diff options
-rw-r--r-- | .SRCINFO | 22 | ||||
-rw-r--r-- | 0003-iwlwifi-mvm-disable-TX-AMSDU-on-older-NICs.patch | 4 | ||||
-rw-r--r-- | 0004-iwlwifi-Add-support-for-SAR-South-Korea-limitation.patch | 328 | ||||
-rw-r--r-- | 0005-netfilter-nf_tables-fix-module-autoload-for-redir.patch | 27 | ||||
-rw-r--r-- | PKGBUILD | 16 | ||||
-rw-r--r-- | config | 7 |
6 files changed, 382 insertions, 22 deletions
@@ -1,5 +1,5 @@ pkgbase = linux-rc - pkgver = 5.2.2rc1 + pkgver = 5.2.3rc1 pkgrel = 1 url = https://www.kernel.org/ arch = x86_64 @@ -9,10 +9,10 @@ pkgbase = linux-rc makedepends = bc makedepends = libelf options = !strip - source = https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.2.1.tar.xz - source = https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.2.1.tar.sign - source = https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.2.2-rc1.xz - source = https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.2.2-rc1.sign + source = https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.2.2.tar.xz + source = https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.2.2.tar.sign + source = https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.2.3-rc1.xz + source = https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.2.3-rc1.sign source = config source = 60-linux.hook source = 90-linux.hook @@ -20,19 +20,23 @@ pkgbase = linux-rc source = 0001-add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by.patch source = 0002-ZEN-Add-CONFIG-for-unprivileged_userns_clone.patch source = 0003-iwlwifi-mvm-disable-TX-AMSDU-on-older-NICs.patch + source = 0004-iwlwifi-Add-support-for-SAR-South-Korea-limitation.patch + source = 0005-netfilter-nf_tables-fix-module-autoload-for-redir.patch validpgpkeys = ABAF11C65A2970B130ABE3C479BE3E4300411886 validpgpkeys = 647F28654894E3BD457199BE38DBBDC86092693E - sha256sums = 3581e84e9d63298a14c147f925cd496ebb25c5a08cf065ba63c54cdee6d86506 + sha256sums = e5d91382699391e228efae87903ffeeac39b9e694ee3cf32970c87d28e516d9c sha256sums = SKIP - sha256sums = ff034a839b59c2f1fb654b001a5fff1c205abc189112643bb77f71e8d506e271 + sha256sums = e49127b19d649da396fe4766c49ec55386c14e1878f0ed946325f9aceff46798 sha256sums = SKIP - sha256sums = 5dc432031db0b2b6640f0d4eab6c824594106dde9f44d1e5b979978109d13f0d + sha256sums = c405c700b2cb06c4ec805b7e327d0b66416395995519281194a8293da69b398a sha256sums = ae2e95db94ef7176207c690224169594d49445e04249d2499e9d2fbc117a0b21 sha256sums = c043f3033bb781e2688794a59f6d1f7ed49ef9b13eb77ff9a425df33a244a636 sha256sums = ad6344badc91ad0630caacde83f7f9b97276f80d26a20619a87952be65492c65 sha256sums = 702840a04a8f08bec4688865ae41303dfc9f8c173c8dc10bfa4ffe12fce562a5 sha256sums = 187fa8d9a6c5777a8930dcecfafdd9d6e9095d4bf96ec060e756fb7c6a88b74d - sha256sums = fc96300831506965383ef30bc46b72735dc45bb97dea2ccb8b9450c005d2f020 + sha256sums = e2c9c31219cedbb4a279b59940239b4b5df0a1a2757d8b0299d376e74e0f6fb9 + sha256sums = b1dae3c4a169f4809eec40eae06222e7c663878c2343189aea45b99db74cba6d + sha256sums = e6e912c6b014b4f622b4ed8005d46bffda19e260b357c7cb912c6283986c47ef pkgname = linux-rc pkgdesc = The release candidate kernel and modules diff --git a/0003-iwlwifi-mvm-disable-TX-AMSDU-on-older-NICs.patch b/0003-iwlwifi-mvm-disable-TX-AMSDU-on-older-NICs.patch index 59d743deccaa..677bacc9fe71 100644 --- a/0003-iwlwifi-mvm-disable-TX-AMSDU-on-older-NICs.patch +++ b/0003-iwlwifi-mvm-disable-TX-AMSDU-on-older-NICs.patch @@ -1,7 +1,7 @@ -From f6f6b798c7330d7851fee4bbe835c3954886fc3f Mon Sep 17 00:00:00 2001 +From d426d34276c9f17081179be6497cddd74154556a Mon Sep 17 00:00:00 2001 From: Johannes Berg <johannes.berg@intel.com> Date: Wed, 3 Jul 2019 11:10:49 +0300 -Subject: [PATCH 3/4] iwlwifi: mvm: disable TX-AMSDU on older NICs +Subject: [PATCH 3/6] iwlwifi: mvm: disable TX-AMSDU on older NICs On older NICs, we occasionally see issues with A-MSDU support, where the commands in the FIFO get confused and then we see an diff --git a/0004-iwlwifi-Add-support-for-SAR-South-Korea-limitation.patch b/0004-iwlwifi-Add-support-for-SAR-South-Korea-limitation.patch new file mode 100644 index 000000000000..bc0ab25763d5 --- /dev/null +++ b/0004-iwlwifi-Add-support-for-SAR-South-Korea-limitation.patch @@ -0,0 +1,328 @@ +From 8dcd32438c96b8099b6447712148a4e4a06c78a7 Mon Sep 17 00:00:00 2001 +From: Haim Dreyfuss <haim.dreyfuss@intel.com> +Date: Wed, 27 Feb 2019 16:43:45 +0200 +Subject: [PATCH 4/6] iwlwifi: Add support for SAR South Korea limitation + +South Korea is adding a more strict SAR limit called "Limb SAR". +Currently, WGDS SAR offset group 3 is not used (not mapped to any country). +In order to be able to comply with South Korea new restriction: +- OEM will use WGDS SAR offset group 3 to South Korea limitation. +- OEM will change WGDS revision to 1 (currently latest revision is 0) + to notify that Korea Limb SAR applied. +- Driver will read the WGDS table and pass the values to FW (as usual) +- Driver will pass to FW an indication that Korea Limb SAR is applied + in case table revision is 1. + +Signed-off-by: Haim Dreyfuss <haim.dreyfuss@intel.com> +Signed-off-by: Luca Coelho <luciano.coelho@intel.com> +--- + drivers/net/wireless/intel/iwlwifi/fw/acpi.c | 28 ++++++---- + drivers/net/wireless/intel/iwlwifi/fw/acpi.h | 5 +- + .../net/wireless/intel/iwlwifi/fw/api/power.h | 12 ++++ + drivers/net/wireless/intel/iwlwifi/fw/file.h | 3 + + drivers/net/wireless/intel/iwlwifi/mvm/fw.c | 55 ++++++++++++++----- + drivers/net/wireless/intel/iwlwifi/mvm/mvm.h | 1 + + 6 files changed, 76 insertions(+), 28 deletions(-) + +diff --git a/drivers/net/wireless/intel/iwlwifi/fw/acpi.c b/drivers/net/wireless/intel/iwlwifi/fw/acpi.c +index 405038ce98d6..7573af2d88ce 100644 +--- a/drivers/net/wireless/intel/iwlwifi/fw/acpi.c ++++ b/drivers/net/wireless/intel/iwlwifi/fw/acpi.c +@@ -97,7 +97,7 @@ IWL_EXPORT_SYMBOL(iwl_acpi_get_object); + + union acpi_object *iwl_acpi_get_wifi_pkg(struct device *dev, + union acpi_object *data, +- int data_size) ++ int data_size, int *tbl_rev) + { + int i; + union acpi_object *wifi_pkg; +@@ -113,16 +113,19 @@ union acpi_object *iwl_acpi_get_wifi_pkg(struct device *dev, + /* + * We need at least two packages, one for the revision and one + * for the data itself. Also check that the revision is valid +- * (i.e. it is an integer set to 0). ++ * (i.e. it is an integer smaller than 2, as we currently support only ++ * 2 revisions). + */ + if (data->type != ACPI_TYPE_PACKAGE || + data->package.count < 2 || + data->package.elements[0].type != ACPI_TYPE_INTEGER || +- data->package.elements[0].integer.value != 0) { ++ data->package.elements[0].integer.value > 1) { + IWL_DEBUG_DEV_RADIO(dev, "Unsupported packages structure\n"); + return ERR_PTR(-EINVAL); + } + ++ *tbl_rev = data->package.elements[0].integer.value; ++ + /* loop through all the packages to find the one for WiFi */ + for (i = 1; i < data->package.count; i++) { + union acpi_object *domain; +@@ -151,14 +154,15 @@ int iwl_acpi_get_mcc(struct device *dev, char *mcc) + { + union acpi_object *wifi_pkg, *data; + u32 mcc_val; +- int ret; ++ int ret, tbl_rev; + + data = iwl_acpi_get_object(dev, ACPI_WRDD_METHOD); + if (IS_ERR(data)) + return PTR_ERR(data); + +- wifi_pkg = iwl_acpi_get_wifi_pkg(dev, data, ACPI_WRDD_WIFI_DATA_SIZE); +- if (IS_ERR(wifi_pkg)) { ++ wifi_pkg = iwl_acpi_get_wifi_pkg(dev, data, ACPI_WRDD_WIFI_DATA_SIZE, ++ &tbl_rev); ++ if (IS_ERR(wifi_pkg) || tbl_rev != 0) { + ret = PTR_ERR(wifi_pkg); + goto out_free; + } +@@ -185,6 +189,7 @@ u64 iwl_acpi_get_pwr_limit(struct device *dev) + { + union acpi_object *data, *wifi_pkg; + u64 dflt_pwr_limit; ++ int tbl_rev; + + data = iwl_acpi_get_object(dev, ACPI_SPLC_METHOD); + if (IS_ERR(data)) { +@@ -193,8 +198,8 @@ u64 iwl_acpi_get_pwr_limit(struct device *dev) + } + + wifi_pkg = iwl_acpi_get_wifi_pkg(dev, data, +- ACPI_SPLC_WIFI_DATA_SIZE); +- if (IS_ERR(wifi_pkg) || ++ ACPI_SPLC_WIFI_DATA_SIZE, &tbl_rev); ++ if (IS_ERR(wifi_pkg) || tbl_rev != 0 || + wifi_pkg->package.elements[1].integer.value != ACPI_TYPE_INTEGER) { + dflt_pwr_limit = 0; + goto out_free; +@@ -211,14 +216,15 @@ IWL_EXPORT_SYMBOL(iwl_acpi_get_pwr_limit); + int iwl_acpi_get_eckv(struct device *dev, u32 *extl_clk) + { + union acpi_object *wifi_pkg, *data; +- int ret; ++ int ret, tbl_rev; + + data = iwl_acpi_get_object(dev, ACPI_ECKV_METHOD); + if (IS_ERR(data)) + return PTR_ERR(data); + +- wifi_pkg = iwl_acpi_get_wifi_pkg(dev, data, ACPI_ECKV_WIFI_DATA_SIZE); +- if (IS_ERR(wifi_pkg)) { ++ wifi_pkg = iwl_acpi_get_wifi_pkg(dev, data, ACPI_ECKV_WIFI_DATA_SIZE, ++ &tbl_rev); ++ if (IS_ERR(wifi_pkg) || tbl_rev != 0) { + ret = PTR_ERR(wifi_pkg); + goto out_free; + } +diff --git a/drivers/net/wireless/intel/iwlwifi/fw/acpi.h b/drivers/net/wireless/intel/iwlwifi/fw/acpi.h +index f5704e16643f..991a23450999 100644 +--- a/drivers/net/wireless/intel/iwlwifi/fw/acpi.h ++++ b/drivers/net/wireless/intel/iwlwifi/fw/acpi.h +@@ -97,7 +97,7 @@ + void *iwl_acpi_get_object(struct device *dev, acpi_string method); + union acpi_object *iwl_acpi_get_wifi_pkg(struct device *dev, + union acpi_object *data, +- int data_size); ++ int data_size, int *tbl_rev); + + /** + * iwl_acpi_get_mcc - read MCC from ACPI, if available +@@ -131,7 +131,8 @@ static inline void *iwl_acpi_get_object(struct device *dev, acpi_string method) + + static inline union acpi_object *iwl_acpi_get_wifi_pkg(struct device *dev, + union acpi_object *data, +- int data_size) ++ int data_size, ++ int *tbl_rev) + { + return ERR_PTR(-ENOENT); + } +diff --git a/drivers/net/wireless/intel/iwlwifi/fw/api/power.h b/drivers/net/wireless/intel/iwlwifi/fw/api/power.h +index 01f003c6cff9..f195db398bed 100644 +--- a/drivers/net/wireless/intel/iwlwifi/fw/api/power.h ++++ b/drivers/net/wireless/intel/iwlwifi/fw/api/power.h +@@ -419,14 +419,26 @@ struct iwl_per_chain_offset_group { + struct iwl_per_chain_offset hb; + } __packed; /* PER_CHAIN_LIMIT_OFFSET_GROUP_S_VER_1 */ + ++/** ++ * struct iwl_geo_tx_power_profile_cmd_v1 - struct for GEO_TX_POWER_LIMIT cmd. ++ * @ops: operations, value from &enum iwl_geo_per_chain_offset_operation ++ * @table: offset profile per band. ++ */ ++struct iwl_geo_tx_power_profiles_cmd_v1 { ++ __le32 ops; ++ struct iwl_per_chain_offset_group table[IWL_NUM_GEO_PROFILES]; ++} __packed; /* GEO_TX_POWER_LIMIT_VER_1 */ ++ + /** + * struct iwl_geo_tx_power_profile_cmd - struct for GEO_TX_POWER_LIMIT cmd. + * @ops: operations, value from &enum iwl_geo_per_chain_offset_operation + * @table: offset profile per band. ++ * @table_revision: BIOS table revision. + */ + struct iwl_geo_tx_power_profiles_cmd { + __le32 ops; + struct iwl_per_chain_offset_group table[IWL_NUM_GEO_PROFILES]; ++ __le32 table_revision; + } __packed; /* GEO_TX_POWER_LIMIT */ + + /** +diff --git a/drivers/net/wireless/intel/iwlwifi/fw/file.h b/drivers/net/wireless/intel/iwlwifi/fw/file.h +index de9243d30135..a74f34a8dffb 100644 +--- a/drivers/net/wireless/intel/iwlwifi/fw/file.h ++++ b/drivers/net/wireless/intel/iwlwifi/fw/file.h +@@ -286,6 +286,8 @@ typedef unsigned int __bitwise iwl_ucode_tlv_api_t; + * SCAN_OFFLOAD_PROFILES_QUERY_RSP_S. + * @IWL_UCODE_TLV_API_MBSSID_HE: This ucode supports v2 of + * STA_CONTEXT_DOT11AX_API_S ++ * @IWL_UCODE_TLV_CAPA_SAR_TABLE_VER: This ucode supports different sar ++ * version tables. + * + * @NUM_IWL_UCODE_TLV_API: number of bits used + */ +@@ -318,6 +320,7 @@ enum iwl_ucode_tlv_api { + IWL_UCODE_TLV_API_MBSSID_HE = (__force iwl_ucode_tlv_api_t)52, + IWL_UCODE_TLV_API_WOWLAN_TCP_SYN_WAKE = (__force iwl_ucode_tlv_api_t)53, + IWL_UCODE_TLV_API_FTM_RTT_ACCURACY = (__force iwl_ucode_tlv_api_t)54, ++ IWL_UCODE_TLV_API_SAR_TABLE_VER = (__force iwl_ucode_tlv_api_t)55, + + NUM_IWL_UCODE_TLV_API + #ifdef __CHECKER__ +diff --git a/drivers/net/wireless/intel/iwlwifi/mvm/fw.c b/drivers/net/wireless/intel/iwlwifi/mvm/fw.c +index 153717587aeb..36c260f8ed00 100644 +--- a/drivers/net/wireless/intel/iwlwifi/mvm/fw.c ++++ b/drivers/net/wireless/intel/iwlwifi/mvm/fw.c +@@ -681,15 +681,15 @@ static int iwl_mvm_sar_get_wrds_table(struct iwl_mvm *mvm) + { + union acpi_object *wifi_pkg, *table, *data; + bool enabled; +- int ret; ++ int ret, tbl_rev; + + data = iwl_acpi_get_object(mvm->dev, ACPI_WRDS_METHOD); + if (IS_ERR(data)) + return PTR_ERR(data); + + wifi_pkg = iwl_acpi_get_wifi_pkg(mvm->dev, data, +- ACPI_WRDS_WIFI_DATA_SIZE); +- if (IS_ERR(wifi_pkg)) { ++ ACPI_WRDS_WIFI_DATA_SIZE, &tbl_rev); ++ if (IS_ERR(wifi_pkg) || tbl_rev != 0) { + ret = PTR_ERR(wifi_pkg); + goto out_free; + } +@@ -718,15 +718,15 @@ static int iwl_mvm_sar_get_ewrd_table(struct iwl_mvm *mvm) + { + union acpi_object *wifi_pkg, *data; + bool enabled; +- int i, n_profiles, ret; ++ int i, n_profiles, ret, tbl_rev; + + data = iwl_acpi_get_object(mvm->dev, ACPI_EWRD_METHOD); + if (IS_ERR(data)) + return PTR_ERR(data); + + wifi_pkg = iwl_acpi_get_wifi_pkg(mvm->dev, data, +- ACPI_EWRD_WIFI_DATA_SIZE); +- if (IS_ERR(wifi_pkg)) { ++ ACPI_EWRD_WIFI_DATA_SIZE, &tbl_rev); ++ if (IS_ERR(wifi_pkg) || tbl_rev != 0) { + ret = PTR_ERR(wifi_pkg); + goto out_free; + } +@@ -777,7 +777,7 @@ static int iwl_mvm_sar_get_ewrd_table(struct iwl_mvm *mvm) + static int iwl_mvm_sar_get_wgds_table(struct iwl_mvm *mvm) + { + union acpi_object *wifi_pkg, *data; +- int i, j, ret; ++ int i, j, ret, tbl_rev; + int idx = 1; + + data = iwl_acpi_get_object(mvm->dev, ACPI_WGDS_METHOD); +@@ -785,12 +785,13 @@ static int iwl_mvm_sar_get_wgds_table(struct iwl_mvm *mvm) + return PTR_ERR(data); + + wifi_pkg = iwl_acpi_get_wifi_pkg(mvm->dev, data, +- ACPI_WGDS_WIFI_DATA_SIZE); +- if (IS_ERR(wifi_pkg)) { ++ ACPI_WGDS_WIFI_DATA_SIZE, &tbl_rev); ++ if (IS_ERR(wifi_pkg) || tbl_rev > 1) { + ret = PTR_ERR(wifi_pkg); + goto out_free; + } + ++ mvm->geo_rev = tbl_rev; + for (i = 0; i < ACPI_NUM_GEO_PROFILES; i++) { + for (j = 0; j < ACPI_GEO_TABLE_SIZE; j++) { + union acpi_object *entry; +@@ -877,15 +878,29 @@ int iwl_mvm_get_sar_geo_profile(struct iwl_mvm *mvm) + { + struct iwl_geo_tx_power_profiles_resp *resp; + int ret; ++ u16 len; ++ void *data; ++ struct iwl_geo_tx_power_profiles_cmd geo_cmd; ++ struct iwl_geo_tx_power_profiles_cmd_v1 geo_cmd_v1; ++ struct iwl_host_cmd cmd; ++ ++ if (fw_has_api(&mvm->fw->ucode_capa, IWL_UCODE_TLV_API_SAR_TABLE_VER)) { ++ geo_cmd.ops = ++ cpu_to_le32(IWL_PER_CHAIN_OFFSET_GET_CURRENT_TABLE); ++ len = sizeof(geo_cmd); ++ data = &geo_cmd; ++ } else { ++ geo_cmd_v1.ops = ++ cpu_to_le32(IWL_PER_CHAIN_OFFSET_GET_CURRENT_TABLE); ++ len = sizeof(geo_cmd_v1); ++ data = &geo_cmd_v1; ++ } + +- struct iwl_geo_tx_power_profiles_cmd geo_cmd = { +- .ops = cpu_to_le32(IWL_PER_CHAIN_OFFSET_GET_CURRENT_TABLE), +- }; +- struct iwl_host_cmd cmd = { ++ cmd = (struct iwl_host_cmd){ + .id = WIDE_ID(PHY_OPS_GROUP, GEO_TX_POWER_LIMIT), +- .len = { sizeof(geo_cmd), }, ++ .len = { len, }, + .flags = CMD_WANT_SKB, +- .data = { &geo_cmd }, ++ .data = { data }, + }; + + ret = iwl_mvm_send_cmd(mvm, &cmd); +@@ -955,6 +970,16 @@ static int iwl_mvm_sar_geo_init(struct iwl_mvm *mvm) + i, j, value[1], value[2], value[0]); + } + } ++ ++ cmd.table_revision = cpu_to_le32(mvm->geo_rev); ++ ++ if (!fw_has_api(&mvm->fw->ucode_capa, ++ IWL_UCODE_TLV_API_SAR_TABLE_VER)) { ++ return iwl_mvm_send_cmd_pdu(mvm, cmd_wide_id, 0, ++ sizeof(struct iwl_geo_tx_power_profiles_cmd_v1), ++ &cmd); ++ } ++ + return iwl_mvm_send_cmd_pdu(mvm, cmd_wide_id, 0, sizeof(cmd), &cmd); + } + +diff --git a/drivers/net/wireless/intel/iwlwifi/mvm/mvm.h b/drivers/net/wireless/intel/iwlwifi/mvm/mvm.h +index 02efcf2189c4..5c34e405173b 100644 +--- a/drivers/net/wireless/intel/iwlwifi/mvm/mvm.h ++++ b/drivers/net/wireless/intel/iwlwifi/mvm/mvm.h +@@ -1181,6 +1181,7 @@ struct iwl_mvm { + #ifdef CONFIG_ACPI + struct iwl_mvm_sar_profile sar_profiles[ACPI_SAR_PROFILE_NUM]; + struct iwl_mvm_geo_profile geo_profiles[ACPI_NUM_GEO_PROFILES]; ++ u32 geo_rev; + #endif + }; + +-- +2.22.0 + diff --git a/0005-netfilter-nf_tables-fix-module-autoload-for-redir.patch b/0005-netfilter-nf_tables-fix-module-autoload-for-redir.patch new file mode 100644 index 000000000000..d424ed697e28 --- /dev/null +++ b/0005-netfilter-nf_tables-fix-module-autoload-for-redir.patch @@ -0,0 +1,27 @@ +From 164647d76a17d87a33440e6149b616eeed34970f Mon Sep 17 00:00:00 2001 +From: Christian Hesse <mail@eworm.de> +Date: Thu, 11 Jul 2019 01:31:12 +0200 +Subject: [PATCH 5/6] netfilter: nf_tables: fix module autoload for redir + +Fix expression for autoloading. + +Fixes: 5142967ab524 ("netfilter: nf_tables: fix module autoload with inet family") +Signed-off-by: Christian Hesse <mail@eworm.de> +Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> +--- + net/netfilter/nft_redir.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/net/netfilter/nft_redir.c b/net/netfilter/nft_redir.c +index 8487eeff5c0e..43eeb1f609f1 100644 +--- a/net/netfilter/nft_redir.c ++++ b/net/netfilter/nft_redir.c +@@ -291,4 +291,4 @@ module_exit(nft_redir_module_exit); + + MODULE_LICENSE("GPL"); + MODULE_AUTHOR("Arturo Borrero Gonzalez <arturo@debian.org>"); +-MODULE_ALIAS_NFT_EXPR("nat"); ++MODULE_ALIAS_NFT_EXPR("redir"); +-- +2.22.0 + @@ -5,8 +5,8 @@ pkgbase=linux-rc pkgrel=1 _srcname=linux-5.2 -_stable=5.2.1 -_patchver=5.2.2 +_stable=5.2.2 +_patchver=5.2.3 _rcver=1 pkgver=${_patchver}rc${_rcver} _rcpatch=patch-${_patchver}-rc${_rcver} @@ -25,23 +25,27 @@ source=( 0001-add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by.patch 0002-ZEN-Add-CONFIG-for-unprivileged_userns_clone.patch 0003-iwlwifi-mvm-disable-TX-AMSDU-on-older-NICs.patch + 0004-iwlwifi-Add-support-for-SAR-South-Korea-limitation.patch + 0005-netfilter-nf_tables-fix-module-autoload-for-redir.patch # Arch-Linux-kernel-vx.xx.x-arch1.patch is not needed for rc1 ) validpgpkeys=( 'ABAF11C65A2970B130ABE3C479BE3E4300411886' # Linus Torvalds '647F28654894E3BD457199BE38DBBDC86092693E' # Greg Kroah-Hartman ) -sha256sums=('3581e84e9d63298a14c147f925cd496ebb25c5a08cf065ba63c54cdee6d86506' +sha256sums=('e5d91382699391e228efae87903ffeeac39b9e694ee3cf32970c87d28e516d9c' 'SKIP' - 'ff034a839b59c2f1fb654b001a5fff1c205abc189112643bb77f71e8d506e271' + 'e49127b19d649da396fe4766c49ec55386c14e1878f0ed946325f9aceff46798' 'SKIP' - '5dc432031db0b2b6640f0d4eab6c824594106dde9f44d1e5b979978109d13f0d' + 'c405c700b2cb06c4ec805b7e327d0b66416395995519281194a8293da69b398a' 'ae2e95db94ef7176207c690224169594d49445e04249d2499e9d2fbc117a0b21' 'c043f3033bb781e2688794a59f6d1f7ed49ef9b13eb77ff9a425df33a244a636' 'ad6344badc91ad0630caacde83f7f9b97276f80d26a20619a87952be65492c65' '702840a04a8f08bec4688865ae41303dfc9f8c173c8dc10bfa4ffe12fce562a5' '187fa8d9a6c5777a8930dcecfafdd9d6e9095d4bf96ec060e756fb7c6a88b74d' - 'fc96300831506965383ef30bc46b72735dc45bb97dea2ccb8b9450c005d2f020') + 'e2c9c31219cedbb4a279b59940239b4b5df0a1a2757d8b0299d376e74e0f6fb9' + 'b1dae3c4a169f4809eec40eae06222e7c663878c2343189aea45b99db74cba6d' + 'e6e912c6b014b4f622b4ed8005d46bffda19e260b357c7cb912c6283986c47ef') _kernelname=${pkgbase#linux} @@ -1,6 +1,6 @@ # # Automatically generated file; DO NOT EDIT. -# Linux/x86 5.2.0-arch2 Kernel Configuration +# Linux/x86 5.2.2-arch1 Kernel Configuration # # @@ -9741,10 +9741,7 @@ CONFIG_GCC_PLUGIN_STRUCTLEAK=y # CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF is not set CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL=y # CONFIG_GCC_PLUGIN_STRUCTLEAK_VERBOSE is not set -CONFIG_GCC_PLUGIN_STACKLEAK=y -CONFIG_STACKLEAK_TRACK_MIN_SIZE=100 -CONFIG_STACKLEAK_METRICS=y -CONFIG_STACKLEAK_RUNTIME_DISABLE=y +# CONFIG_GCC_PLUGIN_STACKLEAK is not set # end of Memory initialization # end of Kernel hardening options # end of Security options |