Blob Blame History Raw
#
# blacklist.conf
# ==============
#
# In this file the blacklist for the automatic fixes search is
# configured. There are two ways to blacklist potential fixes:
#
# 1) Put a source code path on one line in this file. If a patch
# touches only source code paths that are blacklisted in this
# file, it will be automatically blacklisted too.
#
# 2) Put a full git commit-id on one line in this file. The
# commit-id needs to be a 40 character-long hex string.
#
# As noted above, only one path or commit-id per line is allowed.
# Everything behind a '#' character is considered a comment and ignored.
#
# This file is parsed by the git-suse tool.
# Blacklisted Paths
# -----------------
MAINTAINERS # We don't care about upstream MAINTAINERS file
arch/alpha
arch/arc
arch/c6x
arch/csky
arch/h8300
arch/hexagon
arch/ia64
arch/loongarch
arch/m68k
arch/microblaze
arch/mips
arch/nds32
arch/nios2
arch/openrisc
arch/parisc
arch/sh
arch/sparc
arch/riscv
arch/um
arch/x86/um
arch/unicore32
arch/xtensa
# no need for upstream config updates
arch/arm64/configs/
arch/arm/configs/
arch/powerpc/configs/
arch/riscv/configs/
arch/s390/configs/
arch/x86/configs/
drivers/input/serio/ioc3kbd.c # MIPS only
drivers/net/arcnet/ #ARCnet is not enabled
drivers/net/ethernet/davicom/ # dm9000 legacy driver
drivers/net/ethernet/natsemi/sonic.c #m68k Apple Macintosh
drivers/net/ethernet/natsemi/sonic.h
drivers/platform/mips/
drivers/platform/x86/x86-android-tablets/
drivers/staging/android
drivers/video/fbdev/hyperv_fb.c
drivers/watchdog/starfive-wdt.c # not enabled
drivers/cpuidle/cpuidle-riscv-sbi.c # RISC-V not supported
fs/f2fs
fs/ext2 # We use ext4 driver for this
fs/ntfs3
fs/smb/server
mm/damon # Not enabled
mm/kmemleak.c # Not enabled
mm/kmsan # Not enabled
# Unsupported ppc platforms
arch/powerpc/boot/dts
arch/powerpc/include/asm/8xx_immap.h
arch/powerpc/include/asm/book3s/32
arch/powerpc/include/asm/cell-pmu.h
arch/powerpc/include/asm/cell-regs.h
arch/powerpc/include/asm/dcr-generic.h
arch/powerpc/include/asm/dcr.h
arch/powerpc/include/asm/dcr-mmio.h
arch/powerpc/include/asm/dcr-native.h
arch/powerpc/include/asm/dcr-regs.h
arch/powerpc/include/asm/exception-64e.h
arch/powerpc/include/asm/fsl_gtm.h
arch/powerpc/include/asm/fsl_hcalls.h
arch/powerpc/include/asm/fsl_lbc.h
arch/powerpc/include/asm/fsl_pamu_stash.h
arch/powerpc/include/asm/fsl_pm.h
arch/powerpc/include/asm/kvm_book3s_32.h
arch/powerpc/include/asm/kvm_booke.h
arch/powerpc/include/asm/kvm_booke_hv_asm.h
arch/powerpc/include/asm/mpc5121.h
arch/powerpc/include/asm/mpc52xx.h
arch/powerpc/include/asm/mpc52xx_psc.h
arch/powerpc/include/asm/mpc5xxx.h
arch/powerpc/include/asm/mpc6xx.h
arch/powerpc/include/asm/mpc8260.h
arch/powerpc/include/asm/mpc85xx.h
arch/powerpc/include/asm/nohash
arch/powerpc/include/asm/ppc4xx.h
arch/powerpc/include/asm/ps3.h
arch/powerpc/include/asm/reg_fsl_emb.h
arch/powerpc/include/asm/syscalls_32.h
arch/powerpc/include/asm/task_size_32.h
arch/powerpc/platforms/40x
arch/powerpc/platforms/44x
arch/powerpc/platforms/4xx
arch/powerpc/platforms/512x
arch/powerpc/platforms/52xx
arch/powerpc/platforms/82xx
arch/powerpc/platforms/83xx
arch/powerpc/platforms/85xx
arch/powerpc/platforms/86xx
arch/powerpc/platforms/8xx
arch/powerpc/platforms/amigaone
arch/powerpc/platforms/cell
arch/powerpc/platforms/chrp
arch/powerpc/platforms/embedded6xx
arch/powerpc/platforms/maple
arch/powerpc/platforms/pasemi
arch/powerpc/platforms/powermac
arch/powerpc/platforms/ps3
arch/powerpc/platforms/fsl_uli1575.c
arch/powerpc/kernel/cpu_specs_40x.h
arch/powerpc/kernel/head_40x.S
arch/powerpc/kernel/cpu_setup_44x.S
arch/powerpc/kernel/cpu_specs_44x.h
arch/powerpc/kernel/head_44x.S
arch/powerpc/kernel/cpu_specs_47x.h
arch/powerpc/kernel/cpu_setup_6xx.S
arch/powerpc/kernel/idle_6xx.S
arch/powerpc/kernel/l2cr_6xx.S
arch/powerpc/kernel/tau_6xx.c
arch/powerpc/kernel/cpu_specs_8xx.h
arch/powerpc/kernel/head_8xx.S
arch/powerpc/kernel/cpu_specs_85xx.h
arch/powerpc/kernel/cpu_specs_e500mc.h
arch/powerpc/kernel/idle_e500.S
arch/powerpc/kernel/cpu_setup_6xx.S
arch/powerpc/kernel/cpu_setup_ppc970.S
arch/powerpc/kernel/cpu_setup_fsl_booke.S
arch/powerpc/kernel/fsl_booke_entry_mapping.S
arch/powerpc/kernel/cpu_specs_book3s_32.h
arch/powerpc/kernel/head_book3s_32.S
arch/powerpc/kernel/head_booke.h
arch/powerpc/kernel/head_fsl_booke.S
arch/powerpc/kernel/swsusp_booke.S
arch/powerpc/kernel/idle_book3e.S
arch/powerpc/kernel/idle_power4.S
arch/powerpc/kernel/early_32.c
arch/powerpc/kernel/entry_32.S
arch/powerpc/kernel/head_32.S
arch/powerpc/kernel/head_32.h
arch/powerpc/kernel/head_85xx.S
arch/powerpc/kernel/head_book3s_32.S
arch/powerpc/kernel/misc_32.S
arch/powerpc/kernel/module_32.c
arch/powerpc/kernel/pci_32.c
arch/powerpc/kernel/ppc32.h
arch/powerpc/kernel/reloc_32.S
arch/powerpc/kernel/setup_32.c
arch/powerpc/kernel/signal_32.c
arch/powerpc/kernel/swsusp_32.S
arch/powerpc/kexec/relocate_32.S
arch/powerpc/kvm/e500_mmu_host.c
arch/powerpc/math-emu/
arch/powerpc/mm/init_32.c
arch/powerpc/mm/pgtable_32.c
arch/powerpc/mm/book3s32
arch/powerpc/mm/book3s64/hash_4k.c
arch/powerpc/mm/kasan
arch/powerpc/mm/nohash
arch/powerpc/mm/ptdump/8xx.c
arch/powerpc/mm/ptdump/bats.c
arch/powerpc/net/bpf_jit_comp32.c
arch/powerpc/perf/mpc7450-pmu.c
arch/powerpc/sysdev/dcr.c
arch/powerpc/sysdev/dcr-low.S
arch/powerpc/sysdev/fsl_msi.c
arch/powerpc/sysdev/mpc5xxx_clocks.c
arch/powerpc/sysdev/tsi108_pci.c
# We do not use device tree documentation schemes
Documentation/devicetree/bindings
# We do not provide device trees with SUSE products
# silence git-fixes in dts files
arch/arm64/boot/dts/
# tools that are not shipped
tools/tracing/rtla/
tools/testing/selftests/nolibc
tools/include/nolibc
# unused build scripts
scripts/package/debian
scripts/Makefile.clang
rust
# Blacklisted Commits
# -------------------
# SLE15-SP7-specific
e58e519b80ba79cd73abb1d631d429b7322ac9cb # pinctrl/intel: EXPORT_NS_GPL_DEV_SLEEP_PM_OPS() is undefined
94df6cbd4c4aea633a9b4bbfab835dcfee21578b # iwlwifi: we don't backport test module code
27e6a24a4cf3d25421c0f6ebb7c39f45fc14d20f # Unification, not a fix; Breaks kABI
47f2bd2ff382e5fe766b1322e354558a8da4a470 # IOMMUFD selftest changes are not backported.
905f88ccebb14e42bcd19455b0d9c0d4808f1897 # affected driver is not backported
db7724134c26fdf16886a560646d02292563f5a4 # the change in this commit be removed in 2b95bb052656 merge commit, so we removed it
28982ad73d6a9605708631dc49a0c763cc398aa2 # git-fix does not apply to driver, needs other commits not present
2b85b7fb1376481f7d4c2cf92e5da942f06b2547 # no arch/powerpc/crypto/.gitignore there yet
812a79b52b92345d777b6377fa538747d366b6ce # Unsupported driver
a184d9835a0a689261ea6a4a8dbc18173a031b77 # Fixes unsupported config
4e534ff4b69c6960a165cab2c851b48f0a0da945 # Unsupported driver
7a2e8e30ad89f498b206977396d028e10174390a # Unsupported driver
8f3ce3d996bf1e2f8474ec3ddabdb8765c19e6ea # Unsupported config
82ace0c8fe9b025eaa273365e27057402cdaeb02 # Fix if a bug requires it
20485e3a810c480cef60caf53988619f61127e7b # Will be unblacklisted by DRM backport
5f16ee27cd5abd5166e28b2311ac693c204063ff # Will be unblacklisted by DRM backport
de8de2c8acb931ce6197a04376a7078ccf50e821 # Will be unblacklisted by DRM backport
074d363a0b2e4616ce7cf7a833687e710af923f1 # Will be unblacklisted by DRM backport
d180649238f04183950d9c8a7d8a2c2f1788a89c # Will be unblacklisted by DRM backport
7dc918daaf2994963690171584ba423f28724df5 # Will be unblacklisted by DRM backport
edf1c586e92675c4e0eb27758fcdb55a56838de1 # SCX not available
8a0ba7e4b2e88443f2c2a322995d17b5457c72c4 # upstream stable revert for drm/ast
4676556ae4a152e4eb779106d8e81b89d6435e2b # upstream stable revert for drm/amd
bbaf2a0ecd0c5305a577bd1dc87b949a3d87dd7b # upstream stable revert for drm/amd
f9fd5a630b5b0df672367c84117e9a2e821be4aa # upstream stable revert for drm/amd
1428da2f4a3317543bce02777576bfe086857b96 # upstream stable revert for drm/amd
a3ab4e7e10ae05c908951c425541c7de3fa619d7 # upstream stable revert for drm/amd
ccee9a2a8c002516d4252952df836abeaddfa39c # drm/i915: causes Oops; need the update of register_sysctl() API (bsc#1232066)
c621f70539cae731d9749c1900cd00bb70ea5c72 # drm/xe: causes Oops; need the update of register_sysctl() API (bsc#1232066)
be1dec570b6f5a29ce9c99334c52bea94c28914b # drm/xe: cherry-picked from the above
17d32430361898932678fc6d77e448f260c8a3a8 # DSB is still broken with Xe for us so keep it disabled. We might need a proper fix in the future.
f1bbc4e9cfa4c0f29883171e9d01c01cbe94becc # This is Revert "ARM64: Dynamically allocate cpumasks and increase supported CPUs to 512" which is then reverted again
135f218255b28c5bbf71e9e32a49e5c734cabbe5 # fix for dts not backported
cd0eb354d441488feed6685adbeb1acd45db1b8d # cleanup
0cfc36ea51684b5932cd3951ded523777d807af2 # 30e945861f3b not present
bd2703b42decebdcddf76e277ba76b4c4a142d73 # Require complex backport for not much impact
422c9727b07f9f86e2ec11c56622e566221591cc # no b63e6f60eab4
98d4435efcbf37801a3246fb53856c4b934a2613 # f5f80e32de12fad2813d37270e8364a03e6d3ef0 isn't backported, causes kabi breakage
aabd3be90579ed088aa34f0584ab6836c735c76f # ath12k: inapplicable
# SLE15-SP6
adfbae9ffe339eed08d54a4eb87c93f4b35f214b # drm/i915: cherry-picked d1691bb22eba23a0131f1bde41d268bb0ebb0f59
8bfbdadce85c4c51689da10f39c805a7106d4567 # drm/i915: cherry-picked 803033c148f754f32da1b93926c49c22731ec485
80ab31799002166ac7c660bacfbff4f85bc29107 # drm/i915: cherry-picked 1816f4a17f54a01afa2f06d6571c39890b97d282
b049132d61336f643d8faf2f6574b063667088cf # drm/i915: cherry-picked 275dac1f7f5e9c2a2e806b34d3b10804eec0ac3c
e39c76b2160bbd005587f978d29603ef790aefcd # drm/i915: cherry-picked 2efc8e1001acfdc143cf2d25a08a4974c322e2a8
3b6692357f70498f617ea1b31a0378070a0acf1c # drm/i915: cherry-picked 631420b06597a33c72b6dcef78d1c2dea17f452d
27ac123b454417ea92d77c13a5d94655f53b759c # drm/i915: cherry-picked 2c69679626d5daa680d71c77ad58af0088db537f
bddc18913bd44adae5c828fd514d570f43ba1576 # drm/i915: cherry-picked 6ece90e3665a9b7fb2637fcca26cebd42991580b
fa83c12132f71302f7d4b02758dc0d46048d3f5f # drm/i915: cherry-picked c8c2969bfcba5fcba3a5b078315c1b586d927d9f
1d5b09f8daf859247a1ea65b0d732a24d88980d8 # drm/i915: cherry-picked a41d985902c153c31c616fe183cf2ee331e95ecb
51f7008239de011370c5067bbba07f0207f06b72 # drm/i915: cherry-picked 0ff80028e2702c7c3d78b69705dc47c1ccba8c39
3312bb4ad09ca6423bd4a5b15a94588a8962fb8e # drm/i915: cherry-picked 79c901c93562bdf1c84ce6c1b744fbbe4389a6eb
6986f05b557bf1efea5bac8dbdffb7ee89d0cf77 # drm/i915: cherry-picked 5896f2d363d5cfb7510856c90d5e0ed934a1d340
7eeef32719f6af935a1554813e6bc206446339cd # drm/i915: cherry-picked 45dfbd992923f4df174db4e23b96fca7e30d73e2
5a3c46b809d09f8ef59e2fbf2463b1c102aecbaa # drm/i915: cherry-picked cb2e701305f4ffe3a107c1d97f8588b4ed48ccb3
b29a20f7c4995a059ed764ce42389857426397c7 # drm/i915: cherry-picked 2d6f2f79e06571d41eb1223abebe9097511c9544
09a36015d9a0940214c080f95afc605c47648bbd # drm/i915: cherry-picked 62fe398761cd06a428e6f367aba84732a2f1c268
edad9ee94f17adc75d3b13ab51bbe3d615ce1e7e # drm/i915: cherry-picked 40023959dbab3c6ad56fa7213770e63d197b69fb
412fa1f097f48c8c1321806dd25e46618e0da147 # drm/i915: cherry-picked 79d0150d2d983a4f6efee676cea06027f586fcd0
e0a77e09c707cf89317de00f87b94b1168f27acd # drm/amd: cherry-picked 822b84ecfc646da0f87fd947fa00dc3be5e45ecc
c18842a2e81a3e3d5c7401f061d7887b422aeebc # drm/amd: cherry-picked dd24662d9dfbad281bbf030f06d68c7938fa0c66
79b6e265d92092b49252f546e1a0f63ae8851f83 # drm/amd: cherry-picked d1c5c3e252b8a911a524e6ee33b82aca81397745
b0dc10428460ac2408cf5f82fc3562e9e57324e1 # drm/amd: cherry-picked 425afa0ac99a05b39e6cd00704fa0e3e925cee2b
8fa33bd8d327ae2f9b602cd883f32efc4662bea0 # drm/amd: cherry-picked 99d92eaca5d915763b240aae24669f5bf3227ecf
8b6a6aa5d6d2be6a0669a29deb89184aaa0bad65 # drm/amd: cherry-picked 989cd3e76a4aab76fe7dd50090ac3fa501c537f6
8f7f1b020ea641f21e7c88db55170a4d15834668 # drm/amd: cherry-picked 08da182175db4c7f80850354849d95f2670e8cd9
514987a5bc3eb9bc86946f8013a9bdf732a29ef8 # drm/amd: cherry-picked 2397e3d8d2e120355201a8310b61929f5a8bd2c0
967a66396e4668ef314e06a0391e67aa1cf6d058 # drm/amd: cherry-picked 1253685f0d3eb3eab0bfc4bf15ab341a5f3da0c8
c0c27428903700d86920394aa2302506b5d95b17 # drm/amd: cherry-picked 922a76ba31adf84e72bc947267385be420c689ee
9d7a348d368ccd940242d4aa68292cf665f6d474 # drm/amd: cherry-picked 58d9b9a14b47c2a3da6effcbb01607ad7edc0275
273f47997718fc72d96e5a4a640538c00575fa7e # drm/amd: cherry-picked f57fa0f23d9707747272b0d09af8b93b19cf8ee4
4994d1f0a754cded0afb62c4753d00760ddca511 # drm/amd: cherry-picked 6c032c37ac3ef3b7df30937c785ecc4da428edc0
a39b52c838127a42c57d5e080dbd5204770aa80e # drm/amd: cherry-picked 8173cab3368a13cdc3cad0bd5cf14e9399b0f501
6d99f3f4ea948f26b074a069c0406dd7f1cb0d8f # drm/amd: cherry-picked 996e93a3fe74dcf9d467ae3020aea42cc3ff65e3
f1822392128e00c1ae1579fe050ae3797db6ea02 # drm/amd: cherry-picked 6d600229df1ed06f46ba68ac706d9f44ba8c5fb4
4c44a51c78447ae97a6d7ef27ffdb790c3f61cca # drm/radeon: cherry-picked a34fc1bcd2c4d8b09dcfc0b95ac65bca1e579bd7
d4281b49c1b6afc66c470c85019fc1eceb676a78 # drm/amd: cherry-picked 0d2dd02d74e6377268f56b90261de0fae8f0d2cb
ab22ecabe99922db4bec8e2b439336f865bbc117 # drm/amd: cherry-picked 40baba5693b9af586dc1063af603d05a79e57a6b
cbb63eccc05626d0d111b335e44f111a3bb92871 # drm/amd: cherry-picked 2a1eb1a343208ce7d6839b73d62aece343e693ff
a15a77c8e61d2db075cc6e2104bfdebf5c9b966c # drm/amd: cherry-picked 3b3ffd729e7e3ad706ddba4bb84358df5d43a647
f9bfc9fff2997abe3c1a560a38a0c359775e7ec5 # drm/amd: cherry-picked d511f95938bf9e75ab73ace0ab1cebbe9a13df4b
5a03159ab7ef456ba22460e47a9d0eab2f310424 # drm/amd: cherry-picked 73c12de8bee258b51bd418f33dc59f2c6e5fb5f6
3537d6a48c50ed37e419f89931a5acdb6c56c6d6 # drm/amd: cherry-picked 3eb1a3a04056ba3df3205e169b8acc9da0c65a94
fe56c6ee0457035ae8fbbc2aa5ddfcfac6ded787 # drm/amd: cherry-picked 7ab1a4913d0051cf5196ef7987b5fa42c25e13b6
c069dbbcba7319c514536820f2782a0af3361811 # drm/radeon: cherry-picked 7ac9be96b0113a34c33110b32912642bdc8ff33d
59eddd4e215afc05f0610ebabfa05d4b099e5c13 # drm/amd: cherry-picked 34e5a54327dce5033582f3609eb54812a8c61b90
42cffe980ce383893660d78e33340763ca1dadae # livepatch: cosmetic
72c96a2dacc0fb056d13a5f02b0845c4c910fe54 # printk: corner case; depends on another patches (bsc#1243998)
9011e49d54dcc7653ebb8a1e05b5badb5ecfa9f9 # modules: may break out-of-tree modules (bsc#1215155)
750bd41aeaeb1f0e0128aa4f8fcd6dd759713641 # only affects JUMP_LABEL=n
ef73dcaa31217c79adc548bf9045afb40ac75b82 # book3e not supported
3af5ae22030cb59fab4fba35f5a2b62f47e14df9 # commit is incorrect and is being reverted upstream
82b90b6c5b38e457c7081d50dff11ecbafc1e61a # optimization if not refactoring
017fb83ee0612595ec70c65ddd83472706b02a50 # kernel-doc fix only
ff9e8f41513669e290f6e1904e1bc75950584491 # only relevant to FSL PPC which is not supported
b7fd68ab1538e3adb665670414bea440f399fda9 # drm: no folio stuff backported
f4283bc7e38ac89d0c6c0ae188464d3769bec098 # duplicate of existing patch with different commit id
7a0e005c7957931689a327b2a4e7333a19f13f95 # Duplicate of e749dd10e5f292061ad63d2b030194bf7d7d452c: drm/amd/display: edp do not add non-edid timings
e63a57303599b17290cd8bc48e6f20b24289a8bc # cleanup optimization only, blk-throttle offlining is idempotent
793838138c157d4c49f4fb744b170747e3dabf58 # only applies to parisc arch
ca10d851b9ad0338c19e8e3089e24d565ebfffd7 # workqueues: caused regression, reverted upstream (bsc#1219509)
31c89007285d365aa36f71d8fb0701581c770a27 # workqueues: cosmetic; truncated names in ps output
8318d6a6362f5903edb4c904a8dd447e59be4ad1 # workqueues: cosmetic; truncated names in ps output
a045a272d887575da17ad86d6573e82871b50c27 # workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580)
afa87ce85379e2d93863fce595afdb5771a84004 # workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580)
4c6380305d21e36581b451f7337a36c93b64e050 # workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580)
1c270b79ce0b8290f146255ea9057243f6dd3c17 # workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580)
c5404d4e6df6faba1007544b5f4e62c7c14416dd # workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580)
9f66cff212bb3c1cd25996aaa0dfd0c9e9d8baab # workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580)
91ccc6e7233bb10a9c176aa4cc70d6f432a441a5 # workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580)
2a1b02bcba78f8498ab00d6142e1238d85b01591 # workqueues: cosmetic, depends on many other changes, like increasing workqueue name length with many followup fixes, and introducing BH workqueues
c35aea39d1e106f61fd2130f0d32a3bac8bd4570 # workqueues: just a preparation patch for introducing BH workqueues
24e41bf8a6b424c76c5902fb999e9eca61bdf83d # feature, not a bug, not a KABI padding
d7c2d34d72bfeffca4983c4dcba55d1dd31012be # unable to add (just a chmod), handle in installer
4b3cd783808bb327d931bbb1324d6c367443b721 # inapplicable, we do not have te qcom driver
f96c48670319d685d18d50819ed0c1ef751ed2ac # Linus reverted that in the merge commit
895ee5aefb7e24203de5dffae7ce9a02d78fa3d1 # suggested due to stable-6.6, but we have not taken the patch this reverts
fb097dcd5a28c0a2325632405c76a66777a6bed9 # later reverted
3cb4f534bac010258b2688395c2f13459a932be9 # only v6.5 and later
2a7d6b9c55baabfbad03946f2b0c695df72cfb06 # obsoleted by 4fd463e9389f9c5ea00a327b4ff01daf5869e774
10d3340441bd0db857fc7fcb1733a800acf47a3d # mfd: rz-mtu3: Link time dependencies for config we don't use
2b9c3eb32a699acdd4784d6b93743271b4970899 # input/mouse/bcm5974: causes a regression on MacBook touchpad alone (bsc#1220030)
abbf73816b6f5f4268fbfb3b3505003c2356d4a9 # depends on test feature of kunit, which we don't have
d104a6fef3fec137d8d44961224ab76edbd6cbc7 # Fix for Clang with LTO on
7d8c67dd5d4f2ed1907e192c73dd948d35145641 # only comment changes
f56fc61bb531dd4cca44c7448f112fc53ae49474 # drm/amd: spurious revert in stable
18e7ab59b755e60f60d7daae8a68f560e86c5661 # drm/amd: spurious revert in stable
69db702c83874fbaa2a51af761e35a8e5a593b95 # Duplicate of 705318a99a13: io_uring/af_unix: disable sending io_uring over sockets
06f45435d985d60d7d2fe2424fbb9909d177a63d # firewire: reverted in below
3c70de9b580998e5d644f4e80a9944c30aa1197b # firewire: reverting the above
ffa55858330f267beec995fc4f68098c91311c64 # already applied
6a26310273c323380da21eb23fcfd50e31140913 # already applied
1b2c92a1cb2469d8c0079dbf496ab86e22e1cb7c # fixes in fact ad1a48301f65
ae1914174a63a558113e80d24ccac2773f9f7b2b # cosmetic
75fd6485cccef269ac9eb3b71cf56753341195ef # usb/gadget: taken mistakenly, reverted later
17cf8661ee0f065c08152e611a568dd1fb0285f1 # it actually fixes 061cbfab09fb
a743f26d03a96593c0f3d05dc26b388f45de67c9 # Clang fix
d9b3ce8769e371554a669f262bbc61c02a40efcc # mainly performance optimization
d7038f951828da19fa9aafddfa087b69032c9687 # break KABI now.
ecbd8ebb51bf7e4939d83b9e6022a55cac44ef06 # fixing patch was not merged in
5f882f3b0a8bf0788d5a0ee44b1191de5319bb8a # we don't have syscall hardening
9ddf190a7df77b77817f955fdb9c2ae9d1c9c9a3 # config change for an unused MIPs option
32f5f73b79ffdef215e2e1bcb6ad74387c0f925c # we don't have FRED
246f80a0b17f8f582b2c0996db02998239057c65 # unsupported arch, see CVE-2023-52629
79ae56fc475869d636071f66d9e4ef2a3819eee6 # does not fix an actual bug
2d6cd791e63ec0c68ae95ecd55dc6c50ac7829cf # fix for missing commit 7248e0cebbef ("btrfs: skip update of block group item if used bytes are the same")
35931eb3945b8d38c31f8e956aee3cf31c52121b # kernel-doc fixes
f91192cd68591c6b037da345bc9fcd5e50540358 # btrfs: ref-verify is debugging feature and not built
f03e274a8b29d1d1c1bbd7f764766cb5ca537ab7 # btrfs: ref-verify is debugging feature and not built
182741d287fb1ea870ee6ef45aa1915a0b031233 # btrfs: cleanup, v0 extent removal
22a9d9585812440211b0b34a6bc02ade62314be4 # dmaengine:pl330: reverted in below
afc89870ea677bd5a44516eb981f7a259b74280c # dmaengine:pl330: reverting the above
8f51593cdcab82fb23ef2e1a0010b2e6f99aae02 # Fixes tool for DeviceTree patches check
b4c639f699349880b7918b861e1bd360442ec450 # btrfs: build fix for config we don't use
197b7d792d6aead2e30d4b2c054ffabae2ed73dc # part of a larger set that adds more debug info to cephfs client logs; not needed
5995d90d2d19f337df6a50bcf4699ef053214dac # part of a larger set that adds more debug info to cephfs client logs; not needed
d96c36004e31e2baaf8ea1b449b7d0b2c2bfb41a # not really a bug fix
5e0e879926c1ce7e1f5e0dfaacaf2d105f7d8a05 # btrfs: code not built
9147b9ded499d9853bdf0e9804b7eaa99c4429ed # btrfs: compilation warning fix
0c66c6f4e21cb22220cbd8821c5c73fc157d20dc # arm: folios not part of kernel
64bf2f685c795e75dd855761c75a193ee5998731 # only comment fix
c312828c37a72fe2d033a961c47c227b0767e9f8 # unsafe locking change, reverted by the next commit
e3977e0609a07d86406029fceea0fd40d7849368 # reverts previous commit
8f27829974b025d4df2e78894105d75e3bf349f0 # openpromfs not built
7c98f7cb8fda964fbc60b9307ad35e94735fa35f # only cleanup
6e58e0173507e506a5627741358bc770f220e356 # build fix irrelevant to our build environment
0774d19038c496f0c3602fb505c43e1b2d8eed85 # this breaks the API. We cannot change uevents.
87161a2b0aed9e9b614bbf6fe8697ad560ceb0cb # f2fs fix, not supported/compiled
4e0197f9932f70cc7be8744aa0ed4dd9b5d97d85 # f2fs fix, not supported/compiled
d8407f71ebeaeb6f50bd89791837873e44609708 # cleanup
6fb45460615358157a6d3c990e74f9c1395247e2 # only refactoring
ce0abef6a1d540acef85068e0e82bdf1fbeeb0e9 # we don't support CPU_MITIGATIONS
e4731baaf29438508197d3a8a6d4f5a8c51663f8 # amd_pstate: reverted in 6.6.x stable below
07caf754f696cbb7037e4c0c5da5fdbbbba13364 # amd_pstate: reverting the above
fbe1bf1e5ff1e3b298420d7a8434983ef8d72bd1 # we don't have the original commit so the revert is useless
5790b1fb3d672d9a1fe3881a7181dfdbe741568f # a rework for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
1e953de9e9b4ca77a9ce0fc17a0778eba3a4ca64 # not a bug fix, and CONFIG_USER_EVENTS is not set
bd125a084091396f3e796bb3dc009940d9771811 # CONFIG_USER_EVENTS is not set
54cbc058d86beca3515c994039b5c0f0a34f53dd # reverted upstream by commit 28468cbed92e ("Revert "fs/aio: Make io_cancel() generate completions again"")
532a0c57d7ff75e8f07d4e25cba4184989e2a241 # needless revert, we don't have the original patch
8009479ee919b9a91674f48050ccbff64eafedaa # this gets reverted by the above patch
943ad0b62e3c21f324c4884caa6cb4a871bca05c # we don't do cgroup freeze and io_uring in SLE15-SP6
28ab9769117ca944cb6eb537af5599aa436287a4 # libata: caused a regression, reverted in the upstream (bsc#1229054)
fa0db8e568787c665384430eaf2221b299b85367 # libata: upstream revert of the above
a038a3ff8c6582404834852c043dadc73a5b68b4 # 6xx not supported
54a11654de163994e32b24e3aa90ef81f4a3184d # binutils check cleanup, not a fix
7f3c5d099b6f8452dc4dcfe4179ea48e6a13d0eb # clang build cleanup
c7e0d9bb9154c6e6b2ac8746faba27b53393f25e # only adds an ifdef for a confuiguration not built
0d555b57ee660d8a871781c0eebf006e855e918d # only adds an ifdef for a confuiguration not built
ede66cd22441820cbd399936bf84fdc4294bc7fa # fixes build error with configuration not built
d8c3f243d4db24675b653f0568bb65dae34e6455 # fixes build error with configuration not built
f8d3555355653848082c351fa90775214fb8a4fa # fixes build error with configuration not built
c5aebb53b32460bc52680dd4e2a2f6b84d5ea521 # fixes build error with configuration not built
3efe19a9b15411119d4a35ec5790ad49f0a0234c # kconfig cleanup, not a fix
adfeae2d243d9e5b83d094af481d189156b11779 # not necessary because netkit is not backported
a576f36971ab4097b6aa76433532aa1fb5ee2d3b # not a fix
ffe6176b7f53ca0c99355f13e14a33a40cf49406 # not a real fix and breaking kabi
f2eaed1565acc2bdeb5c433f5f6c7bd7a0d62db1 # not a kernel fix, plus dependencies break kABI
56769ba4b297a629148eb24d554aef72d1ddfd9e # nothing substantial and non-code change
5dbd04eddb2c0841d1b3930e0a9944a2343c9cac # not a bug fix, and CONFIG_USER_EVENTS is not set
d24f05987ce8bf61e62d86fedbe47523dc5c3393 # not a bug fix, only refactoring
cf3f9a593dab87a032d2b6a6fb205e7f3de4f0a1 # optimization only, tasklist_lock contention
bf32075256e9dd9c6b736859e2c5813981339908 # 6.6 fix not needed in 6.4
2a501f55cd641eb4d3c16a2eab0d678693fac663 # 6.6 fix not needed in 6.4
ab42f4d9a26f1723dcfd6c93fcf768032b2bb5e7 # 1/10 start series
a2214ed588fb3c5b9824a21cff870482510372bb # 2/10 This series makes some stats per-namespace, but break kabi
f094323867668d50124886ad884b665de7319537 # 3/10 While it might be nice, it isn't worth the effort to stablise kabi
3f6ef182f144dcc9a4d942f97b6a8ed969f13c95 # 4/10
418b9687dece5bd763c09b5c27a801a7e3387be9 # 5/10
d98416cc2154053950610bb6880911e3dcbdf8c5 # 6/10
93483ac5fec62cc1de166051b219d953bb5e4ef4 # 7/10
4b14885411f74b2b0ce0eb2b39d0fffe54e5ca0d # 8/10
e41ee44cc6a473b1f414031782c3b4283d7f3e5f # 9/10
16fb9808ab2c99979f081987752abcbc5b092eac # 10/10 end series
ab8d66d132bc8f1992d3eb6cab8d32dda6733c84 # soundwire: caused a regression and reverted (bsc#1230350)
c60d847be7b8e69e419e02a2b3d19c2842a3c35d # problem doesn't exist in the tree
f62d4c3eb687d87b616b4279acec7862553bda77 # patched code not in 6.4
778c350eb580a497c9da2a01e314fe12674cb66a # patch making this revert possible is not in the kernel
840b2d39a2dc1b96deb3f5c7fef76c9b24f08f51 # patched code not in 6.4
208989744a6f01bed86968473312d4e650e600b3 # check whose need is unclear. too much risk of a regression
97713b1a2ced1e4a2a6c40045903797ebd44d7e0 # CVE-2024-44972 bsc#1230212: not applicable
020925ce92990c3bf59ab2cde386ac6d9ec734ff # clang builds
0f0ff097bf77663b8d2692e33d56119947611bb0 # KVM TLB range invalidation not supported. Missing 6354d15052ec88273c24beae4c99e31c3d3889b6 ("KVM: arm64: Implement __kvm_tlb_flush_vmid_range()) bsc#1229585
86b20af11e84c26ae3fde4dcc4f490948e3f8035 # broken patch to be reverted
81e1d9a39569d315f747c2af19ce502cd08645ed # cleanup breaking kABI
35f5d94187a6a3a8df2cba54beccca1c2379edb8 # code not used for now. include if needed
6f9dc684cae638dda0570154509884ee78d0f75c # build only fix
084ce16df0f060efd371092a09a7ae74a536dc11 # cleanup, no code change
28943b1b49f29aae6478c5e0b86fd1039c2be154 # irrelevant in our configs
535733e90e5d8912ebeccebb05b354a2d06ff459 # cleanup for beauty
3a87e264290d71ec86a210ab3e8d23b715ad266d # We don't enable IORING_OP_FUTEX in io_uring
d483f034f03261c8c8450d106aa243837122b5f0 # usb:dwc2: caused a regression on RPi3 (bsc#1232342)
9c82169208dde516510aaba6bbd8b13976690c5d # We don't enable SMACK
ac02f007d64eb2769d0bde742aac4d7a5fc6e8a5 # We don't enable SMACK
a5e61b50c9f44c5edb6e134ede6fee8806ffafa9 # We don't enable DRBD
2f02b5af3a4482b216e6a466edecf6ba8450fa45 # We don't enable DRBD
f9e28904e6442019043a8e94ec6747a064d06003 # f2fs fix, not supported/compiled
9f0c4a46be1fe9b97dbe66d49204c1371e3ece65 # f2fs fix, not supported/compiled
aaf8c0b9ae042494cb4585883b15c1332de77840 # f2fs fix, not supported/compiled
cb5b81bc9a448f8db817566f60f92e2ea788ea0f # a fix for 9b9879fc0327 ("modules: catch concurrent module loads, treat them as idempotent") which is not taken
db63d9868f7f310de44ba7bea584e2454f8b4ed0 # CVE-2024-50057 bsc#1232393: not applicable, code does not exist
9e2f9d34dd12e6e5b244ec488bcebd0c2d566c50 # CVE-2024-47736 fuzzer/crafted image fix for erofs (unsupported)
160e9d2752181fcf18c662e74022d77d3164cd45 # CVE-2024-38612 bsc#1226855: not affected, the patch as is changes nothing in our code
e675a4fd6d1f8990d3bed5dada3d20edfa000423 # requires newer patch series not present
55fdc1c24a1d6229fe0ecf31335fb9a2eceaaa00 # CVE-2023-52682 CONFIG_F2FS_FS disabled
f803982190f0265fd36cf84670aa6daefc2b0768 # CVE-2023-52770 CONFIG_F2FS_FS disabled
3f489c2067c5824528212b0fc18b28d51332d906 # CVE-2023-52438 CONFIG_ANDROID_BINDER_IPC disabled
420370f3ae3d3b883813fd3051a38805160b2b9f # CVE-2023-52677 riscV unsupported
b0327c84e91a0f4f0abced8cb83ec86a7083f086 # CVE-2023-52852 CONFIG_F2FS_FS disabled
f0eee815babed70a749d2496a7678be5b45b4c14 # CVE-2023-52499 CONFIG_PPC32 disabled
45120b15743fa7c0aa53d5db6dfb4c8f87be4abd # CVE-2023-52560 CONFIG_DAMON disabled
c6e316ac05532febb0c966fa9b55f5258ed037be # CVE-2023-52797 riscV specific
53edb549565f55ccd0bdf43be3d66ce4c2d48b28 # CVE-2023-52444 CONFIG_F2FS_FS disabled
9a9ab0d963621d9d12199df9817e66982582d5a5 # CVE-2023-52609 CONFIG_ANDROID_BINDER_IPC disabled
36a87385e31c9343af9a4756598e704741250a67 # CVE-2024-26588 LoongArch unsupported
38d20c62903d669693a1869aa68c4dd5674e2544 # CVE-2024-26592 CONFIG_SMB_SERVER disabled
97830f3c3088638ff90b20dfba2eb4d487bf14d7 # CVE-2024-26606 CONFIG_ANDROID_BINDER_IPC disabled
ebeae8adf89d9a82359f6659b1663d09beec2faa # CVE-2024-26608 CONFIG_SMB_SERVER disabled
37e8c97e539015637cb920d3e6f1e404f707a06e # CVE-2024-26707 bsc#1222421 comment 4
aaef73821a3b0194a01bd23ca77774f704a04d40 # CVE-2024-26926 CONFIG_ANDROID_BINDER_IPC disabled
1983184c22dd84a4d95a71e5c6775c2638557dc7 # CVE-2024-26987 bsc#1223672 comment 1
b896e302f79678451a94769ddd9e52e954c64fbb # CVE-2024-27033 CONFIG_F2FS_FS disabled
fd244524c2cf07b5f4c3fe8abd6a99225c76544b # CVE-2024-27034 CONFIG_F2FS_FS disabled
8a430dd49e9cb021372b0ad91e60aeef9c6ced00 # CVE-2024-27035 CONFIG_F2FS_FS disabled
ed8b94f6e0acd652ce69bd69d678a0c769172df8 # CVE-2024-26713 CONFIG_PPC32 and KASAN not enabled
1fba2bf8e9d5a27b7394856181b6200de7260b79 # reverts ed8b94f6e0acd652ce69bd69d678a0c769172df8
a11dd49dcb9376776193e15641f84fcc1e5980c9 # CVE-2024-26795 riscV unsupported
17ef8efc00b34918b966388b2af0993811895a8c # CVE-2024-27390 bsc#1223707 comment 5
d380ce70058a4ccddc3e5f5c2063165dc07672c6 # CVE-2024-27419 bsc#1224759 comment 7
2f6d721e14b69d6e1251f69fa238b48e8374e25f # CVE-2024-35844 CONFIG_F2FS_FS disabled
d14fa1fcf69db9d070e75f1c4425211fa619dfc8 # CVE-2024-35871 riscV unsupported
aea702dde7e9876fb00571a2602f25130847bf0f # CVE-2024-35987 riscV unsupported
6065e736f82c817c9a597a31ee67f0ce4628e948 # CVE-2024-35988 riscV unsupported
f8aa1b98ce40184521ed95ec26cc115a255183b2 # CVE-2024-38561 kunit test
791f4641142e2aced85de082e5783b4fb0b977c2 # CVE-2024-38585 bsc1226778 comment 2
d301a71c76ee4c384b4e03cdc320a55f5cf1df05 # CVE-2024-38607 CONFIG_ADB_MACII disabled
da89ce46f02470ef08f0f580755d14d547da59ed # CVE-2024-38613 m68k unsupported
c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f # CVE-2024-38614 openrisc unsupported
b3dc6e8003b500861fa307e9a3400c52e78e4d3a # CVE-2024-33621 bsc#1226770 comment 3
3ebc46ca8675de6378e3f8f40768e180bb8afa66 # CVE-2024-37356 bsc#1226833 comment 2
1997cdc3e727526aa5d84b32f7cbb3f56459b7ef # CVE-2024-38623 CONFIG_NTFS3_FS disabled
e931f6b630ffb22d66caab202a52aa8cbb10c649 # CVE-2024-38624 CONFIG_NTFS3_FS disabled
1cd6c96219c429ebcfa8e79a865277376c563803 # CVE-2024-38625 CONFIG_NTFS3_FS disabled
a1ba19a1ae7cd1e324685ded4ab563e78fe68648 # CVE-2024-38637 CONFIG_GREYBUS disabled
29ed2b5dd521ce7c5d8466cd70bf0cc9d07afeee # CVE-2024-33847 CONFIG_F2FS_FS disabled
0a4ed2d97cb6d044196cc3e726b6699222b41019 # CVE-2024-34027 CONFIG_F2FS_FS disabled
a638b0461b58aa3205cd9d5f14d6f703d795b4af # CVE-2024-38667 riscV unsupported
a0fbbd36c156b9f7b2276871d499c9943dfe5101 # CVE-2024-39292 UML unsupported
fb1cf0878328fe75d47f0aed0a65b30126fcefc4 # CVE-2024-40915 riscV unsupported
ce5cdd3b05216b704a704f466fb4c2dff3778caf # CVE-2024-40963 mips unsupported
1723f04caacb32cadc4e063725d836a0c4450694 # CVE-2024-41027 only WARN_ON
a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 # CVE-2024-41034 CONFIG_NILFS2_FS disabled
e1533b6319ab9c3a97dad314dd88b3783bc41b69 # CVE-2024-41046 CONFIG_LANTIQ_ETOP disabled
c562ba719df570c986caf0941fea2449150bcbc4 # CVE-2024-42140 riscV unsupported
0c710050c47d45eb77b28c271cddefc5c785cb40 # CVE-2024-42267 riscV unsupported
2fef55d8f78383c8e6d6d4c014b9597375132696 # CVE-2024-42299 CONFIG_NTFS3_FS disabled
d659b715e94ac039803d7601505d3473393fc0be # CVE-2024-42317 bsc#1229352 comment 3
120f1c857a73e52132e473dee89b340440cb692b # CVE-2024-42321 bsc#1229348 comment 2
298b1e4182d657c3e388adcc29477904e9600ed5 # CVE-2024-43859 CONFIG_F2FS_FS disabled
fb197c5d2fd24b9af3d4697d0cf778645846d6d5 # CVE-2024-43868 riscV unsupported
3eb3cd5992f7a0c37edc8d05b4c38c98758d8671 # CVE-2024-44966 CONFIG_BINFMT_FLAT disabled
4df153652cc46545722879415937582028c18af5 # CVE-2024-46740 CONFIG_ANDROID_BINDER_IPC disabled
78c5a6f1f630172b19af4912e755e1da93ef0ab5 # CVE-2024-46795 CONFIG_SMB_SERVER disabled
930c6ab93492c4b15436524e704950b364b2930c # CVE-2024-47689 CONFIG_F2FS_FS disabled
884ee6dc85b959bc152f15bca80c30f06069e6c4 # CVE-2024-47690 CONFIG_F2FS_FS disabled
c7f114d864ac91515bb07ac271e9824a20f5ed95 # CVE-2024-47691 CONFIG_F2FS_FS disabled
4f5a100f87f32cb65d4bb1ad282a08c92f6f591e # CVE-2024-47740 CONFIG_F2FS_FS disabled
9c936844010466535bd46ea4ce4656ef17653644 # CVE-2024-49856 bsc#1232202 comment 1
59090e479ac78ae18facd4c58eb332562a23020e # CVE-2024-49885 bsc#1232197 comment 1
45c0de18ff2dc9af01236380404bbd6a46502c69 # CVE-2024-49997 CONFIG_LANTIQ_ETOP disabled
d33d26036a0274b472299d7dcdaa5fb34329f91b # CVE-2024-46829 bsc#1231123 comment 1
e4d2102018542e3ae5e297bc6e229303abff8a0f # CVE-2024-50072 bsc#1232513 comment 3
dfe6c5692fb525e5e90cefe306ee0dffae13d35f # ocfs2: caused issue in bsc#1233255
57b56d16800e8961278ecff0dc755d46c4575092 # rebinding is privileged, race is rare
3cc4e13bb1617f6a13e5e6882465984148743cf4 # theoretical bug fix
3840cbe24cf060ea05a585ca497814609f5d47d1 # non-critical impact, may be added upon a PSI user request, unneeded now
e2226dbc4a4919d9c8bd9293299b532090bdf020 # CONFIG_HOTPLUG_PCI_COMPAQ=n
b1e31c134a8ab2e8f5fd62323b6b45a950ac704d # no Cell support
fed13a5478680614ba97fc87e71f16e2e197912e # CVE-2024-50277 bsc#1233466: not applicable
484fd6c1de13b336806a967908a927cc0356e312 # Got reverted by c77194965dd0dcc26f9c1671d2e74e4eb1248af5
2331fd4a49864e1571b4f50aa3aa1536ed6220d0 # Problems on corrupted ext4 filesystem
68ee261fb15457ecb17e3683cb4e6a4792ca5b71 # Cosmetic: Add info about corrupted groups
9e8e819f8f272c4e5dcd0bd6c7450e36481ed139 # Just sanity checks for values written to sysfs
2f3d93e210b9c2866c8b3662adae427d5bf511ec # Issue in ext4 read fault injection
249f374eb9b6b969c64212dd860cc1439674c4a8 # Just code cleanup
a898cb621ac589b0b9e959309689a027e765aa12 # Hardening against corrupted quota files
38f8af2a7191e5da21c557210d810c6d0d34f6c4 # Just small code improvement
db6754090a4f99c67e05ae6b87343ba6e013531f # Folio conversion
d3476f3dad4ad68ae5f6b008ea6591d1520da5d8 # CVE-2024-50191 bsc#1233101 comment 3
c1ccfcf1a9bf3630fc4739713df6e62bb524c42c # reverted bsc#1233837
fe0e9580e2d4d136d40d03bcdb19a0a2b03a11d9 # reverted bsc#1233837
31e03207119a535d0b0e3b3a7f91983aeb2cb14d # data race, dropabble if prereq
97e1db06c7bb948da10ba85acad8030b56886593 # data race, dropabble if prereq
942238f9735a4a4ebf8274b218d9a910158941d1 # data race, dropabble if prereq
3a0f38eb285c8c2eead4b3230c7ac2983707599d # data race, dropabble if prereq
eb0718fb3e97ad0d6f4529b810103451c90adf94 # data race, dropabble if prereq
a9bf9c7dc6a5899c01cb8f6e773a66315a5cd4b7 # data race, dropabble if prereq
1b536948e805aab61a48c5aa5db10c9afee880bd # data race, dropabble if prereq
8a34d4e8d9742a24f74998f45a6a98edd923319b # data race, dropabble if prereq
0aa3be7b3e1f8f997312cc4705f8165e02806f8f # data race, dropabble if prereq
b0632e53e0da8054e36bc973f0eec69d30f1b7c6 # data race, dropabble if prereq
bd9f2d05731f6a112d0c7391a0d537bfc588dbe6 # data race, dropabble if prereq
efaf24e30ec39ebbea9112227485805a48b0ceb1 # data race, dropabble if prereq
50ec499b9a43e46200c9f7b7d723ab2e4af540b3 # not a bugfix
f9436a5d0497f759330d07e1189565edd4456be8 # not a bugfix
520713a93d550406dae14d49cdb8778d70cecdfd # not a bugfix, KABI fingerprint
db3a397209b00d2e4e0a068608e5c546fc064b82 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
62d65cac119d08d39f751b4e3e2063ed996edc05 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
fc4561226feaad5fcdcb55646c348d77b8ee69c5 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
f49f950c217bfb40f11662bab39cb388d41e4cfb # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
b0f7e2d739b4aac131ea1662d086a07775097b05 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
493ec81a8fb8e4ada6f223b8b73791a1280d4774 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
8186fff7ab649085e2c60d032d9a20a85af1d87c # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
e109deadb73318cf4a3bd61287d969f705df278f # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
704f960dbee2f1634f4b4e16f208cb16eaf41c1e # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
1de94b52d5e8d8b32f0252f14fad1f1edc2e71f1 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
53c41052ba3121761e6f62a813961164532a214f # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
1057066009c4325bb1d8430c9274894d0860e7c3 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
5a49f996046ba947466bc7461e4b19c4d1daf978 # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
264424dfdd5cbd92bc5b5ddf93944929fc877fac # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
c3137ab6318d56370dd5541ebf027ddfc0c8557c # a patch for c1504e510238 ("eventfs: Implement eventfs dir creation functions") and related eventfs functionality which is not present
7e37b6bc3cc096e24709908076807bb9c3cf0d38 # a comment-only fix for 334e5519c375 ("tracing/probes: Add fprobe events for tracing function entry and exit.") which was not taken
25f00e40ce7953db197af3a59233711d154c9d80 # new feature, not a bug fix
035ba76014c096316fa809a46ce0a1b9af1cde0d # a preparatory patch for 25f00e40ce79 ("tracing/probes: Support $argN in return probe (kprobe and fprobe)") which was not taken
bb9025f4432f8c158322cf2c04c2b492f23eb511 # CONFIG_DMA_MAP_BENCHMARK is not set anywhere
f7c9ccaadffd13066353332c13d7e9bf73b8f92d # CONFIG_DMA_MAP_BENCHMARK is not set anywhere
54624acf8843375a6de3717ac18df3b5104c39c5 # CONFIG_DMA_MAP_BENCHMARK is not set anywhere
fb5a4315591dae307a65fc246ca80b5159d296e1 # CONFIG_DMA_API_DEBUG is not set anywhere
5935b8377a0f3b2401e4e487336ed90fe6b9254d # comment only
a07d2d7930c75e6bf88683b376d09ab1f3fed2aa # An ABI-only change without further impact on supported architectures. ("io_uring: Change res2 parameter type in io_uring_cmd_done")
f8c989a0c89a75d30f899a7cabdc14d72522bb8d # Reverted upstream
5208e7ced520a813b4f4774451fbac4e517e78b2 # CONFIG_SERIAL_8250_PXA=n
7cc0e0a43a91052477c2921f924a37d9c3891f0c # CONFIG_SERIAL_SH_SCI=n
e6a46d073e11baba785245860c9f51adbbb8b68d # not needed (different backport)
9a884bdb6e9560c6da44052d5248e89d78c983a6 # iio/af8133j doesn't exist on SP6
3dd075fe8ebbc6fcbf998f81a75b8c4b159a6195 # media/uvc: reverted due to regression (bsc#1235894)
897df60c16d54ad515a3d0887edab5c63da06d1f # CVE-2024-57872 bsc#1235817: not applicable
2e2e5143d4868163d6756c8c6a4d28cbfa5245e5 # we don't support 32bit
dc81e556f2a017d681251ace21bf06c126d5a192 # FRED not supported
1c0844c6184e658064e14c4335885785ad3bf84b # CVE-2024-56544 bsc#1235067: not applicable
22e87bf3f77c18f5982c19ffe2732ef0c7a25f16 # CVE-2024-56742 bsc#1235613: not applicable, code does not exist
9d938f40b228a18a9521936337f2da7f393d5120 # Code not present
7246a4520b4bf1494d7d030166a11b5226f6d508 # pci: reverted in 6.6.x stable
bcb9678b1c4f70b9545655b6d41bdb6d0462f281 # pci: reverting the above
eb9640fd1ce666610b77f5997596e9570a36378f # CVE-2024-56671 bsc#1235018: not applicable, code does not exist
2b0f2fc9ed62e73c95df1fa8ed2ba3dac54699df # CVE-2024-56591 bsc#1235052: not applicable
7d49f53af4b988b188d3932deac2c9c80fd7d9ce # rust config
8933cf4651e02853ca679be7b2d978dfcdcc5e0c # rust config
9e98db17837093cb0f4dcfcc3524739d93249c45 # rust config
5ce86c6c861352c9346ebb5c96ed70cb67414aa3 # rust config
aacf93e87f0d808ef46e621aa56caea336b4433c # rust config
4a49194f587a62d972b602e3e1a2c3cfe6567966 # CVE-2024-56782 bsc#1235629: not applicable, code does not exist
93d883f89063744a92006fc356b1c767eb62d950 # 256867b74625 not present
229e6ee43d2a160a1592b83aad620d6027084aad # CVE-2024-56568 bsc#1235032: reverted upstream
8977b561216c7e693d61c6442657e33f134bfeb5 # Cosmetic cleanup that changes config options
d06923670b5a5f609603d4a9fee4dec02d38de9c # ("nvme: make keep-alive synchronous operation")
599d9f3a10eec69ef28a90161763e4bd7c9c02bf # ("nvme: use helper nvme_ctrl_state in nvme_keep_alive_finish function")
84488282166de6b6760ada8030e87aaa08bce3aa # ("Revert "nvme: make keep-alive synchronous operation"")
df5f6f2f62b9b50cef78f32909485b00fc7cf7f2 # No file to patch. Skipping patch.
5f1017069933489add0c08659673443c9905659e # CONFIG_SERIAL_SH_SCI=n
651dee03696e1dfde6d9a7e8664bbdcd9a10ea7f # CONFIG_SERIAL_SH_SCI=n
84bfbfbbd32aee136afea4b6bf82581dce79c305 # cleanup designed to break kABI
71c717cd8a2e180126932cc6851ff21c1d04d69a # breaker commit 86b20af11e84c26ae3fde4dcc4f490948e3f8035 merged only in v6.8
60dc5ea6bcfd078b71419640d49afa649acf9450 # does not apply
6a78699838a0ddeed3620ddf50c1521f1fe1e811 # does not apply
be0e822bb3f5259c7f9424ba97e8175211288813 # fix uses kAPIs not present, can't compile
72d04bdcf3f7d7e07d82f9757946f68802a7270a # changes kABI for theoretical issue
99333229dee41b992f3b0493f6aa2e3528138384 # obscure conditions under stress test, we'd better fix stop_machine
f06e108a3dc53c0f5234d18de0bd224753db5019 # we don't build with buggy llvm
f337a6a21e2fd67eadea471e93d05dd37baaa9be # CONFIG_SPECULATION_MITIGATIONS=y
7fa0da5373685e7ed249af3fa317ab1e1ba8b0a6 # breaks kABI, only a cleanup
b455f39d228935f88eebcd1f7c1a6981093c6a3b # refactoring
21528c69a0d8483f7c6345b1a0bc8d8975e9a172 # minor bug, would have been reported if it mattered
68fb3ca0e408e00db1c3f8fccdfa19e274c033be # we still have gcc < 11
dbb1f9c03bad116ce771d0b3335ca55b1387cf78 # kdb: unused code removal
a029a219385cfdf9c43fb1ef9eb49d173773388f # kdb: unused code removal
58329c4312031603bb1786b44265c26d5065fe72 # likely lockdep false positive only, https://lore.kernel.org/r/Zg0jEu5OsZaUFzn0@gondor.apana.org.au/
8d28d0ddb986f56920ac97ae704cc3340a699a30 # CVE-2025-21712 bsc#1237886: code to be patched not present
46e1879deea22eed31e9425d58635895fc0e8040 # clang-only
bee08a9e6ab03caf14481d97b35a258400ffab8f # clang-only
d677ce521334d8f1f327cafc8b1b7854b0833158 # clang-only
654292a0b264e9b8c51b98394146218a21612aa1 # fixed by another patch
72cf9e94f32fc18096be3cc21216a78f50220e03 # unsupported feature (WSL on cifs)
ef201e8759d20bf82b5943101147072de12bc524 # unsupported feature (WSL on cifs)
5c8f9a05336cf5cadbd57ad461621b386aadb762 # No file to patch. Skipping patch.
a6a7cba17c544fb95d5a29ab9d9ed4503029cb29 # No file to patch. Skipping patch.
5ae4dca718eacd0a56173a687a3736eb7e627c77 # uart5 not enabled in px30-ringneck, as of now
65ac33bed8b9255213b08ed153dbe9c0ca3535e6 # Not needed for SP6. No code to change.
ad7c3c0cb8f61d6d5a48b83e62ca4a9fd2f26153 # not a bug fix, just a minor cleanup, doesn't apply
b69bb476dee99d564d65d418e9a20acca6f32c3f # breaks kABI
3c2f8859ae1ce53f2a89c8e4ca4092101afbff67 # unneeded preparation patch
7a4dcb4a5de1214c4a59448a759e2e264c2c4473 # "No functional change."
46faf9d8e1d52e4a91c382c6c72da6bd8e68297b # prereq for 1612160b91272f5b1596f499584d6064bf5be794
5c0e00a391dd0099fe95991bb2f962848d851916 # acpi:GHES: changing the reboot-on-panic behavior (bsc#1239615)
3708c7269593b836b1d684214cd9f5d83e4ed3fd # only for CONFIG_DM_VERITY=y
6e5f0f6383b4896c7e9b943d84b136149d0f45e9 # breaks KABI, feature
3d1b6c9d47707d6a0f80bb5db6473b1f107b5baf # feature, not fix
6a4e59eeedc3018cb57722eecfcbb49431aeb05f # cleanup breaking kABI
473a45bb35f080e31cb4fe45e905bfe3bd407fdf # cleanup breaking kABI
48cd8df7afd1eef22cf7b125697a6d7c3d168c5c # cleanup breaking kABI
a3df1526da480c089c20868b7f4d486b9f266001 # cleanup breaking kABI
3ada34b0f6559b2388f1983366614fbe8027b6fd # cleanup breaking kABI
5087fd9e80e539d2163accd045b73da64de7de95 # cleanup breaking kABI
899f44531fe6cac4b024710fec647ecc127724b8 # breaks kABI, fixes a corner case
8d74f1da776da9b0306630b13a3025214fa44618 # only for CONFIG_PM_SLEEP=n
f7edb07ad7c66eab3dce57384f33b9799d579133 # Wrong Fixes: tag. See bsc#1239601
38f4aa34a5f737ea8588dac320d884cc2e762c03 # No file to patch. Skipping patch.
659f5d55feb75782bd46cf130da3c1f240afe9ba # PD 2.0 not supported in SP6
566ffa3ae9649f7aa1debcf559ee7e26ed4a110f # fixed in a different commit
76f970ce51c80f625eb6ddbb24e9cb51b977b598 # effective only with CONFIG_SCHED_AUTOGROUP=y in sched_autogroup_exit_task
5daa0c35a1f0e7a6c3b8ba9cb721e7d1ace6e619 # rust
901b3290bd4dc35e613d13abd03c129e754dd3dd # rust and vsprintf binding
d6834d9c990333bfa433bc1816e2417f268eebbe # obscure conditions under stress test, privileged interfaces
9f01b4954490d4ccdbcc2b9be34a9921ceee9cbb # not needed until someone complains about mismatch stats or memleak
7c4e39f9d2af4abaf82ca0e315d1fd340456620f # CVE-2024-56581 bsc#1235124: not applicable, config disabled
8fbb9376f0c489dfdc7e20d16e90686b29dec8f2 # No file to patch. Skipping patch.
eefa72a15ea03fd009333aaa9f0e360b2578e434 # CONFIG_NVME_APPLE not enabled
3c936e0ec0e412a3ce6072883da8682fb723d573 # too intrusive
c08b0f2c317223fa702616dfa77f10a92b7b34b2 # cleanup
2790ce23951f0c497810c44ad60a126a59c8d84c # CONFIG_SERIAL_STM32=n
a2fa5f96140e30d5ff47c92c5164e0256d92c794 # resizable bars not supported yet
9d52691f899b843d1e0afa8fca19496ace76b8c7 # only_64bit not supported yet
f44bff19268517ee98e80e944cad0f04f1db72e3 # unnecessary in our configs, but breaks kABI
9ac4b58fcef0f9fc03fa6e126a5f53c1c71ada8a # cleanup breaking kABI
9876cfe8ec1cb3c88de31f4d58d57b0e7e22bcc4 # good, maybe take when someone reports issues with the ratchet semantics, user visible change
479380efe1625e251008d24b2810283db60d6fcd # PCI: causing a regression with VFIO (bsc#1241123)
bc0b828ef6e561081ebc4c758d0c4d166bb9829c # PCI: reverting the above
5550187c4c21740942c32a9ae56f9f472a104cb4 # We don't support rust
750d4fbe2c20e65d764c70afe2c9e6cfa874b044 # git-fix breaks kABI for hisi_sas, no easy workaround. Not a bug fix.
841df27d619ee1f5ca6473e15227b39d6136562d # git-fix break kABI. Just adds debugfs functionality
32e9ad4d11f69949ff331e35a417871ee0d31d99 # git-fix requires infrastructure not present
777d0961ff95b26d5887fdae69900374364976f3 # git-fix not applicable
6ee6bd5d4fce502a5b5a2ea805e9ff16e6aa890f # git-fix not applicable: changes code not present
f92f0a1b05698340836229d791b3ffecc71b265a # Tweaking return value of openat2 in case of error
ebf6cb7c6e1241984f75f29f1bdbfa2fe7168f88 # Code cleanup
b898ab233611f7903d88c0b10f8145e1c15d3642 # This is from new timestamp handling series (requires 077c212f0344 ("fs: new accessor methods for atime and mtime")
4d5cdd757d0c74924b629559fccb68d8803ce995 # Folio conversion
ea4fd933ab4310822e244af28d22ff63785dea0e # Code cleanup
368a83cebbb949adbcc20877c35367178497d9cc # Performance optimization in ext4 defrag code
a40759fb16ae839f8c769174fde017564ea564ff # Code cleanup
902cc179c931a033cd7f4242353aa2733bf8524c # Theoretical data-race issue
522249f05c5551aec9ec0ba9b6438f1ec19c138d # New fanotify functionality
8897277acfef7f70fdecc054073bea2542fc7a1b # New functionality to support order-1 folios in the page cache
9e28059d56649a7212d5b3f8751ec021154ba3dd # Not easily applicable ext4 casefolding fix
08c50142a128dcb2d7060aa3b4c5db8837f7a46a # git-fix changes kabi for refactoring
cd5fc653381811f1e0ba65f5d169918cab61476f # git-fix changes kabi for optimation that fixes nothing
4f0e7d0e03b7b80af84759a9e7cfb0f81ac4adae # git-fix changes kabi for cleanup
b75439c945b94dd8a2b645355bdb56f948052601 # CVE-2024-57984 bsc#1237909: not applicable
a4aebe936554dac6a91e5d091179c934f8325708 # Keep 'Status quo' for released products
8cca35cb29f81eba3e96ec44dad8696c8a2f9138 # CVE-2024-48875 https://bugzilla.suse.com/show_bug.cgi?id=1235725#c2
b16d76fe9a27d337c16972a71d959bcf0c96c2e6 # Already applied
2200c1a87074548f0a36e5aae5ad283ce2ac43b2 # Already applied
7301034026d0efe0e86af0cb685405da120583d4 # Already applied
e36a93e1723eb09c8393604ddc8ef2966f592597 # Already applied
d931cf9b38da0f533cacfe51c863a9912e67822f # Wrong fixes tag
d0831edcd87ee4cbf1b8cc5669d9d07c71577477 # cleanup requiring prereq patches not in SLE15-SP6
838f865802b9f26135ea7df4e30f89ac2f50c23e # likely breakes kABI, not needed
7a2369b74abf76cd3e54c45b30f6addb497f831b # defconfig change
7e67ef889c9ab7246547db73d524459f47403a77 # fix for unupported hardware
29bdc1f1c1df80868fb35bc69d1f073183adc6de # fix for unused config
882b25af265de8e05c66f72b9a29f6047102958f # ! SMP
4496e1c1354bd4837bcc1414f6e1a4d042857903 # crash dump config change
75ad02318af2e4ae669e26a79f001bd5e1f97472 # not applicable
f806de88d8f7f8191afd0fd9b94db4cd058e7d4f # debug config specific that we don't enable
1b0449544c6482179ac84530b61fc192a6527bfd # CVE-2025-37834 https://bugzilla.suse.com/show_bug.cgi?id=1242925#c1
f1c6be3999d2be2673a51a9be0caf9348e254e52 # amdgpu: causes a regression (bsc#1243782)
cfb2d41831ee5647a4ae0ea7c24971a92d5dfa0d # amdgpu: the cherry-picked of the above
de9df030ccb5d3e31ee0c715d74cd77c619748f8 # not a fix
fe7f7ac8e0c708446ff017453add769ffc15deed # cleanup that breaks kABI
7601df8031fd67310af891897ef6cc0df4209305 # CVE-2024-26686 https://bugzilla.suse.com/show_bug.cgi?id=1222436#c4
dd89a81d850fa9a65f67b4527c0e420d15bf836c # CVE-2024-44940 https://bugzilla.suse.com/show_bug.cgi?id=1229834#c1
c382e2e3eccb6b7ca8c7aff5092c1668428e7de6 # CVE-2024-42128 https://bugzilla.suse.com/show_bug.cgi?id=1228684#c1
efc347b9efee1c2b081f5281d33be4559fa50a16 # CVE-2024-42129 https://bugzilla.suse.com/show_bug.cgi?id=1228681#c2
0d196e7589cefe207d5d41f37a0a28a1fdeeb7c6 # CVE-2024-50010 https://bugzilla.suse.com/show_bug.cgi?id=1232388#c3
0664e2c311b9fa43b33e3e81429cd0c2d7f9c638 # CVE-2024-56583 https://bugzilla.suse.com/show_bug.cgi?id=1235118#c2
1671bcfd76fdc0b9e65153cf759153083755fe4c # Isn't very relevant to our use cases, breaks kABI
03b123debcbc8db987bda17ed8412cc011064c22 # cleanup, breaks kABI
18429e6e0c2ad26250862a786964d8c73400d9a0 # part of series, breaks kABI silently
ee62ce7a1d909ccba0399680a03c2dee83bcae95 # too intrusive, breaks kABI
26c29961b142444cd99361644c30fa1e9b3da6be # syzkaller panic_on_warn improvement
a7ed3465daa240bdf01a5420f64336fee879c09d # fortify fixes for gcc 13 (thus not relevant for SLE15-SP6)
1d55a6974756cf3979efd2cc68bcece611a44053 # Not a fix, intrusive
86e8921df05c6e9423ab74ab8d41022775d8b83a # Not a fix, intrusive
af0cb3fa3f9ed258d14abab0152e28a0f9593084 # lockdep fix
0bb2f7a1ad1f11d861f58e5ee5051c8974ff9569 # CVE-2025-23143: lockdep fix
d7b98ae5221007d3f202746903d4c21c7caf7ea9 # warning fix for configuration we don't build
e52c1dc7455d32c8a55f9949d300e5e87d011fa6 # we don't have fineibt
830802a0fea8fb39d3dc9fb7d6b5581e1343eb1f # CVE-2024-49927 https://bugzilla.suse.com/show_bug.cgi?id=1232249#c1
59d9094df3d79443937add8700b2ef1a866b1081 # CVE-2024-57883 https://bugzilla.suse.com/show_bug.cgi?id=1235947#c2
3db42c75a921854a99db0a2775814fef97415bac # CVE-2025-37883 https://bugzilla.suse.com/show_bug.cgi?id=1243050#c1
6ea14ccb60c8ab829349979b22b58a941ec4a3ee # CVE-2024-44983 https://bugzilla.suse.com/show_bug.cgi?id=1230239#c2
9366922adc6a71378ca01f898c41be295309f044 # CVE-2024-46711 https://bugzilla.suse.com/show_bug.cgi?id=1230542#c2
101c268bd2f37e965a5468353e62d154db38838e # CVE-2024-50226 https://bugzilla.suse.com/show_bug.cgi?id=1233195#c4
4ce1f56a1eaced2523329bef800d004e30f2f76c # CVE-2024-50259 https://bugzilla.suse.com/show_bug.cgi?id=1233214#c7
b81679b1633aa43c0d973adfa816d78c1ed0d032 # CVE-2025-21907 https://bugzilla.suse.com/show_bug.cgi?id=1240588#c2
9bf93dcfc453fae192fe5d7874b89699e8f800ac # CVE-2024-36023 https://bugzilla.suse.com/show_bug.cgi?id=1225701#c2
48a2440d0f20c826b884e04377ccc1e4696c84e9 # CVE-2024-50193 not applicable to any code stream - https://bugzilla.suse.com/show_bug.cgi?id=1233102#c2
aec8e6bf839101784f3ef037dcdb9432c3f32343 # CVE-2024-50217 not applicable to any code stream - https://bugzilla.suse.com/show_bug.cgi?id=1233194#c4
a98b7761f697e590ed5d610d87fa12be66f23419 # CVE-2024-53145 not applicable to any code stream - https://bugzilla.suse.com/show_bug.cgi?id=1234831#c4
ade81479c7dda1ce3eedb215c78bc615bbd04f06 # CVE-2024-57977 https://bugzilla.suse.com/show_bug.cgi?id=1238520#c1
abe4eaa8618bb36c2b33e9cdde0499296a23448c # CVE-2023-52633 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1222263#c1
315552310c7de92baea4e570967066569937a843 # CVE-2023-52596 https://bugzilla.suse.com/show_bug.cgi?id=1221047#c2
b513d30d59bb383a6a5d6b533afcab2cee99a8f8 # CVE-2024-26842 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1223013#c20
ff2e185cf73df480ec69675936c4ee75a445c3e4 # CVE-2024-40974 https://bugzilla.suse.com/show_bug.cgi?id=1227892#c4
2c49908634a2b97b1c3abe0589be2739ac5e7fd5 # CVE-2024-41067 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1227867#c32
e60adf513275c3a38e5cb67f7fd12387e43a3ff5 # CVE-2024-42067 https://bugzilla.suse.com/show_bug.cgi?id=1228670#c3
db5247d9bf5c6ade9fd70b4e4897441e0269b233 # CVE-2024-42135 https://bugzilla.suse.com/show_bug.cgi?id=1228765#c5
7ae04ba36b381bffe2471eff3a93edced843240f # CVE-2024-44949 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1230167#c1
1c682593096a487fd9aebc079a307ff7a6d054a3 # CVE-2024-44957 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1230187#c2
611ff1b1ae989a7bcce3e2a8e132ee30e968c557 # CVE-2024-46762 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1230799#c5
4e2524ba2ca5f54bdbb9e5153bea00421ef653f5 # CVE-2024-49889 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1232215#c1
fd70e9f1d85f5323096ad313ba73f5fe3d15ea41 # CVE-2024-49926 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1232247#c2
824ac4a5edd3f7494ab1996826c4f47f8ef0f63d # CVE-2024-46844 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1231090#c1
3267cb6d3a174ff83d6287dcd5b0047bbd912452 # CVE-2024-50112 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1232867#c1
51b39d741970742a5c41136241a9c48ac607cf82 # CVE-2024-53181 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1234945#c1
d1db692a9be3b4bd3473b64fcae996afaffe8438 # CVE-2024-53183 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1234951#c1
5bee35e5389f450a7eea7318deb9073e9414d3b1 # CVE-2024-53184 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1234953#c1
cf89c9434af122f28a3552e6f9cc5158c33ce50a # CVE-2024-56781 https://bugzilla.suse.com/show_bug.cgi?id=1235655#c1
6aacd1484468361d1d04badfe75f264fa5314864 # CVE-2024-57843 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1235816#c2
d7cb6d7414ea1b33536fa6d11805cb8dceec1f97 # CVE-2024-57875 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1235820#c2
887c5c12e80c8424bd471122d2e8b6b462e12874 # CVE-2025-37880 not applicable https://bugzilla.suse.com/show_bug.cgi?id=1243089#c1
52323ed1444ea5c2a5f1754ea0a2d9c8c216ccdf # CVE-2025-37745 https://bugzilla.suse.com/show_bug.cgi?id=1242853#c1
c879a8c39dd55e7fabdd8d13341f7bc5200db377 # cleanup breaking kABI
f101c56447717c595d803894ba0e215f56c6fba4 # Keep current CONFIG_ARCH_MMAP_RND_BITS_MAX=14 and not new CONFIG_ARCH_MMAP_RND_BITS_MAX=29
e34f1717ef0632fcec5cb827e5e0e9f223d70c9b # cleanup breaking kABI
c2c707bd45426df6edc5cf9f5f9fd857bd9926a9 # cleanup
f92bb7436802f8eb7ee72dc911a33c8897fde366 # CVE-2025-37977 bsc#1243510
cd3c93167da0e760b5819246eae7a4ea30fd014b # refactoring, also 20250611131241.6ff7cf5d@kernel.org
ee62ce7a1d909ccba0399680a03c2dee83bcae95 # mostly only required for broken hardware, also see 20250611131241.6ff7cf5d@kernel.org
47410d839fcda6890cb82828f874f97710982f24 # we don't have execmem
0b0cae7119a0ec9449d7261b5e672a5fed765068 # we don't need this rework
7cd9a11dd0c3d1dd225795ed1b5b53132888e7b5 # we don't have execmem
fc56878ca1c288e49b5cbb43860a5938e3463654 # build warning fix for CONFIG_BRIDGE_NETFILTER=n
e28acc9c1ccfcb24c08e020828f69d0a915b06ae # fix for ipmr under lockdep
50f37fc2a39c4a8cc4813629b4cf239b71c6097d # build warning fix for CONFIG_IPV6=n
149dfb31615e22271d2525f078c95ea49bc4db24 # intrusive refactoring
a18dfa9925b9ef6107ea3aa5814ca3c704d34a8a # needs prereq patches, not really needed, causes regression (see bsc#1244313)
c51db4ac10d57c366f9a92121e3889bfc6c324cd # only removes export, breaks kABI
1eeb5043573981f3a1278876515851b7f6b1df1b # optimization, breaks kABI
7a596a50c4a4eab946aec149171c72321b4934aa # refactoring, breaks kABI
a853c609504e2d1d83e71285e3622fda1f1451d8 # optimization, breaks kABI
3440fa34ad99d471f1085bc2f4dedeaebc310261 # non-trivially breaks kABI, can be removed from blacklist if needed
631ca8909fd5c62b9fda9edda93924311a78a9c4 # CVE-2025-38071 https://bugzilla.suse.com/show_bug.cgi?id=1245205#c1
5c03f9f4d36292150c14ebd90788c4d3273ed9dc # Not a fix, feature
8249a0e25dd2972e919a2552425bf4faa2581d24 # depends on 4b6358e1fe46 ("hwmon: (lm75) Add AMS AS6200 temperature sensor")
c9ba592580947b81f33f514320aeef02ddc001fd # Hardware enablement, too intrusive
bc07fb417007b323d34651be20b9135480a947dc # cleanup, not a fix
2b523c46e81ebd621515ab47117f95de197dfcbf # feature, not a fix
535677e44d57a31e1363529b5ecddb92653d7136 # cleanup, not a fix
d2f94dccab8319063dd1fbc1738b4a280c2e4009 # cleanup, not a fix
72dad8e377afa50435940adfb697e070d3556670 # CVE-2024-58089 https://bugzilla.suse.com/show_bug.cgi?id=1239514#c14
c81a8ab196b5083d5109a51585fcc24fa2055a77 # libbpf is sourced from GitHub and not kernel-source
b9551da8cf3ade01a50316df8a618fd945723ee0 # libbpf is sourced from GitHub and not kernel-source
2c6b640ea08bff1a192bf87fa45246ff1e40767c # Fixes non-backported patch 6f2487bfafce5e6cd6f89e7238a82012f7b9f5ac
fb6a421fb6153d97cf3058f9bd550b377b76a490 # CONFIG_LTO_CLANG=n
c9b19ea63036fc537a69265acea1b18dabd1cbd3 # fix a warning if CONFIG_NEED_DMA_MAP_STATE=n (alwys 'y' in SUSE configs)
2e2f925fe737576df2373931c95e1a2b66efdfef # CVE-2025-38048 https://bugzilla.suse.com/show_bug.cgi?id=1245085#c2
87c259a7a359e73e6c52c68fcbec79988999b4e6 # only for CONFIG_LOCKDEP
1bf67c8fdbda21fadd564a12dbe2b13c1ea5eda7 # fixes/adds feature to obsolete cpuset FS
975776841e689dd8ba36df9fa72ac3eca3c2957a # only for CONFIG_SMP=n
1154bbd326de4453858cf78cf29420888b3ffd52 # too complex, not worth it
1d31d536871fe8b16c8c0de58d201c78e21eb3a2 # only on SPARC32
0d6efa20e384a41a7f4afdcd8a0aec442c19d33e # only on SPARC32
66db876162155c1cec87359cd78c62aaafde9257 # architecture not compiled
1224b218a4b9203656ecc932152f4c81a97b4fcc # selected anyway
22bbc1dcd0d6785fb390c41f0dd5b5e218d23bdd # cleanup that can break compilation
791a9ed0a40dfa70fe793dcecf950273255cbb84 # cleanup, not a fix
46fee9e38995af9ae16a8cc7d05031486d44cf35 # cleanup, not a fix
f9af88a3d384c8b55beb5dc5483e5da0135fadbd # breaks kABI