diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2020-04-23 20:00:12 +0100 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2020-04-23 20:00:12 +0100 |
commit | 91d5ba0b080cfb82c31c9e8ded192c4909f57de5 (patch) | |
tree | 3400e60daedc1c5b4b66ffb3725b395c26c3a2cb /sys-kernel/linux-sources-redcore-lts-legacy/files | |
parent | f16898044470d366e9b9061e9cff05ac2668b88c (diff) |
sys-kernel/linux-{image,sources}-redcore-lts-legacy : version bump (v4.19.118)
Diffstat (limited to 'sys-kernel/linux-sources-redcore-lts-legacy/files')
2 files changed, 0 insertions, 68 deletions
diff --git a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-revert_52918ed5fcf05d97d257f4131e19479da18f5d16.patch b/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-revert_52918ed5fcf05d97d257f4131e19479da18f5d16.patch deleted file mode 100644 index a19726f3..00000000 --- a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-revert_52918ed5fcf05d97d257f4131e19479da18f5d16.patch +++ /dev/null @@ -1,60 +0,0 @@ -diff -Nur a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c ---- a/arch/x86/kvm/svm.c 2020-03-05 15:42:23.000000000 +0000 -+++ b/arch/x86/kvm/svm.c 2020-03-09 23:13:11.593860862 +0000 -@@ -1298,47 +1298,6 @@ - control->pause_filter_count, old); - } - --/* -- * The default MMIO mask is a single bit (excluding the present bit), -- * which could conflict with the memory encryption bit. Check for -- * memory encryption support and override the default MMIO mask if -- * memory encryption is enabled. -- */ --static __init void svm_adjust_mmio_mask(void) --{ -- unsigned int enc_bit, mask_bit; -- u64 msr, mask; -- -- /* If there is no memory encryption support, use existing mask */ -- if (cpuid_eax(0x80000000) < 0x8000001f) -- return; -- -- /* If memory encryption is not enabled, use existing mask */ -- rdmsrl(MSR_K8_SYSCFG, msr); -- if (!(msr & MSR_K8_SYSCFG_MEM_ENCRYPT)) -- return; -- -- enc_bit = cpuid_ebx(0x8000001f) & 0x3f; -- mask_bit = boot_cpu_data.x86_phys_bits; -- -- /* Increment the mask bit if it is the same as the encryption bit */ -- if (enc_bit == mask_bit) -- mask_bit++; -- -- /* -- * If the mask bit location is below 52, then some bits above the -- * physical addressing limit will always be reserved, so use the -- * rsvd_bits() function to generate the mask. This mask, along with -- * the present bit, will be used to generate a page fault with -- * PFER.RSV = 1. -- * -- * If the mask bit location is 52 (or above), then clear the mask. -- */ -- mask = (mask_bit < 52) ? rsvd_bits(mask_bit, 51) | PT_PRESENT_MASK : 0; -- -- kvm_mmu_set_mmio_spte_mask(mask, PT_WRITABLE_MASK | PT_USER_MASK); --} -- - static __init int svm_hardware_setup(void) - { - int cpu; -@@ -1393,8 +1352,6 @@ - } - } - -- svm_adjust_mmio_mask(); -- - for_each_possible_cpu(cpu) { - r = svm_cpu_init(cpu); - if (r) diff --git a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch b/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch index 9237058b..99ed91c7 100644 --- a/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch +++ b/sys-kernel/linux-sources-redcore-lts-legacy/files/4.19-uksm-linux-hardened.patch @@ -86,14 +86,6 @@ diff -Nur a/fs/exec.c b/fs/exec.c #include <linux/uaccess.h> #include <asm/mmu_context.h> -@@ -1382,6 +1383,7 @@ - /* An exec changes our domain. We are no longer part of the thread - group */ - current->self_exec_id++; -+ - flush_signal_handlers(current, 0); - } - EXPORT_SYMBOL(setup_new_exec); diff -Nur a/fs/proc/meminfo.c b/fs/proc/meminfo.c --- a/fs/proc/meminfo.c 2019-06-11 11:20:57.000000000 +0100 +++ b/fs/proc/meminfo.c 2019-06-19 19:34:58.729369555 +0100 |