diff options
author | Justin M. Forbes <jforbes@fedoraproject.org> | 2022-02-07 08:33:41 -0600 |
---|---|---|
committer | Justin M. Forbes <jforbes@fedoraproject.org> | 2022-02-07 08:33:41 -0600 |
commit | 41fdcbd07edcf0f918042b657707f922d0494815 (patch) | |
tree | 63aaa3ff408fd2d9033117ee75ab6f41290de202 /patch-5.17-redhat.patch | |
parent | 68ba353260623fddb6299236e43d3cca3e467528 (diff) | |
download | kernel-41fdcbd07edcf0f918042b657707f922d0494815.tar.gz kernel-41fdcbd07edcf0f918042b657707f922d0494815.tar.xz kernel-41fdcbd07edcf0f918042b657707f922d0494815.zip |
kernel-5.17-0.rc3.89
* Mon Feb 07 2022 Fedora Kernel Team <kernel-team@fedoraproject.org> [5.17-0.rc3.89]
- mm/sparsemem: Fix 'mem_section' will never be NULL gcc 12 warning (Waiman Long)
- Workaround for gcc12 compile issues in ubcmd-util.h (Justin M. Forbes)
Resolves: rhbz#
Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
Diffstat (limited to 'patch-5.17-redhat.patch')
-rw-r--r-- | patch-5.17-redhat.patch | 48 |
1 files changed, 17 insertions, 31 deletions
diff --git a/patch-5.17-redhat.patch b/patch-5.17-redhat.patch index 0055f7ffb..1c91ae821 100644 --- a/patch-5.17-redhat.patch +++ b/patch-5.17-redhat.patch @@ -75,8 +75,7 @@ security/lockdown/lockdown.c | 1 + security/security.c | 6 + tools/lib/subcmd/subcmd-util.h | 9 +- - tools/objtool/check.c | 2 +- - 78 files changed, 1749 insertions(+), 197 deletions(-) + 77 files changed, 1748 insertions(+), 196 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index f5a27f067db9..f4dc42f2f82a 100644 @@ -132,7 +131,7 @@ index 000000000000..effb81d04bfd + +endmenu diff --git a/Makefile b/Makefile -index 1fc3491096cb..cabf37d9d6ec 100644 +index ceb987e5c87b..b4e3cf779718 100644 --- a/Makefile +++ b/Makefile @@ -18,6 +18,10 @@ $(if $(filter __%, $(MAKECMDGOALS)), \ @@ -178,10 +177,10 @@ index 4c97cb40eebb..caf06cef3d2e 100644 The VM uses one page of physical memory for each page table. For systems with a lot of processes, this can use a lot of diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig -index f2b5a4abef21..ccff5b146754 100644 +index cbcd42decb2a..a2920cce2695 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig -@@ -1092,7 +1092,7 @@ endchoice +@@ -1108,7 +1108,7 @@ endchoice config ARM64_FORCE_52BIT bool "Force 52-bit virtual addresses for userspace" @@ -190,7 +189,7 @@ index f2b5a4abef21..ccff5b146754 100644 help For systems with 52-bit userspace VAs enabled, the kernel will attempt to maintain compatibility with older software by providing 48-bit VAs -@@ -1334,6 +1334,7 @@ config XEN +@@ -1350,6 +1350,7 @@ config XEN config FORCE_MAX_ZONEORDER int default "14" if ARM64_64K_PAGES @@ -659,7 +658,7 @@ index c59265146e9c..caa8458edde2 100644 rv = ipmi_register_driver(); mutex_unlock(&ipmi_interfaces_mutex); diff --git a/drivers/char/random.c b/drivers/char/random.c -index 68613f0b6887..8198a831e626 100644 +index 3404a91edf29..184dbb94710c 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -344,6 +344,7 @@ @@ -706,7 +705,7 @@ index 68613f0b6887..8198a831e626 100644 static int write_pool(const char __user *buffer, size_t count) { size_t bytes; -@@ -1876,7 +1892,58 @@ static int random_fasync(int fd, struct file *filp, int on) +@@ -1879,7 +1895,58 @@ static int random_fasync(int fd, struct file *filp, int on) return fasync_helper(fd, filp, on, &fasync); } @@ -765,7 +764,7 @@ index 68613f0b6887..8198a831e626 100644 .read = random_read, .write = random_write, .poll = random_poll, -@@ -1887,6 +1954,7 @@ const struct file_operations random_fops = { +@@ -1890,6 +1957,7 @@ const struct file_operations random_fops = { }; const struct file_operations urandom_fops = { @@ -773,7 +772,7 @@ index 68613f0b6887..8198a831e626 100644 .read = urandom_read, .write = random_write, .unlocked_ioctl = random_ioctl, -@@ -1895,9 +1963,31 @@ const struct file_operations urandom_fops = { +@@ -1898,9 +1966,31 @@ const struct file_operations urandom_fops = { .llseek = noop_llseek, }; @@ -805,7 +804,7 @@ index 68613f0b6887..8198a831e626 100644 int ret; if (flags & ~(GRND_NONBLOCK | GRND_RANDOM | GRND_INSECURE)) -@@ -1913,6 +2003,18 @@ SYSCALL_DEFINE3(getrandom, char __user *, buf, size_t, count, unsigned int, +@@ -1916,6 +2006,18 @@ SYSCALL_DEFINE3(getrandom, char __user *, buf, size_t, count, unsigned int, if (count > INT_MAX) count = INT_MAX; @@ -824,7 +823,7 @@ index 68613f0b6887..8198a831e626 100644 if (!(flags & GRND_INSECURE) && !crng_ready()) { if (flags & GRND_NONBLOCK) return -EAGAIN; -@@ -2230,3 +2332,16 @@ void add_bootloader_randomness(const void *buf, unsigned int size) +@@ -2235,3 +2337,16 @@ void add_bootloader_randomness(const void *buf, unsigned int size) add_device_randomness(buf, size); } EXPORT_SYMBOL_GPL(add_bootloader_randomness); @@ -1386,7 +1385,7 @@ index 258d5fe3d395..f7298e3dc8f3 100644 if (data->f01_container->dev.driver) { /* Driver already bound, so enable ATTN now. */ diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c -index 8b86406b7162..2dffe129b902 100644 +index 107dcf5938d6..225a9797e39d 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -7,6 +7,7 @@ @@ -1397,7 +1396,7 @@ index 8b86406b7162..2dffe129b902 100644 #include <linux/dma-iommu.h> #include <linux/kernel.h> #include <linux/bits.h> -@@ -3119,6 +3120,27 @@ u32 iommu_sva_get_pasid(struct iommu_sva *handle) +@@ -3124,6 +3125,27 @@ u32 iommu_sva_get_pasid(struct iommu_sva *handle) } EXPORT_SYMBOL_GPL(iommu_sva_get_pasid); @@ -1554,7 +1553,7 @@ index ee4da9ab8013..0f217997a764 100644 err_netlink: diff --git a/drivers/nvme/host/core.c b/drivers/nvme/host/core.c -index 5e0bfda04bd7..a03469d46842 100644 +index 961a5f8a44d2..3b125b6a5eeb 100644 --- a/drivers/nvme/host/core.c +++ b/drivers/nvme/host/core.c @@ -244,6 +244,9 @@ static void nvme_delete_ctrl_sync(struct nvme_ctrl *ctrl) @@ -2123,7 +2122,7 @@ index 38becd8d578c..f4ec685879cf 100644 queue_work(system_freezable_wq, &vm->wq); } diff --git a/fs/ext4/super.c b/fs/ext4/super.c -index ce60b5026bde..95211f35dae8 100644 +index c5021ca0a28a..b64257a6eebc 100644 --- a/fs/ext4/super.c +++ b/fs/ext4/super.c @@ -4760,6 +4760,7 @@ static int __ext4_fill_super(struct fs_context *fc, struct super_block *sb) @@ -2146,10 +2145,10 @@ index ce60b5026bde..95211f35dae8 100644 if (ext4_has_feature_encrypt(sb) && es->s_encryption_level) { diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c -index e8f37bdc8354..f57bbc8feeee 100644 +index 4c0dee78b2f8..6cf5ed2d039a 100644 --- a/fs/xfs/xfs_super.c +++ b/fs/xfs/xfs_super.c -@@ -1598,9 +1598,14 @@ xfs_fs_fill_super( +@@ -1602,9 +1602,14 @@ xfs_fs_fill_super( sb->s_flags |= SB_I_VERSION; if (xfs_has_dax_always(mp)) { @@ -3458,16 +3457,3 @@ index 794a375dad36..7009fc176636 100644 if (!ret) die("Out of memory, realloc failed"); } -diff --git a/tools/objtool/check.c b/tools/objtool/check.c -index c2d2ab9a2861..f5bed94e4558 100644 ---- a/tools/objtool/check.c -+++ b/tools/objtool/check.c -@@ -2854,7 +2854,7 @@ static inline bool func_uaccess_safe(struct symbol *func) - - static inline const char *call_dest_name(struct instruction *insn) - { -- static char pvname[16]; -+ static char pvname[32]; - struct reloc *rel; - int idx; - |