~VM_EXEC)) != 0) return -EINVAL; flags |= VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags; @@ -1274,7 +1274,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c error = get_unmapped_area(NULL, addr, len, 0, MAP_FIXED); if (offset_in_page(error)) -@@ -3000,6 +3023,7 @@ +@@ -3004,6 +3027,7 @@ vma->vm_flags = flags; vma->vm_page_prot = vm_get_page_prot(flags); vma_link(mm, vma, prev, rb_link, rb_parent); @@ -1282,7 +1282,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c out: perf_event_mmap(vma); mm->total_vm += len >> PAGE_SHIFT; -@@ -3077,6 +3101,12 @@ +@@ -3081,6 +3105,12 @@ up_write(&mm->mmap_sem); } @@ -1295,7 +1295,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c if (mm->locked_vm) { vma = mm->mmap; while (vma) { -@@ -3111,6 +3141,11 @@ +@@ -3115,6 +3145,11 @@ vma = remove_vma(vma); } vm_unacct_memory(nr_accounted); @@ -1307,7 +1307,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c } /* Insert vm structure into process list sorted by address -@@ -3218,6 +3253,7 @@ +@@ -3222,6 +3257,7 @@ new_vma->vm_ops->open(new_vma); vma_link(mm, new_vma, prev, rb_link, rb_parent); *need_rmap_locks = false; @@ -1315,7 +1315,7 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c } return new_vma; -@@ -3368,6 +3404,7 @@ +@@ -3372,6 +3408,7 @@ vm_stat_account(mm, vma->vm_flags, len >> PAGE_SHIFT); perf_event_mmap(vma); @@ -1324,8 +1324,8 @@ diff -Nur a/mm/mmap.c b/mm/mmap.c return vma; diff -Nur a/mm/rmap.c b/mm/rmap.c ---- a/mm/rmap.c 2019-02-06 16:30:16.000000000 +0000 -+++ b/mm/rmap.c 2019-02-09 17:23:06.736864024 +0000 +--- a/mm/rmap.c 2019-06-11 11:20:57.000000000 +0100 ++++ b/mm/rmap.c 2019-06-19 19:34:58.749370222 +0100 @@ -1017,9 +1017,9 @@ /** @@ -1340,7 +1340,7 @@ diff -Nur a/mm/rmap.c b/mm/rmap.c static void __page_set_anon_rmap(struct page *page, diff -Nur a/mm/uksm.c b/mm/uksm.c --- a/mm/uksm.c 1970-01-01 01:00:00.000000000 +0100 -+++ b/mm/uksm.c 2019-02-09 17:23:06.736864024 +0000 ++++ b/mm/uksm.c 2019-06-19 19:34:58.749370222 +0100 @@ -0,0 +1,5584 @@ +/* + * Ultra KSM. Copyright (C) 2011-2012 Nai Xia @@ -6927,8 +6927,8 @@ diff -Nur a/mm/uksm.c b/mm/uksm.c +#endif + diff -Nur a/mm/vmstat.c b/mm/vmstat.c ---- a/mm/vmstat.c 2019-02-06 16:30:16.000000000 +0000 -+++ b/mm/vmstat.c 2019-02-09 17:23:06.736864024 +0000 +--- a/mm/vmstat.c 2019-06-11 11:20:57.000000000 +0100 ++++ b/mm/vmstat.c 2019-06-19 19:34:58.749370222 +0100 @@ -1163,6 +1163,9 @@ "nr_written", "", /* nr_indirectly_reclaimable */ diff --git a/sys-kernel/linux-sources-redcore-lts/linux-sources-redcore-lts-4.19.20-r2.ebuild b/sys-kernel/linux-sources-redcore-lts/linux-sources-redcore-lts-4.19.50.ebuild index bbab8f6d..728f21db 100644 --- a/sys-kernel/linux-sources-redcore-lts/linux-sources-redcore-lts-4.19.20-r2.ebuild +++ b/sys-kernel/linux-sources-redcore-lts/linux-sources-redcore-lts-4.19.50.ebuild @@ -5,7 +5,7 @@ EAPI=6 inherit eutils -EXTRAVERSION="redcore-lts-r2" +EXTRAVERSION="redcore-lts" KV_FULL="${PV}-${EXTRAVERSION}" KV_MAJOR="4.19" @@ -29,13 +29,11 @@ RDEPEND="${DEPEND}" PATCHES=( "${FILESDIR}"/"${KV_MAJOR}"-ata-fix-NCQ-LOG-strings-and-move-to-debug.patch - "${FILESDIR}"/"${KV_MAJOR}"-ath10k-drop-WARN_ON-added-in-cd93b83ad927b2c7979e0add0343ace59328b461.patch "${FILESDIR}"/"${KV_MAJOR}"-drop_ancient-and-wrong-msg.patch "${FILESDIR}"/"${KV_MAJOR}"-enable_alx_wol.patch "${FILESDIR}"/"${KV_MAJOR}"-mute-pps_state_mismatch.patch "${FILESDIR}"/"${KV_MAJOR}"-nouveau-pascal-backlight.patch "${FILESDIR}"/"${KV_MAJOR}"-radeon_dp_aux_transfer_native-no-ratelimited_debug.patch - "${FILESDIR}"/"${KV_MAJOR}"-revert-patches-causing-instant-reboot.patch "${FILESDIR}"/"${KV_MAJOR}"-linux-hardened.patch "${FILESDIR}"/"${KV_MAJOR}"-uksm-linux-hardened.patch "${FILESDIR}"/"${KV_MAJOR}"-0001-MultiQueue-Skiplist-Scheduler-version-v0.180-linux-hardened.patch @@ -52,7 +50,8 @@ PATCHES=( "${FILESDIR}"/"${KV_MAJOR}"-0012-Make-threaded-IRQs-optionally-the-default-which-can-.patch "${FILESDIR}"/"${KV_MAJOR}"-0013-Reinstate-default-Hz-of-100-in-combination-with-MuQS.patch "${FILESDIR}"/"${KV_MAJOR}"-0014-Swap-sucks.patch - "${FILESDIR}"/"${KV_MAJOR}"-0015-unfuck-MuQSS-on-linux-4_19_10+.patch + "${FILESDIR}"/"${KV_MAJOR}"-0015-unfuck-MuQSS-on-linux-4_19_10+.patch + "${FILESDIR}"/"${KV_MAJOR}"-0016-unfuck-MuQSS-on-linux-4_19_20+.patch ) |