Package: linux / 6.17.7-1

Metadata

Package Version Patches format
linux 6.17.7-1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
bugfix/x86/perf tools fix unwind build on i386.patch | (download)

tools/perf/arch/x86/util/unwind-libunwind.c | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 perf tools: fix unwind build on i386
bugfix/arm/arm mm export __sync_icache_dcache for xen privcmd.patch | (download)

arch/arm/mm/flush.c | 1 1 + 0 - 0 !
1 file changed, 1 insertion(+)

 arm: mm: export __sync_icache_dcache() for xen-privcmd
bugfix/powerpc/powerpc boot fix missing crc32poly.h when building with kernel_xz.patch | (download)

arch/powerpc/boot/Makefile | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 powerpc/boot: fix missing crc32poly.h when building with kernel_xz
bugfix/arm64/arm64 acpi Add fixup for HPE m400 quirks.patch | (download)

arch/arm64/kernel/acpi.c | 31 31 + 0 - 0 !
1 file changed, 31 insertions(+)

 arm64/acpi: add fixup for hpe m400 quirks
features/x86/x86 memtest WARN if bad RAM found.patch | (download)

mm/memtest.c | 4 4 + 0 - 0 !
1 file changed, 4 insertions(+)

 x86: memtest: warn if bad ram found
Bug-Debian: https://bugs.debian.org/613321
features/x86/x86 make x32 syscall support conditional.patch | (download)

Documentation/admin-guide/kernel-parameters.txt | 4 4 + 0 - 0 !
arch/x86/Kconfig | 8 8 + 0 - 0 !
arch/x86/entry/syscall_64.c | 50 49 + 1 - 0 !
arch/x86/include/asm/elf.h | 6 5 + 1 - 0 !
arch/x86/include/asm/syscall.h | 13 13 + 0 - 0 !
5 files changed, 79 insertions(+), 2 deletions(-)

 x86: make x32 syscall support conditional on a kernel parameter
Bug-Debian: https://bugs.debian.org/708070
bugfix/all/disable some marvell phys.patch | (download)

drivers/net/phy/marvell.c | 16 13 + 3 - 0 !
1 file changed, 13 insertions(+), 3 deletions(-)

 phy/marvell: disable 4-port phys
Date: Wed, 20 Nov 2013 08:30:14 +0000
Bug-Debian: https://bugs.debian.org/723177
bugfix/all/fs add module_softdep declarations for hard coded cr.patch | (download)

fs/btrfs/super.c | 2 1 + 1 - 0 !
fs/jbd2/journal.c | 1 1 + 0 - 0 !
fs/nfsd/nfsctl.c | 3 3 + 0 - 0 !
3 files changed, 5 insertions(+), 1 deletion(-)

 fs: add module_softdep declarations for hard-coded crypto drivers
Bug-Debian: https://bugs.debian.org/819725
features/all/lockdown/efi add an efi_secure_boot flag to indicate secure b.patch | (download)

arch/x86/kernel/setup.c | 14 1 + 13 - 0 !
drivers/firmware/efi/Makefile | 1 1 + 0 - 0 !
drivers/firmware/efi/secureboot.c | 39 39 + 0 - 0 !
include/linux/efi.h | 17 10 + 7 - 0 !
4 files changed, 51 insertions(+), 20 deletions(-)

 [28/30] efi: add an efi_secure_boot flag to indicate secure boot mode
features/all/lockdown/efi lock down the kernel if booted in secure boot mo.patch | (download)

arch/x86/kernel/setup.c | 4 2 + 2 - 0 !
drivers/firmware/efi/secureboot.c | 5 5 + 0 - 0 !
include/linux/security.h | 6 6 + 0 - 0 !
security/lockdown/Kconfig | 15 15 + 0 - 0 !
security/lockdown/lockdown.c | 2 1 + 1 - 0 !
5 files changed, 29 insertions(+), 3 deletions(-)


> UEFI Secure Boot provides a mechanism for ensuring that the firmware will
> only load signed bootloaders and kernels.  Certain use cases may also
> require that all kernel modules also be signed.  Add a configuration option
> that to lock down the kernel - which includes requiring validly signed
> modules - if the kernel is secure-booted.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
[Salvatore Bonaccorso: After fixing https://bugs.debian.org/956197 the
help text for LOCK_DOWN_IN_EFI_SECURE_BOOT was adjusted to mention that
lockdown is triggered in integrity mode (https://bugs.debian.org/1025417)]
Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>

features/all/lockdown/mtd disable slram and phram when locked down.patch | (download)

drivers/mtd/devices/phram.c | 6 5 + 1 - 0 !
drivers/mtd/devices/slram.c | 9 8 + 1 - 0 !
2 files changed, 13 insertions(+), 2 deletions(-)

 mtd: phram,slram: disable when the kernel is locked down
features/all/lockdown/arm64 add kernel config option to lock down when.patch | (download)

drivers/firmware/efi/efi-init.c | 5 4 + 1 - 0 !
drivers/firmware/efi/fdtparams.c | 12 11 + 1 - 0 !
drivers/firmware/efi/libstub/fdt.c | 6 6 + 0 - 0 !
include/linux/efi.h | 3 2 + 1 - 0 !
4 files changed, 23 insertions(+), 3 deletions(-)

 arm64: add kernel config option to lock down when in secure boot mode
Bug-Debian: https://bugs.debian.org/831827
features/all/db mok keyring/KEYS Make use of platform keyring for module signature.patch | (download)

kernel/module/signing.c | 9 8 + 1 - 0 !
1 file changed, 8 insertions(+), 1 deletion(-)

 [patch] keys: make use of platform keyring for module signature
 verify
Bug-Debian: https://bugs.debian.org/935945
Bug-Debian: https://bugs.debian.org/1030200
bugfix/all/module disable matching missing version crc.patch | (download)

kernel/module/version.c | 5 2 + 3 - 0 !
1 file changed, 2 insertions(+), 3 deletions(-)

 module: disable matching missing version crc
bugfix/all/usbip document tcp wrappers.patch | (download)

tools/usb/usbip/doc/usbipd.8 | 6 4 + 2 - 0 !
1 file changed, 4 insertions(+), 2 deletions(-)

 usbip: document tcp wrappers
bugfix/all/kbuild fix recordmcount dependency.patch | (download)

scripts/Makefile.build | 5 5 + 0 - 0 !
1 file changed, 5 insertions(+)

 kbuild: fix recordmcount dependency for oot modules
Date: Mon, 08 Sep 2014 18:31:24 +0100
bugfix/all/tools perf remove shebangs.patch | (download)

tools/perf/scripts/perl/rw-by-file.pl | 1 0 + 1 - 0 !
tools/perf/scripts/perl/rw-by-pid.pl | 1 0 + 1 - 0 !
tools/perf/scripts/perl/rwtop.pl | 1 0 + 1 - 0 !
tools/perf/scripts/perl/wakeup-latency.pl | 1 0 + 1 - 0 !
4 files changed, 4 deletions(-)

 tools/perf: remove shebang lines from perf scripts
bugfix/all/tools build remove bpf run time check at build time.patch | (download)

tools/build/feature/test-bpf.c | 8 5 + 3 - 0 !
1 file changed, 5 insertions(+), 3 deletions(-)

 tools/build: remove bpf() run-time check at build time
bugfix/all/cpupower fix checks for cpu existence.patch | (download)

tools/power/cpupower/bench/system.c | 13 10 + 3 - 0 !
1 file changed, 10 insertions(+), 3 deletions(-)

 cpupower: fix checks for cpu existence
bugfix/all/libapi define _fortify_source as 2 not empty.patch | (download)

tools/lib/api/Makefile | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 libapi: define _fortify_source as 2, not empty
bugfix/all/tools perf fix missing ldflags for some programs.patch | (download)

tools/perf/Makefile.perf | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 tools/perf: fix missing ldflags for some programs

Signed-off-by: Ben Hutchings <benh@debian.org>

bugfix/all/tools_lib_symbol_use_d_fortify_source_2_for_non_debug_builds.patch | (download)

tools/lib/symbol/Makefile | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 tools lib symbol: use -d_fortify_source=2 for non-debug builds
Date: Mon, 24 Apr 2023 12:28:27 +0200
bugfix/all/perf tools support extra cxxflags.patch | (download)

tools/perf/Makefile.config | 1 1 + 0 - 0 !
tools/perf/Makefile.perf | 2 1 + 1 - 0 !
2 files changed, 2 insertions(+), 1 deletion(-)

 perf tools: support extra_cxxflags

Add support for an EXTRA_CXXFLAGS variable, used similarly to
EXTRA_CFLAGS.

Signed-off-by: Ben Hutchings <benh@debian.org>

bugfix/all/perf tools pass extra_cflags through to libbpf build again.patch | (download)

tools/perf/Makefile.perf | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 perf tools: pass extra_cflags through to libbpf build again

When perf was statically linked to libbpf, any definition of
EXTRA_CFLAGS passed to Makefile.perf propagated to the sub-make of
libbpf.  Since commit 9dabf4003423 ("perf python: Switch module to
linking libraries from building source"), EXTRA_CFLAGS is overridden
to "-fPIC" for the sub-make.

Change to include any user-provided EXTRA_CFLAGS before the "-fPIC"
option.

Fixes: 9dabf4003423 ("perf python: Switch module to linking libraries ...")
Signed-off-by: Ben Hutchings <benh@debian.org>

bugfix/all/kbuild bpf fix btf reproducibility.patch | (download)

scripts/Makefile.btf | 14 12 + 2 - 0 !
1 file changed, 12 insertions(+), 2 deletions(-)

 kbuild, bpf: fix btf reproducibility

pahole 1.22 introduced the -j option for parallel processing, and
kbuild uses it, but this makes its output unreproducible.

pahole 1.27 introduced --btf_features=+reproducible_build which makes
the output reproducible even when -j is used.

Assume that if KBUILD_BUILD_TIMESTAMP is set then a reproducible build
is required, and use both options if available or neither if not.

Signed-off-by: Ben Hutchings <benh@debian.org>

bugfix/all/perf docs Fix perf check manual page built with asci.patch | (download)

tools/perf/Documentation/perf-check.txt | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch] perf docs: fix perf-check manual page built with asciidoctor
bugfix/all/libbpf use the standard fixdep build rule.patch | (download)

tools/lib/bpf/Makefile | 8 4 + 4 - 0 !
1 file changed, 4 insertions(+), 4 deletions(-)

 libbpf: use the standard fixdep build rule

libbpf's all target depends on the fixdep target defined in
tools/scripts/Makefile.include.  However the $(BPF_IN_SHARED) and
$(BPF_IN_STATIC) targets don't use it, but instead rebuild fixdep in
bugfix/all/tools hv Make the sample hv_get_dhcp_info script mor.patch | (download)

tools/hv/hv_get_dhcp_info.sh | 87 75 + 12 - 0 !
1 file changed, 75 insertions(+), 12 deletions(-)

 tools/hv: make the sample hv_get_dhcp_info script more useful