From 5f94435ddd350f77bd0e83e69ce047cc4cd9bfdb Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Thu, 7 May 2015 09:22:36 -0400 Subject: [PATCH] Linux v4.1-rc2-79-g0e1dc4274828 --- ACPI-Limit-access-to-custom_method.patch | 3 --- ARM-tegra-usb-no-reset.patch | 3 --- Add-EFI-signature-data-types.patch | 3 --- Add-an-EFI-signature-blob-parser-and-key-loader.patch | 3 --- Add-option-to-automatically-enforce-module-signature.patch | 7 ++----- Add-secure_modules-call.patch | 3 --- Add-sysrq-option-to-disable-secure-boot-mode.patch | 3 --- Input-synaptics-pin-3-touches-when-the-firmware-repo.patch | 3 --- KEYS-Add-a-system-blacklist-keyring.patch | 3 --- Kbuild-Add-an-option-to-enable-GCC-VTA.patch | 5 +---- MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch | 3 --- MODSIGN-Support-not-importing-certs-from-db.patch | 3 --- PCI-Lock-down-BAR-access-when-module-security-is-ena.patch | 3 --- Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch | 3 --- Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch | 3 --- acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch | 3 --- amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch | 3 --- amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch | 3 --- arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch | 3 --- arm-dts-am335x-bone-common-enable-and-use-i2c2.patch | 3 --- arm-dts-am335x-bone-common-setup-default-pinmux-http.patch | 3 --- arm-dts-am335x-boneblack-add-cpu0-opp-points.patch | 3 --- arm-dts-am335x-boneblack-lcdc-add-panel-info.patch | 3 --- arm-highbank-l2-reverts.patch | 3 --- arm-i.MX6-Utilite-device-dtb.patch | 3 --- arm64-avoid-needing-console-to-enable-serial-console.patch | 3 --- asus-wmi-Restrict-debugfs-interface-when-module-load.patch | 3 --- ath9k-rx-dma-stop-check.patch | 3 --- crash-driver.patch | 3 --- criu-no-expert.patch | 3 --- die-floppy-die.patch | 3 --- disable-i8042-check-on-apple-mac.patch | 3 --- drm-i915-hush-check-crtc-state.patch | 3 --- efi-Add-EFI_SECURE_BOOT-bit.patch | 3 --- efi-Add-esrt-support.patch | 3 --- efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch | 5 +---- efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch | 3 --- hibernate-Disable-in-a-signed-modules-environment.patch | 3 --- input-kill-stupid-messages.patch | 3 --- input-silence-i8042-noise.patch | 3 --- kbuild-AFTER_LINK.patch | 3 --- kernel.spec | 5 ++++- kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch | 3 --- lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch | 3 --- libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch | 3 --- lis3-improve-handling-of-null-rate.patch | 3 --- no-pcspkr-modalias.patch | 3 --- pinctrl-pinctrl-single-must-be-initialized-early.patch | 3 --- scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch | 3 --- silence-fbcon-logo.patch | 3 --- sources | 2 +- usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch | 3 --- watchdog-Disable-watchdog-on-virtual-machines.patch | 3 --- x86-Lock-down-IO-port-access-when-module-security-is.patch | 3 --- x86-Restrict-MSR-access-when-module-loading-is-restr.patch | 3 --- xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch | 3 --- 56 files changed, 9 insertions(+), 168 deletions(-) diff --git a/ACPI-Limit-access-to-custom_method.patch b/ACPI-Limit-access-to-custom_method.patch index eeda0f35d..88709a324 100644 --- a/ACPI-Limit-access-to-custom_method.patch +++ b/ACPI-Limit-access-to-custom_method.patch @@ -25,6 +25,3 @@ index c68e72414a67..4277938af700 100644 if (!(*ppos)) { /* parse the table header to get the table length */ if (count <= sizeof(struct acpi_table_header)) --- -2.3.6 - diff --git a/ARM-tegra-usb-no-reset.patch b/ARM-tegra-usb-no-reset.patch index dc4ebb98f..75e4a3107 100644 --- a/ARM-tegra-usb-no-reset.patch +++ b/ARM-tegra-usb-no-reset.patch @@ -26,6 +26,3 @@ index 3b7151687776..4b19e7e5bc01 100644 /* Lock the device, then check to see if we were * disconnected while waiting for the lock to succeed. */ usb_lock_device(hdev); --- -2.3.6 - diff --git a/Add-EFI-signature-data-types.patch b/Add-EFI-signature-data-types.patch index 6a64df78a..ba3f85e7f 100644 --- a/Add-EFI-signature-data-types.patch +++ b/Add-EFI-signature-data-types.patch @@ -51,6 +51,3 @@ index aa4ee20ec8bb..958d1d9a5af8 100644 /* * All runtime access to EFI goes through this structure: */ --- -2.3.6 - diff --git a/Add-an-EFI-signature-blob-parser-and-key-loader.patch b/Add-an-EFI-signature-blob-parser-and-key-loader.patch index bb339a89b..66f99885e 100644 --- a/Add-an-EFI-signature-blob-parser-and-key-loader.patch +++ b/Add-an-EFI-signature-blob-parser-and-key-loader.patch @@ -173,6 +173,3 @@ index 958d1d9a5af8..3dd6f4a51b9b 100644 /** * efi_range_is_wc - check the WC bit on an address range * @start: starting kvirt address --- -2.3.6 - diff --git a/Add-option-to-automatically-enforce-module-signature.patch b/Add-option-to-automatically-enforce-module-signature.patch index c26bf528a..9116a71e7 100644 --- a/Add-option-to-automatically-enforce-module-signature.patch +++ b/Add-option-to-automatically-enforce-module-signature.patch @@ -54,7 +54,7 @@ index 226d5696e1d1..6a8f880e213f 100644 def_bool y prompt "Enable seccomp to safely compute untrusted bytecode" diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c -index ef17683484e9..105e7360d747 100644 +index 48304b89b601..2ff19014117a 100644 --- a/arch/x86/boot/compressed/eboot.c +++ b/arch/x86/boot/compressed/eboot.c @@ -12,6 +12,7 @@ @@ -103,7 +103,7 @@ index ef17683484e9..105e7360d747 100644 /* * See if we have Graphics Output Protocol */ -@@ -1406,6 +1438,10 @@ struct boot_params *efi_main(struct efi_config *c, +@@ -1408,6 +1440,10 @@ struct boot_params *efi_main(struct efi_config *c, else setup_boot_services32(efi_early); @@ -180,6 +180,3 @@ index f43cbdd52546..feb6736fec91 100644 bool secure_modules(void) { #ifdef CONFIG_MODULE_SIG --- -2.3.6 - diff --git a/Add-secure_modules-call.patch b/Add-secure_modules-call.patch index 20a88b0f0..79ccc5c2a 100644 --- a/Add-secure_modules-call.patch +++ b/Add-secure_modules-call.patch @@ -58,6 +58,3 @@ index 42a1d2afb217..f43cbdd52546 100644 +#endif +} +EXPORT_SYMBOL(secure_modules); --- -2.3.6 - diff --git a/Add-sysrq-option-to-disable-secure-boot-mode.patch b/Add-sysrq-option-to-disable-secure-boot-mode.patch index d2d9f7716..0ff29e9f9 100644 --- a/Add-sysrq-option-to-disable-secure-boot-mode.patch +++ b/Add-sysrq-option-to-disable-secure-boot-mode.patch @@ -243,6 +243,3 @@ index feb6736fec91..5ea645737f23 100644 static int param_set_bool_enable_only(const char *val, const struct kernel_param *kp) --- -2.3.6 - diff --git a/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch b/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch index d1f70e726..ec0ba702a 100644 --- a/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch +++ b/Input-synaptics-pin-3-touches-when-the-firmware-repo.patch @@ -45,6 +45,3 @@ index 630af73e98c4..c69b308beb3f 100644 input_mt_drop_unused(dev); /* Don't use active slot count to generate BTN_TOOL events. */ --- -2.3.6 - diff --git a/KEYS-Add-a-system-blacklist-keyring.patch b/KEYS-Add-a-system-blacklist-keyring.patch index 198ed561c..746913a32 100644 --- a/KEYS-Add-a-system-blacklist-keyring.patch +++ b/KEYS-Add-a-system-blacklist-keyring.patch @@ -106,6 +106,3 @@ index 875f64e8935b..c15e93f5a418 100644 return 0; } --- -2.3.6 - diff --git a/Kbuild-Add-an-option-to-enable-GCC-VTA.patch b/Kbuild-Add-an-option-to-enable-GCC-VTA.patch index 7c1f29ffd..a52d36a0e 100644 --- a/Kbuild-Add-an-option-to-enable-GCC-VTA.patch +++ b/Kbuild-Add-an-option-to-enable-GCC-VTA.patch @@ -59,7 +59,7 @@ index 2da553fd7fc3..32f118807d2a 100644 ifdef CONFIG_DEBUG_INFO ifdef CONFIG_DEBUG_INFO_SPLIT diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug -index 17670573dda8..d23b7c975eb5 100644 +index ba2b0c87e65b..390e4089c086 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -165,7 +165,23 @@ config DEBUG_INFO_DWARF4 @@ -87,6 +87,3 @@ index 17670573dda8..d23b7c975eb5 100644 config GDB_SCRIPTS bool "Provide GDB scripts for kernel debugging" --- -2.3.6 - diff --git a/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch b/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch index 49a9a82ee..fcdc908f1 100644 --- a/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch +++ b/MODSIGN-Import-certificates-from-UEFI-Secure-Boot.patch @@ -180,6 +180,3 @@ index 000000000000..94b0eb38a284 + return rc; +} +late_initcall(load_uefi_certs); --- -2.3.6 - diff --git a/MODSIGN-Support-not-importing-certs-from-db.patch b/MODSIGN-Support-not-importing-certs-from-db.patch index cda8ad25e..4782e734f 100644 --- a/MODSIGN-Support-not-importing-certs-from-db.patch +++ b/MODSIGN-Support-not-importing-certs-from-db.patch @@ -78,6 +78,3 @@ index 94b0eb38a284..ae28b974d49a 100644 } mok = get_cert_list(L"MokListRT", &mok_var, &moksize); --- -2.3.6 - diff --git a/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch b/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch index 311edaf28..92e028d07 100644 --- a/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch +++ b/PCI-Lock-down-BAR-access-when-module-security-is-ena.patch @@ -111,6 +111,3 @@ index b91c4da68365..98f5637304d1 100644 return -EPERM; dev = pci_get_bus_and_slot(bus, dfn); --- -2.3.6 - diff --git a/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch b/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch index a531cfa72..27e4b2370 100644 --- a/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch +++ b/Restrict-dev-mem-and-dev-kmem-when-module-loading-is.patch @@ -36,6 +36,3 @@ index 53fe675f9bd7..b52c88860532 100644 if (p < (unsigned long) high_memory) { unsigned long to_write = min_t(unsigned long, count, (unsigned long)high_memory - p); --- -2.3.6 - diff --git a/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch b/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch index bf77b9e7e..f8e7a8fd8 100644 --- a/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch +++ b/Revert-Revert-ACPI-video-change-acpi-video-brightnes.patch @@ -40,6 +40,3 @@ index cc79d3fedfb2..d9bf8ba7d848 100644 module_param(brightness_switch_enabled, bool, 0644); /* --- -2.3.6 - diff --git a/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch b/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch index edb12d55d..bb0e0c7e8 100644 --- a/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch +++ b/acpi-Ignore-acpi_rsdp-kernel-parameter-when-module-l.patch @@ -33,6 +33,3 @@ index 39748bb3a543..72edfeedb326 100644 return acpi_rsdp; #endif --- -2.3.6 - diff --git a/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch b/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch index 8e039a16d..fa39d8675 100644 --- a/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch +++ b/amd-xgbe-a0-Add-support-for-XGBE-on-A0.patch @@ -10409,6 +10409,3 @@ index 000000000000..04c00d236c49 +#endif + +#endif --- -2.3.6 - diff --git a/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch b/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch index 52bb9ace7..2dc32fad5 100644 --- a/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch +++ b/amd-xgbe-phy-a0-Add-support-for-XGBE-PHY-on-A0.patch @@ -1841,6 +1841,3 @@ index 000000000000..c352d5c2989b + { } +}; +MODULE_DEVICE_TABLE(mdio, amd_xgbe_phy_a0_ids); --- -2.3.6 - diff --git a/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch b/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch index c72930769..50d01732a 100644 --- a/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch +++ b/arm-dts-am335x-bone-common-add-uart2_pins-uart4_pins.patch @@ -40,6 +40,3 @@ index 9688dda39e7a..8e3e77f3121f 100644 clkout2_pin: pinmux_clkout2_pin { pinctrl-single,pins = < 0x1b4 (PIN_OUTPUT_PULLDOWN | MUX_MODE3) /* xdma_event_intr1.clkout2 */ --- -2.3.6 - diff --git a/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch b/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch index bdb41922d..3e01f51e8 100644 --- a/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch +++ b/arm-dts-am335x-bone-common-enable-and-use-i2c2.patch @@ -64,6 +64,3 @@ index c3255e0c90aa..1fd496fe1a68 100644 }; /include/ "tps65217.dtsi" --- -2.3.6 - diff --git a/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch b/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch index 6c01209ae..2105fcb52 100644 --- a/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch +++ b/arm-dts-am335x-bone-common-setup-default-pinmux-http.patch @@ -267,6 +267,3 @@ index 1fd496fe1a68..9688dda39e7a 100644 + }; + }; }; --- -2.3.6 - diff --git a/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch b/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch index c4d08ad2c..edd9a3c9b 100644 --- a/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch +++ b/arm-dts-am335x-boneblack-add-cpu0-opp-points.patch @@ -36,6 +36,3 @@ index 0fd89c38cf02..20660917a06f 100644 hdmi { compatible = "ti,tilcdc,slave"; i2c = <&i2c0>; --- -2.3.6 - diff --git a/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch b/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch index b61ed4762..97f31f604 100644 --- a/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch +++ b/arm-dts-am335x-boneblack-lcdc-add-panel-info.patch @@ -34,6 +34,3 @@ index 5c42d259fa68..0fd89c38cf02 100644 }; }; --- -2.3.6 - diff --git a/arm-highbank-l2-reverts.patch b/arm-highbank-l2-reverts.patch index 93c67950c..9f0f89e53 100644 --- a/arm-highbank-l2-reverts.patch +++ b/arm-highbank-l2-reverts.patch @@ -55,6 +55,3 @@ index 231fba0d03e5..0de5a6ddd5eb 100644 .init_irq = highbank_init_irq, .init_machine = highbank_init, .dt_compat = highbank_match, --- -2.3.6 - diff --git a/arm-i.MX6-Utilite-device-dtb.patch b/arm-i.MX6-Utilite-device-dtb.patch index c2b449e4e..86f9e763d 100644 --- a/arm-i.MX6-Utilite-device-dtb.patch +++ b/arm-i.MX6-Utilite-device-dtb.patch @@ -60,6 +60,3 @@ index 99b46f8030ad..8b6ddd16dcc5 100644 + pinctrl-0 = <&pinctrl_usdhc3>; + status = "okay"; +}; --- -2.3.6 - diff --git a/arm64-avoid-needing-console-to-enable-serial-console.patch b/arm64-avoid-needing-console-to-enable-serial-console.patch index abf7cf16b..5c4fd194d 100644 --- a/arm64-avoid-needing-console-to-enable-serial-console.patch +++ b/arm64-avoid-needing-console-to-enable-serial-console.patch @@ -40,6 +40,3 @@ index 74753132c3ac..3cc99d7c2361 100644 + return 0; +} +early_initcall(arm64_console_setup); --- -2.3.6 - diff --git a/asus-wmi-Restrict-debugfs-interface-when-module-load.patch b/asus-wmi-Restrict-debugfs-interface-when-module-load.patch index 0140bff3b..929853201 100644 --- a/asus-wmi-Restrict-debugfs-interface-when-module-load.patch +++ b/asus-wmi-Restrict-debugfs-interface-when-module-load.patch @@ -48,6 +48,3 @@ index 7543a56e0f45..93b5a6998371 100644 status = wmi_evaluate_method(ASUS_WMI_MGMT_GUID, 1, asus->debug.method_id, &input, &output); --- -2.3.6 - diff --git a/ath9k-rx-dma-stop-check.patch b/ath9k-rx-dma-stop-check.patch index 3c556d082..40cbafc7b 100644 --- a/ath9k-rx-dma-stop-check.patch +++ b/ath9k-rx-dma-stop-check.patch @@ -36,6 +36,3 @@ index bba85d1a6cd1..ebbee8f17130 100644 ath_err(common, "DMA failed to stop in %d ms AR_CR=0x%08x AR_DIAG_SW=0x%08x DMADBG_7=0x%08x\n", AH_RX_STOP_DMA_TIMEOUT / 1000, --- -2.3.6 - diff --git a/crash-driver.patch b/crash-driver.patch index 198388746..31aff3680 100644 --- a/crash-driver.patch +++ b/crash-driver.patch @@ -504,6 +504,3 @@ index 000000000000..25ab9869d566 +#endif /* __KERNEL__ */ + +#endif /* __CRASH_H__ */ --- -2.3.6 - diff --git a/criu-no-expert.patch b/criu-no-expert.patch index 800ff185a..020f73c86 100644 --- a/criu-no-expert.patch +++ b/criu-no-expert.patch @@ -30,6 +30,3 @@ index 1c9c8e500a48..6d00970e220e 100644 depends on MULTIUSER default !EXPERT help --- -2.3.6 - diff --git a/die-floppy-die.patch b/die-floppy-die.patch index faf77b8a7..caaa2dde5 100644 --- a/die-floppy-die.patch +++ b/die-floppy-die.patch @@ -27,6 +27,3 @@ index a08cda955285..e320e1e679cf 100644 #else --- -2.3.6 - diff --git a/disable-i8042-check-on-apple-mac.patch b/disable-i8042-check-on-apple-mac.patch index c2b006d63..970d833d4 100644 --- a/disable-i8042-check-on-apple-mac.patch +++ b/disable-i8042-check-on-apple-mac.patch @@ -56,6 +56,3 @@ index 4022b75eaad7..1aaf06aa7b0f 100644 err = i8042_platform_init(); if (err) return err; --- -2.3.6 - diff --git a/drm-i915-hush-check-crtc-state.patch b/drm-i915-hush-check-crtc-state.patch index 3f1ba0281..f390cd96f 100644 --- a/drm-i915-hush-check-crtc-state.patch +++ b/drm-i915-hush-check-crtc-state.patch @@ -26,6 +26,3 @@ index d547d9c8dda2..f523ee679987 100644 intel_dump_pipe_config(crtc, &pipe_config, "[hw state]"); intel_dump_pipe_config(crtc, crtc->config, --- -2.3.6 - diff --git a/efi-Add-EFI_SECURE_BOOT-bit.patch b/efi-Add-EFI_SECURE_BOOT-bit.patch index b7e98b6d7..c6bc86018 100644 --- a/efi-Add-EFI_SECURE_BOOT-bit.patch +++ b/efi-Add-EFI_SECURE_BOOT-bit.patch @@ -37,6 +37,3 @@ index af5be0368dec..aa4ee20ec8bb 100644 #ifdef CONFIG_EFI /* --- -2.3.6 - diff --git a/efi-Add-esrt-support.patch b/efi-Add-esrt-support.patch index b1af87647..78126f2ef 100644 --- a/efi-Add-esrt-support.patch +++ b/efi-Add-esrt-support.patch @@ -778,6 +778,3 @@ index 9cc069579351..fa3546989ab0 100644 extern int efi_reboot_quirk_mode; extern bool efi_poweroff_required(void); --- -2.3.6 - diff --git a/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch b/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch index 99f316c00..6465cab3f 100644 --- a/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch +++ b/efi-Disable-secure-boot-if-shim-is-in-insecure-mode.patch @@ -14,7 +14,7 @@ Signed-off-by: Josh Boyer 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c -index 105e7360d747..83fc4e9888ee 100644 +index 2ff19014117a..35268abaca99 100644 --- a/arch/x86/boot/compressed/eboot.c +++ b/arch/x86/boot/compressed/eboot.c @@ -830,8 +830,9 @@ out: @@ -52,6 +52,3 @@ index 105e7360d747..83fc4e9888ee 100644 return 1; } --- -2.3.6 - diff --git a/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch b/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch index d74583326..862bb05f8 100644 --- a/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch +++ b/efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch @@ -24,6 +24,3 @@ index 6a8f880e213f..d3c21e9d267c 100644 prompt "Force module signing when UEFI Secure Boot is enabled" ---help--- UEFI Secure Boot provides a mechanism for ensuring that the --- -2.3.6 - diff --git a/hibernate-Disable-in-a-signed-modules-environment.patch b/hibernate-Disable-in-a-signed-modules-environment.patch index 2fc92120d..77e1e7036 100644 --- a/hibernate-Disable-in-a-signed-modules-environment.patch +++ b/hibernate-Disable-in-a-signed-modules-environment.patch @@ -33,6 +33,3 @@ index 2329daae5255..48a8e82c7e2e 100644 } /** --- -2.3.6 - diff --git a/input-kill-stupid-messages.patch b/input-kill-stupid-messages.patch index a3e864e92..04205f857 100644 --- a/input-kill-stupid-messages.patch +++ b/input-kill-stupid-messages.patch @@ -28,6 +28,3 @@ index ec876b5b1382..9d5216e23a09 100644 goto out; case ATKBD_RET_ERR: atkbd->err_count++; --- -2.3.6 - diff --git a/input-silence-i8042-noise.patch b/input-silence-i8042-noise.patch index b0793f2db..572dfb80c 100644 --- a/input-silence-i8042-noise.patch +++ b/input-silence-i8042-noise.patch @@ -60,6 +60,3 @@ index 32d710eaf1fc..af4a20b86ee7 100644 cp = can_get_proto(protocol); } --- -2.3.6 - diff --git a/kbuild-AFTER_LINK.patch b/kbuild-AFTER_LINK.patch index 75f55e20d..2ff2d2626 100644 --- a/kbuild-AFTER_LINK.patch +++ b/kbuild-AFTER_LINK.patch @@ -120,6 +120,3 @@ index 86a4fe75f453..161637ed5611 100755 } --- -2.3.6 - diff --git a/kernel.spec b/kernel.spec index 4f728dc07..ff38c9c6b 100644 --- a/kernel.spec +++ b/kernel.spec @@ -67,7 +67,7 @@ Summary: The Linux kernel # The rc snapshot level %define rcrev 2 # The git snapshot level -%define gitrev 2 +%define gitrev 3 # Set rpm version accordingly %define rpmversion 4.%{upstream_sublevel}.0 %endif @@ -2201,6 +2201,9 @@ fi # # %changelog +* Thu May 07 2015 Josh Boyer - 4.1.0-0.rc2.git3.1 +- Linux v4.1-rc2-79-g0e1dc4274828 + * Wed May 06 2015 Josh Boyer - 4.1.0-0.rc2.git2.1 - Linux v4.1-rc2-37-g5198b44374ad diff --git a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch b/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch index d1eb8ebb1..085d0b0be 100644 --- a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch +++ b/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch @@ -38,6 +38,3 @@ index 7a36fdcca5bf..22d30d7a12b8 100644 * Verify we have a legal set of flags * This leaves us room for future extensions. */ --- -2.3.6 - diff --git a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch b/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch index 2d204eb66..738264f0f 100644 --- a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch +++ b/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch @@ -32,6 +32,3 @@ index 601965a948e8..028213cf0e4d 100644 help Use dynamic allocation for cpumask_var_t, instead of putting them on the stack. This is a bit more expensive, but avoids --- -2.3.6 - diff --git a/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch b/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch index 4123f23e0..4a3ce52ae 100644 --- a/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch +++ b/libata-Blacklist-queued-TRIM-on-all-Samsung-800-seri.patch @@ -34,6 +34,3 @@ index f6cb1f1b30b7..4476fb590733 100644 ATA_HORKAGE_ZERO_AFTER_TRIM, }, /* --- -2.3.6 - diff --git a/lis3-improve-handling-of-null-rate.patch b/lis3-improve-handling-of-null-rate.patch index 73bb12bae..e8dd94683 100644 --- a/lis3-improve-handling-of-null-rate.patch +++ b/lis3-improve-handling-of-null-rate.patch @@ -73,6 +73,3 @@ index 4739689d23ad..d713074200f3 100644 if (err) return err; --- -2.3.6 - diff --git a/no-pcspkr-modalias.patch b/no-pcspkr-modalias.patch index 0b4258674..e43cd97eb 100644 --- a/no-pcspkr-modalias.patch +++ b/no-pcspkr-modalias.patch @@ -20,6 +20,3 @@ index 72b1fc3ab910..86907eaa4883 100644 static int pcspkr_event(struct input_dev *dev, unsigned int type, unsigned int code, int value) { --- -2.3.6 - diff --git a/pinctrl-pinctrl-single-must-be-initialized-early.patch b/pinctrl-pinctrl-single-must-be-initialized-early.patch index cdecc0e95..c7e86baef 100644 --- a/pinctrl-pinctrl-single-must-be-initialized-early.patch +++ b/pinctrl-pinctrl-single-must-be-initialized-early.patch @@ -32,6 +32,3 @@ index 13b45f297727..f84ce0135c38 100644 MODULE_AUTHOR("Tony Lindgren "); MODULE_DESCRIPTION("One-register-per-pin type device tree based pinctrl driver"); --- -2.3.6 - diff --git a/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch b/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch index 79ecc02e2..b8543ca2e 100644 --- a/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch +++ b/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch @@ -32,6 +32,3 @@ index 79beebf53302..eca0b7e0944f 100644 /* * If the device is offline, don't try and read capacity or any * of the other niceties. --- -2.3.6 - diff --git a/silence-fbcon-logo.patch b/silence-fbcon-logo.patch index 38e395689..e5549546d 100644 --- a/silence-fbcon-logo.patch +++ b/silence-fbcon-logo.patch @@ -50,6 +50,3 @@ index b97210671a81..2d12ad82fe75 100644 fs_initcall(fb_console_init); #ifdef MODULE --- -2.3.6 - diff --git a/sources b/sources index 4766fca94..491d18b86 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ a86916bd12798220da9eb4a1eec3616d linux-4.0.tar.xz d125eecce68ab6fb5f1f23523c2c04b8 perf-man-4.0.tar.gz 1af1ca2f20db7ebc2a94a786fb6f8e86 patch-4.1-rc2.xz -4a3c022b0d1df600e9d4a31ebe0d0828 patch-4.1-rc2-git2.xz +433b3ba53461a9116cf77b23a8877986 patch-4.1-rc2-git3.xz diff --git a/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch b/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch index c2b1f678c..f02e9b744 100644 --- a/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch +++ b/usb-make-xhci-platform-driver-use-64-bit-or-32-bit-D.patch @@ -38,6 +38,3 @@ index 783e819139a7..4f93ef6942d8 100644 hcd = usb_create_hcd(driver, &pdev->dev, dev_name(&pdev->dev)); if (!hcd) --- -2.3.6 - diff --git a/watchdog-Disable-watchdog-on-virtual-machines.patch b/watchdog-Disable-watchdog-on-virtual-machines.patch index ee57ed6b0..b43454c31 100644 --- a/watchdog-Disable-watchdog-on-virtual-machines.patch +++ b/watchdog-Disable-watchdog-on-virtual-machines.patch @@ -73,6 +73,3 @@ index 2316f50b07a4..da39c565a03e 100644 set_sample_period(); if (watchdog_enabled) --- -2.3.6 - diff --git a/x86-Lock-down-IO-port-access-when-module-security-is.patch b/x86-Lock-down-IO-port-access-when-module-security-is.patch index 7f94a7c11..4c1211d43 100644 --- a/x86-Lock-down-IO-port-access-when-module-security-is.patch +++ b/x86-Lock-down-IO-port-access-when-module-security-is.patch @@ -65,6 +65,3 @@ index 6b1721f978c2..53fe675f9bd7 100644 if (!access_ok(VERIFY_READ, buf, count)) return -EFAULT; while (count-- > 0 && i < 65536) { --- -2.3.6 - diff --git a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch index fbeafadad..9053f2aea 100644 --- a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch +++ b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch @@ -37,6 +37,3 @@ index 113e70784854..26c2f83fc470 100644 if (copy_from_user(®s, uregs, sizeof regs)) { err = -EFAULT; break; --- -2.3.6 - diff --git a/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch b/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch index fd3d7be56..4c55bf2da 100644 --- a/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch +++ b/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch @@ -46,6 +46,3 @@ index c4a0666de6f5..26e651336787 100644 dev->is_busmaster = 0; } else { pci_read_config_word(dev, PCI_COMMAND, &cmd); --- -2.3.6 -