Skip to content

1.2.0 Horror

Pre-release
Pre-release

Choose a tag to compare

@cat658011 cat658011 released this 12 Nov 16:52
· 4452 commits to SomethingNew-15 since this release
7f2d9a1

7f2d9a1 (HEAD -> SomethingNew-15, origin/SomethingNew-15) SN: Bump to 1.2.0 - Horror
ef65e85 block: Shorten interrupt disabled regions
eee3905 block: move initialization of elevator-related fields to blk_alloc_queue_node
a1dbbe9 block: Remove redundant WARN_ON()
5dae8df block: Make CFQ default to IOPS mode on SSDs
616972d block: Allow noop to be disabled
516971e block: Don't disable interrupts in trigger_softirq()
9388553 BACKPORT: block: use ktime_get_ns() instead of sched_clock() for bfq
55c8de3 block: set request_list for request
e0d51f7 block: add a poll_fn callback to struct request_queue
a57ff15 block: pass 'run_queue' to blk_mq_request_bypass_insert
63ed384 sched/fair: Optimize test_idle_cores() for !SMT
f9c9b88 sched/fair: Clear SMT siblings after determining the core is not idle
75b573c fortify: Add Clang support
32758e4 fortify: Make sure strlen() may still be used as a constant expression
4d7e7d4 fortify: Use __diagnose_as() for better diagnostic coverage
e3b59cd fortify: Make pointer arguments const
fc18720 Compiler Attributes: Add __diagnose_as for Clang
89775cf Compiler Attributes: Add __overloadable for Clang
bb1c282 Compiler Attributes: Add __pass_object_size for Clang
02e2396 fortify: Replace open-coded __gnu_inline attribute
568dedd fortify: Detect struct member overflows in memset() at compile-time
1f29e8e fortify: Detect struct member overflows in memmove() at compile-time
a943c0c fortify: Detect struct member overflows in memcpy() at compile-time
1a0a2e9 fortify: strlen: Avoid shadowing previous locals
08fd694 fortify: Allow strlen() and strnlen() to pass compile-time known lengths
fbfb1ea fortify: Prepare to improve strnlen() and strlen() warnings
59b3a62 fortify: Fix dropped strcpy() compile-time write overflow check
d8d13ef fortify: Move remaining fortify helpers into fortify-string.h
c4af3ce lib/string: Move helper functions out of string.c
732508d compiler_types.h: Remove __compiletime_object_size()
76a48af string.h: move fortified functions definitions in a dedicated header.
0bef569 string.h: add FORTIFY coverage for strscpy()
9731c96 strscpy: reject buffer sizes larger than INT_MAX
0a5765c lib: string.h: detect intra-object overflow in fortified string functions
9df2e1a Makefile: fix GDB warning with CONFIG_RELR
14de46f sched: disable check_preempt_wakeup_fair
cd3d646 cpuidle: Reject idle entry if need_resched() is true
12031f3 cpuidle: Don't return from inside __CPU_PM_CPU_IDLE_ENTER() macro
9ead4d4 sched/fair: Fix insertion in rq->leaf_cfs_rq_list
ca604e6 memcontrol: Remove dublicated entry
806beb4 vmstat: Increase vmstat interval to 10s.
ddad11c arm64: bpf: optimize modulo operation
76751cb mm: swap: swap pages one at a time
4d2cf4d mm: Never allow allocations more than our physical memory
92b8071 ext4: Bring in some EXT4 optimizations
89d6cb3 sched/core: Optimize try_to_wake_up() for local wakeups
85e95fa lib/nlattr.c: Fix warning due to incorrect strlen() variable type
3c9a84a lib/string.c: Use freestanding environment
e724ed3 binder_alloc: Avoid page memory allocation in high memory
86c5197 UPSTREAM: zram: add stat to gather incompressible pages since zram set up