forked from AUR/linux-vfio
		
	4.2-3
This commit is contained in:
		
							
								
								
									
										10
									
								
								.SRCINFO
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								.SRCINFO
									
									
									
									
									
								
							@@ -1,6 +1,6 @@
 | 
			
		||||
pkgbase = linux-vfio
 | 
			
		||||
	pkgver = 4.2
 | 
			
		||||
	pkgrel = 2
 | 
			
		||||
	pkgrel = 3
 | 
			
		||||
	url = http://www.kernel.org/
 | 
			
		||||
	arch = i686
 | 
			
		||||
	arch = x86_64
 | 
			
		||||
@@ -18,15 +18,19 @@ pkgbase = linux-vfio
 | 
			
		||||
	source = linux.preset
 | 
			
		||||
	source = change-default-console-loglevel.patch
 | 
			
		||||
	source = 0001-make_flush_workqueue_non_gpl.patch
 | 
			
		||||
	source = 0001-e1000e-Fix-tight-loop-implementation-of-systime-read.patch
 | 
			
		||||
	source = 0001-netfilter-conntrack-use-nf_ct_tmpl_free-in-CT-synpro.patch
 | 
			
		||||
	source = override_for_missing_acs_capabilities.patch
 | 
			
		||||
	source = i915_317.patch
 | 
			
		||||
	sha256sums = cf20e044f17588d2a42c8f2a450b0fd84dfdbd579b489d93e9ab7d0e8b45dbeb
 | 
			
		||||
	sha256sums = SKIP
 | 
			
		||||
	sha256sums = b46d8a8166487cf0dcdbcc0c0a5111aba950c49749a4761e1dce78f220704079
 | 
			
		||||
	sha256sums = e54800217ad6c61efa80d6ab223364cb0c2d6030061bc48d3f83fd971ae675f9
 | 
			
		||||
	sha256sums = e6f6f804f98ad321ce3e4395924993b51decb89699fde369391ccbb4bae928b2
 | 
			
		||||
	sha256sums = a071aaa327d2b3577fa4709b47ed5fe81c7914d168607f3db905fdbf226247e7
 | 
			
		||||
	sha256sums = f0d90e756f14533ee67afda280500511a62465b4f76adcc5effa95a40045179c
 | 
			
		||||
	sha256sums = 1256b241cd477b265a3c2d64bdc19ffe3c9bbcee82ea3994c590c2c76e767d99
 | 
			
		||||
	sha256sums = 4e776734e2c2185910a6fbb6f333d967b04f4a72b3196310af286c6a779bd97d
 | 
			
		||||
	sha256sums = 0b1e41ba59ae45f5929963aa22fdc53bc8ffb4534e976cec046269d1a462197b
 | 
			
		||||
	sha256sums = 6ed9e31ae5614c289c4884620e45698e764c03670ebc45bab9319d741238cbd3
 | 
			
		||||
	sha256sums = 975f79348119bfba8dd972a9fbfe6b38484c45bfd228f2f6d48a0c02426ba149
 | 
			
		||||
	sha256sums = 65faab45248008810b0a5f27162101a34dfe298c14d3506e52236c680353d7f8
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -0,0 +1,65 @@
 | 
			
		||||
From 37b12910dd11d9ab969f2c310dc9160b7f3e3405 Mon Sep 17 00:00:00 2001
 | 
			
		||||
From: Raanan Avargil <raanan.avargil@intel.com>
 | 
			
		||||
Date: Sun, 19 Jul 2015 16:33:20 +0300
 | 
			
		||||
Subject: [PATCH] e1000e: Fix tight loop implementation of systime read
 | 
			
		||||
 algorithm
 | 
			
		||||
 | 
			
		||||
Change the algorithm. Read systimel twice and check for overflow.
 | 
			
		||||
If there was no overflow, use the first value.
 | 
			
		||||
If there was an overflow, read systimeh again and use the second
 | 
			
		||||
systimel value.
 | 
			
		||||
 | 
			
		||||
Signed-off-by: Raanan Avargil <raanan.avargil@intel.com>
 | 
			
		||||
Tested-by: Aaron Brown <aaron.f.brown@intel.com>
 | 
			
		||||
Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
 | 
			
		||||
---
 | 
			
		||||
 drivers/net/ethernet/intel/e1000e/netdev.c | 31 ++++++++++++++++++++----------
 | 
			
		||||
 1 file changed, 21 insertions(+), 10 deletions(-)
 | 
			
		||||
 | 
			
		||||
diff --git a/drivers/net/ethernet/intel/e1000e/netdev.c b/drivers/net/ethernet/intel/e1000e/netdev.c
 | 
			
		||||
index 24b7269..96a8166 100644
 | 
			
		||||
--- a/drivers/net/ethernet/intel/e1000e/netdev.c
 | 
			
		||||
+++ b/drivers/net/ethernet/intel/e1000e/netdev.c
 | 
			
		||||
@@ -4280,18 +4280,29 @@ static cycle_t e1000e_cyclecounter_read(const struct cyclecounter *cc)
 | 
			
		||||
 	struct e1000_adapter *adapter = container_of(cc, struct e1000_adapter,
 | 
			
		||||
 						     cc);
 | 
			
		||||
 	struct e1000_hw *hw = &adapter->hw;
 | 
			
		||||
+	u32 systimel_1, systimel_2, systimeh;
 | 
			
		||||
 	cycle_t systim, systim_next;
 | 
			
		||||
-	/* SYSTIMH latching upon SYSTIML read does not work well. To fix that
 | 
			
		||||
-	 * we don't want to allow overflow of SYSTIML and a change to SYSTIMH
 | 
			
		||||
-	 * to occur between reads, so if we read a vale close to overflow, we
 | 
			
		||||
-	 * wait for overflow to occur and read both registers when its safe.
 | 
			
		||||
+	/* SYSTIMH latching upon SYSTIML read does not work well.
 | 
			
		||||
+	 * This means that if SYSTIML overflows after we read it but before
 | 
			
		||||
+	 * we read SYSTIMH, the value of SYSTIMH has been incremented and we
 | 
			
		||||
+	 * will experience a huge non linear increment in the systime value
 | 
			
		||||
+	 * to fix that we test for overflow and if true, we re-read systime.
 | 
			
		||||
 	 */
 | 
			
		||||
-	u32 systim_overflow_latch_fix = 0x3FFFFFFF;
 | 
			
		||||
-
 | 
			
		||||
-	do {
 | 
			
		||||
-		systim = (cycle_t)er32(SYSTIML);
 | 
			
		||||
-	} while (systim > systim_overflow_latch_fix);
 | 
			
		||||
-	systim |= (cycle_t)er32(SYSTIMH) << 32;
 | 
			
		||||
+	systimel_1 = er32(SYSTIML);
 | 
			
		||||
+	systimeh = er32(SYSTIMH);
 | 
			
		||||
+	systimel_2 = er32(SYSTIML);
 | 
			
		||||
+	/* Check for overflow. If there was no overflow, use the values */
 | 
			
		||||
+	if (systimel_1 < systimel_2) {
 | 
			
		||||
+		systim = (cycle_t)systimel_1;
 | 
			
		||||
+		systim |= (cycle_t)systimeh << 32;
 | 
			
		||||
+	} else {
 | 
			
		||||
+		/* There was an overflow, read again SYSTIMH, and use
 | 
			
		||||
+		 * systimel_2
 | 
			
		||||
+		 */
 | 
			
		||||
+		systimeh = er32(SYSTIMH);
 | 
			
		||||
+		systim = (cycle_t)systimel_2;
 | 
			
		||||
+		systim |= (cycle_t)systimeh << 32;
 | 
			
		||||
+	}
 | 
			
		||||
 
 | 
			
		||||
 	if ((hw->mac.type == e1000_82574) || (hw->mac.type == e1000_82583)) {
 | 
			
		||||
 		u64 incvalue, time_delta, rem, temp;
 | 
			
		||||
-- 
 | 
			
		||||
2.5.1
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										103
									
								
								0001-netfilter-conntrack-use-nf_ct_tmpl_free-in-CT-synpro.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										103
									
								
								0001-netfilter-conntrack-use-nf_ct_tmpl_free-in-CT-synpro.patch
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,103 @@
 | 
			
		||||
From 9cf94eab8b309e8bcc78b41dd1561c75b537dd0b Mon Sep 17 00:00:00 2001
 | 
			
		||||
From: Daniel Borkmann <daniel@iogearbox.net>
 | 
			
		||||
Date: Mon, 31 Aug 2015 19:11:02 +0200
 | 
			
		||||
Subject: [PATCH] netfilter: conntrack: use nf_ct_tmpl_free in CT/synproxy
 | 
			
		||||
 error paths
 | 
			
		||||
 | 
			
		||||
Commit 0838aa7fcfcd ("netfilter: fix netns dependencies with conntrack
 | 
			
		||||
templates") migrated templates to the new allocator api, but forgot to
 | 
			
		||||
update error paths for them in CT and synproxy to use nf_ct_tmpl_free()
 | 
			
		||||
instead of nf_conntrack_free().
 | 
			
		||||
 | 
			
		||||
Due to that, memory is being freed into the wrong kmemcache, but also
 | 
			
		||||
we drop the per net reference count of ct objects causing an imbalance.
 | 
			
		||||
 | 
			
		||||
In Brad's case, this leads to a wrap-around of net->ct.count and thus
 | 
			
		||||
lets __nf_conntrack_alloc() refuse to create a new ct object:
 | 
			
		||||
 | 
			
		||||
  [   10.340913] xt_addrtype: ipv6 does not support BROADCAST matching
 | 
			
		||||
  [   10.810168] nf_conntrack: table full, dropping packet
 | 
			
		||||
  [   11.917416] r8169 0000:07:00.0 eth0: link up
 | 
			
		||||
  [   11.917438] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
 | 
			
		||||
  [   12.815902] nf_conntrack: table full, dropping packet
 | 
			
		||||
  [   15.688561] nf_conntrack: table full, dropping packet
 | 
			
		||||
  [   15.689365] nf_conntrack: table full, dropping packet
 | 
			
		||||
  [   15.690169] nf_conntrack: table full, dropping packet
 | 
			
		||||
  [   15.690967] nf_conntrack: table full, dropping packet
 | 
			
		||||
  [...]
 | 
			
		||||
 | 
			
		||||
With slab debugging, it also reports the wrong kmemcache (kmalloc-512 vs.
 | 
			
		||||
nf_conntrack_ffffffff81ce75c0) and reports poison overwrites, etc. Thus,
 | 
			
		||||
to fix the problem, export and use nf_ct_tmpl_free() instead.
 | 
			
		||||
 | 
			
		||||
Fixes: 0838aa7fcfcd ("netfilter: fix netns dependencies with conntrack templates")
 | 
			
		||||
Reported-by: Brad Jackson <bjackson0971@gmail.com>
 | 
			
		||||
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
 | 
			
		||||
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
 | 
			
		||||
---
 | 
			
		||||
 include/net/netfilter/nf_conntrack.h | 1 +
 | 
			
		||||
 net/netfilter/nf_conntrack_core.c    | 3 ++-
 | 
			
		||||
 net/netfilter/nf_synproxy_core.c     | 2 +-
 | 
			
		||||
 net/netfilter/xt_CT.c                | 2 +-
 | 
			
		||||
 4 files changed, 5 insertions(+), 3 deletions(-)
 | 
			
		||||
 | 
			
		||||
diff --git a/include/net/netfilter/nf_conntrack.h b/include/net/netfilter/nf_conntrack.h
 | 
			
		||||
index 37cd391..4023c4c 100644
 | 
			
		||||
--- a/include/net/netfilter/nf_conntrack.h
 | 
			
		||||
+++ b/include/net/netfilter/nf_conntrack.h
 | 
			
		||||
@@ -292,6 +292,7 @@ extern unsigned int nf_conntrack_hash_rnd;
 | 
			
		||||
 void init_nf_conntrack_hash_rnd(void);
 | 
			
		||||
 
 | 
			
		||||
 struct nf_conn *nf_ct_tmpl_alloc(struct net *net, u16 zone, gfp_t flags);
 | 
			
		||||
+void nf_ct_tmpl_free(struct nf_conn *tmpl);
 | 
			
		||||
 
 | 
			
		||||
 #define NF_CT_STAT_INC(net, count)	  __this_cpu_inc((net)->ct.stat->count)
 | 
			
		||||
 #define NF_CT_STAT_INC_ATOMIC(net, count) this_cpu_inc((net)->ct.stat->count)
 | 
			
		||||
diff --git a/net/netfilter/nf_conntrack_core.c b/net/netfilter/nf_conntrack_core.c
 | 
			
		||||
index 3c20d02..0625a42 100644
 | 
			
		||||
--- a/net/netfilter/nf_conntrack_core.c
 | 
			
		||||
+++ b/net/netfilter/nf_conntrack_core.c
 | 
			
		||||
@@ -320,12 +320,13 @@ out_free:
 | 
			
		||||
 }
 | 
			
		||||
 EXPORT_SYMBOL_GPL(nf_ct_tmpl_alloc);
 | 
			
		||||
 
 | 
			
		||||
-static void nf_ct_tmpl_free(struct nf_conn *tmpl)
 | 
			
		||||
+void nf_ct_tmpl_free(struct nf_conn *tmpl)
 | 
			
		||||
 {
 | 
			
		||||
 	nf_ct_ext_destroy(tmpl);
 | 
			
		||||
 	nf_ct_ext_free(tmpl);
 | 
			
		||||
 	kfree(tmpl);
 | 
			
		||||
 }
 | 
			
		||||
+EXPORT_SYMBOL_GPL(nf_ct_tmpl_free);
 | 
			
		||||
 
 | 
			
		||||
 static void
 | 
			
		||||
 destroy_conntrack(struct nf_conntrack *nfct)
 | 
			
		||||
diff --git a/net/netfilter/nf_synproxy_core.c b/net/netfilter/nf_synproxy_core.c
 | 
			
		||||
index d7f1685..d6ee8f8 100644
 | 
			
		||||
--- a/net/netfilter/nf_synproxy_core.c
 | 
			
		||||
+++ b/net/netfilter/nf_synproxy_core.c
 | 
			
		||||
@@ -378,7 +378,7 @@ static int __net_init synproxy_net_init(struct net *net)
 | 
			
		||||
 err3:
 | 
			
		||||
 	free_percpu(snet->stats);
 | 
			
		||||
 err2:
 | 
			
		||||
-	nf_conntrack_free(ct);
 | 
			
		||||
+	nf_ct_tmpl_free(ct);
 | 
			
		||||
 err1:
 | 
			
		||||
 	return err;
 | 
			
		||||
 }
 | 
			
		||||
diff --git a/net/netfilter/xt_CT.c b/net/netfilter/xt_CT.c
 | 
			
		||||
index 43ddeee..f3377ce 100644
 | 
			
		||||
--- a/net/netfilter/xt_CT.c
 | 
			
		||||
+++ b/net/netfilter/xt_CT.c
 | 
			
		||||
@@ -233,7 +233,7 @@ out:
 | 
			
		||||
 	return 0;
 | 
			
		||||
 
 | 
			
		||||
 err3:
 | 
			
		||||
-	nf_conntrack_free(ct);
 | 
			
		||||
+	nf_ct_tmpl_free(ct);
 | 
			
		||||
 err2:
 | 
			
		||||
 	nf_ct_l3proto_module_put(par->family);
 | 
			
		||||
 err1:
 | 
			
		||||
-- 
 | 
			
		||||
2.5.1
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										19
									
								
								PKGBUILD
									
									
									
									
									
								
							
							
						
						
									
										19
									
								
								PKGBUILD
									
									
									
									
									
								
							@@ -3,7 +3,7 @@
 | 
			
		||||
pkgbase=linux-vfio
 | 
			
		||||
_srcname=linux-4.2
 | 
			
		||||
pkgver=4.2
 | 
			
		||||
pkgrel=2
 | 
			
		||||
pkgrel=3
 | 
			
		||||
arch=('i686' 'x86_64')
 | 
			
		||||
url="http://www.kernel.org/"
 | 
			
		||||
license=('GPL2')
 | 
			
		||||
@@ -19,16 +19,20 @@ source=("https://www.kernel.org/pub/linux/kernel/v4.x/${_srcname}.tar.xz"
 | 
			
		||||
        'linux.preset'
 | 
			
		||||
        'change-default-console-loglevel.patch'
 | 
			
		||||
        '0001-make_flush_workqueue_non_gpl.patch'
 | 
			
		||||
        '0001-e1000e-Fix-tight-loop-implementation-of-systime-read.patch'
 | 
			
		||||
        '0001-netfilter-conntrack-use-nf_ct_tmpl_free-in-CT-synpro.patch'
 | 
			
		||||
        'override_for_missing_acs_capabilities.patch'
 | 
			
		||||
        'i915_317.patch'
 | 
			
		||||
        )
 | 
			
		||||
sha256sums=('cf20e044f17588d2a42c8f2a450b0fd84dfdbd579b489d93e9ab7d0e8b45dbeb'
 | 
			
		||||
            'SKIP'
 | 
			
		||||
            'b46d8a8166487cf0dcdbcc0c0a5111aba950c49749a4761e1dce78f220704079'
 | 
			
		||||
            'e54800217ad6c61efa80d6ab223364cb0c2d6030061bc48d3f83fd971ae675f9'
 | 
			
		||||
            'e6f6f804f98ad321ce3e4395924993b51decb89699fde369391ccbb4bae928b2'
 | 
			
		||||
            'a071aaa327d2b3577fa4709b47ed5fe81c7914d168607f3db905fdbf226247e7'
 | 
			
		||||
            'f0d90e756f14533ee67afda280500511a62465b4f76adcc5effa95a40045179c'
 | 
			
		||||
            '1256b241cd477b265a3c2d64bdc19ffe3c9bbcee82ea3994c590c2c76e767d99'
 | 
			
		||||
            '4e776734e2c2185910a6fbb6f333d967b04f4a72b3196310af286c6a779bd97d'
 | 
			
		||||
            '0b1e41ba59ae45f5929963aa22fdc53bc8ffb4534e976cec046269d1a462197b'
 | 
			
		||||
            '6ed9e31ae5614c289c4884620e45698e764c03670ebc45bab9319d741238cbd3'
 | 
			
		||||
            '975f79348119bfba8dd972a9fbfe6b38484c45bfd228f2f6d48a0c02426ba149'
 | 
			
		||||
            '65faab45248008810b0a5f27162101a34dfe298c14d3506e52236c680353d7f8')
 | 
			
		||||
validpgpkeys=(
 | 
			
		||||
@@ -51,6 +55,15 @@ prepare() {
 | 
			
		||||
  # already applied to 4.3 series
 | 
			
		||||
  patch -p1 -i "${srcdir}/0001-make_flush_workqueue_non_gpl.patch"
 | 
			
		||||
 | 
			
		||||
  # fix hard lockup in e1000e_cyclecounter_read() after 4 hours of uptime
 | 
			
		||||
  # https://lkml.org/lkml/2015/8/18/292
 | 
			
		||||
  patch -p1 -i "${srcdir}/0001-e1000e-Fix-tight-loop-implementation-of-systime-read.patch"
 | 
			
		||||
 | 
			
		||||
  # add not-yet-mainlined patch to fix network unavailability when iptables
 | 
			
		||||
  # rules are applied during startup - happened with Shorewall; journal had
 | 
			
		||||
  # many instances of this error: nf_conntrack: table full, dropping packet
 | 
			
		||||
  patch -p1 -i "${srcdir}/0001-netfilter-conntrack-use-nf_ct_tmpl_free-in-CT-synpro.patch"
 | 
			
		||||
 | 
			
		||||
  # set DEFAULT_CONSOLE_LOGLEVEL to 4 (same value as the 'quiet' kernel param)
 | 
			
		||||
  # remove this when a Kconfig knob is made available by upstream
 | 
			
		||||
  # (relevant patch sent upstream: https://lkml.org/lkml/2011/7/26/227)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										15
									
								
								config
									
									
									
									
									
								
							
							
						
						
									
										15
									
								
								config
									
									
									
									
									
								
							@@ -1,6 +1,6 @@
 | 
			
		||||
#
 | 
			
		||||
# Automatically generated file; DO NOT EDIT.
 | 
			
		||||
# Linux/x86 4.2.0 Kernel Configuration
 | 
			
		||||
# Linux/x86 4.2.0-2 Kernel Configuration
 | 
			
		||||
#
 | 
			
		||||
# CONFIG_64BIT is not set
 | 
			
		||||
CONFIG_X86_32=y
 | 
			
		||||
@@ -1430,7 +1430,7 @@ CONFIG_CAN_PEAK_PCMCIA=m
 | 
			
		||||
CONFIG_CAN_PEAK_PCI=m
 | 
			
		||||
CONFIG_CAN_PEAK_PCIEC=y
 | 
			
		||||
CONFIG_CAN_KVASER_PCI=m
 | 
			
		||||
CONFIG_CAN_PLX_PCI=m 
 | 
			
		||||
CONFIG_CAN_PLX_PCI=m
 | 
			
		||||
# CONFIG_CAN_TSCAN1 is not set
 | 
			
		||||
CONFIG_CAN_C_CAN=m
 | 
			
		||||
CONFIG_CAN_C_CAN_PLATFORM=m
 | 
			
		||||
@@ -1655,7 +1655,7 @@ CONFIG_PREVENT_FIRMWARE_BUILD=y
 | 
			
		||||
CONFIG_FW_LOADER=y
 | 
			
		||||
# CONFIG_FIRMWARE_IN_KERNEL is not set
 | 
			
		||||
CONFIG_EXTRA_FIRMWARE=""
 | 
			
		||||
# CONFIG_FW_LOADER_USER_HELPER is not set
 | 
			
		||||
CONFIG_FW_LOADER_USER_HELPER=y
 | 
			
		||||
# CONFIG_FW_LOADER_USER_HELPER_FALLBACK is not set
 | 
			
		||||
CONFIG_WANT_DEV_COREDUMP=y
 | 
			
		||||
CONFIG_ALLOW_DEV_COREDUMP=y
 | 
			
		||||
@@ -5841,11 +5841,10 @@ CONFIG_LEDS_PCA9532=m
 | 
			
		||||
# CONFIG_LEDS_PCA9532_GPIO is not set
 | 
			
		||||
CONFIG_LEDS_GPIO=m
 | 
			
		||||
CONFIG_LEDS_LP3944=m
 | 
			
		||||
CONFIG_LEDS_LP55XX_COMMON=m
 | 
			
		||||
CONFIG_LEDS_LP5521=m
 | 
			
		||||
CONFIG_LEDS_LP5523=m
 | 
			
		||||
CONFIG_LEDS_LP5562=m
 | 
			
		||||
CONFIG_LEDS_LP8501=m
 | 
			
		||||
# CONFIG_LEDS_LP5521 is not set
 | 
			
		||||
# CONFIG_LEDS_LP5523 is not set
 | 
			
		||||
# CONFIG_LEDS_LP5562 is not set
 | 
			
		||||
# CONFIG_LEDS_LP8501 is not set
 | 
			
		||||
CONFIG_LEDS_LP8860=m
 | 
			
		||||
CONFIG_LEDS_CLEVO_MAIL=m
 | 
			
		||||
CONFIG_LEDS_PCA955X=m
 | 
			
		||||
 
 | 
			
		||||
@@ -1,6 +1,6 @@
 | 
			
		||||
#
 | 
			
		||||
# Automatically generated file; DO NOT EDIT.
 | 
			
		||||
# Linux/x86 4.2.0 Kernel Configuration
 | 
			
		||||
# Linux/x86 4.2.0-2 Kernel Configuration
 | 
			
		||||
#
 | 
			
		||||
CONFIG_64BIT=y
 | 
			
		||||
CONFIG_X86_64=y
 | 
			
		||||
@@ -1644,7 +1644,7 @@ CONFIG_PREVENT_FIRMWARE_BUILD=y
 | 
			
		||||
CONFIG_FW_LOADER=y
 | 
			
		||||
# CONFIG_FIRMWARE_IN_KERNEL is not set
 | 
			
		||||
CONFIG_EXTRA_FIRMWARE=""
 | 
			
		||||
# CONFIG_FW_LOADER_USER_HELPER is not set
 | 
			
		||||
CONFIG_FW_LOADER_USER_HELPER=y
 | 
			
		||||
# CONFIG_FW_LOADER_USER_HELPER_FALLBACK is not set
 | 
			
		||||
CONFIG_WANT_DEV_COREDUMP=y
 | 
			
		||||
CONFIG_ALLOW_DEV_COREDUMP=y
 | 
			
		||||
@@ -5622,11 +5622,10 @@ CONFIG_LEDS_PCA9532=m
 | 
			
		||||
# CONFIG_LEDS_PCA9532_GPIO is not set
 | 
			
		||||
CONFIG_LEDS_GPIO=m
 | 
			
		||||
CONFIG_LEDS_LP3944=m
 | 
			
		||||
CONFIG_LEDS_LP55XX_COMMON=m
 | 
			
		||||
CONFIG_LEDS_LP5521=m
 | 
			
		||||
CONFIG_LEDS_LP5523=m
 | 
			
		||||
CONFIG_LEDS_LP5562=m
 | 
			
		||||
CONFIG_LEDS_LP8501=m
 | 
			
		||||
# CONFIG_LEDS_LP5521 is not set
 | 
			
		||||
# CONFIG_LEDS_LP5523 is not set
 | 
			
		||||
# CONFIG_LEDS_LP5562 is not set
 | 
			
		||||
# CONFIG_LEDS_LP8501 is not set
 | 
			
		||||
CONFIG_LEDS_LP8860=m
 | 
			
		||||
CONFIG_LEDS_CLEVO_MAIL=m
 | 
			
		||||
CONFIG_LEDS_PCA955X=m
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user