diff options
| author | Alexandre Oliva <lxoliva@fsfla.org> | 2017-10-31 08:17:55 +0000 |
|---|---|---|
| committer | Alexandre Oliva <lxoliva@fsfla.org> | 2017-10-31 08:17:55 +0000 |
| commit | 1ae45a60fe750f5a4f3572ae27471ad714999bbb (patch) | |
| tree | 2238ae10d7e9f762450f9b6383af55c39f87304f | |
| parent | dee5eac19d16667e1d87a915a3284e54fad99d40 (diff) | |
| download | linux-libre-raptor-1ae45a60fe750f5a4f3572ae27471ad714999bbb.tar.gz linux-libre-raptor-1ae45a60fe750f5a4f3572ae27471ad714999bbb.zip | |
4.14.0-0.rc7.git0.1.fc28.gnu
30 files changed, 307 insertions, 710 deletions
diff --git a/freed-ora/current/master/0001-Enable-AXP288-PMIC-support-on-x86_64-for-battery-cha.patch b/freed-ora/current/master/0001-Enable-AXP288-PMIC-support-on-x86_64-for-battery-cha.patch deleted file mode 100644 index ce1573dcc..000000000 --- a/freed-ora/current/master/0001-Enable-AXP288-PMIC-support-on-x86_64-for-battery-cha.patch +++ /dev/null @@ -1,546 +0,0 @@ -From 7a434df40dcabc68902502994faf652936493e51 Mon Sep 17 00:00:00 2001 -From: Hans de Goede <hdegoede@redhat.com> -Date: Wed, 14 Jun 2017 17:30:36 +0200 -Subject: [RFC PATCH] Enable AXP288 PMIC support on x86_64 for battery charging - and monitoring support on Bay and Cherry Trail tablets and laptops Enable - various drivers for peripherals found on Bay and Cherry Trail tablets - ---- - baseconfig/x86/x86_64/CONFIG_AK8975 | 1 + - baseconfig/x86/x86_64/CONFIG_AXP20X_ADC | 1 + - baseconfig/x86/x86_64/CONFIG_AXP20X_POWER | 1 + - baseconfig/x86/x86_64/CONFIG_AXP288_ADC | 1 + - baseconfig/x86/x86_64/CONFIG_AXP288_CHARGER | 1 + - baseconfig/x86/x86_64/CONFIG_AXP288_FUEL_GAUGE | 1 + - baseconfig/x86/x86_64/CONFIG_BATTERY_MAX17042 | 1 + - baseconfig/x86/x86_64/CONFIG_CHARGER_BQ24190 | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON_AXP288 | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON_GPIO | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON_INTEL_INT3496 | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON_MAX3355 | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON_RT8973A | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON_SM5502 | 1 + - baseconfig/x86/x86_64/CONFIG_EXTCON_USB_GPIO | 1 + - baseconfig/x86/x86_64/CONFIG_GPIO_AXP209 | 1 + - baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_CORE | 1 + - baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PCI | 1 + - .../x86/x86_64/CONFIG_I2C_DESIGNWARE_PLATFORM | 1 + - baseconfig/x86/x86_64/CONFIG_INPUT_AXP20X_PEK | 1 + - baseconfig/x86/x86_64/CONFIG_INV_MPU6050_I2C | 1 + - baseconfig/x86/x86_64/CONFIG_INV_MPU6050_IIO | 1 + - baseconfig/x86/x86_64/CONFIG_MFD_AXP20X | 1 + - baseconfig/x86/x86_64/CONFIG_MFD_AXP20X_I2C | 1 + - baseconfig/x86/x86_64/CONFIG_SILEAD_DMI | 1 + - baseconfig/x86/x86_64/CONFIG_USB_XHCI_PLATFORM | 1 + - baseconfig/x86/x86_64/CONFIG_XPOWER_PMIC_OPREGION | 1 + - kernel-x86_64-debug.config | 39 ++++++++++++++-------- - kernel-x86_64.config | 39 ++++++++++++++-------- - kernel.spec | 5 +++ - 31 files changed, 85 insertions(+), 26 deletions(-) - create mode 100644 baseconfig/x86/x86_64/CONFIG_AK8975 - create mode 100644 baseconfig/x86/x86_64/CONFIG_AXP20X_ADC - create mode 100644 baseconfig/x86/x86_64/CONFIG_AXP20X_POWER - create mode 100644 baseconfig/x86/x86_64/CONFIG_AXP288_ADC - create mode 100644 baseconfig/x86/x86_64/CONFIG_AXP288_CHARGER - create mode 100644 baseconfig/x86/x86_64/CONFIG_AXP288_FUEL_GAUGE - create mode 100644 baseconfig/x86/x86_64/CONFIG_BATTERY_MAX17042 - create mode 100644 baseconfig/x86/x86_64/CONFIG_CHARGER_BQ24190 - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON_AXP288 - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON_GPIO - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON_INTEL_INT3496 - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON_MAX3355 - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON_RT8973A - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON_SM5502 - create mode 100644 baseconfig/x86/x86_64/CONFIG_EXTCON_USB_GPIO - create mode 100644 baseconfig/x86/x86_64/CONFIG_GPIO_AXP209 - create mode 100644 baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_CORE - create mode 100644 baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PCI - create mode 100644 baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PLATFORM - create mode 100644 baseconfig/x86/x86_64/CONFIG_INPUT_AXP20X_PEK - create mode 100644 baseconfig/x86/x86_64/CONFIG_INV_MPU6050_I2C - create mode 100644 baseconfig/x86/x86_64/CONFIG_INV_MPU6050_IIO - create mode 100644 baseconfig/x86/x86_64/CONFIG_MFD_AXP20X - create mode 100644 baseconfig/x86/x86_64/CONFIG_MFD_AXP20X_I2C - create mode 100644 baseconfig/x86/x86_64/CONFIG_SILEAD_DMI - create mode 100644 baseconfig/x86/x86_64/CONFIG_USB_XHCI_PLATFORM - create mode 100644 baseconfig/x86/x86_64/CONFIG_XPOWER_PMIC_OPREGION - -diff --git a/baseconfig/x86/x86_64/CONFIG_AK8975 b/baseconfig/x86/x86_64/CONFIG_AK8975 -new file mode 100644 -index 00000000..547c21a9 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_AK8975 -@@ -0,0 +1 @@ -+CONFIG_AK8975=m -diff --git a/baseconfig/x86/x86_64/CONFIG_AXP20X_ADC b/baseconfig/x86/x86_64/CONFIG_AXP20X_ADC -new file mode 100644 -index 00000000..0960ee66 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_AXP20X_ADC -@@ -0,0 +1 @@ -+# CONFIG_AXP20X_ADC is not set -diff --git a/baseconfig/x86/x86_64/CONFIG_AXP20X_POWER b/baseconfig/x86/x86_64/CONFIG_AXP20X_POWER -new file mode 100644 -index 00000000..e02cee70 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_AXP20X_POWER -@@ -0,0 +1 @@ -+# CONFIG_AXP20X_POWER is not set -diff --git a/baseconfig/x86/x86_64/CONFIG_AXP288_ADC b/baseconfig/x86/x86_64/CONFIG_AXP288_ADC -new file mode 100644 -index 00000000..e138f36a ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_AXP288_ADC -@@ -0,0 +1 @@ -+CONFIG_AXP288_ADC=m -diff --git a/baseconfig/x86/x86_64/CONFIG_AXP288_CHARGER b/baseconfig/x86/x86_64/CONFIG_AXP288_CHARGER -new file mode 100644 -index 00000000..0418f962 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_AXP288_CHARGER -@@ -0,0 +1 @@ -+CONFIG_AXP288_CHARGER=m -diff --git a/baseconfig/x86/x86_64/CONFIG_AXP288_FUEL_GAUGE b/baseconfig/x86/x86_64/CONFIG_AXP288_FUEL_GAUGE -new file mode 100644 -index 00000000..e171b954 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_AXP288_FUEL_GAUGE -@@ -0,0 +1 @@ -+CONFIG_AXP288_FUEL_GAUGE=m -diff --git a/baseconfig/x86/x86_64/CONFIG_BATTERY_MAX17042 b/baseconfig/x86/x86_64/CONFIG_BATTERY_MAX17042 -new file mode 100644 -index 00000000..669e6ac2 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_BATTERY_MAX17042 -@@ -0,0 +1 @@ -+CONFIG_BATTERY_MAX17042=m -diff --git a/baseconfig/x86/x86_64/CONFIG_CHARGER_BQ24190 b/baseconfig/x86/x86_64/CONFIG_CHARGER_BQ24190 -new file mode 100644 -index 00000000..3128bb67 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_CHARGER_BQ24190 -@@ -0,0 +1 @@ -+CONFIG_CHARGER_BQ24190=m -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON b/baseconfig/x86/x86_64/CONFIG_EXTCON -new file mode 100644 -index 00000000..0a7190c0 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON -@@ -0,0 +1 @@ -+CONFIG_EXTCON=m -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON_AXP288 b/baseconfig/x86/x86_64/CONFIG_EXTCON_AXP288 -new file mode 100644 -index 00000000..7fadeb58 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON_AXP288 -@@ -0,0 +1 @@ -+CONFIG_EXTCON_AXP288=m -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON_GPIO b/baseconfig/x86/x86_64/CONFIG_EXTCON_GPIO -new file mode 100644 -index 00000000..87ca2bd0 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON_GPIO -@@ -0,0 +1 @@ -+# CONFIG_EXTCON_GPIO is not set -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON_INTEL_INT3496 b/baseconfig/x86/x86_64/CONFIG_EXTCON_INTEL_INT3496 -new file mode 100644 -index 00000000..3f6c5d6f ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON_INTEL_INT3496 -@@ -0,0 +1 @@ -+CONFIG_EXTCON_INTEL_INT3496=m -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON_MAX3355 b/baseconfig/x86/x86_64/CONFIG_EXTCON_MAX3355 -new file mode 100644 -index 00000000..680b5a77 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON_MAX3355 -@@ -0,0 +1 @@ -+# CONFIG_EXTCON_MAX3355 is not set -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON_RT8973A b/baseconfig/x86/x86_64/CONFIG_EXTCON_RT8973A -new file mode 100644 -index 00000000..e5f7236c ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON_RT8973A -@@ -0,0 +1 @@ -+# CONFIG_EXTCON_RT8973A is not set -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON_SM5502 b/baseconfig/x86/x86_64/CONFIG_EXTCON_SM5502 -new file mode 100644 -index 00000000..916994aa ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON_SM5502 -@@ -0,0 +1 @@ -+# CONFIG_EXTCON_SM5502 is not set -diff --git a/baseconfig/x86/x86_64/CONFIG_EXTCON_USB_GPIO b/baseconfig/x86/x86_64/CONFIG_EXTCON_USB_GPIO -new file mode 100644 -index 00000000..7a0c9af3 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_EXTCON_USB_GPIO -@@ -0,0 +1 @@ -+# CONFIG_EXTCON_USB_GPIO is not set -diff --git a/baseconfig/x86/x86_64/CONFIG_GPIO_AXP209 b/baseconfig/x86/x86_64/CONFIG_GPIO_AXP209 -new file mode 100644 -index 00000000..2365ae70 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_GPIO_AXP209 -@@ -0,0 +1 @@ -+CONFIG_GPIO_AXP209=m -diff --git a/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_CORE b/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_CORE -new file mode 100644 -index 00000000..f9cdc633 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_CORE -@@ -0,0 +1 @@ -+CONFIG_I2C_DESIGNWARE_CORE=y -diff --git a/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PCI b/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PCI -new file mode 100644 -index 00000000..6103f947 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PCI -@@ -0,0 +1 @@ -+CONFIG_I2C_DESIGNWARE_PCI=y -diff --git a/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PLATFORM b/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PLATFORM -new file mode 100644 -index 00000000..3d50a3e8 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_I2C_DESIGNWARE_PLATFORM -@@ -0,0 +1 @@ -+CONFIG_I2C_DESIGNWARE_PLATFORM=y -diff --git a/baseconfig/x86/x86_64/CONFIG_INPUT_AXP20X_PEK b/baseconfig/x86/x86_64/CONFIG_INPUT_AXP20X_PEK -new file mode 100644 -index 00000000..e2fbdf90 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_INPUT_AXP20X_PEK -@@ -0,0 +1 @@ -+CONFIG_INPUT_AXP20X_PEK=m -diff --git a/baseconfig/x86/x86_64/CONFIG_INV_MPU6050_I2C b/baseconfig/x86/x86_64/CONFIG_INV_MPU6050_I2C -new file mode 100644 -index 00000000..8ec049b0 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_INV_MPU6050_I2C -@@ -0,0 +1 @@ -+CONFIG_INV_MPU6050_I2C=m -diff --git a/baseconfig/x86/x86_64/CONFIG_INV_MPU6050_IIO b/baseconfig/x86/x86_64/CONFIG_INV_MPU6050_IIO -new file mode 100644 -index 00000000..ae4889d9 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_INV_MPU6050_IIO -@@ -0,0 +1 @@ -+CONFIG_INV_MPU6050_IIO=m -diff --git a/baseconfig/x86/x86_64/CONFIG_MFD_AXP20X b/baseconfig/x86/x86_64/CONFIG_MFD_AXP20X -new file mode 100644 -index 00000000..ada79c0d ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_MFD_AXP20X -@@ -0,0 +1 @@ -+CONFIG_MFD_AXP20X=y -diff --git a/baseconfig/x86/x86_64/CONFIG_MFD_AXP20X_I2C b/baseconfig/x86/x86_64/CONFIG_MFD_AXP20X_I2C -new file mode 100644 -index 00000000..22c60295 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_MFD_AXP20X_I2C -@@ -0,0 +1 @@ -+CONFIG_MFD_AXP20X_I2C=y -diff --git a/baseconfig/x86/x86_64/CONFIG_SILEAD_DMI b/baseconfig/x86/x86_64/CONFIG_SILEAD_DMI -new file mode 100644 -index 00000000..25b01735 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_SILEAD_DMI -@@ -0,0 +1 @@ -+CONFIG_SILEAD_DMI=y -diff --git a/baseconfig/x86/x86_64/CONFIG_USB_XHCI_PLATFORM b/baseconfig/x86/x86_64/CONFIG_USB_XHCI_PLATFORM -new file mode 100644 -index 00000000..060ebfc9 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_USB_XHCI_PLATFORM -@@ -0,0 +1 @@ -+CONFIG_USB_XHCI_PLATFORM=m -diff --git a/baseconfig/x86/x86_64/CONFIG_XPOWER_PMIC_OPREGION b/baseconfig/x86/x86_64/CONFIG_XPOWER_PMIC_OPREGION -new file mode 100644 -index 00000000..8c98df14 ---- /dev/null -+++ b/baseconfig/x86/x86_64/CONFIG_XPOWER_PMIC_OPREGION -@@ -0,0 +1 @@ -+CONFIG_XPOWER_PMIC_OPREGION=y -diff --git a/kernel-x86_64-debug.config b/kernel-x86_64-debug.config -index 08b52a89..d8d38c8e 100644 ---- a/kernel-x86_64-debug.config -+++ b/kernel-x86_64-debug.config -@@ -192,7 +192,7 @@ CONFIG_AIC7XXX_RESET_DELAY_MS=15000 - CONFIG_AIX_PARTITION=y - # CONFIG_AK09911 is not set - # CONFIG_AK8974 is not set --# CONFIG_AK8975 is not set -+CONFIG_AK8975=m - # CONFIG_AL3320A is not set - CONFIG_ALIENWARE_WMI=m - CONFIG_ALI_FIR=m -@@ -326,6 +326,11 @@ CONFIG_AUXDISPLAY=y - # CONFIG_AVERAGE is not set - CONFIG_AX25_DAMA_SLAVE=y - CONFIG_AX25=m -+# CONFIG_AXP20X_ADC is not set -+# CONFIG_AXP20X_POWER is not set -+CONFIG_AXP288_ADC=m -+CONFIG_AXP288_CHARGER=m -+CONFIG_AXP288_FUEL_GAUGE=m - CONFIG_B43_BCMA_PIO=y - CONFIG_B43_BCMA=y - CONFIG_B43_DEBUG=y -@@ -385,7 +390,7 @@ CONFIG_BATMAN_ADV_NC=y - # CONFIG_BATTERY_GAUGE_LTC2941 is not set - # CONFIG_BATTERY_LEGO_EV3 is not set - # CONFIG_BATTERY_MAX17040 is not set --# CONFIG_BATTERY_MAX17042 is not set -+CONFIG_BATTERY_MAX17042=m - # CONFIG_BATTERY_SBS is not set - CONFIG_BAYCOM_EPP=m - CONFIG_BAYCOM_PAR=m -@@ -699,7 +704,7 @@ CONFIG_CGROUP_PIDS=y - CONFIG_CGROUP_SCHED=y - CONFIG_CGROUPS=y - # CONFIG_CHARGER_BQ2415X is not set --# CONFIG_CHARGER_BQ24190 is not set -+CONFIG_CHARGER_BQ24190=m - # CONFIG_CHARGER_BQ24257 is not set - # CONFIG_CHARGER_BQ24735 is not set - # CONFIG_CHARGER_BQ25890 is not set -@@ -1397,10 +1402,16 @@ CONFIG_EXT4_FS_SECURITY=y - CONFIG_EXT4_FS=y - CONFIG_EXT4_USE_FOR_EXT2=y - # CONFIG_EXTCON_ADC_JACK is not set -+CONFIG_EXTCON_AXP288=m -+# CONFIG_EXTCON_GPIO is not set - CONFIG_EXTCON_INTEL_CHT_WC=y - CONFIG_EXTCON_INTEL_INT3496=m --# CONFIG_EXTCON is not set -+CONFIG_EXTCON=m -+# CONFIG_EXTCON_MAX3355 is not set - # CONFIG_EXTCON_QCOM_SPMI_MISC is not set -+# CONFIG_EXTCON_RT8973A is not set -+# CONFIG_EXTCON_SM5502 is not set -+# CONFIG_EXTCON_USB_GPIO is not set - CONFIG_EXTRA_FIRMWARE="" - # CONFIG_EZNPS_GIC is not set - # CONFIG_EZX_PCAP is not set -@@ -1617,6 +1628,7 @@ CONFIG_GIRBIL_DONGLE=m - # CONFIG_GPIO_ALTERA is not set - # CONFIG_GPIO_AMD8111 is not set - # CONFIG_GPIO_AMDPT is not set -+CONFIG_GPIO_AXP209=m - # CONFIG_GPIO_BT8XX is not set - CONFIG_GPIO_CRYSTAL_COVE=y - # CONFIG_GPIO_CS5535 is not set -@@ -1903,10 +1915,10 @@ CONFIG_I2C_COMPAT=y - # CONFIG_I2C_DEBUG_CORE is not set - # CONFIG_I2C_DEMUX_PINCTRL is not set - CONFIG_I2C_DESIGNWARE_BAYTRAIL=y --CONFIG_I2C_DESIGNWARE_CORE=m -+CONFIG_I2C_DESIGNWARE_CORE=y - # CONFIG_I2C_DESIGNWARE is not set --CONFIG_I2C_DESIGNWARE_PCI=m --CONFIG_I2C_DESIGNWARE_PLATFORM=m -+CONFIG_I2C_DESIGNWARE_PCI=y -+CONFIG_I2C_DESIGNWARE_PLATFORM=y - CONFIG_I2C_DIOLAN_U2C=m - # CONFIG_I2C_EG20T is not set - # CONFIG_I2C_EMEV2 is not set -@@ -2086,6 +2098,7 @@ CONFIG_INPUT_APANEL=m - CONFIG_INPUT_ATI_REMOTE2=m - CONFIG_INPUT_ATLAS_BTNS=m - # CONFIG_INPUT_ATMEL_CAPTOUCH is not set -+CONFIG_INPUT_AXP20X_PEK=m - # CONFIG_INPUT_BMA150 is not set - CONFIG_INPUT_CM109=m - CONFIG_INPUT_CMA3000_I2C=m -@@ -2184,8 +2197,8 @@ CONFIG_INTEL_TXT=y - CONFIG_INTEL_VBTN=m - CONFIG_INTEL_XWAY_PHY=m - # CONFIG_INTERVAL_TREE_TEST is not set --# CONFIG_INV_MPU6050_I2C is not set --# CONFIG_INV_MPU6050_IIO is not set -+CONFIG_INV_MPU6050_I2C=m -+CONFIG_INV_MPU6050_IIO=m - # CONFIG_INV_MPU6050_SPI is not set - # CONFIG_IOMMU_DEBUG is not set - # CONFIG_IOMMU_STRESS is not set -@@ -2864,8 +2877,8 @@ CONFIG_MESSAGE_LOGLEVEL_DEFAULT=4 - # CONFIG_MFD_ASIC3 is not set - # CONFIG_MFD_ATMEL_FLEXCOM is not set - # CONFIG_MFD_ATMEL_HLCDC is not set --# CONFIG_MFD_AXP20X_I2C is not set --# CONFIG_MFD_AXP20X is not set -+CONFIG_MFD_AXP20X_I2C=y -+CONFIG_MFD_AXP20X=y - # CONFIG_MFD_BCM590XX is not set - CONFIG_MFD_CORE=y - # CONFIG_MFD_CPCAP is not set -@@ -4695,7 +4708,7 @@ CONFIG_SH_ETH=m - # CONFIG_SIGMA is not set - CONFIG_SIGMATEL_FIR=m - CONFIG_SIGNED_PE_FILE_VERIFICATION=y --# CONFIG_SILEAD_DMI is not set -+CONFIG_SILEAD_DMI=y - CONFIG_SIS190=m - CONFIG_SIS900=m - # CONFIG_SKFP is not set -@@ -5731,7 +5744,7 @@ CONFIG_USB_WDM=m - CONFIG_USB_WUSB_CBAF=m - CONFIG_USB_WUSB=m - CONFIG_USB_XHCI_HCD=y --# CONFIG_USB_XHCI_PLATFORM is not set -+CONFIG_USB_XHCI_PLATFORM=m - CONFIG_USB_XUSBATM=m - CONFIG_USB=y - CONFIG_USB_YUREX=m -diff --git a/kernel-x86_64.config b/kernel-x86_64.config -index 9fedd204..abcc8bb4 100644 ---- a/kernel-x86_64.config -+++ b/kernel-x86_64.config -@@ -192,7 +192,7 @@ CONFIG_AIC7XXX_RESET_DELAY_MS=15000 - CONFIG_AIX_PARTITION=y - # CONFIG_AK09911 is not set - # CONFIG_AK8974 is not set --# CONFIG_AK8975 is not set -+CONFIG_AK8975=m - # CONFIG_AL3320A is not set - CONFIG_ALIENWARE_WMI=m - CONFIG_ALI_FIR=m -@@ -325,6 +325,11 @@ CONFIG_AUXDISPLAY=y - # CONFIG_AVERAGE is not set - CONFIG_AX25_DAMA_SLAVE=y - CONFIG_AX25=m -+# CONFIG_AXP20X_ADC is not set -+# CONFIG_AXP20X_POWER is not set -+CONFIG_AXP288_ADC=m -+CONFIG_AXP288_CHARGER=m -+CONFIG_AXP288_FUEL_GAUGE=m - CONFIG_B43_BCMA_PIO=y - CONFIG_B43_BCMA=y - CONFIG_B43_DEBUG=y -@@ -384,7 +389,7 @@ CONFIG_BATMAN_ADV_NC=y - # CONFIG_BATTERY_GAUGE_LTC2941 is not set - # CONFIG_BATTERY_LEGO_EV3 is not set - # CONFIG_BATTERY_MAX17040 is not set --# CONFIG_BATTERY_MAX17042 is not set -+CONFIG_BATTERY_MAX17042=m - # CONFIG_BATTERY_SBS is not set - CONFIG_BAYCOM_EPP=m - CONFIG_BAYCOM_PAR=m -@@ -698,7 +703,7 @@ CONFIG_CGROUP_PIDS=y - CONFIG_CGROUP_SCHED=y - CONFIG_CGROUPS=y - # CONFIG_CHARGER_BQ2415X is not set --# CONFIG_CHARGER_BQ24190 is not set -+CONFIG_CHARGER_BQ24190=m - # CONFIG_CHARGER_BQ24257 is not set - # CONFIG_CHARGER_BQ24735 is not set - # CONFIG_CHARGER_BQ25890 is not set -@@ -1386,10 +1391,16 @@ CONFIG_EXT4_FS_SECURITY=y - CONFIG_EXT4_FS=y - CONFIG_EXT4_USE_FOR_EXT2=y - # CONFIG_EXTCON_ADC_JACK is not set -+CONFIG_EXTCON_AXP288=m -+# CONFIG_EXTCON_GPIO is not set - CONFIG_EXTCON_INTEL_CHT_WC=y - CONFIG_EXTCON_INTEL_INT3496=m --# CONFIG_EXTCON is not set -+CONFIG_EXTCON=m -+# CONFIG_EXTCON_MAX3355 is not set - # CONFIG_EXTCON_QCOM_SPMI_MISC is not set -+# CONFIG_EXTCON_RT8973A is not set -+# CONFIG_EXTCON_SM5502 is not set -+# CONFIG_EXTCON_USB_GPIO is not set - CONFIG_EXTRA_FIRMWARE="" - # CONFIG_EZNPS_GIC is not set - # CONFIG_EZX_PCAP is not set -@@ -1599,6 +1610,7 @@ CONFIG_GIRBIL_DONGLE=m - # CONFIG_GPIO_ALTERA is not set - # CONFIG_GPIO_AMD8111 is not set - # CONFIG_GPIO_AMDPT is not set -+CONFIG_GPIO_AXP209=m - # CONFIG_GPIO_BT8XX is not set - CONFIG_GPIO_CRYSTAL_COVE=y - # CONFIG_GPIO_CS5535 is not set -@@ -1885,10 +1897,10 @@ CONFIG_I2C_COMPAT=y - # CONFIG_I2C_DEBUG_CORE is not set - # CONFIG_I2C_DEMUX_PINCTRL is not set - CONFIG_I2C_DESIGNWARE_BAYTRAIL=y --CONFIG_I2C_DESIGNWARE_CORE=m -+CONFIG_I2C_DESIGNWARE_CORE=y - # CONFIG_I2C_DESIGNWARE is not set --CONFIG_I2C_DESIGNWARE_PCI=m --CONFIG_I2C_DESIGNWARE_PLATFORM=m -+CONFIG_I2C_DESIGNWARE_PCI=y -+CONFIG_I2C_DESIGNWARE_PLATFORM=y - CONFIG_I2C_DIOLAN_U2C=m - # CONFIG_I2C_EG20T is not set - # CONFIG_I2C_EMEV2 is not set -@@ -2068,6 +2080,7 @@ CONFIG_INPUT_APANEL=m - CONFIG_INPUT_ATI_REMOTE2=m - CONFIG_INPUT_ATLAS_BTNS=m - # CONFIG_INPUT_ATMEL_CAPTOUCH is not set -+CONFIG_INPUT_AXP20X_PEK=m - # CONFIG_INPUT_BMA150 is not set - CONFIG_INPUT_CM109=m - CONFIG_INPUT_CMA3000_I2C=m -@@ -2166,8 +2179,8 @@ CONFIG_INTEL_TXT=y - CONFIG_INTEL_VBTN=m - CONFIG_INTEL_XWAY_PHY=m - # CONFIG_INTERVAL_TREE_TEST is not set --# CONFIG_INV_MPU6050_I2C is not set --# CONFIG_INV_MPU6050_IIO is not set -+CONFIG_INV_MPU6050_I2C=m -+CONFIG_INV_MPU6050_IIO=m - # CONFIG_INV_MPU6050_SPI is not set - # CONFIG_IOMMU_DEBUG is not set - # CONFIG_IOMMU_STRESS is not set -@@ -2844,8 +2857,8 @@ CONFIG_MESSAGE_LOGLEVEL_DEFAULT=4 - # CONFIG_MFD_ASIC3 is not set - # CONFIG_MFD_ATMEL_FLEXCOM is not set - # CONFIG_MFD_ATMEL_HLCDC is not set --# CONFIG_MFD_AXP20X_I2C is not set --# CONFIG_MFD_AXP20X is not set -+CONFIG_MFD_AXP20X_I2C=y -+CONFIG_MFD_AXP20X=y - # CONFIG_MFD_BCM590XX is not set - CONFIG_MFD_CORE=y - # CONFIG_MFD_CPCAP is not set -@@ -4674,7 +4687,7 @@ CONFIG_SH_ETH=m - # CONFIG_SIGMA is not set - CONFIG_SIGMATEL_FIR=m - CONFIG_SIGNED_PE_FILE_VERIFICATION=y --# CONFIG_SILEAD_DMI is not set -+CONFIG_SILEAD_DMI=y - CONFIG_SIS190=m - CONFIG_SIS900=m - # CONFIG_SKFP is not set -@@ -5709,7 +5722,7 @@ CONFIG_USB_WDM=m - CONFIG_USB_WUSB_CBAF=m - CONFIG_USB_WUSB=m - CONFIG_USB_XHCI_HCD=y --# CONFIG_USB_XHCI_PLATFORM is not set -+CONFIG_USB_XHCI_PLATFORM=m - CONFIG_USB_XUSBATM=m - CONFIG_USB=y - CONFIG_USB_YUREX=m -diff --git a/kernel.spec b/kernel.spec -index 3cb67fd1..6d93d2a7 100644 ---- a/kernel.spec -+++ b/kernel.spec -@@ -2165,6 +2165,11 @@ fi - # - # - %changelog -+* Wed Jun 14 2017 Hans de Goede <jwrdegoede@fedoraproject.org> -+- Enable AXP288 PMIC support on x86_64 for battery charging and monitoring -+ support on Bay and Cherry Trail tablets and laptops -+- Enable various drivers for peripherals found on Bay and Cherry Trail tablets -+ - * Mon Jun 12 2017 Justin M. Forbes <jforbes@fedoraproject.org> - 4.12.0-0.rc5.git0.1 - - Linux v4.12-rc5 - - Disable debugging options. --- -2.13.0 - diff --git a/freed-ora/current/master/0001-PATCH-staging-rtl8822be-fix-wrong-dma-unmap-len.patch b/freed-ora/current/master/0001-PATCH-staging-rtl8822be-fix-wrong-dma-unmap-len.patch new file mode 100644 index 000000000..540b925eb --- /dev/null +++ b/freed-ora/current/master/0001-PATCH-staging-rtl8822be-fix-wrong-dma-unmap-len.patch @@ -0,0 +1,46 @@ +From 37af97ef14c201b1db8dd341aabd262da23e48aa Mon Sep 17 00:00:00 2001 +From: Fedora Kernel Team <kernel-team@fedoraproject.org> +Date: Mon, 30 Oct 2017 11:38:27 -0500 +Subject: [PATCH] [PATCH] staging: rtl8822be: fix wrong dma unmap len + +Patch fixes splat: + +r8822be 0000:04:00.0: DMA-API: device driver frees DMA memory with different size +[device address=0x0000000078477000] [map size=4096 bytes] [unmap size=424 bytes] +<snip> +Call Trace: + debug_dma_unmap_page+0xa5/0xb0 + ? unmap_single+0x2f/0x40 + _rtl8822be_send_bcn_or_cmd_packet+0x2c5/0x300 [r8822be] + ? _rtl8822be_send_bcn_or_cmd_packet+0x2c5/0x300 [r8822be] + rtl8822b_halmac_cb_write_data_rsvd_page+0x51/0xc0 [r8822be] + _halmac_write_data_rsvd_page+0x22/0x30 [r8822be] + halmac_download_rsvd_page_88xx+0xee/0x1f0 [r8822be] + halmac_dlfw_to_mem_88xx+0x80/0x120 [r8822be] + halmac_download_firmware_88xx.part.47+0x477/0x600 [r8822be] + halmac_download_firmware_88xx+0x32/0x40 [r8822be] + rtl_halmac_dlfw+0x70/0x120 [r8822be] + rtl_halmac_init_hal+0x5f/0x1b0 [r8822be] + rtl8822be_hw_init+0x8a2/0x1040 [r8822be] + +Signed-off-by: Stanislaw Gruszka <sgruszka at redhat.com> +--- + drivers/staging/rtlwifi/rtl8822be/fw.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/drivers/staging/rtlwifi/rtl8822be/fw.c b/drivers/staging/rtlwifi/rtl8822be/fw.c +index 8e24da1..a2cc548 100644 +--- a/drivers/staging/rtlwifi/rtl8822be/fw.c ++++ b/drivers/staging/rtlwifi/rtl8822be/fw.c +@@ -419,7 +419,7 @@ static bool _rtl8822be_send_bcn_or_cmd_packet(struct ieee80211_hw *hw, + dma_addr = rtlpriv->cfg->ops->get_desc( + hw, (u8 *)pbd_desc, true, HW_DESC_TXBUFF_ADDR); + +- pci_unmap_single(rtlpci->pdev, dma_addr, skb->len, ++ pci_unmap_single(rtlpci->pdev, dma_addr, pskb->len, + PCI_DMA_TODEVICE); + kfree_skb(pskb); + +-- +2.13.6 + diff --git a/freed-ora/current/master/0001-platform-x86-peaq-wmi-Add-DMI-check-before-binding-t.patch b/freed-ora/current/master/0001-platform-x86-peaq-wmi-Add-DMI-check-before-binding-t.patch new file mode 100644 index 000000000..2242e2d44 --- /dev/null +++ b/freed-ora/current/master/0001-platform-x86-peaq-wmi-Add-DMI-check-before-binding-t.patch @@ -0,0 +1,72 @@ +From 0e9df6a74f9573409e5a2fbe29c1389188280bfc Mon Sep 17 00:00:00 2001 +From: Hans de Goede <hdegoede@redhat.com> +Date: Thu, 5 Oct 2017 16:02:33 +0200 +Subject: [PATCH] platform/x86: peaq-wmi: Add DMI check before binding to the + WMI interface + +It seems that the WMI GUID used by the PEAQ 2-in-1 WMI hotkeys is not +as unique as a GUID should be and is used on some other devices too. + +This is causing spurious key-press reports on these other devices. + +This commits adds a DMI check to the PEAQ 2-in-1 WMI hotkeys driver to +ensure that it is actually running on a PEAQ 2-in-1, fixing the +spurious key-presses on these other devices. + +BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1497861 +BugLink: https://bugzilla.suse.com/attachment.cgi?id=743182 +Cc: stable@vger.kernel.org +Signed-off-by: Hans de Goede <hdegoede@redhat.com> +--- + drivers/platform/x86/peaq-wmi.c | 18 ++++++++++++++++++ + 1 file changed, 18 insertions(+) + +diff --git a/drivers/platform/x86/peaq-wmi.c b/drivers/platform/x86/peaq-wmi.c +index bc98ef95514a..67fa3fa32011 100644 +--- a/drivers/platform/x86/peaq-wmi.c ++++ b/drivers/platform/x86/peaq-wmi.c +@@ -8,6 +8,7 @@ + */ + + #include <linux/acpi.h> ++#include <linux/dmi.h> + #include <linux/input-polldev.h> + #include <linux/kernel.h> + #include <linux/module.h> +@@ -64,8 +65,23 @@ static void peaq_wmi_poll(struct input_polled_dev *dev) + } + } + ++/* Some other devices (Shuttle XS35) use the same WMI GUID for other purposes */ ++static const struct dmi_system_id peaq_dmi_table[] = { ++ { ++ .matches = { ++ DMI_MATCH(DMI_SYS_VENDOR, "PEAQ"), ++ DMI_MATCH(DMI_PRODUCT_NAME, "PEAQ PMM C1010 MD99187"), ++ }, ++ }, ++ {} ++}; ++ + static int __init peaq_wmi_init(void) + { ++ /* WMI GUID is not unique, also check for a DMI match */ ++ if (!dmi_check_system(peaq_dmi_table)) ++ return -ENODEV; ++ + if (!wmi_has_guid(PEAQ_DOLBY_BUTTON_GUID)) + return -ENODEV; + +@@ -86,6 +101,9 @@ static int __init peaq_wmi_init(void) + + static void __exit peaq_wmi_exit(void) + { ++ if (!dmi_check_system(peaq_dmi_table)) ++ return; ++ + if (!wmi_has_guid(PEAQ_DOLBY_BUTTON_GUID)) + return; + +-- +2.14.2 + diff --git a/freed-ora/current/master/baseconfig/CONFIG_R8822BE b/freed-ora/current/master/baseconfig/CONFIG_R8822BE index 8f375f0d2..2f7c08787 100644 --- a/freed-ora/current/master/baseconfig/CONFIG_R8822BE +++ b/freed-ora/current/master/baseconfig/CONFIG_R8822BE @@ -1 +1 @@ -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m diff --git a/freed-ora/current/master/baseconfig/arm/armv7/CONFIG_MTD_NAND_PXA3xx b/freed-ora/current/master/baseconfig/arm/CONFIG_MTD_NAND_PXA3xx index 584b57ea1..584b57ea1 100644 --- a/freed-ora/current/master/baseconfig/arm/armv7/CONFIG_MTD_NAND_PXA3xx +++ b/freed-ora/current/master/baseconfig/arm/CONFIG_MTD_NAND_PXA3xx diff --git a/freed-ora/current/master/baseconfig/arm/armv7/CONFIG_RTC_DRV_ARMADA38X b/freed-ora/current/master/baseconfig/arm/armv7/CONFIG_RTC_DRV_ARMADA38X deleted file mode 100644 index 7dcdafcbb..000000000 --- a/freed-ora/current/master/baseconfig/arm/armv7/CONFIG_RTC_DRV_ARMADA38X +++ /dev/null @@ -1 +0,0 @@ -CONFIG_RTC_DRV_ARMADA38X=m diff --git a/freed-ora/current/master/efi-lockdown.patch b/freed-ora/current/master/efi-lockdown.patch index 2f47274cc..4ac65fd5d 100644 --- a/freed-ora/current/master/efi-lockdown.patch +++ b/freed-ora/current/master/efi-lockdown.patch @@ -1,8 +1,8 @@ -From ae255bb7a54aa44ae4ac1b7a38617f976bdb07db Mon Sep 17 00:00:00 2001 +From 646ac5c07196bc3680e34188e55c8cc3565f65e7 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 24 May 2017 14:56:00 +0100 -Subject: [PATCH] Add the ability to lock down access to the running kernel - image +Subject: [PATCH 01/26] Add the ability to lock down access to the running + kernel image Provide a single call to allow kernel code to determine whether the system should be locked down, thereby disallowing various accesses that might @@ -11,6 +11,7 @@ modules that aren't validly signed with a key we recognise, fiddling with MSR registers and disallowing hibernation, Signed-off-by: David Howells <dhowells@redhat.com> +Acked-by: James Morris <james.l.morris@oracle.com> --- include/linux/kernel.h | 17 ++++++++++++++ include/linux/security.h | 8 +++++++ @@ -163,12 +164,12 @@ index 000000000000..d8595c0e6673 +} +EXPORT_SYMBOL(__kernel_is_locked_down); -- -2.13.5 +2.13.6 -From 0712c10c74f2a24592f0c54595c2f19ee847b209 Mon Sep 17 00:00:00 2001 +From 2c46467f43bc54324de5474a8355f98c692309e4 Mon Sep 17 00:00:00 2001 From: Kyle McMartin <kyle@redhat.com> Date: Wed, 18 Oct 2017 14:02:25 +0100 -Subject: [PATCH 01/25] Add a SysRq option to lift kernel lockdown +Subject: [PATCH 02/26] Add a SysRq option to lift kernel lockdown Make an option to provide a sysrq key that will lift the kernel lockdown, thereby allowing the running kernel image to be accessed and modified. @@ -446,18 +447,19 @@ index d8595c0e6673..2c6b00f0c229 100644 + +#endif /* CONFIG_ALLOW_LOCKDOWN_LIFT_BY_SYSRQ */ -- -2.13.5 +2.13.6 -From a77c5e9c49ac6458581e607a033e1e6a3928b21c Mon Sep 17 00:00:00 2001 +From 4c389db9daee3a3a444339a7d789de1d9366f736 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 24 May 2017 14:56:01 +0100 -Subject: [PATCH 02/25] Enforce module signatures if the kernel is locked down +Subject: [PATCH 03/26] Enforce module signatures if the kernel is locked down If the kernel is locked down, require that all modules have valid signatures that we can verify. Signed-off-by: David Howells <dhowells@redhat.com> Reviewed-by: "Lee, Chun-Yi" <jlee@suse.com> +Reviewed-by: James Morris <james.l.morris@oracle.com> --- kernel/module.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) @@ -477,56 +479,51 @@ index de66ec825992..3d9a3270c179 100644 return err; -- -2.13.5 +2.13.6 -From 8ed6fd87e9e639955c0b9d864ea42dc7611670ca Mon Sep 17 00:00:00 2001 +From 59312c44aa46939a14b3fbfeb510f94b4a73c8a1 Mon Sep 17 00:00:00 2001 From: Matthew Garrett <matthew.garrett@nebula.com> Date: Wed, 24 May 2017 14:56:02 +0100 -Subject: [PATCH 03/25] Restrict /dev/mem and /dev/kmem when the kernel is - locked down +Subject: [PATCH 04/26] Restrict /dev/{mem,kmem,port} when the kernel is locked + down + +Allowing users to read and write to core kernel memory makes it possible +for the kernel to be subverted, avoiding module loading restrictions, and +also to steal cryptographic information. + +Disallow /dev/mem and /dev/kmem from being opened this when the kernel has +been locked down to prevent this. -Allowing users to write to address space makes it possible for the kernel to -be subverted, avoiding module loading restrictions. Prevent this when the -kernel has been locked down. +Also disallow /dev/port from being opened to prevent raw ioport access and +thus DMA from being used to accomplish the same thing. Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com> Signed-off-by: David Howells <dhowells@redhat.com> Reviewed-by: "Lee, Chun-Yi" <jlee@suse.com> --- - drivers/char/mem.c | 6 ++++++ - 1 file changed, 6 insertions(+) + drivers/char/mem.c | 2 ++ + 1 file changed, 2 insertions(+) diff --git a/drivers/char/mem.c b/drivers/char/mem.c -index 593a8818aca9..b7c36898b689 100644 +index 593a8818aca9..0ce5ac0a5c6b 100644 --- a/drivers/char/mem.c +++ b/drivers/char/mem.c -@@ -179,6 +179,9 @@ static ssize_t write_mem(struct file *file, const char __user *buf, - if (p != *ppos) - return -EFBIG; +@@ -762,6 +762,8 @@ static loff_t memory_lseek(struct file *file, loff_t offset, int orig) -+ if (kernel_is_locked_down("/dev/mem")) + static int open_port(struct inode *inode, struct file *filp) + { ++ if (kernel_is_locked_down("/dev/mem,kmem,port")) + return -EPERM; -+ - if (!valid_phys_addr_range(p, count)) - return -EFAULT; - -@@ -540,6 +543,9 @@ static ssize_t write_kmem(struct file *file, const char __user *buf, - char *kbuf; /* k-addr because vwrite() takes vmlist_lock rwlock */ - int err = 0; + return capable(CAP_SYS_RAWIO) ? 0 : -EPERM; + } -+ if (kernel_is_locked_down("/dev/kmem")) -+ return -EPERM; -+ - if (p < (unsigned long) high_memory) { - unsigned long to_write = min_t(unsigned long, count, - (unsigned long)high_memory - p); -- -2.13.5 +2.13.6 -From befd1007b58e66dbcf7367f6ccc3d992c7262d3a Mon Sep 17 00:00:00 2001 +From 6304f16efd61e66701f4b331e95da3cafb5f5f76 Mon Sep 17 00:00:00 2001 From: Matthew Garrett <matthew.garrett@nebula.com> Date: Wed, 24 May 2017 14:56:02 +0100 -Subject: [PATCH 04/25] kexec: Disable at runtime if the kernel is locked down +Subject: [PATCH 05/26] kexec: Disable at runtime if the kernel is locked down kexec permits the loading and execution of arbitrary code in ring 0, which is something that lock-down is meant to prevent. It makes sense to disable @@ -539,6 +536,7 @@ Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com> Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Dave Young <dyoung@redhat.com> Reviewed-by: "Lee, Chun-Yi" <jlee@suse.com> +Reviewed-by: James Morris <james.l.morris@oracle.com> cc: kexec@lists.infradead.org --- kernel/kexec.c | 7 +++++++ @@ -563,12 +561,12 @@ index e62ec4dc6620..7dadfed9b676 100644 * This leaves us room for future extensions. */ -- -2.13.5 +2.13.6 -From 845d8a124c5be487f29ab05cc69a45119a715184 Mon Sep 17 00:00:00 2001 +From cd00079900870855cea3573253a95c331ccab523 Mon Sep 17 00:00:00 2001 From: Dave Young <dyoung@redhat.com> Date: Wed, 24 May 2017 14:56:02 +0100 -Subject: [PATCH 05/25] Copy secure_boot flag in boot params across kexec +Subject: [PATCH 06/26] Copy secure_boot flag in boot params across kexec reboot Kexec reboot in case secure boot being enabled does not keep the secure @@ -603,16 +601,16 @@ index fb095ba0c02f..7d0fac5bcbbe 100644 ei->efi_systab = current_ei->efi_systab; ei->efi_systab_hi = current_ei->efi_systab_hi; -- -2.13.5 +2.13.6 -From d61c8a5a7719d363ef4213f1d1d99d1bde87f78b Mon Sep 17 00:00:00 2001 +From de2ac5da82fc55156134820ba32095710b935ad5 Mon Sep 17 00:00:00 2001 From: Chun-Yi Lee <joeyli.kernel@gmail.com> Date: Wed, 24 May 2017 14:56:03 +0100 -Subject: [PATCH 06/25] kexec_file: Disable at runtime if securelevel has been - set +Subject: [PATCH 07/26] kexec_file: Disable at runtime if the kernel is locked + down -When KEXEC_VERIFY_SIG is not enabled, kernel should not loads image -through kexec_file systemcall if securelevel has been set. +When KEXEC_VERIFY_SIG is not enabled, kernel should not load images +through kexec_file systemcall if the kernel is locked down. This code was showed in Matthew's patch but not in git: https://lkml.org/lkml/2015/3/13/778 @@ -620,6 +618,7 @@ https://lkml.org/lkml/2015/3/13/778 Cc: Matthew Garrett <mjg59@srcf.ucam.org> Signed-off-by: Chun-Yi Lee <jlee@suse.com> Signed-off-by: David Howells <dhowells@redhat.com> +Reviewed-by: James Morris <james.l.morris@oracle.com> cc: kexec@lists.infradead.org --- kernel/kexec_file.c | 7 +++++++ @@ -644,12 +643,12 @@ index 9f48f4412297..ff6523f2dcc2 100644 if (flags != (flags & KEXEC_FILE_FLAGS)) return -EINVAL; -- -2.13.5 +2.13.6 -From 18eab166de1f6e89ca75e6d6056cdbb10cce9b1a Mon Sep 17 00:00:00 2001 +From ba823f2b5125605fcbac150fe27e622fd224ea61 Mon Sep 17 00:00:00 2001 From: Josh Boyer <jwboyer@fedoraproject.org> Date: Wed, 24 May 2017 14:56:03 +0100 -Subject: [PATCH 07/25] hibernate: Disable when the kernel is locked down +Subject: [PATCH 08/26] hibernate: Disable when the kernel is locked down There is currently no way to verify the resume image when returning from hibernate. This might compromise the signed modules trust model, @@ -678,12 +677,12 @@ index a5c36e9c56a6..f2eafefeec50 100644 /** -- -2.13.5 +2.13.6 -From 0faef5cb3afb04f0c33ffcc923d86e49353b36da Mon Sep 17 00:00:00 2001 +From 9e78666a6153d72c3e50160a30ead699ba508d8f Mon Sep 17 00:00:00 2001 From: Matthew Garrett <mjg59@srcf.ucam.org> Date: Wed, 24 May 2017 14:56:03 +0100 -Subject: [PATCH 08/25] uswsusp: Disable when the kernel is locked down +Subject: [PATCH 09/26] uswsusp: Disable when the kernel is locked down uswsusp allows a user process to dump and then restore kernel state, which makes it possible to modify the running kernel. Disable this if the kernel @@ -692,6 +691,7 @@ is locked down. Signed-off-by: Matthew Garrett <mjg59@srcf.ucam.org> Signed-off-by: David Howells <dhowells@redhat.com> Reviewed-by: "Lee, Chun-Yi" <jlee@suse.com> +Reviewed-by: James Morris <james.l.morris@oracle.com> cc: linux-pm@vger.kernel.org --- kernel/power/user.c | 3 +++ @@ -712,12 +712,12 @@ index 22df9f7ff672..678ade9decfe 100644 if (!atomic_add_unless(&snapshot_device_available, -1, 0)) { -- -2.13.5 +2.13.6 -From 2aa540f7f43590b14e01327c631bbe42ba3e8baf Mon Sep 17 00:00:00 2001 +From 334fa071b01ced7f48b2920208addfb1eab5d0fe Mon Sep 17 00:00:00 2001 From: Matthew Garrett <matthew.garrett@nebula.com> Date: Wed, 24 May 2017 14:56:03 +0100 -Subject: [PATCH 09/25] PCI: Lock down BAR access when the kernel is locked +Subject: [PATCH 10/26] PCI: Lock down BAR access when the kernel is locked down Any hardware that can potentially generate DMA has to be locked down in @@ -820,12 +820,12 @@ index 9bf993e1f71e..afa01cc3ceec 100644 dev = pci_get_bus_and_slot(bus, dfn); -- -2.13.5 +2.13.6 -From 9dd0a9e68cf8e066e101a4fabd1ec62f6c22de2f Mon Sep 17 00:00:00 2001 +From 7e608c45ac2ab6c8e125aaf3993b8257352ac631 Mon Sep 17 00:00:00 2001 From: Matthew Garrett <matthew.garrett@nebula.com> Date: Wed, 24 May 2017 14:56:04 +0100 -Subject: [PATCH 10/25] x86: Lock down IO port access when the kernel is locked +Subject: [PATCH 11/26] x86: Lock down IO port access when the kernel is locked down IO port access would permit users to gain access to PCI configuration @@ -843,8 +843,7 @@ Reviewed-by: "Lee, Chun-Yi" <jlee@suse.com> cc: x86@kernel.org --- arch/x86/kernel/ioport.c | 6 ++++-- - drivers/char/mem.c | 2 ++ - 2 files changed, 6 insertions(+), 2 deletions(-) + 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/ioport.c b/arch/x86/kernel/ioport.c index 9c3cf0944bce..2c0f058651c5 100644 @@ -870,32 +869,22 @@ index 9c3cf0944bce..2c0f058651c5 100644 return -EPERM; } regs->flags = (regs->flags & ~X86_EFLAGS_IOPL) | -diff --git a/drivers/char/mem.c b/drivers/char/mem.c -index b7c36898b689..0875b3d47773 100644 ---- a/drivers/char/mem.c -+++ b/drivers/char/mem.c -@@ -768,6 +768,8 @@ static loff_t memory_lseek(struct file *file, loff_t offset, int orig) - - static int open_port(struct inode *inode, struct file *filp) - { -+ if (kernel_is_locked_down("Direct ioport access")) -+ return -EPERM; - return capable(CAP_SYS_RAWIO) ? 0 : -EPERM; - } - -- -2.13.5 +2.13.6 -From ecec11fa386fc7c8f6865b4721eaa46360b89622 Mon Sep 17 00:00:00 2001 +From 2644bf492568e3733bc841112c6e8628a6e01b8e Mon Sep 17 00:00:00 2001 From: Matthew Garrett <matthew.garrett@nebula.com> Date: Wed, 24 May 2017 14:56:04 +0100 -Subject: [PATCH 11/25] x86/msr: Restrict MSR access when the kernel is locked +Subject: [PATCH 12/26] x86/msr: Restrict MSR access when the kernel is locked down Writing to MSRs should not be allowed if the kernel is locked down, since it could lead to execution of arbitrary code in kernel mode. Based on a patch by Kees Cook. +MSR accesses are logged for the purposes of building up a whitelist as per +Alan Cox's suggestion. + Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com> Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Kees Cook <keescook@chromium.org> @@ -903,41 +892,44 @@ Reviewed-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: "Lee, Chun-Yi" <jlee@suse.com> cc: x86@kernel.org --- - arch/x86/kernel/msr.c | 7 +++++++ - 1 file changed, 7 insertions(+) + arch/x86/kernel/msr.c | 10 ++++++++++ + 1 file changed, 10 insertions(+) diff --git a/arch/x86/kernel/msr.c b/arch/x86/kernel/msr.c -index ef688804f80d..a05a97863286 100644 +index ef688804f80d..dfb61d358196 100644 --- a/arch/x86/kernel/msr.c +++ b/arch/x86/kernel/msr.c -@@ -84,6 +84,9 @@ static ssize_t msr_write(struct file *file, const char __user *buf, +@@ -84,6 +84,11 @@ static ssize_t msr_write(struct file *file, const char __user *buf, int err = 0; ssize_t bytes = 0; -+ if (kernel_is_locked_down("Direct MSR access")) ++ if (kernel_is_locked_down("Direct MSR access")) { ++ pr_info("Direct access to MSR %x\n", reg); + return -EPERM; ++ } + if (count % 8) return -EINVAL; /* Invalid chunk size */ -@@ -131,6 +134,10 @@ static long msr_ioctl(struct file *file, unsigned int ioc, unsigned long arg) - err = -EBADF; +@@ -135,6 +140,11 @@ static long msr_ioctl(struct file *file, unsigned int ioc, unsigned long arg) + err = -EFAULT; break; } + if (kernel_is_locked_down("Direct MSR access")) { ++ pr_info("Direct access to MSR %x\n", regs[1]); /* Display %ecx */ + err = -EPERM; + break; + } - if (copy_from_user(®s, uregs, sizeof regs)) { - err = -EFAULT; + err = wrmsr_safe_regs_on_cpu(cpu, regs); + if (err) break; -- -2.13.5 +2.13.6 -From 09e16301455c0a8a4ee405ad531c231b70610b5b Mon Sep 17 00:00:00 2001 +From e6850fffe186e252cc94e8747e589076e215ca1a Mon Sep 17 00:00:00 2001 From: Matthew Garrett <matthew.garrett@nebula.com> Date: Wed, 24 May 2017 14:56:04 +0100 -Subject: [PATCH 12/25] asus-wmi: Restrict debugfs interface when the kernel is +Subject: [PATCH 13/26] asus-wmi: Restrict debugfs interface when the kernel is locked down We have no way of validating what all of the Asus WMI methods do on a given @@ -990,12 +982,12 @@ index 48e1541dc8d4..ef5587469337 100644 0, asus->debug.method_id, &input, &output); -- -2.13.5 +2.13.6 -From 2f2199e407b1e0b3254a61236cd3e6a6efff170a Mon Sep 17 00:00:00 2001 +From 6dda2a4dbc8bb80efaa55aba6d54382e986305c5 Mon Sep 17 00:00:00 2001 From: Matthew Garrett <matthew.garrett@nebula.com> Date: Wed, 24 May 2017 14:56:04 +0100 -Subject: [PATCH 13/25] ACPI: Limit access to custom_method when the kernel is +Subject: [PATCH 14/26] ACPI: Limit access to custom_method when the kernel is locked down custom_method effectively allows arbitrary access to system memory, making @@ -1025,12 +1017,12 @@ index c68e72414a67..b33fba70ec51 100644 /* parse the table header to get the table length */ if (count <= sizeof(struct acpi_table_header)) -- -2.13.5 +2.13.6 -From a71db99ed6004cdc5fa9d91cc964712103a606a0 Mon Sep 17 00:00:00 2001 +From 64caa33410f85663cf0a65e4c09b8b8d28a219ad Mon Sep 17 00:00:00 2001 From: Josh Boyer <jwboyer@redhat.com> Date: Wed, 24 May 2017 14:56:05 +0100 -Subject: [PATCH 14/25] acpi: Ignore acpi_rsdp kernel param when the kernel has +Subject: [PATCH 15/26] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down This option allows userspace to pass the RSDP address to the kernel, which @@ -1060,12 +1052,12 @@ index db78d353bab1..36c6527c1b0a 100644 #endif -- -2.13.5 +2.13.6 -From 23cf57806ecd304a5f25e50f3292b0dfeb5a33b1 Mon Sep 17 00:00:00 2001 +From d87ce06969f2d4da0c864e8a4cf6c820d950cd1f Mon Sep 17 00:00:00 2001 From: Linn Crosetto <linn@hpe.com> Date: Wed, 24 May 2017 14:56:05 +0100 -Subject: [PATCH 15/25] acpi: Disable ACPI table override if the kernel is +Subject: [PATCH 16/26] acpi: Disable ACPI table override if the kernel is locked down From the kernel documentation (initrd_table_override.txt): @@ -1103,12 +1095,12 @@ index 80ce2a7d224b..5cc13c42daf9 100644 memblock_find_in_range(0, ACPI_TABLE_UPGRADE_MAX_PHYS, all_tables_size, PAGE_SIZE); -- -2.13.5 +2.13.6 -From a0d24f5ce005a299a2d8ff31350fe9415648c732 Mon Sep 17 00:00:00 2001 +From 547e2ca9cbfd420a15dd70e1c1c24b7040f88058 Mon Sep 17 00:00:00 2001 From: Linn Crosetto <linn@hpe.com> Date: Wed, 24 May 2017 14:56:05 +0100 -Subject: [PATCH 16/25] acpi: Disable APEI error injection if the kernel is +Subject: [PATCH 17/26] acpi: Disable APEI error injection if the kernel is locked down ACPI provides an error injection mechanism, EINJ, for debugging and testing @@ -1149,12 +1141,12 @@ index b38737c83a24..6d71e1e97b20 100644 if (flags && (flags & ~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_FLAGS_PCIE_SBDF))) -- -2.13.5 +2.13.6 -From bfb5183f23fa4369b1c0897bb0afcb73540a7de2 Mon Sep 17 00:00:00 2001 +From abbf8de44feab5f50b316d6491926d8d9029cb49 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 24 May 2017 14:56:06 +0100 -Subject: [PATCH 17/25] scsi: Lock down the eata driver +Subject: [PATCH 18/26] scsi: Lock down the eata driver When the kernel is running in secure boot mode, we lock down the kernel to prevent userspace from modifying the running kernel image. Whilst this @@ -1194,12 +1186,12 @@ index 6501c330d8c8..72fceaa8f3da 100644 #if defined(MODULE) /* io_port could have been modified when loading as a module */ -- -2.13.5 +2.13.6 -From 0f263953a98b222cc942e1cbba977fc1a351272f Mon Sep 17 00:00:00 2001 +From 116b02dff661d497c10099862b8b86e6cd2262ae Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 24 May 2017 14:56:06 +0100 -Subject: [PATCH 18/25] Prohibit PCMCIA CIS storage when the kernel is locked +Subject: [PATCH 19/26] Prohibit PCMCIA CIS storage when the kernel is locked down Prohibit replacement of the PCMCIA Card Information Structure when the @@ -1227,12 +1219,12 @@ index 55ef7d1fd8da..b7a0e42eeb25 100644 if (off) -- -2.13.5 +2.13.6 -From 17c75715372a9d913b7396c1f5c1db9627988cb7 Mon Sep 17 00:00:00 2001 +From f3dc03aa368cfde123bc1b60bda287091c9d43b4 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 24 May 2017 14:56:06 +0100 -Subject: [PATCH 19/25] Lock down TIOCSSERIAL +Subject: [PATCH 20/26] Lock down TIOCSSERIAL Lock down TIOCSSERIAL as that can be used to change the ioport and irq settings on a serial port. This only appears to be an issue for the serial @@ -1264,12 +1256,12 @@ index 3a14cccbd7ff..41f0922ad842 100644 retval = -EPERM; if (change_irq || change_port || -- -2.13.5 +2.13.6 -From f2b94788dc56591fb3b422187de511bfc7039468 Mon Sep 17 00:00:00 2001 +From 9d266defc89a73c6dcca3b67ad70b95ac99b8e53 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 24 May 2017 14:56:06 +0100 -Subject: [PATCH 20/25] Lock down module params that specify hardware +Subject: [PATCH 21/26] Lock down module params that specify hardware parameters (eg. ioport) Provided an annotation for module parameters that specify hardware @@ -1347,12 +1339,12 @@ index 60b2d8101355..422979adb60a 100644 if (!err) return len; -- -2.13.5 +2.13.6 -From a07442e78c95f0169e18198cd5be997aa6db6b7d Mon Sep 17 00:00:00 2001 +From 17a8caed6507846edd0a7016cdcd97fe46cca263 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 24 May 2017 14:56:07 +0100 -Subject: [PATCH 21/25] x86/mmiotrace: Lock down the testmmiotrace module +Subject: [PATCH 22/26] x86/mmiotrace: Lock down the testmmiotrace module The testmmiotrace module shouldn't be permitted when the kernel is locked down as it can be used to arbitrarily read and write MMIO space. @@ -1383,12 +1375,12 @@ index f6ae6830b341..bbaad357f5d7 100644 pr_err("you have to use the module argument mmio_address.\n"); pr_err("DO NOT LOAD THIS MODULE UNLESS YOU REALLY KNOW WHAT YOU ARE DOING!\n"); -- -2.13.5 +2.13.6 -From 1f3edea46a5e15484369bbda67bcee1b91c269a0 Mon Sep 17 00:00:00 2001 +From 79ae67bf5f7eda526abaa80b01b19e08c1ed3558 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Wed, 18 Oct 2017 17:28:02 +0100 -Subject: [PATCH 22/25] debugfs: Disallow use of debugfs files when the kernel +Subject: [PATCH 23/26] debugfs: Disallow use of debugfs files when the kernel is locked down Disallow opening of debugfs files when the kernel is locked down as various @@ -1438,17 +1430,18 @@ index 6dabc4a10396..32b5168a7e91 100644 if (r) { r = -ENOENT; -- -2.13.5 +2.13.6 -From e54bd739a12f56ca39cf106bae995f59c5e40447 Mon Sep 17 00:00:00 2001 +From 87ed5c02f0946c855730420cbf1daa6a2dfc54d7 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Thu, 19 Oct 2017 13:58:19 +0100 -Subject: [PATCH 23/25] Lock down /proc/kcore +Subject: [PATCH 24/26] Lock down /proc/kcore Disallow access to /proc/kcore when the kernel is locked down to prevent access to cryptographic data. Signed-off-by: David Howells <dhowells@redhat.com> +Reviewed-by: James Morris <james.l.morris@oracle.com> --- fs/proc/kcore.c | 2 ++ 1 file changed, 2 insertions(+) @@ -1467,12 +1460,12 @@ index 45629f4b5402..176cf749e650 100644 return -EPERM; -- -2.13.5 +2.13.6 -From 8294fa5b470e1736f0f54f97154d83883522e09a Mon Sep 17 00:00:00 2001 +From 2bce9ca3a24e0b35dcf665e6ba082f0a796c6aad Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Thu, 19 Oct 2017 14:18:53 +0100 -Subject: [PATCH 24/25] efi: Add an EFI_SECURE_BOOT flag to indicate secure +Subject: [PATCH 25/26] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode UEFI machines can be booted in Secure Boot mode. Add an EFI_SECURE_BOOT @@ -1489,9 +1482,9 @@ cc: linux-efi@vger.kernel.org --- arch/x86/kernel/setup.c | 14 +------------- drivers/firmware/efi/Makefile | 1 + - drivers/firmware/efi/secureboot.c | 37 +++++++++++++++++++++++++++++++++++++ + drivers/firmware/efi/secureboot.c | 38 ++++++++++++++++++++++++++++++++++++++ include/linux/efi.h | 16 ++++++++++------ - 4 files changed, 49 insertions(+), 19 deletions(-) + 4 files changed, 50 insertions(+), 19 deletions(-) create mode 100644 drivers/firmware/efi/secureboot.c diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c @@ -1533,10 +1526,10 @@ index 0329d319d89a..883f9f7eefc6 100644 arm-obj-$(CONFIG_EFI) := arm-init.o arm-runtime.o diff --git a/drivers/firmware/efi/secureboot.c b/drivers/firmware/efi/secureboot.c new file mode 100644 -index 000000000000..674dcc01bb0b +index 000000000000..9070055de0a1 --- /dev/null +++ b/drivers/firmware/efi/secureboot.c -@@ -0,0 +1,37 @@ +@@ -0,0 +1,38 @@ +/* Core kernel secure boot support. + * + * Copyright (C) 2017 Red Hat, Inc. All Rights Reserved. @@ -1569,7 +1562,8 @@ index 000000000000..674dcc01bb0b + pr_info("Secure boot enabled\n"); + break; + default: -+ pr_info("Secure boot could not be determined\n"); ++ pr_warning("Secure boot could not be determined (mode %u)\n", ++ mode); + break; + } + } @@ -1623,12 +1617,12 @@ index 66f4a4e79f4b..7c7a7e33e4d1 100644 #ifdef CONFIG_RESET_ATTACK_MITIGATION -- -2.13.5 +2.13.6 -From 49f2160cce8c14a53eb09f052064921a93eb9fb5 Mon Sep 17 00:00:00 2001 +From 163d6a313399a4d50c5c7e42e3dd642ca8d495d7 Mon Sep 17 00:00:00 2001 From: David Howells <dhowells@redhat.com> Date: Thu, 19 Oct 2017 14:05:02 +0100 -Subject: [PATCH 25/25] efi: Lock down the kernel if booted in secure boot mode +Subject: [PATCH 26/26] efi: Lock down the kernel if booted in secure boot mode UEFI Secure Boot provides a mechanism for ensuring that the firmware will only load signed bootloaders and kernels. Certain use cases may also @@ -1714,5 +1708,5 @@ index 2c6b00f0c229..527f7e51dc8d 100644 #ifdef CONFIG_ALLOW_LOCKDOWN_LIFT_BY_SYSRQ -- -2.13.5 +2.13.6 diff --git a/freed-ora/current/master/gitrev b/freed-ora/current/master/gitrev index fbf66c048..800cfe931 100644 --- a/freed-ora/current/master/gitrev +++ b/freed-ora/current/master/gitrev @@ -1 +1 @@ -9a27ded2195aaec2041ed2525ba7f373c60920c7 +0b07194bb55ed836c2cc7c22e866b87a14681984 diff --git a/freed-ora/current/master/kernel-aarch64-debug.config b/freed-ora/current/master/kernel-aarch64-debug.config index a4cb7fcee..bdd5dc71b 100644 --- a/freed-ora/current/master/kernel-aarch64-debug.config +++ b/freed-ora/current/master/kernel-aarch64-debug.config @@ -3266,6 +3266,7 @@ CONFIG_MTD_MAP_BANK_WIDTH_4=y # CONFIG_MTD_NAND is not set # CONFIG_MTD_NAND_OMAP2 is not set # CONFIG_MTD_NAND_OXNAS is not set +CONFIG_MTD_NAND_PXA3xx=m CONFIG_MTD_OF_PARTS=m # CONFIG_MTD_ONENAND is not set # CONFIG_MTD_OOPS is not set @@ -4279,7 +4280,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-aarch64.config b/freed-ora/current/master/kernel-aarch64.config index 2fb8f116b..3d6e1a3bb 100644 --- a/freed-ora/current/master/kernel-aarch64.config +++ b/freed-ora/current/master/kernel-aarch64.config @@ -3245,6 +3245,7 @@ CONFIG_MTD_MAP_BANK_WIDTH_4=y # CONFIG_MTD_NAND is not set # CONFIG_MTD_NAND_OMAP2 is not set # CONFIG_MTD_NAND_OXNAS is not set +CONFIG_MTD_NAND_PXA3xx=m CONFIG_MTD_OF_PARTS=m # CONFIG_MTD_ONENAND is not set # CONFIG_MTD_OOPS is not set @@ -4257,7 +4258,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-armv7hl-debug.config b/freed-ora/current/master/kernel-armv7hl-debug.config index d9aa225cc..25a3e8890 100644 --- a/freed-ora/current/master/kernel-armv7hl-debug.config +++ b/freed-ora/current/master/kernel-armv7hl-debug.config @@ -4596,7 +4596,7 @@ CONFIG_R8169=m CONFIG_R8188EU=m CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-armv7hl-lpae-debug.config b/freed-ora/current/master/kernel-armv7hl-lpae-debug.config index 81867b173..318ebb5f1 100644 --- a/freed-ora/current/master/kernel-armv7hl-lpae-debug.config +++ b/freed-ora/current/master/kernel-armv7hl-lpae-debug.config @@ -4320,7 +4320,7 @@ CONFIG_R8169=m CONFIG_R8188EU=m CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-armv7hl-lpae.config b/freed-ora/current/master/kernel-armv7hl-lpae.config index 1f96ff46e..895928545 100644 --- a/freed-ora/current/master/kernel-armv7hl-lpae.config +++ b/freed-ora/current/master/kernel-armv7hl-lpae.config @@ -4298,7 +4298,7 @@ CONFIG_R8169=m CONFIG_R8188EU=m CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-armv7hl.config b/freed-ora/current/master/kernel-armv7hl.config index e16606b28..0e38e18b4 100644 --- a/freed-ora/current/master/kernel-armv7hl.config +++ b/freed-ora/current/master/kernel-armv7hl.config @@ -4574,7 +4574,7 @@ CONFIG_R8169=m CONFIG_R8188EU=m CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-i686-PAE.config b/freed-ora/current/master/kernel-i686-PAE.config index 5cadb057f..203eea8f8 100644 --- a/freed-ora/current/master/kernel-i686-PAE.config +++ b/freed-ora/current/master/kernel-i686-PAE.config @@ -4070,7 +4070,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-i686-PAEdebug.config b/freed-ora/current/master/kernel-i686-PAEdebug.config index 0f91b4c02..90f68db37 100644 --- a/freed-ora/current/master/kernel-i686-PAEdebug.config +++ b/freed-ora/current/master/kernel-i686-PAEdebug.config @@ -4091,7 +4091,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-i686-debug.config b/freed-ora/current/master/kernel-i686-debug.config index 5c6116985..99d2322aa 100644 --- a/freed-ora/current/master/kernel-i686-debug.config +++ b/freed-ora/current/master/kernel-i686-debug.config @@ -4091,7 +4091,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-i686.config b/freed-ora/current/master/kernel-i686.config index 479913a6c..b7c6fd523 100644 --- a/freed-ora/current/master/kernel-i686.config +++ b/freed-ora/current/master/kernel-i686.config @@ -4070,7 +4070,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-ppc64-debug.config b/freed-ora/current/master/kernel-ppc64-debug.config index 0a7d6d9b8..a433c62dc 100644 --- a/freed-ora/current/master/kernel-ppc64-debug.config +++ b/freed-ora/current/master/kernel-ppc64-debug.config @@ -3903,7 +3903,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-ppc64.config b/freed-ora/current/master/kernel-ppc64.config index dc674913c..d772f8562 100644 --- a/freed-ora/current/master/kernel-ppc64.config +++ b/freed-ora/current/master/kernel-ppc64.config @@ -3880,7 +3880,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-ppc64le-debug.config b/freed-ora/current/master/kernel-ppc64le-debug.config index 08e706b43..076c9c3df 100644 --- a/freed-ora/current/master/kernel-ppc64le-debug.config +++ b/freed-ora/current/master/kernel-ppc64le-debug.config @@ -3842,7 +3842,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-ppc64le.config b/freed-ora/current/master/kernel-ppc64le.config index 978bbc22b..6309fcde6 100644 --- a/freed-ora/current/master/kernel-ppc64le.config +++ b/freed-ora/current/master/kernel-ppc64le.config @@ -3819,7 +3819,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-s390x-debug.config b/freed-ora/current/master/kernel-s390x-debug.config index aefc49261..4d76b4b4c 100644 --- a/freed-ora/current/master/kernel-s390x-debug.config +++ b/freed-ora/current/master/kernel-s390x-debug.config @@ -3737,7 +3737,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-s390x.config b/freed-ora/current/master/kernel-s390x.config index 036a3e906..5ee0b6c7b 100644 --- a/freed-ora/current/master/kernel-s390x.config +++ b/freed-ora/current/master/kernel-s390x.config @@ -3714,7 +3714,7 @@ CONFIG_R8169=m # CONFIG_R8188EU is not set CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-x86_64-debug.config b/freed-ora/current/master/kernel-x86_64-debug.config index 92676ef85..a275be725 100644 --- a/freed-ora/current/master/kernel-x86_64-debug.config +++ b/freed-ora/current/master/kernel-x86_64-debug.config @@ -4132,7 +4132,7 @@ CONFIG_R8169=m CONFIG_R8188EU=m CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel-x86_64.config b/freed-ora/current/master/kernel-x86_64.config index 1c9dc86ba..4914f5707 100644 --- a/freed-ora/current/master/kernel-x86_64.config +++ b/freed-ora/current/master/kernel-x86_64.config @@ -4111,7 +4111,7 @@ CONFIG_R8169=m CONFIG_R8188EU=m CONFIG_R8712U=m CONFIG_R8723AU=m # Jes Sorensen maintains this (rhbz 1100162) -# CONFIG_R8822BE is not set +CONFIG_R8822BE=m CONFIG_RADIO_ADAPTERS=y CONFIG_RADIO_AZTECH=m CONFIG_RADIO_CADET=m diff --git a/freed-ora/current/master/kernel.spec b/freed-ora/current/master/kernel.spec index f1fdd6258..aee4b188b 100644 --- a/freed-ora/current/master/kernel.spec +++ b/freed-ora/current/master/kernel.spec @@ -105,7 +105,7 @@ Summary: The Linux kernel # The next upstream release sublevel (base_sublevel+1) %define upstream_sublevel %(echo $((%{base_sublevel} + 1))) # The rc snapshot level -%global rcrev 6 +%global rcrev 7 # The git snapshot level %define gitrev 0 # Set rpm version accordingly @@ -703,6 +703,11 @@ Patch620: 0001-staging-vboxvideo-Fix-reporting-invalid-suggested-of.patch # Headed upstream Patch621: drm-i915-Boost-GPU-clocks-if-we-miss-the-pageflip-s-vblank.patch +# rhbz 1497861, submitted upstream, Cc: Stable +Patch622: 0001-platform-x86-peaq-wmi-Add-DMI-check-before-binding-t.patch + +Patch623: 0001-PATCH-staging-rtl8822be-fix-wrong-dma-unmap-len.patch + # END OF PATCH DEFINITIONS %endif @@ -2324,6 +2329,31 @@ fi # # %changelog +* Mon Oct 30 2017 Alexandre Oliva <lxoliva@fsfla.org> -libre +- GNU Linux-libre 4.14-rc7-gnu. + +* Mon Oct 30 2017 Justin M. Forbes <jforbes@fedoraproject.org> - 4.14.0-0.rc7.git0.1 +- Linux v4.14-rc7 + +* Mon Oct 30 2017 Justin M. Forbes <jforbes@fedoraproject.org> +- Disable debugging options. + +* Mon Oct 30 2017 Hans de Goede <jwrdegoede@fedoraproject.org> +- Fix for peaq_wmi nul spew (rhbz 1497861) + +* Fri Oct 27 2017 Justin M. Forbes <jforbes@fedoraproject.org> - 4.14.0-0.rc6.git4.1 +- Linux v4.14-rc6-53-g15f859ae5c43 + +* Thu Oct 26 2017 Justin M. Forbes <jforbes@fedoraproject.org> - 4.14.0-0.rc6.git3.1 +- Linux v4.14-rc6-50-g567825502730 + +* Wed Oct 25 2017 Justin M. Forbes <jforbes@fedoraproject.org> - 4.14.0-0.rc6.git2.1 +- Linux v4.14-rc6-21-gf34157878d3b + +* Tue Oct 24 2017 Justin M. Forbes <jforbes@fedoraproject.org> - 4.14.0-0.rc6.git1.1 +- Linux v4.14-rc6-18-gae59df0349ba +- Reenable debugging options. + * Tue Oct 24 2017 Alexandre Oliva <lxoliva@fsfla.org> -libre - GNU Linux-libre 4.14-rc6-gnu. - Drop firmware subpackage. diff --git a/freed-ora/current/master/patch-4.13-gnu-4.14-rc6-gnu.xz.sign b/freed-ora/current/master/patch-4.13-gnu-4.14-rc6-gnu.xz.sign deleted file mode 100644 index 203c0de2d..000000000 --- a/freed-ora/current/master/patch-4.13-gnu-4.14-rc6-gnu.xz.sign +++ /dev/null @@ -1,6 +0,0 @@ ------BEGIN PGP SIGNATURE----- - -iF0EABECAB0WIQRHRALIxYLa++OJxCe8t8+Hfn1HpwUCWe8kQwAKCRC8t8+Hfn1H -p6nkAKCXcI2o3Nr1apUiqF/p/0bqVcpbAQCfUU9pm5r2qDwfpm8bUPG9k0HFBsM= -=YxFh ------END PGP SIGNATURE----- diff --git a/freed-ora/current/master/patch-4.13-gnu-4.14-rc7-gnu.xz.sign b/freed-ora/current/master/patch-4.13-gnu-4.14-rc7-gnu.xz.sign new file mode 100644 index 000000000..61b98ce3c --- /dev/null +++ b/freed-ora/current/master/patch-4.13-gnu-4.14-rc7-gnu.xz.sign @@ -0,0 +1,6 @@ +-----BEGIN PGP SIGNATURE----- + +iF0EABECAB0WIQRHRALIxYLa++OJxCe8t8+Hfn1HpwUCWfaUIgAKCRC8t8+Hfn1H +pxD5AJ9zIGJxmVUczAmF1KNtQ21bUkuXxACdGEIk8NtDFmo7jKtPiG5szUirZ8o= +=zMcY +-----END PGP SIGNATURE----- diff --git a/freed-ora/current/master/sources b/freed-ora/current/master/sources index f543ba9a4..81e08921d 100644 --- a/freed-ora/current/master/sources +++ b/freed-ora/current/master/sources @@ -1,3 +1,3 @@ SHA512 (linux-libre-4.13-gnu.tar.xz) = 9ad6866c68f29f7e4f8b53d0b857f9b3c7f6abd0054460675c76f3100db34a77c2777d7f4191831008b532cb2ab6f686d8c4f457a4d005226c73f90937963518 SHA512 (perf-man-4.13.tar.gz) = 9bcc2cd8e56ec583ed2d8e0b0c88e7a94035a1915e40b3177bb02d6c0f10ddd4df9b097b1f5af59efc624226b613e240ddba8ddc2156f3682f992d5455fc5c03 -SHA512 (patch-4.13-gnu-4.14-rc6-gnu.xz) = 5a6dc8c106c6b264adbaf5a4c24c2fb8bbd56890964a2e34091c1b3e11c0ee7725a8d58112067a6d65f9acff3774fd2cef1796f5cd7422f17bc4787977215856 +SHA512 (patch-4.13-gnu-4.14-rc7-gnu.xz) = 5a4dcd9a8d848af658d97e1e31c19bcaaab30c1a24be9fc1a56b47bc5f49086f8eaf564e0bfec5cb338c0156a08b4b66c6b37c4a728639cdac205e71337b4a40 |

