Home Home > GIT Browse > SLE12-SP4-AZURE
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKernel Build Daemon <kbuild@suse.de>2019-01-19 07:04:39 +0100
committerKernel Build Daemon <kbuild@suse.de>2019-01-19 07:04:39 +0100
commitbd34f1817d1ae5fa786a24f4e67b23c3a9f09ff5 (patch)
tree8edc39cf02122354c267aaf855491c1e318d9ed3
parent067f33d6bdea4c9a9e4f24c436a0f6f805151c5d (diff)
parent7577e468abaa74ff9ecc8df16cdbe9d45ba74f9d (diff)
Merge branch 'SLE15' into SLE12-SP4
-rw-r--r--blacklist.conf5
-rw-r--r--patches.arch/powerpc-powernv-Clear-LPCR-PECE1-via-stop-api-only-f.patch62
-rw-r--r--patches.arch/powerpc-powernv-Clear-PECE1-in-LPCR-via-stop-api-onl.patch122
-rw-r--r--patches.arch/powerpc-powernv-Provide-a-way-to-force-a-core-into-S.patch25
-rw-r--r--patches.arch/x86-mm-drop-usage-of-_flush_tlb_all-in-kernel_physical_mapping_init.patch92
-rw-r--r--patches.arch/x86-modpost-replace-last-remnants-of-retpoline-with-config_retpoline.patch83
-rw-r--r--patches.arch/x86-resctrl-fix-rdt_find_domain-return-value-and-checks.patch65
-rw-r--r--patches.arch/x86-retpoline-make-config_retpoline-depend-on-compiler-support.patch10
-rw-r--r--patches.arch/x86-speculation-add-retpoline_amd-support-to-the-inline-asm-call_nospec-variant.patch75
-rw-r--r--patches.drivers/Input-elan_i2c-add-ACPI-ID-for-touchpad-in-ASUS-Aspi.patch35
-rw-r--r--patches.drivers/Input-omap-keypad-fix-idle-configuration-to-not-bloc.patch84
-rw-r--r--patches.drivers/Input-restore-EV_ABS-ABS_RESERVED.patch45
-rw-r--r--patches.drivers/Input-synaptics-enable-RMI-on-ThinkPad-T560.patch37
-rw-r--r--patches.drivers/Input-synaptics-enable-SMBus-for-HP-EliteBook-840-G4.patch54
-rw-r--r--patches.drm/drm-nouveau-Don-t-disable-polling-in-fallback-mode.patch12
-rw-r--r--patches.fixes/kvm-sev-fail-kvm_sev_init-if-already-initialized.patch42
-rw-r--r--patches.suse/net-skb_scrub_packet-Scrub-offload_fwd_mark.patch49
-rw-r--r--patches.suse/net-thunderx-set-tso_hdrs-pointer-to-NULL-in-nicvf_f.patch100
-rw-r--r--patches.suse/net-thunderx-set-xdp_prog-to-NULL-if-bpf_prog_add-fa.patch54
-rw-r--r--patches.suse/rapidio-rionet-do-not-free-skb-before-reading-its-le.patch36
-rw-r--r--patches.suse/usbnet-ipheth-fix-potential-recvmsg-bug-and-recvmsg-.patch166
-rw-r--r--patches.suse/virtio-net-fail-XDP-set-if-guest-csum-is-negotiated.patch37
-rw-r--r--series.conf20
23 files changed, 1280 insertions, 30 deletions
diff --git a/blacklist.conf b/blacklist.conf
index 1a07ca00a0..5d26b5a58e 100644
--- a/blacklist.conf
+++ b/blacklist.conf
@@ -986,5 +986,10 @@ af27d9403f5b80685b79c88425086edccecaf711 # Warning applies to unsupported config
613a5eb5677923fdaecfa582738c7bcf80abe186 # Problem affects debugging builds only and is harmless
d50d82faa0c964e31f7a946ba8aba7c715ca7ab0 # Problem affects SLUB which is not enabled in kconfig
8363dae23463df5d27aa3f3430ad64f5c8fcee3e # Not applicable for SLE15
+68239654acafe6aad5a3c1dc7237e60accfebc03 # triggers only on 32-bit
+ac3e233d29f7f77f28243af0132057d378d3ea58 # LLVM fix
+dbe27a002ef8573168cb64e181458ea23a74e2b6 # clang-specific
+238bcbc4e07fad2fff99c5b157d0c37ccd4d093c # ditto
+3bd9805090af843b25f97ffe5049f20ade1d86d6 # ditto
6508497cbdc70b92130fbca57402af6a94e05d20 # patch misattributed
9ff067ff4c4a08d412e51307f11f7de3fb3045e7 # cosmetic cleanup
diff --git a/patches.arch/powerpc-powernv-Clear-LPCR-PECE1-via-stop-api-only-f.patch b/patches.arch/powerpc-powernv-Clear-LPCR-PECE1-via-stop-api-only-f.patch
new file mode 100644
index 0000000000..34cae27e91
--- /dev/null
+++ b/patches.arch/powerpc-powernv-Clear-LPCR-PECE1-via-stop-api-only-f.patch
@@ -0,0 +1,62 @@
+From 5d298baa41883fc421acfd932799c0f4177249ae Mon Sep 17 00:00:00 2001
+From: "Gautham R. Shenoy" <ego@linux.vnet.ibm.com>
+Date: Thu, 31 Aug 2017 17:17:41 +0530
+Subject: [PATCH] powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep
+ state offline
+
+References: bsc#1119766, bsc#1055121
+Patch-mainline: v4.14-rc2
+Git-commit: 5d298baa41883fc421acfd932799c0f4177249ae
+
+Commit 24be85a23d1f ("powerpc/powernv: Clear PECE1 in LPCR via
+stop-api only on Hotplug") clears the PECE1 bit of the LPCR via
+stop-api during CPU-Hotplug to prevent wakeup due to a decrementer on
+an offlined CPU which is in a deep stop state.
+
+In the case where the stop-api support is found to be lacking, the
+commit 785a12afdb4a ("powerpc/powernv/idle: Disable LOSE_FULL_CONTEXT
+states when stop-api fails") disables deep states that lose hypervisor
+context. Thus in this case, the offlined CPU will be put to some
+shallow idle state.
+
+However, we currently unconditionally clear the PECE1 in LPCR via
+stop-api during CPU-Hotplug even when deep states are disabled due to
+stop-api failure.
+
+Fix this by clearing PECE1 of LPCR via stop-api during CPU-Hotplug
+*only* when the offlined CPU will be put to a deep state that loses
+hypervisor context.
+
+Fixes: 24be85a23d1f ("powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug")
+Reported-by: Pavithra Prakash <pavirampu@linux.vnet.ibm.com>
+Signed-off-by: Gautham R. Shenoy <ego@linux.vnet.ibm.com>
+Reviewed-by: Nicholas Piggin <npiggin@gmail.com>
+Tested-by: Pavithra Prakash <pavrampu@linux.vnet.ibm.com>
+Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
+Acked-by: Michal Suchanek <msuchanek@suse.de>
+---
+ arch/powerpc/platforms/powernv/idle.c | 8 +++++++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/arch/powerpc/platforms/powernv/idle.c b/arch/powerpc/platforms/powernv/idle.c
+index 9f59041a172b..443d5ca71995 100644
+--- a/arch/powerpc/platforms/powernv/idle.c
++++ b/arch/powerpc/platforms/powernv/idle.c
+@@ -393,7 +393,13 @@ static void pnv_program_cpu_hotplug_lpcr(unsigned int cpu, u64 lpcr_val)
+ u64 pir = get_hard_smp_processor_id(cpu);
+
+ mtspr(SPRN_LPCR, lpcr_val);
+- opal_slw_set_reg(pir, SPRN_LPCR, lpcr_val);
++
++ /*
++ * Program the LPCR via stop-api only if the deepest stop state
++ * can lose hypervisor context.
++ */
++ if (supported_cpuidle_states & OPAL_PM_LOSE_FULL_CONTEXT)
++ opal_slw_set_reg(pir, SPRN_LPCR, lpcr_val);
+ }
+
+ /*
+--
+2.19.2
+
diff --git a/patches.arch/powerpc-powernv-Clear-PECE1-in-LPCR-via-stop-api-onl.patch b/patches.arch/powerpc-powernv-Clear-PECE1-in-LPCR-via-stop-api-onl.patch
new file mode 100644
index 0000000000..3cef3c8219
--- /dev/null
+++ b/patches.arch/powerpc-powernv-Clear-PECE1-in-LPCR-via-stop-api-onl.patch
@@ -0,0 +1,122 @@
+From 24be85a23d1fcdc72264a062a2e4ebaaea48feab Mon Sep 17 00:00:00 2001
+From: "Gautham R. Shenoy" <ego@linux.vnet.ibm.com>
+Date: Fri, 21 Jul 2017 16:31:34 +0530
+Subject: [PATCH] powerpc/powernv: Clear PECE1 in LPCR via stop-api only on
+ Hotplug
+
+References: bsc#1119766, bsc#1055121
+Patch-mainline: v4.14-rc1
+Git-commit: 24be85a23d1fcdc72264a062a2e4ebaaea48feab
+
+Currently we use the stop-api provided by the firmware to program the
+SLW engine to restore the values of hypervisor resources that get lost
+on deeper idle states (such as winkle). Since the deep states were
+only used for CPU-Hotplug on POWER8 systems, we would program the LPCR
+to have the PECE1 bit since Hotplugged CPUs shouldn't be spuriously
+woken up by decrementer.
+
+On POWER9, some of the deep platform idle states such as stop4 can be
+used in cpuidle as well. In this case, we want the CPU in stop4 to be
+woken up by the decrementer when some timer on the CPU expires.
+
+In this patch, we program the stop-api for LPCR with PECE1
+bit cleared only when we are offlining the CPU and set it
+back once the CPU is online.
+
+Signed-off-by: Gautham R. Shenoy <ego@linux.vnet.ibm.com>
+Reviewed-by: Nicholas Piggin <npiggin@gmail.com>
+Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
+Acked-by: Michal Suchanek <msuchanek@suse.de>
+---
+ arch/powerpc/platforms/powernv/idle.c | 34 ++++++++++++++++++++++++++-
+ arch/powerpc/platforms/powernv/smp.c | 8 -------
+ 2 files changed, 33 insertions(+), 9 deletions(-)
+
+--- a/arch/powerpc/platforms/powernv/idle.c
++++ b/arch/powerpc/platforms/powernv/idle.c
+@@ -69,7 +69,7 @@ static int pnv_save_sprs_for_deep_states
+ * all cpus at boot. Get these reg values of current cpu and use the
+ * same across all cpus.
+ */
+- uint64_t lpcr_val = mfspr(SPRN_LPCR) & ~(u64)LPCR_PECE1;
++ uint64_t lpcr_val = mfspr(SPRN_LPCR);
+ uint64_t hid0_val = mfspr(SPRN_HID0);
+ uint64_t hid1_val = mfspr(SPRN_HID1);
+ uint64_t hid4_val = mfspr(SPRN_HID4);
+@@ -388,6 +388,14 @@ void power9_idle(void)
+ }
+
+ #ifdef CONFIG_HOTPLUG_CPU
++static void pnv_program_cpu_hotplug_lpcr(unsigned int cpu, u64 lpcr_val)
++{
++ u64 pir = get_hard_smp_processor_id(cpu);
++
++ mtspr(SPRN_LPCR, lpcr_val);
++ opal_slw_set_reg(pir, SPRN_LPCR, lpcr_val);
++}
++
+ /*
+ * pnv_cpu_offline: A function that puts the CPU into the deepest
+ * available platform idle state on a CPU-Offline.
+@@ -397,6 +405,20 @@ unsigned long pnv_cpu_offline(unsigned i
+ {
+ unsigned long srr1;
+ u32 idle_states = pnv_get_supported_cpuidle_states();
++ u64 lpcr_val;
++
++ /*
++ * We don't want to take decrementer interrupts while we are
++ * offline, so clear LPCR:PECE1. We keep PECE2 (and
++ * LPCR_PECE_HVEE on P9) enabled as to let IPIs in.
++ *
++ * If the CPU gets woken up by a special wakeup, ensure that
++ * the SLW engine sets LPCR with decrementer bit cleared, else
++ * the CPU will come back to the kernel due to a spurious
++ * wakeup.
++ */
++ lpcr_val = mfspr(SPRN_LPCR) & ~(u64)LPCR_PECE1;
++ pnv_program_cpu_hotplug_lpcr(cpu, lpcr_val);
+
+ ppc64_runlatch_off();
+
+@@ -428,6 +450,16 @@ unsigned long pnv_cpu_offline(unsigned i
+
+ ppc64_runlatch_on();
+
++ /*
++ * Re-enable decrementer interrupts in LPCR.
++ *
++ * Further, we want stop states to be woken up by decrementer
++ * for non-hotplug cases. So program the LPCR via stop api as
++ * well.
++ */
++ lpcr_val = mfspr(SPRN_LPCR) | (u64)LPCR_PECE1;
++ pnv_program_cpu_hotplug_lpcr(cpu, lpcr_val);
++
+ return srr1;
+ }
+ #endif
+--- a/arch/powerpc/platforms/powernv/smp.c
++++ b/arch/powerpc/platforms/powernv/smp.c
+@@ -163,12 +163,6 @@ static void pnv_smp_cpu_kill_self(void)
+ if (cpu_has_feature(CPU_FTR_ARCH_207S))
+ wmask = SRR1_WAKEMASK_P8;
+
+- /* We don't want to take decrementer interrupts while we are offline,
+- * so clear LPCR:PECE1. We keep PECE2 (and LPCR_PECE_HVEE on P9)
+- * enabled as to let IPIs in.
+- */
+- mtspr(SPRN_LPCR, mfspr(SPRN_LPCR) & ~(u64)LPCR_PECE1);
+-
+ while (!generic_check_cpu_restart(cpu)) {
+ /*
+ * Clear IPI flag, since we don't handle IPIs while
+@@ -218,8 +212,6 @@ static void pnv_smp_cpu_kill_self(void)
+
+ }
+
+- /* Re-enable decrementer interrupts */
+- mtspr(SPRN_LPCR, mfspr(SPRN_LPCR) | LPCR_PECE1);
+ DBG("CPU%d coming online...\n", cpu);
+ }
+
diff --git a/patches.arch/powerpc-powernv-Provide-a-way-to-force-a-core-into-S.patch b/patches.arch/powerpc-powernv-Provide-a-way-to-force-a-core-into-S.patch
index 40f8a26c8d..3c50b9fa88 100644
--- a/patches.arch/powerpc-powernv-Provide-a-way-to-force-a-core-into-S.patch
+++ b/patches.arch/powerpc-powernv-Provide-a-way-to-force-a-core-into-S.patch
@@ -77,8 +77,6 @@ Acked-by: Michal Suchanek <msuchanek@suse.de>
arch/powerpc/platforms/powernv/idle.c | 81 +++++++++++++++++++++++++++++++
6 files changed, 110 insertions(+)
-diff --git a/arch/powerpc/include/asm/asm-prototypes.h b/arch/powerpc/include/asm/asm-prototypes.h
-index 7330150bfe34..4e14d2304d5f 100644
--- a/arch/powerpc/include/asm/asm-prototypes.h
+++ b/arch/powerpc/include/asm/asm-prototypes.h
@@ -126,4 +126,7 @@ extern int __ucmpdi2(u64, u64);
@@ -89,8 +87,6 @@ index 7330150bfe34..4e14d2304d5f 100644
+void pnv_power9_force_smt4_release(void);
+
#endif /* _ASM_POWERPC_ASM_PROTOTYPES_H */
-diff --git a/arch/powerpc/include/asm/paca.h b/arch/powerpc/include/asm/paca.h
-index 0ec7b1e383ef..6a8e7a307f43 100644
--- a/arch/powerpc/include/asm/paca.h
+++ b/arch/powerpc/include/asm/paca.h
@@ -32,6 +32,7 @@
@@ -110,11 +106,9 @@ index 0ec7b1e383ef..6a8e7a307f43 100644
/*
* Pointer to an array which contains pointer
* to the sibling threads' paca.
-diff --git a/arch/powerpc/include/asm/powernv.h b/arch/powerpc/include/asm/powernv.h
-index dc5f6a5d4575..d1c2d2e658cf 100644
--- a/arch/powerpc/include/asm/powernv.h
+++ b/arch/powerpc/include/asm/powernv.h
-@@ -40,6 +40,7 @@ static inline int pnv_npu2_handle_fault(struct npu_context *context,
+@@ -40,6 +40,7 @@ static inline int pnv_npu2_handle_fault(
}
static inline void pnv_tm_init(void) { }
@@ -122,11 +116,9 @@ index dc5f6a5d4575..d1c2d2e658cf 100644
#endif
#endif /* _ASM_POWERNV_H */
-diff --git a/arch/powerpc/kernel/asm-offsets.c b/arch/powerpc/kernel/asm-offsets.c
-index 04850b25cf3b..967d50c95fbc 100644
--- a/arch/powerpc/kernel/asm-offsets.c
+++ b/arch/powerpc/kernel/asm-offsets.c
-@@ -753,6 +753,7 @@ int main(void)
+@@ -757,6 +757,7 @@ int main(void)
OFFSET(PACA_SUBCORE_SIBLING_MASK, paca_struct, subcore_sibling_mask);
OFFSET(PACA_SIBLING_PACA_PTRS, paca_struct, thread_sibling_pacas);
OFFSET(PACA_REQ_PSSCR, paca_struct, requested_psscr);
@@ -134,8 +126,6 @@ index 04850b25cf3b..967d50c95fbc 100644
#define STOP_SPR(x, f) OFFSET(x, paca_struct, stop_sprs.f)
STOP_SPR(STOP_PID, pid);
STOP_SPR(STOP_LDBAR, ldbar);
-diff --git a/arch/powerpc/kernel/idle_book3s.S b/arch/powerpc/kernel/idle_book3s.S
-index 29cbaafb86b9..7300e0ca9799 100644
--- a/arch/powerpc/kernel/idle_book3s.S
+++ b/arch/powerpc/kernel/idle_book3s.S
@@ -339,6 +339,7 @@ power_enter_stop:
@@ -146,7 +136,7 @@ index 29cbaafb86b9..7300e0ca9799 100644
/*
* pnv_wakeup_noloss() expects r12 to contain the SRR1 value so
-@@ -429,11 +430,29 @@ ALT_FTR_SECTION_END_NESTED_IFSET(CPU_FTR_ARCH_207S, 66); \
+@@ -429,11 +430,29 @@ ALT_FTR_SECTION_END_NESTED_IFSET(CPU_FTR
* r3 contains desired PSSCR register value.
*/
_GLOBAL(power9_idle_stop)
@@ -185,8 +175,6 @@ index 29cbaafb86b9..7300e0ca9799 100644
cmpd cr4,r5,r4
bge cr4,pnv_wakeup_tb_loss /* returns to caller */
-diff --git a/arch/powerpc/platforms/powernv/idle.c b/arch/powerpc/platforms/powernv/idle.c
-index cf7f0c48fdd5..96a6a6de13a6 100644
--- a/arch/powerpc/platforms/powernv/idle.c
+++ b/arch/powerpc/platforms/powernv/idle.c
@@ -24,6 +24,7 @@
@@ -282,8 +270,5 @@ index cf7f0c48fdd5..96a6a6de13a6 100644
+#endif /* CONFIG_KVM_BOOK3S_HV_POSSIBLE */
+
#ifdef CONFIG_HOTPLUG_CPU
- /*
- * pnv_cpu_offline: A function that puts the CPU into the deepest
---
-2.13.6
-
+ static void pnv_program_cpu_hotplug_lpcr(unsigned int cpu, u64 lpcr_val)
+ {
diff --git a/patches.arch/x86-mm-drop-usage-of-_flush_tlb_all-in-kernel_physical_mapping_init.patch b/patches.arch/x86-mm-drop-usage-of-_flush_tlb_all-in-kernel_physical_mapping_init.patch
new file mode 100644
index 0000000000..97cd4c11b5
--- /dev/null
+++ b/patches.arch/x86-mm-drop-usage-of-_flush_tlb_all-in-kernel_physical_mapping_init.patch
@@ -0,0 +1,92 @@
+From: Dan Williams <dan.j.williams@intel.com>
+Date: Tue, 4 Dec 2018 13:37:27 -0800
+Subject: x86/mm: Drop usage of __flush_tlb_all() in
+ kernel_physical_mapping_init()
+Git-commit: ba6f508d0ec4adb09f0a939af6d5e19cdfa8667d
+Patch-mainline: v5.0-rc1
+References: bsc#1114279
+
+Commit:
+
+ f77084d96355 "x86/mm/pat: Disable preemption around __flush_tlb_all()"
+
+addressed a case where __flush_tlb_all() is called without preemption
+being disabled. It also left a warning to catch other cases where
+preemption is not disabled.
+
+That warning triggers for the memory hotplug path which is also used for
+persistent memory enabling:
+
+ WARNING: CPU: 35 PID: 911 at ./arch/x86/include/asm/tlbflush.h:460
+ RIP: 0010:__flush_tlb_all+0x1b/0x3a
+ [..]
+ Call Trace:
+ phys_pud_init+0x29c/0x2bb
+ kernel_physical_mapping_init+0xfc/0x219
+ init_memory_mapping+0x1a5/0x3b0
+ arch_add_memory+0x2c/0x50
+ devm_memremap_pages+0x3aa/0x610
+ pmem_attach_disk+0x585/0x700 [nd_pmem]
+
+Andy wondered why a path that can sleep was using __flush_tlb_all() [1]
+and Dave confirmed the expectation for TLB flush is for modifying /
+invalidating existing PTE entries, but not initial population [2]. Drop
+the usage of __flush_tlb_all() in phys_{p4d,pud,pmd}_init() on the
+expectation that this path is only ever populating empty entries for the
+linear map. Note, at linear map teardown time there is a call to the
+all-cpu flush_tlb_all() to invalidate the removed mappings.
+
+[1]: https://lkml.kernel.org/r/9DFD717D-857D-493D-A606-B635D72BAC21@amacapital.net
+[2]: https://lkml.kernel.org/r/749919a4-cdb1-48a3-adb4-adb81a5fa0b5@intel.com
+
+[ mingo: Minor readability edits. ]
+
+Suggested-by: Dave Hansen <dave.hansen@linux.intel.com>
+Reported-by: Andy Lutomirski <luto@kernel.org>
+Signed-off-by: Dan Williams <dan.j.williams@intel.com>
+Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
+Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
+Cc: <stable@vger.kernel.org>
+Cc: Borislav Petkov <bp@alien8.de>
+Cc: H. Peter Anvin <hpa@zytor.com>
+Cc: Linus Torvalds <torvalds@linux-foundation.org>
+Cc: Peter Zijlstra <peterz@infradead.org>
+Cc: Rik van Riel <riel@surriel.com>
+Cc: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
+Cc: Thomas Gleixner <tglx@linutronix.de>
+Cc: dave.hansen@intel.com
+Fixes: f77084d96355 ("x86/mm/pat: Disable preemption around __flush_tlb_all()")
+Link: http://lkml.kernel.org/r/154395944713.32119.15611079023837132638.stgit@dwillia2-desk3.amr.corp.intel.com
+Signed-off-by: Ingo Molnar <mingo@kernel.org>
+Acked-by: Borislav Petkov <bp@suse.de>
+---
+ arch/x86/mm/init_64.c | 4 ----
+ 1 file changed, 4 deletions(-)
+
+--- a/arch/x86/mm/init_64.c
++++ b/arch/x86/mm/init_64.c
+@@ -535,7 +535,6 @@ phys_pud_init(pud_t *pud_page, unsigned
+ paddr_end,
+ page_size_mask,
+ prot);
+- __flush_tlb_all();
+ continue;
+ }
+ /*
+@@ -578,7 +577,6 @@ phys_pud_init(pud_t *pud_page, unsigned
+ pud_populate(&init_mm, pud, pmd);
+ spin_unlock(&init_mm.page_table_lock);
+ }
+- __flush_tlb_all();
+
+ update_page_count(PG_LEVEL_1G, pages);
+
+@@ -633,8 +631,6 @@ kernel_physical_mapping_init(unsigned lo
+ if (pgd_changed)
+ sync_global_pgds(vaddr_start, vaddr_end - 1);
+
+- __flush_tlb_all();
+-
+ return paddr_last;
+ }
+
diff --git a/patches.arch/x86-modpost-replace-last-remnants-of-retpoline-with-config_retpoline.patch b/patches.arch/x86-modpost-replace-last-remnants-of-retpoline-with-config_retpoline.patch
new file mode 100644
index 0000000000..c8caf45b19
--- /dev/null
+++ b/patches.arch/x86-modpost-replace-last-remnants-of-retpoline-with-config_retpoline.patch
@@ -0,0 +1,83 @@
+From: WANG Chao <chao.wang@ucloud.cn>
+Date: Tue, 11 Dec 2018 00:37:25 +0800
+Subject: x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE
+Git-commit: e4f358916d528d479c3c12bd2fd03f2d5a576380
+Patch-mainline: v5.0-rc2
+References: bsc#1114279
+
+Commit
+
+ 4cd24de3a098 ("x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support")
+
+replaced the RETPOLINE define with CONFIG_RETPOLINE checks. Remove the
+remaining pieces.
+
+ [ bp: Massage commit message. ]
+
+Fixes: 4cd24de3a098 ("x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support")
+Signed-off-by: WANG Chao <chao.wang@ucloud.cn>
+Signed-off-by: Borislav Petkov <bp@suse.de>
+Reviewed-by: Zhenzhong Duan <zhenzhong.duan@oracle.com>
+Reviewed-by: Masahiro Yamada <yamada.masahiro@socionext.com>
+Cc: "H. Peter Anvin" <hpa@zytor.com>
+Cc: Andi Kleen <ak@linux.intel.com>
+Cc: Andrew Morton <akpm@linux-foundation.org>
+Cc: Andy Lutomirski <luto@kernel.org>
+Cc: Arnd Bergmann <arnd@arndb.de>
+Cc: Daniel Borkmann <daniel@iogearbox.net>
+Cc: David Woodhouse <dwmw@amazon.co.uk>
+Cc: Geert Uytterhoeven <geert@linux-m68k.org>
+Cc: Jessica Yu <jeyu@kernel.org>
+Cc: Jiri Kosina <jkosina@suse.cz>
+Cc: Kees Cook <keescook@chromium.org>
+Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
+Cc: Luc Van Oostenryck <luc.vanoostenryck@gmail.com>
+Cc: Michal Marek <michal.lkml@markovi.net>
+Cc: Miguel Ojeda <miguel.ojeda.sandonis@gmail.com>
+Cc: Peter Zijlstra <peterz@infradead.org>
+Cc: Tim Chen <tim.c.chen@linux.intel.com>
+Cc: Vasily Gorbik <gor@linux.ibm.com>
+Cc: linux-kbuild@vger.kernel.org
+Cc: srinivas.eeda@oracle.com
+Cc: stable <stable@vger.kernel.org>
+Cc: x86-ml <x86@kernel.org>
+Link: https://lkml.kernel.org/r/20181210163725.95977-1-chao.wang@ucloud.cn
+---
+ arch/x86/kernel/cpu/bugs.c | 2 +-
+ include/linux/module.h | 2 +-
+ scripts/mod/modpost.c | 2 +-
+ 3 files changed, 3 insertions(+), 3 deletions(-)
+
+--- a/arch/x86/kernel/cpu/bugs.c
++++ b/arch/x86/kernel/cpu/bugs.c
+@@ -331,7 +331,7 @@ static enum spectre_v2_mitigation spectr
+ static enum spectre_v2_user_mitigation spectre_v2_user __ro_after_init =
+ SPECTRE_V2_USER_NONE;
+
+-#ifdef RETPOLINE
++#ifdef CONFIG_RETPOLINE
+ static bool spectre_v2_bad_module;
+
+ bool retpoline_module_ok(bool has_retpoline)
+--- a/include/linux/module.h
++++ b/include/linux/module.h
+@@ -794,7 +794,7 @@ static inline void module_bug_finalize(c
+ static inline void module_bug_cleanup(struct module *mod) {}
+ #endif /* CONFIG_GENERIC_BUG */
+
+-#ifdef RETPOLINE
++#ifdef CONFIG_RETPOLINE
+ extern bool retpoline_module_ok(bool has_retpoline);
+ #else
+ static inline bool retpoline_module_ok(bool has_retpoline)
+--- a/scripts/mod/modpost.c
++++ b/scripts/mod/modpost.c
+@@ -2149,7 +2149,7 @@ static void add_intree_flag(struct buffe
+ /* Cannot check for assembler */
+ static void add_retpoline(struct buffer *b)
+ {
+- buf_printf(b, "\n#ifdef RETPOLINE\n");
++ buf_printf(b, "\n#ifdef CONFIG_RETPOLINE\n");
+ buf_printf(b, "MODULE_INFO(retpoline, \"Y\");\n");
+ buf_printf(b, "#endif\n");
+ }
diff --git a/patches.arch/x86-resctrl-fix-rdt_find_domain-return-value-and-checks.patch b/patches.arch/x86-resctrl-fix-rdt_find_domain-return-value-and-checks.patch
new file mode 100644
index 0000000000..31b55936bb
--- /dev/null
+++ b/patches.arch/x86-resctrl-fix-rdt_find_domain-return-value-and-checks.patch
@@ -0,0 +1,65 @@
+From: Reinette Chatre <reinette.chatre@intel.com>
+Date: Mon, 10 Dec 2018 14:31:13 -0800
+Subject: x86/resctrl: Fix rdt_find_domain() return value and checks
+Git-commit: 52eb74339a6233c69f4e3794b69ea7c98eeeae1b
+Patch-mainline: v5.0-rc1
+References: bsc#1114279
+
+rdt_find_domain() returns an ERR_PTR() that is generated from a provided
+domain id when the value is negative.
+
+Care needs to be taken when creating an ERR_PTR() from this value
+because a subsequent check using IS_ERR() expects the error to
+be within the MAX_ERRNO range. Using an invalid domain id as an
+ERR_PTR() does work at this time since this is currently always -1.
+Using this undocumented assumption is fragile since future users of
+rdt_find_domain() may not be aware of thus assumption.
+
+Two related issues are addressed:
+
+- Ensure that rdt_find_domain() always returns a valid error value by
+forcing the error to be -ENODEV when a negative domain id is provided.
+
+- In a few instances the return value of rdt_find_domain() is just
+checked for NULL - fix these to include a check of ERR_PTR.
+
+Fixes: d89b7379015f ("x86/intel_rdt/cqm: Add mon_data")
+Fixes: 521348b011d6 ("x86/intel_rdt: Introduce utility to obtain CDP peer")
+Signed-off-by: Reinette Chatre <reinette.chatre@intel.com>
+Signed-off-by: Borislav Petkov <bp@suse.de>
+Cc: "H. Peter Anvin" <hpa@zytor.com>
+Cc: Ingo Molnar <mingo@redhat.com>
+Cc: Thomas Gleixner <tglx@linutronix.de>
+Cc: Tony Luck <tony.luck@intel.com>
+Cc: fenghua.yu@intel.com
+Cc: gavin.hindman@intel.com
+Cc: jithu.joseph@intel.com
+Cc: x86-ml <x86@kernel.org>
+Link: https://lkml.kernel.org/r/b88cd4ff6a75995bf8db9b0ea546908fe50f69f3.1544479852.git.reinette.chatre@intel.com
+---
+ arch/x86/kernel/cpu/intel_rdt.c | 2 +-
+ arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c | 2 +-
+ 2 files changed, 2 insertions(+), 2 deletions(-)
+
+--- a/arch/x86/kernel/cpu/intel_rdt.c
++++ b/arch/x86/kernel/cpu/intel_rdt.c
+@@ -413,7 +413,7 @@ struct rdt_domain *rdt_find_domain(struc
+ struct list_head *l;
+
+ if (id < 0)
+- return ERR_PTR(id);
++ return ERR_PTR(-ENODEV);
+
+ list_for_each(l, &r->domains) {
+ d = list_entry(l, struct rdt_domain, list);
+--- a/arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c
++++ b/arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c
+@@ -351,7 +351,7 @@ int rdtgroup_mondata_show(struct seq_fil
+
+ r = &rdt_resources_all[resid];
+ d = rdt_find_domain(r, domid, NULL);
+- if (!d) {
++ if (IS_ERR_OR_NULL(d)) {
+ ret = -ENOENT;
+ goto out;
+ }
diff --git a/patches.arch/x86-retpoline-make-config_retpoline-depend-on-compiler-support.patch b/patches.arch/x86-retpoline-make-config_retpoline-depend-on-compiler-support.patch
index 0792befa86..fa68f83662 100644
--- a/patches.arch/x86-retpoline-make-config_retpoline-depend-on-compiler-support.patch
+++ b/patches.arch/x86-retpoline-make-config_retpoline-depend-on-compiler-support.patch
@@ -65,8 +65,8 @@ Acked-by: Borislav Petkov <bp@suse.de>
*/
# define CALL_NOSPEC \
ANNOTATE_NOSPEC_ALTERNATIVE \
-@@ -177,7 +178,7 @@
- X86_FEATURE_RETPOLINE)
+@@ -181,7 +182,7 @@
+ X86_FEATURE_RETPOLINE_AMD)
# define THUNK_TARGET(addr) [thunk_target] "r" (addr)
-#elif defined(CONFIG_X86_32) && defined(CONFIG_RETPOLINE)
@@ -74,8 +74,8 @@ Acked-by: Borislav Petkov <bp@suse.de>
/*
* For i386 we use the original ret-equivalent retpoline, because
* otherwise we'll run out of registers. We don't care about CET
-@@ -202,6 +203,7 @@
- X86_FEATURE_RETPOLINE)
+@@ -211,6 +212,7 @@
+ X86_FEATURE_RETPOLINE_AMD)
# define THUNK_TARGET(addr) [thunk_target] "rm" (addr)
+#endif
@@ -97,7 +97,7 @@ Acked-by: Borislav Petkov <bp@suse.de>
default n
--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
-@@ -368,7 +368,7 @@ static void __init spec2_print_if_secure
+@@ -369,7 +369,7 @@ static void __init spec2_print_if_secure
static inline bool retp_compiler(void)
{
diff --git a/patches.arch/x86-speculation-add-retpoline_amd-support-to-the-inline-asm-call_nospec-variant.patch b/patches.arch/x86-speculation-add-retpoline_amd-support-to-the-inline-asm-call_nospec-variant.patch
new file mode 100644
index 0000000000..daa17333b0
--- /dev/null
+++ b/patches.arch/x86-speculation-add-retpoline_amd-support-to-the-inline-asm-call_nospec-variant.patch
@@ -0,0 +1,75 @@
+From: Zhenzhong Duan <zhenzhong.duan@oracle.com>
+Date: Tue, 18 Sep 2018 07:45:00 -0700
+Subject: x86/speculation: Add RETPOLINE_AMD support to the inline asm
+ CALL_NOSPEC variant
+Git-commit: 0cbb76d6285794f30953bfa3ab831714b59dd700
+Patch-mainline: v4.20-rc1
+References: bsc#1114279
+
+..so that they match their asm counterpart.
+
+Add the missing ANNOTATE_NOSPEC_ALTERNATIVE in CALL_NOSPEC, while at it.
+
+Signed-off-by: Zhenzhong Duan <zhenzhong.duan@oracle.com>
+Signed-off-by: Borislav Petkov <bp@suse.de>
+Cc: Daniel Borkmann <daniel@iogearbox.net>
+Cc: David Woodhouse <dwmw@amazon.co.uk>
+Cc: H. Peter Anvin <hpa@zytor.com>
+Cc: Ingo Molnar <mingo@redhat.com>
+Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
+Cc: Peter Zijlstra <peterz@infradead.org>
+Cc: Thomas Gleixner <tglx@linutronix.de>
+Cc: Wang YanQing <udknight@gmail.com>
+Cc: dhaval.giani@oracle.com
+Cc: srinivas.eeda@oracle.com
+Link: http://lkml.kernel.org/r/c3975665-173e-4d70-8dee-06c926ac26ee@default
+---
+ arch/x86/include/asm/nospec-branch.h | 17 +++++++++++++----
+ 1 file changed, 13 insertions(+), 4 deletions(-)
+
+diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/nospec-branch.h
+index fd2a8c1b88bc..80dc14422495 100644
+--- a/arch/x86/include/asm/nospec-branch.h
++++ b/arch/x86/include/asm/nospec-branch.h
+@@ -170,11 +170,15 @@
+ */
+ # define CALL_NOSPEC \
+ ANNOTATE_NOSPEC_ALTERNATIVE \
+- ALTERNATIVE( \
++ ALTERNATIVE_2( \
+ ANNOTATE_RETPOLINE_SAFE \
+ "call *%[thunk_target]\n", \
+ "call __x86_indirect_thunk_%V[thunk_target]\n", \
+- X86_FEATURE_RETPOLINE)
++ X86_FEATURE_RETPOLINE, \
++ "lfence;\n" \
++ ANNOTATE_RETPOLINE_SAFE \
++ "call *%[thunk_target]\n", \
++ X86_FEATURE_RETPOLINE_AMD)
+ # define THUNK_TARGET(addr) [thunk_target] "r" (addr)
+
+ #elif defined(CONFIG_X86_32) && defined(CONFIG_RETPOLINE)
+@@ -184,7 +188,8 @@
+ * here, anyway.
+ */
+ # define CALL_NOSPEC \
+- ALTERNATIVE( \
++ ANNOTATE_NOSPEC_ALTERNATIVE \
++ ALTERNATIVE_2( \
+ ANNOTATE_RETPOLINE_SAFE \
+ "call *%[thunk_target]\n", \
+ " jmp 904f;\n" \
+@@ -199,7 +204,11 @@
+ " ret;\n" \
+ " .align 16\n" \
+ "904: call 901b;\n", \
+- X86_FEATURE_RETPOLINE)
++ X86_FEATURE_RETPOLINE, \
++ "lfence;\n" \
++ ANNOTATE_RETPOLINE_SAFE \
++ "call *%[thunk_target]\n", \
++ X86_FEATURE_RETPOLINE_AMD)
+
+ # define THUNK_TARGET(addr) [thunk_target] "rm" (addr)
+ #else /* No retpoline for C / inline asm */
+
diff --git a/patches.drivers/Input-elan_i2c-add-ACPI-ID-for-touchpad-in-ASUS-Aspi.patch b/patches.drivers/Input-elan_i2c-add-ACPI-ID-for-touchpad-in-ASUS-Aspi.patch
new file mode 100644
index 0000000000..ca3d1b63b5
--- /dev/null
+++ b/patches.drivers/Input-elan_i2c-add-ACPI-ID-for-touchpad-in-ASUS-Aspi.patch
@@ -0,0 +1,35 @@
+From 7db54c89f0b30a101584e09d3729144e6170059d Mon Sep 17 00:00:00 2001
+From: Patrick Dreyer <Patrick@Dreyer.name>
+Date: Sun, 23 Dec 2018 10:06:35 -0800
+Subject: [PATCH] Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G
+Git-commit: 7db54c89f0b30a101584e09d3729144e6170059d
+Patch-mainline: v5.0-rc1
+References: bsc#1051510
+
+This adds ELAN0501 to the ACPI table to support Elan touchpad found in ASUS
+Aspire F5-573G.
+
+Signed-off-by: Patrick Dreyer <Patrick.Dreyer@gmail.com>
+Cc: stable@vger.kernel.org
+Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
+Acked-by: Takashi Iwai <tiwai@suse.de>
+
+---
+ drivers/input/mouse/elan_i2c_core.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/drivers/input/mouse/elan_i2c_core.c b/drivers/input/mouse/elan_i2c_core.c
+index a94b6494e71a..f322a1768fbb 100644
+--- a/drivers/input/mouse/elan_i2c_core.c
++++ b/drivers/input/mouse/elan_i2c_core.c
+@@ -1336,6 +1336,7 @@ MODULE_DEVICE_TABLE(i2c, elan_id);
+ static const struct acpi_device_id elan_acpi_id[] = {
+ { "ELAN0000", 0 },
+ { "ELAN0100", 0 },
++ { "ELAN0501", 0 },
+ { "ELAN0600", 0 },
+ { "ELAN0602", 0 },
+ { "ELAN0605", 0 },
+--
+2.16.4
+
diff --git a/patches.drivers/Input-omap-keypad-fix-idle-configuration-to-not-bloc.patch b/patches.drivers/Input-omap-keypad-fix-idle-configuration-to-not-bloc.patch
new file mode 100644
index 0000000000..f7b0d0b506
--- /dev/null
+++ b/patches.drivers/Input-omap-keypad-fix-idle-configuration-to-not-bloc.patch
@@ -0,0 +1,84 @@
+From e2ca26ec4f01486661b55b03597c13e2b9c18b73 Mon Sep 17 00:00:00 2001
+From: Tony Lindgren <tony@atomide.com>
+Date: Tue, 4 Dec 2018 13:52:49 -0800
+Subject: [PATCH] Input: omap-keypad - fix idle configuration to not block SoC idle states
+Git-commit: e2ca26ec4f01486661b55b03597c13e2b9c18b73
+Patch-mainline: v4.20
+References: bsc#1051510
+
+With PM enabled, I noticed that pressing a key on the droid4 keyboard will
+block deeper idle states for the SoC. Let's fix this by using IRQF_ONESHOT
+and stop constantly toggling the device OMAP4_KBD_IRQENABLE register as
+suggested by Dmitry Torokhov <dmitry.torokhov@gmail.com>.
+
+From the hardware point of view, looks like we need to manage the registers
+for OMAP4_KBD_IRQENABLE and OMAP4_KBD_WAKEUPENABLE together to avoid
+blocking deeper SoC idle states. And with toggling of OMAP4_KBD_IRQENABLE
+register now gone with IRQF_ONESHOT, also the SoC idle state problem is
+gone during runtime. We still also need to clear OMAP4_KBD_WAKEUPENABLE in
+omap4_keypad_close() though to pair it with omap4_keypad_open() to prevent
+blocking deeper SoC idle states after rmmod omap4-keypad.
+
+Reported-by: Pavel Machek <pavel@ucw.cz>
+Signed-off-by: Tony Lindgren <tony@atomide.com>
+Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
+Acked-by: Takashi Iwai <tiwai@suse.de>
+
+---
+ drivers/input/keyboard/omap4-keypad.c | 16 ++++------------
+ 1 file changed, 4 insertions(+), 12 deletions(-)
+
+diff --git a/drivers/input/keyboard/omap4-keypad.c b/drivers/input/keyboard/omap4-keypad.c
+index ce8e2baf31bb..616fdd94b069 100644
+--- a/drivers/input/keyboard/omap4-keypad.c
++++ b/drivers/input/keyboard/omap4-keypad.c
+@@ -126,12 +126,8 @@ static irqreturn_t omap4_keypad_irq_handler(int irq, void *dev_id)
+ {
+ struct omap4_keypad *keypad_data = dev_id;
+
+- if (kbd_read_irqreg(keypad_data, OMAP4_KBD_IRQSTATUS)) {
+- /* Disable interrupts */
+- kbd_write_irqreg(keypad_data, OMAP4_KBD_IRQENABLE,
+- OMAP4_VAL_IRQDISABLE);
++ if (kbd_read_irqreg(keypad_data, OMAP4_KBD_IRQSTATUS))
+ return IRQ_WAKE_THREAD;
+- }
+
+ return IRQ_NONE;
+ }
+@@ -173,11 +169,6 @@ static irqreturn_t omap4_keypad_irq_thread_fn(int irq, void *dev_id)
+ kbd_write_irqreg(keypad_data, OMAP4_KBD_IRQSTATUS,
+ kbd_read_irqreg(keypad_data, OMAP4_KBD_IRQSTATUS));
+
+- /* enable interrupts */
+- kbd_write_irqreg(keypad_data, OMAP4_KBD_IRQENABLE,
+- OMAP4_DEF_IRQENABLE_EVENTEN |
+- OMAP4_DEF_IRQENABLE_LONGKEY);
+-
+ return IRQ_HANDLED;
+ }
+
+@@ -214,9 +205,10 @@ static void omap4_keypad_close(struct input_dev *input)
+
+ disable_irq(keypad_data->irq);
+
+- /* Disable interrupts */
++ /* Disable interrupts and wake-up events */
+ kbd_write_irqreg(keypad_data, OMAP4_KBD_IRQENABLE,
+ OMAP4_VAL_IRQDISABLE);
++ kbd_writel(keypad_data, OMAP4_KBD_WAKEUPENABLE, 0);
+
+ /* clear pending interrupts */
+ kbd_write_irqreg(keypad_data, OMAP4_KBD_IRQSTATUS,
+@@ -364,7 +356,7 @@ static int omap4_keypad_probe(struct platform_device *pdev)
+ }
+
+ error = request_threaded_irq(keypad_data->irq, omap4_keypad_irq_handler,
+- omap4_keypad_irq_thread_fn, 0,
++ omap4_keypad_irq_thread_fn, IRQF_ONESHOT,
+ "omap4-keypad", keypad_data);
+ if (error) {
+ dev_err(&pdev->dev, "failed to register interrupt\n");
+--
+2.16.4
+
diff --git a/patches.drivers/Input-restore-EV_ABS-ABS_RESERVED.patch b/patches.drivers/Input-restore-EV_ABS-ABS_RESERVED.patch
new file mode 100644
index 0000000000..b8cc77a3a8
--- /dev/null
+++ b/patches.drivers/Input-restore-EV_ABS-ABS_RESERVED.patch
@@ -0,0 +1,45 @@
+From c201e3808e0e4be9b98d192802085a9f491bd80c Mon Sep 17 00:00:00 2001
+From: Peter Hutterer <peter.hutterer@who-t.net>
+Date: Thu, 6 Dec 2018 09:03:36 +1000
+Subject: [PATCH] Input: restore EV_ABS ABS_RESERVED
+Git-commit: c201e3808e0e4be9b98d192802085a9f491bd80c
+Patch-mainline: v4.20-rc7
+References: bsc#1051510
+
+ABS_RESERVED was added in d9ca1c990a7 and accidentally removed as part of
+ffe0e7cf290f5c9 when the high-resolution scrolling code was removed.
+
+Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
+Reviewed-by: Martin Kepplinger <martin.kepplinger@ginzinger.com>
+Acked-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
+Acked-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
+Signed-off-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
+Acked-by: Takashi Iwai <tiwai@suse.de>
+
+---
+ include/uapi/linux/input-event-codes.h | 9 +++++++++
+ 1 file changed, 9 insertions(+)
+
+diff --git a/include/uapi/linux/input-event-codes.h b/include/uapi/linux/input-event-codes.h
+index 3eb5a4c3d60a..ae366b87426a 100644
+--- a/include/uapi/linux/input-event-codes.h
++++ b/include/uapi/linux/input-event-codes.h
+@@ -752,6 +752,15 @@
+
+ #define ABS_MISC 0x28
+
++/*
++ * 0x2e is reserved and should not be used in input drivers.
++ * It was used by HID as ABS_MISC+6 and userspace needs to detect if
++ * the next ABS_* event is correct or is just ABS_MISC + n.
++ * We define here ABS_RESERVED so userspace can rely on it and detect
++ * the situation described above.
++ */
++#define ABS_RESERVED 0x2e
++
+ #define ABS_MT_SLOT 0x2f /* MT slot being modified */
+ #define ABS_MT_TOUCH_MAJOR 0x30 /* Major axis of touching ellipse */
+ #define ABS_MT_TOUCH_MINOR 0x31 /* Minor axis (omit if circular) */
+--
+2.16.4
+
diff --git a/patches.drivers/Input-synaptics-enable-RMI-on-ThinkPad-T560.patch b/patches.drivers/Input-synaptics-enable-RMI-on-ThinkPad-T560.patch
new file mode 100644
index 0000000000..7d786e7be6
--- /dev/null
+++ b/patches.drivers/Input-synaptics-enable-RMI-on-ThinkPad-T560.patch
@@ -0,0 +1,37 @@
+From ca5047286c9c93a01e1f471d00a6019536992954 Mon Sep 17 00:00:00 2001
+From: Yussuf Khalil <dev@pp3345.net>
+Date: Sat, 8 Dec 2018 20:13:35 -0800
+Subject: [PATCH] Input: synaptics - enable RMI on ThinkPad T560
+Git-commit: ca5047286c9c93a01e1f471d00a6019536992954
+Patch-mainline: v4.20
+References: bsc#1051510
+
+Before commit 7fd6d98b89f3 ("i2c: i801: Allow ACPI AML access I/O
+ports not reserved for SMBus"), enabling RMI on the T560 would cause
+the touchpad to stop working after resuming from suspend. Now that
+this issue is fixed, RMI can be enabled safely and works fine.
+
+Reviewed-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
+Signed-off-by: Yussuf Khalil <dev@pp3345.net>
+Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
+Acked-by: Takashi Iwai <tiwai@suse.de>
+
+---
+ drivers/input/mouse/synaptics.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/drivers/input/mouse/synaptics.c b/drivers/input/mouse/synaptics.c
+index 2bd5bb11c8ba..7bdf8fc2c3b5 100644
+--- a/drivers/input/mouse/synaptics.c
++++ b/drivers/input/mouse/synaptics.c
+@@ -171,6 +171,7 @@ static const char * const smbus_pnp_ids[] = {
+ "LEN0046", /* X250 */
+ "LEN004a", /* W541 */
+ "LEN005b", /* P50 */
++ "LEN005e", /* T560 */
+ "LEN0071", /* T480 */
+ "LEN0072", /* X1 Carbon Gen 5 (2017) - Elan/ALPS trackpoint */
+ "LEN0073", /* X1 Carbon G5 (Elantech) */
+--
+2.16.4
+
diff --git a/patches.drivers/Input-synaptics-enable-SMBus-for-HP-EliteBook-840-G4.patch b/patches.drivers/Input-synaptics-enable-SMBus-for-HP-EliteBook-840-G4.patch
new file mode 100644
index 0000000000..f1b458bbe7
--- /dev/null
+++ b/patches.drivers/Input-synaptics-enable-SMBus-for-HP-EliteBook-840-G4.patch
@@ -0,0 +1,54 @@
+From 7a71712293ba303aad928f580b89addb0be2892e Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Mantas=20Mikul=C4=97nas?= <grawity@gmail.com>
+Date: Fri, 21 Dec 2018 01:04:26 -0800
+Subject: [PATCH] Input: synaptics - enable SMBus for HP EliteBook 840 G4
+Mime-version: 1.0
+Content-type: text/plain; charset=UTF-8
+Content-transfer-encoding: 8bit
+Git-commit: 7a71712293ba303aad928f580b89addb0be2892e
+Patch-mainline: v4.20
+References: bsc#1051510
+
+dmesg reports that "Your touchpad (PNP: SYN3052 SYN0100 SYN0002 PNP0f13)
+says it can support a different bus."
+
+I've tested the offered psmouse.synaptics_intertouch=1 with 4.18.x and
+4.19.x and it seems to work well. No problems seen with suspend/resume.
+
+Also, it appears that RMI/SMBus mode is actually required for 3-4 finger
+multitouch gestures to work -- otherwise they are not reported at all.
+
+Information from dmesg in both modes:
+
+ psmouse serio3: synaptics: Touchpad model: 1, fw: 8.2, id: 0x1e2b1,
+ caps: 0xf00123/0x840300/0x2e800/0x0, board id: 3139, fw id: 2000742
+
+ psmouse serio3: synaptics: Trying to set up SMBus access
+ rmi4_smbus 6-002c: registering SMbus-connected sensor
+ rmi4_f01 rmi4-00.fn01: found RMI device,
+ manufacturer: Synaptics, product: TM3139-001, fw id: 2000742
+
+Signed-off-by: Mantas Mikulėnas <grawity@gmail.com>
+Reviewed-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
+Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
+Acked-by: Takashi Iwai <tiwai@suse.de>
+
+---
+ drivers/input/mouse/synaptics.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/drivers/input/mouse/synaptics.c b/drivers/input/mouse/synaptics.c
+index 7bdf8fc2c3b5..b6da0c1267e3 100644
+--- a/drivers/input/mouse/synaptics.c
++++ b/drivers/input/mouse/synaptics.c
+@@ -179,6 +179,7 @@ static const char * const smbus_pnp_ids[] = {
+ "LEN0096", /* X280 */
+ "LEN0097", /* X280 -> ALPS trackpoint */
+ "LEN200f", /* T450s */
++ "SYN3052", /* HP EliteBook 840 G4 */
+ "SYN3221", /* HP 15-ay000 */
+ NULL
+ };
+--
+2.16.4
+
diff --git a/patches.drm/drm-nouveau-Don-t-disable-polling-in-fallback-mode.patch b/patches.drm/drm-nouveau-Don-t-disable-polling-in-fallback-mode.patch
index 94aa215f9b..e78ea681af 100644
--- a/patches.drm/drm-nouveau-Don-t-disable-polling-in-fallback-mode.patch
+++ b/patches.drm/drm-nouveau-Don-t-disable-polling-in-fallback-mode.patch
@@ -1,18 +1,22 @@
-From 3639c381cdf5fa4340cbc2c7f34e2b526a6f6a6b Mon Sep 17 00:00:00 2001
+From 118780066e30c34de3d9349710b51780bfa0ba83 Mon Sep 17 00:00:00 2001
From: Takashi Iwai <tiwai@suse.de>
-Date: Fri, 31 Aug 2018 12:03:28 +0200
+Date: Wed, 12 Sep 2018 12:58:43 +0200
Subject: [PATCH] drm/nouveau: Don't disable polling in fallback mode
-Patch-mainline: Submitted, dri-devel ML
+Git-commit: 118780066e30c34de3d9349710b51780bfa0ba83
+Patch-mainline: v5.0-rc2
References: bsc#1103356
When a fan is controlled via linear fallback without cstate, we
shouldn't stop polling. Otherwise it won't be adjusted again and
keeps running at an initial crazy pace.
+Fixes: 800efb4c2857 ("drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios")
Bugzilla: https://bugzilla.suse.com/show_bug.cgi?id=1103356
Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=107447
Reported-by: Thomas Blume <thomas.blume@suse.com>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
+Reviewed-by: Martin Peres <martin.peres@free.fr>
+Signed-off-by: Ben Skeggs <bskeggs@redhat.com>
---
drivers/gpu/drm/nouveau/nvkm/subdev/therm/base.c | 7 ++++---
@@ -39,5 +43,5 @@ index 3695cde669f8..07914e36939e 100644
}
immd = false;
--
-2.18.0
+2.16.4
diff --git a/patches.fixes/kvm-sev-fail-kvm_sev_init-if-already-initialized.patch b/patches.fixes/kvm-sev-fail-kvm_sev_init-if-already-initialized.patch
new file mode 100644
index 0000000000..708d3331cf
--- /dev/null
+++ b/patches.fixes/kvm-sev-fail-kvm_sev_init-if-already-initialized.patch
@@ -0,0 +1,42 @@
+From: David Rientjes <rientjes@google.com>
+Date: Wed, 2 Jan 2019 12:56:33 -0800
+Subject: kvm: sev: Fail KVM_SEV_INIT if already initialized
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+Git-commit: 3f14a89d1132dcae3c8ce6721c6ef51f6e6d9b5f
+Patch-mainline: v5.0-rc2
+References: bsc#1114279
+
+By code inspection, it was found that multiple calls to KVM_SEV_INIT
+could deplete asid bits and overwrite kvm_sev_info's regions_list.
+
+Multiple calls to KVM_SVM_INIT is not likely to occur with QEMU, but this
+should likely be fixed anyway.
+
+This code is serialized by kvm->lock.
+
+Fixes: 1654efcbc431 ("KVM: SVM: Add KVM_SEV_INIT command")
+Reported-by: Cfir Cohen <cfir@google.com>
+Signed-off-by: David Rientjes <rientjes@google.com>
+Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
+Acked-by: Borislav Petkov <bp@suse.de>
+---
+ arch/x86/kvm/svm.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
+index 307e5bddb6d9..a157ca5b6869 100644
+--- a/arch/x86/kvm/svm.c
++++ b/arch/x86/kvm/svm.c
+@@ -6278,6 +6278,9 @@ static int sev_guest_init(struct kvm *kvm, struct kvm_sev_cmd *argp)
+ int asid, ret;
+
+ ret = -EBUSY;
++ if (unlikely(sev->active))
++ return ret;
++
+ asid = sev_asid_new();
+ if (asid < 0)
+ return ret;
+
diff --git a/patches.suse/net-skb_scrub_packet-Scrub-offload_fwd_mark.patch b/patches.suse/net-skb_scrub_packet-Scrub-offload_fwd_mark.patch
new file mode 100644
index 0000000000..e04d8bc044
--- /dev/null
+++ b/patches.suse/net-skb_scrub_packet-Scrub-offload_fwd_mark.patch
@@ -0,0 +1,49 @@
+From: Petr Machata <petrm@mellanox.com>
+Date: Tue, 20 Nov 2018 11:39:56 +0000
+Subject: net: skb_scrub_packet(): Scrub offload_fwd_mark
+Git-commit: b5dd186d10ba59e6b5ba60e42b3b083df56df6f3
+Patch-mainline: v4.20-rc4
+References: networking-stable-18_12_03
+
+When a packet is trapped and the corresponding SKB marked as
+already-forwarded, it retains this marking even after it is forwarded
+across veth links into another bridge. There, since it ingresses the
+bridge over veth, which doesn't have offload_fwd_mark, it triggers a
+warning in nbp_switchdev_frame_mark().
+
+Then nbp_switchdev_allowed_egress() decides not to allow egress from
+this bridge through another veth, because the SKB is already marked, and
+the mark (of 0) of course matches. Thus the packet is incorrectly
+blocked.
+
+Solve by resetting offload_fwd_mark() in skb_scrub_packet(). That
+function is called from tunnels and also from veth, and thus catches the
+cases where traffic is forwarded between bridges and transformed in a
+way that invalidates the marking.
+
+[js] no offload_mr_fwd_mark in 4.12, so skip zeroing it
+
+Fixes: 6bc506b4fb06 ("bridge: switchdev: Add forward mark support for stacked devices")
+Fixes: abf4bb6b63d0 ("skbuff: Add the offload_mr_fwd_mark field")
+Signed-off-by: Petr Machata <petrm@mellanox.com>
+Suggested-by: Ido Schimmel <idosch@mellanox.com>
+Acked-by: Jiri Pirko <jiri@mellanox.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Jiri Slaby <jslaby@suse.cz>
+---
+ net/core/skbuff.c | 5 +++++
+ 1 file changed, 5 insertions(+)
+
+--- a/net/core/skbuff.c
++++ b/net/core/skbuff.c
+@@ -4442,6 +4442,10 @@ void skb_scrub_packet(struct sk_buff *sk
+ nf_reset(skb);
+ nf_reset_trace(skb);
+
++#ifdef CONFIG_NET_SWITCHDEV
++ skb->offload_fwd_mark = 0;
++#endif
++
+ if (!xnet)
+ return;
+
diff --git a/patches.suse/net-thunderx-set-tso_hdrs-pointer-to-NULL-in-nicvf_f.patch b/patches.suse/net-thunderx-set-tso_hdrs-pointer-to-NULL-in-nicvf_f.patch
new file mode 100644
index 0000000000..37f7928e56
--- /dev/null
+++ b/patches.suse/net-thunderx-set-tso_hdrs-pointer-to-NULL-in-nicvf_f.patch
@@ -0,0 +1,100 @@
+From: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>
+Date: Fri, 23 Nov 2018 18:28:01 +0100
+Subject: net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue
+Git-commit: ef2a7cf1d8831535b8991459567b385661eb4a36
+Patch-mainline: v4.20-rc4
+References: networking-stable-18_12_03
+
+Reset snd_queue tso_hdrs pointer to NULL in nicvf_free_snd_queue routine
+since it is used to check if tso dma descriptor queue has been previously
+allocated. The issue can be triggered with the following reproducer:
+
+$ip link set dev enP2p1s0v0 xdpdrv obj xdp_dummy.o
+$ip link set dev enP2p1s0v0 xdpdrv off
+
+[ 341.467649] WARNING: CPU: 74 PID: 2158 at mm/vmalloc.c:1511 __vunmap+0x98/0xe0
+[ 341.515010] Hardware name: GIGABYTE H270-T70/MT70-HD0, BIOS T49 02/02/2018
+[ 341.521874] pstate: 60400005 (nZCv daif +PAN -UAO)
+[ 341.526654] pc : __vunmap+0x98/0xe0
+[ 341.530132] lr : __vunmap+0x98/0xe0
+[ 341.533609] sp : ffff00001c5db860
+[ 341.536913] x29: ffff00001c5db860 x28: 0000000000020000
+[ 341.542214] x27: ffff810feb5090b0 x26: ffff000017e57000
+[ 341.547515] x25: 0000000000000000 x24: 00000000fbd00000
+[ 341.552816] x23: 0000000000000000 x22: ffff810feb5090b0
+[ 341.558117] x21: 0000000000000000 x20: 0000000000000000
+[ 341.563418] x19: ffff000017e57000 x18: 0000000000000000
+[ 341.568719] x17: 0000000000000000 x16: 0000000000000000
+[ 341.574020] x15: 0000000000000010 x14: ffffffffffffffff
+[ 341.579321] x13: ffff00008985eb27 x12: ffff00000985eb2f
+[ 341.584622] x11: ffff0000096b3000 x10: ffff00001c5db510
+[ 341.589923] x9 : 00000000ffffffd0 x8 : ffff0000086868e8
+[ 341.595224] x7 : 3430303030303030 x6 : 00000000000006ef
+[ 341.600525] x5 : 00000000003fffff x4 : 0000000000000000
+[ 341.605825] x3 : 0000000000000000 x2 : ffffffffffffffff
+[ 341.611126] x1 : ffff0000096b3728 x0 : 0000000000000038
+[ 341.616428] Call trace:
+[ 341.618866] __vunmap+0x98/0xe0
+[ 341.621997] vunmap+0x3c/0x50
+[ 341.624961] arch_dma_free+0x68/0xa0
+[ 341.628534] dma_direct_free+0x50/0x80
+[ 341.632285] nicvf_free_resources+0x160/0x2d8 [nicvf]
+[ 341.637327] nicvf_config_data_transfer+0x174/0x5e8 [nicvf]
+[ 341.642890] nicvf_stop+0x298/0x340 [nicvf]
+[ 341.647066] __dev_close_many+0x9c/0x108
+[ 341.650977] dev_close_many+0xa4/0x158
+[ 341.654720] rollback_registered_many+0x140/0x530
+[ 341.659414] rollback_registered+0x54/0x80
+[ 341.663499] unregister_netdevice_queue+0x9c/0xe8
+[ 341.668192] unregister_netdev+0x28/0x38
+[ 341.672106] nicvf_remove+0xa4/0xa8 [nicvf]
+[ 341.676280] nicvf_shutdown+0x20/0x30 [nicvf]
+[ 341.680630] pci_device_shutdown+0x44/0x88
+[ 341.684720] device_shutdown+0x144/0x250
+[ 341.688640] kernel_restart_prepare+0x44/0x50
+[ 341.692986] kernel_restart+0x20/0x68
+[ 341.696638] __se_sys_reboot+0x210/0x238
+[ 341.700550] __arm64_sys_reboot+0x24/0x30
+[ 341.704555] el0_svc_handler+0x94/0x110
+[ 341.708382] el0_svc+0x8/0xc
+[ 341.711252] ---[ end trace 3f4019c8439959c9 ]---
+[ 341.715874] page:ffff7e0003ef4000 count:0 mapcount:0 mapping:0000000000000000 index:0x4
+[ 341.723872] flags: 0x1fffe000000000()
+[ 341.727527] raw: 001fffe000000000 ffff7e0003f1a008 ffff7e0003ef4048 0000000000000000
+[ 341.735263] raw: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
+[ 341.742994] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0)
+
+where xdp_dummy.c is a simple bpf program that forwards the incoming
+frames to the network stack (available here:
+https://github.com/altoor/xdp_walkthrough_examples/blob/master/sample_1/xdp_dummy.c)
+
+Fixes: 05c773f52b96 ("net: thunderx: Add basic XDP support")
+Fixes: 4863dea3fab0 ("net: Adding support for Cavium ThunderX network controller")
+Signed-off-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Jiri Slaby <jslaby@suse.cz>
+---
+ drivers/net/ethernet/cavium/thunder/nicvf_queues.c | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/net/ethernet/cavium/thunder/nicvf_queues.c b/drivers/net/ethernet/cavium/thunder/nicvf_queues.c
+index 187a249ff2d1..fcaf18fa3904 100644
+--- a/drivers/net/ethernet/cavium/thunder/nicvf_queues.c
++++ b/drivers/net/ethernet/cavium/thunder/nicvf_queues.c
+@@ -585,10 +585,12 @@ static void nicvf_free_snd_queue(struct nicvf *nic, struct snd_queue *sq)
+ if (!sq->dmem.base)
+ return;
+
+- if (sq->tso_hdrs)
++ if (sq->tso_hdrs) {
+ dma_free_coherent(&nic->pdev->dev,
+ sq->dmem.q_len * TSO_HEADER_SIZE,
+ sq->tso_hdrs, sq->tso_hdrs_phys);
++ sq->tso_hdrs = NULL;
++ }
+
+ /* Free pending skbs in the queue */
+ smp_rmb();
+--
+2.20.1
+
diff --git a/patches.suse/net-thunderx-set-xdp_prog-to-NULL-if-bpf_prog_add-fa.patch b/patches.suse/net-thunderx-set-xdp_prog-to-NULL-if-bpf_prog_add-fa.patch
new file mode 100644
index 0000000000..cc90e14e91
--- /dev/null
+++ b/patches.suse/net-thunderx-set-xdp_prog-to-NULL-if-bpf_prog_add-fa.patch
@@ -0,0 +1,54 @@
+From: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>
+Date: Wed, 21 Nov 2018 16:32:10 +0100
+Subject: net: thunderx: set xdp_prog to NULL if bpf_prog_add fails
+Git-commit: 6d0f60b0f8588fd4380ea5df9601e12fddd55ce2
+Patch-mainline: v4.20-rc4
+References: networking-stable-18_12_03
+
+Set xdp_prog pointer to NULL if bpf_prog_add fails since that routine
+reports the error code instead of NULL in case of failure and xdp_prog
+pointer value is used in the driver to verify if XDP is currently
+enabled.
+Moreover report the error code to userspace if nicvf_xdp_setup fails
+
+Fixes: 05c773f52b96 ("net: thunderx: Add basic XDP support")
+Signed-off-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Jiri Slaby <jslaby@suse.cz>
+---
+ drivers/net/ethernet/cavium/thunder/nicvf_main.c | 9 +++++++--
+ 1 file changed, 7 insertions(+), 2 deletions(-)
+
+--- a/drivers/net/ethernet/cavium/thunder/nicvf_main.c
++++ b/drivers/net/ethernet/cavium/thunder/nicvf_main.c
+@@ -1787,6 +1787,7 @@ static int nicvf_xdp_setup(struct nicvf
+ bool if_up = netif_running(nic->netdev);
+ struct bpf_prog *old_prog;
+ bool bpf_attached = false;
++ int ret = 0;
+
+ /* For now just support only the usual MTU sized frames */
+ if (prog && (dev->mtu > 1500)) {
+@@ -1820,8 +1821,12 @@ static int nicvf_xdp_setup(struct nicvf
+ if (nic->xdp_prog) {
+ /* Attach BPF program */
+ nic->xdp_prog = bpf_prog_add(nic->xdp_prog, nic->rx_queues - 1);
+- if (!IS_ERR(nic->xdp_prog))
++ if (!IS_ERR(nic->xdp_prog)) {
+ bpf_attached = true;
++ } else {
++ ret = PTR_ERR(nic->xdp_prog);
++ nic->xdp_prog = NULL;
++ }
+ }
+
+ /* Calculate Tx queues needed for XDP and network stack */
+@@ -1833,7 +1838,7 @@ static int nicvf_xdp_setup(struct nicvf
+ netif_trans_update(nic->netdev);
+ }
+
+- return 0;
++ return ret;
+ }
+
+ static int nicvf_xdp(struct net_device *netdev, struct netdev_xdp *xdp)
diff --git a/patches.suse/rapidio-rionet-do-not-free-skb-before-reading-its-le.patch b/patches.suse/rapidio-rionet-do-not-free-skb-before-reading-its-le.patch
new file mode 100644
index 0000000000..dc507a5e13
--- /dev/null
+++ b/patches.suse/rapidio-rionet-do-not-free-skb-before-reading-its-le.patch
@@ -0,0 +1,36 @@
+From: Pan Bian <bianpan2016@163.com>
+Date: Wed, 28 Nov 2018 14:53:19 +0800
+Subject: rapidio/rionet: do not free skb before reading its length
+Git-commit: cfc435198f53a6fa1f656d98466b24967ff457d0
+Patch-mainline: v4.20-rc5
+References: networking-stable-18_12_03
+
+skb is freed via dev_kfree_skb_any, however, skb->len is read then. This
+may result in a use-after-free bug.
+
+Fixes: e6161d64263 ("rapidio/rionet: rework driver initialization and removal")
+Signed-off-by: Pan Bian <bianpan2016@163.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Jiri Slaby <jslaby@suse.cz>
+---
+ drivers/net/rionet.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/drivers/net/rionet.c b/drivers/net/rionet.c
+index e9f101c9bae2..bfbb39f93554 100644
+--- a/drivers/net/rionet.c
++++ b/drivers/net/rionet.c
+@@ -216,9 +216,9 @@ static int rionet_start_xmit(struct sk_buff *skb, struct net_device *ndev)
+ * it just report sending a packet to the target
+ * (without actual packet transfer).
+ */
+- dev_kfree_skb_any(skb);
+ ndev->stats.tx_packets++;
+ ndev->stats.tx_bytes += skb->len;
++ dev_kfree_skb_any(skb);
+ }
+ }
+
+--
+2.20.1
+
diff --git a/patches.suse/usbnet-ipheth-fix-potential-recvmsg-bug-and-recvmsg-.patch b/patches.suse/usbnet-ipheth-fix-potential-recvmsg-bug-and-recvmsg-.patch
new file mode 100644
index 0000000000..79f9da4b5f
--- /dev/null
+++ b/patches.suse/usbnet-ipheth-fix-potential-recvmsg-bug-and-recvmsg-.patch
@@ -0,0 +1,166 @@
+From: Bernd Eckstein <3erndeckstein@gmail.com>
+Date: Fri, 23 Nov 2018 13:51:26 +0100
+Subject: usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2
+Git-commit: 45611c61dd503454b2edae00aabe1e429ec49ebe
+Patch-mainline: v4.20-rc5
+References: networking-stable-18_12_03
+
+The bug is not easily reproducable, as it may occur very infrequently
+(we had machines with 20minutes heavy downloading before it occurred)
+However, on a virual machine (VMWare on Windows 10 host) it occurred
+pretty frequently (1-2 seconds after a speedtest was started)
+
+dev->tx_skb mab be freed via dev_kfree_skb_irq on a callback
+before it is set.
+
+This causes the following problems:
+- double free of the skb or potential memory leak
+- in dmesg: 'recvmsg bug' and 'recvmsg bug 2' and eventually
+ general protection fault
+
+Example dmesg output:
+[ 134.841986] ------------[ cut here ]------------
+[ 134.841987] recvmsg bug: copied 9C24A555 seq 9C24B557 rcvnxt 9C25A6B3 fl 0
+[ 134.841993] WARNING: CPU: 7 PID: 2629 at /build/linux-hwe-On9fm7/linux-hwe-4.15.0/net/ipv4/tcp.c:1865 tcp_recvmsg+0x44d/0xab0
+[ 134.841994] Modules linked in: ipheth(OE) kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd vmw_balloon intel_rapl_perf joydev input_leds serio_raw vmw_vsock_vmci_transport vsock shpchp i2c_piix4 mac_hid binfmt_misc vmw_vmci parport_pc ppdev lp parport autofs4 vmw_pvscsi vmxnet3 hid_generic usbhid hid vmwgfx ttm drm_kms_helper syscopyarea sysfillrect mptspi mptscsih sysimgblt ahci psmouse fb_sys_fops pata_acpi mptbase libahci e1000 drm scsi_transport_spi
+[ 134.842046] CPU: 7 PID: 2629 Comm: python Tainted: G W OE 4.15.0-34-generic #37~16.04.1-Ubuntu
+[ 134.842046] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/19/2017
+[ 134.842048] RIP: 0010:tcp_recvmsg+0x44d/0xab0
+[ 134.842048] RSP: 0018:ffffa6630422bcc8 EFLAGS: 00010286
+[ 134.842049] RAX: 0000000000000000 RBX: ffff997616f4f200 RCX: 0000000000000006
+[ 134.842049] RDX: 0000000000000007 RSI: 0000000000000082 RDI: ffff9976257d6490
+[ 134.842050] RBP: ffffa6630422bd98 R08: 0000000000000001 R09: 000000000004bba4
+[ 134.842050] R10: 0000000001e00c6f R11: 000000000004bba4 R12: ffff99760dee3000
+[ 134.842051] R13: 0000000000000000 R14: ffff99760dee3514 R15: 0000000000000000
+[ 134.842051] FS: 00007fe332347700(0000) GS:ffff9976257c0000(0000) knlGS:0000000000000000
+[ 134.842052] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
+[ 134.842053] CR2: 0000000001e41000 CR3: 000000020e9b4006 CR4: 00000000003606e0
+[ 134.842055] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
+[ 134.842055] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
+[ 134.842057] Call Trace:
+[ 134.842060] ? aa_sk_perm+0x53/0x1a0
+[ 134.842064] inet_recvmsg+0x51/0xc0
+[ 134.842066] sock_recvmsg+0x43/0x50
+[ 134.842070] SYSC_recvfrom+0xe4/0x160
+[ 134.842072] ? __schedule+0x3de/0x8b0
+[ 134.842075] ? ktime_get_ts64+0x4c/0xf0
+[ 134.842079] SyS_recvfrom+0xe/0x10
+[ 134.842082] do_syscall_64+0x73/0x130
+[ 134.842086] entry_SYSCALL_64_after_hwframe+0x3d/0xa2
+[ 134.842086] RIP: 0033:0x7fe331f5a81d
+[ 134.842088] RSP: 002b:00007ffe8da98398 EFLAGS: 00000246 ORIG_RAX: 000000000000002d
+[ 134.842090] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fe331f5a81d
+[ 134.842094] RDX: 00000000000003fb RSI: 0000000001e00874 RDI: 0000000000000003
+[ 134.842095] RBP: 00007fe32f642c70 R08: 0000000000000000 R09: 0000000000000000
+[ 134.842097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe332347698
+[ 134.842099] R13: 0000000001b7e0a0 R14: 0000000001e00874 R15: 0000000000000000
+[ 134.842103] Code: 24 fd ff ff e9 cc fe ff ff 48 89 d8 41 8b 8c 24 10 05 00 00 44 8b 45 80 48 c7 c7 08 bd 59 8b 48 89 85 68 ff ff ff e8 b3 c4 7d ff <0f> 0b 48 8b 85 68 ff ff ff e9 e9 fe ff ff 41 8b 8c 24 10 05 00
+[ 134.842126] ---[ end trace b7138fc08c83147f ]---
+[ 134.842144] general protection fault: 0000 [#1] SMP PTI
+[ 134.842145] Modules linked in: ipheth(OE) kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd vmw_balloon intel_rapl_perf joydev input_leds serio_raw vmw_vsock_vmci_transport vsock shpchp i2c_piix4 mac_hid binfmt_misc vmw_vmci parport_pc ppdev lp parport autofs4 vmw_pvscsi vmxnet3 hid_generic usbhid hid vmwgfx ttm drm_kms_helper syscopyarea sysfillrect mptspi mptscsih sysimgblt ahci psmouse fb_sys_fops pata_acpi mptbase libahci e1000 drm scsi_transport_spi
+[ 134.842161] CPU: 7 PID: 2629 Comm: python Tainted: G W OE 4.15.0-34-generic #37~16.04.1-Ubuntu
+[ 134.842162] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/19/2017
+[ 134.842164] RIP: 0010:tcp_close+0x2c6/0x440
+[ 134.842165] RSP: 0018:ffffa6630422bde8 EFLAGS: 00010202
+[ 134.842167] RAX: 0000000000000000 RBX: ffff99760dee3000 RCX: 0000000180400034
+[ 134.842168] RDX: 5c4afd407207a6c4 RSI: ffffe868495bd300 RDI: ffff997616f4f200
+[ 134.842169] RBP: ffffa6630422be08 R08: 0000000016f4d401 R09: 0000000180400034
+[ 134.842169] R10: ffffa6630422bd98 R11: 0000000000000000 R12: 000000000000600c
+[ 134.842170] R13: 0000000000000000 R14: ffff99760dee30c8 R15: ffff9975bd44fe00
+[ 134.842171] FS: 00007fe332347700(0000) GS:ffff9976257c0000(0000) knlGS:0000000000000000
+[ 134.842173] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
+[ 134.842174] CR2: 0000000001e41000 CR3: 000000020e9b4006 CR4: 00000000003606e0
+[ 134.842177] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
+[ 134.842178] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
+[ 134.842179] Call Trace:
+[ 134.842181] inet_release+0x42/0x70
+[ 134.842183] __sock_release+0x42/0xb0
+[ 134.842184] sock_close+0x15/0x20
+[ 134.842187] __fput+0xea/0x220
+[ 134.842189] ____fput+0xe/0x10
+[ 134.842191] task_work_run+0x8a/0xb0
+[ 134.842193] exit_to_usermode_loop+0xc4/0xd0
+[ 134.842195] do_syscall_64+0xf4/0x130
+[ 134.842197] entry_SYSCALL_64_after_hwframe+0x3d/0xa2
+[ 134.842197] RIP: 0033:0x7fe331f5a560
+[ 134.842198] RSP: 002b:00007ffe8da982e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
+[ 134.842200] RAX: 0000000000000000 RBX: 00007fe32f642c70 RCX: 00007fe331f5a560
+[ 134.842201] RDX: 00000000008f5320 RSI: 0000000001cd4b50 RDI: 0000000000000003
+[ 134.842202] RBP: 00007fe32f6500f8 R08: 000000000000003c R09: 00000000009343c0
+[ 134.842203] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe32f6500d0
+[ 134.842204] R13: 00000000008f5320 R14: 00000000008f5320 R15: 0000000001cd4770
+[ 134.842205] Code: c8 00 00 00 45 31 e4 49 39 fe 75 4d eb 50 83 ab d8 00 00 00 01 48 8b 17 48 8b 47 08 48 c7 07 00 00 00 00 48 c7 47 08 00 00 00 00 <48> 89 42 08 48 89 10 0f b6 57 34 8b 47 2c 2b 47 28 83 e2 01 80
+[ 134.842226] RIP: tcp_close+0x2c6/0x440 RSP: ffffa6630422bde8
+[ 134.842227] ---[ end trace b7138fc08c831480 ]---
+
+The proposed patch eliminates a potential racing condition.
+Before, usb_submit_urb was called and _after_ that, the skb was attached
+(dev->tx_skb). So, on a callback it was possible, however unlikely that the
+skb was freed before it was set. That way (because dev->tx_skb was not set
+to NULL after it was freed), it could happen that a skb from a earlier
+transmission was freed a second time (and the skb we should have freed did
+not get freed at all)
+
+Now we free the skb directly in ipheth_tx(). It is not passed to the
+callback anymore, eliminating the posibility of a double free of the same
+skb. Depending on the retval of usb_submit_urb() we use dev_kfree_skb_any()
+respectively dev_consume_skb_any() to free the skb.
+
+Signed-off-by: Oliver Zweigle <Oliver.Zweigle@faro.com>
+Signed-off-by: Bernd Eckstein <3ernd.Eckstein@gmail.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Jiri Slaby <jslaby@suse.cz>
+---
+ drivers/net/usb/ipheth.c | 10 ++++------
+ 1 file changed, 4 insertions(+), 6 deletions(-)
+
+--- a/drivers/net/usb/ipheth.c
++++ b/drivers/net/usb/ipheth.c
+@@ -140,7 +140,6 @@ struct ipheth_device {
+ struct usb_device *udev;
+ struct usb_interface *intf;
+ struct net_device *net;
+- struct sk_buff *tx_skb;
+ struct urb *tx_urb;
+ struct urb *rx_urb;
+ unsigned char *tx_buf;
+@@ -229,6 +228,7 @@ static void ipheth_rcvbulk_callback(stru
+ case -ENOENT:
+ case -ECONNRESET:
+ case -ESHUTDOWN:
++ case -EPROTO:
+ return;
+ case 0:
+ break;
+@@ -280,7 +280,6 @@ static void ipheth_sndbulk_callback(stru
+ dev_err(&dev->intf->dev, "%s: urb status: %d\n",
+ __func__, status);
+
+- dev_kfree_skb_irq(dev->tx_skb);
+ netif_wake_queue(dev->net);
+ }
+
+@@ -410,7 +409,7 @@ static int ipheth_tx(struct sk_buff *skb
+ if (skb->len > IPHETH_BUF_SIZE) {
+ WARN(1, "%s: skb too large: %d bytes\n", __func__, skb->len);
+ dev->net->stats.tx_dropped++;
+- dev_kfree_skb_irq(skb);
++ dev_kfree_skb_any(skb);
+ return NETDEV_TX_OK;
+ }
+
+@@ -430,12 +429,11 @@ static int ipheth_tx(struct sk_buff *skb
+ dev_err(&dev->intf->dev, "%s: usb_submit_urb: %d\n",
+ __func__, retval);
+ dev->net->stats.tx_errors++;
+- dev_kfree_skb_irq(skb);
++ dev_kfree_skb_any(skb);
+ } else {
+- dev->tx_skb = skb;
+-
+ dev->net->stats.tx_packets++;
+ dev->net->stats.tx_bytes += skb->len;
++ dev_consume_skb_any(skb);
+ netif_stop_queue(net);
+ }
+
diff --git a/patches.suse/virtio-net-fail-XDP-set-if-guest-csum-is-negotiated.patch b/patches.suse/virtio-net-fail-XDP-set-if-guest-csum-is-negotiated.patch
new file mode 100644
index 0000000000..bbc4411255
--- /dev/null
+++ b/patches.suse/virtio-net-fail-XDP-set-if-guest-csum-is-negotiated.patch
@@ -0,0 +1,37 @@
+From: Jason Wang <jasowang@redhat.com>
+Date: Thu, 22 Nov 2018 14:36:31 +0800
+Subject: virtio-net: fail XDP set if guest csum is negotiated
+Git-commit: 18ba58e1c234ea1a2d9835ac8c1735d965ce4640
+Patch-mainline: v4.20-rc4
+References: networking-stable-18_12_03
+
+We don't support partial csumed packet since its metadata will be lost
+or incorrect during XDP processing. So fail the XDP set if guest_csum
+feature is negotiated.
+
+Fixes: f600b6905015 ("virtio_net: Add XDP support")
+Reported-by: Jesper Dangaard Brouer <brouer@redhat.com>
+Cc: Jesper Dangaard Brouer <brouer@redhat.com>
+Cc: Pavel Popa <pashinho1990@gmail.com>
+Cc: David Ahern <dsahern@gmail.com>
+Signed-off-by: Jason Wang <jasowang@redhat.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Jiri Slaby <jslaby@suse.cz>
+---
+ drivers/net/virtio_net.c | 5 +++--
+ 1 file changed, 3 insertions(+), 2 deletions(-)
+
+--- a/drivers/net/virtio_net.c
++++ b/drivers/net/virtio_net.c
+@@ -1891,8 +1891,9 @@ static int virtnet_xdp_set(struct net_de
+ if (virtio_has_feature(vi->vdev, VIRTIO_NET_F_GUEST_TSO4) ||
+ virtio_has_feature(vi->vdev, VIRTIO_NET_F_GUEST_TSO6) ||
+ virtio_has_feature(vi->vdev, VIRTIO_NET_F_GUEST_ECN) ||
+- virtio_has_feature(vi->vdev, VIRTIO_NET_F_GUEST_UFO)) {
+- NL_SET_ERR_MSG_MOD(extack, "Can't set XDP while host is implementing LRO, disable LRO first");
++ virtio_has_feature(vi->vdev, VIRTIO_NET_F_GUEST_UFO) ||
++ virtio_has_feature(vi->vdev, VIRTIO_NET_F_GUEST_CSUM)) {
++ NL_SET_ERR_MSG_MOD(extack, "Can't set XDP while host is implementing LRO/CSUM, disable LRO/CSUM first");
+ return -EOPNOTSUPP;
+ }
+
diff --git a/series.conf b/series.conf
index 3cf98145d6..f0cc3012ac 100644
--- a/series.conf
+++ b/series.conf
@@ -6104,6 +6104,7 @@
patches.arch/powerpc-perf-add-thread-imc-pmu-support.patch
patches.arch/powerpc-mm-Fix-check-of-multiple-16G-pages-from-devi.patch
patches.arch/powerpc-powernv-Save-Restore-additional-SPRs-for-sto.patch
+ patches.arch/powerpc-powernv-Clear-PECE1-in-LPCR-via-stop-api-onl.patch
patches.arch/powerpc-mm-radix-Improve-_tlbiel_pid-to-be-usable-for-PWC-flushes.patch
patches.arch/powerpc-mm-radix-Improve-TLB-PWC-flushes.patch
patches.arch/powerpc-mm-radix-Avoid-flushing-the-PWC-on-every-flush_tlb_range.patch
@@ -6956,6 +6957,7 @@
patches.arch/s390-sles15-01-07-02-dynamic-topology.patch
patches.arch/powerpc-sysrq-Fix-oops-whem-ppmu-is-not-registered.patch
patches.arch/powerpc-tm-Flush-TM-only-if-CPU-has-TM-feature.patch
+ patches.arch/powerpc-powernv-Clear-LPCR-PECE1-via-stop-api-only-f.patch
patches.arch/powerpc-eeh-Create-PHB-PEs-after-EEH-is-initialized.patch
patches.arch/powerpc-pseries-Fix-OF-ERROR-Bad-of_node_put-on-cpus.patch
patches.arch/powerpc-pseries-Fix-parent_dn-reference-leak-in-add_.patch
@@ -19073,6 +19075,7 @@
patches.fixes/0001-x86-xen-Fix-boot-loader-version-reported-for-PVH-gue.patch
patches.arch/x86-kexec-correct-kexec_backup_src_end-off-by-one-error.patch
patches.fixes/resource-include-resource-end-in-walk_-interfaces.patch
+ patches.arch/x86-speculation-add-retpoline_amd-support-to-the-inline-asm-call_nospec-variant.patch
patches.arch/x86-speculation-apply-ibpb-more-strictly-to-avoid-cross-process-data-leak.patch
patches.arch/x86-speculation-enable-cross-hyperthread-spectre-v2-stibp-mitigation.patch
patches.arch/x86-speculation-propagate-information-about-rsb-filling-mitigation-to-sysfs.patch
@@ -19571,15 +19574,19 @@
patches.drivers/net-ibmnvic-Fix-deadlock-problem-in-reset.patch
patches.suse/net-mlx5e-Fix-selftest-for-small-MTUs.patch
patches.suse/tg3-Add-PHY-reset-for-5717-5719-5720-in-change-ring-.patch
+ patches.suse/net-skb_scrub_packet-Scrub-offload_fwd_mark.patch
patches.drivers/brcmutil-really-fix-decoding-channel-info-for-160-MH.patch
patches.drivers/iwlwifi-fix-wrong-WGDS_WIFI_DATA_SIZE.patch
patches.drivers/iwlwifi-mvm-support-sta_statistics-even-on-older-fir.patch
patches.drivers/iwlwifi-mvm-fix-regulatory-domain-update-when-the-fi.patch
patches.drivers/iwlwifi-mvm-don-t-use-SAR-Geo-if-basic-SAR-is-not-us.patch
patches.drivers/brcmfmac-fix-reporting-support-for-160-MHz-channels.patch
+ patches.suse/net-thunderx-set-xdp_prog-to-NULL-if-bpf_prog_add-fa.patch
patches.drivers/ibmvnic-Fix-RX-queue-buffer-cleanup.patch
patches.drivers/ibmvnic-Update-driver-queues-after-change-in-ring-si.patch
+ patches.suse/virtio-net-fail-XDP-set-if-guest-csum-is-negotiated.patch
patches.fixes/team-no-need-to-do-team_notify_peers-or-team_mcast_r.patch
+ patches.suse/net-thunderx-set-tso_hdrs-pointer-to-NULL-in-nicvf_f.patch
patches.drivers/HID-input-Ignore-battery-reported-by-Symbol-DS4308.patch
patches.drivers/HID-uhid-forbid-UHID_CREATE-under-KERNEL_DS-or-eleva.patch
patches.drivers/HID-multitouch-Add-pointstick-support-for-Cirque-Tou.patch
@@ -19595,6 +19602,8 @@
patches.suse/btrfs-always-try-all-copies-when-reading-extent-buffers.patch
patches.suse/0003-Btrfs-send-fix-infinite-loop-due-to-directory-rename.patch
patches.fixes/bpf-fix-check-of-allowed-specifiers-in-bpf_trace_pri.patch
+ patches.suse/usbnet-ipheth-fix-potential-recvmsg-bug-and-recvmsg-.patch
+ patches.suse/rapidio-rionet-do-not-free-skb-before-reading-its-le.patch
patches.arch/s390-sles15-17-03-s390-qeth-fix-length-check-in-SNMP-processing.patch
patches.fixes/udf-Allow-mounting-volumes-with-incorrect-identifica.patch
patches.fixes/ext2-fix-potential-use-after-free.patch
@@ -19752,6 +19761,7 @@
patches.drivers/mac80211-fix-reordering-of-buffered-broadcast-packet.patch
patches.drivers/mac80211-ignore-NullFunc-frames-in-the-duplicate-det.patch
patches.drivers/net-mlx4_core-Correctly-set-PFC-param-if-global-paus.patch
+ patches.drivers/Input-restore-EV_ABS-ABS_RESERVED.patch
patches.drivers/ALSA-hda-realtek-Fixed-headphone-issue-for-ALC700.patch
patches.drivers/ALSA-hda-realtek-Fix-the-mute-LED-regresion-on-Lenov.patch
patches.drivers/ALSA-fireface-fix-reference-to-wrong-register-for-cl.patch
@@ -19786,6 +19796,9 @@
patches.drivers/gpiolib-acpi-Only-defer-request_irq-for-GpioInt-ACPI.patch
patches.drivers/gpio-max7301-fix-driver-for-use-with-CONFIG_VMAP_STA.patch
patches.drivers/gpio-mvebu-only-fail-on-missing-clk-if-pwm-is-actual.patch
+ patches.drivers/Input-omap-keypad-fix-idle-configuration-to-not-bloc.patch
+ patches.drivers/Input-synaptics-enable-RMI-on-ThinkPad-T560.patch
+ patches.drivers/Input-synaptics-enable-SMBus-for-HP-EliteBook-840-G4.patch
patches.drm/0001-drm-ioctl-Fix-Spectre-v1-vulnerabilities.patch
patches.fixes/x86-mm-Fix-decoy-address-handling-vs-32-bit-builds.patch
patches.drm/0001-drm-rockchip-psr-do-not-dereference-encoder-before-i.patch
@@ -19816,7 +19829,9 @@
patches.drivers/device-property-fix-fwnode_graph_get_next_endpoint-d.patch
patches.drivers/platform-msi-Free-descriptors-in-platform_msi_domain.patch
patches.fixes/0001-x86-speculation-l1tf-Drop-the-swap-storage-limit-res.patch
+ patches.arch/x86-resctrl-fix-rdt_find_domain-return-value-and-checks.patch
patches.fixes/tools-lib-lockdep-Rename-trywlock-into-trywrlock.patch
+ patches.arch/x86-mm-drop-usage-of-_flush_tlb_all-in-kernel_physical_mapping_init.patch
patches.arch/powerpc-pkeys-Fix-handling-of-pkey-state-across-fork.patch
patches.drivers/can-flexcan-flexcan_irq-fix-indention.patch
patches.drivers/wlcore-Fix-the-return-value-in-case-of-error-in-wlco.patch
@@ -19898,6 +19913,7 @@
patches.drivers/iommu-amd-fix-amd_iommu-force_isolation
patches.fixes/sunrpc-use-SVC_NET-in-svcauth_gss_-functions.patch
patches.fixes/sunrpc-use-after-free-in-svc_process_common.patch
+ patches.drivers/Input-elan_i2c-add-ACPI-ID-for-touchpad-in-ASUS-Aspi.patch
patches.drivers/Input-nomadik-ske-keypad-fix-a-loop-timeout-test.patch
patches.drivers/input-add-official-raspberry-pi-s-touchscreen-driver.patch
patches.drivers/ALSA-hda-realtek-Enable-the-headset-mic-auto-detecti.patch
@@ -19914,7 +19930,10 @@
patches.drivers/ALSA-cs46xx-Potential-NULL-dereference-in-probe.patch
patches.drivers/ALSA-hda-realtek-Add-unplug-function-into-unplug-sta.patch
patches.drivers/ALSA-hda-realtek-Disable-headset-Mic-VREF-for-headse.patch
+ patches.arch/x86-modpost-replace-last-remnants-of-retpoline-with-config_retpoline.patch
+ patches.drm/drm-nouveau-Don-t-disable-polling-in-fallback-mode.patch
patches.drm/0001-drm-fb-helper-Ignore-the-value-of-fb_var_screeninfo..patch
+ patches.fixes/kvm-sev-fail-kvm_sev_init-if-already-initialized.patch
patches.drivers/tty-Don-t-hold-ldisc-lock-in-tty_reopen-if-ldisc-pre.patch
# dhowells/linux-fs keys-uefi
@@ -20286,7 +20305,6 @@
patches.arch/drm-hibmc-Use-set_busid-function-from-drm-core.patch
patches.drm/drm-hibmc-initialize-the-hibmc_bo_driver_io_mem_pfn.patch
- patches.drm/drm-nouveau-Don-t-disable-polling-in-fallback-mode.patch
patches.suse/drm-i915-CFL-NVMe-breakage-workaround.patch
patches.drm/drm-Add-DRM-client-cap-for-aspect-ratio