From 088a50c52e6f720fdbd321871fb3e30e241508c5 Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Mon, 6 Jul 2015 16:34:35 -0400 Subject: [PATCH] Linux v4.2-rc1 - Disable debug options. - Add patch to fix perf build --- ...tomatically-enforce-module-signature.patch | 16 +-- Add-secure_modules-call.patch | 10 +- ...q-option-to-disable-secure-boot-mode.patch | 31 +++-- KEYS-Add-a-system-blacklist-keyring.patch | 4 +- Kbuild-Add-an-option-to-enable-GCC-VTA.patch | 6 +- ...t-certificates-from-UEFI-Secure-Boot.patch | 6 +- ...PI-video-change-acpi-video-brightnes.patch | 4 +- ..._rsdp-kernel-parameter-when-module-l.patch | 2 +- arm64-acpi-drop-expert-patch.patch | 2 +- ...ing-console-to-enable-serial-console.patch | 4 +- ...t-debugfs-interface-when-module-load.patch | 8 +- config-arm-generic | 8 +- config-arm64 | 2 - config-armv7 | 9 +- config-armv7-generic | 8 +- config-generic | 29 ++++- config-nodebug | 112 +++++++++--------- config-powerpc64 | 1 + config-powerpc64-generic | 3 - config-s390x | 2 + config-x86-32-generic | 1 + config-x86-generic | 7 +- config-x86_64-generic | 6 + criu-no-expert.patch | 6 +- drm-i915-hush-check-crtc-state.patch | 2 +- efi-Add-EFI_SECURE_BOOT-bit.patch | 4 +- ...ECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch | 4 +- ...able-in-a-signed-modules-environment.patch | 2 +- kbuild-AFTER_LINK.patch | 2 +- kernel.spec | 19 ++- ...-runtime-if-the-kernel-enforces-modu.patch | 4 +- lis3-improve-handling-of-null-rate.patch | 2 +- ...d-kvm-Fix-KVM-preempt_notifier-usage.patch | 80 ------------- sources | 2 +- ...e-Add-RCU-wrappers-to-make-rbtree.h-.patch | 65 ++++++++++ 35 files changed, 247 insertions(+), 226 deletions(-) delete mode 100644 sched-kvm-Fix-KVM-preempt_notifier-usage.patch create mode 100644 tools-perf-rbtree-Add-RCU-wrappers-to-make-rbtree.h-.patch diff --git a/Add-option-to-automatically-enforce-module-signature.patch b/Add-option-to-automatically-enforce-module-signature.patch index 90cbddc8a..6bdd2be92 100644 --- a/Add-option-to-automatically-enforce-module-signature.patch +++ b/Add-option-to-automatically-enforce-module-signature.patch @@ -33,10 +33,10 @@ index 82fbdbc1e0b0..a811210ad486 100644 290/040 ALL edd_mbr_sig_buffer EDD MBR signatures 2D0/A00 ALL e820_map E820 memory map table diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig -index d05a42357ef0..6c218407e987 100644 +index 55bced17dc95..3b500f57c676 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig -@@ -1696,6 +1696,16 @@ config EFI_MIXED +@@ -1698,6 +1698,16 @@ config EFI_MIXED If unsure, say N. @@ -129,10 +129,10 @@ index ab456dc233b5..74ba4083e7ce 100644 * The sentinel is set to a nonzero value (0xff) in header.S. * diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c -index d3b95b89e9b2..d3071ca120eb 100644 +index 80f874bf999e..c2e4f52cad30 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c -@@ -1161,6 +1161,12 @@ void __init setup_arch(char **cmdline_p) +@@ -1160,6 +1160,12 @@ void __init setup_arch(char **cmdline_p) io_delay_init(); @@ -146,10 +146,10 @@ index d3b95b89e9b2..d3071ca120eb 100644 * Parse the ACPI tables for possible boot-time SMP configuration. */ diff --git a/include/linux/module.h b/include/linux/module.h -index 3da68fd1f657..ec76d890c9f2 100644 +index 57474384b66b..b69d657c3700 100644 --- a/include/linux/module.h +++ b/include/linux/module.h -@@ -188,6 +188,12 @@ const struct exception_table_entry *search_exception_tables(unsigned long add); +@@ -189,6 +189,12 @@ const struct exception_table_entry *search_exception_tables(unsigned long add); struct notifier_block; @@ -163,10 +163,10 @@ index 3da68fd1f657..ec76d890c9f2 100644 extern int modules_disabled; /* for sysctl */ diff --git a/kernel/module.c b/kernel/module.c -index 5d3e6c6191fa..4c682ab7e640 100644 +index c3bce9c6a746..ad221aaf1400 100644 --- a/kernel/module.c +++ b/kernel/module.c -@@ -3926,6 +3926,13 @@ void module_layout(struct module *mod, +@@ -4083,6 +4083,13 @@ void module_layout(struct module *mod, EXPORT_SYMBOL(module_layout); #endif diff --git a/Add-secure_modules-call.patch b/Add-secure_modules-call.patch index 1d7ddcb98..6a01b9f17 100644 --- a/Add-secure_modules-call.patch +++ b/Add-secure_modules-call.patch @@ -16,10 +16,10 @@ Signed-off-by: Matthew Garrett 2 files changed, 16 insertions(+) diff --git a/include/linux/module.h b/include/linux/module.h -index 7ffe0851d244..3da68fd1f657 100644 +index d67b1932cc59..57474384b66b 100644 --- a/include/linux/module.h +++ b/include/linux/module.h -@@ -515,6 +515,8 @@ static inline bool module_requested_async_probing(struct module *module) +@@ -551,6 +551,8 @@ static inline bool module_requested_async_probing(struct module *module) return module && module->async_probe_requested; } @@ -28,7 +28,7 @@ index 7ffe0851d244..3da68fd1f657 100644 #else /* !CONFIG_MODULES... */ /* Given an address, look for it in the exception tables. */ -@@ -631,6 +633,10 @@ static inline bool module_requested_async_probing(struct module *module) +@@ -667,6 +669,10 @@ static inline bool module_requested_async_probing(struct module *module) return false; } @@ -40,10 +40,10 @@ index 7ffe0851d244..3da68fd1f657 100644 #ifdef CONFIG_SYSFS diff --git a/kernel/module.c b/kernel/module.c -index f80a97f7da1f..5d3e6c6191fa 100644 +index 3e0e19763d24..c3bce9c6a746 100644 --- a/kernel/module.c +++ b/kernel/module.c -@@ -3925,3 +3925,13 @@ void module_layout(struct module *mod, +@@ -4082,3 +4082,13 @@ void module_layout(struct module *mod, } EXPORT_SYMBOL(module_layout); #endif diff --git a/Add-sysrq-option-to-disable-secure-boot-mode.patch b/Add-sysrq-option-to-disable-secure-boot-mode.patch index af76163f6..236aecf8a 100644 --- a/Add-sysrq-option-to-disable-secure-boot-mode.patch +++ b/Add-sysrq-option-to-disable-secure-boot-mode.patch @@ -11,11 +11,11 @@ Upstream-status: Fedora mustard include/linux/input.h | 5 +++++ include/linux/sysrq.h | 8 +++++++- kernel/debug/kdb/kdb_main.c | 2 +- - kernel/module.c | 4 ++-- - 7 files changed, 65 insertions(+), 10 deletions(-) + kernel/module.c | 2 +- + 7 files changed, 64 insertions(+), 9 deletions(-) diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c -index 9bcd51050511..0290275eaaf8 100644 +index 5def6b4143fa..1eac9d22cb0b 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c @@ -70,6 +70,11 @@ @@ -30,7 +30,7 @@ index 9bcd51050511..0290275eaaf8 100644 #include