diff options
author | jc_gargma <jc_gargma@iserlohn-fortress.net> | 2020-04-17 19:32:49 -0700 |
---|---|---|
committer | jc_gargma <jc_gargma@iserlohn-fortress.net> | 2020-04-17 19:32:49 -0700 |
commit | 377d2c0a1477d7663cfbf541cc7f15d5a87d77f8 (patch) | |
tree | 5581170d0e7b581dd39f16ad465ead42bfb3a338 | |
parent | Updated to 5.6.4 (diff) | |
download | linux-libre-377d2c0a1477d7663cfbf541cc7f15d5a87d77f8.tar.xz |
Updated to 5.6.5
-rw-r--r-- | 0002-ALSA-hda-Fix-potential-access-overflow-in-beep-helper.patch | 42 | ||||
-rw-r--r-- | PKGBUILD | 9 | ||||
-rw-r--r-- | config | 2 |
3 files changed, 4 insertions, 49 deletions
diff --git a/0002-ALSA-hda-Fix-potential-access-overflow-in-beep-helper.patch b/0002-ALSA-hda-Fix-potential-access-overflow-in-beep-helper.patch deleted file mode 100644 index 48dfbf5..0000000 --- a/0002-ALSA-hda-Fix-potential-access-overflow-in-beep-helper.patch +++ /dev/null @@ -1,42 +0,0 @@ -From 28a3a4bec629ccb9cef64c546998052e0806cb1b Mon Sep 17 00:00:00 2001 -From: Takashi Iwai <tiwai@suse.de> -Date: Tue, 7 Apr 2020 10:36:22 +0200 -Subject: ALSA: hda: Fix potential access overflow in beep helper - -The beep control helper function blindly stores the values in two -stereo channels no matter whether the actual control is mono or -stereo. This is practically harmless, but it annoys the recently -introduced sanity check, resulting in an error when the checker is -enabled. - -This patch corrects the behavior to store only on the defined array -member. - -BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=207139 -Cc: <stable@vger.kernel.org> -Signed-off-by: Takashi Iwai <tiwai@suse.de> ---- - sound/pci/hda/hda_beep.c | 6 +++++- - 1 file changed, 5 insertions(+), 1 deletion(-) - -diff --git a/sound/pci/hda/hda_beep.c b/sound/pci/hda/hda_beep.c -index f5fd62ed4df5..841523f6b88d 100644 ---- a/sound/pci/hda/hda_beep.c -+++ b/sound/pci/hda/hda_beep.c -@@ -290,8 +290,12 @@ int snd_hda_mixer_amp_switch_get_beep(struct snd_kcontrol *kcontrol, - { - struct hda_codec *codec = snd_kcontrol_chip(kcontrol); - struct hda_beep *beep = codec->beep; -+ int chs = get_amp_channels(kcontrol); -+ - if (beep && (!beep->enabled || !ctl_has_mute(kcontrol))) { -- ucontrol->value.integer.value[0] = -+ if (chs & 1) -+ ucontrol->value.integer.value[0] = beep->enabled; -+ if (chs & 2) - ucontrol->value.integer.value[1] = beep->enabled; - return 0; - } --- -cgit v1.2.3-1-gf6bb5 - @@ -13,7 +13,7 @@ pkgbase=linux-libre _supver=5 _majver=6 -_minver=4 +_minver=5 _gccpatchver='20191217' _gccpatchger='9.1' _gccpatchker='5.5' @@ -39,7 +39,6 @@ _gnupkgver=${pkgver}-gnu source=( https://linux-libre.fsfla.org/pub/linux-libre/releases/${_gnumajver}/linux-libre-${_gnumajver}.tar.xz{,.sign} 0001-ZEN-Add-sysctl-and-CONFIG-to-disallow-unprivileged-C.patch - 0002-ALSA-hda-Fix-potential-access-overflow-in-beep-helper.patch graysky_bdver2-hotfix.patch kernel_gcc_patch-${_gccpatchver}.tar.gz::https://github.com/graysky2/kernel_gcc_patch/archive/${_gccpatchver}.tar.gz ath9k-regdom-hack.patch @@ -56,14 +55,13 @@ validpgpkeys=( b2sums=('921a3836ffbd5ababb897b8d923ab3e97c10c39b8d01060fe41742005f8111b5c2c9e76c9b7bcf4fe59a056454a364eca5df8006ca8a174205df152007e18dff' 'SKIP' 'ab1fb19c67d4c107f75767581c33d9c1458b4d9fdb88f4adb41d30a36f5a2f95f1c48ef079eb87e1e6e8ce2f98b293195cb2c0f2a8ec975aa817453289158c6e' - '4d0a521668223e00d0c7a7e4359ae18a5506b65b3394f3050ea20e304cc37c2c73f757a09b70737118bffe95db23a02d4da7640a3726ce9c88966c3a8c5ceb11' '1892bd22775eac3bcc4d37f4fd30c95346bf3a0888cbbff57fd614973b525390dff2e315ce35b2e498523cceaab94ff21a80475dee8df3de4dd8fc0fab07d74e' 'd76bd0bf237ea2bb7999fd3715cb664d89148cb0ade8057d57cdb40bc0a7954336e50ee077312e5e192398b0f35f055786deb98af9130d57e60f2ea040fbb66f' '2e58bb89b247b1678355368956e67c1de51fcde97a227b2162f6771e30f17fa5520faafe7be4b6816a542e7ae10d05f64c6b6354f352c12746d4b8da632936dd' 'fde132f3705d908e6f2147c78a2193289916d72304ca5efa2229d79fc3e57a857314ce94e71425caef2f7f7b6cf87f05ef86335dc8bd4be78e7035afe608005a' - '607114d02b4fa5a37511cfdc191ceb628778eda79f28d0e5359205c4d697a7759c63c3d30172885acea4496eef638066d334b3132e7ddaaf91e36f2f92129f56' + '8927873b1857cdceff3376fbcef7e5c307efe92f43554e0a9b4d9bb5685f84e7ec041874b7d3328fe8ecdcf18843480c92a6607594da4c47a8478de3db93540c' 'b4e1377d97ad7e8144d6e55b6d43731e3271a5aec65b65ca6d81026a95f15f549b9303fb3c6f492099ca691e3f65f4cf7f0c3aa742df03b396d7f6d81813aa95' - 'cdbea46eb2da46d2331b7277404c49465686f7bfe7fcbfe3a72ded0074c876f72299dd747bbf5deeae21046b937e76a9ee80b660afda6cabe0c5f555cd70b036' + 'dfa458eea739916884b3a606f845d44bed661589abe89502b3cf35cfa911683e8715b9ce198645f48c57ee3bf4b9cc26ac0722a2e0a6c01d5cd1017ed199a880' 'SKIP') #export KBUILD_BUILD_HOST=arc4linux @@ -83,7 +81,6 @@ prepare() { # Hotfixes echo "Applying hotfixes" patch -p1 -i ../0001-ZEN-Add-sysctl-and-CONFIG-to-disallow-unprivileged-C.patch - patch -p1 -i ../0002-ALSA-hda-Fix-potential-access-overflow-in-beep-helper.patch patch -p1 -i ../sphinx-workaround.patch @@ -2566,7 +2566,7 @@ CONFIG_ALTERA_STAPL=m CONFIG_INTEL_MEI=m CONFIG_INTEL_MEI_ME=m CONFIG_INTEL_MEI_TXE=m -# CONFIG_INTEL_MEI_HDCPis not set +# CONFIG_INTEL_MEI_HDCP is not set CONFIG_VMWARE_VMCI=m # |