Home Home > GIT Browse
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJiri Kosina <jkosina@suse.cz>2018-06-08 15:34:34 +0200
committerJiri Kosina <jkosina@suse.cz>2018-06-08 15:34:34 +0200
commit544f15712579666a4eb43bd37d1d925f6b88d7dc (patch)
tree7c318e2dd2af1d5986fffb3f2e23ad4271dce883
parent865614d8b39e79d847261c2112758b32147f19fc (diff)
parentcf039fcdf0af77bcbb800eec9f6cd3bddc7e44be (diff)
Merge remote-tracking branch 'origin/users/msuchanek/SLE11-SP4/for-next' into SLE11-SP4
-rw-r--r--patches.arch/STF-no-POWER9-support-on-SLE12-SP2.patch33
-rw-r--r--patches.suse/powerpc-64s-Add-support-for-a-store-forwarding-barri.patch232
-rw-r--r--patches.suse/revert-dmi_scan-changes-1.patch (renamed from patches.kernel.org/revert-dmi_scan-changes-1.patch)2
-rw-r--r--patches.suse/revert-dmi_scan-changes-2.patch (renamed from patches.kernel.org/revert-dmi_scan-changes-2.patch)2
-rw-r--r--patches.suse/revert-dmi_scan-changes-3.patch (renamed from patches.kernel.org/revert-dmi_scan-changes-3.patch)2
-rw-r--r--patches.suse/revert-hwmon-coretemp-fix-oops-on-driver-load.patch (renamed from patches.kernel.org/revert-hwmon-coretemp-fix-oops-on-driver-load.patch)2
-rw-r--r--patches.suse/revert-removal-of-ACPI-procfs-entries.patch (renamed from patches.kernel.org/revert-removal-of-ACPI-procfs-entries.patch)2
-rw-r--r--series.conf11
8 files changed, 158 insertions, 128 deletions
diff --git a/patches.arch/STF-no-POWER9-support-on-SLE12-SP2.patch b/patches.arch/STF-no-POWER9-support-on-SLE12-SP2.patch
new file mode 100644
index 0000000000..5507451433
--- /dev/null
+++ b/patches.arch/STF-no-POWER9-support-on-SLE12-SP2.patch
@@ -0,0 +1,33 @@
+From 5e2308fcffc65b644a4bc4cbae8ec3a763245034 Mon Sep 17 00:00:00 2001
+From: Michal Suchanek <msuchanek@suse.de>
+Date: Wed, 9 May 2018 15:34:32 +0200
+Subject: [PATCH] STF: no POWER9 support on SLE12-SP2
+
+References: CVE-2018-3639, bsc#1087082
+Patch-mainline: no, not needed
+
+Signed-off-by: Michal Suchanek <msuchanek@suse.de>
+---
+ arch/powerpc/kernel/security.c | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/arch/powerpc/kernel/security.c b/arch/powerpc/kernel/security.c
+--- a/arch/powerpc/kernel/security.c
++++ b/arch/powerpc/kernel/security.c
+@@ -948,9 +948,12 @@ void setup_stf_barrier(void)
+ hv = cpu_has_feature(CPU_FTR_HVMODE);
+
+ /* Default to fallback in case fw-features are not available */
++#ifdef CPU_FTR_ARCH_300
+ if (cpu_has_feature(CPU_FTR_ARCH_300))
+ type = STF_BARRIER_EIEIO;
+- else if (cpu_has_feature(CPU_FTR_ARCH_207S))
++ else
++#endif
++ if (cpu_has_feature(CPU_FTR_ARCH_207S))
+ type = STF_BARRIER_SYNC_ORI;
+ else if (cpu_has_feature(CPU_FTR_ARCH_206))
+ type = STF_BARRIER_FALLBACK;
+--
+2.12.3
+
diff --git a/patches.suse/powerpc-64s-Add-support-for-a-store-forwarding-barri.patch b/patches.suse/powerpc-64s-Add-support-for-a-store-forwarding-barri.patch
index f6782735b8..a7680bf1dc 100644
--- a/patches.suse/powerpc-64s-Add-support-for-a-store-forwarding-barri.patch
+++ b/patches.suse/powerpc-64s-Add-support-for-a-store-forwarding-barri.patch
@@ -1,15 +1,19 @@
-From 3afe6c4db56578a9698f9634b89eece2ade219a1 Mon Sep 17 00:00:00 2001
+From 41728e847cf0fa9e3109e862ee4c2261ddb7b407 Mon Sep 17 00:00:00 2001
From: Nicholas Piggin <npiggin@gmail.com>
-Date: Tue, 24 Apr 2018 16:55:14 +1000
+Date: Tue, 22 May 2018 09:00:00 +1000
Subject: [PATCH] powerpc/64s: Add support for a store forwarding barrier at
kernel entry/exit
References: CVE-2018-3639, bsc#1087082
-Patch-mainline: no, under development
+Patch-mainline: v4.17-rc7
+Git-commit: a048a07d7f4535baa4cbad6bc024f175317ab938
-This patch prevents a possible store forwarding between privilege
-domains, by inserting a store forwarding barrier in kernel entry and
-exit paths.
+On some CPUs we can prevent a vulnerability related to store-to-load
+forwarding by preventing store forwarding between privilege domains,
+by inserting a barrier in kernel entry and exit paths.
+
+This is known to be the case on at least Power7, Power8 and Power9
+powerpc CPUs.
Barriers must be inserted generally before the first load after moving
to a higher privilege, and after the last store before moving to a
@@ -19,24 +23,32 @@ Barriers are added as patch sections, with all kernel/hypervisor entry
points patched, and the exit points to lower privilge levels patched
similarly to the RFI flush patching.
+Firmware advertisement is not implemented yet, so CPU flush types
+are hard coded.
+
+Thanks to Michal Suchánek for bug fixes and review.
+
Signed-off-by: Nicholas Piggin <npiggin@gmail.com>
[mauricio: backport to SLES 12 SP3 KOTD kernel-source-4.4.128-6.1.g00de887]
[msuchanek: backport to SLE11 SP4]
Signed-off-by: Mauricio Faria de Oliveira <mauricfo@linux.vnet.ibm.com>
-Acked-by: Michal Suchanek <msuchanek@suse.de>
+Signed-off-by: Michael Neuling <mikey@neuling.org>
+Signed-off-by: Michal Suchánek <msuchanek@suse.de>
+Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
+Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
---
- arch/powerpc/include/asm/exception-64s.h | 29 ++++++++
- arch/powerpc/include/asm/feature-fixups.h | 19 +++++
- arch/powerpc/include/asm/setup.h | 12 ++-
- arch/powerpc/kernel/exceptions-64s.S | 19 +++++
- arch/powerpc/kernel/setup_64.c | 120 +++++++++++++++++++++++++++++-
- arch/powerpc/kernel/vmlinux.lds.S | 14 ++++
- arch/powerpc/lib/feature-fixups.c | 105 ++++++++++++++++++++++++++
- arch/powerpc/platforms/pseries/setup.c | 1 +
- 8 files changed, 313 insertions(+), 6 deletions(-)
+ arch/powerpc/include/asm/exception-64s.h | 29 ++++++
+ arch/powerpc/include/asm/feature-fixups.h | 19 ++++
+ arch/powerpc/include/asm/security_features.h | 11 ++
+ arch/powerpc/kernel/exceptions-64s.S | 19 ++++
+ arch/powerpc/kernel/security.c | 148 +++++++++++++++++++++++++++
+ arch/powerpc/kernel/vmlinux.lds.S | 14 +++
+ arch/powerpc/lib/feature-fixups.c | 106 +++++++++++++++++++
+ arch/powerpc/platforms/pseries/setup.c | 1 +
+ 8 files changed, 347 insertions(+)
diff --git a/arch/powerpc/include/asm/exception-64s.h b/arch/powerpc/include/asm/exception-64s.h
-index 5d9666b4a328..074462348848 100644
+index 5d9666b4a328..cfdba7295c02 100644
--- a/arch/powerpc/include/asm/exception-64s.h
+++ b/arch/powerpc/include/asm/exception-64s.h
@@ -52,6 +52,27 @@
@@ -45,9 +57,9 @@ index 5d9666b4a328..074462348848 100644
+#define STF_ENTRY_BARRIER_SLOT \
+ STF_ENTRY_BARRIER_FIXUP_SECTION; \
-+ mflr r10; \
-+ bl stf_barrier_fallback; \
-+ mtlr r10
++ nop; \
++ nop; \
++ nop
+
+#define STF_EXIT_BARRIER_SLOT \
+ STF_EXIT_BARRIER_FIXUP_SECTION; \
@@ -158,17 +170,15 @@ index 05675d8fd3f0..05fc5760afb9 100644
extern long __start___rfi_flush_fixup, __stop___rfi_flush_fixup;
extern long __start___barrier_nospec_fixup, __stop___barrier_nospec_fixup;
-diff --git a/arch/powerpc/include/asm/setup.h b/arch/powerpc/include/asm/setup.h
-index ee02b4ac321a..f94982c5b1a8 100644
---- a/arch/powerpc/include/asm/setup.h
-+++ b/arch/powerpc/include/asm/setup.h
-@@ -9,9 +9,17 @@ void check_for_initrd(void);
- void do_init_bootmem(void);
- void setup_panic(void);
+diff --git a/arch/powerpc/include/asm/security_features.h b/arch/powerpc/include/asm/security_features.h
+index fa4d2e1cf772..44989b22383c 100644
+--- a/arch/powerpc/include/asm/security_features.h
++++ b/arch/powerpc/include/asm/security_features.h
+@@ -12,6 +12,17 @@
+ extern unsigned long powerpc_security_features;
+ extern bool rfi_flush;
--void rfi_flush_enable(bool enable);
--
- /* These are bit flags */
++/* These are bit flags */
+enum stf_barrier_type {
+ STF_BARRIER_NONE = 0x1,
+ STF_BARRIER_FALLBACK = 0x2,
@@ -179,11 +189,11 @@ index ee02b4ac321a..f94982c5b1a8 100644
+void setup_stf_barrier(void);
+void do_stf_barrier_fixups(enum stf_barrier_type types);
+
- enum l1d_flush_type {
- L1D_FLUSH_NONE = 0x1,
- L1D_FLUSH_FALLBACK = 0x2,
+ static inline void security_ftr_set(unsigned long feature)
+ {
+ powerpc_security_features |= feature;
diff --git a/arch/powerpc/kernel/exceptions-64s.S b/arch/powerpc/kernel/exceptions-64s.S
-index 4dc465e93c96..82c2d1730436 100644
+index 395caee0a6ac..2c8a8dc43db2 100644
--- a/arch/powerpc/kernel/exceptions-64s.S
+++ b/arch/powerpc/kernel/exceptions-64s.S
@@ -131,6 +131,7 @@ data_access_slb_pSeries:
@@ -233,32 +243,23 @@ index 4dc465e93c96..82c2d1730436 100644
.globl rfi_flush_fallback
rfi_flush_fallback:
SET_SCRATCH0(r13);
-diff --git a/arch/powerpc/kernel/setup_64.c b/arch/powerpc/kernel/setup_64.c
-index 40de4cb7a830..136e526e6eb5 100644
---- a/arch/powerpc/kernel/setup_64.c
-+++ b/arch/powerpc/kernel/setup_64.c
-@@ -65,6 +65,7 @@
- #include <asm/kexec.h>
- #include <asm/mmu_context.h>
- #include <asm/code-patching.h>
-+#include <asm/security_features.h>
-
- #ifdef DEBUG
- #define DBG(fmt...) udbg_printf(fmt)
-@@ -674,11 +675,48 @@ EXPORT_SYMBOL(ppc_pci_io);
- #endif /* CONFIG_PPC_INDIRECT_IO */
+diff --git a/arch/powerpc/kernel/security.c b/arch/powerpc/kernel/security.c
+index bd4894034af7..b95d5d48018c 100644
+--- a/arch/powerpc/kernel/security.c
++++ b/arch/powerpc/kernel/security.c
+@@ -158,3 +158,151 @@ ssize_t cpu_show_spectre_v2(struct device *dev, struct device_attribute *attr, c
- #ifdef CONFIG_PPC_BOOK3S_64
--static enum l1d_flush_type enabled_flush_types;
+ return s.len;
+ }
++
++/*
++ * Store-forwarding barrier support.
++ */
++
+static enum stf_barrier_type stf_enabled_flush_types;
+static bool no_stf_barrier;
+bool stf_barrier;
+
-+static enum l1d_flush_type rfi_enabled_flush_types;
- static void *l1d_flush_fallback_area;
- static bool no_rfi_flush;
- bool rfi_flush;
-
+static int __init handle_no_stf_barrier(char *p)
+{
+ pr_info("stf-barrier: disabled on command line.");
@@ -271,13 +272,13 @@ index 40de4cb7a830..136e526e6eb5 100644
+/* This is the generic flag used by other architectures */
+static int __init handle_ssbd(char *p)
+{
-+ if (!p || strncmp(p, "off", 3) == 0) {
-+ handle_no_stf_barrier(NULL);
-+ return 0;
-+ } else if (strncmp(p, "auto", 5) == 0 || strncmp(p, "on", 2) == 0 )
++ if (!p || strncmp(p, "auto", 5) == 0 || strncmp(p, "on", 2) == 0 ) {
+ /* Until firmware tells us, we have the barrier with auto */
+ return 0;
-+ else
++ } else if (strncmp(p, "off", 3) == 0) {
++ handle_no_stf_barrier(NULL);
++ return 0;
++ } else
+ return 1;
+
+ return 0;
@@ -292,58 +293,36 @@ index 40de4cb7a830..136e526e6eb5 100644
+}
+early_param("nospec_store_bypass_disable", handle_no_ssbd);
+
- static int __init handle_no_rfi_flush(char *p)
- {
- pr_info("rfi-flush: disabled on command line.");
-@@ -707,10 +745,21 @@ static void do_nothing(void *unused)
- */
- }
-
--void rfi_flush_enable(bool enable)
+static void stf_barrier_enable(bool enable)
+{
-+ if (enable) {
++ if (enable)
+ do_stf_barrier_fixups(stf_enabled_flush_types);
-+ on_each_cpu(do_nothing, NULL, 1);
-+ } else
++ else
+ do_stf_barrier_fixups(STF_BARRIER_NONE);
+
+ stf_barrier = enable;
+}
+
-+static void rfi_flush_enable(bool enable)
- {
- if (enable) {
-- do_rfi_flush_fixups(enabled_flush_types);
-+ do_rfi_flush_fixups(rfi_enabled_flush_types);
- on_each_cpu(do_nothing, NULL, 1);
- } else
- do_rfi_flush_fixups(L1D_FLUSH_NONE);
-@@ -718,6 +767,42 @@ void rfi_flush_enable(bool enable)
- rfi_flush = enable;
- }
-
+void setup_stf_barrier(void)
+{
+ enum stf_barrier_type type;
-+ bool enable;
++ bool enable, hv;
++
++ hv = cpu_has_feature(CPU_FTR_HVMODE);
+
+ /* Default to fallback in case fw-features are not available */
-+#ifdef CPU_FTR_ARCH_300 /* POWER9 support */
+ if (cpu_has_feature(CPU_FTR_ARCH_300))
+ type = STF_BARRIER_EIEIO;
-+ else
-+#endif
-+ if (cpu_has_feature(CPU_FTR_ARCH_207S))
++ else if (cpu_has_feature(CPU_FTR_ARCH_207S))
+ type = STF_BARRIER_SYNC_ORI;
-+ /* CPU_FTR_HVMODE_206 only set in hv mode */
-+ else if (cpu_has_feature(CPU_FTR_ASYM_SMT))
++ else if (cpu_has_feature(CPU_FTR_ARCH_206))
+ type = STF_BARRIER_FALLBACK;
+ else
+ type = STF_BARRIER_NONE;
+
+ enable = security_ftr_enabled(SEC_FTR_FAVOUR_SECURITY) &&
-+ (security_ftr_enabled(SEC_FTR_L1D_FLUSH_PR));
++ (security_ftr_enabled(SEC_FTR_L1D_FLUSH_PR) ||
++ (security_ftr_enabled(SEC_FTR_L1D_FLUSH_HV) && hv));
+
+ if (type == STF_BARRIER_FALLBACK) {
+ pr_info("stf-barrier: fallback barrier available\n");
@@ -359,21 +338,34 @@ index 40de4cb7a830..136e526e6eb5 100644
+ stf_barrier_enable(enable);
+}
+
- static void __ref init_fallback_flush(void)
- {
- u64 l1d_size, limit;
-@@ -759,13 +844,39 @@ void setup_rfi_flush(enum l1d_flush_type types, bool enable)
- if (types & L1D_FLUSH_MTTRIG)
- pr_info("rfi-flush: mttrig type flush available\n");
-
-- enabled_flush_types = types;
-+ rfi_enabled_flush_types = types;
-
- if (!no_rfi_flush)
- rfi_flush_enable(enable);
- }
-
- #ifdef CONFIG_DEBUG_FS
++ssize_t cpu_show_spec_store_bypass(struct device *dev, struct device_attribute *attr, char *buf)
++{
++ if (stf_barrier && stf_enabled_flush_types != STF_BARRIER_NONE) {
++ const char *type;
++ switch (stf_enabled_flush_types) {
++ case STF_BARRIER_EIEIO:
++ type = "eieio";
++ break;
++ case STF_BARRIER_SYNC_ORI:
++ type = "hwsync";
++ break;
++ case STF_BARRIER_FALLBACK:
++ type = "fallback";
++ break;
++ default:
++ type = "unknown";
++ }
++ return sprintf(buf, "Mitigation: Kernel entry/exit barrier (%s)\n", type);
++ }
++
++ if (!security_ftr_enabled(SEC_FTR_L1D_FLUSH_HV) &&
++ !security_ftr_enabled(SEC_FTR_L1D_FLUSH_PR))
++ return sprintf(buf, "Not affected\n");
++
++ return sprintf(buf, "Vulnerable\n");
++}
++
++#ifdef CONFIG_DEBUG_FS
+static int stf_barrier_set(void *data, u64 val)
+{
+ bool enable;
@@ -400,17 +392,13 @@ index 40de4cb7a830..136e526e6eb5 100644
+
+DEFINE_SIMPLE_ATTRIBUTE(fops_stf_barrier, stf_barrier_get, stf_barrier_set, "%llu\n");
+
- static int rfi_flush_set(void *data, u64 val)
- {
- bool enable;
-@@ -795,6 +906,7 @@ DEFINE_SIMPLE_ATTRIBUTE(fops_rfi_flush, rfi_flush_get, rfi_flush_set, "%llu\n");
- static __init int rfi_flush_debugfs_init(void)
- {
- debugfs_create_file("rfi_flush", 0600, powerpc_debugfs_root, NULL, &fops_rfi_flush);
++static __init int stf_barrier_debugfs_init(void)
++{
+ debugfs_create_file("stf_barrier", 0600, powerpc_debugfs_root, NULL, &fops_stf_barrier);
- return 0;
- }
- device_initcall(rfi_flush_debugfs_init);
++ return 0;
++}
++device_initcall(stf_barrier_debugfs_init);
++#endif /* CONFIG_DEBUG_FS */
diff --git a/arch/powerpc/kernel/vmlinux.lds.S b/arch/powerpc/kernel/vmlinux.lds.S
index f9a38c68fc2f..3fa9cf613d3e 100644
--- a/arch/powerpc/kernel/vmlinux.lds.S
@@ -437,10 +425,18 @@ index f9a38c68fc2f..3fa9cf613d3e 100644
__start___rfi_flush_fixup = .;
*(__rfi_flush_fixup)
diff --git a/arch/powerpc/lib/feature-fixups.c b/arch/powerpc/lib/feature-fixups.c
-index 8ce177e67add..6fb164040918 100644
+index 8ce177e67add..776d218a3c73 100644
--- a/arch/powerpc/lib/feature-fixups.c
+++ b/arch/powerpc/lib/feature-fixups.c
-@@ -115,6 +115,111 @@ void do_feature_fixups(unsigned long value, void *fixup_start, void *fixup_end)
+@@ -21,6 +21,7 @@
+ #include <asm/page.h>
+ #include <asm/sections.h>
+ #include <asm/setup.h>
++#include <asm/security_features.h>
+
+
+ struct fixup_entry {
+@@ -115,6 +116,111 @@ void do_feature_fixups(unsigned long value, void *fixup_start, void *fixup_end)
}
#ifdef CONFIG_PPC_BOOK3S_64
diff --git a/patches.kernel.org/revert-dmi_scan-changes-1.patch b/patches.suse/revert-dmi_scan-changes-1.patch
index b89b5d7631..740ded1f09 100644
--- a/patches.kernel.org/revert-dmi_scan-changes-1.patch
+++ b/patches.suse/revert-dmi_scan-changes-1.patch
@@ -1,6 +1,6 @@
From: Jean Delvare <jdelvare@suse.de>
Subject: Revert "dmi_scan: fix missing check for _DMI_ signature in smbios_present()"
-Patch-mainline: Never
+Patch-mainline: Never, SUSE-specific
Revert 3.0.69 commit 3241d80d48900fc43535980865f1ef726af68713
(commit a40e7cf8f06b4e322ba902e4e9f6a6b0c2daa907 upstream.)
diff --git a/patches.kernel.org/revert-dmi_scan-changes-2.patch b/patches.suse/revert-dmi_scan-changes-2.patch
index c1d36fdce2..034df573bc 100644
--- a/patches.kernel.org/revert-dmi_scan-changes-2.patch
+++ b/patches.suse/revert-dmi_scan-changes-2.patch
@@ -1,6 +1,6 @@
From: Jean Delvare <jdelvare@suse.de>
Subject: Revert "drivers/firmware/dmi_scan.c: fetch dmi version from SMBIOS if it exists"
-Patch-mainline: Never
+Patch-mainline: Never, SUSE-specific
Revert 3.0.61 commit a6aa749906b92eaec6ca0469f90f35de26044d90
(commit 9f9c9cbb60576a1518d0bf93fb8e499cffccf377 upstream.)
diff --git a/patches.kernel.org/revert-dmi_scan-changes-3.patch b/patches.suse/revert-dmi_scan-changes-3.patch
index 28bbfca258..6afc28dfae 100644
--- a/patches.kernel.org/revert-dmi_scan-changes-3.patch
+++ b/patches.suse/revert-dmi_scan-changes-3.patch
@@ -1,6 +1,6 @@
From: Jean Delvare <jdelvare@suse.de>
Subject: Revert "drivers/firmware/dmi_scan.c: check dmi version when get system uuid"
-Patch-mainline: Never
+Patch-mainline: Never, SUSE-specific
Revert 3.0.61 commit 88e10f8813d2f214178adc5f8ac62e4531bd6fdc
(commit f1d8e614d74b09531b9a85e812485340f3df7b1c upstream.)
diff --git a/patches.kernel.org/revert-hwmon-coretemp-fix-oops-on-driver-load.patch b/patches.suse/revert-hwmon-coretemp-fix-oops-on-driver-load.patch
index f540c7927f..1486a12350 100644
--- a/patches.kernel.org/revert-hwmon-coretemp-fix-oops-on-driver-load.patch
+++ b/patches.suse/revert-hwmon-coretemp-fix-oops-on-driver-load.patch
@@ -1,6 +1,6 @@
From: Greg Kroah-Hartman <gregkh@suse.de>
Subject: Revert "hwmon: (coretemp) Fix oops on driver load"
-Patch-mainline: never
+Patch-mainline: Never, SUSE-specific
This is a revert of the patch in the 3.0.13 release.
diff --git a/patches.kernel.org/revert-removal-of-ACPI-procfs-entries.patch b/patches.suse/revert-removal-of-ACPI-procfs-entries.patch
index 96783c83ee..ee562cea3f 100644
--- a/patches.kernel.org/revert-removal-of-ACPI-procfs-entries.patch
+++ b/patches.suse/revert-removal-of-ACPI-procfs-entries.patch
@@ -1,7 +1,7 @@
From: Tomas Cech <sleep_walker@suse.cz>
Date: Wed, 12 Sep 2012 16:22:11 +0200
Subject: Revert removal of ACPI procfs entries
-Patch-mainline: never
+Patch-mainline: Never, SUSE-specific
References: bnc#777283
Revert changes made by 47f5c892b06797336a34f1096b4b617623aa1960.
diff --git a/series.conf b/series.conf
index 368b488cbb..3aee6beea5 100644
--- a/series.conf
+++ b/series.conf
@@ -143,11 +143,11 @@
# needed reverts for various reasons (they are usually handled by
# patches farther in our series below)
- patches.kernel.org/revert-hwmon-coretemp-fix-oops-on-driver-load.patch
- patches.kernel.org/revert-removal-of-ACPI-procfs-entries.patch
- patches.kernel.org/revert-dmi_scan-changes-1.patch
- patches.kernel.org/revert-dmi_scan-changes-2.patch
- patches.kernel.org/revert-dmi_scan-changes-3.patch
+ patches.suse/revert-hwmon-coretemp-fix-oops-on-driver-load.patch
+ patches.suse/revert-removal-of-ACPI-procfs-entries.patch
+ patches.suse/revert-dmi_scan-changes-1.patch
+ patches.suse/revert-dmi_scan-changes-2.patch
+ patches.suse/revert-dmi_scan-changes-3.patch
########################################################
# Build fixes that apply to the vanilla kernel too.
@@ -22823,6 +22823,7 @@
patches.suse/powerpc-64s-Enhance-the-information-in-cpu_show_spec.patch
patches.arch/powerpc-KVM-Split-HVMODE_206-cpu-feature-bit-into-se.patch
patches.suse/powerpc-64s-Add-support-for-a-store-forwarding-barri.patch
+ patches.arch/STF-no-POWER9-support-on-SLE12-SP2.patch
########################################################
# KVM patches