<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">SUSE-IU-2025:3192-1</DocumentTitle>
  <DocumentType>SUSE Image</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE Image SUSE-IU-2025:3192-1</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-19T08:58:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-22T01:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-22T01:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-publiccloud.pl</Engine>
      <Date>2021-02-18T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Image update for SUSE-IU-2025:3192-1 / google/sles-15-sp7-byos-v20251022-x86-64</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This image update for google/sles-15-sp7-byos-v20251022-x86-64 contains the following changes:
Package bind was updated:

- ensure file descriptors 0-2 are in use before using libuv (bsc#1230649)  * bind-ensure-file-descriptors-0-2-are-in-use-before-using-.patch

Package dracut was updated:

- Update to version 059+suse.565.g51c2c969:  * fix(dracut-util): crash if CMDLINE ends with quotation mark (bsc#1247819)

Package grub2 was updated:

- Fix boot hangs in setting up serial console when ACPI SPCR table is present  and redirection is disabled (bsc#1249088)
  * 0001-term-ns8250-spcr-Return-if-redirection-is-disabled.patch

Package iproute2 was updated:

- add post-6.4 follow-up fixes (bsc#1243005)  * patches/bond-fix-stack-smash-in-xstats.patch
  * patches/tc-gred-fix-debug-print.patch

- sync UAPI header copies with SLE15-SP6 kernel
  * sync-UAPI-header-copies-with-SLE15-SP6.patch
- drop Update-kernel-headers.patch
  (no longer needed with full UAPI sync)

- devlink: support ipsec_crypto and ipsec_packet cap (bsc#1248660)
  * add Update-kernel-headers.patch
  * add devlink-Support-setting-port-function-ipsec_crypto-c.patch
  * add devlink-Support-setting-port-function-ipsec_packet-c.patch
  * refresh ss-Tone-down-cgroup-path-resolution.patch

- add post-6.4 follow-up fix (bsc#1243005)
  * ss-show-extra-info-when-processes-is-not-used.patch

- add post-6.4 follow-up fixes (bsc#1243005):
  * bpf-fix-warning-from-basename.patch
  * bridge-fdb-add-an-error-print-for-unknown-command.patch
  * bridge-vni-Accept-del-command.patch
  * bridge-vni-Fix-duplicate-group-and-remote-error-mess.patch
  * bridge-vni-Fix-vni-filter-help-strings.patch
  * bridge-vni-Remove-dead-code-in-group-argument-parsin.patch
  * bridge-vni-Report-duplicate-vni-argument-using-dupar.patch
  * f_flower-Treat-port-0-as-valid.patch
  * genl-ctrl.c-spelling-fix-in-error-message.patch
  * ip-Add-missing-echo-option-to-usage.patch
  * ip-Add-missing-stats-command-to-usage.patch
  * ip-ipmroute-use-preferred_family-to-get-prefix.patch
  * ip-remove-non-existent-amt-subcommand-from-usage.patch
  * iplink-fix-fd-leak-when-playing-with-netns.patch
  * iplink_bridge-fix-incorrect-root-id-dump.patch
  * iplink_xstats-spelling-fix-in-error-message.patch
  * iproute2-fix-type-incompatibility-in-ifstat.c.patch
  * iproute2-prevent-memory-leak.patch
  * libnetlink-validate-nlmsg-header-length-first.patch
  * man-devlink-resource-add-missing-words-in-the-exampl.patch
  * mnl_utils-sanitize-incoming-netlink-payload-size-in-.patch
  * rdma-Fix-help-information-of-rdma-resource.patch
  * rdma-Fix-the-error-of-accessing-string-variable-outs.patch
  * rdma-use-print_XXX-instead-of-COLOR_NONE.patch
  * ss-Fix-socket-type-check-in-packet_show_line.patch
  * ss-fix-directory-leak-when-T-option-is-used.patch
  * ss-mptcp-display-info-counters-as-unsigned.patch
  * ss-prevent-Process-column-from-being-printed-unless-.patch
  * tc-taprio-don-t-print-netlink-attributes-which-weren.patch
  * tc-taprio-fix-JSON-output-when-TCA_TAPRIO_ATTR_ADMIN.patch
  * tc-taprio-fix-parsing-of-fp-option-when-it-doesn-t-a.patch
  * vdpa-consume-device_features-parameter.patch
- add to blacklist:
  * af0ea2cd0b9e (duplicate of 92eac7e4bf14)
- refresh:
  * ss-Add-support-for-dumping-TCP-bound-inactive-socket.patch
  * add-explicit-typecast-to-avoid-gcc-warning.patch
  * use-sysconf-_SC_CLK_TCK-if-HZ-undefined.patch

Package kernel-default was updated:

- wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952).- commit fbc86d9

- ixgbe: fix incorrect map used in eee linkmode (CVE-2025-39922
  bsc#1250722).
- commit 1384a55

- Update
  patches.suse/RDMA-rxe-Flush-delayed-SKBs-while-releasing-RXE-reso.patch
  (git-fixes CVE-2025-39695 bsc#1249306).
- Update
  patches.suse/drm-amdgpu-check-if-hubbub-is-NULL-in-debugfs-amdgpu.patch
  (stable-fixes CVE-2025-39707 bsc#1249333).
- Update
  patches.suse/drm-mediatek-Add-error-handling-for-old-state-CRTC-i.patch
  (git-fixes CVE-2025-39807 bsc#1249887).
- Update
  patches.suse/drm-msm-Add-error-handling-for-krealloc-in-metadata-.patch
  (stable-fixes CVE-2025-39747 bsc#1249566).
- Update
  patches.suse/drm-xe-Make-dma-fences-compliant-with-the-safe-acces.patch
  (stable-fixes CVE-2025-38703 bsc#1249193).
- Update
  patches.suse/drm-xe-vm-Clear-the-scratch_pt-pointer-on-error.patch
  (git-fixes CVE-2025-39811 bsc#1249915).
- Update
  patches.suse/media-ivsc-Fix-crash-at-shutdown-due-to-missing-mei_.patch
  (git-fixes CVE-2025-39711 bsc#1249274).
- Update
  patches.suse/wifi-ath12k-fix-memory-leak-in-ath12k_service_ready_.patch
  (git-fixes CVE-2025-39890 bsc#1250334).
- commit 06f1002

- RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes).
- commit ffca68d

- usb: vhci-hcd: Prevent suspending virtually attached devices
  (git-fixes).
- Revert &amp;quot;usb: xhci: Avoid Stop Endpoint retry loop if the
  endpoint seems Running&amp;quot; (git-fixes).
- usb: typec: tipd: Clear interrupts first (git-fixes).
- usb: cdns3: cdnsp-pci: remove redundant pci_disable_device()
  call (git-fixes).
- usb: gadget: configfs: Correctly set use_os_string at bind
  (git-fixes).
- usb: phy: twl6030: Fix incorrect type for ret (git-fixes).
- crypto: hisilicon/qm - request reserved interrupt for virtual
  function (git-fixes).
- crypto: hisilicon - re-enable address prefetch after device
  resuming (git-fixes).
- crypto: hisilicon/zip - remove unnecessary validation for
  high-performance mode configurations (git-fixes).
- commit 609ee3a

- bus: mhi: host: Do not use uninitialized 'dev' pointer in
  mhi_init_irq_setup() (git-fixes).
- iio: imu: inv_icm42600: Drop redundant pm_runtime
  reinitialization in resume (git-fixes).
- iio: consumers: Fix offset handling in
  iio_convert_raw_to_processed() (git-fixes).
- iio: dac: ad5421: use int type to store negative error codes
  (git-fixes).
- iio: dac: ad5360: use int type to store negative error codes
  (git-fixes).
- iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE
  (git-fixes).
- iio: frequency: adf4350: Fix prescaler usage (git-fixes).
- iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes).
- iio: xilinx-ams: Unmask interrupts after updating alarms
  (git-fixes).
- misc: genwqe: Fix incorrect cmd field being reported in error
  (git-fixes).
- uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes).
- thunderbolt: Compare HMAC values in constant time (git-fixes).
- usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure
  calls (git-fixes).
- usb: host: max3421-hcd: Fix error pointer dereference in probe
  cleanup (git-fixes).
- tty: n_gsm: Don't block input queue by waiting MSC (git-fixes).
- serial: max310x: Add error checking in probe() (git-fixes).
- mtd: rawnand: omap2: fix device leak on probe failure
  (git-fixes).
- HID: intel-ish-ipc: Remove redundant ready check after timeout
  function (git-fixes).
- hwrng: ks-sa - fix division by zero in ks_sa_rng_init
  (git-fixes).
- crypto: hisilicon/qm - set NULL to qm-&amp;gt;debug.qm_diff_regs
  (git-fixes).
- crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes).
- crypto: atmel - Fix dma_unmap_sg() direction (git-fixes).
- crypto: hisilicon/qm - check whether the input function and
  PF are on the same device (git-fixes).
- hwrng: nomadik - add ARM_AMBA dependency (git-fixes).
- crypto: keembay - Add missing check after sg_nents_for_len()
  (git-fixes).
- commit 6795b42

- wifi: ath12k: fix the fetching of combined rssi (git-fixes).
- commit 75dc6e6

- Bluetooth: hci_sync: Fix using random address for BIG/PA
  advertisements (git-fixes).
- Bluetooth: ISO: free rx_skb if not consumed (git-fixes).
- wifi: ath12k: fix wrong logging ID used for CE (git-fixes).
- wifi: iwlwifi: Remove redundant header files (git-fixes).
- media: tuner: xc5000: Fix use-after-free in xc5000_release
  (git-fixes).
- media: mc: Fix MUST_CONNECT handling for pads with no links
  (git-fixes).
- drm/panthor: Fix memory leak in panthor_ioctl_group_create()
  (git-fixes).
- ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback
  (git-fixes).
- ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq()
  on PREEMPT_RT (git-fixes).
- commit 90486f1

- drivers/base/node: fix double free in register_one_node()
  (git-fixes).
- commit 205d070

- net: nfc: nci: Add parameter validation for packet data
  (git-fixes).
- net: usb: Remove disruptive netif_wake_queue in
  rtl8150_set_multicast (git-fixes).
- wifi: ath11k: HAL SRNG: don't deinitialize and re-initialize
  again (git-fixes).
- wifi: ath10k: avoid unnecessary wait for service ready message
  (git-fixes).
- wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()
  (git-fixes).
- wifi: rtw89: avoid circular locking dependency in
  ser_state_run() (git-fixes).
- wifi: mac80211: fix Rx packet handling when pubsta information
  is not available (git-fixes).
- wifi: mt76: fix potential memory leak in mt76_wmac_probe()
  (git-fixes).
- wifi: mwifiex: send world regulatory domain to driver
  (git-fixes).
- media: b2c2: Fix use-after-free causing by irq_check_work in
  flexcop_pci_remove (git-fixes).
- media: uvcvideo: Mark invalid entities with id
  UVC_INVALID_ENTITY_ID (git-fixes).
- media: i2c: mt9v111: fix incorrect type for ret (git-fixes).
- media: pci: ivtv: Add missing check after DMA map (git-fixes).
- media: cx18: Add missing check after DMA map (git-fixes).
- media: st-delta: avoid excessive stack usage (git-fixes).
- media: v4l2-subdev: Fix alloc failure check in
  v4l2_subdev_call_state_try() (git-fixes).
- wifi: virt_wifi: Fix page fault on connect (stable-fixes).
- mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes).
- usb: core: Add 0x prefix to quirks debug output (stable-fixes).
- commit dbb8904

- maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs
  (git-fixes).
- media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes).
- media: lirc: Fix error handling in lirc_register() (git-fixes).
- media: zoran: Remove zoran_fh structure (git-fixes).
- drm/amdgpu: remove the redeclaration of variable i (git-fixes).
- drm/msm/dpu: fix incorrect type for ret (git-fixes).
- drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl()
  (git-fixes).
- drm/amd/pm: Disable SCLK switching on Oland with high pixel
  clocks (v3) (git-fixes).
- drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2)
  (git-fixes).
- drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3)
  (git-fixes).
- drm/amd/pm: Adjust si_upload_smc_data register programming (v3)
  (git-fixes).
- drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes).
- drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes).
- drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes).
- drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes).
- drm/amd/display: Remove redundant semicolons (git-fixes).
- firewire: core: fix overlooked update of subsystem ABI version
  (git-fixes).
- commit 2161328

- docs: admin-guide: update to current minimum pipe size default
  (git-fixes).
- drivers/base/node: handle error properly in register_one_node()
  (git-fixes).
- Bluetooth: ISO: don't leak skb in ISO_CONT RX (git-fixes).
- Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes).
- Bluetooth: MGMT: Fix not exposing debug UUID on
  MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes).
- drm/radeon/r600_cs: clean up of dead code in r600_cs
  (git-fixes).
- drm/bridge: it6505: select REGMAP_I2C (git-fixes).
- drm/panel: novatek-nt35560: Fix invalid return value
  (git-fixes).
- can: rcar_can: rcar_can_resume(): fix s2ram with PSCI
  (stable-fixes).
- drm/i915/backlight: Return immediately when scale() finds
  invalid parameters (stable-fixes).
- commit 07504f9

- ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()
  (git-fixes).
- ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free
  (git-fixes).
- ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
  (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
  (git-fixes).
- ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping
  (git-fixes).
- ASoC: qcom: audioreach: fix potential null pointer dereference
  (git-fixes).
- ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes).
- ALSA: lx_core: use int type to store negative error codes
  (git-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on more
  devices (stable-fixes).
- ALSA: usb-audio: move mixer_quirks' min_mute into common quirk
  (stable-fixes).
- commit 86dd099

- ALSA: usb-audio: Add DSD support for Comtrue USB Audio device
  (stable-fixes).
- ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes).
- ALSA: usb-audio: Convert comma to semicolon (git-fixes).
- ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5
  (stable-fixes).
- ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks
  (stable-fixes).
- ALSA: usb-audio: Simplify NULL comparison in mixer_quirks
  (stable-fixes).
- ALSA: usb-audio: Avoid multiple assignments in mixer_quirks
  (stable-fixes).
- ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks
  (stable-fixes).
- ALSA: usb-audio: Fix block comments in mixer_quirks
  (stable-fixes).
- commit 929e260

- Squashfs: reject negative file sizes in squashfs_read_inode()
  (git-fixes).
- commit 2f68e78

- Squashfs: add additional inode sanity checking (git-fixes).
- commit fe46811

- cifs: prevent NULL pointer dereference in UTF16 conversion
  (bsc#1250365, CVE-2025-39838).
- commit 5883dcd

- Replace drm-backport-placeholder with actual jira tickets
  For unknown reasons a portion of the patches didn't get their
  placeholder tag replaced during the drm backport. Let's fix them now.
- Update patches.suse/0001-PCI-Add-pci_get_base_class-helper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0001-accel-ivpu-Annotate-struct-ivpu_job-with-__counted_b.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0001-drm-prime-Unexport-helpers-for-fd-handle-conversion.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071 bsc#1212533).
- Update
  patches.suse/0001-drm-vmwgfx-Keep-a-gem-reference-to-user-bos-in-surfa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  CVE-2023-5633, bsc#1216527).
- Update
  patches.suse/0001-mm-factor-out-VMA-stack-and-heap-checks.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0002-PCI-Add-pci_is_vga-helper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0002-drm-amdkfd-use-vma_is_initial_stack-and-vma_is_initi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0002-drm-sched-Make-sure-we-wait-for-all-dependencies-in-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0002-drm-tests-Use-KUNIT_DEFINE_ACTION_WRAPPER.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0002-fbdev-Simplify-fb_is_primary_device-for-x86.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0003-drm-vc4-tests-Use-KUNIT_DEFINE_ACTION_WRAPPER.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0003-fbdev-Prepare-generic-architecture-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0004-arch-x86-Implement-asm-fb.h-with-generic-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0004-drm-tests-Switch-to-kunit-devices.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0005-drm-modes-replace-deprecated-strncpy-with-strscpy_pa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0005-drm-ttm-fix-warning-that-we-shouldn-t-mix-and.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0006-accel-ivpu-Use-struct_size.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0006-arch-arm64-Implement-asm-fb.h-with-generic-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0006-drivers-gpu-drm-i915-i915_memcpy.c-fix-missing-inclu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0006-drm-nouveau-kms-nv50-Fix-drm_dp_remove_payload-invoc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0006-drm-rockchip-vop-Add-rv1126-vop_lite-support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0007-accel-ivpu-Remove-configuration-of-MMU-TBU1-and-TBU3.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0007-arch-sparc-Implement-fb_is_primary_device-in-source-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0007-docs-driver-api-properly-format-ToC-headings.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0007-drm-rockchip-dsi-Add-rv1126-MIPI-DSI-support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0007-drm-sched-Call-drm_sched_fence_set_parent-from-drm_s.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0008-accel-ivpu-Add-MMU-support-for-4-level-page-mappings.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0008-accel-ivpu-Document-DRM_IVPU_PARAM_CAPABILITIES.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0008-arch-ia64-Implement-asm-fb.h-with-generic-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0008-drm-atomic-helper-Fix-spelling-mistake-preceeding-pr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0009-accel-ivpu-Make-DMA-bit-mask-HW-specific.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0009-arch-loongarch-Implement-asm-fb.h-with-generic-helpe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0009-drm-extract-closefb-logic-in-separate-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0010-accel-ivpu-Rename-and-cleanup-MMU600-page-tables.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0010-arch-mips-Implement-asm-fb.h-with-generic-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0010-drm-introduce-CLOSEFB-IOCTL.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0011-accel-ivpu-Mark-64-kB-contiguous-areas-as-contiguous.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0011-arch-sparc-Implement-asm-fb.h-with-generic-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0011-drm-doc-describe-PATH-format-for-DP-MST.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0012-accel-qaic-Enable-1-MSI-fallback-mode.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0012-arch-x86-Include-asm-fb.h-in-fbdev-source-file.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0012-drm-bridge-lvds-codec-Implement-atomic_get_input_bus.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0013-accel-qaic-Add-support-for-periodic-timesync.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0013-fbdev-Include-linux-io.h-in-various-drivers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0014-accel-qaic-Support-MHI-QAIC_TIMESYNC-channel.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0014-fbdev-Include-linux-fb.h-instead-of-asm-fb.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0015-drm-rockchip-vop-Use-cleanup-helper-directly-as-dest.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0015-fbdev-Move-framebuffer-I-O-helpers-into-asm-fb.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0016-accel-ivpu-Update-FW-API.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0016-fbdev-Rename-fb_mem-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0017-accel-ivpu-Remove-unneeded-drm_driver-declaration.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0017-drm-radeon-Replace-all-non-returning-strlcpy-with-st.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0017-minmax-add-in_range-macro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0018-accel-ivpu-Add-dvfs_mode-file-to-debugfs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0018-drm-amd-pm-Replace-all-non-returning-strlcpy-with-st.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0018-drm-i915-Move-abs_diff-to-math.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0018-x86-fbdev-Include-asm-fb.h-as-needed.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0019-accel-ivpu-Remove-reset-from-power-up-sequence.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0019-drm-bridge-panel-Add-a-device-link-between-drm-devic.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0019-drm-display-dp_mst-Replace-all-non-returning-strlcpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0019-drm-panel-edp-Add-AUO-B116XAB01.4-edp-panel-entry.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0020-accel-ivpu-Add-support-for-VPU_JOB_FLAGS_NULL_SUBMIS.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0020-drm-panel-s6d7aa0-remove-the-unneeded-variable-in-s6.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0020-drm-panel-simple-Add-support-for-Mitsubishi-AA084XE0.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0020-drm-rockchip-Replace-all-non-returning-strlcpy-with-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0021-accel-ivpu-Change-test_mode-module-param-to-bitmask.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0021-drm-mediatek-Replace-all-non-returning-strlcpy-with-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0021-drm-panel-Add-driver-for-Visionox-r66451-panel.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0021-drm-panel-JDI-LT070ME05000-drop-broken-link.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0022-accel-ivpu-40xx-Capture-D0i3-entry-host-and-device-t.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0022-drm-komeda-Convert-to-platform-remove-callback-retur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0022-drm-panel-Add-driver-for-JDI-LPM102A188A.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0022-drm-sun4i-hdmi-Replace-all-non-returning-strlcpy-wit.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0023-accel-ivpu-Pass-D0i3-residency-time-to-the-VPU-firmw.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0023-drm-arm-hdlcd-Convert-to-platform-remove-callback-re.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0023-drm-i2c-tda998x-Replace-all-non-returning-strlcpy-wi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0024-accel-ivpu-Introduce-ivpu_ipc_send_receive_active.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0024-drm-arm-malidp-Convert-to-platform-remove-callback-r.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0024-drm-panfrost-Do-not-check-for-0-return-after-calling.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0024-mm-gup-remove-unused-vmas-parameter-from-get_user_pa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0025-accel-ivpu-Add-support-for-delayed-D0i3-entry-messag.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0025-doc-uapi-Add-document-describing-dma-buf-semantics.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0025-drm-aspeed-Convert-to-platform-remove-callback-retur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0026-drm-atmel-hlcdc-Convert-to-platform-remove-callback-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0026-drm-gma500-remove-duplicate-macro-definitions.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0026-drm-v3d-wait-for-all-jobs-to-finish-before-unregiste.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0027-drm-fsl-dcu-Convert-to-platform-remove-callback-retu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0027-drm-panfrost-Remove-incorrect-IS_ERR-check.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0027-fbdev-hitfb-Declare-hitfb_blank-as-static.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0028-drm-gma500-Remove-unused-declarations.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0028-drm-hisilicon-Convert-to-platform-remove-callback-re.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0028-fbdev-metronomefb-Add-MODULE_FIRMWARE-macro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0029-drm-lima-Convert-to-platform-remove-callback-returni.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0029-drm-repaper-fix-Wvoid-pointer-to-enum-cast-warning.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0029-fbdev-broadsheetfb-Add-MODULE_FIRMWARE-macro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0030-accel-ivpu-40xx-Allow-to-change-profiling-frequency.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0030-drm-logicvc-Convert-to-platform-remove-callback-retu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0030-drm-tests-Test-default-pitch-fallback.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0030-video-hdmi-Reorder-fields-in-struct-hdmi_avi_infofra.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0031-accel-ivpu-Assure-device-is-off-if-power-up-sequence.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0031-drm-mcde-Convert-to-platform-remove-callback-returni.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0031-drm-tests-Add-KUnit-tests-for-drm_fb_swab.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0031-fbdev-media-Use-GPIO-descriptors-for-VIA-GPIO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0032-accel-ivpu-Stop-job_done_thread-on-suspend.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0032-drm-meson-Convert-to-platform-remove-callback-return.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0032-drm-tests-Add-KUnit-tests-for-drm_fb_clip_offset.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0032-fbdev-hitfb-Fix-integer-to-pointer-cast.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0033-accel-ivpu-Abort-pending-rx-ipc-on-reset.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0033-drm-mxsfb-Convert-to-platform-remove-callback-return.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0033-drm-tests-Add-KUnit-tests-for-drm_fb_build_fourcc_li.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0033-fbdev-hitfb-Use-NULL-for-pointers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0034-accel-ivpu-Print-CMDQ-errors-after-consumer-timeout.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0034-drm-panel-Convert-to-platform-remove-callback-return.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0034-drm-tests-Add-multi-plane-support-to-conversion_buf_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0034-fbdev-sh_mobile_lcdcfb-Fix-ARGB32-overlay-format-typ.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0035-accel-ivpu-Make-DMA-allocations-for-MMU600-write-com.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0035-drm-panfrost-Convert-to-platform-remove-callback-ret.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0035-drm-tests-Add-KUnit-tests-for-drm_fb_memcpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0035-fbdev-sh7760fb-Fix-Wimplicit-fallthrough-warnings.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0036-accel-ivpu-Simplify-MMU-SYNC-command.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0036-drm-rockchip-Convert-to-platform-remove-callback-ret.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0036-fbdev-sbus-Build-sbuslib.o-if-CONFIG_FB_SBUS-has-bee.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0037-accel-ivpu-Rename-VPU-to-NPU-in-product-strings.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0037-drm-sti-Convert-to-platform-remove-callback-returnin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0037-drm-vkms-Use-drmm_crtc_init_with_planes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0037-fbdev-sbus-Forward-declare-all-necessary-structures-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0038-drm-sched-Add-drm_sched_wqueue_-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0038-drm-stm-Convert-to-platform-remove-callback-returnin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0038-drm-vkms-Use-drmm_mode_config_init.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0038-fbdev-sbus-Add-initializer-macros-and-Kconfig-tokens.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0039-drm-bridge-fsl-ldb-Add-i.MX6SX-support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0039-drm-sched-Convert-drm-scheduler-to-use-a-work-queue-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0039-drm-sun4i-Convert-to-platform-remove-callback-return.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0039-fbdev-bw2-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0040-drm-sched-Split-free_job-into-own-work-item.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0040-drm-tidss-Convert-to-platform-remove-callback-return.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0040-fbdev-cg14-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0041-drm-gma500-Use-drm_aperture_remove_conflicting_pci_f.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0041-drm-sched-Add-drm_sched_start_timeout_unlocked-helpe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0041-drm-tiny-Convert-to-platform-remove-callback-returni.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0041-fbdev-cg3-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0042-drm-sched-Add-a-helper-to-queue-TDR-immediately.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0042-drm-tve200-Convert-to-platform-remove-callback-retur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0042-fbdev-cg6-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0042-video-aperture-use-generic-code-to-figure-out-the-vg.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0043-drm-aperture-Remove-primary-argument.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0043-drm-v3d-Convert-to-platform-remove-callback-returnin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0043-fbdev-ffb-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0043-fbdev-simplefb-Support-memory-region-property.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0044-drm-vc4-Convert-to-platform-remove-callback-returnin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0044-fbdev-leo-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0044-fbdev-simplefb-Add-support-for-generic-power-domains.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0044-video-aperture-Only-kick-vgacon-when-the-pdev-is-dec.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0045-drm-v3d-update-UAPI-to-match-user-space-for-V3D-7.x.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0045-drm-xlnx-zynqmp_dpsub-Convert-to-platform-remove-cal.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0045-fbdev-p9100-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0045-video-aperture-Move-vga-handling-to-pci-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0046-drm-rcar-du-Convert-to-platform-remove-callback-retu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0046-drm-v3d-fix-up-register-addresses-for-V3D-7.x.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0046-fbdev-tcx-Use-initializer-macro-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0046-video-aperture-Drop-primary-argument.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0047-drm-debugfs-drop-debugfs_init-for-the-render-and-acc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0047-drm-tilcdc-Convert-to-platform-remove-callback-retur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0047-drm-v3d-add-brcm-2712-v3d-as-a-compatible-V3D-device.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0047-video-aperture-Only-remove-sysfb-on-the-default-vga-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0048-accel-qaic-Quiet-array-bounds-check-on-DMA-abort-mes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0048-drm-debugfs-disallow-debugfs-access-when-device-isn-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0048-drm-omap-Convert-to-platform-remove-callback-returni.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0048-video-aperture-Provide-a-VGA-helper-for-gma500-and-i.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0049-accel-qaic-Support-for-0-resize-slice-execution-in-B.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0049-dma-buf-dma-resv.c-fix-a-typo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0049-drm-ssd130x-Make-default-width-and-height-to-be-cont.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0050-drm-debugfs-rework-debugfs-directory-creation-v5.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0050-drm-panel-nt36523-Add-DCS-backlight-support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0050-drm-sched-Rename-drm_sched_get_cleanup_job-to-be-mor.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0050-drm-ssd130x-Set-the-page-height-value-in-the-device-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0051-drm-debugfs-remove-dev-debugfs_list-and-debugfs_mute.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0051-drm-panel-nt36523-Get-orientation-from-OF.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0051-drm-sched-Move-free-worker-re-queuing-out-of-the-if-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0051-drm-ssd130x-Don-t-allocate-buffers-on-each-plane-upd.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0052-drm-debugfs-rework-drm_debugfs_create_files-implemen.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0052-drm-panel-nt36523-Add-Lenovo-J606F-panel.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0052-drm-sched-Rename-drm_sched_free_job_queue-to-be-more.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0052-drm-ssd130x-Remove-hardcoded-bits-per-pixel-in-ssd13.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0053-accel-ivpu-Move-set-autosuspend-delay-to-HW-specific.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0053-drm-nouveau-debugfs-Move-an-expression-into-a-functi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0053-drm-sched-Rename-drm_sched_run_job_queue_if_ready-an.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0053-drm-virtio-Remove-unused-function-declarations.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0054-accel-ivpu-Remove-duplicated-error-messages.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0054-drm-ingenic-Kconfig-select-REGMAP-and-REGMAP_MMIO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0054-drm-nouveau-debugfs-Move-a-variable-assignment-behin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0054-drm-sched-Drop-suffix-from-drm_sched_wakeup_if_can_q.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0054-fbdev-smscufx-Use-fb_ops-helpers-for-deferred-I-O.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0055-accel-ivpu-Make-ivpu_pm_init-void.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0055-drm-Do-not-round-to-megabytes-for-greater-than-1MiB-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0055-drm-nouveau-debugfs-Use-seq_putc-in-nouveau_debugfs_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0055-drm-tidss-Add-support-for-AM625-DSS.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0055-fbdev-udlfb-Use-fb_ops-helpers-for-deferred-I-O.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0056-accel-ivpu-Add-information-about-context-on-failure.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0056-drm-msm-Initialize-mmap-offset-after-constructing-th.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0056-drm-nouveau-debugfs-Replace-five-seq_printf-calls-by.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0056-drm-v3d-Implement-show_fdinfo-callback-for-GPU-usage.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0056-fbdev-Add-Kconfig-macro-FB_IOMEM_HELPERS_DEFERRED.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0057-accel-ivpu-Initialize-context-with-SSID-1.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0057-drm-Remove-struct-drm_driver.gem_prime_mmap.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0057-drm-nouveau-bios-power_budget-Move-an-expression-int.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0057-drm-v3d-Expose-the-total-GPU-usage-stats-on-sysfs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0057-fbdev-hyperv_fb-Use-fb_ops-helpers-for-deferred-I-O.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0058-accel-ivpu-Move-ivpu_fw_load-to-ivpu_fw_init.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0058-drm-amdgpu-Remove-struct-drm_driver.gem_prime_mmap.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0058-drm-bridge-it66121-Extend-match-support-for-OF-table.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0058-drm-nouveau-clk-Move-a-variable-assignment-behind-a-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0059-accel-ivpu-37xx-Change-register-rename-leftovers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0059-accel-ivpu-Fix-compilation-with-CONFIG_PM-n.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0059-drm-nouveau-pci-Move-a-variable-assignment-behind-co.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0059-drm-vkms-Add-kernel-doc-to-the-function-vkms_compose.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0060-accel-ivpu-37xx-White-space-cleanup.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0060-drm-nouveau-pci-Move-an-expression-into-a-function-c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0060-drm-sched-Don-t-disturb-the-entity-when-in-RR-mode-s.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0060-drm-vkms-Fix-all-kernel-doc-warnings-of-the-vkms_com.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0061-accel-ivpu-Allocate-vpu_addr-in-gem-open-callback.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0061-accel-ivpu-Move-MMU-register-definitions-to-ivpu_mmu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0061-drm-bridge-lt9611uxc-Add-MODULE_FIRMWARE-macro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0061-drm-nouveau-therm-Move-an-assignment-statement-behin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0062-accel-ivpu-Fix-locking-in-ivpu_bo_remove_all_bos_fro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0062-accel-ivpu-Print-information-about-used-workarounds.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0062-dma-buf-heaps-Don-t-assert-held-reservation-lock-for.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0063-accel-ivpu-Remove-support-for-uncached-buffers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0063-drm-gem-Check-for-valid-formats.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0063-udmabuf-Don-t-assert-held-reservation-lock-for-dma-b.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0064-accel-ivpu-Use-GEM-shmem-helper-for-all-buffers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0064-drm-Don-t-assert-held-reservation-lock-for-dma-buf-m.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0064-drm-bridge-analogix-anx78xx-Drop-ID-table.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0064-video-Remove-trailing-whitespaces.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0065-dma-buf-Change-locking-policy-for-mmap.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0065-drm-bridge-Drop-conditionals-around-of_node-pointers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0065-drm-todo-Add-entry-to-clean-up-former-seltests-suite.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0065-video-Move-HP-PARISC-STI-core-code-to-shared-locatio.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0066-arch-parisc-Implement-fb_is_primary_device-under-arc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0066-drm-bridge-Drop-CONFIG_OF-conditionals-around-of_nod.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0066-drm-edid-split-out-drm_eld.h-from-drm_edid.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0066-drm-shmem-helper-Switch-to-reservation-lock.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0067-drm-bridge-tc358764-Use-BIT-macro-for-actual-bits.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0067-drm-bridge-ti-sn65dsi86-Implement-wait_hpd_asserted.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0067-drm-connector-document-DRM_MODE_COLORIMETRY_COUNT.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0067-drm-eld-replace-uint8_t-with-u8.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0068-drm-armada-Include-linux-of.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0068-drm-bridge-it66121-Simplify-probe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0068-drm-bridge-tc358762-Split-register-programming-from-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0068-drm-doc-rfc-No-STAGING-out-of-drivers-staging.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0068-drm-edid-include-drm_eld.h-only-where-required.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0069-drm-armada-Hide-fbdev-support-behind-config-option.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0069-drm-bridge-tc358762-Switch-to-atomic-ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0069-drm-doc-rfc-Mark-Dev_coredump-as-completed.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0069-drm-edid-use-a-temp-variable-for-sads-to-drop-one-le.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0070-drm-armada-Initialize-fbdev-DRM-client.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0070-drm-bridge-tc358762-Instruct-DSI-host-to-generate-HS.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0070-drm-doc-rfc-Mark-DRM_VM_BIND-as-complete.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0070-drm-edid-add-helpers-to-get-set-struct-cea_sad-from-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0071-drm-armada-Implement-fbdev-emulation-as-in-kernel-cl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0071-drm-bridge-tc358762-Guess-the-meaning-of-LCDCTRL-bit.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0071-drm-doc-rfc-Mark-GPU-VA-as-complete.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0071-drm-eld-add-helpers-to-modify-the-SADs-of-an-ELD.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0072-drm-bridge-tc358762-Handle-HS-VS-polarity.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0072-drm-debugfs-Add-inline-to-drm_debugfs_dev_init-to-su.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0072-drm-panel-simple-Add-InnoLux-G070ACE-L01.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0072-drm-sched-Qualify-drm_sched_wakeup-by-drm_sched_enti.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0073-drm-display-Add-missing-OLED-Vesa-brightnesses-defin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0073-drm-i2c-Switch-i2c-drivers-back-to-use-.probe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0073-drm-tests-Zero-initialize-fourccs_out.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0074-drm-bridge-anx7625-Drop-of_gpio-header.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0074-drm-mst-delete-unnecessary-case-in-drm_dp_add_payloa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0075-drm-mgag200-set-variable-mgag200_modeset-storage-cla.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0075-drm-mst-Refactor-the-flow-for-payload-allocation-rem.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0075-drm-panel-edp-drm-panel-edp-Add-several-generic-edp-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0075-drm-sti-Drop-of_gpio-header.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0076-drm-fix-code-style-for-embedded-structs-in-hdr_metad.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0076-drm-imx-ipuv3-Convert-to-platform-remove-callback-re.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0076-drm-sched-Define-pr_fmt-for-DRM-using-pr_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0076-drm-tve200-Use-devm_platform_ioremap_resource.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0077-drm-ingenic-Convert-to-platform-remove-callback-retu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0077-drm-sched-implement-dynamic-job-flow-control.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0077-drm-scheduler-properly-forward-fence-errors.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0077-drm-sysfs-rename-drm_sysfs_connector_status_event.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0078-drm-bridge_connector-use-drm_kms_helper_connector_ho.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0078-drm-msm-Convert-to-platform-remove-callback-returnin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0078-drm-scheduler-add-drm_sched_entity_error-and-use-rcu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0079-drm-atomic-log-drm_atomic_replace_property_blob_from.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0079-drm-panfrost-Perform-hard-reset-to-recover-GPU-if-so.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0079-drm-shmobile-Convert-to-platform-remove-callback-ret.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0079-drm-tests-Add-test-cases-for-drm_rect_intersect.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0080-drm-atomic-drop-extra-bracket-from-log-messages.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0080-drm-panfrost-Tighten-polling-for-soft-reset-and-powe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0080-drm-ssd130x-Print-the-PWM-s-label-instead-of-its-num.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0080-drm-tests-Add-test-cases-for-drm_rect_calc_hscale.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0081-drm-atomic-log-when-getting-setting-unknown-properti.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0081-drm-panfrost-Implement-ability-to-turn-on-off-GPU-cl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0081-drm-tests-Add-test-cases-for-drm_rect_calc_vscale.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0082-drm-atomic-log-when-CRTC_ID-prop-value-is-invalid.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0082-drm-panfrost-Set-clocks-on-off-during-system-sleep-o.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0082-drm-ssd130x-Use-bool-for-ssd130x_deviceinfo-flags.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0082-drm-tests-Add-test-cases-for-drm_rect_rotate.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0083-drm-atomic-log-on-attempt-to-set-legacy-DPMS-propert.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0083-drm-panfrost-Implement-ability-to-turn-on-off-regula.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0083-drm-test-Add-test-cases-for-drm_rect_rotate_inv.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0083-fbdev-au1200fb-Do-not-display-boot-up-logo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0084-drm-atomic-log-when-page-flip-is-requested-without-C.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0084-drm-panfrost-Set-regulators-on-off-during-system-sle.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0084-fbdev-mmp-mmpfb-Do-not-display-boot-up-logo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0085-drm-atomic-log-errors-in-drm_mode_atomic_ioctl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0085-drm-vc4-Switch-to-container_of_const.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0085-drm-virtio-use-uint64_t-more-in-virtio_gpu_context_i.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0085-fbdev-core-Fix-style-of-code-for-boot-up-logo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0086-drm-kms-log-when-querying-an-object-not-included-in-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0086-drm-uapi-add-explicit-virtgpu-context-debug-name.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0086-drm-vc4-hdmi-Update-all-the-planes-if-the-TV-margins.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0086-fbdev-core-Unexport-logo-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0087-drm-bridge-ps8640-Drop-the-ability-of-ps8640-to-fetc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0087-drm-gpuvm-convert-WARN-to-drm_WARN-variants.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0087-drm-vc4-hdmi-Add-Broadcast-RGB-property-to-allow-ove.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0087-fbdev-core-Move-logo-functions-into-separate-source-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0088-drm-gpuvm-don-t-always-WARN-in-drm_gpuvm_check_overf.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0088-drm-vc4-hdmi-Rename-full-range-helper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0088-drm-vkms-Reduce-critical-section.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0088-fbdev-core-Remove-empty-internal-helpers-from-fb_log.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0089-drm-gpuvm-export-drm_gpuvm_range_valid.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0089-drm-vc4-hdmi-Swap-CSC-matrix-channels-for-YUV444.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0089-drm-vkms-Enable-ARGB8888-support-for-writeback.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0089-fbdev-core-Clean-up-include-statements-in-fbmem.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0090-drm-buddy-Improve-contiguous-memory-allocation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0090-drm-nouveau-make-use-of-drm_gpuvm_range_valid.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0090-drm-vc4-hdmi-Rework-the-CSC-matrices-organization.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0090-drm-vkms-Isolate-writeback-pixel-conversion-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0091-drm-amdgpu-Move-the-size-computations-to-drm-buddy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0091-drm-gpuvm-add-common-dma-resv-per-struct-drm_gpuvm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0091-drm-vc4-hdmi-Add-a-function-to-retrieve-the-CSC-matr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0092-drm-i915-Move-the-size-computations-to-drm-buddy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0092-drm-nouveau-make-use-of-the-GPUVM-s-shared-dma-resv.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0092-drm-vc4-hdmi-Add-BT.601-Support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0093-drm-Clear-fd-handle-callbacks-in-struct-drm_driver.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071 bsc#1212533 bsc#1212533).
- Update
  patches.suse/0093-drm-gpuvm-add-drm_gpuvm_flags-to-drm_gpuvm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0093-drm-panel-Don-t-store-check-prepared-enabled-for-sim.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0093-drm-vc4-hdmi-Add-BT.2020-Support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0094-drm-nouveau-separately-allocate-struct-nouveau_uvmm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0094-drm-panel-s6e63m0-Don-t-store-check-prepared-enabled.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0095-drm-bridge-dw-hdmi-change-YUV420-selection-logic-at-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0095-drm-gpuvm-reference-count-drm_gpuvm-structures.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0095-drm-panel-otm8009a-Don-t-double-check-prepared-enabl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0095-drm-vkms-allow-full-alpha-blending-on-all-planes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0096-drm-atomic-helper-drm_atomic_helper_shutdown-NULL-sh.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0096-drm-bridge-dw-hdmi-truly-enforce-420-only-formats-wh.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0096-drm-gpuvm-add-an-abstraction-for-a-VM-BO-combination.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0096-drm-vkms-drop-full-alpha-blending-TODO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0097-drm-bridge-dw-hdmi-remove-dead-code-and-fix-indentat.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0097-drm-doc-rfc-Introduce-the-merge-plan-for-the-Xe-driv.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0097-drm-gpuvm-track-lock-validate-external-evicted-objec.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0097-drm-imx-ipuv3-Call-drm_atomic_helper_shutdown-at-shu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0098-Revert-drm-sched-Define-pr_fmt-for-DRM-using-pr_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0098-drm-ingenic-Call-drm_atomic_helper_shutdown-at-shutd.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0098-drm-panel-st7703-Rename-CMD_UNKNOWN_C6-to-CMD_SETECO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0099-backlight-bd6107-Rename-struct-bd6107_platform_data..patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0099-drm-amd-display-Fix-Wuninitialized-in-dm_helpers_dp_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0099-drm-format-helper-Cache-buffers-with-struct-drm_form.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0099-drm-panel-st7703-Add-Anbernic-RG353V-V2-Panel-Suppor.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0100-drm-atomic-helper-Add-format-conversion-state-to-sha.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0100-drm-debugfs-Fix-drm_debugfs_remove_files-stub.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0100-drm-meson-set-variables-meson_hdmi_-storage-class-sp.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0101-backlight-gpio_backlight-Rename-field-fbdev-to-dev.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0101-drm-format-helper-Pass-format-conversion-state-to-he.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0101-drm-ssd130x-Store-the-HW-buffer-in-the-driver-privat.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0101-drm-uapi-Document-CTM-matrix-better.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0102-drm-ofdrm-Preallocate-format-conversion-buffer-in-at.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0103-backlight-lv5207lp-Rename-struct-lv5207lp_platform_d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0103-drm-komeda-add-NV12-format-to-support-writeback-laye.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0103-drm-simpledrm-Preallocate-format-conversion-buffer-i.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0103-drm-sysfs-Expose-DRM-connector-id-in-each-connector-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0104-drm-nouveau-nvif-refactor-deprecated-strncpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0104-drm-ssd130x-Preallocate-format-conversion-buffer-in-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0104-drm-sysfs-Link-DRM-connectors-to-corresponding-Type-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0104-fbdev-atyfb-Reorder-backlight-and-framebuffer-init-c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0105-drm-Remove-struct-drm_flip_task-from-DRM-interfaces.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0105-drm-nouveau-core-refactor-deprecated-strncpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0105-drm-sti-sti_hdmi-convert-to-using-is_hdmi-from-displ.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0105-fbdev-atyfb-Use-hardware-device-as-backlight-parent.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0106-drm-Fix-flip-task-docs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0106-drm-nouveau-pm-refactor-deprecated-strncpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0106-drm-rockchip-cdn-dp-call-drm_connector_update_edid_p.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0106-fbdev-aty128fb-Reorder-backlight-and-framebuffer-ini.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0107-drm-bridge-dw-hdmi-cec-Add-arbitration-lost-event.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0107-drm-scheduler-mark-jobs-without-fence-as-canceled.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0107-drm-virtio-Fix-return-value-for-VIRTGPU_CONTEXT_PARA.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0107-fbdev-aty128fb-Use-hardware-device-as-backlight-pare.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0108-drm-dp_mst-Fix-NULL-dereference-during-payload-addit.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0108-drm-test-rearrange-test-entries-in-Kconfig-and-Makef.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0108-drm-udl-delete-dead-code.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0108-fbdev-broadsheetfb-Call-device_remove_file-with-hard.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0109-drm-client-Do-not-acquire-module-reference.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0109-drm-dp_mst-Sanitize-error-return-during-payload-addi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0109-fbdev-ep93xx-fb-Alloc-DMA-memory-from-hardware-devic.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0110-accel-ivpu-Rename-cons-rx_msg_lock.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0110-drm-dp_mst-Tune-down-error-message-during-payload-ad.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0110-fbdev-ep93xx-fb-Output-messages-with-fb_info-and-fb_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0111-accel-ivpu-Do-not-use-irqsave-in-ivpu_ipc_dispatch.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0111-drm-nouveau-devinit-tu102-remove-attempt-at-loading-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0112-accel-ivpu-Do-not-use-cons-aborted-for-job_done_thre.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0112-drm-nouveau-imem-support-allocations-not-preserved-a.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0112-fbdev-fsl-diu-fb-Output-messages-with-fb_-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0113-accel-ivpu-Use-dedicated-work-for-job-timeout-detect.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0113-accel-qaic-Register-for-PCI-driver-at-the-beginning-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0113-drm-nouveau-gr-gf100-lose-contents-of-global-ctxbufs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0113-fbdev-mb862xxfb-Output-messages-with-fb_dbg.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0114-accel-ivpu-Use-threaded-IRQ-to-handle-JOB-done-messa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0114-accel-qaic-Use-devm_drm_dev_alloc-instead-of-drm_dev.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0114-drm-nouveau-mmu-gp100-always-invalidate-TLBs-at-CACH.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0114-fbdev-metronomefb-Use-hardware-device-for-dev_err.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0115-accel-qaic-Update-MAX_ORDER-use-to-be-inclusive.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0115-drm-nouveau-kms-nv50-fix-mst-payload-alloc-fail-cras.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0115-fbdev-nvidiafb-Reorder-backlight-and-framebuffer-ini.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0116-drm-nouveau-disp-rearrange-output-methods.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0116-drm-print-Handle-NULL-drm-device-in-__drm_printk.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0116-fbdev-nvidiafb-Use-hardware-device-as-backlight-pare.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0117-drm-nouveau-disp-add-output-detect-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0117-fbdev-pxa168fb-Do-not-assign-to-struct-fb_info.dev.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0118-drm-nouveau-disp-add-output-method-to-fetch-edid.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0118-drm-panel-nv3051d-Add-Powkiddy-RK2023-Panel-Support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0118-fbdev-radeonfb-Reorder-backlight-and-framebuffer-cle.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0119-drm-nouveau-disp-rename-internal-output-acquire-rele.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0119-drm-panel-elida-kd35t133-trival-update-panel-size-fr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0119-fbdev-radeonfb-Use-hardware-device-as-backlight-pare.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0120-drm-bridge-tc358768-remove-unused-variable.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0120-drm-nouveau-kms-Add-INHERIT-ioctl-to-nvkm-nvif-for-r.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0120-fbdev-rivafb-Reorder-backlight-and-framebuffer-init-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0121-drm-bridge-lt9211-Do-not-generate-HFP-HBP-HSA-and-EO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0121-drm-nouveau-disp-shuffle-to-make-upcoming-diffs-pret.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0121-drm-panel-elida-kd35t133-drop-drm_connector_set_orie.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0121-fbdev-rivafb-Use-hardware-device-as-backlight-parent.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0122-drm-bridge-lt9611-Do-not-generate-HFP-HBP-HSA-and-EO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0122-drm-nouveau-disp-add-acquire_dac.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0122-drm-panel-elida-kd35t133-Drop-shutdown-logic.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0122-fbdev-sh7760fb-Use-fb_dbg-in-sh7760fb_get_color_info.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0123-drm-nouveau-disp-add-acquire_sor-pior.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0123-drm-panel-elida-kd35t133-Drop-prepare-unprepare-logi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0123-fbdev-sh7760fb-Output-messages-with-fb_dbg.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0124-dma-buf-Replace-strlcpy-with-strscpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0124-drm-nouveau-disp-update-SOR-routing-immediately-on-a.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0124-drm-vkms-add-rotate-0-and-reflect-x-property.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0124-fbdev-sh7760fb-Alloc-DMA-memory-from-hardware-device.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0125-drm-nouveau-kms-nv50-pull-some-common-init-out-of-OR.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0125-drm-rockchip-vop2-Add-NV20-and-NV30-support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0125-drm-vkms-add-reflect-y-and-rotate-180-property.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0125-fbdev-sh7760fb-Use-hardware-device-with-dev_-output-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0126-drm-nouveau-kms-nv50-remove-nv_encoder.audio.connect.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0126-drm-rockchip-rk3066_hdmi-Remove-useless-mode_fixup.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0126-drm-vkms-add-rotate-90-property.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0126-fbdev-sm501fb-Output-message-with-fb_err.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0127-drm-nouveau-kms-nv50-keep-output-state-around-until-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0127-drm-rockchip-rk3066_hdmi-Switch-encoder-hooks-to-ato.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0127-drm-vkms-add-rotate-270-property.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0127-fbdev-smscufx-Detect-registered-fb_info-from-refcoun.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0128-drm-nouveau-kms-nv50-move-audio-enable-post-modeset.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0128-drm-vkms-drop-Rotation-TODO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0128-fbdev-tdfxfb-Set-i2c-adapter-parent-to-hardware-devi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0129-drm-nouveau-disp-add-output-hdmi-config-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0129-fbdev-arcfb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0129-fbdev-core-Pass-Linux-device-to-pm_vt_switch_-functi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0130-drm-arcpgu-Convert-to-platform-remove-callback-retur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0130-drm-nouveau-disp-move-hdmi-disable-out-of-release.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0130-fbdev-au1200fb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0130-fbdev-core-Move-framebuffer-and-backlight-helpers-in.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0131-drm-armada-Convert-to-platform-remove-callback-retur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0131-drm-nouveau-disp-release-outputs-post-modeset.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0131-fbdev-broadsheetfb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0131-fbdev-core-Add-fb_device_-create-destroy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0132-drm-bridge-cdns-mhdp8546-Improve-error-reporting-in-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0132-drm-nouveau-disp-remove-SOR-routing-updates-from-sup.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0132-fbdev-core-Move-procfs-code-to-separate-file.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0132-fbdev-hecubafb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0133-drm-bridge-cdns-mhdp8546-Convert-to-platform-remove-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0133-drm-nouveau-disp-add-output-backlight-control-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0133-fbdev-core-Move-file-I-O-code-into-separate-file.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0133-fbdev-metronomefb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0134-drm-bridge-tpd12s015-Convert-to-platform-remove-call.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0134-drm-nouveau-disp-add-output-lvds-config-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0134-fbdev-core-Rework-fb-init-code.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0134-fbdev-ps3fb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0135-drm-etnaviv-Convert-to-platform-remove-callback-retu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0135-drm-nouveau-disp-add-hdmi-audio-hal-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0135-fbdev-Make-support-for-userspace-interfaces-configur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0135-fbdev-smscufx-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0136-drm-imx-dcss-Convert-to-platform-remove-callback-ret.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0136-drm-nouveau-disp-move-dp-aux-pwr-method-to-HAL.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0136-drm-ttm-Don-t-shadow-the-operation-context.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0136-fbdev-udlfb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0137-drm-imx-lcdc-Convert-to-platform-remove-callback-ret.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0137-drm-nouveau-disp-add-dp-aux-xfer-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0137-fbdev-vfb-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0138-drm-ast-Remove-vga2_clone-field.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0138-drm-kmb-Convert-to-platform-remove-callback-returnin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0138-drm-nouveau-disp-add-dp-rates-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0138-fbdev-xen-fbfront-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0139-drm-ast-Implement-register-helpers-in-ast_drv.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0139-drm-mediatek-Convert-to-platform-remove-callback-ret.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0139-drm-nouveau-kms-nv50-split-DP-disable-enable-into-tw.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0139-fbdev-Return-number-of-bytes-read-or-written.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0140-drm-ast-Remove-dead-else-branch-in-POST-code.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0140-drm-meson-Convert-to-platform-remove-callback-return.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0140-drm-nouveau-kms-nv50-flush-mst-disables-together.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0140-fbdev-Use-screen_buffer-in-fb_sys_-read-write.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0141-drm-ast-Remove-device-POSTing-and-config-from-chip-d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0141-drm-nouveau-Convert-to-platform-remove-callback-retu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0141-drm-nouveau-kms-nv50-fixup-sink-D3-before-tearing-do.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0141-fbdev-Don-t-re-validate-info-state-in-fb_ops-impleme.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0142-drm-ast-Set-PCI-config-before-accessing-I-O-register.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0142-drm-nouveau-disp-add-dp-train-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0142-drm-sprd-Convert-to-platform-remove-callback-returni.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0142-fbdev-Validate-info-screen_-base-buffer-in-fb_ops-im.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0143-drm-ast-Enable-and-unlock-device-access-early-during.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0143-drm-nouveau-disp-move-link-training-out-of-superviso.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0143-fbdev-Move-I-O-read-and-write-code-into-helper-funct.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0144-drm-ast-Set-up-release-action-right-after-enabling-M.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0144-drm-edid-firmware-drop-drm_kms_helper.edid_firmware-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0144-drm-fb-helper-Use-fb_-cfb-sys-_-read-write.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0144-drm-nouveau-disp-add-dp-sst-config-method.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0145-Documentation-vkms-clarify-devres-managed-reference-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0145-drm-ast-Distinguish-among-chip-generations.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0145-drm-nouveau-disp-add-dp-mst-id-get-put-methods.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0145-fbdev-simplefb-Suppress-error-on-missing-power-domai.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0146-drm-ast-Detect-AST-1300-model.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0146-drm-connector-document-enum-drm_connector_tv_mode-DR.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0146-drm-nouveau-disp-move-outp-conn-construction-to-chip.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0146-drm-nouveau-fifo-Remove-duplicated-include-in-chan.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0147-drm-ast-Detect-AST-1400-model.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0147-drm-nouveau-disp-move-outp-init-fini-paths-to-chipse.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0147-drm-rockchip-rk3066_hdmi-include-drm-drm_atomic.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0147-drm-sun4i-rename-sun4i_dotclock-to-sun4i_tcon_dclk.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0148-drm-ast-Detect-AST-2510-model.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0148-drm-gpuvm-Helper-to-get-range-of-unmap-from-a-remap-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0148-drm-nouveau-disp-nv50-skip-DCB_OUTPUT_TV.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0148-drm-sun4i-calculate-proper-DCLK-rate-for-DSI.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0149-drm-ast-Move-widescreen-and-tx-chip-detection-into-s.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0149-drm-nouveau-kms-nv50-create-heads-based-on-nvkm-head.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0149-dt-bindings-gpu-Add-Imagination-Technologies-PowerVR.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0150-drm-ast-Merge-config-and-chip-detection.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0150-drm-imagination-uapi-Add-PowerVR-driver-UAPI.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0150-drm-nouveau-kms-nv50-create-heads-after-outps-conns.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0151-drm-edid-make-read-only-const-array-static.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0151-drm-imagination-Add-skeleton-PowerVR-driver.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0151-drm-nouveau-kms-nv50-name-aux-channels-after-their-c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0151-drm-panel-sharp-ls043t1le01-drop-dummy-functions-and.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0152-drm-imagination-Get-GPU-resources.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0152-drm-nouveau-kms-nv50-create-connectors-based-on-nvkm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0152-drm-panel-panel-simple-Add-BOE-EV121WXM-N10-1850-pan.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0152-drm-tests-Fix-swapped-drm_framebuffer-tests-paramete.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0153-drivers-firmware-Move-sysfb_init-from-device_initcal.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0153-drm-edid-Add-quirk-for-OSVR-HDK-2.0.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0153-drm-imagination-Add-GPU-register-headers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0153-drm-nouveau-kms-nv50-create-outputs-based-on-nvkm-in.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0154-drm-bridge-samsung-dsim-Drain-command-transfer-FIFO-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0154-drm-imagination-Add-firmware-and-MMU-related-headers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0154-drm-nouveau-kms-nv50-disable-dcb-parsing.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0154-drm-ssd130x-Fix-include-guard-name.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0155-drm-bridge-analogix-anx78xx-Add-missing-definition.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0155-drm-gud-use-vmalloc_array-and-vcalloc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0155-drm-imagination-Add-FWIF-headers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0155-drm-panel-boe-tv101wum-nl6-Remove-extra-delay.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0156-drm-drm_gem.c-Remove-surplus-else-after-return.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0156-drm-imagination-Add-GPU-ID-parsing-and-firmware-load.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0156-drm-panel-boe-tv101wum-nl6-Fine-tune-the-panel-power.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0156-drm-tegra-rgb-Parameterize-V-and-H-sync-polarities.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0157-drm-Add-kms-driver-for-loongson-display-controller.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0157-drm-imagination-Add-GEM-and-VM-related-code.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0158-drm-bridge-tc358768-Default-to-positive-h-v-syncs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0158-drm-imagination-Implement-power-management.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0158-drm-nouveau-nvkm-fini-object-children-in-reverse-ord.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0159-drm-imagination-Implement-firmware-infrastructure-an.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0159-drm-nouveau-nvkm-punt-spurious-irq-messages-to-debug.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0159-gpu-drm-bridge-No-need-to-set-device_driver-owner.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0160-drm-bridge-tc358768-Cleanup-PLL-calculations.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0160-drm-bridge-tc358768-remove-unneeded-semicolon.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0160-drm-imagination-Implement-MIPS-firmware-processor-an.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0160-drm-nouveau-fb-gp102-ga100-switch-to-simpler-vram-si.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0161-accel-ivpu-Initial-debugfs-support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0161-drm-imagination-Implement-free-list-and-HWRT-create-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0161-drm-nouveau-fb-ga102-construct-vidmem-heap-via-new-g.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0161-drm-panel-Modify-innolux-hj110iz-panel-initial-code.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0162-accel-ivpu-Add-firmware-tracing-support.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0162-drm-drm_atomic_helper.c-fix-a-typo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0162-drm-imagination-Implement-context-creation-destructi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0162-drm-nouveau-fifo-remove-left-over-references-to-nvkm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0163-accel-ivpu-Add-debugfs-files-for-testing-device-rese.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0163-drm-imagination-Implement-job-submission-and-schedul.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0163-drm-nouveau-fifo-return-ERR_PTR-from-nvkm_runl_new.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0163-drm-ttm-let-struct-ttm_device_funcs-be-placed-in-rod.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0164-accel-ivpu-Print-firmware-name-and-version.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0164-drm-imagination-Add-firmware-trace-header.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0164-drm-nouveau-fifo-ga100-remove-individual-runlists-ra.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0165-accel-ivpu-Add-fw_name-file-to-debugfs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0165-drm-imagination-Add-firmware-trace-to-debugfs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0165-drm-nouveau-fifo-ga100-add-per-runlist-nonstall-intr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0165-fbdev-hitfb-Cast-I-O-offset-to-address.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0166-drm-imagination-Add-driver-documentation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0166-drm-nouveau-nvif-fix-potential-double-free.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0166-fbdev-matrox-Remove-trailing-whitespaces.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0167-drm-bridge-tc358768-Attempt-to-fix-DSI-horizontal-ti.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0167-drm-nouveau-kms-don-t-call-drm_dp_cec_set_edid-on-TM.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0167-ipu-v3-Include-linux-io.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0168-drm-i915-display-Use-intel_bo_to_drm_bo-instead-of-o.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0168-drm-nouveau-disp-drop-unused-argument-in-nv50_dp_mod.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0168-drm-sched-Rename-to-drm_sched_can_queue.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0169-drm-bridge-panel-Fix-device-link-for-DRM_BRIDGE_ATTA.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0169-drm-i915-drop-gt-intel_gt.h-include-from-skl_univers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0169-drm-sched-Rename-to-drm_sched_wakeup_if_can_queue.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0169-fbdev-sm712fb-Do-not-include-linux-screen_info.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0170-drm-armada-Call-drm_atomic_helper_shutdown-at-shutdo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0170-drm-i915-aux-add-separate-register-macros-and-functi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0170-drm-panel-Add-Samsung-S6D7AA0-panel-controller-drive.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0170-sysfb-Do-not-include-linux-screen_info.h-from-sysfb-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0171-drm-Call-drm_atomic_helper_shutdown-at-shutdown-time.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0171-drm-bridge-samsung-dsim-Implement-support-for-clock-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0171-drm-i915-aux-rename-dev_priv-to-i915.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0171-fbdev-broadsheetfb-Select-FB_SYS_HELPERS_DEFERRED.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0172-drm-i915-stop-including-i915_utils.h-from-intel_runt.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0172-drm-vc4-Call-drm_atomic_helper_shutdown-at-shutdown-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0172-fbdev-broadsheetfb-Generate-deferred-I-O-ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0173-drm-i915-display-debugfs-entry-to-list-display-capab.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0173-drm-nouveau-constify-pointers-to-hwmon_channel_info.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0173-drm-ssd130x-Call-drm_atomic_helper_shutdown-at-remov.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0173-fbdev-hecubafb-Select-FB_SYS_HELPERS_DEFERRED.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0174-drm-i915-display-Add-framework-to-add-parameters-spe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0174-drm-nouveau-acr-ga102-set-variable-ga102_gsps-storag.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0174-fbdev-hecubafb-Generate-deferred-I-O-ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0175-drm-hisilicon-kirin-Call-drm_atomic_helper_shutdown-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0175-drm-i915-display-Dump-also-display-parameters.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0175-drm-msm-Use-struct-fb_info.screen_buffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0175-fbdev-metronomefb-Select-FB_SYS_HELPERS_DEFERRED.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0176-drm-i915-display-Move-enable_fbc-module-parameter-un.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0176-fbdev-metronomefb-Generate-deferred-I-O-ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0177-drm-bridge-dw-hdmi-Replace-all-non-returning-strlcpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0177-drm-i915-display-Move-psr-related-module-parameters-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0177-drm-ssd130x-Drop-_helper-prefix-from-struct-drm_-_he.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0177-fbdev-ssd1307fb-Select-FB_SYS_HELPERS_DEFERRED.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0178-accel-qaic-Remove-size-field-from-struct-qaic_bo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0178-drm-i915-display-Move-vbt_firmware-module-parameter-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0178-drm-panel-samsung-s6d7aa0-use-pointer-for-drm_mode-i.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0178-fbdev-ssd1307fb-Generate-deferred-I-O-ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0179-dma-buf-sw_sync-Replace-all-non-returning-strlcpy-wi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0179-drm-i915-display-Move-lvds_channel_mode-module-param.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0179-drm-simpledrm-Add-support-for-multiple-power-domains.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0179-fbdev-xen-fbfront-Select-FB_SYS_HELPERS_DEFERRED.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0180-drm-bridge-Add-200ms-delay-to-wait-FW-HPD-status-sta.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0180-drm-i915-display-Move-panel_use_ssc-module-parameter.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0180-drm-shmobile-Use-p4cc-to-print-fourcc-codes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0180-fbdev-xen-fbfront-Generate-deferred-I-O-ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0181-drm-i915-display-Move-vbt_sdvo_panel_type-module-par.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0181-drm-imx-dcss-Call-drm_atomic_helper_shutdown-at-shut.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0181-drm-shmobile-Add-support-for-DRM_FORMAT_XRGB8888.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0182-drm-gpuvm-rename-struct-drm_gpuva_manager-to-struct-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0182-drm-i915-display-Move-enable_dc-module-parameter-und.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0182-drm-shmobile-Switch-to-drm_crtc_init_with_planes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0182-drm-virtio-Conditionally-allocate-virtio_gpu_fence.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0183-drm-gpuvm-allow-building-as-module.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0183-drm-i915-display-Move-enable_dpt-module-parameter-un.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0183-drm-shmobile-Add-missing-call-to-drm_fbdev_generic_s.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0183-nouveau-dispnv50-add-cursor-pitch-check.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0184-drm-i915-display-Move-enable_sagv-module-parameter-u.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0184-drm-nouveau-disp-use-drm_kms_helper_connector_hotplu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0184-drm-nouveau-uvmm-rename-umgr-to-base.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0184-drm-shmobile-Make-DRM_SHMOBILE-visible-on-Renesas-So.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0185-drm-bridge-tc358767-Use-devm_clk_get_enabled-helper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0185-drm-docs-Fix-usage-stats-typos.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0185-drm-gma500-refactor-deprecated-strncpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0185-drm-i915-display-Move-disable_power_well-module-para.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0186-drm-Add-common-fdinfo-helper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0186-drm-bridge-tfp410-Support-format-negotiation-hooks.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0186-drm-gpuvm-doc-fix-filename-references.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0186-drm-i915-display-Move-enable_ips-module-parameter-un.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0187-drm-bridge-tfp410-Set-input_bus_flags-in-atomic_chec.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0187-drm-i915-display-Move-invert_brightness-module-param.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0187-drm-msm-Switch-to-fdinfo-helper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0187-drm-nouveau-kms-nv50-hide-unused-variables.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0188-drm-amdgpu-Switch-to-fdinfo-helper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0188-drm-bridge-mhdp8546-Add-minimal-format-negotiation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0188-drm-bridge-use-drm_bridge_get_edid-instead-of-using-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0188-drm-i915-display-Move-edp_vswing-module-parameter-un.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0189-drm-Add-fdinfo-memory-stats.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0189-drm-bridge-lt9611uxc-use-drm_bridge_get_edid-instead.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0189-drm-bridge-mhdp8546-Set-input_bus_flags-from-atomic_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0189-drm-i915-display-Move-enable_dpcd_backlight-module-p.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0190-drm-bridge-sii902x-Support-format-negotiation-hooks.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0190-drm-i915-display-Move-load_detect_test-parameter-und.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0190-drm-msm-Add-memory-stats-to-fdinfo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0190-drm-tests-Add-calls-to-drm_fb_blit-on-supported-form.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0191-accel-qaic-Update-BO-metadata-in-a-central-location.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0191-drm-bridge-sii902x-Set-input_bus_flags-in-atomic_che.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0191-drm-doc-Relax-fdinfo-string-constraints.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0191-drm-i915-display-Move-force_reset_modeset_test-param.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0191-drm-tests-Add-new-format-conversion-tests-to-better-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0192-accel-qaic-Declare-BO-sliced-after-all-the-operation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0192-drm-bridge-adv7511-Convert-to-use-maple-tree-registe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0192-drm-bridge-tc358767-explicitly-set-readable-register.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0192-drm-gma500-Clear-fbdev-framebuffer-with-fb_memset_io.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0192-drm-i915-display-Move-disable_display-parameter-unde.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0192-drm-tidss-Update-encoder-bridge-chain-connect-model.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0193-accel-qaic-Undo-slicing-setup-done-in-qaic_attach_sl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0193-drm-bridge-cdns-mhdp8546-Fix-the-interrupt-enable-di.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0193-drm-bridge-dpc3433-Convert-to-use-maple-tree-registe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0193-drm-bridge-samsung-dsim-Fix-i.MX8M-enable-flow-to-me.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0193-drm-i915-display-Use-device-parameters-instead-of-mo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0194-accel-qaic-Clean-up-BO-during-flushing-of-transfer-l.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0194-drm-bridge-tc358767-Convert-to-use-maple-tree-regist.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0194-drm-i915-display-Move-verbose_state_checks-under-dis.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0194-drm-ttm-Use-init_on_free-to-delay-release-TTM-BOs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0195-accel-qaic-Create-a-function-to-initialize-BO.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0195-drm-amdgpu-Fix-no-procfs-build.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0195-drm-arm-Make-ARM-devices-menu-depend-on-DRM.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0195-drm-bridge-icn6211-Convert-to-use-maple-tree-registe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0195-drm-i915-display-Move-nuclear_pageflip-under-display.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0196-accel-qaic-Add-QAIC_DETACH_SLICE_BO-IOCTL.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0196-drm-bridge-lt9211-Convert-to-use-maple-tree-register.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0196-drm-bridge-samsung-dsim-fix-blanking-packet-size-cal.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0196-drm-i915-display-Move-enable_dp_mst-under-display.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0196-fbdev-hyperv_fb-Include-linux-screen_info.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0197-drm-bridge-sn65dsi83-Convert-to-use-maple-tree-regis.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0197-drm-execution-context-for-GEM-buffers-v7.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0197-drm-i915-remove-display-device-info-from-i915-capabi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0198-drm-add-drm_exec-selftests-v4.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0198-drm-bridge-samsung-dsim-Fetch-pll-clock-frequency-au.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0198-drm-i915-display-Reset-message-bus-after-each-read-w.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0198-drm-panel-ili9322-Remove-redundant-volatle_reg-opera.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0199-drm-amdkfd-switch-over-to-using-drm_exec-v3.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0199-drm-bridge-samsung-dsim-Select-GENERIC_PHY_MIPI_DPHY.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0199-drm-i915-sprite-move-sprite_name-to-intel_sprite.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0199-drm-panel-ili9322-Convert-to-use-maple-tree-register.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0200-drm-amdgpu-use-drm_exec-for-GEM-and-CSA-handling-v2.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0200-drm-bridge-samsung-dsim-Dynamically-configure-DPHY-t.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0200-drm-i915-lnl-Extend-C10-C20-phy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0200-drm-panel-Add-driver-for-BOE-RM692E5-AMOLED-panel.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0201-drm-amdgpu-use-drm_exec-for-MES-testing.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0201-drm-bridge-samsung-dsim-Support-non-burst-mode.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0201-drm-doc-Document-DRM-device-reset-expectations.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0201-drm-i915-lnl-Fix-check-for-TC-phy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0202-drm-amdgpu-use-the-new-drm_exec-object-for-CS-v3.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0202-drm-i915-display-Abstract-C10-C20-pll-hw-readout.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0202-drm-panel-simple-Add-Ampire-AM-800480L1TMQW-T00H.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0202-drm-vblank-Warn-when-silently-cancelling-vblank-work.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0203-drm-i915-display-Abstract-C10-C20-pll-calculation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0203-drm-loongson-Remove-a-useless-check-in-cursor_plane_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0203-drm-panfrost-Add-cycle-count-GPU-register-definition.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0204-accel-ivpu-Update-debugfs-to-latest-changes-in-DRM.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0204-drm-i915-fix-Makefile-sort-and-indent.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0204-drm-panfrost-Add-fdinfo-support-GPU-load-metrics.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0204-drm-ssd130x-Change-pixel-format-used-to-compute-the-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0204-drm-stm-dsi-Use-devm_platform_ioremap_resource.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0205-accel-ivpu-Compile-ivpu_debugfs.c-conditionally.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0205-drm-i915-move-Makefile-display-debugfs-files-next-to.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0205-drm-panel-ld9040-Use-better-magic-values.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0205-drm-panfrost-Add-fdinfo-support-for-memory-stats.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0206-drm-drm_file-Add-DRM-obj-s-RSS-reporting-function-fo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0206-drm-i915-bios-Clamp-VBT-HDMI-level-shift-on-BDW.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0206-drm-lcdif-Drop-unnecessary-NULL-pointer-check-on-lcd.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0206-drm-panel-ld9040-Register-a-backlight-device.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0207-drm-drv-use-enum-drm_minor_type-when-appropriate.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0207-drm-lcdif-Determine-bus-format-and-flags-in-atomic_c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0207-drm-panfrost-Implement-generic-DRM-object-RSS-report.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0208-drm-amd-pm-Annotate-struct-smu10_voltage_dependency_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0208-drm-file-use-explicit-values-for-enum-drm_minor_type.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0208-drm-i915-Abstract-the-extra-JSL-EHL-DPLL4-power-doma.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0208-drm-lcdif-Check-consistent-bus-format-and-flags-acro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0209-drm-amdgpu-discovery-Annotate-struct-ip_hw_instance-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0209-drm-i915-Move-the-DPLL-extra-power-domain-handling-u.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0209-drm-lcdif-Add-multiple-encoders-and-first-bridges-su.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0210-drm-i915-Extract-_intel_-enable-disable-_shared_dpll.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0210-drm-i915-selftests-Annotate-struct-perf_series-with-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0210-drm-lcdif-Add-i.MX93-LCDIF-compatible-string.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0211-drm-Switch-i2c-drivers-back-to-use-.probe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0211-drm-i915-Move-the-g45-PEG-band-gap-HPD-workaround-to.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0211-drm-manager-to-keep-track-of-GPUs-VA-mappings.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0211-drm-msm-dpu-Annotate-struct-dpu_hw_intr-with-__count.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0212-drm-debugfs-provide-infrastructure-to-dump-a-DRM-GPU.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0212-drm-i915-hdcp-Rename-HCDP-1.4-enablement-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0212-drm-nouveau-pm-Annotate-struct-nvkm_perfdom-with-__c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0212-drm-panel-edp-Convert-to-platform-remove-callback-re.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0213-drm-bridge-display-connector-rename-dp_pwr-to-connec.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0213-drm-i915-hdcp-Convert-intel_hdcp_enable-to-a-blanket.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0213-drm-syncobj-add-IOCTL-to-register-an-eventfd.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0213-drm-vc4-Annotate-struct-vc4_perfmon-with-__counted_b.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0214-drm-bridge-display-connector-handle-hdmi-pwr-supply.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0214-drm-i915-hdcp-Add-more-conditions-to-enable-hdcp.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0214-drm-panel-simple-Drop-prepared_time.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0214-drm-virtio-Annotate-struct-virtio_gpu_object_array-w.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0215-drm-i915-mst-Swap-TRANSCONF-vs.-FECSTALL_DIS_DPTSTRE.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0215-drm-manager-Fix-printk-format-for-size_t.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0215-drm-ttm-Remove-redundant-code-in-ttm_tt_init_fields.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0215-drm-vmwgfx-Annotate-struct-vmw_surface_dirty-with-__.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0216-drm-debugfs-Silence-warning-from-cast.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0216-drm-i915-mst-Disable-transcoder-before-deleting-the-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0216-drm-i915-ttm-Add-I915_BO_PREALLOC.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0216-drm-v3d-Annotate-struct-v3d_perfmon-with-__counted_b.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0217-drm-dp-switch-drm_dp_downstream_-helpers-to-struct-d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0217-drm-i915-display-Set-I915_BO_ALLOC_USER-for-fb.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0217-drm-i915-mst-Clear-ACT-just-before-triggering-payloa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0217-gpu-host1x-Explicitly-include-correct-DT-includes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0218-drm-Explicitly-include-correct-DT-includes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0218-drm-i915-Add-a-function-to-mmap-framebuffer-obj.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0218-drm-i915-mst-Always-write-CHICKEN_TRANS.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0218-drm-panel-nv3051d-Add-Support-for-Anbernic-351V.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0219-drm-amd-display-Fix-mst-hub-unplug-warning.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0219-drm-i915-display-Add-helper-func-to-get-intel_fbdev-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0219-drm-i915-display-Use-dma_fence-interfaces-instead-of.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0220-drm-arm-komeda-Remove-component-framework-and-add-a-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0220-drm-exynos-dsi-Convert-to-platform-remove-callback-r.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0220-drm-i915-display-Implement-fb_mmap-callback-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0220-drm-i915-display-Use-intel_bo_to_drm_bo-instead-of-o.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0221-drm-bridge-samsung-dsim-add-more-mipi-dsi-device-deb.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0221-drm-bridge-tc358767-increase-PLL-lock-time-delay.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0221-drm-i915-Extract-hsw_chicken_trans_reg.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0221-drm-i915-mtl-Disable-stolen-memory-backed-FB-for-A0.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0222-drm-bridge-samsung-dsim-reread-ref-clock-before-conf.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0222-drm-bridge-tc358767-give-VSDELAY-some-positive-value.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0222-drm-i915-Make-IRQ-reset-and-postinstall-multi-gt-awa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0222-drm-i915-Stop-using-a-reg-variable.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0223-drm-bridge-samsung-dsim-update-PLL-reference-clock.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0223-drm-i915-Extract-mchbar_reg.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0223-drm-i915-gt-Consider-multi-gt-instead-of-to_gt.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0223-drm-ssd130x-Fix-pitch-calculation-in-ssd130x_fb_blit.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0224-drm-bridge-samsung-dsim-adjust-porches-by-rounding-u.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0224-drm-i915-dsi-Remove-dead-GLK-checks.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0224-drm-i915-gem-Consider-multi-gt-instead-of-to_gt.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0224-video-Add-auxiliary-display-drivers-to-Graphics-supp.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0225-drm-bridge-samsung-dsim-calculate-porches-in-Hz.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0225-drm-i915-dsi-Extract-port_ctrl_reg.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0225-drm-i915-selftests-Consider-multi-gt-instead-of-to_g.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0225-fbdev-Move-core-fbdev-symbols-to-a-separate-Kconfig-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0226-drm-i915-Remove-unused-for_each_uabi_class_engine.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0226-drm-i915-mtl-Extend-Wa_22011802037-to-MTL-A-step.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0226-drm-panel-simple-allow-LVDS-format-override.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0226-fbdev-Split-frame-buffer-support-in-FB-and-FB_CORE-s.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0227-Documentation-gpu-fix-Panfrost-documentation-build-w.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0227-drm-Make-FB_CORE-to-be-selected-if-DRM-fbdev-emulati.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0227-drm-i915-Move-for_each_engine-out-of-i915_drv.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0227-drm-i915-mtl-WA-to-clear-RDOP-clock-gating.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0228-drm-i915-dp_mst-Disable-DSC-on-ICL-MST-outputs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0228-drm-i915-mtl-Set-has_llc-0.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0228-drm-rockchip-vop2-Demote-message-in-mod_supported-to.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0229-drm-bridge-it6505-Fix-Kconfig-indentation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0229-drm-i915-display-Support-PSR-entry-VSC-packet-to-be-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0229-drm-i915-mtl-Define-MOCS-and-PAT-tables-for-MTL.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0229-drm-rockchip-vop2-Convert-to-use-maple-tree-register.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0230-drm-bridge-Remove-redundant-i2c_client-in-anx7625-it.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0230-drm-i915-move-display-mutex-inits-to-display-code.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0230-drm-i915-mtl-fix-mocs-selftest.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0231-drm-i915-i915_drv-Use-proper-parameter-naming-in-for.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0231-drm-i915-move-display-spinlock-init-to-display-code.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0231-drm-managed-Clean-up-GFP_-flag-usage-in-drmm_kmalloc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0231-drm-rockchip-remove-redundant-of_match_ptr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0232-drm-Remove-flag-FBINFO_DEFAULT-from-fbdev-emulation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0232-drm-i915-i915_drv-Use-i915-instead-of-dev_priv-insie.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0232-drm-rockchip-dsi-Use-devm_platform_get_and_ioremap_r.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0233-drm-dp_mst-Add-helper-to-determine-if-an-MST-port-is.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0233-drm-i915-mtl-Add-PTE-encode-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0233-fbdev-Remove-FBINFO_DEFAULT-from-static-structs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0234-drm-dp_mst-Factor-out-a-helper-to-check-the-atomic-s.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0234-drm-i915-mtl-workaround-coherency-issue-for-Media.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0234-fbdev-Remove-FBINFO_DEFAULT-from-kzalloc-ed-structs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0235-drm-dp_mst-Swap-the-order-of-checking-root-vs.-non-r.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0235-drm-i915-selftest-Record-GT-error-for-gt-failure.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0235-drm-panel-ltk050h3146w-add-mipi_dsi_device.mode_flag.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0235-fbdev-Remove-FBINFO_DEFAULT-from-devm_kzalloc-ed-str.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0236-drm-dp_mst-Allow-DSC-in-any-Synaptics-last-branch-de.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0236-drm-i915-mtl-Add-workaround-14018778641.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0236-drm-panel-ltk050h3146w-add-support-for-Leadtek-LTK05.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0236-fbdev-Remove-FBINFO_DEFAULT-from-framebuffer_alloc-e.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0237-drm-dp-Add-DP_HBLANK_EXPANSION_CAPABLE-and-DSC_PASST.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0237-drm-i915-dg2-Remove-Wa_15010599737.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0237-drm-i915-hwmon-Get-mutex-and-rpm-ref-just-once-in-hw.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0238-drm-dp_mst-Add-HBLANK-expansion-quirk-for-Synaptics-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0238-drm-i915-guc-Disable-PL1-power-limit-when-loading-Gu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0238-drm-i915-selftests-Align-igt_spinner_create_request-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0239-drm-dp-Add-helpers-to-calculate-the-link-BW-overhead.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0239-drm-i915-hwmon-Block-waiting-for-GuC-reset-to-comple.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0240-drm-i915-dp_mst-Enable-FEC-early-once-it-s-known-DSC.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0240-drm-i915-mtl-Implement-Wa_14019141245.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0241-drm-i915-Migrate-platform-dependent-mock-hugepage-se.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0241-drm-i915-dp-Specify-the-FEC-overhead-as-an-increment.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0241-fbdev-fsl-diu-fb-Remove-flag-FBINFO_DEFAULT.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0242-drm-i915-Use-correct-huge-page-manager-for-MTL.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0242-drm-i915-dp-Pass-actual-BW-overhead-to-m_n-calculati.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0242-fbdev-Remove-FBINFO_FLAG_DEFAULT-from-kzalloc-ed-str.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0243-drm-i915-dp_mst-Account-for-FEC-and-DSC-overhead-dur.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0243-fbdev-Remove-FBINFO_FLAG_DEFAULT-from-framebuffer_al.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0244-drm-i915-dp_mst-Add-atomic-state-for-all-streams-on-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0244-drm-i915-selftest-Update-the-SLPC-selftest.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0244-fbdev-atafb-Remove-flag-FBINFO_FLAG_DEFAULT.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0245-drm-i915-dp_mst-Program-the-DSC-PPS-SDP-for-each-str.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0245-drm-i915-rc6-throw-out-set-wrapper.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0245-fbdev-pxafb-Remove-flag-FBINFO_FLAG_DEFAULT.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0246-drm-i915-dp-Make-sure-the-DSC-PPS-SDP-is-disabled-wh.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0246-i915-pmu-Add-support-for-total-context-runtime-for-G.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0247-drm-i915-dp_mst-Add-missing-DSC-compression-disablin.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0247-drm-i915-fdinfo-Enable-fdinfo-for-GuC-backends.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0247-fbdev-Remove-FBINFO_DEFAULT-and-FBINFO_FLAG_DEFAULT.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0248-drm-i915-dp-Rename-intel_ddi_disable_fec_state-to-in.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0248-drm-i915-gt-Use-gt_err-for-GT-info.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0248-fbdev-Document-that-framebuffer_alloc-returns-zero-e.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0249-drm-i915-dp-Wait-for-FEC-detected-status-in-the-sink.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0249-drm-i915-guc-Force-a-reset-on-internal-GuC-error.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0249-drm-i915-selftests-Use-gt_err-for-GT-info.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0249-drm-panel-db7430-remove-unused-variables.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0250-drm-i915-dp-Disable-FEC-ready-flag-in-the-sink.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0250-drm-i915-guc-Consolidate-duplicated-capture-list-cod.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0250-drm-i915-mtl-Adding-DeviceID-for-Arrowlake-S-under-M.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0250-fbdev-Add-fb_ops-init-macros-for-framebuffers-in-DMA.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0251-drm-fbdev-dma-Use-fbdev-DMA-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0251-drm-i915-dp_mst-Handle-the-Synaptics-HBlank-expansio.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0251-drm-i915-gsc-define-gsc-fw.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0251-drm-i915-guc-Capture-list-naming-clean-up.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0252-drm-i915-dp_mst-Enable-decompression-in-the-sink-fro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0252-drm-i915-guc-Fix-error-capture-for-virtual-engines.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0252-drm-tegra-Use-fbdev-DMA-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0253-drm-i915-dp-Enable-DSC-via-the-connector-decompressi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0253-drm-i915-gt-Wait-longer-for-tasks-in-migrate-selftes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0253-drm-i915-gvt-fix-intel_vgpu_alloc_resource-kernel-do.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0253-drm-tegra-Set-fbdev-FBINFO_VIRTFB-flag.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0254-drm-i915-Add-Wa_14015150844.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0254-drm-i915-dp_mst-Enable-DSC-passthrough.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0254-drm-i915-vma-fix-kernel-doc-function-name-for-i915_v.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0254-drm-tegra-Store-pointer-to-vmap-ed-framebuffer-in-sc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0255-drm-exynos-Use-fbdev-DMA-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0255-drm-i915-dp_mst-Enable-MST-DSC-decompression-for-all.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0255-drm-i915-mtl-Drop-Wa_14017240301.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0255-drm-i915-utils-drop-kernel-doc-from-__wait_for.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0256-drm-exynos-Set-fbdev-FBINFO_VIRTFB-flag.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0256-drm-i915-Factor-out-function-to-clear-pipe-update-fl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0256-drm-i915-Run-relevant-bits-of-debugfs-drop_caches-pe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0256-drm-i915-vma-document-struct-i915_vma_resource-waker.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0257-drm-i915-dp_mst-Force-modeset-CRTC-if-DSC-toggling-r.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0257-drm-i915-gt-skip-WA-verification-for-GEN7_MISCCPCTL-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0257-drm-i915-perf-fix-i915_perf_ioctl_version-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0257-drm-omapdrm-Set-VM-flags-in-GEM-object-mmap-function.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0258-drm-i915-Add-Wa_18022495364.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0258-drm-i915-dp_mst-Improve-BW-sharing-between-MST-strea.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0258-drm-i915-error-fix-i915_capture_error_state-kernel-d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0258-drm-omapdrm-Use-GEM-mmap-for-fbdev-emulation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0259-drm-i915-dp_mst-Check-BW-limitations-only-after-all-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0259-drm-i915-huc-silence-injected-failure-in-the-load-vi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0259-drm-i915-request-drop-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0259-drm-omapdrm-Set-fbdev-FBINFO_VIRTFB-flag.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0260-drm-i915-Query-compressed-bpp-properly-using-correct.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0260-drm-i915-gem-fix-i915_gem_object_lookup_rcu-kernel-d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0260-drm-i915-pxp-mtl-Update-pxp-firmware-response-timeou.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0260-fbdev-Remove-FB_DEFAULT_SYS_OPS.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0261-drm-i915-Drop-redundant-modeset-check.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0261-drm-i915-engine-fix-kernel-doc-function-name-for-int.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0261-drm-i915-pxp-mtl-Update-pxp-firmware-packet-size.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0261-fbdev-Harmonize-some-comments-in-linux-fb.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0262-drm-i915-Split-intel_update_crtc-into-two-parts.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0262-drm-i915-context-fix-kernel-doc-parameter-descriptio.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0262-drm-i915-lrc-User-PXP-contexts-requires-runalone-bit.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0262-drm-panel-ld9040-add-backlight-Kconfig-dependency.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0263-drm-ast-Do-not-enable-PCI-resources-multiple-times.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0263-drm-i915-Do-plane-etc.-updates-more-atomically-acros.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0263-drm-i915-gtt-fix-i915_vm_resv_put-kernel-doc-paramet.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0263-drm-i915-refactor-deprecated-strncpy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0264-drm-i915-engine-hide-preempt_hang-selftest-member-fr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0264-drm-i915-gt-Update-RC6-mask-for-mtl_drpc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0264-drm-i915-gvt-Clean-up-zero-initializers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0264-drm-ssd130x-Inline-the-ssd130x_buf_-alloc-free-funct.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0265-drm-i915-gt-remove-a-static-inline-that-requires-inc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0265-drm-i915-guc-add-dbgfs_node-member-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0265-drm-panelreplay-dpcd-register-definition-for-panelre.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0265-drm-ssd130x-Allocate-buffer-in-the-plane-s-.atomic_c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0266-dma-buf-Fix-the-typo-in-DMA-BUF-statistics-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0266-drm-i915-gem-remove-inlines-from-i915_gem_execbuffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0266-drm-i915-guc-drop-lots-of-kernel-doc-markers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0266-drm-i915-psr-Move-psr-specific-dpcd-init-into-own-fu.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0267-drm-amdgpu-Rename-aqua_vanjaram_reg_init.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0267-drm-i915-Add-Wa_18028616096.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0267-drm-i915-guc-add-intel_guc_state_capture-member-docs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0267-drm-i915-panelreplay-Initializaton-and-compute-confi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0268-drm-amd-display-Remove-else-after-return-statement-i.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0268-drm-i915-active-fix-kernel-doc-for-function-paramete.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0268-drm-i915-panelreplay-Enable-panel-replay-dpcd-initia.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0268-drm-i915-perf-Remove-gtt_offset-from-stream-oa_buffe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0269-drm-amd-display-Remove-else-after-return-in-dm_crtc_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0269-drm-i915-Do-not-disable-preemption-for-resets.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0269-drm-i915-panelreplay-enable-disable-panel-replay.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0269-drm-i915-pmu-drop-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0270-drm-amd-display-Clean-up-style-problems-in-amdgpu_dm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0270-drm-i915-Avoid-endless-HPD-poll-detect-loop-via-runt.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0270-drm-i915-abstract-plane-protection-check.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0270-drm-i915-pxp-fix-kernel-doc-for-member-dev_link.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0271-drm-amd-display-Remove-redundant-braces-in-amdgpu_dm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0271-drm-i915-Don-t-change-the-status-of-forced-connector.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0271-drm-i915-remove-excess-functions-from-plane-protecti.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0271-drm-i915-scatterlist-fix-kernel-doc-parameter-docume.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0272-drm-amd-display-Use-seq_puts-in-amdgpu_current_color.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0272-drm-i915-Don-t-change-the-status-of-forced-connector.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0272-drm-i915-mtl-Define-GSC-Proxy-component-interface.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0272-drm-i915-update-in-source-bug-filing-URLs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update patches.suse/0273-drm-amd-display-fix-comment-typo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0273-drm-i915-mtl-C20-state-verification.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0273-drm-i915-vdsc-Fix-first_line_bpg_offset-calculation.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0273-mei-gsc_proxy-add-gsc-proxy-driver.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0274-drm-amd-Use-attribute-groups-for-PSP-flashing-attrib.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0274-drm-display-dp-Add-helper-function-to-get-DSC-bpp-pr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0274-drm-i915-dp-Fix-LT-debug-print-in-SDP-CRC-enable.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0274-drm-i915-gsc-add-initial-support-for-GSC-proxy.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0275-drm-amd-Make-flashing-messages-quieter.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0275-drm-i915-display-Store-compressed-bpp-in-U6.4-format.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0275-drm-i915-gsc-add-support-for-GSC-proxy-interrupt.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0275-drm-i915-pxp-mtl-intel_pxp_init_hw-needs-runtime-pm-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0276-drm-amd-Convert-USB-C-PD-F-W-attributes-into-groups.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0276-drm-i915-display-Consider-fractional-vdsc-bpp-while-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0276-drm-i915-pxp-Optimize-GET_PARAM-PXP_STATUS.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0276-drm-i915-vma-fix-struct-i915_vma_bindinfo-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0277-drm-amd-Add-documentation-for-how-to-flash-a-dGPU.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0277-drm-i915-audio-Consider-fractional-vdsc-bpp-while-co.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0277-drm-i915-display-Remove-unused-POWER_DOMAIN_MASK.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0277-drm-i915-gem-fix-function-pointer-member-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0278-drm-amd-Detect-IFWI-or-PD-upgrade-support-in-psp_ear.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0278-drm-i915-cx0-Add-intel_cx0_get_owned_lane_mask.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0278-drm-i915-dsc-mtl-Add-support-for-fractional-bpp.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0278-drm-i915-scatterlist-fix-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0279-drm-amd-adjust-whitespace-for-amdgpu_psp.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0279-drm-i915-Simplify-intel_cx0_program_phy_lane-with-lo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0279-drm-i915-dp-Iterate-over-output-bpp-with-fractional-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0279-drm-i915-ttm-fix-i915_ttm_to_gem-kernel-doc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0280-drm-amdkfd-Access-gpuvm_export_dmabuf-API-to-get-Dma.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0280-drm-i915-cx0-Enable-disable-TX-only-for-owned-PHY-la.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0280-drm-i915-dsc-Add-debugfs-entry-to-validate-DSC-fract.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0280-drm-i915-use-kernel-doc-Werror-when-CONFIG_DRM_I915_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0281-drm-amdgpu-return-an-error-if-query_video_caps-is-no.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0281-drm-i915-cx0-Program-vswing-only-for-owned-lanes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0281-drm-i915-dsc-Allow-DSC-only-with-fractional-bpp-when.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0281-drm-i915-uc-Track-patch-level-versions-on-reduced-ve.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0282-drm-amdgpu-Update-invalid-PTE-flag-setting.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0282-drm-i915-display-Use-int-for-entry-setup-frames.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0282-drm-i915-mtl-Define-GuC-firmware-version-for-MTL.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0283-drm-amdgpu-skip-address-adjustment-for-GFX-RAS-injec.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0283-drm-i915-dp-Tune-down-FEC-detection-timeout-error-me.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0283-drm-i915-guc-Decode-another-GuC-load-failure-case.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0284-drm-amd-display-Clean-up-warnings-in-amdgpu_dm_pp_sm.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0284-drm-i915-guc-Print-status-register-when-waiting-for-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0284-drm-i915-selftest-Simplify-Y-major-tiling-in-blit-se.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0284-drm-i915-xe2lpd-implement-WA-for-underruns-while-ena.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0285-drm-amd-display-Remove-unnecessary-casts-in-amdgpu_d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0285-drm-i915-Eliminate-has_4tile-feature-flag.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0285-drm-i915-panelreplay-Debugfs-support-for-panel-repla.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0285-drm-i915-uc-Enhancements-to-firmware-table-validatio.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0286-drm-amd-display-Clean-up-warnings-in-amdgpu_dm-_mst_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0286-drm-i915-Fix-fractional-bpp-handling-in-intel_link_b.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0286-drm-i915-dp-Consider-output_format-while-computing-d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0286-drm-i915-uc-Reject-duplicate-entries-in-firmware-tab.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0287-drm-amdkfd-Use-KIQ-to-unmap-HIQ.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0287-drm-i915-dp-Move-compressed-bpp-check-with-420-forma.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0287-drm-i915-dsb-DSB-code-refactoring.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0287-drm-i915-uc-Make-unexpected-firmware-versions-an-err.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0288-drm-amdgpu-have-bos-for-PDs-PTS-cpu-accessible-when-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0288-drm-i915-display-keep-struct-intel_display-members-s.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0288-drm-i915-dp_mst-Use-output_format-to-get-the-final-l.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0288-drm-i915-mtl-Drop-FLAT-CCS-check.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0289-drm-amd-amdgpu-Add-cu_occupancy-sysfs-file-to-GFX9.4.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0289-drm-i915-dp-Use-consistent-name-for-link-bpp-and-com.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0289-drm-i915-move-_crtc_clock_get-to-intel_dpll.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0289-drm-i915-mtl-Add-MTL-for-remapping-CCS-FBs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0290-drm-amdkfd-Skip-handle-mapping-SVM-range-with-no-GPU.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0290-drm-i915-add-vlv_pipe_to_phy-helper-to-replace-DPIO_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0290-drm-i915-dp-Update-Bigjoiner-interface-bits-for-comp.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0290-drm-i915-mtl-Fix-the-wa-number-for-Wa_22016670082.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0291-drm-amdgpu-Change-golden-settings-for-GFX-v9.4.3.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0291-drm-i915-convert-vlv_dpio_read-write-from-pipe-to-ph.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0291-drm-i915-intel_cdclk-Add-vdsc-with-bigjoiner-constra.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0291-drm-i915-preparation-for-using-PAT-index.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0292-drm-amdgpu-Fix-error-warnings-in-gmc_v9_0.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0292-drm-i915-dp-Remove-extra-logs-for-printing-DSC-info.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0292-drm-i915-fbc-Split-plane-size-vs.-surface-size-check.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0292-drm-i915-use-pat_index-instead-of-cache_level.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0293-drm-i915-dp-Avoid-forcing-DSC-BPC-for-MST-case.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0293-drm-i915-fbc-Bump-max-surface-size-to-8kx4k-on-icl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0293-drm-i915-pxp-Add-GSC-CS-back-end-resource-init-and-c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0294-drm-amd-display-Block-optimize-on-consecutive-FAMS-e.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0294-drm-i915-dp-Add-functions-to-get-min-max-src-input-b.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0294-drm-i915-fbc-Bump-ivb-FBC-max-surface-size-to-4kx4k.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0294-drm-i915-pxp-Add-MTL-hw-plumbing-enabling-for-KCR-op.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0295-drm-amdgpu-Fix-warnings-in-gfxhub_-v1_0-v1_2.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0295-drm-dp_mst-Store-the-MST-PBN-divider-value-in-fixed-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0295-drm-i915-dp-Check-min-bpc-DSC-limits-for-dsc_force_b.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0295-drm-i915-pxp-Add-MTL-helpers-to-submit-Heci-Cmd-Pack.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0296-drm-amdgpu-Remove-redundant-GFX-v9.4.3-sequence.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0296-drm-dp_mst-Fix-PBN-divider-calculation-for-UHBR-rate.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0296-drm-i915-dp-Avoid-left-shift-of-DSC-output-bpp-by-4.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0296-drm-i915-pxp-Add-GSC-CS-backend-to-send-GSC-fw-messa.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0297-drm-amdgpu-Fix-warnings-in-gfxhub_v2_0.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0297-drm-dp_mst-Add-kunit-tests-for-drm_dp_get_vc_payload.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0297-drm-i915-dp-Rename-helper-to-get-DSC-max-pipe_bpp.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0297-drm-i915-pxp-Add-ARB-session-creation-and-cleanup.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0298-drm-amdgpu-Prefer-dev_warn-over-printk.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0298-drm-i915-dp-Replace-intel_dp_is_uhbr_rate-with-drm_d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0298-drm-i915-dp-Separate-out-functions-for-edp-DP-for-co.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0298-drm-i915-uapi-pxp-Add-a-GET_PARAM-for-PXP.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0299-drm-amdgpu-Fix-warnings-in-gmc_v10_0.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0299-drm-i915-dp-Account-for-channel-coding-efficiency-on.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0299-drm-i915-dp-Add-DSC-BPC-BPP-constraints-while-select.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0299-drm-i915-pxp-On-MTL-KCR-enabling-doesn-t-wait-on-tee.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0300-drm-amdgpu-Fix-errors-warnings-in-gmc_-v6_0-v7_0.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0300-drm-i915-dp-Fix-UHBR-link-M-N-values.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0300-drm-i915-dp-Separate-out-function-to-get-compressed-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0300-drm-i915-pxp-Enable-PXP-with-MTL-GSC-CS.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0301-drm-amdgpu-Fix-warnings-in-gfxhub_v2_1.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0301-drm-i1915-guc-Fix-probe-injection-CI-failures-after-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0301-drm-i915-dp-Get-optimal-link-config-to-have-best-com.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0301-drm-i915-dp_mst-Calculate-the-BW-overhead-in-intel_d.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0302-drm-amdgpu-Remove-else-after-return-statement-in-gmc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0302-drm-i915-dp-Check-src-sink-compressed-bpp-limit-for-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0302-drm-i915-dp_mst-Fix-PBN-MTP_TU-size-calculation-for-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0302-drm-i915-guc-Fix-confused-register-capture-list-crea.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0303-drm-amdgpu-Fix-warnings-in-gmc_v11_0.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0303-drm-i915-dp-Check-if-force_dsc_output_format-is-poss.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0303-drm-i915-dp-Report-a-rounded-down-value-as-the-maxim.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0303-drm-i915-hwmon-Silence-UBSAN-uninitialized-bool-vari.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0304-drm-amdgpu-Remove-else-after-return-statement-in-gfx.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0304-drm-i915-Dump-error-capture-to-kernel-log.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0304-drm-i915-display-Remove-unused-POWER_DOMAIN_MODESET.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0304-drm-i915-dp-Simplify-intel_dp_max_data_rate.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0305-drm-amdgpu-vkms-drop-redundant-set-of-fb_modifiers_n.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0305-drm-i915-dp-Reuse-intel_dp_-max-effective-_data_rate.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0305-drm-i915-guc-Dump-error-capture-to-dmesg-on-CTB-erro.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0306-drm-amd-pm-disbale-dcefclk-device-sysnode-on-GFX-v9..patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0306-drm-i915-dsi-assume-BXT-gpio-works-for-non-native-GP.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0306-drm-i915-guc-slpc-Disable-rps_boost-debugfs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0307-drm-amdgpu-Fix-warnings-in-gmc_v8_0.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0307-drm-i915-display-remove-redundant-parameter-from-sdp.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0307-drm-i915-dsi-switch-mipi_exec_gpio-from-dev_priv-to-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0307-drm-i915-mtl-do-not-enable-render-power-gating-on-MT.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0308-drm-amdgpu-Fix-warnings-in-gfxhub_-v3_0-v3_0_3.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0308-drm-i915-display-combine-DP-audio-compute-config-ste.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0308-drm-i915-dsi-clarify-GPIO-exec-sequence.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0308-drm-i915-mtl-Add-MTL-performance-tuning-changes.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0309-drm-amdgpu-Fix-errors-warnings-in-gfx_v10_0.c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0309-drm-i915-display-add-lock-while-printing-frontbuffer.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0309-drm-i915-dsi-rename-platform-specific-_exec_gpio-to-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0309-drm-i915-mtl-Extend-Wa_16014892111-to-MTL-A-step.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0310-drm-amdgpu-gfx9-move-update_spm_vmid-out-of-rlc_init.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0310-drm-i915-Fix-memory-leaks-in-function-live_nop_switc.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0310-drm-i915-dsi-bxt-icl-GPIO-set-value-do-not-need-gpio.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0310-drm-i915-sdvo-Issue-SetTargetOutput-prior-to-GetAtta.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0311-drm-amdgpu-gfx10-move-update_spm_vmid-out-of-rlc_ini.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0311-drm-i915-dsi-Replace-while-1-with-one-with-clear-exi.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0311-drm-i915-pmu-Change-bitmask-of-enabled-events-to-u32.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0311-drm-i915-sdvo-Protect-macro-args.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0312-drm-amdgpu-Increase-soft-IH-ring-size.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0312-drm-i915-dsi-Get-rid-of-redundant-else.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0312-drm-i915-pmu-Support-PMU-for-all-engines.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0312-drm-i915-sdvo-s-sdvo_inputs_mask-sdvo_num_inputs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0313-drm-i915-Don-t-warn-about-zero-N-P-in-_calc_dpll_par.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0313-drm-i915-dsi-Replace-check-with-a-missing-MIPI-seque.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0313-drm-i915-pmu-Skip-sampling-engines-with-no-enabled-c.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0314-drm-amdkfd-add-kfd2kgd-debugger-callbacks-for-GC-v9..patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0314-drm-i915-Fully-populate-crtc_state-dpll.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0314-drm-i915-dsi-Remove-GPIO-lookup-table-at-the-end-of-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0314-drm-i915-pmu-Transform-PMU-parking-code-to-be-GT-bas.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0315-drm-amdkfd-restore-debugger-additional-info-for-gfx-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0315-drm-i915-dsi-Fix-wrong-initial-value-for-GPIOs-in-bx.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0315-drm-i915-pmu-Add-reference-counting-to-the-sampling-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0315-drm-i915-sdvo-Pick-the-TV-dotclock-from-adjusted_mod.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0316-drm-amdkfd-enable-watch-points-globally-for-gfx943.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0316-drm-i915-dsi-Extract-common-soc_gpio_set_value-helpe.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0316-drm-i915-pmu-Prepare-for-multi-tile-non-engine-count.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0316-drm-i915-sdvo-Fail-gracefully-if-the-TV-dotclock-is-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0317-drm-amdkfd-add-multi-process-debugging-support-for-G.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0317-drm-i915-dsi-Replace-poking-of-VLV-GPIOs-behind-the-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0317-drm-i915-pmu-Export-counters-from-all-tiles.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0317-drm-i915-rpl-Update-pci-ids-for-RPL-P-U.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0318-drm-amdgpu-rename-psp_execute_non_psp_fw_load-and-ma.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0318-drm-i915-dsi-Prepare-soc_gpio_set_value-to-distingui.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0318-drm-i915-mtl-end-support-for-set-caching-ioctl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0318-drm-i915-vma-constify-unbind_fence_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0319-drm-amdgpu-use-psp_execute_load_ip_fw-instead.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0319-drm-i915-display-update-intel_dp_has_audio-to-suppor.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0319-drm-i915-dsi-Replace-poking-of-CHV-GPIOs-behind-the-.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0319-fbdev-Add-Kconfig-options-to-select-different-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0320-drm-i915-display-configure-SDP-split-for-DP-MST.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0320-drm-i915-dsi-Combine-checks-in-mipi_exec_gpio.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0320-drm-radeon-ERROR-foo-bar-should-be-foo-bar.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0320-fbdev-Add-initializer-macros-for-struct-fb_ops.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0321-drm-armada-Use-regular-fbdev-I-O-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0321-drm-i915-iosf-Drop-unused-APIs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0321-drm-i915-regs-split-out-intel_color_regs.h.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0321-drm-radeon-ERROR-foo-should-be-foo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0322-drm-exynos-Use-regular-fbdev-I-O-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0322-drm-i915-color-move-CHV-CGM-pipe-mode-read-to-intel_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0322-drm-i915-display-Use-int-type-for-entry_setup_frames.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0322-drm-radeon-ERROR-foo-should-be-foo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0323-drm-gma500-Use-regular-fbdev-I-O-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0323-drm-i915-display-Do-not-check-psr2-if-psr-panel-repl.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0323-drm-i915-move-HSW-gamma-mode-read-to-intel_color.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0323-drm-radeon-ERROR-that-open-brace-should-be-on-the-pr.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update patches.suse/0324-drm-i915-Polish-some-RMWs.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0324-drm-i915-move-ILK-CSC-mode-read-to-intel_color.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0324-drm-radeon-ERROR-foo-should-be-foo.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0324-drm-radeon-Use-regular-fbdev-I-O-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0325-drm-amdkfd-Update-CWSR-grace-period-for-GFX9.4.3.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0325-drm-fbdev-dma-Use-regular-fbdev-I-O-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0325-drm-i915-Push-audio-enable-disable-further-out.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0325-drm-i915-color-move-SKL-gamma-and-CSC-enable-read-to.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0326-drm-amdgpu-add-watchdog-timer-enablement-for-gfx_v9_.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0326-drm-i915-Wrap-g4x-DP-HDMI-audio-enable-disable.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022).
- Update
  patches.suse/0326-drm-i915-color-move-pre-SKL-gamma-and-CSC-enable-rea.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- Update
  patches.suse/0326-drm-omapdrm-Use-regular-fbdev-I-O-helpers.patch
  (jsc#PED-9898 jsc#PED-10191 jsc#PED-10197 jsc#PED-10226
  jsc#PED-10237 jsc#PED-10340 jsc#PED-10852 jsc#PED-11022
  jsc#PED-3527 jsc#PED-5475 jsc#PED-6068 jsc#PED-6070 jsc#PED-6116
  jsc#PED-6120 jsc#PED-5065 jsc#PED-5477 jsc#PED-5511 jsc#PED-6041
  jsc#PED-6069 jsc#PED-6071).
- commit 55b06a7

- Squashfs: fix uninit-value in squashfs_get_parent (git-fixes).
- commit 126861e

- kbuild/modpost: Continue processing all unresolved symbols
  when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655).
- commit ec0a51c

- Delete and blacklist patches.suse/selftests-bpf-dummy_st_ops-should-reject-0-for-non-n.patch (bsc#1250574)
  BPF selftests that always fails because of missing feature/fix that is
  difficult to backport. Requested by kernel QE.
- commit c7b1efc

- Fix BPF selftests compilation error in bpf_iter.c (git-fixes)
  Since SUSE commit 7cae2487c586, BPF selftests fails to compile.
  .../tools/testing/selftests/bpf/prog_tests/bpf_iter.c: In function 'test_task_common_nocheck':
  .../tools/testing/selftests/bpf/prog_tests/bpf_iter.c:231:26: error: implicit declaration of function 'gettid'; did you mean 'getgid'? [-Werror=implicit-function-declaration]
    231 |         skel-&amp;gt;bss-&amp;gt;tid = gettid();
    |                          ^~~~~~
    |                          getgid
  Fix the BPF selftests compilation failure by:
- bpf: handle implicit declaration of function gettid in
  bpf_iter.c
- Refresh
  patches.suse/selftests-bpf-Clean-up-open-coded-gettid-syscall-inv.patch.
- commit 43aa317

- Drivers: hv: Select CONFIG_SYSFB only if EFI is enabled (git-fixes).
- KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782 CVE-2025-38351).
- Drivers: hv: Always select CONFIG_SYSFB for Hyper-V guests (git-fixes).
- KVM: x86: model canonical checks more precisely (bsc#1246782 CVE-2025-38351).
- KVM: x86: Add X86EMUL_F_MSR and X86EMUL_F_DT_LOAD to aid canonical (bsc#1246782 CVE-2025-38351).
- KVM: x86: Route non-canonical checks in emulator through emulate_ops (bsc#1246782 CVE-2025-38351).
- KVM: x86: drop x86.h include from cpuid.h (bsc#1246782 CVE-2025-38351).
- KVM: x86: Bury guest_cpuid_is_amd_or_hygon() in cpuid.c (bsc#1246782 CVE-2025-38351).
- KVM: SVM: Emulate SYSENTER RIP/RSP behavior for all Intel compat (bsc#1246782 CVE-2025-38351).
- KVM: x86: Inhibit code #DBs in MOV-SS shadow for all Intel compat (bsc#1246782 CVE-2025-38351).
- KVM: x86: Apply Intel's TSC_AUX reserved-bit behavior to Intel compat (bsc#1246782 CVE-2025-38351).
- KVM: x86/pmu: Squash period for checkpointed events based on host (bsc#1246782 CVE-2025-38351).
- commit 6e28165

- smb: client: fix race with concurrent opens in rename(2)
  (bsc#1250179, CVE-2025-39825).
- commit 678fc8e

- smb: client: fix race with concurrent opens in rename(2)
  (bsc#1250179, CVE-2025-39825).
- commit 4df7381

- i3c: master: svc: Use manual response for IBI events
  (git-fixes).
- commit 96c6d0e

- bus: fsl-mc: Check return value of platform_get_resource()
  (git-fixes).
- memory: samsung: exynos-srom: Fix of_iomap leak in
  exynos_srom_probe (git-fixes).
- firmware: meson_sm: fix device leak at probe (git-fixes).
- soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS
  (git-fixes).
- thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes).
- ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT
  (git-fixes).
- ACPI: property: Fix buffer properties extraction for subnodes
  (git-fixes).
- ACPI: processor: idle: Fix memory leak when register cpuidle
  device failed (git-fixes).
- ACPICA: Fix largest possible resource descriptor index
  (git-fixes).
- ACPI: debug: fix signedness issues in read/write helpers
  (git-fixes).
- PM: sleep: core: Clear power.must_resume in noirq suspend
  error path (git-fixes).
- PM / devfreq: mtk-cci: Fix potential error pointer dereference
  in probe() (git-fixes).
- i3c: master: svc: Recycle unused IBI slot (git-fixes).
- i3c: Fix default I2C adapter timeout value (git-fixes).
- i2c: designware: Add disabling clocks when probe fails
  (git-fixes).
- i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD
  (git-fixes).
- pinctrl: renesas: Use int type to store negative error codes
  (git-fixes).
- pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes).
- pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes).
- pinctrl: equilibrium: Remove redundant semicolons (git-fixes).
- power: supply: max77976_charger: fix constant current reporting
  (git-fixes).
- power: supply: cw2015: Fix a alignment coding style issue
  (git-fixes).
- mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes).
- spi: cadence-quadspi: Flush posted register writes before DAC
  access (git-fixes).
- spi: cadence-quadspi: Flush posted register writes before
  INDAC access (git-fixes).
- spi: mtk-snfi: Remove redundant semicolons (git-fixes).
- spi: bcm2835: Remove redundant semicolons (git-fixes).
- regulator: scmi: Use int type to store negative error codes
  (git-fixes).
- regmap: Remove superfluous check for !config in __regmap_init()
  (git-fixes).
- mfd: vexpress-sysreg: Check the return value of
  devm_gpiochip_add_data() (git-fixes).
- pwm: tiehrpwm: Fix corner case in clock divisor calculation
  (git-fixes).
- pwm: tiehrpwm: Make code comment in .free() more useful
  (git-fixes).
- pwm: berlin: Fix wrong register in suspend/resume (git-fixes).
- hwmon: (mlxreg-fan) Separate methods of fan setting coming
  from different subsystems (git-fixes).
- commit e80711d

- Drop patches.suse/drm-amd-display-Disable-PSR-SU-on-eDP-panels.patch (bsc#1243112)
  The patch caused a regression wrt s2idle on AMD laptops
- commit 5a5bec2

- bpf/selftests: Fix test_tcpnotify_user (poo#189822).
- commit 94aa185

- writeback: Avoid contention on wb-&amp;gt;list_lock when switching
  inodes (kABI fixup) (bsc#1237776).
- commit 883c841

- x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP (bsc#1245538).
- commit 2f73e05

- Delete and blacklist patches.suse/selftests-bpf-adjust-dummy_st_ops_success-to-detect-.patch (bsc#1250574)
  Causing kernel panic in BPF selftests, fix is difficult to backport.
- commit af4c69c

- netfilter: ctnetlink: remove refcounting in expectation dumpers
  (CVE-2025-39764 bsc#1249513).
- commit 09ba55b

- net/sched: Make cake_enqueue return NET_XMIT_CN when past
  buffer_limit (CVE-2025-39766 bsc#1249510).
- commit c0189b7

- net/sched: Fix backlog accounting in qdisc_dequeue_internal
  (CVE-2025-39677 bsc#1249300).
- commit 3cfca22

- tls: handle data disappearing from under the TLS ULP
  (CVE-2025-38616 bsc#1248512).
- tls: fix lockless read of strp-&amp;gt;msg_ready in -&amp;gt;poll
  (CVE-2025-38616 bsc#1248512).
- commit 8c223c9

- cifs: prevent NULL pointer dereference in UTF16 conversion
  (bsc#1250365, CVE-2025-39838).
- commit 9718aa1

- scsi: core: ufs: Fix a hang in the error handler (CVE-2025-38119
  bsc#1245700).
- commit 43675ce

- writeback: Avoid excessively long inode switching times
  (bsc#1237776).
- commit 77817f2

- writeback: Avoid softlockup when switching many inodes
  (bsc#1237776).
- commit 9ecba0d

- writeback: Avoid contention on wb-&amp;gt;list_lock when switching
  inodes (bsc#1237776).
- commit a591614

- bpftool: Fix JSON writer resource leak in version command
  (git-fixes).
- commit d19e155

- sched/rt: Fix race in push_rt_task (CVE-2025-38234 bsc#1246057)
- commit 36ede09

- sched/core: Prevent rescheduling when interrupts are disabled (CVE-2024-58090 bsc#1240324)
- commit 5da028c

- xfs: do not propagate ENODATA disk errors into xattr code
  (bsc#1250025 CVE-2025-39835).
- commit 78d977d

- ocfs2: fix recursive semaphore deadlock in fiemap call
  (bsc#1250407 CVE-2025-39885).
- ocfs2: prevent release journal inode after journal shutdown
  (bsc#1250267 CVE-2025-39842).
- commit 3a5de55

- mm/smaps: fix race between smaps_hugetlb_range and migration
  (CVE-2025-39754 bsc#1249524).
- commit 313ab7a

- seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer
  replies too fast (git-fixes).
- commit fb88d9d

- tty: hvc_console: Call hvc_kick in hvc_write unconditionally
  (bsc#1230062).
- commit 3702f36

- afs: Fix potential null pointer dereference in afs_put_server
  (git-fixes).
- commit 3a230bf

- net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (CVE-2025-39857 bsc#1250251)
- commit 7481e31

- net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (CVE-2025-39830 bsc#1249974)
- commit 09630cc

- net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (CVE-2025-39834 bsc#1250021)
- commit 00d335c

- selftests/cpufreq: Fix cpufreq basic read and update testcases
  (bsc#1250344).
- commit 83a7790

- drm/ast: Use msleep instead of mdelay for edid read
  (bsc#1250530).
- commit 2fd5794

- net/sched: ets: use old 'nbands' while purging unused classes
  (CVE-2025-38684 bsc#1249156).
- commit e0501b7

- KVM: x86: use array_index_nospec with indices that come from
  guest (CVE-2025-39823 bsc#1250002).
- commit ecf3611

- tee: fix NULL pointer dereference in tee_shm_put (CVE-2025-39865
  bsc#1250294).
- commit 3708eb2

- cpufreq: Initialize cpufreq-based invariance before subsys
  (git-fixes).
- commit 9618c74

- cpufreq: tegra186: Share policy per cluster (stable-fixes).
- commit dac2616

- x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init
  helper (CVE-2025-39681 bsc#1249303).
- commit 5bc51ab

- coresight: Fix memory leak in acpi_buffer-&amp;gt;pointer
  (CVE-2023-53261 bsc#1249770).
- commit 7cf7512

- soc: qcom: mdt_loader: Deal with zero e_shentsize
  (CVE-2025-39787 bsc#1249545).
- soc: qcom: mdt_loader: Fix error return values in
  mdt_header_valid() (CVE-2025-39787 bsc#1249545).
- commit 3946900

- i2c: riic: Allow setting frequencies lower than 50KHz
  (git-fixes).
- soc: qcom: mdt_loader: Ensure we don't read past the ELF header
  (CVE-2025-39787 bsc#1249545).
- commit bb8f700

- sched/isolation: Fix boot crash when maxcpus &amp;lt; first (git-fixes)
- commit f52d7e3

- sched/numa, mm: do not try to migrate memory to memoryless (git-fixes)
- commit d547451

- sched/fair: Remove unused parameter from sched_asym() (git-fixes)
- commit 6507dc9

- sched/fair: Take the scheduling domain into account in (git-fixes)
- commit 3d3501e

- sched/deadline: Collect sched_dl_entity initialization (git-fixes)
- commit 73df41d

- drm/panthor: Defer scheduler entitiy destruction to queue
  release (git-fixes).
- drm/ast: Use msleep instead of mdelay for edid read (git-fixes).
- commit 4648211

- Bluetooth: MGMT: Fix possible UAFs (git-fixes).
- Refresh patches.kabi/hci_dev-centralize-extra-lock.patch.
- commit 358e9ae

- fbcon: Fix OOB access in font allocation (git-fixes).
- commit e730b01

- fbcon: fix integer overflow in fbcon_do_set_font (git-fixes).
- drm/gma500: Fix null dereference in hdmi teardown (git-fixes).
- can: peak_usb: fix shift-out-of-bounds issue (git-fixes).
- can: mcba_usb: populate ndo_change_mtu() to prevent buffer
  overflow (git-fixes).
- can: sun4i_can: populate ndo_change_mtu() to prevent buffer
  overflow (git-fixes).
- can: hi311x: populate ndo_change_mtu() to prevent buffer
  overflow (git-fixes).
- can: etas_es58x: populate ndo_change_mtu() to prevent buffer
  overflow (git-fixes).
- Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync
  (git-fixes).
- Bluetooth: hci_sync: Fix hci_resume_advertising_sync
  (git-fixes).
- ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx
  (stable-fixes).
- net: rfkill: gpio: Fix crash due to dereferencering
  uninitialized pointer (git-fixes).
- net: phy: fix phy_uses_state_machine() (git-fixes).
- wifi: wilc1000: avoid buffer overflow in WID string
  configuration (stable-fixes).
- wifi: mac80211: increase scan_ies_len for S1G (stable-fixes).
- wifi: mac80211: fix incorrect type for ret (stable-fixes).
- ALSA: firewire-motu: drop EPOLLOUT from poll return values as
  write is not supported (stable-fixes).
- dmaengine: mediatek: Fix a flag reuse error in
  mtk_cqdma_tx_status() (git-fixes).
- commit f69acd3

- iommu/vt-d: Fix __domain_mapping()'s usage of
  switch_to_super_page() (git-fixes).
- commit 9b4fa49

- net: gso: Forbid IPv6 TSO with extensions on devices with only
  IPV6_CSUM (CVE-2025-39770 bsc#1249508).
- commit 8d2822a

- kabi: Restore layout of parallel_data (bsc1248343).
- commit c7e8448

- padata: Fix pd UAF once and for all (CVE-2025-38584 bsc1248343).
- commit 00470a2

- xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (CVE-2025-39797
  bsc#1249608).
- commit a50d626

- xfrm: Duplicate SPI Handling (CVE-2025-39797 bsc#1249608).
- commit 313a1d3

- kernel-source.spec: Depend on python3-base for build
  Both kernel-binary and kernel-docs already have this dependency.
  Adding it to kernel-source makes it possible to use python in shared
  build scripts.
- commit 72fdedd

- kernel-source: Do not list mkspec and its inputs as sources
  (bsc#1250522).
  This excludes the files from the src.rpm. The next step is to remove
  these files in tar-up so that they do not get uploaded to OBS either.
  As there is only one version of tar-up these files need to be removed
  from all kernels.
- commit e72b8a2

- selftests: bpf: test batch lookup on array of maps with holes
  (git-fixes).
- commit 6ee12a9

- bpf: skip non exist keys in generic_map_lookup_batch
  (git-fixes).
- commit dcb10ca

- rpm: Link arch-symbols script from scripts directory.
- commit 90b2abb

- cgroup: llist: avoid memory tears for llist_node (bsc#1247963).
- commit 854319b

- kabi: add struct cgroup_extra (bsc#1247963).
- commit 5114e86

- cgroup/rstat: Reduce cpu_lock hold time in
  cgroup_rstat_flush_locked() (bsc#1247963).
- commit 2f30983

- cgroup/rstat: Optimize cgroup_rstat_updated_list()
  (bsc#1247963).
- Refresh patches.kabi/kabi-add-struct-cgroup_extra.patch.
- commit 966ee8b

- gfs2: Validate i_depth for exhash directories (bsc#1249201
  CVE-2025-38710).
- gfs2: Improve gfs2_consist_inode() usage (bsc#1249201
  CVE-2025-38710).
- commit e40193d

- btrfs: do not allow relocation of partially dropped  subvolumes
  (bsc#1249540 CVE-2025-39738).
- commit 60a9a58

- crypto: qat - add shutdown handler to qat_c3xxx (git-fixes).
- commit 562553d

- crypto: qat - add shutdown handler to qat_c62x (git-fixes).
- commit 95c669b

- rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes)
- commit bc7d88d

- rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494 CVE-2025-39744)
- commit ef20792

- rcu: Protect -&amp;gt;defer_qs_iw_pending from data race (bsc#1249533 CVE-2025-39749)
- commit 2b090f5

- use uniform permission checks for all mount propagation changes
  (git-fixes).
- commit 4b14435

- rcu/exp: Handle RCU expedited grace period kworker allocation (git-fixes)
- commit 7737606

- rcu/exp: Fix RCU expedited parallel grace period kworker (git-fixes)
- commit 19ee671

- crypto: qat - add shutdown handler to qat_dh895xcc (git-fixes).
- commit 7ca55c2

- usb: typec: tcpci: use GENMASK() for TCPC_ROLE_CTRL_CC[12]
  (git-fixes).
- commit 61574e5

- rpm: Link guards script from scripts directory.
- commit e19a893

- usb: typec: maxim_contaminant: re-enable cc toggle if cc is
  open and port is clean (git-fixes).
- commit d3067ea

- usb: typec: maxim_contaminant: disable low power mode when
  reading comparator values (git-fixes).
- commit f661b59

- usb: typec: tcpm/tcpci_maxim: fix non-contaminant CC handling
  (git-fixes).
- commit 38cd076

- usb: typec: tcpm/tcpci_maxim: use GENMASK() for
  TCPC_VENDOR_CC_CTRL2 register (git-fixes).
- commit 2b55585

- usb: dwc3: imx8mp: fix device leak at unbind (git-fixes).
- commit 5a35982

- usb: xhci: Fix invalid pointer dereference in Etron workaround
  (git-fixes).
- commit a8cfeaf

- config.sh: Use Step repository for building Leap kernel
  bs-upload-kernel does not understand the Leap repository layout
- commit cae4664

- usb: typec: fusb302: cache PD RX state (git-fixes).
- commit 3e6c8b0

- usb: dwc3: qcom: Don't leave BCR asserted (git-fixes).
- commit fdef7a6

- xhci: Fix control transfer error on Etron xHCI host (git-fixes).
- commit f7d6da1

- fs/nfs/io: make nfs_start_io_*() killable (git-fixes).
- commit 8cf21ec

- Delete patches.kabi/KVM-x86-Re-split-x2APIC-ICR-into-ICR-ICR2-for-AMD-x2.patch
- commit 0a00b28

- kabi: drop kvm_x86_ops from kabi relevant symbols
  Since upstream commit dfc4e6ca04113 (&amp;quot;KVM: x86: Unexport kvm_x86_ops&amp;quot;)
  v5.18-rc1~139^2~153 kvm_x86_ops is no longer exported, so it can be
  dropped from kabi checks.
- commit 4f5efb7

- kABI fix after vsock/virtio: fix `rx_bytes` accounting for
  stream sockets (git-fixes).
- commit dd1042c

- platform/x86: thinkpad_acpi: Handle KCOV __init vs inline
  mismatches (git-fixes).
- commit 7941d4d

- platform/mellanox: mlxbf-pmc: Validate event/enable input
  (git-fixes).
- commit 7bd7d6e

- platform/mellanox: mlxbf-pmc: Remove newline char from event
  name input (git-fixes).
- commit e4c52ac

- platform/x86: dell-wmi-sysman: Fix class device unregistration
  (git-fixes).
- commit c3cf8fd

- platform/x86: think-lmi: Fix class device unregistration
  (git-fixes).
- commit dab00ca

- netfilter: nf_reject: don't leak dst refcount for loopback
  packets (CVE-2025-38732 bsc#1249262).
- commit e613385

- vhost/net: Protect ubufs with rcu read lock in
  vhost_net_ubuf_put() (git-fixes).
- commit b347e0b

- vsock/virtio: Resize receive buffers so that each SKB fits in
  a 4K page (git-fixes).
- commit 64aa75c

- vhost/vsock: Avoid allocating arbitrarily-sized SKBs
  (git-fixes).
- commit 62a440b

- vhost: fail early when __vhost_add_used() fails (git-fixes).
- commit 9d77130

- vhost-scsi: Fix log flooding with target does not exist errors
  (git-fixes).
- commit 2d6a672

- vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also
  `transport_local` (git-fixes).
- commit 7139f2e

- vsock/virtio: fix `rx_bytes` accounting for stream sockets
  (git-fixes).
- commit c34e345

- IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes)
- commit c2e717d

- vsock: avoid timeout during connect() if the socket is closing
  (git-fixes).
- commit 34796d2

- vhost-scsi: Return queue full for page alloc failures during
  copy (git-fixes).
- commit 3dcf5c3

- vsock: Allow retrying on connect() failure (git-fixes).
- commit 1f9e448

- 9p/xen: fix init sequence (git-fixes).
- commit 22e0fa2

- btrfs: tree-checker: fix the incorrect inode ref size check
  (git-fixes).
- commit 1a69e6a

- io_uring/kbuf: always use READ_ONCE() to read ring provided
  buffer lengths (CVE-2025-39816 bsc#1249906).
- commit c2c44aa

- KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR even if AVIC
  is active (git-fixes).
- commit 97c436d

- KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting
  MP_STATE (git-fixes).
- commit 1086ea1

- KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists
  for the guest (git-fixes).
- commit 16aecdb

- KVM: VMX: Extract checking of guest's DEBUGCTL into helper
  (git-fixes).
- commit a89d774

- KVM: x86: avoid underflow when scaling TSC frequency
  (git-fixes).
- commit 1dc5b36

- KVM: x86/xen: Allow 'out of range' event channel ports in IRQ
  routing table (git-fixes).
- commit fc7a1db

- KVM: VMX: Flush shadow VMCS on emergency reboot (git-fixes).
- commit 75149a0

- KVM: SVM: Clear current_vmcb during vCPU free for all *possible*
  CPUs (git-fixes).
- commit 221d435

- KVM: x86: Fully defer to vendor code to decide how to force
  immediate exit (git-fixes).
- commit 9d7cfec

- KVM: VMX: Handle KVM-induced preemption timer exits in fastpath
  for L2 (git-fixes).
- commit 4708423

- KVM: x86: Move handling of is_guest_mode() into fastpath exit
  handlers (git-fixes).
- commit 80f5d63

- btrfs: fix invalid extref key setup when replaying dentry
  (git-fixes).
- commit d51ea66

- KVM: VMX: Handle forced exit due to preemption timer in fastpath
  (git-fixes).
- commit 1eccc09

- KVM: VMX: Re-enter guest in fastpath for &amp;quot;spurious&amp;quot; preemption
  timer exits (git-fixes).
- commit e920f78

- KVM: x86: Plumb &amp;quot;force_immediate_exit&amp;quot; into kvm_entry()
  tracepoint (git-fixes).
- commit d90d7aa

- KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes).
- commit 972706e

- ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
  (bsc#1249258 CVE-2025-38701).
- commit f3682c5

- fs/buffer: fix use-after-free when call bh_read() helper
  (bsc#1249374 CVE-2025-39691).
- jbd2: prevent softlockup in jbd2_log_do_checkpoint()
  (bsc#1249526 CVE-2025-39782).
- loop: Avoid updating block size under exclusive owner
  (bsc#1249199 CVE-2025-38709).
- eventpoll: Fix semi-unbounded recursion (bsc#1248392
  CVE-2025-38614).
- commit fc4be97

- PCI: Extend isolated function probing to LoongArch (git-fixes).
- commit d35f4c9

- compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes).
- commit bf93f6c

- x86/cpu: Add model number for Intel Clearwater Forest processor
  (git-fixes).
- commit 7c8efd9

- wifi: cfg80211: remove cfg80211_inform_single_bss_frame_data()
  (git-fixes).
- commit a72bcdf

- xen/netfront: Fix TX response spurious interrupts (git-fixes).
- commit 5e0ce6f

- KVM: s390: Fix incorrect usage of mmu_notifier_register()
  (git-fixes bsc#1250336).
- commit 64b94c2

- xen/gntdev: remove struct gntdev_copy_batch from stack
  (git-fixes).
- commit 13539ce

- wireless: purelifi: plfxlc: fix memory leak in
  plfxlc_usb_wreq_asyn() (git-fixes).
- commit 5a9e007

- xenbus: Allow PVH dom0 a non-local xenstore (git-fixes).
- commit 81be2ce

- xen: Add support for XenServer 6.1 platform device (git-fixes).
- commit a4daef0

- kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963).
- commit 05abe8b

- mmc: core: Use GFP_NOIO in ACMD22 (git-fixes).
- commit 58bbbbb

- cgroup: remove per-cpu per-subsystem locks (bsc#1247963).
- cgroup: make css_rstat_updated nmi safe (bsc#1247963).
- cgroup: support to enable nmi-safe css_rstat_updated
  (bsc#1247963).
- commit 2adc7c0

- s390/pci: Add pci_msg debug view to PCI report (git-fixes
  jsc#PED-13260).
- commit 876d1e1

- media: chips-media: wave5: Fix gray color on screen (git-fixes).
- commit aea157b

- NFSv4/flexfiles: Fix layout merge mirror check (git-fixes).
- commit fcad211

- SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes).
- commit 1f5dab1

- Revert &amp;quot;SUNRPC: Don't allow waiting for exiting tasks&amp;quot;
  (git-fixes).
- commit f25412a

- flexfiles/pNFS: fix NULL checks on result of
  ff_layout_choose_ds_for_read (git-fixes).
- commit 43ddf37

- NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the
  server (git-fixes).
- commit da99754

- NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set
  (git-fixes).
- commit 0b05e92

- NFSv4: Don't clear capabilities that won't be reset (git-fixes).
- commit f31092e

- nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/*
  (git-fixes).
- commit 4438737

- Delete patches.suse/drm-amd-display-Optimize-cursor-position-updates.patch (git-fixes)
  reverted in the upstream
- commit 172515b

- ASoC: Intel: catpt: Expose correct bit depth to userspace
  (git-fixes).
- commit d98648f

- drm/amd/display: Allow RX6xxx &amp;amp; RX7700 to invoke
  amdgpu_irq_get/put (git-fixes).
- drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue()
  (git-fixes).
- drm/xe/tile: Release kobject for the failure path (git-fixes).
- commit fa137ab

- mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes).
- crypto: af_alg - Set merge to zero early in af_alg_sendmsg
  (git-fixes).
- ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for
  I2S (git-fixes).
- ASoC: qcom: audioreach: Fix lpaif_type configuration for the
  I2S interface (git-fixes).
- ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if
  source graph failed (git-fixes).
- ASoC: wm8974: Correct PLL rate rounding (git-fixes).
- ASoC: wm8940: Correct typo in control name (git-fixes).
- ASoC: wm8940: Correct PLL rate rounding (git-fixes).
- ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in
  error message (git-fixes).
- ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE()
  is NULL (git-fixes).
- ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup
  (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error
  path (git-fixes).
- drm: bridge: anx7625: Fix NULL pointer dereference with early
  IRQ (git-fixes).
- USB: serial: option: add Telit Cinterion LE910C4-WWX new
  compositions (stable-fixes).
- USB: serial: option: add Telit Cinterion FN990A w/audio
  compositions (stable-fixes).
- Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042
  quirk table (stable-fixes).
- Input: iqs7222 - avoid enabling unused interrupts
  (stable-fixes).
- drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at
  any time (stable-fixes).
- drm/amdgpu/vcn4: Fix IB parsing with multiple engine info
  packages (stable-fixes).
- mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing
  (git-fixes).
- compiler-clang.h: define __SANITIZE_*__ macros only when
  undefined (stable-fixes).
- i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes).
- mtd: nand: raw: atmel: Fix comment in timings preparation
  (stable-fixes).
- commit 60c59ef

- s390/debug: Add a reverse mode for debug_dump() (git-fixes
  jsc#PED-13260).
- commit ef2b242

- s390/debug: Add debug_dump() to write debug view to a string
  buffer (git-fixes jsc#PED-13260).
- commit 7315bbf

- s390/debug: Split private data alloc/free out of file operations
  (git-fixes jsc#PED-13260).
- commit 67715fa

- s390/debug: Simplify and document debug_next_entry() logic
  (git-fixes jsc#PED-13260).
- commit 10053a1

- s390/pci: Report PCI error recovery results via SCLP (git-fixes jsc#PED-13260).
  Refresh patches.suse/s390-pci-Allow-automatic-recovery-with-minimal-driver-supp.patch.
- commit 2a6890d

- Drop arm64 patches that may lead to module load failure (bsc#1250057)
  Deleted:
  patches.suse/arm64-ftrace-fix-unreachable-PLT-for-ftrace_caller-in-init.patch
  patches.kabi/kABI-arm64-ftrace-Restore-struct-mod_arch_specific-l.patch
- commit 2621bab

- xfs: rework datasync tracking and execution (bsc#1237449).
- xfs: rearrange code in xfs_inode_item_precommit (bsc#1237449).
- commit 730f72c

- habanalabs: fix UAF in export_dmabuf() (CVE-2025-38722
  bsc#1249163).
- commit 5507c4a

- Delete
  patches.kabi/struct-l2cap_chan-shift-new-member-rx_avail-to-end.patch.
- commit 82a2592

- net: bridge: fix soft lockup in br_multicast_query_expired()
  (CVE-2025-39773 bsc#1249504).
- commit 8e6b9c2

- cgroup: remove cgroup_rstat_flush_atomic() (bsc#1247963).
- commit 45cbf76

- Limit patch filenames to 100 characters (bsc#1249604).
- commit 9552406

- io_uring/net: commit partial buffers on retry (CVE-2025-38730
  bsc#1249172).
- commit 7b5fe24

- selftests/bpf: adapt one more case in test_lru_map to the new
  target_free (git-fixes).
- commit 951807c

- Correct typos of References tags in some patches
- commit 183c46e

- selftests/bpf: Add asserts for netfilter link info (git-fixes).
- commit 443e26f

- bpf: Fix link info netfilter flags to populate defrag flag
  (git-fixes).
- commit d659929

- bpf: Adjust free target to avoid global starvation of LRU map
  (git-fixes).
- commit a87821b

- bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure
  (git-fixes).
- commit fc9c396

- Fix source string __assign_string() (bsc#1238782)
  Fix the error
  ./include/trace/stages/stage6_event_callback.h:35:33: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
  strcpy(__get_str(dst), (src) ? (const char *)(src) : &amp;quot;(null)&amp;quot;);
  that got introduced by backporting commit 07089083a526 (&amp;quot;drm/xe/tracing:
  Fix a potential TP_printk UAF&amp;quot;).
- commit 02fba7d

- struct l2cap_chan: shift new member rx_avail to end (git-fixes).
- commit df4a4b8

- Bluetooth: compute LE flow credits based on recvbuf space
  (git-fixes).
- Refresh patches.suse/Bluetooth-L2CAP-Fix-deadlock.patch.
- Refresh
  patches.suse/bluetooth-l2cap-sync-sock-recv-cb-and-release.patch.
- commit 89343db

- drm/amd/pm: fix null pointer access (CVE-2025-38705
  bsc#1249334).
- commit b78844e

- vsock/virtio: Validate length in packet header before skb_put()
  (CVE-2025-39718 bsc#1249305).
- commit 8072632

- arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git-fixes)
- commit 420c073

- Bluetooth: qca: fix wcn3991 device address check (git-fixes).
- commit 9189126

- Bluetooth: qca: fix invalid device address check (git-fixes).
- commit 0795907

- nvme-tcp: remove tag set when second admin queue config fails
  (git-fixes).
- nvmet-auth: always free derived key data (git-fixes).
- nvmet: auth: use NULL to clear a pointer in (git-fixes).
- commit b9e803a

- wifi: ath10k: shutdown driver when hardware is unreliable
  (CVE-2025-39746 bsc#1249516).
- commit b5556c6

- cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag
  (stable-fixes).
- commit 9a8a959

- cpufreq: Exit governor when failed to start old governor
  (stable-fixes).
- commit 39287fb

- cpufreq: Init policy-&amp;gt;rwsem before it may be possibly used
  (git-fixes).
- commit 04861e7

- cpufreq: Initialize cpufreq-based frequency-invariance later
  (git-fixes).
- commit ed31199

- cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive
  mode (git-fixes).
- commit 723f0f4

- cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode
  (git-fixes).
- commit 662764f

- cpufreq: cppc: Fix invalid return value in .get() callback
  (git-fixes).
- commit 6fc7d2a

- drm/amd/display: fix a Null pointer dereference vulnerability (bsc#1249295 CVE-2025-39705)
- commit fd61b4f

- pptp: fix pptp_xmit() error path (git-fixes).
- commit 91ca931

- net, hsr: reject HSR frame if skb can't hold tag (CVE-2025-39703
  bsc#1249315).
- netfilter: ctnetlink: fix refcount leak on table dump
  (CVE-2025-38721 bsc#1249176).
- pptp: ensure minimal skb length in pptp_xmit() (CVE-2025-38574
  bsc#1248365).
- commit a50f469

- media: venus: Fix OOB read due to missing payload bound check
  (CVE-2025-38679 bsc#1249202).
- commit 8b1060a

- platform/x86/amd/hsmp: Ensure sock-&amp;gt;metric_tbl_addr is non-NULL
  (CVE-2025-39678 bsc#1249290).
- commit d0b499a

- drivers/base/node: rename __register_one_node() to
  register_one_node() (bsc#1241866).
- commit 806b51c

- drivers/base/node: rename register_memory_blocks_under_node()
  and remove context argument (bsc#1241866).
- commit 9ef69ed

- drivers/base/node: remove register_memory_blocks_under_node()
  function call from register_one_node (bsc#1241866).
- commit 2f00393

- drivers/base/node: remove register_mem_block_under_node_early()
  (bsc#1241866).
- commit 02a1a4a

- drivers/base/node: optimize memory block registration to reduce
  boot time (bsc#1241866).
- commit 3a0dd5e

- cpufreq: scpi: compare kHz instead of Hz (git-fixes).
- commit bd20bfa

- cpufreq: governor: Fix negative 'idle_time' handling in
  dbs_update() (git-fixes).
- commit 7fc2c58

- cpufreq: Use the fixed and coherent frequency for scaling
  capacity (stable-fixes).
- commit 573ea38

- power: supply: bq27xxx: restrict no-battery detection to bq27000
  (git-fixes).
- power: supply: bq27xxx: fix error return in case of no bq27000
  hdq battery (git-fixes).
- commit 7d4436e

- kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes).
- commit 7f84dae

- arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes)
- commit 06d6c63

- arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes)
- commit d3f6628

- arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git-fixes)
- commit faa58e2

- arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes)
- commit 775e3f7

- arm64: Mark kernel as tainted on SAE and SError panic (git-fixes)
- commit 833fcf1

- arm64: Handle KCOV __init vs inline mismatches (git-fixes)
- commit 187b48f

- arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes)
- commit 8c45279

- arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma with Haikou (git-fixes).
- commit 5a86595

- arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git-fixes)
- commit 655bf48

- arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git-fixes)
- commit d929ee1

- i2c: tegra: Use internal reset when reset property is not available (bsc#1249143)
- commit 7b11853

- tls: fix handling of zero-length records on the rx_list
  (CVE-2025-39682 bsc#1249284).
- commit 409e98c

- kABI workaround for &amp;quot;drm/dp: Add an EDID quirk for the DPCD
  register access probe&amp;quot; (bsc#1248121).
- commit 6cdcefb

- drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121).
- commit 617e84a

- drm/dp: Add an EDID quirk for the DPCD register access probe
  (bsc#1248121).
- Refresh
  patches.suse/drm-Add-kabi-placeholders-to-commonly-used-structs.patch.
- commit db9d8ac

- drm/edid: Add support for quirks visible to DRM core and drivers
  (bsc#1248121).
- drm/edid: Define the quirks in an enum list (bsc#1248121).
- commit bc5a858

- drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to
  TRAINING_PATTERN_SET (bsc#1248121).
- commit 36a72f9

- Update patches.suse/drm-dp-Change-AUX-DPCD-probe-address-from-DPCD_REV-t.patch (bsc#1248121)
  Move to the cherry-picked 6.16-rc patch, to be applied earlier
- commit 49f20a1

- Refresh
  patches.suse/0009-nvmet-tcp-support-secure-channel-concatenation.patch.
- commit 2e1aa37

- netfilter: nf_tables: reject duplicate device on updates
  (CVE-2025-38678 bsc#1249126).
- commit 8b40732

- Limit patch filenames to 100 characters (bsc#1249604).
- commit 8a17cff

- iommu/amd: Avoid stack buffer overflow from kernel cmdline
  (CVE-2025-38676 bsc#1248775).
- commit eddb6c4

- usb: typec: tcpm: properly deliver cable vdms to altmode drivers
  (git-fixes).
- xhci: dbc: decouple endpoint allocation from initialization
  (git-fixes).
- commit 6ac60fd

- phy: ti-pipe3: fix device leak at unbind (git-fixes).
- phy: tegra: xusb: fix device and OF node leak at probe
  (git-fixes).
- dmaengine: dw: dmamux: Fix device reference leak in
  rzn1_dmamux_route_allocate (git-fixes).
- dmaengine: ti: edma: Fix memory allocation size for
  queue_priority_map (git-fixes).
- dmaengine: idxd: Fix double free in idxd_setup_wqs()
  (git-fixes).
- dmaengine: idxd: Fix refcount underflow on module unload
  (git-fixes).
- dmaengine: idxd: Remove improper idxd_free (git-fixes).
- dmaengine: qcom: bam_dma: Fix DT error handling for
  num-channels/ees (git-fixes).
- serial: sc16is7xx: fix bug in flow control levels init
  (git-fixes).
- USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels
  (git-fixes).
- xhci: fix memory leak regression when freeing xhci vdev devices
  depth first (git-fixes).
- xhci: dbc: Fix full DbC transfer ring after several reconnects
  (git-fixes).
- commit 517a9a9

- regulator: sy7636a: fix lifecycle of power good gpio
  (git-fixes).
- commit 519b81c

- struct cdc_ncm_ctx: hide new member filtering_supported
  (git-fixes).
- commit 1152814

- drm/xe: Attempt to bring bos back to VRAM after eviction
  (git-fixes).
- drm/panthor: validate group queue count (git-fixes).
- commit 6e53087

- drm/amdgpu: fix a memory leak in fence cleanup when unloading
  (git-fixes).
- drm/i915/power: fix size for for_each_set_bit() in abox
  iteration (git-fixes).
- commit 48c87c2

- drm/mediatek: fix potential OF node use-after-free (git-fixes).
- drm/amd/display: use udelay rather than fsleep (git-fixes).
- commit 9e6eea4

- net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new
  compositions (git-fixes).
- net: usb: cdc-ncm: check for filtering capability (git-fixes).
- commit ce04178

- Refresh
  patches.suse/kdump-add-crashkernel-cma-suffix.patch
  patches.suse/kdump-crashkernel-cma-update-Documentation.patch
  patches.suse/kdump-implement-reserve_crashkernel_cma.patch
  patches.suse/kdump-wait-for-dma-to-time-out-when-using-cma.patch
  patches.suse/kdump-x86-implement-crashkernel-cma-reservation.patch
  (jsc#PED-7249 implementation now upstream).
- commit c09c6dd

- iommu/vt-d: Restore context entry setup order for aliased
  devices (CVE-2025-38216 bsc#1245963).
- commit 88dacf5

- cgroup/cpuset: Use static_branch_enable_cpuslocked() on
  cpusets_insane_config_key (bsc#1241166).
- cgroup/cpuset: Fix a partition error with CPU hotplug
  (bsc#1241166).
- commit 414381b

- s390/vfio-ap: Fix no AP queue sharing allowed message written
  to kernel log (git-fixes bsc#1249488).
- commit e007691

- s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes
  bsc#1249481).
- s390/pai: Deny all events not handled by this PMU (git-fixes
  bsc#1249482).
- commit 85f3e91

- mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes).
- mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC
  buffer (git-fixes).
- can: xilinx_can: xcan_write_frame(): fix use-after-free of
  transmitted SKB (git-fixes).
- can: j1939: j1939_local_ecu_get(): undo increment when
  j1939_local_ecu_get() fails (git-fixes).
- can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately
  when j1939_local_ecu_get() failed (git-fixes).
- can: j1939: implement NETDEV_UNREGISTER notification handler
  (git-fixes).
- commit ab68e9b

- net/mlx5e: Remove skb secpath if xfrm state is not found (CVE-2025-38590 bsc#1248360)
- commit ed11350

- rcu-tasks: Maintain real-time response in (bsc#1246298)
- commit 1fbb6ff

- rcu-tasks: Eliminate deadlocks involving do_exit() and RCU (bsc#1246298)
- commit 61288e7

- smb: client: fix use-after-free in cifs_oplock_break
  (bsc#1248199, CVE-2025-38527).
- commit 4692a87

- supported.conf: mark hyperv_drm as external
- net: hv_netvsc: fix loss of early receive events from host
  during channel open (git-fixes).
- hv_netvsc: Fix panic during namespace deletion with VF
  (bsc#1248111).
- hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open
  to prevent IPv6 addrconf (git-fixes).
- commit 2985c60

- Refresh
  patches.suse/0008-nvme-fabrics-reset-admin-connection-for-secure-conca.patch.
- commit d36d398

- Refresh
  patches.suse/0007-nvme-tcp-request-secure-channel-concatenation.patch.
- Refresh patches.suse/nvme-tcp-add-recovery_delay-to-sysfs.patch.
- commit 676300e

- Refresh
  patches.suse/0005-nvme-keyring-add-nvme_tls_psk_refresh.patch.
- Delete patches.suse/0006-nvme-always-include-linux-key.h.patch.
- commit 5836ed8

- Refresh
  patches.suse/0004-nvme-add-nvme_auth_derive_tls_psk.patch.
- commit 0b1029f

- Refresh
  patches.suse/0003-nvme-add-nvme_auth_generate_digest.patch.
- commit 1290f75

- Refresh patches.suse/0002-nvme-add-nvme_auth_generate_psk.patch.
- commit 085fe09

- Refresh
  patches.suse/0001-crypto-fs-Separate-out-hkdf_extract-and-hkdf_expand.patch.
- commit 1b38c29

- nvmet-auth: authenticate on admin queue only (bsc#1227555).
- nvme-auth: do not re-authenticate queues with no prior
  authentication (bsc#1227555).
- commit 6c8ddaa

- Drop PCI patches that broke kdump capture boot (bsc#1246509)
  Deleted:
  patches.suse/PCI-Explicitly-put-devices-into-D0-when-initializing.patch
  patches.suse/PCI-PM-Set-up-runtime-PM-even-for-devices-without-PC.patch
  Refreshed:
  patches.suse/PCI-Support-Immediate-Readiness-on-devices-without-PM.patch
- commit 70a44f4

- drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out
  DPP PG (stable-fixes).
- commit 5376902

- netfilter: nf_tables: split async and sync catchall in two
  functions (git-fixes).
- Refresh
  patches.kabi/kABI-make-nft_trans_gc_catchall-public-again.patch.
- commit b907ff6

- netfilter: nf_tables: Fix entries val in rule reset audit log
  (git-fixes).
- commit a8ae150

- platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious
  8042 quirks list (stable-fixes).
- drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes).
- drm/amd/display: Don't warn when missing DCE encoder caps
  (stable-fixes).
- commit 2aad2ce

- ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4
  model (stable-fixes).
- ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY
  (stable-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on some
  devices (stable-fixes).
- cpupower: Fix a bug where the -t option of the set subcommand
  was not working (stable-fixes).
- cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN
  (stable-fixes).
- Bluetooth: hci_sync: Avoid adding default advertising on startup
  (stable-fixes).
- commit 3580eab

- ALSA: hda/realtek - Add new HP ZBook laptop with micmute led
  fixup (stable-fixes).
- commit 0d08638

- ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA
  (stable-fixes).
- commit 33271d8

- bpf, bpftool: Fix incorrect disasm pc (git-fixes).
- commit 4188abf

- bpf: bpftool: Setting error code in do_loader() (git-fixes).
- commit 6283bbf

- bpftool: Fix readlink usage in get_fd_type (git-fixes).
- commit ae9652c

- bpftool: fix potential NULL pointer dereferencing in prog_dump()
  (git-fixes).
- commit 171c943

- bpftool: Mount bpffs when pinmaps path not under the bpffs
  (git-fixes).
- commit fb91e0e

- x86/amd_nb: Restrict init function to AMD-based systems (git-fixes).
- commit f7e4409

- x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes).
- commit a5e740f

- x86/fpu: Delay instruction pointer fixup until after warning (git-fixes).
- commit 6c7016a

- x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes).
- commit 8f2342d

- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- commit 40606b5

- kABI workaround for RCU tasks exit tracking (bsc#1246298).
- commit 90e8606

- btrfs: always update fstrim_range on failure in FITRIM ioctl
  (git-fixes).
- commit 8b0d717

- netfilter: nf_tables: remove catchall element in GC sync path
  (git-fixes).
- Refresh
  patches.kabi/kABI-make-nft_trans_gc_catchall-public-again.patch.
- commit 6c470e7

- netfilter: nf_tables: revert do not remove elements if set
  backend implements .abort (git-fixes).
- commit 54e2e34

- vdpa/mlx5: Fix release of uninitialized resources on error path
  (CVE-2025-38628 bsc#1248616).
- commit d9ba0b5

- netfilter: nf_tables: Unbreak audit log reset (git-fixes).
- commit 1d98f3d

- net/mlx5: Check device memory pointer before usage
  (CVE-2025-38645 bsc#1248626).
- commit 1353943

- x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes).
- commit 74f5e8a

- ceph: validate snapdirname option length when mounting (git-fixes).
- commit 3370873

- ceph: fix possible integer overflow in ceph_zero_objects() (git-fixes).
- commit 096933b

- x86/CPU/AMD: WARN when setting EFER.AUTOIBRS if and only if the WRMSR  fails (git-fixes).
- commit 1d1b06c

- btrfs: add cancellation points to trim loops (git-fixes).
- btrfs: split remaining space to discard in chunks (git-fixes).
- btrfs: use SECTOR_SHIFT to convert physical offset to LBA
  (git-fixes).
- commit 6bf77bf

- mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn
  (git-fixes).
- commit 6e9d9d9

- mm/hwpoison: do not send SIGBUS to processes with recovered
  clean pages (git-fixes).
- commit 34ad618

- xen: fix UAF in dmabuf_exp_from_pages() (CVE-2025-38595
  bsc#1248380).
- commit 00fd621

- selftests/bpf: Add test cases with CONST_PTR_TO_MAP null checks
  (git-fixes).
- selftests/bpf: Add cmp_map_pointer_with_const test (git-fixes).
- bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes).
- commit d187572

- PCI: pnv_php: Fix surprise plug detection and recovery
  (CVE-2025-38623 bsc#1248610).
- commit e872ea6

- file: add take_fd() cleanup helper (CVE-2025-38595 bsc#1248380).
- commit 7ffa1d7

- drm/rockchip: vop2: fail cleanly if missing a primary plane
  for a video-port (CVE-2025-38597 bsc#1248378).
- commit 7f132df

- bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622
  CVE-2025-38640).
- commit b485f08

- btrfs: avoid load/store tearing races when checking if an
  inode was logged (git-fixes).
- commit 60df77c

- btrfs: fix race between setting last_dir_index_offset and
  inode logging (git-fixes).
- commit 9120538

- btrfs: fix race between logging inode and checking if it was
  logged before (git-fixes).
- commit 84758cf

- btrfs: always abort transaction on failure to add block group
  to free space tree (git-fixes).
- commit 55788e0

- btrfs: move transaction aborts to the error site in
  add_block_group_free_space() (git-fixes).
- commit 1bba414

- btrfs: abort transaction on unexpected eb generation at
  btrfs_copy_root() (git-fixes).
- commit 47cbfed

- isolcpus: add missing hunk back (bsc#1236897 bsc#1249206).
  Update
  patches.suse/blk-mq-use-hk-cpus-only-when-isolcpus-managed_irq-is.patch
  (bsc#1236897 bsc#1249206).
- commit d06c033

- btrfs: qgroup: fix race between quota disable and quota rescan
  ioctl (git-fixes).
- commit 6ecd72c

- btrfs: abort transaction during log replay if walk_log_tree()
  failed (git-fixes).
- commit 9ed0531

- netfilter: nf_tables: bogus ENOENT when destroying element
  which does not exist (git-fixes).
- commit 1720cdf

- netfilter: nf_conntrack_bridge: initialize err to 0 (git-fixes).
- commit 37ed3f8

- netfilter: nat: fix ipv6 nat redirect with mapped and scoped
  addresses (git-fixes).
- commit dc55ccf

- netfilter: xt_recent: fix (increase) ipv6 literal buffer length
  (git-fixes).
- commit 9b71437

- netfilter: nf_tables: Carry reset boolean in nft_obj_dump_ctx
  (git-fixes).
- commit 1837d60

- netfilter: nf_tables: nft_obj_filter fits into cb-&amp;gt;ctx
  (git-fixes).
- commit 7ebf747

- netfilter: nf_tables: Carry s_idx in nft_obj_dump_ctx
  (git-fixes).
- commit 94eb28c

- netfilter: nf_tables: A better name for nft_obj_filter
  (git-fixes).
- commit 4e97e28

- netfilter: nf_tables: Unconditionally allocate nft_obj_filter
  (git-fixes).
- commit 71527ef

- netfilter: nf_tables: Drop pointless memset in
  nf_tables_dump_obj (git-fixes).
- commit 457aebd

- netfilter: nf_tables: Introduce nf_tables_getrule_single()
  (git-fixes).
- commit 1f75537

- netfilter: xt_nfacct: don't assume acct name is null-terminated (CVE-2025-38639 bsc#1248674)
- commit e51b72e

- netfilter: nf_tables: Open-code audit log call in
  nf_tables_getrule() (git-fixes).
- commit 05444c9

- netfilter: nft_set_rbtree: prefer sync gc to async worker
  (git-fixes).
- commit 3892bab

- netfilter: nft_set_rbtree: rename gc deactivate+erase function
  (git-fixes).
- commit ee5de41

- netfilter: nf_tables: Drop pointless memset when dumping rules
  (git-fixes).
- commit 9da7ab8

- kABI: netfilter flowtable move gc operation to bottom
  (git-fixes).
- commit 81690ca

- netfilter: flowtable: GC pushes back packets to classic path
  (git-fixes).
- commit 6e4c347

- Update config files. (bsc#1249186)
  Plain run_oldconfig after Kconfig update.
- commit 9d7abe4

- Refresh
  patches.suse/kernel-add-product-identifying-information-to-kernel-build.patch. (bsc#1249186)
- commit 99400d5

- x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and
  arch_sync_kernel_mappings() (git-fixes).
- commit 79df6a3

- mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes).
- commit b0342dd

- netfilter: nf_tables: audit log object reset once per table
  (git-fixes).
- commit fd6322c

- netfilter: nft_payload: fix wrong mac header matching
  (git-fixes).
- commit d699ba5

- netfilter: nfnetlink_log: silence bogus compiler warning
  (git-fixes).
- commit f57923e

- mm: move page table sync declarations to linux/pgtable.h
  (git-fixes).
- commit 1222abb

- netfilter: nf_tables: do not remove elements if set backend
  implements .abort (git-fixes).
- commit 19ebcee

- netfilter: nf_tables: Deduplicate nft_register_obj audit logs
  (git-fixes).
- commit 649bcef

- kABI workaround for bluetooth discovery_state change
  (CVE-2025-38593 bsc#1248357).
- commit a2afff6

- Bluetooth: hci_sync: fix double free in
  'hci_discovery_filter_clear()' (CVE-2025-38593 bsc#1248357).
- Refresh patches.kabi/bluetooth-hci_dev-kabi-workaround.patch.
- commit c998281

- platform/x86/intel: power-domains: Use
  topology_logical_package_id() for package ID (git-fixes).
- commit e69723e

- nouveau: fix disabling the nonstall irq due to storm code
  (git-fixes).
- commit 476894d

- spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer
  abort (git-fixes).
- spi: spi-fsl-lpspi: Set correct chip-select polarity bit
  (git-fixes).
- spi: spi-fsl-lpspi: Fix transmissions when using CONT
  (git-fixes).
- ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
- hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM
  (git-fixes).
- drm/amd/amdgpu: Fix missing error return on kzalloc failure
  (git-fixes).
- drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes).
- pcmcia: Add error handling for add_interval() in
  do_validate_mem() (git-fixes).
- pcmcia: omap: Add missing check for platform_get_resource
  (git-fixes).
- pcmcia: Fix a NULL pointer dereference in
  __iodyn_find_io_region() (git-fixes).
- commit 2aa7ff8

- erofs: fix atomic context detection when
  !CONFIG_DEBUG_LOCK_ALLOC (git-fixes).
- commit 8bbba66

- net: drop UFO packets in udp_rcv_segment() (CVE-2025-38622
  bsc#1248619).
- commit b74a30a

- kABI: adjust new field on ip_ct_sctp struct (git-fixes).
- commit b932c6f

- netfilter: handle the connecting collision properly in
  nf_conntrack_proto_sctp (git-fixes).
- commit 935c934

- smb: client: fix use-after-free in crypt_message when using
  async crypto (bsc#1247239, CVE-2025-38488).
- commit 4fd2db6

- s390/ap: Unmask SLCF bit in card and queue ap functions sysfs
  (git-fixes bsc#1249183).
- commit c2b13f9

- HID: input: report battery status changes immediately
  (git-fixes).
- HID: input: rename hidinput_set_battery_charge_status()
  (stable-fixes).
- commit c8518b5

- drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on
  vf mode (stable-fixes).
- commit e81e447

- wifi: ath12k: Pass ab pointer directly to
  ath12k_dp_tx_get_encap_type() (CVE-2025-38605 bsc#1248334).
- regulator: core: fix NULL dereference on unbind due to stale
  coupling data (CVE-2025-38668 bsc#1248647).
- commit 684e871

- wifi: ath11k: fix group data packet drops during rekey
  (git-fixes).
- commit 8f7f429

- ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes).
- wifi: cfg80211: sme: cap SSID length in
  __cfg80211_connect_result() (git-fixes).
- wifi: libertas: cap SSID len in lbs_associate() (git-fixes).
- wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes).
- batman-adv: fix OOB read/write in network-coding decode
  (git-fixes).
- Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()
  (git-fixes).
- Bluetooth: vhci: Prevent use-after-free by removing debugfs
  files early (git-fixes).
- mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes).
- xirc2ps_cs: fix register access when enabling FullDuplex
  (git-fixes).
- wifi: iwlwifi: uefi: check DSM item validity (git-fixes).
- wifi: mt76: mt7996: Initialize hdr before passing to
  skb_put_data() (git-fixes).
- wifi: mwifiex: Initialize the chan_stats array to zero
  (git-fixes).
- wifi: brcmfmac: fix use-after-free when rescheduling
  brcmf_btcoex_info work (git-fixes).
- wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes).
- HID: quirks: add support for Legion Go dual dinput modes
  (stable-fixes).
- HID: hid-ntrig: fix unable to handle page fault in
  ntrig_report_version() (stable-fixes).
- HID: wacom: Add a new Art Pen 2 (stable-fixes).
- Revert &amp;quot;drm/amdgpu: fix incorrect vm flags to map bo&amp;quot;
  (stable-fixes).
- net: rose: fix a typo in rose_clear_routes() (git-fixes).
- net: rose: include node references in rose_neigh refcount
  (git-fixes).
- net: rose: convert 'use' field to refcount_t (git-fixes).
- net: rose: split remove and free operations in
  rose_remove_neigh() (stable-fixes).
- dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted
  (stable-fixes).
- ASoC: codecs: tx-macro: correct tx_macro_component_drv name
  (stable-fixes).
- ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list
  (stable-fixes).
- HID: mcp2221: Handle reads greater than 60 bytes (stable-fixes).
- HID: mcp2221: Don't set bus speed on every transfer
  (stable-fixes).
- commit c45df83

- perf: Revert to requiring CAP_SYS_ADMIN for uprobes (bsc#1247442
  CVE-2025-38466).
- commit 6200f52

- bpf: Properly test iter/task tid filtering (git-fixes).
- commit 7cae248

- bpf: Fix iter/task tid filtering (git-fixes).
- commit 51eef98

- wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (CVE-2025-38643 bsc#1248681)
- commit 913bce0

- netfilter: conntrack: fix extension size table (git-fixes).
- commit 3a3ec96

- netfilter: nf_tables: disallow element removal on anonymous sets
  (git-fixes).
- commit ed5fdf4

- netfilter: nft_set_hash: try later when GC hits EAGAIN on
  iteration (git-fixes).
- commit 1044906

- netfilter: nft_set_pipapo: stop GC iteration if GC transaction
  allocation fails (git-fixes).
- commit 102d93f

- kABI: make nft_trans_gc_catchall() public again (git-fixes).
- commit a176bb1

- netfilter: nft_set_pipapo: call nft_trans_gc_queue_sync()
  in catchall GC (git-fixes).
- commit d64bf79

- kABI fix for &amp;quot;netfilter: nf_tables: Audit log rule reset&amp;quot;
  (git-fixes).
- commit 5173417

- netfilter: nf_tables: Audit log rule reset (git-fixes).
- commit f27562f

- [ceph] parse_longname(): strrchr() expects NUL-terminated string
  (bsc#1248634 CVE-2025-38660).
- commit cc1fe76

- wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event
  (git-fixes).
- wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers
  (git-fixes).
- wifi: ath12k: fix memory leak in ath12k_pci_remove()
  (stable-fixes).
- wifi: ath11k: Use dma_alloc_noncoherent for rx_tid buffer
  allocation (stable-fixes).
- wifi: ath11k: Fix DMA buffer allocation to resolve SWIOTLB
  issues (stable-fixes).
- commit c78d94c

- Drop ath12k patch that was reverted in the upstream (git-fixes)
- commit d1b2c31

- Drop a few Xe patches that have been reverted in 6.12.y stable
  The upstream already reverted a few patches due to regressions, and
  we also follow (and blacklist them).
  Deleted:
  patches.suse/drm-xe-devcoredump-Update-handling-of-xe_force_wake_.patch
  patches.suse/drm-xe-forcewake-Add-a-helper-xe_force_wake_ref_has_.patch
  patches.suse/drm-xe-gt-Update-handling-of-xe_force_wake_get-retur.patch
  patches.suse/drm-xe-tests-mocs-Hold-XE_FORCEWAKE_ALL-for-LNCF-reg.patch
  patches.suse/drm-xe-tests-mocs-Update-xe_force_wake_get-return-ha.patch
  Refreshed:
  patches.suse/drm-xe-Fix-GT-for-each-engine-workarounds.patch
  patches.suse/drm-xe-Move-the-coredump-registration-to-the-worker-.patch
  patches.suse/drm-xe-Take-PM-ref-in-delayed-snapshot-capture-worke.patch
  patches.suse/drm-xe-bmg-Update-Wa_16023588340.patch
  patches.suse/drm-xe-gsc-do-not-flush-the-GSC-worker-from-the-rese.patch
  patches.suse/drm-xe-pf-Prepare-to-stop-SR-IOV-support-prior-GT-re.patch
- commit 1c3fa88

- drm/i915/icl+/tc: Convert AUX powered WARN to a debug message
  (stable-fixes).
- drm/i915/icl+/tc: Cache the max lane count value (stable-fixes).
- drm/amdgpu/discovery: fix fw based ip discovery (git-fixes).
- drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes).
- drm/xe: Move page fault init after topology init (git-fixes).
- drm/nouveau/gsp: fix potential leak of memory used during acpi
  init (git-fixes).
- commit 1a4324f

- drm/xe: Allow dropping kunit dependency as built-in (git-fixes).
- drm/xe/bmg: Update Wa_22019338487 (git-fixes).
- drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG
  pause (stable-fixes).
- drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13
  (stable-fixes).
- drm/amdgpu/mes: add missing locking in helper functions
  (stable-fixes).
- commit fbde7d2

- drm/simpledrm: Do not upcast in release helpers (git-fixes).
- drm/cirrus-qemu: Fix pitch programming (git-fixes).
- drm/amdgpu: fix incorrect MALL size for GFX1151 (stable-fixes).
- commit a20121a

- drm/xe/gsc: do not flush the GSC worker from the reset path
  (git-fixes).
- drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF
  (git-fixes).
- commit ddaad91

- drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change
  (git-fixes).
- commit 4086210

- Add alt-commit to drm v3d patch
- commit c9256ce

- drm/amdgpu/discovery: optionally use fw based ip discovery
  (stable-fixes).
- drm/amd/display: Fix mismatch type comparison (stable-fixes).
- drm/xe/bmg: Add new PCI IDs (stable-fixes).
- commit 4c2c37e

- s390/sclp: Fix SCCB present check (git-fixes bsc#1249123).
- s390/time: Use monotonic clock in get_cycles() (git-fixes
  bsc#1249125).
- s390/stp: Remove udelay from stp_sync_clock() (git-fixes
  bsc#1249124).
- hypfs_create_cpu_files(): add missing check for hypfs_mkdir()
  failure (git-fixes bsc#1249122).
- commit a699d99

- Refresh patches.suse/drm-amd-display-Request-HW-cursor-on-DCN3.2-with-Sub.patch
  The partial revert in the upstream 6.12.y is folded into the patch
- commit 82d98bc

- drm/nouveau: select FW caching (git-fixes).
- drm/msm/dp: account for widebus and yuv420 during mode
  validation (git-fixes).
- commit 3d1dab8

- drm/xe: Carve out wopcm portion from the stolen memory
  (git-fixes).
- drm/xe: Fix and re-enable xe_print_blob_ascii85() (git-fixes).
- drm/amdgpu: Fix Circular Locking Dependency in AMDGPU GFX
  Isolation (git-fixes).
- commit 9ec66ec

- drm/amd/display: Reduce accessing remote DPCD overhead
  (git-fixes).
- commit a22d209

- drm/amd/display: Fix unnecessary cast warnings from checkpatch
  (stable-fixes).
- Refresh
  patches.suse/drm-amd-display-dml2-use-vzalloc-rather-than-kzalloc.patch.
- commit da1bf77

- Refresh
  patches.kabi/kabi-s390-ism-fix-concurrency-management-in-ism_cmd.patch.
- commit e8175f3

- ext4: remove writable userspace mappings before truncating
  page cache (bsc#1247223).
- commit afc4afd

- rpm: Configure KABI checkingness macro (bsc#1249186)
  The value of the config should match presence of KABI reference data. If
  it mismatches:
- !CONFIG &amp;amp; reference  -&amp;gt; this is bug, immediate fail
- CONFIG &amp;amp; no reference -&amp;gt; OK temporarily, must be resolved eventually
- commit 23c1536

- Kconfig.suse: Add KABI checkiness macro (config) (bsc#1249186)
  The motivation: there are patches.kabi/ patches that restore KABI and
  they check validity of the approach with static_assert()s to prevent
  accidental KABI breakage.
  These asserts are invoked on each arch-flavor and they may signal false
  negatives -- that is KABI restoration patch could break KABI but the
  given arch-flavor defines no KABI.
  The intended use is to disable the compile time checks in patches.kabi/
  (but not to be confused with __GENKSYMS__ that affects how reference is
  calculated).
  The name is chosen so that it mimics HAVE_* macros that are not
  configured manually (but is selected by an arch). In our case it's
  (un)selected by build script depending on whether KABI reference is
  defined for given arch-flavor and whether check is really requested by
  the user. Default value is 'n' so that people building merely via
  Makefile (not RPM with KABI checking) obtain consistent config.
- commit 5e4e9c5

- s390/pci: Allow automatic recovery with minimal driver support
  (git-fixes bsc#1248734 LTC#214880).
- commit 3fdd470

- btrfs: fix data overwriting bug during buffered write when
  block size &amp;lt; page size (git-fixes).
- commit d006c37

- btrfs: make found_logical_ret parameter mandatory for  function
  queue_scrub_stripe() (git-fixes).
- commit da7f7f5

- btrfs: scrub: fix grouping of read IO (git-fixes).
- commit bd555d2

- btrfs: scrub: avoid unnecessary csum tree search  preparing
  stripes (git-fixes).
- commit d485678

- btrfs: scrub: avoid unnecessary extent tree search  preparing
  stripes (git-fixes).
- commit a00c933

- btrfs: scrub: remove scrub_ctx::csum_list member (git-fixes).
- commit fa7dbad

- gfs2: No more self recovery (bsc#1248639 CVE-2025-38659).
- gfs2: Get rid of gfs2_glock_queue_put in signal_our_withdraw
  (bsc#1248639 CVE-2025-38659).
- commit bdb1b5c

- s390/ism: fix concurrency management in ism_cmd() (git-fixes
  bsc#1248735).
- commit 1005186

- usb: xhci: Apply the link chain quirk on NEC isoc endpoints
  (CVE-2025-22022 bsc#1241292).
- commit 8a5182c

- usb: xhci: move link chain bit quirk checks into one helper
  function (CVE-2025-22022 bsc#1241292).
- commit 4cca94b

- nvme-pci: try function level reset on init failure (git-fixes).
- commit 1ee35d9

- ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
  (CVE-2025-38664 bsc#1248628).
- commit 7e27b08

- s390/hypfs: Enable limited access during lockdown (git-fixes
  bsc#1248733 LTC#214881).
- s390/hypfs: Avoid unnecessary ioctl registration in debugfs
  (git-fixes bsc#1248733 LTC#214881).
- commit 97ff25b

- HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556 bsc#1248296)
- commit 1097818

- rxrpc: Fix bug due to prealloc collision (CVE-2025-38544 bsc#1248225)
- commit bc50a3d

- net: libwx: fix the using of Rx buffer DMA (CVE-2025-38533 bsc#1248200)
- commit 8863383

- ice: add NULL check in eswitch lag check (CVE-2025-38526 bsc#1248192)
- commit 7ad8c40

- rxrpc: Fix oops due to non-existence of prealloc backlog struct (CVE-2025-38514 bsc#1248202)
- commit 4ea1963

- idpf: return 0 size for RSS key if not supported (CVE-2025-38402 bsc#1247262)
- commit 1ca20ce

- remoteproc: core: Release rproc-&amp;gt;clean_table after rproc_attach() fails (CVE-2025-38418 bsc#1247137)
- commit 14c64f1

- remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (CVE-2025-38419 bsc#1247136)
- commit 7e69a49

- genirq/irq_sim: Initialize work context pointers properly (CVE-2025-38408 bsc#1247126)
- commit a8d685c

- ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (CVE-2025-38456 bsc#1247099)
- commit 8a59cf2

- bcache: fix NULL pointer in cache_set_flush() (CVE-2025-38263 bsc#1246248)
- commit d6d8f29

- Update reference in patches.suse/lib-group_cpus-fix-NULL-pointer-dereference-from-gro.patch (CVE-2025-38255 bsc#1246190 bsc#1236897)
- commit 0bab045

- staging: media: atomisp: Fix stack buffer overflow in
  gmin_get_var_int() (CVE-2025-38585 bsc#1248355).
- commit f7d8b23

- vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511
  CVE-2025-38618).
- commit 0256bd0

- RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes)
- commit 5289b12

- RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes)
- commit 1ff622a

- KVM: Allow CPU to reschedule while setting per-page memory
  attributes (bsc#1248186 CVE-2025-38506).
- commit a7f8a41

- slab: Decouple slab_debug and no_hash_pointers (bsc#1249022).
- commit 41f928f

- RAS/AMD/FMPM: Use atl internal.h for INVALID_SPA (bsc#1242034).
- commit ac5d9dc

- RAS/AMD/FMPM: Get masked address (bsc#1242034).
- commit 4171987

- ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410).
- commit 53ae51b

- RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034).
- commit fa3fcbb

- Update
  patches.suse/Bluetooth-btnxpuart-Resolve-TX-timeout-error-in-powe.patch
  (bsc#1230557 CVE-2024-58238 bsc#1242754).
- Update
  patches.suse/HID-quirks-Add-quirk-for-2-Chicony-Electronics-HP-5M.patch
  (stable-fixes CVE-2025-38540 bsc#1248208).
- Update
  patches.suse/PCI-pnv_php-Clean-up-allocated-IRQs-on-unplug.patch
  (bsc#1215199 CVE-2025-38624 bsc#1248617).
- Update
  patches.suse/PM-devfreq-Check-governor-before-using-governor-name.patch
  (git-fixes CVE-2025-38609 bsc#1248337).
- Update
  patches.suse/RDMA-hns-Fix-double-destruction-of-rsv_qp.patch
  (git-fixes CVE-2025-38582 bsc#1248349).
- Update
  patches.suse/arm64-entry-Mask-DAIF-in-cpu_switch_to-call_on_irq_stack.patch
  (git-fixes CVE-2025-38670 bsc#1248655).
- Update
  patches.suse/btrfs-fix-assertion-when-building-free-space-tree.patch
  (git-fixes CVE-2025-38503 bsc#1248183).
- Update
  patches.suse/can-netlink-can_changelink-fix-NULL-pointer-deref-of.patch
  (git-fixes CVE-2025-38665 bsc#1248648).
- Update
  patches.suse/clk-davinci-Add-NULL-check-in-davinci_lpsc_clk_regis.patch
  (git-fixes CVE-2025-38635 bsc#1248573).
- Update
  patches.suse/clk-xilinx-vcu-unregister-pll_post-only-if-registere.patch
  (git-fixes CVE-2025-38583 bsc#1248350).
- Update
  patches.suse/comedi-aio_iiro_16-Fix-bit-shift-out-of-bounds.patch
  (git-fixes CVE-2025-38529 bsc#1248196).
- Update
  patches.suse/comedi-pcl812-Fix-bit-shift-out-of-bounds.patch
  (git-fixes CVE-2025-38530 bsc#1248206).
- Update
  patches.suse/crypto-ccp-Fix-crash-when-rebind-ccp-device-for-ccp..patch
  (git-fixes CVE-2025-38581 bsc#1248345).
- Update
  patches.suse/dmaengine-nbpfaxi-Fix-memory-corruption-in-probe.patch
  (git-fixes CVE-2025-38538 bsc#1248213).
- Update patches.suse/drm-amd-display-Fix-vs-typos.patch
  (git-fixes CVE-2024-26661 bsc#1222323).
- Update
  patches.suse/drm-sched-Increment-job-count-before-swapping-tail-s.patch
  (git-fixes CVE-2025-38515 bsc#1248212).
- Update
  patches.suse/drm-tegra-nvdec-Fix-dma_alloc_coherent-error-check.patch
  (git-fixes CVE-2025-38543 bsc#1248214).
- Update
  patches.suse/fbdev-imxfb-Check-fb_add_videomode-to-prevent-null-p.patch
  (git-fixes CVE-2025-38630 bsc#1248575).
- Update
  patches.suse/hfsplus-remove-mutex_lock-check-in-hfsplus_free_extents.patch
  (git-fixes CVE-2025-38650 bsc#1248746).
- Update
  patches.suse/hwmon-corsair-cpro-Validate-the-size-of-the-received.patch
  (git-fixes CVE-2025-38548 bsc#1248228).
- Update
  patches.suse/i2c-qup-jump-out-of-the-loop-in-case-of-timeout.patch
  (git-fixes CVE-2025-38671 bsc#1248652).
- Update
  patches.suse/ipv6-fix-possible-infinite-loop-in-fib6_info_uses_de.patch
  (git-fixes CVE-2025-38587 bsc#1248361).
- Update
  patches.suse/ipv6-mcast-Delay-put-pmc-idev-in-mld_del_delrec.patch
  (git-fixes CVE-2025-38550 bsc#1248227).
- Update
  patches.suse/ipv6-prevent-infinite-loop-in-rt6_nlmsg_size.patch
  (git-fixes CVE-2025-38588 bsc#1248368).
- Update
  patches.suse/ipv6-reject-malicious-packets-in-ipv6_gso_segment.patch
  (git-fixes CVE-2025-38572 bsc#1248399).
- Update
  patches.suse/iwlwifi-Add-missing-check-for-alloc_ordered_workqueu.patch
  (git-fixes CVE-2025-38602 bsc#1248341).
- Update
  patches.suse/kasan-remove-kasan_find_vm_area-to-prevent-possible-.patch
  (git-fixes CVE-2025-38510 bsc#1248166).
- Update
  patches.suse/ksmbd-fix-out-of-bounds-read-in-smb2_sess_setup.patch
  (bsc#1012628 bsc#1213545 CVE-2023-3867).
- Update
  patches.suse/ksmbd-fix-wrong-next-length-validation-of-ea-b.patch
  (bsc#1012628 CVE-2023-4130 bsc#1248164).
- Update patches.suse/ksmbd-validate-command-request-size.patch
  (bsc#1012628 CVE-2023-4515 bsc#1248180).
- Update
  patches.suse/md-make-rdev_addable-usable-for-rcu-mode.patch
  (git-fixes CVE-2025-38621 bsc#1248609).
- Update
  patches.suse/net-packet-fix-a-race-in-packet_set_ring-and-packet_.patch
  (git-fixes CVE-2025-38617 bsc#1248621).
- Update patches.suse/net-phy-Don-t-register-LEDs-for-genphy.patch
  (git-fixes CVE-2025-38537 bsc#1248229).
- Update
  patches.suse/net-sched-Restrict-conditions-for-adding-duplicating.patch
  (git-fixes CVE-2025-38553 bsc#1248255).
- Update
  patches.suse/net-sched-mqprio-fix-stack-out-of-bounds-write-in-tc.patch
  (git-fixes CVE-2025-38568 bsc#1248386).
- Update
  patches.suse/nilfs2-reject-invalid-file-types-when-reading-inodes.patch
  (git-fixes CVE-2025-38663 bsc#1248636).
- Update patches.suse/perf-core-Exit-early-on-perf_mmap-fail.patch
  (CVE-2025-38563 bsc#1248306 dependency CVE-2025-38565
  bsc#1248377).
- Update
  patches.suse/phy-tegra-xusb-Fix-unbalanced-regulator-disable-in-U.patch
  (git-fixes CVE-2025-38535 bsc#1248240).
- Update
  patches.suse/pinctrl-qcom-msm-mark-certain-pins-as-invalid-for-in.patch
  (git-fixes CVE-2025-38516 bsc#1248209).
- Update
  patches.suse/pinmux-fix-race-causing-mux_owner-NULL-with-active-m.patch
  (git-fixes CVE-2025-38632 bsc#1248669).
- Update
  patches.suse/power-supply-cpcap-charger-Fix-null-check-for-power_.patch
  (git-fixes CVE-2025-38634 bsc#1248666).
- Update
  patches.suse/powercap-dtpm_cpu-Fix-NULL-pointer-dereference-in-ge.patch
  (git-fixes CVE-2025-38610 bsc#1248395).
- Update
  patches.suse/powerpc-eeh-Make-EEH-driver-device-hotplug-safe.patch
  (bsc#1215199 CVE-2025-38576 bsc#1248354).
- Update
  patches.suse/staging-fbtft-fix-potential-memory-leak-in-fbtft_fra.patch
  (git-fixes CVE-2025-38612 bsc#1248390).
- Update
  patches.suse/sunrpc-fix-client-side-handling-of-tls-alerts.patch
  (git-fixes CVE-2025-38571 bsc#1248401).
- Update
  patches.suse/sunrpc-fix-handling-of-server-side-tls-alerts.patch
  (git-fixes CVE-2025-38566 bsc#1248374).
- Update
  patches.suse/tls-stop-recv-if-initial-process_rx_list-gave-us-non.patch
  (bsc#1221858 CVE-2024-58239 bsc#1248614).
- Update
  patches.suse/usb-gadget-fix-use-after-free-in-composite_dev_clean.patch
  (git-fixes CVE-2025-38555 bsc#1248297).
- Update
  patches.suse/wifi-ath11k-clear-initialized-flag-for-deinit-ed-srn.patch
  (git-fixes CVE-2025-38601 bsc#1248340).
- Update
  patches.suse/wifi-iwlwifi-Fix-error-code-in-iwl_op_mode_dvm_start.patch
  (git-fixes CVE-2025-38656 bsc#1248643).
- Update
  patches.suse/wifi-mac80211-reject-TDLS-operations-when-station-is.patch
  (git-fixes CVE-2025-38644 bsc#1248748).
- Update
  patches.suse/wifi-mt76-mt7925-Fix-null-ptr-deref-in-mt7925_therma.patch
  (git-fixes CVE-2025-38541 bsc#1248216).
- Update
  patches.suse/wifi-prevent-A-MSDU-attacks-in-mesh-networks.patch
  (stable-fixes CVE-2025-38512 bsc#1248178).
- Update
  patches.suse/wifi-rtl818x-Kill-URBs-before-clearing-tx-status-que.patch
  (git-fixes CVE-2025-38604 bsc#1248333).
- Update
  patches.suse/wifi-rtw89-avoid-NULL-dereference-when-RX-problemati.patch
  (git-fixes CVE-2025-38646 bsc#1248577).
- Update
  patches.suse/wifi-zd1211rw-Fix-potential-NULL-pointer-dereference.patch
  (git-fixes CVE-2025-38513 bsc#1248179).
- commit efc5ee0

- Update
  patches.suse/drm-imagination-Fix-kernel-crash-when-hard-resetting.patch
  (git-fixes CVE-2025-38521 bsc#1248232).
- Update
  patches.suse/drm-xe-pf-Clear-all-LMTT-pages-on-alloc.patch
  (git-fixes CVE-2025-38511 bsc#1248175).
- Update
  patches.suse/regulator-core-fix-NULL-dereference-on-unbind-due-to.patch
  (stable-fixes CVE-2025-38668 bsc#1248647).
- Update
  patches.suse/wifi-ath12k-Pass-ab-pointer-directly-to-ath12k_dp_tx.patch
  (git-fixes CVE-2025-38605 bsc#1248334).
- commit af57d5e

- drm/mediatek: Add error handling for old state CRTC in
  atomic_disable (git-fixes).
- drm/msm: update the high bitfield of certain DSI registers
  (git-fixes).
- drm/xe: Don't trigger rebind on initial dma-buf validation
  (git-fixes).
- drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes).
- drm/xe/xe_sync: avoid race during ufence signaling (git-fixes).
- commit ea140bc

- HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes).
- HID: multitouch: fix slab out-of-bounds access in
  mt_report_fixup() (git-fixes).
- drm/mediatek: Fix device/node reference count leaks in
  mtk_drm_get_all_drm_priv (git-fixes).
- drm/msm/kms: move snapshot init earlier in KMS init (git-fixes).
- drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes).
- drm/nouveau: remove unused memory target test (git-fixes).
- drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr
  (git-fixes).
- drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes).
- drm/nouveau/disp: Always accept linear modifier (git-fixes).
- mISDN: hfcpci: Fix warning when deleting uninitialized timer
  (git-fixes).
- Bluetooth: hci_sync: fix set_local_name race condition
  (git-fixes).
- Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is
  unbalanced (git-fixes).
- Bluetooth: hci_event: Mark connection as closed during suspend
  disconnect (git-fixes).
- Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as
  success (git-fixes).
- commit f54cbc7

- clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (CVE-2025-38160 bsc#1245780)
- commit f8670f7

- tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (CVE-2025-38184 bsc#1245956)
- commit 263759a

- drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (CVE-2025-38205 bsc#1246005)
- commit e09f72d

- smb: client: add NULL check in automount_fullpath (CVE-2025-38208 bsc#1245815)
- commit 04d79fb

- net: stmmac: make sure that ptp_rate is not 0 before configuring EST (CVE-2025-38125 bsc#1245710)
- commit 0fcfa4f

- pNFS: Fix disk addr range check in block/scsi layout
  (git-fixes).
- commit c36ff17

- pNFS: Fix stripe mapping in block/scsi layout (git-fixes).
- commit 5bf6a36

- pNFS: Handle RPC size limit for layoutcommits (git-fixes).
- commit 36dee9f

- pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes).
- commit 8d7a7ee

- jfs: truncate good inode pages when hard link is 0 (git-fixes).
- commit 7e762b7

- jfs: Regular file corruption check (git-fixes).
- commit 4f3d801

- jfs: upper bound check of tree index in dbAllocAG (git-fixes).
- commit 997ac87

- hfs: fix slab-out-of-bounds in hfs_bnode_read() (git-fixes).
- commit 1ea8ac2

- hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
  (git-fixes).
- commit 34d35cb

- hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
  (git-fixes).
- commit 07b3674

- hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()
  (git-fixes).
- commit edddb1c

- hfs: fix not erasing deleted b-tree node issue (git-fixes).
- commit 9b06f84

- fs/orangefs: use snprintf() instead of sprintf() (git-fixes).
- commit 9e05c62

- exfat: add cluster chain loop check for dir (git-fixes).
- commit 50f0877

- drm/amdkfd: Don't call mmput from MMU notifier callback (bsc#1248217 CVE-2025-38520)
- commit c848230

- kernel-binary: Another installation ordering fix (bsc#1241353).
- commit fe14ab5

- drm/hisilicon/hibmc: fix the i2c device resource leak when
  vdac init failed (git-fixes).
- drm/amd/display: Fix Xorg desktop unresponsive on Replay panel
  (stable-fixes).
- drm/amdgpu/swm14: Update power limit logic (stable-fixes).
- ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations
  in resume context (git-fixes).
- amdgpu/amdgpu_discovery: increase timeout limit for IFWI init
  (stable-fixes).
- drm/amd/display: fix a Null pointer dereference vulnerability
  (stable-fixes).
- drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes).
- soundwire: Move handle_nested_irq outside of sdw_dev_lock
  (stable-fixes).
- drm/amdgpu: update mmhub 4.1.0 client id mappings
  (stable-fixes).
- drm/amdgpu: check if hubbub is NULL in
  debugfs/amdgpu_dm_capabilities (stable-fixes).
- ASoC: qcom: use drvdata instead of component to keep id
  (stable-fixes).
- drm/format-helper: Add conversion from XRGB8888 to BGR888
  (stable-fixes).
- drm/hisilicon/hibmc: refactored struct hibmc_drm_private
  (stable-fixes).
- commit 3b26c48

- drm/amdgpu: fix task hang from failed job submission during
  process kill (git-fixes).
- commit 6aefbfc

- usb: dwc3: Remove WARN_ON for device endpoint command timeouts
  (stable-fixes).
- USB: storage: Ignore driver CD mode for Realtek multi-mode
  Wi-Fi dongles (stable-fixes).
- usb: dwc3: pci: add support for the Intel Wildcat Lake
  (stable-fixes).
- USB: storage: Add unusual-devs entry for Novatek NTK96550-based
  camera (stable-fixes).
- usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1
  Flash Drive (stable-fixes).
- rtc: ds1307: handle oscillator stop flag (OSF) for ds1341
  (stable-fixes).
- rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe
  (stable-fixes).
- watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek
  WS0 race condition (stable-fixes).
- watchdog: dw_wdt: Fix default timeout (stable-fixes).
- watchdog: iTCO_wdt: Report error if timeout configuration fails
  (stable-fixes).
- soundwire: amd: serialize amd manager resume sequence during
  pm_prepare (stable-fixes).
- power: supply: qcom_battmgr: Add lithium-polymer entry
  (stable-fixes).
- pwm: mediatek: Fix duty and period setting (git-fixes).
- pwm: mediatek: Handle hardware enable and clock enable
  separately (stable-fixes).
- wifi: ath12k: Correct tid cleanup when tid setup fails
  (stable-fixes).
- wifi: ath12k: Add memset and update default rate value in wmi
  tx completion (stable-fixes).
- wifi: cfg80211: reject HTC bit for management frames
  (stable-fixes).
- wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg()
  for USB (stable-fixes).
- wifi: rtw89: Fix rtw89_mac_power_switch() for USB
  (stable-fixes).
- wifi: rtw89: Disable deep power saving for USB/SDIO
  (stable-fixes).
- wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes).
- wifi: iwlwifi: mvm: fix scan request validation (stable-fixes).
- wifi: cfg80211: Fix interface type validation (stable-fixes).
- wifi: mac80211: don't complete management TX on SAE commit
  (stable-fixes).
- wifi: mac80211: fix rx link assignment for non-MLO stations
  (stable-fixes).
- wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch
  (stable-fixes).
- wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd()
  (stable-fixes).
- wifi: iwlwifi: fw: Fix possible memory leak in
  iwl_fw_dbg_collect (stable-fixes).
- wifi: rtlwifi: fix possible skb memory leak in
  `_rtl_pci_rx_interrupt()` (stable-fixes).
- wifi: rtlwifi: fix possible skb memory leak in
  _rtl_pci_init_one_rxdesc() (stable-fixes).
- wifi: ath12k: Enable REO queue lookup table feature on QCN9274
  hw2.0 (stable-fixes).
- wifi: ath12k: Decrement TID on RX peer frag setup error handling
  (stable-fixes).
- wifi: mac80211: update radar_required in channel context after
  channel switch (stable-fixes).
- wifi: iwlegacy: Check rate_idx range after addition
  (stable-fixes).
- reset: brcmstb: Enable reset drivers for ARCH_BCM2835
  (stable-fixes).
- usb: xhci: print xhci-&amp;gt;xhc_state when queue_command failed
  (stable-fixes).
- usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2
  and Default (stable-fixes).
- usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device
  Command (stable-fixes).
- usb: xhci: Avoid showing warnings for dying controller
  (stable-fixes).
- usb: xhci: Avoid showing errors during surprise removal
  (stable-fixes).
- usb: core: config: Prevent OOB read in SS endpoint companion
  parsing (stable-fixes).
- usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present
  (stable-fixes).
- usb: core: usb_submit_urb: downgrade type check (stable-fixes).
- thermal: sysfs: Return ENODATA instead of EAGAIN for reads
  (stable-fixes).
- thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown
  when required (stable-fixes).
- pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in
  mperf_stop() (stable-fixes).
- PM: runtime: Clear power.needs_force_resume in
  pm_runtime_reinit() (stable-fixes).
- PM: sleep: console: Fix the black screen issue (stable-fixes).
- PM / devfreq: governor: Replace sscanf() with kstrtoul()
  in set_freq_store() (stable-fixes).
- commit 3e165bb

- net: phy: smsc: add proper reset flags for LAN8710A
  (stable-fixes).
- pinctrl: stm32: Manage irq affinity settings (stable-fixes).
- phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal
  (stable-fixes).
- media: v4l2-common: Reduce warnings about missing
  V4L2_CID_LINK_FREQ control (stable-fixes).
- media: tc358743: Return an appropriate colorspace from
  tc358743_set_fmt (stable-fixes).
- media: tc358743: Check I2C succeeded during probe
  (stable-fixes).
- media: tc358743: Increase FIFO trigger level to 374
  (stable-fixes).
- media: usb: hdpvr: disable zero-length read messages
  (stable-fixes).
- net: phy: micrel: Add ksz9131_resume() (stable-fixes).
- net: thunderbolt: Enable end-to-end flow control also in
  transmit (stable-fixes).
- net: thunderbolt: Fix the parameter passing of
  tb_xdomain_enable_paths()/tb_xdomain_disable_paths()
  (stable-fixes).
- mmc: sdhci-msm: Ensure SD card power isn't ON when card removed
  (stable-fixes).
- mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode()
  (stable-fixes).
- mei: bus: Check for still connected devices in
  mei_cl_bus_dev_release() (stable-fixes).
- platform/chrome: cros_ec_typec: Defer probe on missing EC parent
  (stable-fixes).
- platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk
  list (stable-fixes).
- commit 49985d1

- iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe()
  (git-fixes).
- ipmi: Use dev_warn_ratelimited() for incorrect message warnings
  (stable-fixes).
- ipmi: Fix strcpy source and destination the same (stable-fixes).
- i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes).
- i3c: don't fail if GETHDRCAP is unsupported (stable-fixes).
- i3c: master: Initialize ret in i3c_i2c_notifier_call()
  (stable-fixes).
- hwmon: (emc2305) Set initial PWM minimum value during probe
  based on thermal state (stable-fixes).
- media: dvb-frontends: dib7090p: fix null-ptr-deref in
  dib7090p_rw_on_apb() (stable-fixes).
- media: dvb-frontends: w7090p: fix null-ptr-deref in
  w7090p_tuner_write_serpar and w7090p_tuner_read_serpar
  (stable-fixes).
- media: uvcvideo: Fix bandwidth issue for Alcor camera
  (stable-fixes).
- leds: leds-lp50xx: Handle reg to get correct multi_index
  (stable-fixes).
- iio: adc: ad_sigma_delta: don't overallocate scan buffer
  (stable-fixes).
- iio: imu: inv_icm42600: use = { } instead of memset()
  (stable-fixes).
- iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing
  requirement (stable-fixes).
- gpio: wcd934x: check the return value of regmap_update_bits()
  (stable-fixes).
- gpio: tps65912: check the return value of regmap_update_bits()
  (stable-fixes).
- iio: imu: inv_icm42600: switch timestamp type from int64_t
  __aligned(8) to aligned_s64 (stable-fixes).
- commit cf6f726

- drm/amd/display: Fix DP audio DTO1 clock source on DCE 6
  (stable-fixes).
- drm/amd/display: Fill display clock and vblank time in
  dce110_fill_display_configs (stable-fixes).
- drm/amd/display: Find first CRTC and its line time in
  dce110_fill_display_configs (stable-fixes).
- drm/amd/display: Avoid a NULL pointer dereference
  (stable-fixes).
- drm/amdkfd: Destroy KFD debugfs after destroy KFD wq
  (stable-fixes).
- drm/amd/display: Add primary plane to commits for correct VRR
  handling (stable-fixes).
- drm/amdgpu: update mmhub 3.0.1 client id mappings
  (stable-fixes).
- drm/amd: Restore cached power limit during resume
  (stable-fixes).
- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
  (stable-fixes).
- fbdev: fix potential buffer overflow in
  do_register_framebuffer() (stable-fixes).
- drm/amd/display: Only finalize atomic_obj if it was initialized
  (stable-fixes).
- drm/amd/display: Avoid configuring PSR granularity if PSR-SU
  not supported (stable-fixes).
- drm/amdgpu: Avoid extra evict-restore process (stable-fixes).
- crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes).
- crypto: jitter - fix intermediary handling (stable-fixes).
- crypto: qat - lower priority for skcipher and aead algorithms
  (stable-fixes).
- crypto: octeontx2 - add timeout for load_fvc completion poll
  (stable-fixes).
- drm/msm: use trylock for debugfs (stable-fixes).
- drm/amd/display: Separate set_gsl from set_gsl_source_select
  (stable-fixes).
- drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes).
- drm/amd: Allow printing VanGogh OD SCLK levels without setting
  dpm to manual (stable-fixes).
- drm/amd/display: Avoid trying AUX transactions on disconnected
  ports (stable-fixes).
- drm/dp: Change AUX DPCD probe address from DPCD_REV to
  LANE0_1_STATUS (stable-fixes).
- drm/ttm: Should to return the evict error (stable-fixes).
- drm/ttm: Respect the shrinker core free target (stable-fixes).
- et131x: Add missing check after DMA map (stable-fixes).
- comedi: fix race between polling and detaching (git-fixes).
- char: misc: Fix improper and inaccurate error code returned
  by misc_init() (stable-fixes).
- commit adab316

- ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6
  and EliteBook 830 G6 (stable-fixes).
- ALSA: hda/realtek: Fix headset mic on HONOR BRB-X
  (stable-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300)
  to quirks (stable-fixes).
- ASoC: Intel: avs: Fix uninitialized pointer error in probe()
  (stable-fixes).
- Bluetooth: hci_sock: Reset cookie to zero in
  hci_sock_free_cookie() (stable-fixes).
- ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level()
  was successed (stable-fixes).
- ASoC: hdac_hdmi: Rate limit logging on connection and
  disconnection (stable-fixes).
- ASoC: core: Check for rtd == NULL in
  snd_soc_remove_pcm_runtime() (stable-fixes).
- ASoC: codecs: rt5640: Retry DEVICE_ID verification
  (stable-fixes).
- commit c1f1889

- ALSA: hda: Handle the jack polling always via a work
  (stable-fixes).
- ALSA: hda: Disable jack polling at shutdown (stable-fixes).
- ALSA: intel8x0: Fix incorrect codec index usage in mixer for
  ICH4 (stable-fixes).
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control
  (stable-fixes).
- ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop
  (stable-fixes).
- ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros
  (stable-fixes).
- ACPI: APEI: send SIGBUS to current task if synchronous memory
  error not recovered (stable-fixes).
- ACPI: processor: fix acpi_object initialization (stable-fixes).
- commit d6d6e01

- xfrm: interface: fix use-after-free after changing collect_md
  xfrm interface (CVE-2025-38500 bsc#1248088).
- rxrpc: Fix recv-recv race of completed call (CVE-2025-38524
  bsc#1248194).
- atm: clip: Fix memory leak of struct clip_vcc (CVE-2025-38546
  bsc#1248223).
- commit 57cffb2

- x86/sev: Evict cache lines during SNP memory validation
  (CVE-2025-38560 bsc#1248312).
- commit 88d43b2

- hid: hide cleanup of hid_descriptor (CVE-2025-38103
  bsc#1245663).
- commit 58f3abc

- HID: usbhid: Eliminate recurrent out-of-bounds bug in
  usbhid_parse() (CVE-2025-38103 bsc#1245663).
- blacklist.conf: removed erroneous entry
- commit 5f4ef22

- rpm/config.sh: Update Leap project
- commit 20eb23b

- rpm/config.sh: Udate OBS repositories
- commit 40b66e6

- selftests/perf_events: Add a mmap() correctness test
  (CVE-2025-38563 bsc#1248306 selftest).
- commit 919a844

- bpf: fix kfunc btf caching for modules (git-fixes).
- commit 5ae4aa5

- perf/core: Prevent VMA split of buffer mappings (CVE-2025-38563
  bsc#1248306).
- commit d1daec3

- perf/core: Exit early on perf_mmap() fail (CVE-2025-38563
  bsc#1248306 dependency).
- commit 4deadd8

- perf/core: Don't leak AUX buffer refcount on allocation failure
  (CVE-2025-38563 bsc#1248306 dependency).
- commit d26658d

- bpf: use kvzmalloc to allocate BPF verifier environment
  (git-fixes).
- commit fd28e75

- selftests/bpf: Verify that sync_linked_regs preserves subreg_def
  (bsc#1234156 CVE-2024-53125).
- commit cee135e

- samples/bpf: Fix compilation errors with cf-protection option
  (git-fixes).
- commit 388c9e8

- selftests/bpf: fexit_sleep: Fix stack allocation for arm64
  (git-fixes).
- commit 2d627c6

- Update config files.
  No functional change, this is only refresh to have configs in sync with
  Kconfig.
- commit 1943697

- Refresh
  patches.kabi/bpf-bpf_link-and-bpf_link_ops-kABI-workaround.patch.
- Refresh
  patches.kabi/kabi-hide-new-member-fallback_lock-in-struct-mptcp_s.patch.
- Refresh
  patches.kabi/kabi-restore-layout-of-struct-mem_control.patch.
- Refresh
  patches.kabi/kabi-restore-layout-of-struct-page_counter.patch.
- Refresh
  patches.kabi/kabi-s390-ism-fix-concurrency-management-in-ism_cmd.patch
- Refresh
  patches.kabi/xsk-Fix-race-condition-in-AF_XDP-generic-RX-path.patch.
  Manual adjustment of guards in KABI workaround patches -- we do not need
  specific conditioning thanks to new macro that is engaged iff needed.
- commit f47a39f

- build_bug.h: Add KABI assert (bsc#1249186).
- commit 7ab6a56

- iio: common: st_sensors: Fix use of uninitialize device structs
  (CVE-2025-38531 bsc#1248205).
- commit 2739cf9

- usb: xhci: Fix slot_id resource race conflict (git-fixes).
- commit 40d11e8

- usb: dwc3: fix fault at system suspend if device was already
  runtime suspended (git-fixes).
- commit 03244f6

- usb: dwc3: core: Fix system suspend on TI AM62 platforms
  (git-fixes).
- commit ae2a72e

- Fix &amp;quot;drm/amdgpu: read back register after written for VCN v4.0.5&amp;quot; (bsc#1248370)
  The final read statement performs an OOB array access. Move it into
  the array's loop.
- commit df6d35f

- iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe()
  (git-fixes).
- usb: xhci: Fix slot_id resource race conflict (git-fixes).
- accel/habanalabs/gaudi2: Use kvfree() for memory allocated
  with kvcalloc() (git-fixes).
- drm/tests: Fix endian warning (git-fixes).
- drm/amd/display: Don't print errors for nonexistent connectors
  (git-fixes).
- platform/x86/amd/hsmp: Ensure sock-&amp;gt;metric_tbl_addr is non-NULL
  (git-fixes).
- platform/x86/intel-uncore-freq: Check write blocked for ELC
  (git-fixes).
- commit e7ffcd0

- pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes).
- most: core: Drop device reference after usage in get_channel()
  (git-fixes).
- usb: storage: realtek_cr: Use correct byte order for
  bcs-&amp;gt;Residue (git-fixes).
- usb: dwc3: Ignore late xferNotReady event to prevent halt
  timeout (git-fixes).
- usb: core: hcd: fix accessing unmapped memory in
  SINGLE_STEP_SET_FEATURE test (git-fixes).
- usb: renesas-xhci: Fix External ROM access timeouts (git-fixes).
- mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e()
  for consistency (git-fixes).
- commit f954d9b

- iio: proximity: isl29501: fix buffered read on big-endian
  systems (git-fixes).
- comedi: Make insn_rw_emulate_bits() do insn-&amp;gt;n samples
  (git-fixes).
- comedi: Fix use of uninitialized memory in do_insn_ioctl()
  and do_insnlist_ioctl() (git-fixes).
- comedi: pcl726: Prevent invalid irq number (git-fixes).
- cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes).
- drm/hisilicon/hibmc: fix the hibmc loaded failed bug
  (git-fixes).
- iosys-map: Fix undefined behavior in iosys_map_clear()
  (git-fixes).
- drm/nouveau: fix typos in comments (git-fixes).
- drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor()
  (git-fixes).
- drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3
  (git-fixes).
- drm/amd/display: Adjust DCE 8-10 clock, don't overclock by 15%
  (git-fixes).
- drm/amd/display: Don't overclock DCE 6 by 15% (git-fixes).
- drm/amd/display: Add null pointer check in
  mod_hdcp_hdcp1_create_session() (git-fixes).
- memstick: Fix deadlock by moving removing flag earlier
  (git-fixes).
- ALSA: usb-audio: Use correct sub-type for UAC3 feature unit
  validation (git-fixes).
- ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm
  boot again (git-fixes).
- ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14
  (git-fixes).
- ALSA: usb-audio: Fix size validation in convert_chmap_v3()
  (git-fixes).
- commit 0a99e72

- bpf: Reject narrower access to pointer ctx fields (bsc#1248363
  CVE-2025-38591).
- commit 2a67c58

- md: make rdev_addable usable for rcu mode (git-fixes).
- scsi: sd: Make sd shutdown issue START STOP UNIT appropriately
  (git-fixes).
- scsi: Revert &amp;quot;scsi: iscsi: Fix HW conn removal use after free&amp;quot;
  (git-fixes).
- scsi: mpt3sas: Fix a fw_event memory leak (git-fixes).
- scsi: isci: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: core: Fix kernel doc for scsi_track_queue_full()
  (git-fixes).
- scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems
  (git-fixes).
- scsi: mpi3mr: Fix race between config read submit and interrupt
  completion (git-fixes).
- scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes).
- sunvdc: Balance device refcount in vdc_port_mpgroup_check
  (git-fixes).
- md: allow removing faulty rdev during resync (git-fixes).
- block: mtip32xx: Fix usage of dma_map_sg() (git-fixes).
- ublk: use vmalloc for ublk_device's __queues (git-fixes).
- loop: use kiocb helpers to fix lockdep warning (git-fixes).
- block: fix kobject leak in blk_unregister_queue (git-fixes).
- md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes).
- ublk: sanity check add_dev input for underflow (git-fixes).
- aoe: defer rexmit timer downdev work to workqueue (git-fixes).
- commit e0823df

- clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499 bsc#1247976)
- commit a7416f7

- atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (CVE-2025-38458 bsc#1247116)
- commit 17419dc

- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (CVE-2025-38245 bsc#1246193)
- commit c9503c1

- btrfs: fix adding block group to a reclaim list and the unused
  list during reclaim (git-fixes).
- btrfs: retry block group reclaim without infinite loop
  (git-fixes).
- commit 0a86fac

- btrfs: fix bitmap leak when loading free space cache on
  duplicate entry (git-fixes).
- commit 72cd329

- btrfs: run delayed iputs when flushing delalloc (git-fixes).
- btrfs: update target inode's ctime on unlink (git-fixes).
- commit 8eb6c44

- btrfs: fix data race when accessing the inode's disk_i_size
  at btrfs_drop_extents() (git-fixes).
- commit 04c28bf

- squashfs: fix memory leak in squashfs_fill_super (git-fixes).
- commit 7c9f4fd

- btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper
  error handling (git-fixes).
- commit 0d7a95c

- btrfs: correctly escape subvol in btrfs_show_options()
  (git-fixes).
- commit 8ae9b3b

- atm: Revert atm_account_tx() if copy_from_iter_full() fails (CVE-2025-38190 bsc#1245973)
- commit ee168d7

- atm: atmtcp: Free invalid length skb in atmtcp_c_send() (CVE-2025-38185 bsc#1246012)
- commit 3034c5a

- md/raid1: Fix stack memory use after return in raid1_reshape (CVE-2025-38445 bsc#1247229)
- commit c07b722

- bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
  in ktls (bsc#1248338 CVE-2025-38608).
- commit 70a5de5

- RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes)
- commit 1b45d00

- RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes)
- commit e92ea36

- RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes)
- commit b03653b

- RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes)
- commit 99342e6

- RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes)
- commit d8fc453

- RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes)
- commit d6073c4

- RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes)
- commit 43a4c91

- RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes)
- commit 184f89d

- atm: clip: Fix infinite recursive call of clip_push() (CVE-2025-38459 bsc#1247119)
- commit cace503

- atm: clip: prevent NULL deref in clip_push() (CVE-2025-38251 bsc#1246181)
- commit 955d194

- Bluetooth: hci_core: Fix using {cis,bis}_capable for current
  settings (git-fixes).
- Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during
  shutdown (git-fixes).
- commit 5ddd5b7

- bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (CVE-2025-38439 bsc#1247155)
- commit fad3d81

- ACPI: pfr_update: Fix the driver update version check
  (git-fixes).
- net: usb: asix_devices: Fix PHY address mask in MDIO bus
  initialization (git-fixes).
- Bluetooth: hci_conn: do return error from
  hci_enhanced_setup_sync() (git-fixes).
- Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established
  (git-fixes).
- commit 5ef3e7e

- raid10: cleanup memleak at raid10_make_request (CVE-2025-38444 bsc#1247162)
- commit 08daebe

- net: openvswitch: Fix the dead loop of MPLS parse
  (CVE-2025-38146 bsc#1245767).
- commit 2d16fb7

- Update patches.kabi/kabi-hide-new-member-fallback_lock-in-struct-mptcp_s.patch.
  Perform the build time check that struct mptcp_sock layout only when
  CONFIG_SUSE_KERNEL_SUPPORTED is enabled. Some kernel-debug builds do not
  have the hole we rely on in the kabi hack. (But those do not have to
  preserve kABI so that we can simply disable the check.)
- commit 21df537

- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
  (stable-fixes).
- fbdev: fix potential buffer overflow in
  do_register_framebuffer() (stable-fixes).
- drm/amd/display: Allow DCN301 to clear update flags (git-fixes).
- drm/amd/display: Only finalize atomic_obj if it was initialized
  (stable-fixes).
- drm/amd/display: Avoid configuring PSR granularity if PSR-SU
  not supported (stable-fixes).
- drm/amd/display: Disable dsc_power_gate for dcn314 by default
  (stable-fixes).
- drm/amd/pm: fix null pointer access (stable-fixes).
- drm/amd/display: limit clear_update_flags to dcn32 and above
  (stable-fixes).
- drm/xe/xe_query: Use separate iterator while filling GT list
  (stable-fixes).
- drm/msm: use trylock for debugfs (stable-fixes).
- drm/msm: Add error handling for krealloc in metadata setup
  (stable-fixes).
- drm/amd/display: Separate set_gsl from set_gsl_source_select
  (stable-fixes).
- drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes).
- drm/amd/display: Initialize mode_select to 0 (stable-fixes).
- drm/amd: Allow printing VanGogh OD SCLK levels without setting
  dpm to manual (stable-fixes).
- drm/amd/display: Update DMCUB loading sequence for DCN3.5
  (stable-fixes).
- drm/amd/display: Avoid trying AUX transactions on disconnected
  ports (stable-fixes).
- drm/imagination: Clear runtime PM errors while resetting the
  GPU (stable-fixes).
- drm/xe: Make dma-fences compliant with the safe access rules
  (stable-fixes).
- drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range
  (stable-fixes).
- drm/ttm: Should to return the evict error (stable-fixes).
- drm/ttm: Respect the shrinker core free target (stable-fixes).
- wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn
  (stable-fixes).
- wifi: ath12k: Correct tid cleanup when tid setup fails
  (stable-fixes).
- wifi: ath10k: shutdown driver when hardware is unreliable
  (stable-fixes).
- wifi: ath12k: Add memset and update default rate value in wmi
  tx completion (stable-fixes).
- wifi: ath12k: Fix station association with MBSSID Non-TX BSS
  (stable-fixes).
- wifi: cfg80211: reject HTC bit for management frames
  (stable-fixes).
- wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg()
  for USB (stable-fixes).
- wifi: rtw89: Fix rtw89_mac_power_switch() for USB
  (stable-fixes).
- wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes).
- wifi: iwlwifi: mvm: fix scan request validation (stable-fixes).
- wifi: mac80211: don't unreserve never reserved chanctx
  (stable-fixes).
- wifi: mac80211: don't complete management TX on SAE commit
  (stable-fixes).
- wifi: mac80211: avoid weird state in error path (stable-fixes).
- wifi: mac80211: fix rx link assignment for non-MLO stations
  (stable-fixes).
- wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch
  (stable-fixes).
- wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd()
  (stable-fixes).
- wifi: iwlwifi: fw: Fix possible memory leak in
  iwl_fw_dbg_collect (stable-fixes).
- wifi: rtlwifi: fix possible skb memory leak in
  `_rtl_pci_rx_interrupt()` (stable-fixes).
- wifi: rtlwifi: fix possible skb memory leak in
  _rtl_pci_init_one_rxdesc() (stable-fixes).
- wifi: ath12k: Enable REO queue lookup table feature on QCN9274
  hw2.0 (stable-fixes).
- wifi: ath12k: Decrement TID on RX peer frag setup error handling
  (stable-fixes).
- wifi: mac80211: update radar_required in channel context after
  channel switch (stable-fixes).
- wifi: iwlegacy: Check rate_idx range after addition
  (stable-fixes).
- commit 9a81dfb

- kabi: hide new member fallback_lock in struct mptcp_sock
  (CVE-2025-38491 bsc#1247280).
- mptcp: make fallback action and fallback decision atomic
  (CVE-2025-38491 bsc#1247280).
- mptcp: safety check before fallback (CVE-2025-38491
  bsc#1247280).
- mptcp: reset when MPTCP opts are dropped after join (git-fixes).
- mptcp: fallback when MPTCP opts are dropped after 1st data
  (git-fixes).
- commit 7bb090d

- tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464
  bsc#1247112).
- commit 7a2a262

- ixgbe: prevent from unwanted interface name changes (git-fixes).
- commit 90a6ca3

- kABI: fix for struct devlink_port_attrs: move new member to
  the end (git-fixes).
- commit b9487e2

- devlink: let driver opt out of automatic phys_port_name
  generation (git-fixes).
- commit 26f5de3

- livepatch: Add &amp;quot;replace&amp;quot; sysfs attribute (poo#187320).
- livepatch: Replace snprintf() with sysfs_emit() (poo#187320).
- commit a354d5e

- livepatch: Add stack_order sysfs attribute (poo#187320).
- commit a8a9f2f

- selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320).
- commit 4fc56b5

- x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483 CVE-2025-40300).
- commit 25dd084

- x86/bugs: Move cpu_bugs_smt_update() down (bsc#1247483 CVE-2025-40300).
- commit 4b9a38a

- x86/vmscape: Enable the mitigation (bsc#1247483 CVE-2025-40300).
- Update config files.
- commit 2ae4103

- bpf: Reject %p% format string in bprintf-like helpers
  (bsc#1248198 CVE-2025-38528).
- commit b8830ae

- md/md-cluster: handle REMOVE message earlier (bsc#1247057).
- commit b9c1ff5

- selftests/run_kselftest.sh: Use readlink if realpath is not available
- commit c43bfd4

- kselftests: Sort the collections list to avoid duplicate tests
- commit d8e5681

- selftests/run_kselftest.sh: Fix help string for --per-test-log
- commit 8e19a37

- kselftest/runner.sh: add netns support
- commit 1ce6d99

- selftests: allow runners to override the timeout
- commit 6a296e8

- scsi: target: iscsi: Fix timeout on deleted connection (CVE-2025-38075 bsc#1244734)
- commit 9bfd228

- net: mctp: Don't access ifa_index when missing (CVE-2025-38006 bsc#1244930)
- commit d0d056e

- netfilter: nft_set_pipapo: clamp maximum map bucket size to
  INT_MAX (CVE-2025-38201 bsc#1245977).
- commit 2f63881

- netfilter: flowtable: account for Ethernet header in
  nf_flow_pppoe_proto() (CVE-2025-38441 bsc#1247167).
- commit 0a2f320

- netfilter: nf_conntrack: fix crash due to removal of
  uninitialised entry (CVE-2025-38472 bsc#1247313).
- commit 1779cac

- x86/vmscape: Add conditional IBPB mitigation (bsc#1247483 CVE-2025-40300).
- commit 80ca68e

- x86/vmscape: Enumerate VMSCAPE bug (bsc#1247483 CVE-2025-40300).
- commit ed3190c

- Documentation/hw-vuln: Add VMSCAPE documentation (bsc#1247483 CVE-2025-40300).
- commit 9b7d62a

- powerpc/kernel: Fix ppc_save_regs inclusion in build
  (bsc#1215199).
- powerpc: do not build ppc_save_regs.o always (bsc#1215199).
- commit 3402e7e

- powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199).
- powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199).
- PCI: pnv_php: Work around switches with broken presence
  detection (bsc#1215199).
- PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199).
- arch/powerpc: Remove .interp section in vmlinux (bsc#1215199).
- powerpc/eeh: Rely on dev-&amp;gt;link_active_reporting (bsc#1215199).
- commit 0bddfac

- ata: libata-scsi: Fix CDL control (git-fixes).
- commit c04f51b

- drm/amdgpu: fix vram reservation issue (git-fixes).
- drm/bridge: fix OF node leak (git-fixes).
- ASoC: fsl_sai: replace regmap_write with regmap_update_bits
  (git-fixes).
- ASoC: tas2781: Fix the wrong step for TLV on tas2781
  (git-fixes).
- drm/i915/ddi: only call shutdown hooks for valid encoders
  (stable-fixes).
- drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes).
- drm/i915/ddi: gracefully handle errors from
  intel_ddi_init_hdmi_connector() (stable-fixes).
- drm/i915/hdmi: add error handling in g4x_hdmi_init()
  (stable-fixes).
- drm/i915/hdmi: propagate errors from intel_hdmi_init_connector()
  (stable-fixes).
- drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector()
  return type (stable-fixes).
- commit db395d6

- drm/amdgpu: fix incorrect vm flags to map bo (git-fixes).
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors
  (git-fixes).
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too
  (git-fixes).
- gpio: mlxbf3: use platform_get_irq_optional() (git-fixes).
- Revert &amp;quot;gpio: mlxbf3: only get IRQ for device instance 0&amp;quot;
  (git-fixes).
- soc/tegra: pmc: Ensure power-domains are in a known state
  (git-fixes).
- phy: mscc: Fix parsing of unicast frames (git-fixes).
- ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx()
  (git-fixes).
- selftests: rtnetlink.sh: remove esp4_offload after test
  (git-fixes).
- Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer
  TX10UB Nano (stable-fixes).
- kselftest/arm64: Fix check for setting new VLs in sve-ptrace
  (git-fixes).
- selftests: Fix errno checking in syscall_user_dispatch test
  (git-fixes).
- selftests/tracing: Fix false failure of subsystem event test
  (git-fixes).
- USB: serial: option: add Foxconn T99W709 (stable-fixes).
- ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx
  (stable-fixes).
- ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx
  (stable-fixes).
- ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes).
- ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes).
- commit 19adc9d

- net: usb: asix_devices: add phy_mask for ax88772 mdio bus
  (git-fixes).
- commit 206e9eb

- ACPI: processor: perflib: Move problematic pr-&amp;gt;performance check
  (git-fixes).
- commit 742e4e7

- selftests: livepatch: test if ftrace can trace a livepatched function
- commit 131c8aa

- selftests: livepatch: add new ftrace helpers functions
- commit 72382df

- selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE
- commit 9cfe4a3

- selftests: livepatch: handle PRINTK_CALLER in check_result()
- commit 0bf2df6

- selftests: livepatch: add test cases of stack_order sysfs interface
- commit a8069d0

- selftests/livepatch: Replace hardcoded module name with variable in
- commit 0ddc137

- selftests: livepatch: test livepatching a kprobed function
- commit 9b85392

- selftests: livepatch: save and restore kprobe state
- commit b1a73e7

- selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR
- commit 007c666

- selftests/livepatch: wait for atomic replace to occur
- commit 53db58f

- selftests/livepatch: Add selftests for &amp;quot;replace&amp;quot; sysfs attribute
- commit 77cb0dd

- selftests: livepatch: Test atomic replace against multiple modules
- commit b607a90

- selftests/livepatch: define max test-syscall processes
- commit 7b68f7c

- selftests: livepatch: Avoid running the tests if kernel-devel is
- commit 85e69a7

- selftests: livepatch: Add initial .gitignore
- commit 22f8057

- selftests/livepatch: fix and refactor new dmesg message code
- commit d2669cd

- selftests: livepatch: Test livepatching a heavily called syscall
- commit acafc73

- livepatch: Move tests from lib/livepatch to selftests/livepatch
- commit 082a019

- btrfs: fix the length of reserved qgroup to free (bsc#1240708)
- commit e3e4e05

- btrfs: fix qgroup reserve leaks in cow_file_range (CVE-2024-46733 bsc#1230708)
- commit 20ff141

- Move pesign-obs-integration requirement from kernel-syms to kernel devel
  subpackage (bsc#1248108).
- commit e707e41

- drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078 CVE-2025-38360)
- commit e5dcf32

- mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes)
- commit bf13671

- arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git-fixes)
- commit 246a69b

- arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git-fixes)
- commit 4fac981

- arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git-fixes)
- commit 9beeb6d

- arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git-fixes)
- commit 173d0a1

- PCI: rockchip: Set Target Link Speed to 5.0 GT/s before
  retraining (git-fixes).
- PCI: rockchip: Use standard PCIe definitions (git-fixes).
- PCI: imx6: Delay link start until configfs 'start' written
  (git-fixes).
- PCI: imx6: Remove apps_reset toggling from
  imx_pcie_{assert/deassert}_core_reset (git-fixes).
- PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4
  in epc_features (git-fixes).
- PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge
  (git-fixes).
- PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports
  (git-fixes).
- kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug
  Capable ports (git-fixes).
- PCI: Support Immediate Readiness on devices without PM
  capabilities (git-fixes).
- PCI: apple: Fix missing OF node reference in
  apple_pcie_setup_port (git-fixes).
- PCI: Add ACS quirk for Loongson PCIe (git-fixes).
- commit e24dcd6

- arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git-fixes)
- commit 271991a

- arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git-fixes)
- commit b77d1e0

- arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes)
- commit 3cbe1cf

- arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes)
- commit 6d0adbc

- arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes)
- commit d8b8e5c

- arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes)
- commit 81dc70d

- arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes)
- commit a30082d

- arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes)
- commit d67b39d

- arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes)
- commit 3ecd022

- arm64: Restrict pagetable teardown to avoid false warning (git-fixes)
- commit c34ecbe

- arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes)
- commit b37cb41

- arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes)
- commit 32c56dd

- arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes)
- commit ee84ff9

- arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes)
- commit 7b505c9

- arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes)
- commit 2981841

- arm64: Add support for HIP09 Spectre-BHB mitigation (git-fixes)
- commit 4ad8521

- arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes)
- commit ba1bbf1

- arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes)
- commit 356d85f

- arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes)
- commit 1ad9e93

- arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1 (git-fixes)
- commit 54de7d8

- serial: 8250: fix panic due to PSLVERR (git-fixes).
- commit c91d52e

- serial: core: fix OF node leak (git-fixes).
- commit b8d3243

- drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078 CVE-2025-38360)
- commit 9101a0c

- net: libwx: remove duplicate page_pool_put_full_page()
  (CVE-2025-38490 bsc#1247243).
- commit f305524

- sunrpc: fix handling of server side tls alerts (git-fixes).
- commit 40fb7b3

- net/mlx5e: Fix race between DIM disable and net_dim()
  (CVE-2025-38440 bsc#1247290).
- commit 5908db7

- cifs: Fix buffer overflow when parsing NFS reparse points
  (CVE-2024-49996 bsc#1232089).
- commit 50adb2e

- smb: client: fix parsing of device numbers (git-fixes).
- commit 45992a6

Package krb5 was updated:

- Remove des3-cbc-sha1 and arcfour-hmac-md5 from permitted  enctypes unless new special options &amp;quot;allow_des3&amp;quot; or &amp;quot;allow_rc4&amp;quot;
  are set; (CVE-2025-3576); (bsc#1241219).
- Add patch 0015-CVE-2025-3576.patch

Package avahi was updated:

- Add avahi-CVE-2024-52615.patch:  Backport 4e2e1ea from upstream, Resolve fixed source ports for
  wide-area DNS queries cause DNS responses be injected.
  (CVE-2024-52615, bsc#1233421)

Package expat was updated:

- Fix CVE-2025-59375 / bsc#1249584.- Add patch file:
  * CVE-2025-59375.patch

Package samba was updated:

- CVE-2025-9640: fix vfs_streams_xattr uninitialized memory write;  (bsc#1251279);(bso#15885).
- CVE-2025-10230: fix command Injection in WINS Server Hook Script;
  (bsc#1251280);(bso#15903).

- - Update to 4.21.8
  * netr_LogonSamLogonEx returns NR_STATUS_ACCESS_DENIED with
    SysvolReady=0; (bso#14981).
  * getpwuid does not shift to new DC when current DC is down;
    (bso#15844).
  * Windows security hardening locks out schannel'ed netlogon dc
    calls like netr_DsRGetDCName; (bso#15876).
  * kinit command is failing with Missing cache Error;
    (bso#15840).
  * Figuring out the DC name from IP address fails and breaks
    fork_domain_child(); (bso#15891).
  * Delayed leader broadcast can block ctdb forever; (bso#15892).
  * 'net ads group' failed to list domain groups; (bso#15900).
  * Apparently there is a conflict between shadow_copy2 module
    and virusfilter (action quarantine); (bso#15663).
  * Fix handling of empty GPO link; (bso#15877).
  * SMB ACL inheritance doesn't work for files created;
    (bso#15880).

Package libnvme was updated:

- Update to version 1.11+17.g61f36cae:  * linux: use EVP_PKEY_CTX_add1_hkdf_info only once in compat function (bsc#1246914)
  * nvme/linux: check for empty digest in gen_tls_identity() (bsc#1246914)
  * nvme/linux: add fallback implementation for nvme_insert_tls_key_compat() (bsc#1246914)
  * linux: fix HKDF TLS key derivation back to OpenSSL 3.0.8 (bsc#1246914)
  * libnvme: TLS PSK derivation fixes (bsc#1246914)
  * linux: rename __nvme_insert_tls_key_versioned() to __nvme_insert_tls_key() (bsc#1246914)
  * linux: rename __nvme_insert_tls_key() to __nvme_import_tls_key() (bsc#1246914)
  * test/psk: add testcase for TLS identity derivation (bsc#1246914)
  * linux: set errno when nvme_generate_tls_key_identity() fails (bsc#1246914)

Package openssl-1_1 was updated:

- Security fix: [bsc#1250232 CVE-2025-9230]  * Fix out-of-bounds read &amp;amp; write in RFC 3211 KEK unwrap
  * Add patch openssl3-CVE-2025-9230.patch

Package openssl-3 was updated:

- Security fix: [bsc#1250232 CVE-2025-9230]  * Fix out-of-bounds read &amp;amp; write in RFC 3211 KEK unwrap
  * Add patch openssl3-CVE-2025-9230.patch

Package libsolv was updated:

- fixed rare crash in the handling of allowuninstall in combination  with forcebest updates
- new pool_satisfieddep_map feature to test if a set of packages
  satisfies a dependency
- bump version to 0.7.35

Package libssh was updated:

- Security fix: [CVE-2025-8277, bsc#1249375]  * Memory Exhaustion via Repeated Key Exchange
  * Add patches:
  - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch
  - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch
  - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch

- Security fix: [CVE-2025-8114, bsc#1246974]
  * NULL pointer dereference when calculating session ID during KEX
  * Add libssh-CVE-2025-8114.patch

Package libzypp was updated:

- runposttrans: strip root prefix from tmppath (bsc#1250343)- fixup! Make ld.so ignore the subarch packages during install
  (bsc#1246912)
- version 17.37.18 (35)

- Make ld.so ignore the subarch packages during install
  (bsc#1246912)
- version 17.37.17 (35)

Package nvme-cli was updated:

- Update to version 2.11+29.g61f8d34b:  * nvme: add --compat flag for 'gen-tls-key' and 'check-tls-key' (bsc#1246914)

Package python-certifi was updated:

- Add python36-certifi provides/obsoletes to enable SLE-12 -&amp;gt;  SLE-15 migration, bsc#1233012

Package python-idna was updated:

- Add python36-idna provides/obsoletes to enable SLE-12 -&amp;gt;  SLE-15 migration, bsc#1233012

Package python-packaging was updated:

- Add python36-packaging provides/obsoletes to enable SLE-12 -&amp;gt;  SLE-15 migration, bsc#1233012

Package python-pycparser was updated:

- Add python36-pycparser provides/obsoletes to enable SLE-12 -&amp;gt;  SLE-15 migration, bsc#1233012

Package python-py was updated:

- Add python36-py provides/obsoletes to enable SLE-12 -&amp;gt;  SLE-15 migration, bsc#1233012

Package python-requests was updated:

- Add python36- provides/obsoletes to enable SLE-12 -&amp;gt;  SLE-15 migration, bsc#1233012

Package sudo was updated:

- Fix for SG#69994, bsc#1240954, bsc#1245743:  * bsc1240954.patch:
    [PATCH] If user's tty goes away, tell monitor to revoke the tty
    in  its session.

Package sysconfig was updated:

- version 0.85.10  * codespell run for all repository files and changes file
  * spec: define permissions for ghost file attrs to avoid
    rpm --restore resets them to 0 (bsc#1237595).
  * spec: fix name-repeated-in-summary rpmlint warning

Package vim was updated:

- Fix the following CVEs and bugs:  * bsc#1246602 (CVE-2025-53906)
  * bsc#1246604 (CVE-2025-53905)
  * bsc#1247939 (CVE-2025-55158)
  * bsc#1247938 (CVE-2025-55157)
- Update to 9.1.1629:
  9.1.1629: Vim9: Not able to use more than 10 type arguments in a generic function
  9.1.1628: fuzzy.c has a few issues
  9.1.1627: fuzzy matching can be improved
  9.1.1626: cindent: does not handle compound literals
  9.1.1625: Autocompletion slow with include- and tag-completion
  9.1.1624: Cscope not enabled on MacOS
  9.1.1623: Buffer menu does not handle unicode names correctly
  9.1.1622: Patch v9.1.1432 causes performance regressions
  9.1.1621: flicker in popup menu during cmdline autocompletion
  9.1.1620: filetype: composer.lock and symfony.lock files not recognized
  9.1.1619: Incorrect E535 error message
  9.1.1618: completion: incorrect selected index returned from complete_info()
  9.1.1617: Vim9: some error messages can be improved
  9.1.1616: xxd: possible buffer overflow with bitwise output
  9.1.1615: diff format erroneously detected
  9.1.1614: Vim9: possible variable type change
  9.1.1613: tests: test_search leaves a few swapfiles behind
  9.1.1612: Ctrl-G/Ctrl-T do not ignore the end search delimiter
  9.1.1611: possible undefined behaviour in mb_decompose()
  9.1.1610: completion: hang or E684 when 'tagfunc' calls complete()
  9.1.1609: complete: Heap-buffer overflow with complete function
  9.1.1608: No command-line completion for :unsilent {command}
  9.1.1607: :apple command detected as :append
  9.1.1606: filetype: a few more files are not recognized
  9.1.1605: cannot specify scope for chdir()
  9.1.1604: completion: incsearch highlight might be lost
  9.1.1603: completion: cannot use autoloaded funcs in 'complete' F{func}
  9.1.1602: filetype: requirements-*.txt files are not recognized
  9.1.1601: Patch v8.1.0425 was wrong
  9.1.1600: using diff anchors with hidden buffers fails silently
  9.1.1599: :bnext doesn't go to unlisted help buffers
  9.1.1598: filetype: waybar config file is not recognized
  9.1.1597: CI reports leaks in libgtk3 library
  9.1.1596: tests: Test_search_wildmenu_iminsert() depends on help file
  9.1.1595: Wayland: non-portable use of select()
  9.1.1594: completion: search completion throws errors
  9.1.1593: Confusing error when compiling incomplete try block
  9.1.1592: Vim9: crash with classes and garbage collection
  9.1.1591: VMS support can be improved
  9.1.1590: cannot perform autocompletion
  9.1.1589: Cannot disable cscope interface using configure
  9.1.1588: Vim9: cannot split dict inside command block
  9.1.1587: Wayland: timeout not updated before select()
  9.1.1586: Vim9: can define an enum/interface in a function
  9.1.1585: Wayland: gvim still needs GVIM_ENABLE_WAYLAND
  9.1.1584: using ints as boolean type
  9.1.1583: gvim window lost its icons
  9.1.1582: style issue in vim9type.c and vim9generics.c
  9.1.1581: possible memory leak in vim9generics.c
  9.1.1580: possible memory leak in vim9type.c
  9.1.1579: Coverity complains about unchecked return value
  9.1.1578: configure: comment still mentions autoconf 2.71
  9.1.1577: Vim9: no generic support yet
  9.1.1576: cannot easily trigger wildcard expansion
  9.1.1575: tabpanel not drawn correctly with wrapped lines
  9.1.1574: Dead code in mbyte.c
  9.1.1573: Memory leak when pressing Ctrl-D in cmdline mode
  9.1.1572: expanding $var does not escape whitespace for 'path'
  9.1.1571: CmdlineChanged triggered to often
  9.1.1570: Copilot suggested some improvements in cmdexpand.c
  9.1.1569: tests: Vim9 tests can be improved
  9.1.1568: need a few more default highlight groups
  9.1.1567: crash when using inline diff mode
  9.1.1566: self-referenced enum may not get freed
  9.1.1565: configure: does not consider tiny version for wayland
  9.1.1564: crash when opening popup to closing buffer
  9.1.1563: completion: ruler may disappear
  9.1.1562: close button always visible in the 'tabline'
  9.1.1561: configure: wayland test can be improved
  9.1.1560: configure: uses $PKG_CONFIG before it is defined
  9.1.1559: tests: Test_popup_complete_info_01() fails when run alone
  9.1.1558: str2blob() treats NULL string and empty string differently
  9.1.1557: not possible to anchor specific lines in difff mode
  9.1.1556: string handling in cmdexpand.c can be improved
  9.1.1555: completion: repeated insertion of leader
  9.1.1554: crash when omni-completion opens command-line window
  9.1.1553: Vim9: crash when accessing a variable in if condition
  9.1.1552: [security]: path traversal issue in tar.vim
  9.1.1551: [security]: path traversal issue in zip.vim
  9.1.1550: defaults: 'showcmd' is not enabled in non-compatible mode on Unix
  9.1.1549: filetype: pkl files are not recognized
  9.1.1548: filetype: OpenFGA files are not recognized
  9.1.1547: Wayland: missing ifdef
  9.1.1546: Vim9: error with has() and short circuit evaluation
  9.1.1545: typo in os_unix.c
  9.1.1544: :retab cannot be limited to indentation only
  9.1.1543: Wayland: clipboard appears to not be working
  9.1.1542: Coverity complains about uninitialized variable
  9.1.1541: Vim9: error when last enum value ends with a comma
  9.1.1540: completion: menu state wrong on interruption
  9.1.1539: completion: messages don't respect 'shm' setting
  9.1.1537: helptoc: still some issues when markdown code blocks
  9.1.1536: tests: test_plugin_comment uses wrong :Check command
  9.1.1535: the maximum search count uses hard-coded value 99
  9.1.1534: unnecessary code in tabpanel.c
  9.1.1533: helptoc: does not handle code sections in markdown well
  9.1.1532: termdebug: not enough ways to configure breakpoints
  9.1.1531: confusing error with nested legacy function
  9.1.1530: Missing version change in v9.1.1529
  9.1.1529: Win32: the toolbar in the GUI is old and dated
  9.1.1528: completion: crash with getcompletion()
  9.1.1527: Vim9: Crash with string compound assignment
  9.1.1526: completion: search completion match may differ in case
  9.1.1525: tests: testdir/ is a bit messy
  9.1.1524: tests: too many imports in the test suite
  9.1.1523: tests: test_clipmethod fails in non X11 environment
  9.1.1522: tests: still some ANSI escape sequences in test output
  9.1.1521: completion: pum does not reset scroll pos on reopen with 'noselect'
  9.1.1520: completion: search completion doesn't handle 'smartcase' well
  9.1.1519: tests: Test_termdebug_decimal_breakpoints() may fail
  9.1.1518: getcompletiontype() may crash
  9.1.1517: filetype: autopkgtest files are not recognized
  9.1.1516: tests: no test that 'incsearch' is updated after search completion
  9.1.1515: Coverity complains about potential unterminated strings
  9.1.1514: Coverity complains about the use of tmpfile()
  9.1.1513: resizing Vim window causes unexpected internal window width
  9.1.1512: completion: can only complete from keyword characters
  9.1.1511: tests: two edit tests change v:testing from 1 to 0
  9.1.1510: Search completion may use invalid memory
  9.1.1509: patch 9.1.1505 was not good
  9.1.1508: string manipulation can be improved in cmdexpand.c
  9.1.1507: symlinks are resolved on :cd commands
  9.1.1506: tests: missing cleanup in Test_search_cmdline_incsearch_highlight()
  9.1.1505: not possible to return completion type for :ex command
  9.1.1504: filetype: numbat files are not recognized
  9.1.1503: filetype: haxe files are not recognized
  9.1.1502: filetype: quickbms files are not recognized
  9.1.1501: filetype: flix files are not recognized
  9.1.1500: if_python: typo in python error variable
  9.1.1499: MS-Windows: no indication of ARM64 architecture
  9.1.1498: completion: 'complete' funcs behave different to 'omnifunc'
  9.1.1497: Link error with shm_open()
  9.1.1496: terminal: still not highlighting empty cells correctly
  9.1.1495: Wayland: uses $XDG_SEAT to determine seat
  9.1.1494: runtime(tutor): no French translation for Chapter 2
  9.1.1493: manually comparing positions on buffer
  9.1.1492: tests: failure when Wayland compositor fails to start
  9.1.1491: missing out-of-memory checks in cmdexpand.c
  9.1.1490: 'wildchar' does not work in search contexts
  9.1.1489: terminal: no visual highlight of empty cols with empty 'listchars'
  9.1.1488: configure: using obsolete macro AC_PROG_GCC_TRADITIONAL
  9.1.1487: :cl doesn't invoke :clist
  9.1.1486: documentation issues with Wayland
  9.1.1485: missing Wayland clipboard support
  9.1.1484: tests: Turkish locale tests fails on Mac
  9.1.1483: not possible to translation position in buffer
  9.1.1482: scrolling with 'splitkeep' and line()
  9.1.1481: gcc complains about uninitialized variable
  9.1.1480: Turkish translation outdated
  9.1.1479: regression when displaying localized percentage position
  9.1.1478: Unused assignment in ex_uniq()
  9.1.1476: no easy way to deduplicate text
  9.1.1476: missing out-of-memory checks in cmdexpand.c
  9.1.1475: completion: regression when &amp;quot;nearest&amp;quot; in 'completeopt'
  9.1.1474: missing out-of-memory check in mark.c
  9.1.1473: inconsistent range arg for :diffget/diffput
  9.1.1472: if_python: PySequence_Fast_{GET_SIZE,GET_ITEM} removed
  9.1.1471: completion: inconsistent ordering with CTRL-P
  9.1.1470: use-after-free with popup callback on error
  9.1.1469: potential buffer-underflow with invalid hl_id
  9.1.1468: filetype: bright(er)script files are not recognized
  9.1.1467: too many strlen() calls
  9.1.1466: filetype: not all lex files are recognized
  9.1.1465: tabpanel: not correctly drawn with 'equalalways'
  9.1.1464: gv does not work in operator-pending mode
  9.1.1463: Integer overflow in getmarklist() after linewise operation
  9.1.1462: missing change from patch v9.1.1461
  9.1.1461: tabpanel: tabpanel vanishes with popup menu
  9.1.1460: MS-Windows: too many strlen() calls in os_win32.c
  9.1.1459: xxd: coloring output is inefficient
  9.1.1458: tabpanel: tabs not properly updated with 'stpl'
  9.1.1457: compile warning with tabpanelopt
  9.1.1456: comment plugin fails toggling if 'cms' contains \
  9.1.1455: Haiku: dailog objects created with no reference
  9.1.1454: tests: no test for pum at line break position
  9.1.1453: tests: Test_geometry() may fail
  9.1.1452: completion: redundant check for completion flags
  9.1.1451: tabpanel rendering artifacts when scrolling
  9.1.1450: Session has wrong arglist with :tcd and :arglocal
  9.1.1449: typo in pum_display()
  9.1.1448: tabpanel is not displayed correctly when msg_scrolled
  9.1.1447: completion: crash when backspacing with fuzzy completion
  9.1.1446: filetype: cuda-gdb config files are not recognized
  9.1.1445: negative matchfuzzy scores although there is a match
  9.1.1444: Unused assignment in set_fuzzy_score()
  9.1.1443: potential buffer underflow in insertchar()
  9.1.1442: tests: Test_diff_fold_redraw() is insufficient
  9.1.1441: completion: code can be improved
  9.1.1440: too many strlen() calls in os_win32.c
  9.1.1439: Last diff folds not merged
  9.1.1438: tests: Test_breakindent_list_split() fails
  9.1.1437: MS-Windows: internal compile error in uc_list()
  9.1.1436: GUI control code is displayed on the console on startup
  9.1.1435: completion: various flaws in fuzzy completion
  9.1.1434: MS-Windows: missing out-of-memory checks in os_win32.c
  9.1.1433: Unnecessary :if when writing session
  9.1.1432: GTK GUI: Buffer menu does not handle unicode correctly
  9.1.1431: Hit-Enter Prompt when loading session files
  9.1.1430: tabpanel may flicker in the GUI
  9.1.1429: dragging outside the tabpanel changes tabpagenr
  9.1.1428: completion: register completion needs cleanup
  9.1.1427: rendering artifacts with the tabpanel
  9.1.1426: completion: register contents not completed
  9.1.1425: tabpanel: there are still some problems with the tabpanel
  9.1.1424: PMenu selection broken with multi-line selection and limits
  9.1.1423: :tag command not working correctly using Vim9 Script
  9.1.1422: scheduling of complete function can be improved
  9.1.1421: tests: need a test for the new-style tutor.tutor
  9.1.1420: tests: could need some more tests for shebang lines
  9.1.1419: It is difficult to ignore all but some events
  9.1.1418: configures GUI auto detection favors GTK2
  9.1.1417: missing info about register completion in complete_info()
  9.1.1416: completion limits not respected for fuzzy completions
  9.1.1415: potential use-after free when there is an error in 'tabpanel'
  9.1.1414: MS-Windows: compile warnings in os_win32.c
  9.1.1413: spurious CursorHold triggered in GUI on startup
  9.1.1412: tests: Test_tabpanel_tabonly() fails on larger screens
  9.1.1411: crash when calling non-existing function for tabpanel
  9.1.1410: out-of-bounds access with 'completefunc'
  9.1.1409: using f-flag in 'complete' conflicts with Neovim
  9.1.1408: not easily possible to complete from register content
  9.1.1407: Can't use getpos('v') in OptionSet when using setbufvar()

Package zypper was updated:

- Fixed `bash-completion`: `zypper refresh` now ignores  repository priority lines.
- Changes to support building against restructured libzypp in
  stack build (bsc#1230267)
- version 1.14.94

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://publiccloudimagechangeinfo.suse.com/google/sles-15-sp7-byos-v20251022-x86-64/</URL>
      <Description>Public Cloud Image Info</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <Branch Type="Product Name" Name="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
        <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="bind-utils-9.20.11-150700.3.9.1">
      <FullProductName ProductID="bind-utils-9.20.11-150700.3.9.1">bind-utils-9.20.11-150700.3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-8.14.1-150700.7.2.1">
      <FullProductName ProductID="curl-8.14.1-150700.7.2.1">curl-8.14.1-150700.7.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dracut-059+suse.565.g51c2c969-150700.3.6.1">
      <FullProductName ProductID="dracut-059+suse.565.g51c2c969-150700.3.6.1">dracut-059+suse.565.g51c2c969-150700.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grub2-2.12-150700.19.16.1">
      <FullProductName ProductID="grub2-2.12-150700.19.16.1">grub2-2.12-150700.19.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grub2-i386-pc-2.12-150700.19.16.1">
      <FullProductName ProductID="grub2-i386-pc-2.12-150700.19.16.1">grub2-i386-pc-2.12-150700.19.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grub2-x86_64-efi-2.12-150700.19.16.1">
      <FullProductName ProductID="grub2-x86_64-efi-2.12-150700.19.16.1">grub2-x86_64-efi-2.12-150700.19.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iproute2-6.4-150600.7.9.1">
      <FullProductName ProductID="iproute2-6.4-150600.7.9.1">iproute2-6.4-150600.7.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-6.4.0-150700.53.19.1">
      <FullProductName ProductID="kernel-default-6.4.0-150700.53.19.1">kernel-default-6.4.0-150700.53.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-1.20.1-150600.11.14.1">
      <FullProductName ProductID="krb5-1.20.1-150600.11.14.1">krb5-1.20.1-150600.11.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-client-1.20.1-150600.11.14.1">
      <FullProductName ProductID="krb5-client-1.20.1-150600.11.14.1">krb5-client-1.20.1-150600.11.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-client3-0.8-150600.15.9.1">
      <FullProductName ProductID="libavahi-client3-0.8-150600.15.9.1">libavahi-client3-0.8-150600.15.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavahi-common3-0.8-150600.15.9.1">
      <FullProductName ProductID="libavahi-common3-0.8-150600.15.9.1">libavahi-common3-0.8-150600.15.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-8.14.1-150700.7.2.1">
      <FullProductName ProductID="libcurl4-8.14.1-150700.7.2.1">libcurl4-8.14.1-150700.7.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexpat1-2.7.1-150700.3.6.1">
      <FullProductName ProductID="libexpat1-2.7.1-150700.3.6.1">libexpat1-2.7.1-150700.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2">
      <FullProductName ProductID="libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2">libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnvme-mi1-1.11+17.g61f36cae-150700.4.14.1">
      <FullProductName ProductID="libnvme-mi1-1.11+17.g61f36cae-150700.4.14.1">libnvme-mi1-1.11+17.g61f36cae-150700.4.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnvme1-1.11+17.g61f36cae-150700.4.14.1">
      <FullProductName ProductID="libnvme1-1.11+17.g61f36cae-150700.4.14.1">libnvme1-1.11+17.g61f36cae-150700.4.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_1-1.1.1w-150700.11.6.1">
      <FullProductName ProductID="libopenssl1_1-1.1.1w-150700.11.6.1">libopenssl1_1-1.1.1w-150700.11.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-3.2.3-150700.5.21.1">
      <FullProductName ProductID="libopenssl3-3.2.3-150700.5.21.1">libopenssl3-3.2.3-150700.5.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsolv-tools-base-0.7.35-150700.11.3.1">
      <FullProductName ProductID="libsolv-tools-base-0.7.35-150700.11.3.1">libsolv-tools-base-0.7.35-150700.11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh-config-0.9.8-150600.11.6.1">
      <FullProductName ProductID="libssh-config-0.9.8-150600.11.6.1">libssh-config-0.9.8-150600.11.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh4-0.9.8-150600.11.6.1">
      <FullProductName ProductID="libssh4-0.9.8-150600.11.6.1">libssh4-0.9.8-150600.11.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-17.37.18-150700.6.3.1">
      <FullProductName ProductID="libzypp-17.37.18-150700.6.3.1">libzypp-17.37.18-150700.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nvme-cli-2.11+29.g61f8d34b-150700.3.12.1">
      <FullProductName ProductID="nvme-cli-2.11+29.g61f8d34b-150700.3.12.1">nvme-cli-2.11+29.g61f8d34b-150700.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-3.2.3-150700.5.21.1">
      <FullProductName ProductID="openssl-3-3.2.3-150700.5.21.1">openssl-3-3.2.3-150700.5.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-solv-0.7.35-150700.11.3.1">
      <FullProductName ProductID="python3-solv-0.7.35-150700.11.3.1">python3-solv-0.7.35-150700.11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby-solv-0.7.35-150700.11.3.1">
      <FullProductName ProductID="ruby-solv-0.7.35-150700.11.3.1">ruby-solv-0.7.35-150700.11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2">
      <FullProductName ProductID="samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2">samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sudo-1.9.15p5-150600.3.12.1">
      <FullProductName ProductID="sudo-1.9.15p5-150600.3.12.1">sudo-1.9.15p5-150600.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sysconfig-0.85.10-150200.15.1">
      <FullProductName ProductID="sysconfig-0.85.10-150200.15.1">sysconfig-0.85.10-150200.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sysconfig-netconfig-0.85.10-150200.15.1">
      <FullProductName ProductID="sysconfig-netconfig-0.85.10-150200.15.1">sysconfig-netconfig-0.85.10-150200.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-9.1.1629-150500.20.33.1">
      <FullProductName ProductID="vim-9.1.1629-150500.20.33.1">vim-9.1.1629-150500.20.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-data-common-9.1.1629-150500.20.33.1">
      <FullProductName ProductID="vim-data-common-9.1.1629-150500.20.33.1">vim-data-common-9.1.1629-150500.20.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zypper-1.14.94-150700.13.3.1">
      <FullProductName ProductID="zypper-1.14.94-150700.13.3.1">zypper-1.14.94-150700.13.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="bind-utils-9.20.11-150700.3.9.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:bind-utils-9.20.11-150700.3.9.1">bind-utils-9.20.11-150700.3.9.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150700.7.2.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:curl-8.14.1-150700.7.2.1">curl-8.14.1-150700.7.2.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-059+suse.565.g51c2c969-150700.3.6.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:dracut-059+suse.565.g51c2c969-150700.3.6.1">dracut-059+suse.565.g51c2c969-150700.3.6.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="grub2-2.12-150700.19.16.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:grub2-2.12-150700.19.16.1">grub2-2.12-150700.19.16.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="grub2-i386-pc-2.12-150700.19.16.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:grub2-i386-pc-2.12-150700.19.16.1">grub2-i386-pc-2.12-150700.19.16.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="grub2-x86_64-efi-2.12-150700.19.16.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:grub2-x86_64-efi-2.12-150700.19.16.1">grub2-x86_64-efi-2.12-150700.19.16.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="iproute2-6.4-150600.7.9.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:iproute2-6.4-150600.7.9.1">iproute2-6.4-150600.7.9.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-6.4.0-150700.53.19.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1">kernel-default-6.4.0-150700.53.19.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-1.20.1-150600.11.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:krb5-1.20.1-150600.11.14.1">krb5-1.20.1-150600.11.14.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-client-1.20.1-150600.11.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:krb5-client-1.20.1-150600.11.14.1">krb5-client-1.20.1-150600.11.14.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-client3-0.8-150600.15.9.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libavahi-client3-0.8-150600.15.9.1">libavahi-client3-0.8-150600.15.9.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavahi-common3-0.8-150600.15.9.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libavahi-common3-0.8-150600.15.9.1">libavahi-common3-0.8-150600.15.9.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150700.7.2.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libcurl4-8.14.1-150700.7.2.1">libcurl4-8.14.1-150700.7.2.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexpat1-2.7.1-150700.3.6.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libexpat1-2.7.1-150700.3.6.1">libexpat1-2.7.1-150700.3.6.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2">libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnvme-mi1-1.11+17.g61f36cae-150700.4.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libnvme-mi1-1.11+17.g61f36cae-150700.4.14.1">libnvme-mi1-1.11+17.g61f36cae-150700.4.14.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnvme1-1.11+17.g61f36cae-150700.4.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libnvme1-1.11+17.g61f36cae-150700.4.14.1">libnvme1-1.11+17.g61f36cae-150700.4.14.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_1-1.1.1w-150700.11.6.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libopenssl1_1-1.1.1w-150700.11.6.1">libopenssl1_1-1.1.1w-150700.11.6.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-3.2.3-150700.5.21.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libopenssl3-3.2.3-150700.5.21.1">libopenssl3-3.2.3-150700.5.21.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsolv-tools-base-0.7.35-150700.11.3.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libsolv-tools-base-0.7.35-150700.11.3.1">libsolv-tools-base-0.7.35-150700.11.3.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh-config-0.9.8-150600.11.6.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libssh-config-0.9.8-150600.11.6.1">libssh-config-0.9.8-150600.11.6.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh4-0.9.8-150600.11.6.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libssh4-0.9.8-150600.11.6.1">libssh4-0.9.8-150600.11.6.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-17.37.18-150700.6.3.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libzypp-17.37.18-150700.6.3.1">libzypp-17.37.18-150700.6.3.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvme-cli-2.11+29.g61f8d34b-150700.3.12.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:nvme-cli-2.11+29.g61f8d34b-150700.3.12.1">nvme-cli-2.11+29.g61f8d34b-150700.3.12.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-3.2.3-150700.5.21.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:openssl-3-3.2.3-150700.5.21.1">openssl-3-3.2.3-150700.5.21.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-solv-0.7.35-150700.11.3.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:python3-solv-0.7.35-150700.11.3.1">python3-solv-0.7.35-150700.11.3.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby-solv-0.7.35-150700.11.3.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:ruby-solv-0.7.35-150700.11.3.1">ruby-solv-0.7.35-150700.11.3.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2">samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="sudo-1.9.15p5-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:sudo-1.9.15p5-150600.3.12.1">sudo-1.9.15p5-150600.3.12.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="sysconfig-0.85.10-150200.15.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:sysconfig-0.85.10-150200.15.1">sysconfig-0.85.10-150200.15.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="sysconfig-netconfig-0.85.10-150200.15.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:sysconfig-netconfig-0.85.10-150200.15.1">sysconfig-netconfig-0.85.10-150200.15.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-9.1.1629-150500.20.33.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-9.1.1629-150500.20.33.1">vim-9.1.1629-150500.20.33.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150500.20.33.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-data-common-9.1.1629-150500.20.33.1">vim-data-common-9.1.1629-150500.20.33.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-1.14.94-150700.13.3.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:zypper-1.14.94-150700.13.3.1">zypper-1.14.94-150700.13.3.1 as a component of Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix out of bounds read in smb2_sess_setup

ksmbd does not consider the case of that smb2 session setup is
in compound request. If this is the second payload of the compound,
OOB read issue occurs while processing the first payload in
the smb2_sess_setup().</Note>
    </Notes>
    <CVE>CVE-2023-3867</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea()

There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request
from client. ksmbd find next smb2_ea_info using -&gt;NextEntryOffset of
current smb2_ea_info. ksmbd need to validate buffer length Before
accessing the next ea. ksmbd should check buffer length using buf_len,
not next variable. next is the start offset of current ea that got from
previous ea.</Note>
    </Notes>
    <CVE>CVE-2023-4130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate command request size

In commit 2b9b8f3b68ed ("ksmbd: validate command payload size"), except
for SMB2_OPLOCK_BREAK_HE command, the request size of other commands
is not checked, it's not expected. Fix it by add check for request
size of other commands.</Note>
    </Notes>
    <CVE>CVE-2023-4515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

coresight: Fix memory leak in acpi_buffer-&gt;pointer

There are memory leaks reported by kmemleak:
...
unreferenced object 0xffff00213c141000 (size 1024):
  comm "systemd-udevd", pid 2123, jiffies 4294909467 (age 6062.160s)
  hex dump (first 32 bytes):
    04 00 00 00 02 00 00 00 18 10 14 3c 21 00 ff ff  ...........&lt;!...
    00 00 00 00 00 00 00 00 03 00 00 00 10 00 00 00  ................
  backtrace:
    [&lt;000000004b7c9001&gt;] __kmem_cache_alloc_node+0x2f8/0x348
    [&lt;00000000b0fc7ceb&gt;] __kmalloc+0x58/0x108
    [&lt;0000000064ff4695&gt;] acpi_os_allocate+0x2c/0x68
    [&lt;000000007d57d116&gt;] acpi_ut_initialize_buffer+0x54/0xe0
    [&lt;0000000024583908&gt;] acpi_evaluate_object+0x388/0x438
    [&lt;0000000017b2e72b&gt;] acpi_evaluate_object_typed+0xe8/0x240
    [&lt;000000005df0eac2&gt;] coresight_get_platform_data+0x1b4/0x988 [coresight]
...

The ACPI buffer memory (buf.pointer) should be freed. But the buffer
is also used after returning from acpi_get_dsd_graph().
Move the temporary variables buf to acpi_coresight_parse_graph(),
and free it before the function return to prevent memory leak.</Note>
    </Notes>
    <CVE>CVE-2023-53261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.</Note>
    </Notes>
    <CVE>CVE-2023-5633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'

In "u32 otg_inst = pipe_ctx-&gt;stream_res.tg-&gt;inst;"
pipe_ctx-&gt;stream_res.tg could be NULL, it is relying on the caller to
ensure the tg is not NULL.</Note>
    </Notes>
    <CVE>CVE-2024-26661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix qgroup reserve leaks in cow_file_range

In the buffered write path, the dirty page owns the qgroup reserve until
it creates an ordered_extent.

Therefore, any errors that occur before the ordered_extent is created
must free that reservation, or else the space is leaked. The fstest
generic/475 exercises various IO error paths, and is able to trigger
errors in cow_file_range where we fail to get to allocating the ordered
extent. Note that because we *do* clear delalloc, we are likely to
remove the inode from the delalloc list, so the inodes/pages to not have
invalidate/launder called on them in the commit abort path.

This results in failures at the unmount stage of the test that look like:

  BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure
  BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure
  BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672
  ------------[ cut here ]------------
  WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]
  Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq
  CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W          6.10.0-rc7-gab56fde445b8 #21
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014
  RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]
  RSP: 0018:ffffb4465283be00 EFLAGS: 00010202
  RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001
  RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8
  RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000
  R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c
  R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
  FS:  00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   ? close_ctree+0x222/0x4d0 [btrfs]
   ? __warn.cold+0x8e/0xea
   ? close_ctree+0x222/0x4d0 [btrfs]
   ? report_bug+0xff/0x140
   ? handle_bug+0x3b/0x70
   ? exc_invalid_op+0x17/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? close_ctree+0x222/0x4d0 [btrfs]
   generic_shutdown_super+0x70/0x160
   kill_anon_super+0x11/0x40
   btrfs_kill_super+0x11/0x20 [btrfs]
   deactivate_locked_super+0x2e/0xa0
   cleanup_mnt+0xb5/0x150
   task_work_run+0x57/0x80
   syscall_exit_to_user_mode+0x121/0x130
   do_syscall_64+0xab/0x1a0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7f916847a887
  ---[ end trace 0000000000000000 ]---
  BTRFS error (device dm-8 state EA): qgroup reserved space leaked

Cases 2 and 3 in the out_reserve path both pertain to this type of leak
and must free the reserved qgroup data. Because it is already an error
path, I opted not to handle the possible errors in
btrfs_free_qgroup_data.</Note>
    </Notes>
    <CVE>CVE-2024-46733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix buffer overflow when parsing NFS reparse points

ReparseDataLength is sum of the InodeType size and DataBuffer size.
So to get DataBuffer size it is needed to subtract InodeType's size from
ReparseDataLength.

Function cifs_strndup_from_utf16() is currentlly accessing buf-&gt;DataBuffer
at position after the end of the buffer because it does not subtract
InodeType size from the length. Fix this problem and correctly subtract
variable len.

Member InodeType is present only when reparse buffer is large enough. Check
for ReparseDataLength before accessing InodeType to prevent another invalid
memory access.

Major and minor rdev values are present also only when reparse buffer is
large enough. Check for reparse buffer size before calling reparse_mkdev().</Note>
    </Notes>
    <CVE>CVE-2024-49996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.</Note>
    </Notes>
    <CVE>CVE-2024-52615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libavahi-client3-0.8-150600.15.9.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libavahi-common3-0.8-150600.15.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: sync_linked_regs() must preserve subreg_def

Range propagation must not affect subreg_def marks, otherwise the
following example is rewritten by verifier incorrectly when
BPF_F_TEST_RND_HI32 flag is set:

  0: call bpf_ktime_get_ns                   call bpf_ktime_get_ns
  1: r0 &amp;= 0x7fffffff       after verifier   r0 &amp;= 0x7fffffff
  2: w1 = w0                rewrites         w1 = w0
  3: if w0 &lt; 10 goto +0     --------------&gt;  r11 = 0x2f5674a6     (r)
  4: r1 &gt;&gt;= 32                               r11 &lt;&lt;= 32           (r)
  5: r0 = r1                                 r1 |= r11            (r)
  6: exit;                                   if w0 &lt; 0xa goto pc+0
                                             r1 &gt;&gt;= 32
                                             r0 = r1
                                             exit

(or zero extension of w1 at (2) is missing for architectures that
 require zero extension for upper register half).

The following happens w/o this patch:
- r0 is marked as not a subreg at (0);
- w1 is marked as subreg at (2);
- w1 subreg_def is overridden at (3) by copy_register_state();
- w1 is read at (5) but mark_insn_zext() does not mark (2)
  for zero extension, because w1 subreg_def is not set;
- because of BPF_F_TEST_RND_HI32 flag verifier inserts random
  value for hi32 bits of (2) (marked (r));
- this random value is read at (5).</Note>
    </Notes>
    <CVE>CVE-2024-53125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sched/core: Prevent rescheduling when interrupts are disabled

David reported a warning observed while loop testing kexec jump:

  Interrupts enabled after irqrouter_resume+0x0/0x50
  WARNING: CPU: 0 PID: 560 at drivers/base/syscore.c:103 syscore_resume+0x18a/0x220
   kernel_kexec+0xf6/0x180
   __do_sys_reboot+0x206/0x250
   do_syscall_64+0x95/0x180

The corresponding interrupt flag trace:

  hardirqs last  enabled at (15573): [&lt;ffffffffa8281b8e&gt;] __up_console_sem+0x7e/0x90
  hardirqs last disabled at (15580): [&lt;ffffffffa8281b73&gt;] __up_console_sem+0x63/0x90

That means __up_console_sem() was invoked with interrupts enabled. Further
instrumentation revealed that in the interrupt disabled section of kexec
jump one of the syscore_suspend() callbacks woke up a task, which set the
NEED_RESCHED flag. A later callback in the resume path invoked
cond_resched() which in turn led to the invocation of the scheduler:

  __cond_resched+0x21/0x60
  down_timeout+0x18/0x60
  acpi_os_wait_semaphore+0x4c/0x80
  acpi_ut_acquire_mutex+0x3d/0x100
  acpi_ns_get_node+0x27/0x60
  acpi_ns_evaluate+0x1cb/0x2d0
  acpi_rs_set_srs_method_data+0x156/0x190
  acpi_pci_link_set+0x11c/0x290
  irqrouter_resume+0x54/0x60
  syscore_resume+0x6a/0x200
  kernel_kexec+0x145/0x1c0
  __do_sys_reboot+0xeb/0x240
  do_syscall_64+0x95/0x180

This is a long standing problem, which probably got more visible with
the recent printk changes. Something does a task wakeup and the
scheduler sets the NEED_RESCHED flag. cond_resched() sees it set and
invokes schedule() from a completely bogus context. The scheduler
enables interrupts after context switching, which causes the above
warning at the end.

Quite some of the code paths in syscore_suspend()/resume() can result in
triggering a wakeup with the exactly same consequences. They might not
have done so yet, but as they share a lot of code with normal operations
it's just a question of time.

The problem only affects the PREEMPT_NONE and PREEMPT_VOLUNTARY scheduling
models. Full preemption is not affected as cond_resched() is disabled and
the preemption check preemptible() takes the interrupt disabled flag into
account.

Cure the problem by adding a corresponding check into cond_resched().</Note>
    </Notes>
    <CVE>CVE-2024-58090</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test

This fixes the tx timeout issue seen while running a stress test on
btnxpuart for couple of hours, such that the interval between two HCI
commands coincide with the power save timeout value of 2 seconds.

Test procedure using bash script:
&lt;load btnxpuart.ko&gt;
hciconfig hci0 up
//Enable Power Save feature
hcitool -i hci0 cmd 3f 23 02 00 00
while (true)
do
    hciconfig hci0 leadv
    sleep 2
    hciconfig hci0 noleadv
    sleep 2
done

Error log, after adding few more debug prints:
Bluetooth: btnxpuart_queue_skb(): 01 0A 20 01 00
Bluetooth: hci0: Set UART break: on, status=0
Bluetooth: hci0: btnxpuart_tx_wakeup() tx_work scheduled
Bluetooth: hci0: btnxpuart_tx_work() dequeue: 01 0A 20 01 00
Can't set advertise mode on hci0: Connection timed out (110)
Bluetooth: hci0: command 0x200a tx timeout

When the power save mechanism turns on UART break, and btnxpuart_tx_work()
is scheduled simultaneously, psdata-&gt;ps_state is read as PS_STATE_AWAKE,
which prevents the psdata-&gt;work from being scheduled, which is responsible
to turn OFF UART break.

This issue is fixed by adding a ps_lock mutex around UART break on/off as
well as around ps_state read/write.
btnxpuart_tx_wakeup() will now read updated ps_state value. If ps_state is
PS_STATE_SLEEP, it will first schedule psdata-&gt;work, and then it will
reschedule itself once UART break has been turned off and ps_state is
PS_STATE_AWAKE.

Tested above script for 50,000 iterations and TX timeout error was not
observed anymore.</Note>
    </Notes>
    <CVE>CVE-2024-58238</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tls: stop recv() if initial process_rx_list gave us non-DATA

If we have a non-DATA record on the rx_list and another record of the
same type still on the queue, we will end up merging them:
 - process_rx_list copies the non-DATA record
 - we start the loop and process the first available record since it's
   of the same type
 - we break out of the loop since the record was not DATA

Just check the record type and jump to the end in case process_rx_list
did some work.</Note>
    </Notes>
    <CVE>CVE-2024-58239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller's wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.</Note>
    </Notes>
    <CVE>CVE-2025-10230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Apply the link chain quirk on NEC isoc endpoints

Two clearly different specimens of NEC uPD720200 (one with start/stop
bug, one without) were seen to cause IOMMU faults after some Missed
Service Errors. Faulting address is immediately after a transfer ring
segment and patched dynamic debug messages revealed that the MSE was
received when waiting for a TD near the end of that segment:

[ 1.041954] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ffa08fe0
[ 1.042120] xhci_hcd: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0005 address=0xffa09000 flags=0x0000]
[ 1.042146] xhci_hcd: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0005 address=0xffa09040 flags=0x0000]

It gets even funnier if the next page is a ring segment accessible to
the HC. Below, it reports MSE in segment at ff1e8000, plows through a
zero-filled page at ff1e9000 and starts reporting events for TRBs in
page at ff1ea000 every microframe, instead of jumping to seg ff1e6000.

[ 7.041671] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ff1e8fe0
[ 7.041999] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ff1e8fe0
[ 7.042011] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint
[ 7.042028] xhci_hcd: All TDs skipped for slot 1 ep 2. Clear skip flag.
[ 7.042134] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint
[ 7.042138] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 31
[ 7.042144] xhci_hcd: Looking for event-dma 00000000ff1ea040 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820
[ 7.042259] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint
[ 7.042262] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 31
[ 7.042266] xhci_hcd: Looking for event-dma 00000000ff1ea050 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820

At some point completion events change from Isoch Buffer Overrun to
Short Packet and the HC finally finds cycle bit mismatch in ff1ec000.

[ 7.098130] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
[ 7.098132] xhci_hcd: Looking for event-dma 00000000ff1ecc50 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820
[ 7.098254] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13
[ 7.098256] xhci_hcd: Looking for event-dma 00000000ff1ecc60 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820
[ 7.098379] xhci_hcd: Overrun event on slot 1 ep 2

It's possible that data from the isochronous device were written to
random buffers of pending TDs on other endpoints (either IN or OUT),
other devices or even other HCs in the same IOMMU domain.

Lastly, an error from a different USB device on another HC. Was it
caused by the above? I don't know, but it may have been. The disk
was working without any other issues and generated PCIe traffic to
starve the NEC of upstream BW and trigger those MSEs. The two HCs
shared one x1 slot by means of a commercial "PCIe splitter" board.

[ 7.162604] usb 10-2: reset SuperSpeed USB device number 3 using xhci_hcd
[ 7.178990] sd 9:0:0:0: [sdb] tag#0 UNKNOWN(0x2003) Result: hostbyte=0x07 driverbyte=DRIVER_OK cmd_age=0s
[ 7.179001] sd 9:0:0:0: [sdb] tag#0 CDB: opcode=0x28 28 00 04 02 ae 00 00 02 00 00
[ 7.179004] I/O error, dev sdb, sector 67284480 op 0x0:(READ) flags 0x80700 phys_seg 5 prio class 0

Fortunately, it appears that this ridiculous bug is avoided by setting
the chain bit of Link TRBs on isochronous rings. Other ancient HCs are
known which also expect the bit to be set and they ignore Link TRBs if
it's not. Reportedly, 0.95 spec guaranteed that the bit is set.

The bandwidth-starved NEC HC running a 32KB/uframe UVC endpoint reports
tens of MSEs per second and runs into the bug within seconds. Chaining
Link TRBs allows the same workload to run for many minutes, many times.

No ne
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-22022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.</Note>
    </Notes>
    <CVE>CVE-2025-3576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:krb5-1.20.1-150600.11.14.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:krb5-client-1.20.1-150600.11.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: mctp: Don't access ifa_index when missing

In mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but
only when the struct ifaddrmsg is provided. Otherwise it will be
comparing to uninitialised memory - reproducible in the syzkaller case from
dhcpd, or busybox "ip addr show".

The kernel MCTP implementation has always filtered by ifa_index, so
existing userspace programs expecting to dump MCTP addresses must
already be passing a valid ifa_index value (either 0 or a real index).

BUG: KMSAN: uninit-value in mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128
 mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128
 rtnl_dump_all+0x3ec/0x5b0 net/core/rtnetlink.c:4380
 rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6824
 netlink_dump+0x97b/0x1690 net/netlink/af_netlink.c:2309</Note>
    </Notes>
    <CVE>CVE-2025-38006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix timeout on deleted connection

NOPIN response timer may expire on a deleted connection and crash with
such logs:

Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d

BUG: Kernel NULL pointer dereference on read at 0x00000000
NIP  strlcpy+0x8/0xb0
LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod]
Call Trace:
 iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]
 call_timer_fn+0x58/0x1f0
 run_timer_softirq+0x740/0x860
 __do_softirq+0x16c/0x420
 irq_exit+0x188/0x1c0
 timer_interrupt+0x184/0x410

That is because nopin response timer may be re-started on nopin timer
expiration.

Stop nopin timer before stopping the nopin response timer to be sure
that no one of them will be re-started.</Note>
    </Notes>
    <CVE>CVE-2025-38075</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()

Update struct hid_descriptor to better reflect the mandatory and
optional parts of the HID Descriptor as per USB HID 1.11 specification.
Note: the kernel currently does not parse any optional HID class
descriptors, only the mandatory report descriptor.

Update all references to member element desc[0] to rpt_desc.

Add test to verify bLength and bNumDescriptors values are valid.

Replace the for loop with direct access to the mandatory HID class
descriptor member for the report descriptor. This eliminates the
possibility of getting an out-of-bounds fault.

Add a warning message if the HID descriptor contains any unsupported
optional HID class descriptors.</Note>
    </Notes>
    <CVE>CVE-2025-38103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: core: ufs: Fix a hang in the error handler

ufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter
function can only succeed if UFSHCD_EH_IN_PROGRESS is not set because
resuming involves submitting a SCSI command and ufshcd_queuecommand()
returns SCSI_MLQUEUE_HOST_BUSY if UFSHCD_EH_IN_PROGRESS is set. Fix this
hang by setting UFSHCD_EH_IN_PROGRESS after ufshcd_rpm_get_sync() has
been called instead of before.

Backtrace:
__switch_to+0x174/0x338
__schedule+0x600/0x9e4
schedule+0x7c/0xe8
schedule_timeout+0xa4/0x1c8
io_schedule_timeout+0x48/0x70
wait_for_common_io+0xa8/0x160 //waiting on START_STOP
wait_for_completion_io_timeout+0x10/0x20
blk_execute_rq+0xe4/0x1e4
scsi_execute_cmd+0x108/0x244
ufshcd_set_dev_pwr_mode+0xe8/0x250
__ufshcd_wl_resume+0x94/0x354
ufshcd_wl_runtime_resume+0x3c/0x174
scsi_runtime_resume+0x64/0xa4
rpm_resume+0x15c/0xa1c
__pm_runtime_resume+0x4c/0x90 // Runtime resume ongoing
ufshcd_err_handler+0x1a0/0xd08
process_one_work+0x174/0x808
worker_thread+0x15c/0x490
kthread+0xf4/0x1ec
ret_from_fork+0x10/0x20

[ bvanassche: rewrote patch description ]</Note>
    </Notes>
    <CVE>CVE-2025-38119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: make sure that ptp_rate is not 0 before configuring EST

If the ptp_rate recorded earlier in the driver happens to be 0, this
bogus value will propagate up to EST configuration, where it will
trigger a division by 0.

Prevent this division by 0 by adding the corresponding check and error
code.</Note>
    </Notes>
    <CVE>CVE-2025-38125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: Fix the dead loop of MPLS parse

The unexpected MPLS packet may not end with the bottom label stack.
When there are many stacks, The label count value has wrapped around.
A dead loop occurs, soft lockup/CPU stuck finally.

stack backtrace:
UBSAN: array-index-out-of-bounds in /build/linux-0Pa0xK/linux-5.15.0/net/openvswitch/flow.c:662:26
index -1 is out of range for type '__be32 [3]'
CPU: 34 PID: 0 Comm: swapper/34 Kdump: loaded Tainted: G           OE   5.15.0-121-generic #131-Ubuntu
Hardware name: Dell Inc. PowerEdge C6420/0JP9TF, BIOS 2.12.2 07/14/2021
Call Trace:
 &lt;IRQ&gt;
 show_stack+0x52/0x5c
 dump_stack_lvl+0x4a/0x63
 dump_stack+0x10/0x16
 ubsan_epilogue+0x9/0x36
 __ubsan_handle_out_of_bounds.cold+0x44/0x49
 key_extract_l3l4+0x82a/0x840 [openvswitch]
 ? kfree_skbmem+0x52/0xa0
 key_extract+0x9c/0x2b0 [openvswitch]
 ovs_flow_key_extract+0x124/0x350 [openvswitch]
 ovs_vport_receive+0x61/0xd0 [openvswitch]
 ? kernel_init_free_pages.part.0+0x4a/0x70
 ? get_page_from_freelist+0x353/0x540
 netdev_port_receive+0xc4/0x180 [openvswitch]
 ? netdev_port_receive+0x180/0x180 [openvswitch]
 netdev_frame_hook+0x1f/0x40 [openvswitch]
 __netif_receive_skb_core.constprop.0+0x23a/0xf00
 __netif_receive_skb_list_core+0xfa/0x240
 netif_receive_skb_list_internal+0x18e/0x2a0
 napi_complete_done+0x7a/0x1c0
 bnxt_poll+0x155/0x1c0 [bnxt_en]
 __napi_poll+0x30/0x180
 net_rx_action+0x126/0x280
 ? bnxt_msix+0x67/0x80 [bnxt_en]
 handle_softirqs+0xda/0x2d0
 irq_exit_rcu+0x96/0xc0
 common_interrupt+0x8e/0xa0
 &lt;/IRQ&gt;</Note>
    </Notes>
    <CVE>CVE-2025-38146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
raspberrypi_clk_register() does not check for this case, which results
in a NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.</Note>
    </Notes>
    <CVE>CVE-2025-38160</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer

The reproduction steps:
1. create a tun interface
2. enable l2 bearer
3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun

tipc: Started in network mode
tipc: Node identity 8af312d38a21, cluster identity 4711
tipc: Enabled bearer &lt;eth:syz_tun&gt;, priority 1
Oops: general protection fault
KASAN: null-ptr-deref in range
CPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT
Hardware name: QEMU Ubuntu 24.04 PC
RIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0

the ub was in fact a struct dev.

when bid != 0 &amp;&amp; skip_cnt != 0, bearer_list[bid] may be NULL or
other media when other thread changes it.

fix this by checking media_id.</Note>
    </Notes>
    <CVE>CVE-2025-38184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: atmtcp: Free invalid length skb in atmtcp_c_send().

syzbot reported the splat below. [0]

vcc_sendmsg() copies data passed from userspace to skb and passes
it to vcc-&gt;dev-&gt;ops-&gt;send().

atmtcp_c_send() accesses skb-&gt;data as struct atmtcp_hdr after
checking if skb-&gt;len is 0, but it's not enough.

Also, when skb-&gt;len == 0, skb and sk (vcc) were leaked because
dev_kfree_skb() is not called and sk_wmem_alloc adjustment is missing
to revert atm_account_tx() in vcc_sendmsg(), which is expected
to be done in atm_pop_raw().

Let's properly free skb with an invalid length in atmtcp_c_send().

[0]:
BUG: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:4154 [inline]
 slab_alloc_node mm/slub.c:4197 [inline]
 kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249
 kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579
 __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670
 alloc_skb include/linux/skbuff.h:1336 [inline]
 vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025</Note>
    </Notes>
    <CVE>CVE-2025-38185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: Revert atm_account_tx() if copy_from_iter_full() fails.

In vcc_sendmsg(), we account skb-&gt;truesize to sk-&gt;sk_wmem_alloc by
atm_account_tx().

It is expected to be reverted by atm_pop_raw() later called by
vcc-&gt;dev-&gt;ops-&gt;send(vcc, skb).

However, vcc_sendmsg() misses the same revert when copy_from_iter_full()
fails, and then we will leak a socket.

Let's factorise the revert part as atm_return_tx() and call it in
the failure path.

Note that the corresponding sk_wmem_alloc operation can be found in
alloc_tx() as of the blamed commit.

  $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~</Note>
    </Notes>
    <CVE>CVE-2025-38190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX

Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof()
when resizing hashtable because __GFP_NOWARN is unset.

Similar to:

  b541ba7d1f5a ("netfilter: conntrack: clamp maximum hashtable size to INT_MAX")</Note>
    </Notes>
    <CVE>CVE-2025-38201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1

[Why]
If the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated
then they can lead to a divide by zero in downstream callers like
CalculateVMAndRowBytes()

[How]
Initialize dummy value to a value to avoid divide by zero.</Note>
    </Notes>
    <CVE>CVE-2025-38205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: add NULL check in automount_fullpath

page is checked for null in __build_path_from_dentry_optional_prefix
when tcon-&gt;origin_fullpath is not set. However, the check is missing when
it is set.
Add a check to prevent a potential NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2025-38208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Restore context entry setup order for aliased devices

Commit 2031c469f816 ("iommu/vt-d: Add support for static identity domain")
changed the context entry setup during domain attachment from a
set-and-check policy to a clear-and-reset approach. This inadvertently
introduced a regression affecting PCI aliased devices behind PCIe-to-PCI
bridges.

Specifically, keyboard and touchpad stopped working on several Apple
Macbooks with below messages:

 kernel: platform pxa2xx-spi.3: Adding to iommu group 20
 kernel: input: Apple SPI Keyboard as
 /devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00

Fix this by restoring the previous context setup order.</Note>
    </Notes>
    <CVE>CVE-2025-38216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sched/rt: Fix race in push_rt_task

Overview
========
When a CPU chooses to call push_rt_task and picks a task to push to
another CPU's runqueue then it will call find_lock_lowest_rq method
which would take a double lock on both CPUs' runqueues. If one of the
locks aren't readily available, it may lead to dropping the current
runqueue lock and reacquiring both the locks at once. During this window
it is possible that the task is already migrated and is running on some
other CPU. These cases are already handled. However, if the task is
migrated and has already been executed and another CPU is now trying to
wake it up (ttwu) such that it is queued again on the runqeue
(on_rq is 1) and also if the task was run by the same CPU, then the
current checks will pass even though the task was migrated out and is no
longer in the pushable tasks list.

Crashes
=======
This bug resulted in quite a few flavors of crashes triggering kernel
panics with various crash signatures such as assert failures, page
faults, null pointer dereferences, and queue corruption errors all
coming from scheduler itself.

Some of the crashes:
-&gt; kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx &gt;= MAX_RT_PRIO)
   Call Trace:
   ? __die_body+0x1a/0x60
   ? die+0x2a/0x50
   ? do_trap+0x85/0x100
   ? pick_next_task_rt+0x6e/0x1d0
   ? do_error_trap+0x64/0xa0
   ? pick_next_task_rt+0x6e/0x1d0
   ? exc_invalid_op+0x4c/0x60
   ? pick_next_task_rt+0x6e/0x1d0
   ? asm_exc_invalid_op+0x12/0x20
   ? pick_next_task_rt+0x6e/0x1d0
   __schedule+0x5cb/0x790
   ? update_ts_time_stats+0x55/0x70
   schedule_idle+0x1e/0x40
   do_idle+0x15e/0x200
   cpu_startup_entry+0x19/0x20
   start_secondary+0x117/0x160
   secondary_startup_64_no_verify+0xb0/0xbb

-&gt; BUG: kernel NULL pointer dereference, address: 00000000000000c0
   Call Trace:
   ? __die_body+0x1a/0x60
   ? no_context+0x183/0x350
   ? __warn+0x8a/0xe0
   ? exc_page_fault+0x3d6/0x520
   ? asm_exc_page_fault+0x1e/0x30
   ? pick_next_task_rt+0xb5/0x1d0
   ? pick_next_task_rt+0x8c/0x1d0
   __schedule+0x583/0x7e0
   ? update_ts_time_stats+0x55/0x70
   schedule_idle+0x1e/0x40
   do_idle+0x15e/0x200
   cpu_startup_entry+0x19/0x20
   start_secondary+0x117/0x160
   secondary_startup_64_no_verify+0xb0/0xbb

-&gt; BUG: unable to handle page fault for address: ffff9464daea5900
   kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq-&gt;cpu != task_cpu(p))

-&gt; kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq-&gt;nr_running)
   Call Trace:
   ? __die_body+0x1a/0x60
   ? die+0x2a/0x50
   ? do_trap+0x85/0x100
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? do_error_trap+0x64/0xa0
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? exc_invalid_op+0x4c/0x60
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? asm_exc_invalid_op+0x12/0x20
   ? dequeue_top_rt_rq+0xa2/0xb0
   dequeue_rt_entity+0x1f/0x70
   dequeue_task_rt+0x2d/0x70
   __schedule+0x1a8/0x7e0
   ? blk_finish_plug+0x25/0x40
   schedule+0x3c/0xb0
   futex_wait_queue_me+0xb6/0x120
   futex_wait+0xd9/0x240
   do_futex+0x344/0xa90
   ? get_mm_exe_file+0x30/0x60
   ? audit_exe_compare+0x58/0x70
   ? audit_filter_rules.constprop.26+0x65e/0x1220
   __x64_sys_futex+0x148/0x1f0
   do_syscall_64+0x30/0x80
   entry_SYSCALL_64_after_hwframe+0x62/0xc7

-&gt; BUG: unable to handle page fault for address: ffff8cf3608bc2c0
   Call Trace:
   ? __die_body+0x1a/0x60
   ? no_context+0x183/0x350
   ? spurious_kernel_fault+0x171/0x1c0
   ? exc_page_fault+0x3b6/0x520
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? asm_exc_page_fault+0x1e/0x30
   ? _cond_resched+0x15/0x30
   ? futex_wait_queue_me+0xc8/0x120
   ? futex_wait+0xd9/0x240
   ? try_to_wake_up+0x1b8/0x490
   ? futex_wake+0x78/0x160
   ? do_futex+0xcd/0xa90
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? plist_del+0x6a/0xd0
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? dequeue_pushable_task+0x20/0x70
   ? __schedule+0x382/0x7e0
   ? asm_sysvec_reschedule_i
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().

syzbot reported a warning below during atm_dev_register(). [0]

Before creating a new device and procfs/sysfs for it, atm_dev_register()
looks up a duplicated device by __atm_dev_lookup().  These operations are
done under atm_dev_mutex.

However, when removing a device in atm_dev_deregister(), it releases the
mutex just after removing the device from the list that __atm_dev_lookup()
iterates over.

So, there will be a small race window where the device does not exist on
the device list but procfs/sysfs are still not removed, triggering the
splat.

Let's hold the mutex until procfs/sysfs are removed in
atm_dev_deregister().

[0]:
proc_dir_entry 'atm/atmtcp:0' already registered
WARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377
Modules linked in:
CPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377
Code: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 &lt;0f&gt; 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48
RSP: 0018:ffffc9000466fa30 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248
RDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001
RBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140
R13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444
FS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 proc_create_data+0xbe/0x110 fs/proc/generic.c:585
 atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361
 atm_dev_register+0x46d/0x890 net/atm/resources.c:113
 atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369
 atmtcp_attach drivers/atm/atmtcp.c:403 [inline]
 atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464
 do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
 sock_do_ioctl+0x115/0x280 net/socket.c:1190
 sock_ioctl+0x227/0x6b0 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl fs/ioctl.c:893 [inline]
 __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f38b3b74459
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459
RDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005
RBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f
R10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac
R13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2025-38245</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: prevent NULL deref in clip_push()

Blamed commit missed that vcc_destroy_socket() calls
clip_push() with a NULL skb.

If clip_devs is NULL, clip_push() then crashes when reading
skb-&gt;truesize.</Note>
    </Notes>
    <CVE>CVE-2025-38251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()

While testing null_blk with configfs, echo 0 &gt; poll_queues will trigger
following panic:

BUG: kernel NULL pointer dereference, address: 0000000000000010
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 27 UID: 0 PID: 920 Comm: bash Not tainted 6.15.0-02023-gadbdb95c8696-dirty #1238 PREEMPT(undef)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014
RIP: 0010:__bitmap_or+0x48/0x70
Call Trace:
 &lt;TASK&gt;
 __group_cpus_evenly+0x822/0x8c0
 group_cpus_evenly+0x2d9/0x490
 blk_mq_map_queues+0x1e/0x110
 null_map_queues+0xc9/0x170 [null_blk]
 blk_mq_update_queue_map+0xdb/0x160
 blk_mq_update_nr_hw_queues+0x22b/0x560
 nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
 nullb_device_poll_queues_store+0xa4/0x130 [null_blk]
 configfs_write_iter+0x109/0x1d0
 vfs_write+0x26e/0x6f0
 ksys_write+0x79/0x180
 __x64_sys_write+0x1d/0x30
 x64_sys_call+0x45c4/0x45f0
 do_syscall_64+0xa5/0x240
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Root cause is that numgrps is set to 0, and ZERO_SIZE_PTR is returned from
kcalloc(), and later ZERO_SIZE_PTR will be deferenced.

Fix the problem by checking numgrps first in group_cpus_evenly(), and
return NULL directly if numgrps is zero.

[yukuai3@huawei.com: also fix the non-SMP version]</Note>
    </Notes>
    <CVE>CVE-2025-38255</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bcache: fix NULL pointer in cache_set_flush()

1. LINE#1794 - LINE#1887 is some codes about function of
   bch_cache_set_alloc().
2. LINE#2078 - LINE#2142 is some codes about function of
   register_cache_set().
3. register_cache_set() will call bch_cache_set_alloc() in LINE#2098.

 1794 struct cache_set *bch_cache_set_alloc(struct cache_sb *sb)
 1795 {
 ...
 1860         if (!(c-&gt;devices = kcalloc(c-&gt;nr_uuids, sizeof(void *), GFP_KERNEL)) ||
 1861             mempool_init_slab_pool(&amp;c-&gt;search, 32, bch_search_cache) ||
 1862             mempool_init_kmalloc_pool(&amp;c-&gt;bio_meta, 2,
 1863                                 sizeof(struct bbio) + sizeof(struct bio_vec) *
 1864                                 bucket_pages(c)) ||
 1865             mempool_init_kmalloc_pool(&amp;c-&gt;fill_iter, 1, iter_size) ||
 1866             bioset_init(&amp;c-&gt;bio_split, 4, offsetof(struct bbio, bio),
 1867                         BIOSET_NEED_BVECS|BIOSET_NEED_RESCUER) ||
 1868             !(c-&gt;uuids = alloc_bucket_pages(GFP_KERNEL, c)) ||
 1869             !(c-&gt;moving_gc_wq = alloc_workqueue("bcache_gc",
 1870                                                 WQ_MEM_RECLAIM, 0)) ||
 1871             bch_journal_alloc(c) ||
 1872             bch_btree_cache_alloc(c) ||
 1873             bch_open_buckets_alloc(c) ||
 1874             bch_bset_sort_state_init(&amp;c-&gt;sort, ilog2(c-&gt;btree_pages)))
 1875                 goto err;
                      ^^^^^^^^
 1876
 ...
 1883         return c;
 1884 err:
 1885         bch_cache_set_unregister(c);
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^
 1886         return NULL;
 1887 }
 ...
 2078 static const char *register_cache_set(struct cache *ca)
 2079 {
 ...
 2098         c = bch_cache_set_alloc(&amp;ca-&gt;sb);
 2099         if (!c)
 2100                 return err;
                      ^^^^^^^^^^
 ...
 2128         ca-&gt;set = c;
 2129         ca-&gt;set-&gt;cache[ca-&gt;sb.nr_this_dev] = ca;
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 ...
 2138         return NULL;
 2139 err:
 2140         bch_cache_set_unregister(c);
 2141         return err;
 2142 }

(1) If LINE#1860 - LINE#1874 is true, then do 'goto err'(LINE#1875) and
    call bch_cache_set_unregister()(LINE#1885).
(2) As (1) return NULL(LINE#1886), LINE#2098 - LINE#2100 would return.
(3) As (2) has returned, LINE#2128 - LINE#2129 would do *not* give the
    value to c-&gt;cache[], it means that c-&gt;cache[] is NULL.

LINE#1624 - LINE#1665 is some codes about function of cache_set_flush().
As (1), in LINE#1885 call
bch_cache_set_unregister()
---&gt; bch_cache_set_stop()
     ---&gt; closure_queue()
          -.-&gt; cache_set_flush() (as below LINE#1624)

 1624 static void cache_set_flush(struct closure *cl)
 1625 {
 ...
 1654         for_each_cache(ca, c, i)
 1655                 if (ca-&gt;alloc_thread)
                          ^^
 1656                         kthread_stop(ca-&gt;alloc_thread);
 ...
 1665 }

(4) In LINE#1655 ca is NULL(see (3)) in cache_set_flush() then the
    kernel crash occurred as below:
[  846.712887] bcache: register_cache() error drbd6: cannot allocate memory
[  846.713242] bcache: register_bcache() error : failed to register device
[  846.713336] bcache: cache_set_free() Cache set 2f84bdc1-498a-4f2f-98a7-01946bf54287 unregistered
[  846.713768] BUG: unable to handle kernel NULL pointer dereference at 00000000000009f8
[  846.714790] PGD 0 P4D 0
[  846.715129] Oops: 0000 [#1] SMP PTI
[  846.715472] CPU: 19 PID: 5057 Comm: kworker/19:16 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-147.5.1.el8_1.5es.3.x86_64 #1
[  846.716082] Hardware name: ESPAN GI-25212/X11DPL-i, BIOS 2.1 06/15/2018
[  846.716451] Workqueue: events cache_set_flush [bcache]
[  846.716808] RIP: 0010:cache_set_flush+0xc9/0x1b0 [bcache]
[  846.717155] Code: 00 4c 89 a5 b0 03 00 00 48 8b 85 68 f6 ff ff a8 08 0f 84 88 00 00 00 31 db 66 83 bd 3c f7 ff ff 00 48 8b 85 48 ff ff ff 74 28 &lt;48&gt; 8b b8 f8 09 00 0
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush

In KVM guests with Hyper-V hypercalls enabled, the hypercalls
HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX
allow a guest to request invalidation of portions of a virtual TLB.
For this, the hypercall parameter includes a list of GVAs that are supposed
to be invalidated.

However, when non-canonical GVAs are passed, there is currently no
filtering in place and they are eventually passed to checked invocations of
INVVPID on Intel / INVLPGA on AMD.  While AMD's INVLPGA silently ignores
non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly
signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error():

  invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000
  WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482
  invvpid_error+0x91/0xa0 [kvm_intel]
  Modules linked in: kvm_intel kvm 9pnet_virtio irqbypass fuse
  CPU: 6 UID: 0 PID: 326 Comm: kvm-vm Not tainted 6.15.0 #14 PREEMPT(voluntary)
  RIP: 0010:invvpid_error+0x91/0xa0 [kvm_intel]
  Call Trace:
    vmx_flush_tlb_gva+0x320/0x490 [kvm_intel]
    kvm_hv_vcpu_flush_tlb+0x24f/0x4f0 [kvm]
    kvm_arch_vcpu_ioctl_run+0x3013/0x5810 [kvm]

Hyper-V documents that invalid GVAs (those that are beyond a partition's
GVA space) are to be ignored.  While not completely clear whether this
ruling also applies to non-canonical GVAs, it is likely fine to make that
assumption, and manual testing on Azure confirms "real" Hyper-V interprets
the specification in the same way.

Skip non-canonical GVAs when processing the list of address to avoid
tripping the INVVPID failure.  Alternatively, KVM could filter out "bad"
GVAs before inserting into the FIFO, but practically speaking the only
downside of pushing validation to the final processing is that doing so
is suboptimal for the guest, and no well-behaved guest will request TLB
flushes for non-canonical addresses.</Note>
    </Notes>
    <CVE>CVE-2025-38351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add more checks for DSC / HUBP ONO guarantees

[WHY]
For non-zero DSC instances it's possible that the HUBP domain required
to drive it for sequential ONO ASICs isn't met, potentially causing
the logic to the tile to enter an undefined state leading to a system
hang.

[HOW]
Add more checks to ensure that the HUBP domain matching the DSC instance
is appropriately powered.

(cherry picked from commit da63df07112e5a9857a8d2aaa04255c4206754ec)</Note>
    </Notes>
    <CVE>CVE-2025-38360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

idpf: return 0 size for RSS key if not supported

Returning -EOPNOTSUPP from function returning u32 is leading to
cast and invalid size value as a result.

-EOPNOTSUPP as a size probably will lead to allocation fail.

Command: ethtool -x eth0
It is visible on all devices that don't have RSS caps set.

[  136.615917] Call Trace:
[  136.615921]  &lt;TASK&gt;
[  136.615927]  ? __warn+0x89/0x130
[  136.615942]  ? __alloc_frozen_pages_noprof+0x322/0x330
[  136.615953]  ? report_bug+0x164/0x190
[  136.615968]  ? handle_bug+0x58/0x90
[  136.615979]  ? exc_invalid_op+0x17/0x70
[  136.615987]  ? asm_exc_invalid_op+0x1a/0x20
[  136.616001]  ? rss_prepare_get.constprop.0+0xb9/0x170
[  136.616016]  ? __alloc_frozen_pages_noprof+0x322/0x330
[  136.616028]  __alloc_pages_noprof+0xe/0x20
[  136.616038]  ___kmalloc_large_node+0x80/0x110
[  136.616072]  __kmalloc_large_node_noprof+0x1d/0xa0
[  136.616081]  __kmalloc_noprof+0x32c/0x4c0
[  136.616098]  ? rss_prepare_get.constprop.0+0xb9/0x170
[  136.616105]  rss_prepare_get.constprop.0+0xb9/0x170
[  136.616114]  ethnl_default_doit+0x107/0x3d0
[  136.616131]  genl_family_rcv_msg_doit+0x100/0x160
[  136.616147]  genl_rcv_msg+0x1b8/0x2c0
[  136.616156]  ? __pfx_ethnl_default_doit+0x10/0x10
[  136.616168]  ? __pfx_genl_rcv_msg+0x10/0x10
[  136.616176]  netlink_rcv_skb+0x58/0x110
[  136.616186]  genl_rcv+0x28/0x40
[  136.616195]  netlink_unicast+0x19b/0x290
[  136.616206]  netlink_sendmsg+0x222/0x490
[  136.616215]  __sys_sendto+0x1fd/0x210
[  136.616233]  __x64_sys_sendto+0x24/0x30
[  136.616242]  do_syscall_64+0x82/0x160
[  136.616252]  ? __sys_recvmsg+0x83/0xe0
[  136.616265]  ? syscall_exit_to_user_mode+0x10/0x210
[  136.616275]  ? do_syscall_64+0x8e/0x160
[  136.616282]  ? __count_memcg_events+0xa1/0x130
[  136.616295]  ? count_memcg_events.constprop.0+0x1a/0x30
[  136.616306]  ? handle_mm_fault+0xae/0x2d0
[  136.616319]  ? do_user_addr_fault+0x379/0x670
[  136.616328]  ? clear_bhb_loop+0x45/0xa0
[  136.616340]  ? clear_bhb_loop+0x45/0xa0
[  136.616349]  ? clear_bhb_loop+0x45/0xa0
[  136.616359]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  136.616369] RIP: 0033:0x7fd30ba7b047
[  136.616376] Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d bd d5 0c 00 00 41 89 ca 74 10 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 71 c3 55 48 83 ec 30 44 89 4c 24 2c 4c 89 44
[  136.616381] RSP: 002b:00007ffde1796d68 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
[  136.616388] RAX: ffffffffffffffda RBX: 000055d7bd89f2a0 RCX: 00007fd30ba7b047
[  136.616392] RDX: 0000000000000028 RSI: 000055d7bd89f3b0 RDI: 0000000000000003
[  136.616396] RBP: 00007ffde1796e10 R08: 00007fd30bb4e200 R09: 000000000000000c
[  136.616399] R10: 0000000000000000 R11: 0000000000000202 R12: 000055d7bd89f340
[  136.616403] R13: 000055d7bd89f3b0 R14: 000055d78943f200 R15: 0000000000000000</Note>
    </Notes>
    <CVE>CVE-2025-38402</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

genirq/irq_sim: Initialize work context pointers properly

Initialize `ops` member's pointers properly by using kzalloc() instead of
kmalloc() when allocating the simulation work context. Otherwise the
pointers contain random content leading to invalid dereferencing.</Note>
    </Notes>
    <CVE>CVE-2025-38408</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

remoteproc: core: Release rproc-&gt;clean_table after rproc_attach() fails

When rproc-&gt;state = RPROC_DETACHED is attached to remote processor
through rproc_attach(), if rproc_handle_resources() returns failure,
then the clean table should be released, otherwise the following
memory leak will occur.

unreferenced object 0xffff000086a99800 (size 1024):
comm "kworker/u12:3", pid 59, jiffies 4294893670 (age 121.140s)
hex dump (first 32 bytes):
00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............
00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............
backtrace:
 [&lt;000000008bbe4ca8&gt;] slab_post_alloc_hook+0x98/0x3fc
 [&lt;000000003b8a272b&gt;] __kmem_cache_alloc_node+0x13c/0x230
 [&lt;000000007a507c51&gt;] __kmalloc_node_track_caller+0x5c/0x260
 [&lt;0000000037818dae&gt;] kmemdup+0x34/0x60
 [&lt;00000000610f7f57&gt;] rproc_boot+0x35c/0x56c
 [&lt;0000000065f8871a&gt;] rproc_add+0x124/0x17c
 [&lt;00000000497416ee&gt;] imx_rproc_probe+0x4ec/0x5d4
 [&lt;000000003bcaa37d&gt;] platform_probe+0x68/0xd8
 [&lt;00000000771577f9&gt;] really_probe+0x110/0x27c
 [&lt;00000000531fea59&gt;] __driver_probe_device+0x78/0x12c
 [&lt;0000000080036a04&gt;] driver_probe_device+0x3c/0x118
 [&lt;000000007e0bddcb&gt;] __device_attach_driver+0xb8/0xf8
 [&lt;000000000cf1fa33&gt;] bus_for_each_drv+0x84/0xe4
 [&lt;000000001a53b53e&gt;] __device_attach+0xfc/0x18c
 [&lt;00000000d1a2a32c&gt;] device_initial_probe+0x14/0x20
 [&lt;00000000d8f8b7ae&gt;] bus_probe_device+0xb0/0xb4
 unreferenced object 0xffff0000864c9690 (size 16):</Note>
    </Notes>
    <CVE>CVE-2025-38418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()

When rproc-&gt;state = RPROC_DETACHED and rproc_attach() is used
to attach to the remote processor, if rproc_handle_resources()
returns a failure, the resources allocated by imx_rproc_prepare()
should be released, otherwise the following memory leak will occur.

Since almost the same thing is done in imx_rproc_prepare() and
rproc_resource_cleanup(), Function rproc_resource_cleanup() is able
to deal with empty lists so it is better to fix the "goto" statements
in rproc_attach(). replace the "unprepare_device" goto statement with
"clean_up_resources" and get rid of the "unprepare_device" label.

unreferenced object 0xffff0000861c5d00 (size 128):
comm "kworker/u12:3", pid 59, jiffies 4294893509 (age 149.220s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............
backtrace:
 [&lt;00000000f949fe18&gt;] slab_post_alloc_hook+0x98/0x37c
 [&lt;00000000adbfb3e7&gt;] __kmem_cache_alloc_node+0x138/0x2e0
 [&lt;00000000521c0345&gt;] kmalloc_trace+0x40/0x158
 [&lt;000000004e330a49&gt;] rproc_mem_entry_init+0x60/0xf8
 [&lt;000000002815755e&gt;] imx_rproc_prepare+0xe0/0x180
 [&lt;0000000003f61b4e&gt;] rproc_boot+0x2ec/0x528
 [&lt;00000000e7e994ac&gt;] rproc_add+0x124/0x17c
 [&lt;0000000048594076&gt;] imx_rproc_probe+0x4ec/0x5d4
 [&lt;00000000efc298a1&gt;] platform_probe+0x68/0xd8
 [&lt;00000000110be6fe&gt;] really_probe+0x110/0x27c
 [&lt;00000000e245c0ae&gt;] __driver_probe_device+0x78/0x12c
 [&lt;00000000f61f6f5e&gt;] driver_probe_device+0x3c/0x118
 [&lt;00000000a7874938&gt;] __device_attach_driver+0xb8/0xf8
 [&lt;0000000065319e69&gt;] bus_for_each_drv+0x84/0xe4
 [&lt;00000000db3eb243&gt;] __device_attach+0xfc/0x18c
 [&lt;0000000072e4e1a4&gt;] device_initial_probe+0x14/0x20</Note>
    </Notes>
    <CVE>CVE-2025-38419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT

When transmitting an XDP_REDIRECT packet, call dma_unmap_len_set()
with the proper length instead of 0.  This bug triggers this warning
on a system with IOMMU enabled:

WARNING: CPU: 36 PID: 0 at drivers/iommu/dma-iommu.c:842 __iommu_dma_unmap+0x159/0x170
RIP: 0010:__iommu_dma_unmap+0x159/0x170
Code: a8 00 00 00 00 48 c7 45 b0 00 00 00 00 48 c7 45 c8 00 00 00 00 48 c7 45 a0 ff ff ff ff 4c 89 45
b8 4c 89 45 c0 e9 77 ff ff ff &lt;0f&gt; 0b e9 60 ff ff ff e8 8b bf 6a 00 66 66 2e 0f 1f 84 00 00 00 00
RSP: 0018:ff22d31181150c88 EFLAGS: 00010206
RAX: 0000000000002000 RBX: 00000000e13a0000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ff22d31181150cf0 R08: ff22d31181150ca8 R09: 0000000000000000
R10: 0000000000000000 R11: ff22d311d36c9d80 R12: 0000000000001000
R13: ff13544d10645010 R14: ff22d31181150c90 R15: ff13544d0b2bac00
FS: 0000000000000000(0000) GS:ff13550908a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005be909dacff8 CR3: 0008000173408003 CR4: 0000000000f71ef0
PKRU: 55555554
Call Trace:
&lt;IRQ&gt;
? show_regs+0x6d/0x80
? __warn+0x89/0x160
? __iommu_dma_unmap+0x159/0x170
? report_bug+0x17e/0x1b0
? handle_bug+0x46/0x90
? exc_invalid_op+0x18/0x80
? asm_exc_invalid_op+0x1b/0x20
? __iommu_dma_unmap+0x159/0x170
? __iommu_dma_unmap+0xb3/0x170
iommu_dma_unmap_page+0x4f/0x100
dma_unmap_page_attrs+0x52/0x220
? srso_alias_return_thunk+0x5/0xfbef5
? xdp_return_frame+0x2e/0xd0
bnxt_tx_int_xdp+0xdf/0x440 [bnxt_en]
__bnxt_poll_work_done+0x81/0x1e0 [bnxt_en]
bnxt_poll+0xd3/0x1e0 [bnxt_en]</Note>
    </Notes>
    <CVE>CVE-2025-38439</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix race between DIM disable and net_dim()

There's a race between disabling DIM and NAPI callbacks using the dim
pointer on the RQ or SQ.

If NAPI checks the DIM state bit and sees it still set, it assumes
`rq-&gt;dim` or `sq-&gt;dim` is valid. But if DIM gets disabled right after
that check, the pointer might already be set to NULL, leading to a NULL
pointer dereference in net_dim().

Fix this by calling `synchronize_net()` before freeing the DIM context.
This ensures all in-progress NAPI callbacks are finished before the
pointer is cleared.

Kernel log:

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
RIP: 0010:net_dim+0x23/0x190
...
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x150/0x3e0
 ? common_interrupt+0xf/0xa0
 ? sysvec_call_function_single+0xb/0x90
 ? exc_page_fault+0x74/0x130
 ? asm_exc_page_fault+0x22/0x30
 ? net_dim+0x23/0x190
 ? mlx5e_poll_ico_cq+0x41/0x6f0 [mlx5_core]
 ? sysvec_apic_timer_interrupt+0xb/0x90
 mlx5e_handle_rx_dim+0x92/0xd0 [mlx5_core]
 mlx5e_napi_poll+0x2cd/0xac0 [mlx5_core]
 ? mlx5e_poll_ico_cq+0xe5/0x6f0 [mlx5_core]
 busy_poll_stop+0xa2/0x200
 ? mlx5e_napi_poll+0x1d9/0xac0 [mlx5_core]
 ? mlx5e_trigger_irq+0x130/0x130 [mlx5_core]
 __napi_busy_loop+0x345/0x3b0
 ? sysvec_call_function_single+0xb/0x90
 ? asm_sysvec_call_function_single+0x16/0x20
 ? sysvec_apic_timer_interrupt+0xb/0x90
 ? pcpu_free_area+0x1e4/0x2e0
 napi_busy_loop+0x11/0x20
 xsk_recvmsg+0x10c/0x130
 sock_recvmsg+0x44/0x70
 __sys_recvfrom+0xbc/0x130
 ? __schedule+0x398/0x890
 __x64_sys_recvfrom+0x20/0x30
 do_syscall_64+0x4c/0x100
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
...
---[ end trace 0000000000000000 ]---
...
---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---</Note>
    </Notes>
    <CVE>CVE-2025-38440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()

syzbot found a potential access to uninit-value in nf_flow_pppoe_proto()

Blamed commit forgot the Ethernet header.

BUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27
  nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27
  nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
  nf_hook_slow+0xe1/0x3d0 net/netfilter/core.c:623
  nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]
  nf_ingress net/core/dev.c:5742 [inline]
  __netif_receive_skb_core+0x4aff/0x70c0 net/core/dev.c:5837
  __netif_receive_skb_one_core net/core/dev.c:5975 [inline]
  __netif_receive_skb+0xcc/0xac0 net/core/dev.c:6090
  netif_receive_skb_internal net/core/dev.c:6176 [inline]
  netif_receive_skb+0x57/0x630 net/core/dev.c:6235
  tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485
  tun_get_user+0x4ee0/0x6b40 drivers/net/tun.c:1938
  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1984
  new_sync_write fs/read_write.c:593 [inline]
  vfs_write+0xb4b/0x1580 fs/read_write.c:686
  ksys_write fs/read_write.c:738 [inline]
  __do_sys_write fs/read_write.c:749 [inline]</Note>
    </Notes>
    <CVE>CVE-2025-38441</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

raid10: cleanup memleak at raid10_make_request

If raid10_read_request or raid10_write_request registers a new
request and the REQ_NOWAIT flag is set, the code does not
free the malloc from the mempool.

unreferenced object 0xffff8884802c3200 (size 192):
   comm "fio", pid 9197, jiffies 4298078271
   hex dump (first 32 bytes):
     00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00  .........A......
     08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
   backtrace (crc c1a049a2):
     __kmalloc+0x2bb/0x450
     mempool_alloc+0x11b/0x320
     raid10_make_request+0x19e/0x650 [raid10]
     md_handle_request+0x3b3/0x9e0
     __submit_bio+0x394/0x560
     __submit_bio_noacct+0x145/0x530
     submit_bio_noacct_nocheck+0x682/0x830
     __blkdev_direct_IO_async+0x4dc/0x6b0
     blkdev_read_iter+0x1e5/0x3b0
     __io_read+0x230/0x1110
     io_read+0x13/0x30
     io_issue_sqe+0x134/0x1180
     io_submit_sqes+0x48c/0xe90
     __do_sys_io_uring_enter+0x574/0x8b0
     do_syscall_64+0x5c/0xe0
     entry_SYSCALL_64_after_hwframe+0x76/0x7e

V4: changing backing tree to see if CKI tests will pass.
The patch code has not changed between any versions.</Note>
    </Notes>
    <CVE>CVE-2025-38444</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix stack memory use after return in raid1_reshape

In the raid1_reshape function, newpool is
allocated on the stack and assigned to conf-&gt;r1bio_pool.
This results in conf-&gt;r1bio_pool.wait.head pointing
to a stack address.
Accessing this address later can lead to a kernel panic.

Example access path:

raid1_reshape()
{
	// newpool is on the stack
	mempool_t newpool, oldpool;
	// initialize newpool.wait.head to stack address
	mempool_init(&amp;newpool, ...);
	conf-&gt;r1bio_pool = newpool;
}

raid1_read_request() or raid1_write_request()
{
	alloc_r1bio()
	{
		mempool_alloc()
		{
			// if pool-&gt;alloc fails
			remove_element()
			{
				--pool-&gt;curr_nr;
			}
		}
	}
}

mempool_free()
{
	if (pool-&gt;curr_nr &lt; pool-&gt;min_nr) {
		// pool-&gt;wait.head is a stack address
		// wake_up() will try to access this invalid address
		// which leads to a kernel panic
		return;
		wake_up(&amp;pool-&gt;wait);
	}
}

Fix:
reinit conf-&gt;r1bio_pool.wait after assigning newpool.</Note>
    </Notes>
    <CVE>CVE-2025-38445</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()

The "intf" list iterator is an invalid pointer if the correct
"intf-&gt;intf_num" is not found.  Calling atomic_dec(&amp;intf-&gt;nr_users) on
and invalid pointer will lead to memory corruption.

We don't really need to call atomic_dec() if we haven't called
atomic_add_return() so update the if (intf-&gt;in_shutdown) path as well.</Note>
    </Notes>
    <CVE>CVE-2025-38456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix NULL pointer dereference in vcc_sendmsg()

atmarpd_dev_ops does not implement the send method, which may cause crash
as bellow.

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: Oops: 0010 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5324 Comm: syz.0.0 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc9000d3cf778 EFLAGS: 00010246
RAX: 1ffffffff1910dd1 RBX: 00000000000000c0 RCX: dffffc0000000000
RDX: ffffc9000dc82000 RSI: ffff88803e4c4640 RDI: ffff888052cd0000
RBP: ffffc9000d3cf8d0 R08: ffff888052c9143f R09: 1ffff1100a592287
R10: dffffc0000000000 R11: 0000000000000000 R12: 1ffff92001a79f00
R13: ffff888052cd0000 R14: ffff88803e4c4640 R15: ffffffff8c886e88
FS:  00007fbc762566c0(0000) GS:ffff88808d6c2000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 0000000041f1b000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 vcc_sendmsg+0xa10/0xc50 net/atm/common.c:644
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 ____sys_sendmsg+0x52d/0x830 net/socket.c:2566
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2620
 __sys_sendmmsg+0x227/0x430 net/socket.c:2709
 __do_sys_sendmmsg net/socket.c:2736 [inline]
 __se_sys_sendmmsg net/socket.c:2733 [inline]
 __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2733
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f</Note>
    </Notes>
    <CVE>CVE-2025-38458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix infinite recursive call of clip_push().

syzbot reported the splat below. [0]

This happens if we call ioctl(ATMARP_MKIP) more than once.

During the first call, clip_mkip() sets clip_push() to vcc-&gt;push(),
and the second call copies it to clip_vcc-&gt;old_push().

Later, when the socket is close()d, vcc_destroy_socket() passes
NULL skb to clip_push(), which calls clip_vcc-&gt;old_push(),
triggering the infinite recursion.

Let's prevent the second ioctl(ATMARP_MKIP) by checking
vcc-&gt;user_back, which is allocated by the first call as clip_vcc.

Note also that we use lock_sock() to prevent racy calls.

[0]:
BUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)
Oops: stack guard page: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191
Code: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 &lt;41&gt; 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00
RSP: 0018:ffffc9000d670000 EFLAGS: 00010246
RAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000
RBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e
R10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300
R13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578
FS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
...
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 vcc_destroy_socket net/atm/common.c:183 [inline]
 vcc_release+0x157/0x460 net/atm/common.c:205
 __sock_release net/socket.c:647 [inline]
 sock_close+0xc0/0x240 net/socket.c:1391
 __fput+0x449/0xa70 fs/file_table.c:465
 task_work_run+0x1d1/0x260 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114
 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]
 do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff31c98e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f
R10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c
R13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090
 &lt;/TASK&gt;
Modules linked in:</Note>
    </Notes>
    <CVE>CVE-2025-38459</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_conn_close().

syzbot reported a null-ptr-deref in tipc_conn_close() during netns
dismantle. [0]

tipc_topsrv_stop() iterates tipc_net(net)-&gt;topsrv-&gt;conn_idr and calls
tipc_conn_close() for each tipc_conn.

The problem is that tipc_conn_close() is called after releasing the
IDR lock.

At the same time, there might be tipc_conn_recv_work() running and it
could call tipc_conn_close() for the same tipc_conn and release its
last -&gt;kref.

Once we release the IDR lock in tipc_topsrv_stop(), there is no
guarantee that the tipc_conn is alive.

Let's hold the ref before releasing the lock and put the ref after
tipc_conn_close() in tipc_topsrv_stop().

[0]:
BUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
Read of size 8 at addr ffff888099305a08 by task kworker/u4:3/435

CPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256
 kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354
 kasan_report mm/kasan/report.c:412 [inline]
 __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433
 tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
 tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]
 tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722
 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153
 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Allocated by task 23:
 kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625
 kmalloc include/linux/slab.h:515 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192
 tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Freed by task 23:
 __cache_free mm/slab.c:3503 [inline]
 kfree+0xcc/0x210 mm/slab.c:3822
 tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]
 kref_put include/linux/kref.h:70 [inline]
 conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

The buggy address belongs to the object at ffff888099305a00
 which belongs to the cache kmalloc-512 of size 512
The buggy address is located 8 bytes inside of
 512-byte region [ffff888099305a00, ffff888099305c00)
The buggy address belongs to the page:
page:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940
raw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                      ^
 ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb</Note>
    </Notes>
    <CVE>CVE-2025-38464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf: Revert to requiring CAP_SYS_ADMIN for uprobes

Jann reports that uprobes can be used destructively when used in the
middle of an instruction. The kernel only verifies there is a valid
instruction at the requested offset, but due to variable instruction
length cannot determine if this is an instruction as seen by the
intended execution stream.

Additionally, Mark Rutland notes that on architectures that mix data
in the text segment (like arm64), a similar things can be done if the
data word is 'mistaken' for an instruction.

As such, require CAP_SYS_ADMIN for uprobes.</Note>
    </Notes>
    <CVE>CVE-2025-38466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack: fix crash due to removal of uninitialised entry

A crash in conntrack was reported while trying to unlink the conntrack
entry from the hash bucket list:
    [exception RIP: __nf_ct_delete_from_lists+172]
    [..]
 #7 [ff539b5a2b043aa0] nf_ct_delete at ffffffffc124d421 [nf_conntrack]
 #8 [ff539b5a2b043ad0] nf_ct_gc_expired at ffffffffc124d999 [nf_conntrack]
 #9 [ff539b5a2b043ae0] __nf_conntrack_find_get at ffffffffc124efbc [nf_conntrack]
    [..]

The nf_conn struct is marked as allocated from slab but appears to be in
a partially initialised state:

 ct hlist pointer is garbage; looks like the ct hash value
 (hence crash).
 ct-&gt;status is equal to IPS_CONFIRMED|IPS_DYING, which is expected
 ct-&gt;timeout is 30000 (=30s), which is unexpected.

Everything else looks like normal udp conntrack entry.  If we ignore
ct-&gt;status and pretend its 0, the entry matches those that are newly
allocated but not yet inserted into the hash:
  - ct hlist pointers are overloaded and store/cache the raw tuple hash
  - ct-&gt;timeout matches the relative time expected for a new udp flow
    rather than the absolute 'jiffies' value.

If it were not for the presence of IPS_CONFIRMED,
__nf_conntrack_find_get() would have skipped the entry.

Theory is that we did hit following race:

cpu x 			cpu y			cpu z
 found entry E		found entry E
 E is expired		&lt;preemption&gt;
 nf_ct_delete()
 return E to rcu slab
					init_conntrack
					E is re-inited,
					ct-&gt;status set to 0
					reply tuplehash hnnode.pprev
					stores hash value.

cpu y found E right before it was deleted on cpu x.
E is now re-inited on cpu z.  cpu y was preempted before
checking for expiry and/or confirm bit.

					-&gt;refcnt set to 1
					E now owned by skb
					-&gt;timeout set to 30000

If cpu y were to resume now, it would observe E as
expired but would skip E due to missing CONFIRMED bit.

					nf_conntrack_confirm gets called
					sets: ct-&gt;status |= CONFIRMED
					This is wrong: E is not yet added
					to hashtable.

cpu y resumes, it observes E as expired but CONFIRMED:
			&lt;resumes&gt;
			nf_ct_expired()
			 -&gt; yes (ct-&gt;timeout is 30s)
			confirmed bit set.

cpu y will try to delete E from the hashtable:
			nf_ct_delete() -&gt; set DYING bit
			__nf_ct_delete_from_lists

Even this scenario doesn't guarantee a crash:
cpu z still holds the table bucket lock(s) so y blocks:

			wait for spinlock held by z

					CONFIRMED is set but there is no
					guarantee ct will be added to hash:
					"chaintoolong" or "clash resolution"
					logic both skip the insert step.
					reply hnnode.pprev still stores the
					hash value.

					unlocks spinlock
					return NF_DROP
			&lt;unblocks, then
			 crashes on hlist_nulls_del_rcu pprev&gt;

In case CPU z does insert the entry into the hashtable, cpu y will unlink
E again right away but no crash occurs.

Without 'cpu y' race, 'garbage' hlist is of no consequence:
ct refcnt remains at 1, eventually skb will be free'd and E gets
destroyed via: nf_conntrack_put -&gt; nf_conntrack_destroy -&gt; nf_ct_destroy.

To resolve this, move the IPS_CONFIRMED assignment after the table
insertion but before the unlock.

Pablo points out that the confirm-bit-store could be reordered to happen
before hlist add resp. the timeout fixup, so switch to set_bit and
before_atomic memory barrier to prevent this.

It doesn't matter if other CPUs can observe a newly inserted entry right
before the CONFIRMED bit was set:

Such event cannot be distinguished from above "E is the old incarnation"
case: the entry will be skipped.

Also change nf_ct_should_gc() to first check the confirmed bit.

The gc sequence is:
 1. Check if entry has expired, if not skip to next entry
 2. Obtain a reference to the expired entry.
 3. Call nf_ct_should_gc() to double-check step 1.

nf_ct_should_gc() is thus called only for entries that already failed an
expiry check. After this patch, once the confirmed bit check pas
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38472</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in crypt_message when using async crypto

The CVE-2024-50047 fix removed asynchronous crypto handling from
crypt_message(), assuming all crypto operations are synchronous.
However, when hardware crypto accelerators are used, this can cause
use-after-free crashes:

  crypt_message()
    // Allocate the creq buffer containing the req
    creq = smb2_get_aead_req(..., &amp;req);

    // Async encryption returns -EINPROGRESS immediately
    rc = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req);

    // Free creq while async operation is still in progress
    kvfree_sensitive(creq, ...);

Hardware crypto modules often implement async AEAD operations for
performance. When crypto_aead_encrypt/decrypt() returns -EINPROGRESS,
the operation completes asynchronously. Without crypto_wait_req(),
the function immediately frees the request buffer, leading to crashes
when the driver later accesses the freed memory.

This results in a use-after-free condition when the hardware crypto
driver later accesses the freed request structure, leading to kernel
crashes with NULL pointer dereferences.

The issue occurs because crypto_alloc_aead() with mask=0 doesn't
guarantee synchronous operation. Even without CRYPTO_ALG_ASYNC in
the mask, async implementations can be selected.

Fix by restoring the async crypto handling:
- DECLARE_CRYPTO_WAIT(wait) for completion tracking
- aead_request_set_callback() for async completion notification
- crypto_wait_req() to wait for operation completion

This ensures the request buffer isn't freed until the crypto operation
completes, whether synchronous or asynchronous, while preserving the
CVE-2024-50047 fix.</Note>
    </Notes>
    <CVE>CVE-2025-38488</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: libwx: remove duplicate page_pool_put_full_page()

page_pool_put_full_page() should only be invoked when freeing Rx buffers
or building a skb if the size is too short. At other times, the pages
need to be reused. So remove the redundant page put. In the original
code, double free pages cause kernel panic:

[  876.949834]  __irq_exit_rcu+0xc7/0x130
[  876.949836]  common_interrupt+0xb8/0xd0
[  876.949838]  &lt;/IRQ&gt;
[  876.949838]  &lt;TASK&gt;
[  876.949840]  asm_common_interrupt+0x22/0x40
[  876.949841] RIP: 0010:cpuidle_enter_state+0xc2/0x420
[  876.949843] Code: 00 00 e8 d1 1d 5e ff e8 ac f0 ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 cd fc 5c ff 45 84 ff 0f 85 40 02 00 00 fb 0f 1f 44 00 00 &lt;45&gt; 85 f6 0f 88 84 01 00 00 49 63 d6 48 8d 04 52 48 8d 04 82 49 8d
[  876.949844] RSP: 0018:ffffaa7340267e78 EFLAGS: 00000246
[  876.949845] RAX: ffff9e3f135be000 RBX: 0000000000000002 RCX: 0000000000000000
[  876.949846] RDX: 000000cc2dc4cb7c RSI: ffffffff89ee49ae RDI: ffffffff89ef9f9e
[  876.949847] RBP: ffff9e378f940800 R08: 0000000000000002 R09: 00000000000000ed
[  876.949848] R10: 000000000000afc8 R11: ffff9e3e9e5a9b6c R12: ffffffff8a6d8580
[  876.949849] R13: 000000cc2dc4cb7c R14: 0000000000000002 R15: 0000000000000000
[  876.949852]  ? cpuidle_enter_state+0xb3/0x420
[  876.949855]  cpuidle_enter+0x29/0x40
[  876.949857]  cpuidle_idle_call+0xfd/0x170
[  876.949859]  do_idle+0x7a/0xc0
[  876.949861]  cpu_startup_entry+0x25/0x30
[  876.949862]  start_secondary+0x117/0x140
[  876.949864]  common_startup_64+0x13e/0x148
[  876.949867]  &lt;/TASK&gt;
[  876.949868] ---[ end trace 0000000000000000 ]---
[  876.949869] ------------[ cut here ]------------
[  876.949870] list_del corruption, ffffead40445a348-&gt;next is NULL
[  876.949873] WARNING: CPU: 14 PID: 0 at lib/list_debug.c:52 __list_del_entry_valid_or_report+0x67/0x120
[  876.949875] Modules linked in: snd_hrtimer(E) bnep(E) binfmt_misc(E) amdgpu(E) squashfs(E) vfat(E) loop(E) fat(E) amd_atl(E) snd_hda_codec_realtek(E) intel_rapl_msr(E) snd_hda_codec_generic(E) intel_rapl_common(E) snd_hda_scodec_component(E) snd_hda_codec_hdmi(E) snd_hda_intel(E) edac_mce_amd(E) snd_intel_dspcfg(E) snd_hda_codec(E) snd_hda_core(E) amdxcp(E) kvm_amd(E) snd_hwdep(E) gpu_sched(E) drm_panel_backlight_quirks(E) cec(E) snd_pcm(E) drm_buddy(E) snd_seq_dummy(E) drm_ttm_helper(E) btusb(E) kvm(E) snd_seq_oss(E) btrtl(E) ttm(E) btintel(E) snd_seq_midi(E) btbcm(E) drm_exec(E) snd_seq_midi_event(E) i2c_algo_bit(E) snd_rawmidi(E) bluetooth(E) drm_suballoc_helper(E) irqbypass(E) snd_seq(E) ghash_clmulni_intel(E) sha512_ssse3(E) drm_display_helper(E) aesni_intel(E) snd_seq_device(E) rfkill(E) snd_timer(E) gf128mul(E) drm_client_lib(E) drm_kms_helper(E) snd(E) i2c_piix4(E) joydev(E) soundcore(E) wmi_bmof(E) ccp(E) k10temp(E) i2c_smbus(E) gpio_amdpt(E) i2c_designware_platform(E) gpio_generic(E) sg(E)
[  876.949914]  i2c_designware_core(E) sch_fq_codel(E) parport_pc(E) drm(E) ppdev(E) lp(E) parport(E) fuse(E) nfnetlink(E) ip_tables(E) ext4 crc16 mbcache jbd2 sd_mod sfp mdio_i2c i2c_core txgbe ahci ngbe pcs_xpcs libahci libwx r8169 phylink libata realtek ptp pps_core video wmi
[  876.949933] CPU: 14 UID: 0 PID: 0 Comm: swapper/14 Kdump: loaded Tainted: G        W   E       6.16.0-rc2+ #20 PREEMPT(voluntary)
[  876.949935] Tainted: [W]=WARN, [E]=UNSIGNED_MODULE
[  876.949936] Hardware name: Micro-Star International Co., Ltd. MS-7E16/X670E GAMING PLUS WIFI (MS-7E16), BIOS 1.90 12/31/2024
[  876.949936] RIP: 0010:__list_del_entry_valid_or_report+0x67/0x120
[  876.949938] Code: 00 00 00 48 39 7d 08 0f 85 a6 00 00 00 5b b8 01 00 00 00 5d 41 5c e9 73 0d 93 ff 48 89 fe 48 c7 c7 a0 31 e8 89 e8 59 7c b3 ff &lt;0f&gt; 0b 31 c0 5b 5d 41 5c e9 57 0d 93 ff 48 89 fe 48 c7 c7 c8 31 e8
[  876.949940] RSP: 0018:ffffaa73405d0c60 EFLAGS: 00010282
[  876.949941] RAX: 0000000000000000 RBX: ffffead40445a348 RCX: 0000000000000000
[  876.949942] RDX: 0000000000000105 RSI: 00000
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mptcp: make fallback action and fallback decision atomic

Syzkaller reported the following splat:

  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 __mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 check_fully_established net/mptcp/options.c:982 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153
  Modules linked in:
  CPU: 1 UID: 0 PID: 7704 Comm: syz.3.1419 Not tainted 6.16.0-rc3-gbd5ce2324dba #20 PREEMPT(voluntary)
  Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
  RIP: 0010:__mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]
  RIP: 0010:mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]
  RIP: 0010:check_fully_established net/mptcp/options.c:982 [inline]
  RIP: 0010:mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153
  Code: 24 18 e8 bb 2a 00 fd e9 1b df ff ff e8 b1 21 0f 00 e8 ec 5f c4 fc 44 0f b7 ac 24 b0 00 00 00 e9 54 f1 ff ff e8 d9 5f c4 fc 90 &lt;0f&gt; 0b 90 e9 b8 f4 ff ff e8 8b 2a 00 fd e9 8d e6 ff ff e8 81 2a 00
  RSP: 0018:ffff8880a3f08448 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff8880180a8000 RCX: ffffffff84afcf45
  RDX: ffff888090223700 RSI: ffffffff84afdaa7 RDI: 0000000000000001
  RBP: ffff888017955780 R08: 0000000000000001 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
  R13: ffff8880180a8910 R14: ffff8880a3e9d058 R15: 0000000000000000
  FS:  00005555791b8500(0000) GS:ffff88811c495000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000110c2800b7 CR3: 0000000058e44000 CR4: 0000000000350ef0
  Call Trace:
   &lt;IRQ&gt;
   tcp_reset+0x26f/0x2b0 net/ipv4/tcp_input.c:4432
   tcp_validate_incoming+0x1057/0x1b60 net/ipv4/tcp_input.c:5975
   tcp_rcv_established+0x5b5/0x21f0 net/ipv4/tcp_input.c:6166
   tcp_v4_do_rcv+0x5dc/0xa70 net/ipv4/tcp_ipv4.c:1925
   tcp_v4_rcv+0x3473/0x44a0 net/ipv4/tcp_ipv4.c:2363
   ip_protocol_deliver_rcu+0xba/0x480 net/ipv4/ip_input.c:205
   ip_local_deliver_finish+0x2f1/0x500 net/ipv4/ip_input.c:233
   NF_HOOK include/linux/netfilter.h:317 [inline]
   NF_HOOK include/linux/netfilter.h:311 [inline]
   ip_local_deliver+0x1be/0x560 net/ipv4/ip_input.c:254
   dst_input include/net/dst.h:469 [inline]
   ip_rcv_finish net/ipv4/ip_input.c:447 [inline]
   NF_HOOK include/linux/netfilter.h:317 [inline]
   NF_HOOK include/linux/netfilter.h:311 [inline]
   ip_rcv+0x514/0x810 net/ipv4/ip_input.c:567
   __netif_receive_skb_one_core+0x197/0x1e0 net/core/dev.c:5975
   __netif_receive_skb+0x1f/0x120 net/core/dev.c:6088
   process_backlog+0x301/0x1360 net/core/dev.c:6440
   __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7453
   napi_poll net/core/dev.c:7517 [inline]
   net_rx_action+0xb44/0x1010 net/core/dev.c:7644
   handle_softirqs+0x1d0/0x770 kernel/softirq.c:579
   do_softirq+0x3f/0x90 kernel/softirq.c:480
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   __local_bh_enable_ip+0xed/0x110 kernel/softirq.c:407
   local_bh_enable include/linux/bottom_half.h:33 [inline]
   inet_csk_listen_stop+0x2c5/0x1070 net/ipv4/inet_connection_sock.c:1524
   mptcp_check_listen_stop.part.0+0x1cc/0x220 net/mptcp/protocol.c:2985
   mptcp_check_listen_stop net/mptcp/mib.h:118 [inline]
   __mptcp_close+0x9b9/0xbd0 net/mptcp/protocol.c:3000
   mptcp_close+0x2f/0x140 net/mptcp/protocol.c:3066
   inet_release+0xed/0x200 net/ipv4/af_inet.c:435
   inet6_release+0x4f/0x70 net/ipv6/af_inet6.c:487
   __sock_release+0xb3/0x270 net/socket.c:649
   sock_close+0x1c/0x30 net/socket.c:1439
   __fput+0x402/0xb70 fs/file_table.c:465
   task_work_run+0x150/0x240 kernel/task_work.c:227
   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
   exit_to_user_mode_loop+0xd4
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-38491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo.  "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.</Note>
    </Notes>
    <CVE>CVE-2025-38499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfrm: interface: fix use-after-free after changing collect_md xfrm interface

collect_md property on xfrm interfaces can only be set on device creation,
thus xfrmi_changelink() should fail when called on such interfaces.

The check to enforce this was done only in the case where the xi was
returned from xfrmi_locate() which doesn't look for the collect_md
interface, and thus the validation was never reached.

Calling changelink would thus errornously place the special interface xi
in the xfrmi_net-&gt;xfrmi hash, but since it also exists in the
xfrmi_net-&gt;collect_md_xfrmi pointer it would lead to a double free when
the net namespace was taken down [1].

Change the check to use the xi from netdev_priv which is available earlier
in the function to prevent changes in xfrm collect_md interfaces.

[1] resulting oops:
[    8.516540] kernel BUG at net/core/dev.c:12029!
[    8.516552] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[    8.516559] CPU: 0 UID: 0 PID: 12 Comm: kworker/u80:0 Not tainted 6.15.0-virtme #5 PREEMPT(voluntary)
[    8.516565] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[    8.516569] Workqueue: netns cleanup_net
[    8.516579] RIP: 0010:unregister_netdevice_many_notify+0x101/0xab0
[    8.516590] Code: 90 0f 0b 90 48 8b b0 78 01 00 00 48 8b 90 80 01 00 00 48 89 56 08 48 89 32 4c 89 80 78 01 00 00 48 89 b8 80 01 00 00 eb ac 90 &lt;0f&gt; 0b 48 8b 45 00 4c 8d a0 88 fe ff ff 48 39 c5 74 5c 41 80 bc 24
[    8.516593] RSP: 0018:ffffa93b8006bd30 EFLAGS: 00010206
[    8.516598] RAX: ffff98fe4226e000 RBX: ffffa93b8006bd58 RCX: ffffa93b8006bc60
[    8.516601] RDX: 0000000000000004 RSI: 0000000000000000 RDI: dead000000000122
[    8.516603] RBP: ffffa93b8006bdd8 R08: dead000000000100 R09: ffff98fe4133c100
[    8.516605] R10: 0000000000000000 R11: 00000000000003d2 R12: ffffa93b8006be00
[    8.516608] R13: ffffffff96c1a510 R14: ffffffff96c1a510 R15: ffffa93b8006be00
[    8.516615] FS:  0000000000000000(0000) GS:ffff98fee73b7000(0000) knlGS:0000000000000000
[    8.516619] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.516622] CR2: 00007fcd2abd0700 CR3: 000000003aa40000 CR4: 0000000000752ef0
[    8.516625] PKRU: 55555554
[    8.516627] Call Trace:
[    8.516632]  &lt;TASK&gt;
[    8.516635]  ? rtnl_is_locked+0x15/0x20
[    8.516641]  ? unregister_netdevice_queue+0x29/0xf0
[    8.516650]  ops_undo_list+0x1f2/0x220
[    8.516659]  cleanup_net+0x1ad/0x2e0
[    8.516664]  process_one_work+0x160/0x380
[    8.516673]  worker_thread+0x2aa/0x3c0
[    8.516679]  ? __pfx_worker_thread+0x10/0x10
[    8.516686]  kthread+0xfb/0x200
[    8.516690]  ? __pfx_kthread+0x10/0x10
[    8.516693]  ? __pfx_kthread+0x10/0x10
[    8.516697]  ret_from_fork+0x82/0xf0
[    8.516705]  ? __pfx_kthread+0x10/0x10
[    8.516709]  ret_from_fork_asm+0x1a/0x30
[    8.516718]  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2025-38500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix assertion when building free space tree

When building the free space tree with the block group tree feature
enabled, we can hit an assertion failure like this:

  BTRFS info (device loop0 state M): rebuilding free space tree
  assertion failed: ret == 0, in fs/btrfs/free-space-tree.c:1102
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/free-space-tree.c:1102!
  Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
  Modules linked in:
  CPU: 1 UID: 0 PID: 6592 Comm: syz-executor322 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102
  lr : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102
  sp : ffff8000a4ce7600
  x29: ffff8000a4ce76e0 x28: ffff0000c9bc6000 x27: ffff0000ddfff3d8
  x26: ffff0000ddfff378 x25: dfff800000000000 x24: 0000000000000001
  x23: ffff8000a4ce7660 x22: ffff70001499cecc x21: ffff0000e1d8c160
  x20: ffff0000e1cb7800 x19: ffff0000e1d8c0b0 x18: 00000000ffffffff
  x17: ffff800092f39000 x16: ffff80008ad27e48 x15: ffff700011e740c0
  x14: 1ffff00011e740c0 x13: 0000000000000004 x12: ffffffffffffffff
  x11: ffff700011e740c0 x10: 0000000000ff0100 x9 : 94ef24f55d2dbc00
  x8 : 94ef24f55d2dbc00 x7 : 0000000000000001 x6 : 0000000000000001
  x5 : ffff8000a4ce6f98 x4 : ffff80008f415ba0 x3 : ffff800080548ef0
  x2 : 0000000000000000 x1 : 0000000100000000 x0 : 000000000000003e
  Call trace:
   populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102 (P)
   btrfs_rebuild_free_space_tree+0x14c/0x54c fs/btrfs/free-space-tree.c:1337
   btrfs_start_pre_rw_mount+0xa78/0xe10 fs/btrfs/disk-io.c:3074
   btrfs_remount_rw fs/btrfs/super.c:1319 [inline]
   btrfs_reconfigure+0x828/0x2418 fs/btrfs/super.c:1543
   reconfigure_super+0x1d4/0x6f0 fs/super.c:1083
   do_remount fs/namespace.c:3365 [inline]
   path_mount+0xb34/0xde0 fs/namespace.c:4200
   do_mount fs/namespace.c:4221 [inline]
   __do_sys_mount fs/namespace.c:4432 [inline]
   __se_sys_mount fs/namespace.c:4409 [inline]
   __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4409
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
   el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
   el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
   el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
   el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600
  Code: f0047182 91178042 528089c3 9771d47b (d4210000)
  ---[ end trace 0000000000000000 ]---

This happens because we are processing an empty block group, which has
no extents allocated from it, there are no items for this block group,
including the block group item since block group items are stored in a
dedicated tree when using the block group tree feature. It also means
this is the block group with the highest start offset, so there are no
higher keys in the extent root, hence btrfs_search_slot_for_read()
returns 1 (no higher key found).

Fix this by asserting 'ret' is 0 only if the block group tree feature
is not enabled, in which case we should find a block group item for
the block group since it's stored in the extent root and block group
item keys are greater than extent item keys (the value for
BTRFS_BLOCK_GROUP_ITEM_KEY is 192 and for BTRFS_EXTENT_ITEM_KEY and
BTRFS_METADATA_ITEM_KEY the values are 168 and 169 respectively).
In case 'ret' is 1, we just need to add a record to the free space
tree which spans the whole block group, and we can achieve this by
making 'ret == 0' as the while loop's condition.</Note>
    </Notes>
    <CVE>CVE-2025-38503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: Allow CPU to reschedule while setting per-page memory attributes

When running an SEV-SNP guest with a sufficiently large amount of memory (1TB+),
the host can experience CPU soft lockups when running an operation in
kvm_vm_set_mem_attributes() to set memory attributes on the whole
range of guest memory.

watchdog: BUG: soft lockup - CPU#8 stuck for 26s! [qemu-kvm:6372]
CPU: 8 UID: 0 PID: 6372 Comm: qemu-kvm Kdump: loaded Not tainted 6.15.0-rc7.20250520.el9uek.rc1.x86_64 #1 PREEMPT(voluntary)
Hardware name: Oracle Corporation ORACLE SERVER E4-2c/Asm,MB Tray,2U,E4-2c, BIOS 78016600 11/13/2024
RIP: 0010:xas_create+0x78/0x1f0
Code: 00 00 00 41 80 fc 01 0f 84 82 00 00 00 ba 06 00 00 00 bd 06 00 00 00 49 8b 45 08 4d 8d 65 08 41 39 d6 73 20 83 ed 06 48 85 c0 &lt;74&gt; 67 48 89 c2 83 e2 03 48 83 fa 02 75 0c 48 3d 00 10 00 00 0f 87
RSP: 0018:ffffad890a34b940 EFLAGS: 00000286
RAX: ffff96f30b261daa RBX: ffffad890a34b9c8 RCX: 0000000000000000
RDX: 000000000000001e RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000018 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffad890a356868
R13: ffffad890a356860 R14: 0000000000000000 R15: ffffad890a356868
FS:  00007f5578a2a400(0000) GS:ffff97ed317e1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f015c70fb18 CR3: 00000001109fd006 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 xas_store+0x58/0x630
 __xa_store+0xa5/0x130
 xa_store+0x2c/0x50
 kvm_vm_set_mem_attributes+0x343/0x710 [kvm]
 kvm_vm_ioctl+0x796/0xab0 [kvm]
 __x64_sys_ioctl+0xa3/0xd0
 do_syscall_64+0x8c/0x7a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f5578d031bb
Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 2d 4c 0f 00 f7 d8 64 89 01 48
RSP: 002b:00007ffe0a742b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000000004020aed2 RCX: 00007f5578d031bb
RDX: 00007ffe0a742c80 RSI: 000000004020aed2 RDI: 000000000000000b
RBP: 0000010000000000 R08: 0000010000000000 R09: 0000017680000000
R10: 0000000000000080 R11: 0000000000000246 R12: 00005575e5f95120
R13: 00007ffe0a742c80 R14: 0000000000000008 R15: 00005575e5f961e0

While looping through the range of memory setting the attributes,
call cond_resched() to give the scheduler a chance to run a higher
priority task on the runqueue if necessary and avoid staying in
kernel mode long enough to trigger the lockup.</Note>
    </Notes>
    <CVE>CVE-2025-38506</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

kasan: remove kasan_find_vm_area() to prevent possible deadlock

find_vm_area() couldn't be called in atomic_context.  If find_vm_area() is
called to reports vm area information, kasan can trigger deadlock like:

CPU0                                CPU1
vmalloc();
 alloc_vmap_area();
  spin_lock(&amp;vn-&gt;busy.lock)
                                    spin_lock_bh(&amp;some_lock);
   &lt;interrupt occurs&gt;
   &lt;in softirq&gt;
   spin_lock(&amp;some_lock);
                                    &lt;access invalid address&gt;
                                    kasan_report();
                                     print_report();
                                      print_address_description();
                                       kasan_find_vm_area();
                                        find_vm_area();
                                         spin_lock(&amp;vn-&gt;busy.lock) // deadlock!

To prevent possible deadlock while kasan reports, remove kasan_find_vm_area().</Note>
    </Notes>
    <CVE>CVE-2025-38510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/xe/pf: Clear all LMTT pages on alloc

Our LMEM buffer objects are not cleared by default on alloc
and during VF provisioning we only setup LMTT PTEs for the
actually provisioned LMEM range. But beyond that valid range
we might leave some stale data that could either point to some
other VFs allocations or even to the PF pages.

Explicitly clear all new LMTT page to avoid the risk that a
malicious VF would try to exploit that gap.

While around add asserts to catch any undesired PTE overwrites
and low-level debug traces to track LMTT PT life-cycle.

(cherry picked from commit 3fae6918a3e27cce20ded2551f863fb05d4bef8d)</Note>
    </Notes>
    <CVE>CVE-2025-38511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: prevent A-MSDU attacks in mesh networks

This patch is a mitigation to prevent the A-MSDU spoofing vulnerability
for mesh networks. The initial update to the IEEE 802.11 standard, in
response to the FragAttacks, missed this case (CVE-2025-27558). It can
be considered a variant of CVE-2020-24588 but for mesh networks.

This patch tries to detect if a standard MSDU was turned into an A-MSDU
by an adversary. This is done by parsing a received A-MSDU as a standard
MSDU, calculating the length of the Mesh Control header, and seeing if
the 6 bytes after this header equal the start of an rfc1042 header. If
equal, this is a strong indication of an ongoing attack attempt.

This defense was tested with mac80211_hwsim against a mesh network that
uses an empty Mesh Address Extension field, i.e., when four addresses
are used, and when using a 12-byte Mesh Address Extension field, i.e.,
when six addresses are used. Functionality of normal MSDUs and A-MSDUs
was also tested, and confirmed working, when using both an empty and
12-byte Mesh Address Extension field.

It was also tested with mac80211_hwsim that A-MSDU attacks in non-mesh
networks keep being detected and prevented.

Note that the vulnerability being patched, and the defense being
implemented, was also discussed in the following paper and in the
following IEEE 802.11 presentation:

https://papers.mathyvanhoef.com/wisec2025.pdf
https://mentor.ieee.org/802.11/dcn/25/11-25-0949-00-000m-a-msdu-mesh-spoof-protection.docx</Note>
    </Notes>
    <CVE>CVE-2025-38512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()

There is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For
example, the following is possible:

    	T0			    		T1
zd_mac_tx_to_dev()
  /* len == skb_queue_len(q) */
  while (len &gt; ZD_MAC_MAX_ACK_WAITERS) {

					  filter_ack()
					    spin_lock_irqsave(&amp;q-&gt;lock, flags);
					    /* position == skb_queue_len(q) */
					    for (i=1; i&lt;position; i++)
				    	      skb = __skb_dequeue(q)

					    if (mac-&gt;type == NL80211_IFTYPE_AP)
					      skb = __skb_dequeue(q);
					    spin_unlock_irqrestore(&amp;q-&gt;lock, flags);

    skb_dequeue() -&gt; NULL

Since there is a small gap between checking skb queue length and skb being
unconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL.
Then the pointer is passed to zd_mac_tx_status() where it is dereferenced.

In order to avoid potential NULL pointer dereference due to situations like
above, check if skb is not NULL before passing it to zd_mac_tx_status().

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2025-38513</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix oops due to non-existence of prealloc backlog struct

If an AF_RXRPC service socket is opened and bound, but calls are
preallocated, then rxrpc_alloc_incoming_call() will oops because the
rxrpc_backlog struct doesn't get allocated until the first preallocation is
made.

Fix this by returning NULL from rxrpc_alloc_incoming_call() if there is no
backlog struct.  This will cause the incoming call to be aborted.</Note>
    </Notes>
    <CVE>CVE-2025-38514</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Increment job count before swapping tail spsc queue

A small race exists between spsc_queue_push and the run-job worker, in
which spsc_queue_push may return not-first while the run-job worker has
already idled due to the job count being zero. If this race occurs, job
scheduling stops, leading to hangs while waiting on the job's DMA
fences.

Seal this race by incrementing the job count before appending to the
SPSC queue.

This race was observed on a drm-tip 6.16-rc1 build with the Xe driver in
an SVM test case.</Note>
    </Notes>
    <CVE>CVE-2025-38515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pinctrl: qcom: msm: mark certain pins as invalid for interrupts

On some platforms, the UFS-reset pin has no interrupt logic in TLMM but
is nevertheless registered as a GPIO in the kernel. This enables the
user-space to trigger a BUG() in the pinctrl-msm driver by running, for
example: `gpiomon -c 0 113` on RB2.

The exact culprit is requesting pins whose intr_detection_width setting
is not 1 or 2 for interrupts. This hits a BUG() in
msm_gpio_irq_set_type(). Potentially crashing the kernel due to an
invalid request from user-space is not optimal, so let's go through the
pins and mark those that would fail the check as invalid for the irq chip
as we should not even register them as available irqs.

This function can be extended if we determine that there are more
corner-cases like this.</Note>
    </Notes>
    <CVE>CVE-2025-38516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Don't call mmput from MMU notifier callback

If the process is exiting, the mmput inside mmu notifier callback from
compactd or fork or numa balancing could release the last reference
of mm struct to call exit_mmap and free_pgtable, this triggers deadlock
with below backtrace.

The deadlock will leak kfd process as mmu notifier release is not called
and cause VRAM leaking.

The fix is to take mm reference mmget_non_zero when adding prange to the
deferred list to pair with mmput in deferred list work.

If prange split and add into pchild list, the pchild work_item.mm is not
used, so remove the mm parameter from svm_range_unmap_split and
svm_range_add_child.

The backtrace of hung task:

 INFO: task python:348105 blocked for more than 64512 seconds.
 Call Trace:
  __schedule+0x1c3/0x550
  schedule+0x46/0xb0
  rwsem_down_write_slowpath+0x24b/0x4c0
  unlink_anon_vmas+0xb1/0x1c0
  free_pgtables+0xa9/0x130
  exit_mmap+0xbc/0x1a0
  mmput+0x5a/0x140
  svm_range_cpu_invalidate_pagetables+0x2b/0x40 [amdgpu]
  mn_itree_invalidate+0x72/0xc0
  __mmu_notifier_invalidate_range_start+0x48/0x60
  try_to_unmap_one+0x10fa/0x1400
  rmap_walk_anon+0x196/0x460
  try_to_unmap+0xbb/0x210
  migrate_page_unmap+0x54d/0x7e0
  migrate_pages_batch+0x1c3/0xae0
  migrate_pages_sync+0x98/0x240
  migrate_pages+0x25c/0x520
  compact_zone+0x29d/0x590
  compact_zone_order+0xb6/0xf0
  try_to_compact_pages+0xbe/0x220
  __alloc_pages_direct_compact+0x96/0x1a0
  __alloc_pages_slowpath+0x410/0x930
  __alloc_pages_nodemask+0x3a9/0x3e0
  do_huge_pmd_anonymous_page+0xd7/0x3e0
  __handle_mm_fault+0x5e3/0x5f0
  handle_mm_fault+0xf7/0x2e0
  hmm_vma_fault.isra.0+0x4d/0xa0
  walk_pmd_range.isra.0+0xa8/0x310
  walk_pud_range+0x167/0x240
  walk_pgd_range+0x55/0x100
  __walk_page_range+0x87/0x90
  walk_page_range+0xf6/0x160
  hmm_range_fault+0x4f/0x90
  amdgpu_hmm_range_get_pages+0x123/0x230 [amdgpu]
  amdgpu_ttm_tt_get_user_pages+0xb1/0x150 [amdgpu]
  init_user_pages+0xb1/0x2a0 [amdgpu]
  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x543/0x7d0 [amdgpu]
  kfd_ioctl_alloc_memory_of_gpu+0x24c/0x4e0 [amdgpu]
  kfd_ioctl+0x29d/0x500 [amdgpu]

(cherry picked from commit a29e067bd38946f752b0ef855f3dfff87e77bec7)</Note>
    </Notes>
    <CVE>CVE-2025-38520</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/imagination: Fix kernel crash when hard resetting the GPU

The GPU hard reset sequence calls pm_runtime_force_suspend() and
pm_runtime_force_resume(), which according to their documentation should
only be used during system-wide PM transitions to sleep states.

The main issue though is that depending on some internal runtime PM
state as seen by pm_runtime_force_suspend() (whether the usage count is
&lt;= 1), pm_runtime_force_resume() might not resume the device unless
needed. If that happens, the runtime PM resume callback
pvr_power_device_resume() is not called, the GPU clocks are not
re-enabled, and the kernel crashes on the next attempt to access GPU
registers as part of the power-on sequence.

Replace calls to pm_runtime_force_suspend() and
pm_runtime_force_resume() with direct calls to the driver's runtime PM
callbacks, pvr_power_device_suspend() and pvr_power_device_resume(),
to ensure clocks are re-enabled and avoid the kernel crash.</Note>
    </Notes>
    <CVE>CVE-2025-38521</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix recv-recv race of completed call

If a call receives an event (such as incoming data), the call gets placed
on the socket's queue and a thread in recvmsg can be awakened to go and
process it.  Once the thread has picked up the call off of the queue,
further events will cause it to be requeued, and once the socket lock is
dropped (recvmsg uses call-&gt;user_mutex to allow the socket to be used in
parallel), a second thread can come in and its recvmsg can pop the call off
the socket queue again.

In such a case, the first thread will be receiving stuff from the call and
the second thread will be blocked on call-&gt;user_mutex.  The first thread
can, at this point, process both the event that it picked call for and the
event that the second thread picked the call for and may see the call
terminate - in which case the call will be "released", decoupling the call
from the user call ID assigned to it (RXRPC_USER_CALL_ID in the control
message).

The first thread will return okay, but then the second thread will wake up
holding the user_mutex and, if it sees that the call has been released by
the first thread, it will BUG thusly:

	kernel BUG at net/rxrpc/recvmsg.c:474!

Fix this by just dequeuing the call and ignoring it if it is seen to be
already released.  We can't tell userspace about it anyway as the user call
ID has become stale.</Note>
    </Notes>
    <CVE>CVE-2025-38524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ice: add NULL check in eswitch lag check

The function ice_lag_is_switchdev_running() is being called from outside of
the LAG event handler code.  This results in the lag-&gt;upper_netdev being
NULL sometimes.  To avoid a NULL-pointer dereference, there needs to be a
check before it is dereferenced.</Note>
    </Notes>
    <CVE>CVE-2025-38526</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in cifs_oplock_break

A race condition can occur in cifs_oplock_break() leading to a
use-after-free of the cinode structure when unmounting:

  cifs_oplock_break()
    _cifsFileInfo_put(cfile)
      cifsFileInfo_put_final()
        cifs_sb_deactive()
          [last ref, start releasing sb]
            kill_sb()
              kill_anon_super()
                generic_shutdown_super()
                  evict_inodes()
                    dispose_list()
                      evict()
                        destroy_inode()
                          call_rcu(&amp;inode-&gt;i_rcu, i_callback)
    spin_lock(&amp;cinode-&gt;open_file_lock)  &lt;- OK
                            [later] i_callback()
                              cifs_free_inode()
                                kmem_cache_free(cinode)
    spin_unlock(&amp;cinode-&gt;open_file_lock)  &lt;- UAF
    cifs_done_oplock_break(cinode)       &lt;- UAF

The issue occurs when umount has already released its reference to the
superblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this
releases the last reference, triggering the immediate cleanup of all
inodes under RCU. However, cifs_oplock_break() continues to access the
cinode after this point, resulting in use-after-free.

Fix this by holding an extra reference to the superblock during the
entire oplock break operation. This ensures that the superblock and
its inodes remain valid until the oplock break completes.</Note>
    </Notes>
    <CVE>CVE-2025-38527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject %p% format string in bprintf-like helpers

static const char fmt[] = "%p%";
    bpf_trace_printk(fmt, sizeof(fmt));

The above BPF program isn't rejected and causes a kernel warning at
runtime:

    Please remove unsupported %\x00 in format string
    WARNING: CPU: 1 PID: 7244 at lib/vsprintf.c:2680 format_decode+0x49c/0x5d0

This happens because bpf_bprintf_prepare skips over the second %,
detected as punctuation, while processing %p. This patch fixes it by
not skipping over punctuation. %\x00 is then processed in the next
iteration and rejected.</Note>
    </Notes>
    <CVE>CVE-2025-38528</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

comedi: aio_iiro_16: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	if ((1 &lt;&lt; it-&gt;options[1]) &amp; 0xdcfc) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.</Note>
    </Notes>
    <CVE>CVE-2025-38529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl812: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	if ((1 &lt;&lt; it-&gt;options[1]) &amp; board-&gt;irq_bits) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.</Note>
    </Notes>
    <CVE>CVE-2025-38530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iio: common: st_sensors: Fix use of uninitialize device structs

Throughout the various probe functions &amp;indio_dev-&gt;dev is used before it
is initialized. This caused a kernel panic in st_sensors_power_enable()
when the call to devm_regulator_bulk_get_enable() fails and then calls
dev_err_probe() with the uninitialized device.

This seems to only cause a panic with dev_err_probe(), dev_err(),
dev_warn() and dev_info() don't seem to cause a panic, but are fixed
as well.

The issue is reported and traced here: [1]</Note>
    </Notes>
    <CVE>CVE-2025-38531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: libwx: fix the using of Rx buffer DMA

The wx_rx_buffer structure contained two DMA address fields: 'dma' and
'page_dma'. However, only 'page_dma' was actually initialized and used
to program the Rx descriptor. But 'dma' was uninitialized and used in
some paths.

This could lead to undefined behavior, including DMA errors or
use-after-free, if the uninitialized 'dma' was used. Althrough such
error has not yet occurred, it is worth fixing in the code.</Note>
    </Notes>
    <CVE>CVE-2025-38533</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode

When transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code
assumed that the regulator should be disabled. However, if the regulator
is marked as always-on, regulator_is_enabled() continues to return true,
leading to an incorrect attempt to disable a regulator which is not
enabled.

This can result in warnings such as:

[  250.155624] WARNING: CPU: 1 PID: 7326 at drivers/regulator/core.c:3004
_regulator_disable+0xe4/0x1a0
[  250.155652] unbalanced disables for VIN_SYS_5V0

To fix this, we move the regulator control logic into
tegra186_xusb_padctl_id_override() function since it's directly related
to the ID override state. The regulator is now only disabled when the role
transitions from USB_ROLE_HOST to USB_ROLE_NONE, by checking the VBUS_ID
register. This ensures that regulator enable/disable operations are
properly balanced and only occur when actually transitioning to/from host
mode.</Note>
    </Notes>
    <CVE>CVE-2025-38535</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: phy: Don't register LEDs for genphy

If a PHY has no driver, the genphy driver is probed/removed directly in
phy_attach/detach. If the PHY's ofnode has an "leds" subnode, then the
LEDs will be (un)registered when probing/removing the genphy driver.
This could occur if the leds are for a non-generic driver that isn't
loaded for whatever reason. Synchronously removing the PHY device in
phy_detach leads to the following deadlock:

rtnl_lock()
ndo_close()
    ...
    phy_detach()
        phy_remove()
            phy_leds_unregister()
                led_classdev_unregister()
                    led_trigger_set()
                        netdev_trigger_deactivate()
                            unregister_netdevice_notifier()
                                rtnl_lock()

There is a corresponding deadlock on the open/register side of things
(and that one is reported by lockdep), but it requires a race while this
one is deterministic.

Generic PHYs do not support LEDs anyway, so don't bother registering
them.</Note>
    </Notes>
    <CVE>CVE-2025-38537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dmaengine: nbpfaxi: Fix memory corruption in probe()

The nbpf-&gt;chan[] array is allocated earlier in the nbpf_probe() function
and it has "num_channels" elements.  These three loops iterate one
element farther than they should and corrupt memory.

The changes to the second loop are more involved.  In this case, we're
copying data from the irqbuf[] array into the nbpf-&gt;chan[] array.  If
the data in irqbuf[i] is the error IRQ then we skip it, so the iterators
are not in sync.  I added a check to ensure that we don't go beyond the
end of the irqbuf[] array.  I'm pretty sure this can't happen, but it
seemed harmless to add a check.

On the other hand, after the loop has ended there is a check to ensure
that the "chan" iterator is where we expect it to be.  In the original
code we went one element beyond the end of the array so the iterator
wasn't in the correct place and it would always return -EINVAL.  However,
now it will always be in the correct place.  I deleted the check since
we know the result.</Note>
    </Notes>
    <CVE>CVE-2025-38538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras

The Chicony Electronics HP 5MP Cameras (USB ID 04F2:B824 &amp; 04F2:B82C)
report a HID sensor interface that is not actually implemented.
Attempting to access this non-functional sensor via iio_info causes
system hangs as runtime PM tries to wake up an unresponsive sensor.

Add these 2 devices to the HID ignore list since the sensor interface is
non-functional by design and should not be exposed to userspace.</Note>
    </Notes>
    <CVE>CVE-2025-38540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init()

devm_kasprintf() returns NULL on error. Currently, mt7925_thermal_init()
does not check for this case, which results in a NULL pointer
dereference.

Add NULL check after devm_kasprintf() to prevent this issue.</Note>
    </Notes>
    <CVE>CVE-2025-38541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: nvdec: Fix dma_alloc_coherent error check

Check for NULL return value with dma_alloc_coherent, in line with
Robin's fix for vic.c in 'drm/tegra: vic: Fix DMA API misuse'.</Note>
    </Notes>
    <CVE>CVE-2025-38543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix bug due to prealloc collision

When userspace is using AF_RXRPC to provide a server, it has to preallocate
incoming calls and assign to them call IDs that will be used to thread
related recvmsg() and sendmsg() together.  The preallocated call IDs will
automatically be attached to calls as they come in until the pool is empty.

To the kernel, the call IDs are just arbitrary numbers, but userspace can
use the call ID to hold a pointer to prepared structs.  In any case, the
user isn't permitted to create two calls with the same call ID (call IDs
become available again when the call ends) and EBADSLT should result from
sendmsg() if an attempt is made to preallocate a call with an in-use call
ID.

However, the cleanup in the error handling will trigger both assertions in
rxrpc_cleanup_call() because the call isn't marked complete and isn't
marked as having been released.

Fix this by setting the call state in rxrpc_service_prealloc_one() and then
marking it as being released before calling the cleanup function.</Note>
    </Notes>
    <CVE>CVE-2025-38544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix memory leak of struct clip_vcc.

ioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to
vcc-&gt;user_back.

The code assumes that vcc_destroy_socket() passes NULL skb
to vcc-&gt;push() when the socket is close()d, and then clip_push()
frees clip_vcc.

However, ioctl(ATMARPD_CTRL) sets NULL to vcc-&gt;push() in
atm_init_atmarp(), resulting in memory leak.

Let's serialise two ioctl() by lock_sock() and check vcc-&gt;push()
in atm_init_atmarp() to prevent memleak.</Note>
    </Notes>
    <CVE>CVE-2025-38546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hwmon: (corsair-cpro) Validate the size of the received input buffer

Add buffer_recv_size to store the size of the received bytes.
Validate buffer_recv_size in send_usb_cmd().</Note>
    </Notes>
    <CVE>CVE-2025-38548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: Delay put pmc-&gt;idev in mld_del_delrec()

pmc-&gt;idev is still used in ip6_mc_clear_src(), so as mld_clear_delrec()
does, the reference should be put after ip6_mc_clear_src() return.</Note>
    </Notes>
    <CVE>CVE-2025-38550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Restrict conditions for adding duplicating netems to qdisc tree

netem_enqueue's duplication prevention logic breaks when a netem
resides in a qdisc tree with other netems - this can lead to a
soft lockup and OOM loop in netem_dequeue, as seen in [1].
Ensure that a duplicating netem cannot exist in a tree with other
netems.

Previous approaches suggested in discussions in chronological order:

1) Track duplication status or ttl in the sk_buff struct. Considered
too specific a use case to extend such a struct, though this would
be a resilient fix and address other previous and potential future
DOS bugs like the one described in loopy fun [2].

2) Restrict netem_enqueue recursion depth like in act_mirred with a
per cpu variable. However, netem_dequeue can call enqueue on its
child, and the depth restriction could be bypassed if the child is a
netem.

3) Use the same approach as in 2, but add metadata in netem_skb_cb
to handle the netem_dequeue case and track a packet's involvement
in duplication. This is an overly complex approach, and Jamal
notes that the skb cb can be overwritten to circumvent this
safeguard.

4) Prevent the addition of a netem to a qdisc tree if its ancestral
path contains a netem. However, filters and actions can cause a
packet to change paths when re-enqueued to the root from netem
duplication, leading us to the current solution: prevent a
duplicating netem from inhabiting the same tree as other netems.

[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/
[2] https://lwn.net/Articles/719297/</Note>
    </Notes>
    <CVE>CVE-2025-38553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: gadget : fix use-after-free in composite_dev_cleanup()

1. In func configfs_composite_bind() -&gt; composite_os_desc_req_prepare():
if kmalloc fails, the pointer cdev-&gt;os_desc_req will be freed but not
set to NULL. Then it will return a failure to the upper-level function.
2. in func configfs_composite_bind() -&gt; composite_dev_cleanup():
it will checks whether cdev-&gt;os_desc_req is NULL. If it is not NULL, it
will attempt to use it.This will lead to a use-after-free issue.

BUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0
Read of size 8 at addr 0000004827837a00 by task init/1

CPU: 10 PID: 1 Comm: init Tainted: G           O      5.10.97-oh #1
 kasan_report+0x188/0x1cc
 __asan_load8+0xb4/0xbc
 composite_dev_cleanup+0xf4/0x2c0
 configfs_composite_bind+0x210/0x7ac
 udc_bind_to_driver+0xb4/0x1ec
 usb_gadget_probe_driver+0xec/0x21c
 gadget_dev_desc_UDC_store+0x264/0x27c</Note>
    </Notes>
    <CVE>CVE-2025-38555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: Harden s32ton() against conversion to 0 bits

Testing by the syzbot fuzzer showed that the HID core gets a
shift-out-of-bounds exception when it tries to convert a 32-bit
quantity to a 0-bit quantity.  Ideally this should never occur, but
there are buggy devices and some might have a report field with size
set to zero; we shouldn't reject the report or the device just because
of that.

Instead, harden the s32ton() routine so that it returns a reasonable
result instead of crashing when it is called with the number of bits
set to 0 -- the same as what snto32() does.</Note>
    </Notes>
    <CVE>CVE-2025-38556</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Evict cache lines during SNP memory validation

An SNP cache coherency vulnerability requires a cache line eviction
mitigation when validating memory after a page state change to private.
The specific mitigation is to touch the first and last byte of each 4K
page that is being validated. There is no need to perform the mitigation
when performing a page state change to shared and rescinding validation.

CPUID bit Fn8000001F_EBX[31] defines the COHERENCY_SFW_NO CPUID bit
that, when set, indicates that the software mitigation for this
vulnerability is not needed.

Implement the mitigation and invoke it when validating memory (making it
private) and the COHERENCY_SFW_NO bit is not set, indicating the SNP
guest is vulnerable.</Note>
    </Notes>
    <CVE>CVE-2025-38560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf/core: Prevent VMA split of buffer mappings

The perf mmap code is careful about mmap()'ing the user page with the
ringbuffer and additionally the auxiliary buffer, when the event supports
it. Once the first mapping is established, subsequent mapping have to use
the same offset and the same size in both cases. The reference counting for
the ringbuffer and the auxiliary buffer depends on this being correct.

Though perf does not prevent that a related mapping is split via mmap(2),
munmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,
which take reference counts, but then the subsequent perf_mmap_close()
calls are not longer fulfilling the offset and size checks. This leads to
reference count leaks.

As perf already has the requirement for subsequent mappings to match the
initial mapping, the obvious consequence is that VMA splits, caused by
resizing of a mapping or partial unmapping, have to be prevented.

Implement the vm_operations_struct::may_split() callback and return
unconditionally -EINVAL.

That ensures that the mapping offsets and sizes cannot be changed after the
fact. Remapping to a different fixed address with the same size is still
possible as it takes the references for the new mapping and drops those of
the old mapping.</Note>
    </Notes>
    <CVE>CVE-2025-38563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix handling of server side tls alerts

Scott Mayhew discovered a security exploit in NFS over TLS in
tls_alert_recv() due to its assumption it can read data from
the msg iterator's kvec..

kTLS implementation splits TLS non-data record payload between
the control message buffer (which includes the type such as TLS
aler or TLS cipher change) and the rest of the payload (say TLS
alert's level/description) which goes into the msg payload buffer.

This patch proposes to rework how control messages are setup and
used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a
kvec backed msg buffer and read in the control message such as a
TLS alert. Msg iterator can advance the kvec pointer as a part of
the copy process thus we need to revert the iterator before calling
into the tls_alert_recv.</Note>
    </Notes>
    <CVE>CVE-2025-38566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing

TCA_MQPRIO_TC_ENTRY_INDEX is validated using
NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value
TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack
write in the fp[] array, which only has room for 16 elements (0-15).

Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.</Note>
    </Notes>
    <CVE>CVE-2025-38568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix client side handling of tls alerts

A security exploit was discovered in NFS over TLS in tls_alert_recv
due to its assumption that there is valid data in the msghdr's
iterator's kvec.

Instead, this patch proposes the rework how control messages are
setup and used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a kvec
backed control buffer and read in the control message such as a TLS
alert. Scott found that a msg iterator can advance the kvec pointer
as a part of the copy process thus we need to revert the iterator
before calling into the tls_alert_recv.</Note>
    </Notes>
    <CVE>CVE-2025-38571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: reject malicious packets in ipv6_gso_segment()

syzbot was able to craft a packet with very long IPv6 extension headers
leading to an overflow of skb-&gt;transport_header.

This 16bit field has a limited range.

Add skb_reset_transport_header_careful() helper and use it
from ipv6_gso_segment()

WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Modules linked in:
CPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
 RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
 RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Call Trace:
 &lt;TASK&gt;
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  __skb_gso_segment+0x342/0x510 net/core/gso.c:124
  skb_gso_segment include/net/gso.h:83 [inline]
  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950
  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000
  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329
  __dev_xmit_skb net/core/dev.c:4102 [inline]
  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679</Note>
    </Notes>
    <CVE>CVE-2025-38572</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pptp: ensure minimal skb length in pptp_xmit()

Commit aabc6596ffb3 ("net: ppp: Add bound checking for skb data
on ppp_sync_txmung") fixed ppp_sync_txmunge()

We need a similar fix in pptp_xmit(), otherwise we might
read uninit data as reported by syzbot.

BUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193
  pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193
  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline]
  ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314
  pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
  __release_sock+0x1d3/0x330 net/core/sock.c:3213
  release_sock+0x6b/0x270 net/core/sock.c:3767
  pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904
  sock_sendmsg_nosec net/socket.c:712 [inline]
  __sock_sendmsg+0x330/0x3d0 net/socket.c:727
  ____sys_sendmsg+0x893/0xd80 net/socket.c:2566
  ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
  __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709</Note>
    </Notes>
    <CVE>CVE-2025-38574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powerpc/eeh: Make EEH driver device hotplug safe

Multiple race conditions existed between the PCIe hotplug driver and the
EEH driver, leading to a variety of kernel oopses of the same general
nature:

&lt;pcie device unplug&gt;
&lt;eeh driver trigger&gt;
&lt;hotplug removal trigger&gt;
&lt;pcie tree reconfiguration&gt;
&lt;eeh recovery next step&gt;
&lt;oops in EEH driver bus iteration loop&gt;

A second class of oops is also seen when the underlying bus disappears
during device recovery.

Refactor the EEH module to be PCI rescan and remove safe.  Also clean
up a few minor formatting / readability issues.</Note>
    </Notes>
    <CVE>CVE-2025-38576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Fix crash when rebind ccp device for ccp.ko

When CONFIG_CRYPTO_DEV_CCP_DEBUGFS is enabled, rebinding
the ccp device causes the following crash:

$ echo '0000:0a:00.2' &gt; /sys/bus/pci/drivers/ccp/unbind
$ echo '0000:0a:00.2' &gt; /sys/bus/pci/drivers/ccp/bind

[  204.976930] BUG: kernel NULL pointer dereference, address: 0000000000000098
[  204.978026] #PF: supervisor write access in kernel mode
[  204.979126] #PF: error_code(0x0002) - not-present page
[  204.980226] PGD 0 P4D 0
[  204.981317] Oops: Oops: 0002 [#1] SMP NOPTI
...
[  204.997852] Call Trace:
[  204.999074]  &lt;TASK&gt;
[  205.000297]  start_creating+0x9f/0x1c0
[  205.001533]  debugfs_create_dir+0x1f/0x170
[  205.002769]  ? srso_return_thunk+0x5/0x5f
[  205.004000]  ccp5_debugfs_setup+0x87/0x170 [ccp]
[  205.005241]  ccp5_init+0x8b2/0x960 [ccp]
[  205.006469]  ccp_dev_init+0xd4/0x150 [ccp]
[  205.007709]  sp_init+0x5f/0x80 [ccp]
[  205.008942]  sp_pci_probe+0x283/0x2e0 [ccp]
[  205.010165]  ? srso_return_thunk+0x5/0x5f
[  205.011376]  local_pci_probe+0x4f/0xb0
[  205.012584]  pci_device_probe+0xdb/0x230
[  205.013810]  really_probe+0xed/0x380
[  205.015024]  __driver_probe_device+0x7e/0x160
[  205.016240]  device_driver_attach+0x2f/0x60
[  205.017457]  bind_store+0x7c/0xb0
[  205.018663]  drv_attr_store+0x28/0x40
[  205.019868]  sysfs_kf_write+0x5f/0x70
[  205.021065]  kernfs_fop_write_iter+0x145/0x1d0
[  205.022267]  vfs_write+0x308/0x440
[  205.023453]  ksys_write+0x6d/0xe0
[  205.024616]  __x64_sys_write+0x1e/0x30
[  205.025778]  x64_sys_call+0x16ba/0x2150
[  205.026942]  do_syscall_64+0x56/0x1e0
[  205.028108]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  205.029276] RIP: 0033:0x7fbc36f10104
[  205.030420] Code: 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8d 05 e1 08 2e 00 8b 00 85 c0 75 13 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 f3 c3 66 90 41 54 55 49 89 d4 53 48 89 f5

This patch sets ccp_debugfs_dir to NULL after destroying it in
ccp5_debugfs_destroy, allowing the directory dentry to be
recreated when rebinding the ccp device.

Tested on AMD Ryzen 7 1700X.</Note>
    </Notes>
    <CVE>CVE-2025-38581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix double destruction of rsv_qp

rsv_qp may be double destroyed in error flow, first in free_mr_init(),
and then in hns_roce_exit(). Fix it by moving the free_mr_init() call
into hns_roce_v2_init().

list_del corruption, ffff589732eb9b50-&gt;next is LIST_POISON1 (dead000000000100)
WARNING: CPU: 8 PID: 1047115 at lib/list_debug.c:53 __list_del_entry_valid+0x148/0x240
...
Call trace:
 __list_del_entry_valid+0x148/0x240
 hns_roce_qp_remove+0x4c/0x3f0 [hns_roce_hw_v2]
 hns_roce_v2_destroy_qp_common+0x1dc/0x5f4 [hns_roce_hw_v2]
 hns_roce_v2_destroy_qp+0x22c/0x46c [hns_roce_hw_v2]
 free_mr_exit+0x6c/0x120 [hns_roce_hw_v2]
 hns_roce_v2_exit+0x170/0x200 [hns_roce_hw_v2]
 hns_roce_exit+0x118/0x350 [hns_roce_hw_v2]
 __hns_roce_hw_v2_init_instance+0x1c8/0x304 [hns_roce_hw_v2]
 hns_roce_hw_v2_reset_notify_init+0x170/0x21c [hns_roce_hw_v2]
 hns_roce_hw_v2_reset_notify+0x6c/0x190 [hns_roce_hw_v2]
 hclge_notify_roce_client+0x6c/0x160 [hclge]
 hclge_reset_rebuild+0x150/0x5c0 [hclge]
 hclge_reset+0x10c/0x140 [hclge]
 hclge_reset_subtask+0x80/0x104 [hclge]
 hclge_reset_service_task+0x168/0x3ac [hclge]
 hclge_service_task+0x50/0x100 [hclge]
 process_one_work+0x250/0x9a0
 worker_thread+0x324/0x990
 kthread+0x190/0x210
 ret_from_fork+0x10/0x18</Note>
    </Notes>
    <CVE>CVE-2025-38582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: xilinx: vcu: unregister pll_post only if registered correctly

If registration of pll_post is failed, it will be set to NULL or ERR,
unregistering same will fail with following call trace:

Unable to handle kernel NULL pointer dereference at virtual address 008
pc : clk_hw_unregister+0xc/0x20
lr : clk_hw_unregister_fixed_factor+0x18/0x30
sp : ffff800011923850
...
Call trace:
 clk_hw_unregister+0xc/0x20
 clk_hw_unregister_fixed_factor+0x18/0x30
 xvcu_unregister_clock_provider+0xcc/0xf4 [xlnx_vcu]
 xvcu_probe+0x2bc/0x53c [xlnx_vcu]</Note>
    </Notes>
    <CVE>CVE-2025-38583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

padata: Fix pd UAF once and for all

There is a race condition/UAF in padata_reorder that goes back
to the initial commit.  A reference count is taken at the start
of the process in padata_do_parallel, and released at the end in
padata_serial_worker.

This reference count is (and only is) required for padata_replace
to function correctly.  If padata_replace is never called then
there is no issue.

In the function padata_reorder which serves as the core of padata,
as soon as padata is added to queue-&gt;serial.list, and the associated
spin lock released, that padata may be processed and the reference
count on pd would go away.

Fix this by getting the next padata before the squeue-&gt;serial lock
is released.

In order to make this possible, simplify padata_reorder by only
calling it once the next padata arrives.</Note>
    </Notes>
    <CVE>CVE-2025-38584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()

When gmin_get_config_var() calls efi.get_variable() and the EFI variable
is larger than the expected buffer size, two behaviors combine to create
a stack buffer overflow:

1. gmin_get_config_var() does not return the proper error code when
   efi.get_variable() fails. It returns the stale 'ret' value from
   earlier operations instead of indicating the EFI failure.

2. When efi.get_variable() returns EFI_BUFFER_TOO_SMALL, it updates
   *out_len to the required buffer size but writes no data to the output
   buffer. However, due to bug #1, gmin_get_var_int() believes the call
   succeeded.

The caller gmin_get_var_int() then performs:
- Allocates val[CFG_VAR_NAME_MAX + 1] (65 bytes) on stack
- Calls gmin_get_config_var(dev, is_gmin, var, val, &amp;len) with len=64
- If EFI variable is &gt;64 bytes, efi.get_variable() sets len=required_size
- Due to bug #1, thinks call succeeded with len=required_size
- Executes val[len] = 0, writing past end of 65-byte stack buffer

This creates a stack buffer overflow when EFI variables are larger than
64 bytes. Since EFI variables can be controlled by firmware or system
configuration, this could potentially be exploited for code execution.

Fix the bug by returning proper error codes from gmin_get_config_var()
based on EFI status instead of stale 'ret' value.

The gmin_get_var_int() function is called during device initialization
for camera sensor configuration on Intel Bay Trail and Cherry Trail
platforms using the atomisp camera stack.</Note>
    </Notes>
    <CVE>CVE-2025-38585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible infinite loop in fib6_info_uses_dev()

fib6_info_uses_dev() seems to rely on RCU without an explicit
protection.

Like the prior fix in rt6_nlmsg_size(),
we need to make sure fib6_del_route() or fib6_add_rt2node()
have not removed the anchor from the list, or we risk an infinite loop.</Note>
    </Notes>
    <CVE>CVE-2025-38587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent infinite loop in rt6_nlmsg_size()

While testing prior patch, I was able to trigger
an infinite loop in rt6_nlmsg_size() in the following place:

list_for_each_entry_rcu(sibling, &amp;f6i-&gt;fib6_siblings,
			fib6_siblings) {
	rt6_nh_nlmsg_size(sibling-&gt;fib6_nh, &amp;nexthop_len);
}

This is because fib6_del_route() and fib6_add_rt2node()
uses list_del_rcu(), which can confuse rcu readers,
because they might no longer see the head of the list.

Restart the loop if f6i-&gt;fib6_nsiblings is zero.</Note>
    </Notes>
    <CVE>CVE-2025-38588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Remove skb secpath if xfrm state is not found

Hardware returns a unique identifier for a decrypted packet's xfrm
state, this state is looked up in an xarray. However, the state might
have been freed by the time of this lookup.

Currently, if the state is not found, only a counter is incremented.
The secpath (sp) extension on the skb is not removed, resulting in
sp-&gt;len becoming 0.

Subsequently, functions like __xfrm_policy_check() attempt to access
fields such as xfrm_input_state(skb)-&gt;xso.type (which dereferences
sp-&gt;xvec[sp-&gt;len - 1]) without first validating sp-&gt;len. This leads to
a crash when dereferencing an invalid state pointer.

This patch prevents the crash by explicitly removing the secpath
extension from the skb if the xfrm state is not found after hardware
decryption. This ensures downstream functions do not operate on a
zero-length secpath.

 BUG: unable to handle page fault for address: ffffffff000002c8
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 282e067 P4D 282e067 PUD 0
 Oops: Oops: 0000 [#1] SMP
 CPU: 12 UID: 0 PID: 0 Comm: swapper/12 Not tainted 6.15.0-rc7_for_upstream_min_debug_2025_05_27_22_44 #1 NONE
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:__xfrm_policy_check+0x61a/0xa30
 Code: b6 77 7f 83 e6 02 74 14 4d 8b af d8 00 00 00 41 0f b6 45 05 c1 e0 03 48 98 49 01 c5 41 8b 45 00 83 e8 01 48 98 49 8b 44 c5 10 &lt;0f&gt; b6 80 c8 02 00 00 83 e0 0c 3c 04 0f 84 0c 02 00 00 31 ff 80 fa
 RSP: 0018:ffff88885fb04918 EFLAGS: 00010297
 RAX: ffffffff00000000 RBX: 0000000000000002 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000000
 RBP: ffffffff8311af80 R08: 0000000000000020 R09: 00000000c2eda353
 R10: ffff88812be2bbc8 R11: 000000001faab533 R12: ffff88885fb049c8
 R13: ffff88812be2bbc8 R14: 0000000000000000 R15: ffff88811896ae00
 FS:  0000000000000000(0000) GS:ffff8888dca82000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffff000002c8 CR3: 0000000243050002 CR4: 0000000000372eb0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  ? try_to_wake_up+0x108/0x4c0
  ? udp4_lib_lookup2+0xbe/0x150
  ? udp_lib_lport_inuse+0x100/0x100
  ? __udp4_lib_lookup+0x2b0/0x410
  __xfrm_policy_check2.constprop.0+0x11e/0x130
  udp_queue_rcv_one_skb+0x1d/0x530
  udp_unicast_rcv_skb+0x76/0x90
  __udp4_lib_rcv+0xa64/0xe90
  ip_protocol_deliver_rcu+0x20/0x130
  ip_local_deliver_finish+0x75/0xa0
  ip_local_deliver+0xc1/0xd0
  ? ip_protocol_deliver_rcu+0x130/0x130
  ip_sublist_rcv+0x1f9/0x240
  ? ip_rcv_finish_core+0x430/0x430
  ip_list_rcv+0xfc/0x130
  __netif_receive_skb_list_core+0x181/0x1e0
  netif_receive_skb_list_internal+0x200/0x360
  ? mlx5e_build_rx_skb+0x1bc/0xda0 [mlx5_core]
  gro_receive_skb+0xfd/0x210
  mlx5e_handle_rx_cqe_mpwrq+0x141/0x280 [mlx5_core]
  mlx5e_poll_rx_cq+0xcc/0x8e0 [mlx5_core]
  ? mlx5e_handle_rx_dim+0x91/0xd0 [mlx5_core]
  mlx5e_napi_poll+0x114/0xab0 [mlx5_core]
  __napi_poll+0x25/0x170
  net_rx_action+0x32d/0x3a0
  ? mlx5_eq_comp_int+0x8d/0x280 [mlx5_core]
  ? notifier_call_chain+0x33/0xa0
  handle_softirqs+0xda/0x250
  irq_exit_rcu+0x6d/0xc0
  common_interrupt+0x81/0xa0
  &lt;/IRQ&gt;</Note>
    </Notes>
    <CVE>CVE-2025-38590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject narrower access to pointer ctx fields

The following BPF program, simplified from a syzkaller repro, causes a
kernel warning:

    r0 = *(u8 *)(r1 + 169);
    exit;

With pointer field sk being at offset 168 in __sk_buff. This access is
detected as a narrower read in bpf_skb_is_valid_access because it
doesn't match offsetof(struct __sk_buff, sk). It is therefore allowed
and later proceeds to bpf_convert_ctx_access. Note that for the
"is_narrower_load" case in the convert_ctx_accesses(), the insn-&gt;off
is aligned, so the cnt may not be 0 because it matches the
offsetof(struct __sk_buff, sk) in the bpf_convert_ctx_access. However,
the target_size stays 0 and the verifier errors with a kernel warning:

    verifier bug: error during ctx access conversion(1)

This patch fixes that to return a proper "invalid bpf_context access
off=X size=Y" error on the load instruction.

The same issue affects multiple other fields in context structures that
allow narrow access. Some other non-affected fields (for sk_msg,
sk_lookup, and sockopt) were also changed to use bpf_ctx_range_ptr for
consistency.

Note this syzkaller crash was reported in the "Closes" link below, which
used to be about a different bug, fixed in
commit fce7bd8e385a ("bpf/verifier: Handle BPF_LOAD_ACQ instructions
in insn_def_regno()"). Because syzbot somehow confused the two bugs,
the new crash and repro didn't get reported to the mailing list.</Note>
    </Notes>
    <CVE>CVE-2025-38591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'

Function 'hci_discovery_filter_clear()' frees 'uuids' array and then
sets it to NULL. There is a tiny chance of the following race:

'hci_cmd_sync_work()'

 'update_passive_scan_sync()'

   'hci_update_passive_scan_sync()'

     'hci_discovery_filter_clear()'
       kfree(uuids);

       &lt;-------------------------preempted--------------------------------&gt;
                                           'start_service_discovery()'

                                             'hci_discovery_filter_clear()'
                                               kfree(uuids); // DOUBLE FREE

       &lt;-------------------------preempted--------------------------------&gt;

      uuids = NULL;

To fix it let's add locking around 'kfree()' call and NULL pointer
assignment. Otherwise the following backtrace fires:

[ ] ------------[ cut here ]------------
[ ] kernel BUG at mm/slub.c:547!
[ ] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
[ ] CPU: 3 UID: 0 PID: 246 Comm: bluetoothd Tainted: G O 6.12.19-kernel #1
[ ] Tainted: [O]=OOT_MODULE
[ ] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ ] pc : __slab_free+0xf8/0x348
[ ] lr : __slab_free+0x48/0x348
...
[ ] Call trace:
[ ]  __slab_free+0xf8/0x348
[ ]  kfree+0x164/0x27c
[ ]  start_service_discovery+0x1d0/0x2c0
[ ]  hci_sock_sendmsg+0x518/0x924
[ ]  __sock_sendmsg+0x54/0x60
[ ]  sock_write_iter+0x98/0xf8
[ ]  do_iter_readv_writev+0xe4/0x1c8
[ ]  vfs_writev+0x128/0x2b0
[ ]  do_writev+0xfc/0x118
[ ]  __arm64_sys_writev+0x20/0x2c
[ ]  invoke_syscall+0x68/0xf0
[ ]  el0_svc_common.constprop.0+0x40/0xe0
[ ]  do_el0_svc+0x1c/0x28
[ ]  el0_svc+0x30/0xd0
[ ]  el0t_64_sync_handler+0x100/0x12c
[ ]  el0t_64_sync+0x194/0x198
[ ] Code: 8b0002e6 eb17031f 54fffbe1 d503201f (d4210000)
[ ] ---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2025-38593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xen: fix UAF in dmabuf_exp_from_pages()

[dma_buf_fd() fixes; no preferences regarding the tree it goes through -
up to xen folks]

As soon as we'd inserted a file reference into descriptor table, another
thread could close it.  That's fine for the case when all we are doing is
returning that descriptor to userland (it's a race, but it's a userland
race and there's nothing the kernel can do about it).  However, if we
follow fd_install() with any kind of access to objects that would be
destroyed on close (be it the struct file itself or anything destroyed
by its -&gt;release()), we have a UAF.

dma_buf_fd() is a combination of reserving a descriptor and fd_install().
gntdev dmabuf_exp_from_pages() calls it and then proceeds to access the
objects destroyed on close - starting with gntdev_dmabuf itself.

Fix that by doing reserving descriptor before anything else and do
fd_install() only when everything had been set up.</Note>
    </Notes>
    <CVE>CVE-2025-38595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port

Each window of a vop2 is usable by a specific set of video ports, so while
binding the vop2, we look through the list of available windows trying to
find one designated as primary-plane and usable by that specific port.

The code later wants to use drm_crtc_init_with_planes with that found
primary plane, but nothing has checked so far if a primary plane was
actually found.

For whatever reason, the rk3576 vp2 does not have a usable primary window
(if vp0 is also in use) which brought the issue to light and ended in a
null-pointer dereference further down.

As we expect a primary-plane to exist for a video-port, add a check at
the end of the window-iteration and fail probing if none was found.</Note>
    </Notes>
    <CVE>CVE-2025-38597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: clear initialized flag for deinit-ed srng lists

In a number of cases we see kernel panics on resume due
to ath11k kernel page fault, which happens under the
following circumstances:

1) First ath11k_hal_dump_srng_stats() call

 Last interrupt received for each group:
 ath11k_pci 0000:01:00.0: group_id 0 22511ms before
 ath11k_pci 0000:01:00.0: group_id 1 14440788ms before
 [..]
 ath11k_pci 0000:01:00.0: failed to receive control response completion, polling..
 ath11k_pci 0000:01:00.0: Service connect timeout
 ath11k_pci 0000:01:00.0: failed to connect to HTT: -110
 ath11k_pci 0000:01:00.0: failed to start core: -110
 ath11k_pci 0000:01:00.0: firmware crashed: MHI_CB_EE_RDDM
 ath11k_pci 0000:01:00.0: already resetting count 2
 ath11k_pci 0000:01:00.0: failed to wait wlan mode request (mode 4): -110
 ath11k_pci 0000:01:00.0: qmi failed to send wlan mode off: -110
 ath11k_pci 0000:01:00.0: failed to reconfigure driver on crash recovery
 [..]

2) At this point reconfiguration fails (we have 2 resets) and
  ath11k_core_reconfigure_on_crash() calls ath11k_hal_srng_deinit()
  which destroys srng lists.  However, it does not reset per-list
  -&gt;initialized flag.

3) Second ath11k_hal_dump_srng_stats() call sees stale -&gt;initialized
  flag and attempts to dump srng stats:

 Last interrupt received for each group:
 ath11k_pci 0000:01:00.0: group_id 0 66785ms before
 ath11k_pci 0000:01:00.0: group_id 1 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 2 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 3 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 4 14780845ms before
 ath11k_pci 0000:01:00.0: group_id 5 14780845ms before
 ath11k_pci 0000:01:00.0: group_id 6 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 7 66814ms before
 ath11k_pci 0000:01:00.0: group_id 8 68997ms before
 ath11k_pci 0000:01:00.0: group_id 9 67588ms before
 ath11k_pci 0000:01:00.0: group_id 10 69511ms before
 BUG: unable to handle page fault for address: ffffa007404eb010
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 100000067 P4D 100000067 PUD 10022d067 PMD 100b01067 PTE 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 RIP: 0010:ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k]
 Call Trace:
 &lt;TASK&gt;
 ? __die_body+0xae/0xb0
 ? page_fault_oops+0x381/0x3e0
 ? exc_page_fault+0x69/0xa0
 ? asm_exc_page_fault+0x22/0x30
 ? ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k (HASH:6cea 4)]
 ath11k_qmi_driver_event_work+0xbd/0x1050 [ath11k (HASH:6cea 4)]
 worker_thread+0x389/0x930
 kthread+0x149/0x170

Clear per-list -&gt;initialized flag in ath11k_hal_srng_deinit().</Note>
    </Notes>
    <CVE>CVE-2025-38601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: Add missing check for alloc_ordered_workqueue

Add check for the return value of alloc_ordered_workqueue since it may
return NULL pointer.</Note>
    </Notes>
    <CVE>CVE-2025-38602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: Kill URBs before clearing tx status queue

In rtl8187_stop() move the call of usb_kill_anchored_urbs() before clearing
b_tx_status.queue. This change prevents callbacks from using already freed
skb due to anchor was not killed before freeing such skb.

 BUG: kernel NULL pointer dereference, address: 0000000000000080
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Not tainted 6.15.0 #8 PREEMPT(voluntary)
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
 RIP: 0010:ieee80211_tx_status_irqsafe+0x21/0xc0 [mac80211]
 Call Trace:
  &lt;IRQ&gt;
  rtl8187_tx_cb+0x116/0x150 [rtl8187]
  __usb_hcd_giveback_urb+0x9d/0x120
  usb_giveback_urb_bh+0xbb/0x140
  process_one_work+0x19b/0x3c0
  bh_worker+0x1a7/0x210
  tasklet_action+0x10/0x30
  handle_softirqs+0xf0/0x340
  __irq_exit_rcu+0xcd/0xf0
  common_interrupt+0x85/0xa0
  &lt;/IRQ&gt;

Tested on RTL8187BvE device.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2025-38604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()

In ath12k_dp_tx_get_encap_type(), the arvif parameter is only used to
retrieve the ab pointer. In vdev delete sequence the arvif-&gt;ar could
become NULL and that would trigger kernel panic.
Since the caller ath12k_dp_tx() already has a valid ab pointer, pass it
directly to avoid panic and unnecessary dereferencing.

PC points to "ath12k_dp_tx+0x228/0x988 [ath12k]"
LR points to "ath12k_dp_tx+0xc8/0x988 [ath12k]".
The Backtrace obtained is as follows:
ath12k_dp_tx+0x228/0x988 [ath12k]
ath12k_mac_tx_check_max_limit+0x608/0x920 [ath12k]
ieee80211_process_measurement_req+0x320/0x348 [mac80211]
ieee80211_tx_dequeue+0x9ac/0x1518 [mac80211]
ieee80211_tx_dequeue+0xb14/0x1518 [mac80211]
ieee80211_tx_prepare_skb+0x224/0x254 [mac80211]
ieee80211_xmit+0xec/0x100 [mac80211]
__ieee80211_subif_start_xmit+0xc50/0xf40 [mac80211]
ieee80211_subif_start_xmit+0x2e8/0x308 [mac80211]
netdev_start_xmit+0x150/0x18c
dev_hard_start_xmit+0x74/0xc0

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1</Note>
    </Notes>
    <CVE>CVE-2025-38605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls

When sending plaintext data, we initially calculated the corresponding
ciphertext length. However, if we later reduced the plaintext data length
via socket policy, we failed to recalculate the ciphertext length.

This results in transmitting buffers containing uninitialized data during
ciphertext transmission.

This causes uninitialized bytes to be appended after a complete
"Application Data" packet, leading to errors on the receiving end when
parsing TLS record.</Note>
    </Notes>
    <CVE>CVE-2025-38608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Check governor before using governor-&gt;name

Commit 96ffcdf239de ("PM / devfreq: Remove redundant governor_name from
struct devfreq") removes governor_name and uses governor-&gt;name to replace
it. But devfreq-&gt;governor may be NULL and directly using
devfreq-&gt;governor-&gt;name may cause null pointer exception. Move the check of
governor to before using governor-&gt;name.</Note>
    </Notes>
    <CVE>CVE-2025-38609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()

The get_pd_power_uw() function can crash with a NULL pointer dereference
when em_cpu_get() returns NULL. This occurs when a CPU becomes impossible
during runtime, causing get_cpu_device() to return NULL, which propagates
through em_cpu_get() and leads to a crash when em_span_cpus() dereferences
the NULL pointer.

Add a NULL check after em_cpu_get() and return 0 if unavailable,
matching the existing fallback behavior in __dtpm_cpu_setup().

[ rjw: Drop an excess empty code line ]</Note>
    </Notes>
    <CVE>CVE-2025-38610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()

In the error paths after fb_info structure is successfully allocated,
the memory allocated in fb_deferred_io_init() for info-&gt;pagerefs is not
freed. Fix that by adding the cleanup function on the error path.</Note>
    </Notes>
    <CVE>CVE-2025-38612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

eventpoll: Fix semi-unbounded recursion

Ensure that epoll instances can never form a graph deeper than
EP_MAX_NESTS+1 links.

Currently, ep_loop_check_proc() ensures that the graph is loop-free and
does some recursion depth checks, but those recursion depth checks don't
limit the depth of the resulting tree for two reasons:

 - They don't look upwards in the tree.
 - If there are multiple downwards paths of different lengths, only one of
   the paths is actually considered for the depth check since commit
   28d82dc1c4ed ("epoll: limit paths").

Essentially, the current recursion depth check in ep_loop_check_proc() just
serves to prevent it from recursing too deeply while checking for loops.

A more thorough check is done in reverse_path_check() after the new graph
edge has already been created; this checks, among other things, that no
paths going upwards from any non-epoll file with a length of more than 5
edges exist. However, this check does not apply to non-epoll files.

As a result, it is possible to recurse to a depth of at least roughly 500,
tested on v6.15. (I am unsure if deeper recursion is possible; and this may
have changed with commit 8c44dac8add7 ("eventpoll: Fix priority inversion
problem").)

To fix it:

1. In ep_loop_check_proc(), note the subtree depth of each visited node,
and use subtree depths for the total depth calculation even when a subtree
has already been visited.
2. Add ep_get_upwards_depth_proc() for similarly determining the maximum
depth of an upwards walk.
3. In ep_loop_check(), use these values to limit the total path length
between epoll nodes to EP_MAX_NESTS edges.</Note>
    </Notes>
    <CVE>CVE-2025-38614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tls: handle data disappearing from under the TLS ULP

TLS expects that it owns the receive queue of the TCP socket.
This cannot be guaranteed in case the reader of the TCP socket
entered before the TLS ULP was installed, or uses some non-standard
read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy
early exit (which leaves anchor pointing to a freed skb) with real
error handling. Wipe the parsing state and tell the reader to retry.

We already reload the anchor every time we (re)acquire the socket lock,
so the only condition we need to avoid is an out of bounds read
(not having enough bytes in the socket for previously parsed record len).

If some data was read from under TLS but there's enough in the queue
we'll reload and decrypt what is most likely not a valid TLS record.
Leading to some undefined behavior from TLS perspective (corrupting
a stream? missing an alert? missing an attack?) but no kernel crash
should take place.</Note>
    </Notes>
    <CVE>CVE-2025-38616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix a race in packet_set_ring() and packet_notifier()

When packet_set_ring() releases po-&gt;bind_lock, another thread can
run packet_notifier() and process an NETDEV_UP event.

This race and the fix are both similar to that of commit 15fe076edea7
("net/packet: fix a race in packet_bind() and packet_notifier()").

There too the packet_notifier NETDEV_UP event managed to run while a
po-&gt;bind_lock critical section had to be temporarily released. And
the fix was similarly to temporarily set po-&gt;num to zero to keep
the socket unhooked until the lock is retaken.

The po-&gt;bind_lock in packet_set_ring and packet_notifier precede the
introduction of git history.</Note>
    </Notes>
    <CVE>CVE-2025-38617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock: Do not allow binding to VMADDR_PORT_ANY

It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can
cause a use-after-free when a connection is made to the bound socket.
The socket returned by accept() also has port VMADDR_PORT_ANY but is not
on the list of unbound sockets. Binding it will result in an extra
refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep
the binding until socket destruction).

Modify the check in __vsock_bind_connectible() to also prevent binding
to VMADDR_PORT_ANY.</Note>
    </Notes>
    <CVE>CVE-2025-38618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

md: make rdev_addable usable for rcu mode

Our testcase trigger panic:

BUG: kernel NULL pointer dereference, address: 00000000000000e0
...
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 2 UID: 0 PID: 85 Comm: kworker/2:1 Not tainted 6.16.0+ #94
PREEMPT(none)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
Workqueue: md_misc md_start_sync
RIP: 0010:rdev_addable+0x4d/0xf0
...
Call Trace:
 &lt;TASK&gt;
 md_start_sync+0x329/0x480
 process_one_work+0x226/0x6d0
 worker_thread+0x19e/0x340
 kthread+0x10f/0x250
 ret_from_fork+0x14d/0x180
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
Modules linked in: raid10
CR2: 00000000000000e0
---[ end trace 0000000000000000 ]---
RIP: 0010:rdev_addable+0x4d/0xf0

md_spares_need_change in md_start_sync will call rdev_addable which
protected by rcu_read_lock/rcu_read_unlock. This rcu context will help
protect rdev won't be released, but rdev-&gt;mddev will be set to NULL
before we call synchronize_rcu in md_kick_rdev_from_array. Fix this by
using READ_ONCE and check does rdev-&gt;mddev still alive.</Note>
    </Notes>
    <CVE>CVE-2025-38621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: drop UFO packets in udp_rcv_segment()

When sending a packet with virtio_net_hdr to tun device, if the gso_type
in virtio_net_hdr is SKB_GSO_UDP and the gso_size is less than udphdr
size, below crash may happen.

  ------------[ cut here ]------------
  kernel BUG at net/core/skbuff.c:4572!
  Oops: invalid opcode: 0000 [#1] SMP NOPTI
  CPU: 0 UID: 0 PID: 62 Comm: mytest Not tainted 6.16.0-rc7 #203 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:skb_pull_rcsum+0x8e/0xa0
  Code: 00 00 5b c3 cc cc cc cc 8b 93 88 00 00 00 f7 da e8 37 44 38 00 f7 d8 89 83 88 00 00 00 48 8b 83 c8 00 00 00 5b c3 cc cc cc cc &lt;0f&gt; 0b 0f 0b 66 66 2e 0f 1f 84 00 000
  RSP: 0018:ffffc900001fba38 EFLAGS: 00000297
  RAX: 0000000000000004 RBX: ffff8880040c1000 RCX: ffffc900001fb948
  RDX: ffff888003e6d700 RSI: 0000000000000008 RDI: ffff88800411a062
  RBP: ffff8880040c1000 R08: 0000000000000000 R09: 0000000000000001
  R10: ffff888003606c00 R11: 0000000000000001 R12: 0000000000000000
  R13: ffff888004060900 R14: ffff888004050000 R15: ffff888004060900
  FS:  000000002406d3c0(0000) GS:ffff888084a19000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000020000040 CR3: 0000000004007000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   udp_queue_rcv_one_skb+0x176/0x4b0 net/ipv4/udp.c:2445
   udp_queue_rcv_skb+0x155/0x1f0 net/ipv4/udp.c:2475
   udp_unicast_rcv_skb+0x71/0x90 net/ipv4/udp.c:2626
   __udp4_lib_rcv+0x433/0xb00 net/ipv4/udp.c:2690
   ip_protocol_deliver_rcu+0xa6/0x160 net/ipv4/ip_input.c:205
   ip_local_deliver_finish+0x72/0x90 net/ipv4/ip_input.c:233
   ip_sublist_rcv_finish+0x5f/0x70 net/ipv4/ip_input.c:579
   ip_sublist_rcv+0x122/0x1b0 net/ipv4/ip_input.c:636
   ip_list_rcv+0xf7/0x130 net/ipv4/ip_input.c:670
   __netif_receive_skb_list_core+0x21d/0x240 net/core/dev.c:6067
   netif_receive_skb_list_internal+0x186/0x2b0 net/core/dev.c:6210
   napi_complete_done+0x78/0x180 net/core/dev.c:6580
   tun_get_user+0xa63/0x1120 drivers/net/tun.c:1909
   tun_chr_write_iter+0x65/0xb0 drivers/net/tun.c:1984
   vfs_write+0x300/0x420 fs/read_write.c:593
   ksys_write+0x60/0xd0 fs/read_write.c:686
   do_syscall_64+0x50/0x1c0 arch/x86/entry/syscall_64.c:63
   &lt;/TASK&gt;

To trigger gso segment in udp_queue_rcv_skb(), we should also set option
UDP_ENCAP_ESPINUDP to enable udp_sk(sk)-&gt;encap_rcv. When the encap_rcv
hook return 1 in udp_queue_rcv_one_skb(), udp_csum_pull_header() will try
to pull udphdr, but the skb size has been segmented to gso size, which
leads to this crash.

Previous commit cf329aa42b66 ("udp: cope with UDP GRO packet misdirection")
introduces segmentation in UDP receive path only for GRO, which was never
intended to be used for UFO, so drop UFO packets in udp_rcv_segment().</Note>
    </Notes>
    <CVE>CVE-2025-38622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PCI: pnv_php: Fix surprise plug detection and recovery

The existing PowerNV hotplug code did not handle surprise plug events
correctly, leading to a complete failure of the hotplug system after device
removal and a required reboot to detect new devices.

This comes down to two issues:

 1) When a device is surprise removed, often the bridge upstream
    port will cause a PE freeze on the PHB.  If this freeze is not
    cleared, the MSI interrupts from the bridge hotplug notification
    logic will not be received by the kernel, stalling all plug events
    on all slots associated with the PE.

 2) When a device is removed from a slot, regardless of surprise or
    programmatic removal, the associated PHB/PE ls left frozen.
    If this freeze is not cleared via a fundamental reset, skiboot
    is unable to clear the freeze and cannot retrain / rescan the
    slot.  This also requires a reboot to clear the freeze and redetect
    the device in the slot.

Issue the appropriate unfreeze and rescan commands on hotplug events,
and don't oops on hotplug if pci_bus_to_OF_node() returns NULL.

[bhelgaas: tidy comments]</Note>
    </Notes>
    <CVE>CVE-2025-38623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PCI: pnv_php: Clean up allocated IRQs on unplug

When the root of a nested PCIe bridge configuration is unplugged, the
pnv_php driver leaked the allocated IRQ resources for the child bridges'
hotplug event notifications, resulting in a panic.

Fix this by walking all child buses and deallocating all its IRQ resources
before calling pci_hp_remove_devices().

Also modify the lifetime of the workqueue at struct pnv_php_slot::wq so
that it is only destroyed in pnv_php_free_slot(), instead of
pnv_php_disable_irq(). This is required since pnv_php_disable_irq() will
now be called by workers triggered by hot unplug interrupts, so the
workqueue needs to stay allocated.

The abridged kernel panic that occurs without this patch is as follows:

  WARNING: CPU: 0 PID: 687 at kernel/irq/msi.c:292 msi_device_data_release+0x6c/0x9c
  CPU: 0 UID: 0 PID: 687 Comm: bash Not tainted 6.14.0-rc5+ #2
  Call Trace:
   msi_device_data_release+0x34/0x9c (unreliable)
   release_nodes+0x64/0x13c
   devres_release_all+0xc0/0x140
   device_del+0x2d4/0x46c
   pci_destroy_dev+0x5c/0x194
   pci_hp_remove_devices+0x90/0x128
   pci_hp_remove_devices+0x44/0x128
   pnv_php_disable_slot+0x54/0xd4
   power_write_file+0xf8/0x18c
   pci_slot_attr_store+0x40/0x5c
   sysfs_kf_write+0x64/0x78
   kernfs_fop_write_iter+0x1b0/0x290
   vfs_write+0x3bc/0x50c
   ksys_write+0x84/0x140
   system_call_exception+0x124/0x230
   system_call_vectored_common+0x15c/0x2ec

[bhelgaas: tidy comments]</Note>
    </Notes>
    <CVE>CVE-2025-38624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: Fix release of uninitialized resources on error path

The commit in the fixes tag made sure that mlx5_vdpa_free()
is the single entrypoint for removing the vdpa device resources
added in mlx5_vdpa_dev_add(), even in the cleanup path of
mlx5_vdpa_dev_add().

This means that all functions from mlx5_vdpa_free() should be able to
handle uninitialized resources. This was not the case though:
mlx5_vdpa_destroy_mr_resources() and mlx5_cmd_cleanup_async_ctx()
were not able to do so. This caused the splat below when adding
a vdpa device without a MAC address.

This patch fixes these remaining issues:

- Makes mlx5_vdpa_destroy_mr_resources() return early if called on
  uninitialized resources.

- Moves mlx5_cmd_init_async_ctx() early on during device addition
  because it can't fail. This means that mlx5_cmd_cleanup_async_ctx()
  also can't fail. To mirror this, move the call site of
  mlx5_cmd_cleanup_async_ctx() in mlx5_vdpa_free().

An additional comment was added in mlx5_vdpa_free() to document
the expectations of functions called from this context.

Splat:

  mlx5_core 0000:b5:03.2: mlx5_vdpa_dev_add:3950:(pid 2306) warning: No mac address provisioned?
  ------------[ cut here ]------------
  WARNING: CPU: 13 PID: 2306 at kernel/workqueue.c:4207 __flush_work+0x9a/0xb0
  [...]
  Call Trace:
   &lt;TASK&gt;
   ? __try_to_del_timer_sync+0x61/0x90
   ? __timer_delete_sync+0x2b/0x40
   mlx5_vdpa_destroy_mr_resources+0x1c/0x40 [mlx5_vdpa]
   mlx5_vdpa_free+0x45/0x160 [mlx5_vdpa]
   vdpa_release_dev+0x1e/0x50 [vdpa]
   device_release+0x31/0x90
   kobject_cleanup+0x37/0x130
   mlx5_vdpa_dev_add+0x327/0x890 [mlx5_vdpa]
   vdpa_nl_cmd_dev_add_set_doit+0x2c1/0x4d0 [vdpa]
   genl_family_rcv_msg_doit+0xd8/0x130
   genl_family_rcv_msg+0x14b/0x220
   ? __pfx_vdpa_nl_cmd_dev_add_set_doit+0x10/0x10 [vdpa]
   genl_rcv_msg+0x47/0xa0
   ? __pfx_genl_rcv_msg+0x10/0x10
   netlink_rcv_skb+0x53/0x100
   genl_rcv+0x24/0x40
   netlink_unicast+0x27b/0x3b0
   netlink_sendmsg+0x1f7/0x430
   __sys_sendto+0x1fa/0x210
   ? ___pte_offset_map+0x17/0x160
   ? next_uptodate_folio+0x85/0x2b0
   ? percpu_counter_add_batch+0x51/0x90
   ? filemap_map_pages+0x515/0x660
   __x64_sys_sendto+0x20/0x30
   do_syscall_64+0x7b/0x2c0
   ? do_read_fault+0x108/0x220
   ? do_pte_missing+0x14a/0x3e0
   ? __handle_mm_fault+0x321/0x730
   ? count_memcg_events+0x13f/0x180
   ? handle_mm_fault+0x1fb/0x2d0
   ? do_user_addr_fault+0x20c/0x700
   ? syscall_exit_work+0x104/0x140
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f0c25b0feca
  [...]
  ---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2025-38628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref

fb_add_videomode() can fail with -ENOMEM when its internal kmalloc() cannot
allocate a struct fb_modelist.  If that happens, the modelist stays empty but
the driver continues to register.  Add a check for its return value to prevent
poteintial null-ptr-deref, which is similar to the commit 17186f1f90d3 ("fbdev:
Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var").</Note>
    </Notes>
    <CVE>CVE-2025-38630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pinmux: fix race causing mux_owner NULL with active mux_usecount

commit 5a3e85c3c397 ("pinmux: Use sequential access to access
desc-&gt;pinmux data") tried to address the issue when two client of the
same gpio calls pinctrl_select_state() for the same functionality, was
resulting in NULL pointer issue while accessing desc-&gt;mux_owner.
However, issue was not completely fixed due to the way it was handled
and it can still result in the same NULL pointer.

The issue occurs due to the following interleaving:

     cpu0 (process A)                   cpu1 (process B)

      pin_request() {                   pin_free() {

                                         mutex_lock()
                                         desc-&gt;mux_usecount--; //becomes 0
                                         ..
                                         mutex_unlock()

  mutex_lock(desc-&gt;mux)
  desc-&gt;mux_usecount++; // becomes 1
  desc-&gt;mux_owner = owner;
  mutex_unlock(desc-&gt;mux)

                                         mutex_lock(desc-&gt;mux)
                                         desc-&gt;mux_owner = NULL;
                                         mutex_unlock(desc-&gt;mux)

This sequence leads to a state where the pin appears to be in use
(`mux_usecount == 1`) but has no owner (`mux_owner == NULL`), which can
cause NULL pointer on next pin_request on the same pin.

Ensure that updates to mux_usecount and mux_owner are performed
atomically under the same lock. Only clear mux_owner when mux_usecount
reaches zero and no new owner has been assigned.</Note>
    </Notes>
    <CVE>CVE-2025-38632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

power: supply: cpcap-charger: Fix null check for power_supply_get_by_name

In the cpcap_usb_detect() function, the power_supply_get_by_name()
function may return `NULL` instead of an error pointer.
To prevent potential null pointer dereferences, Added a null check.</Note>
    </Notes>
    <CVE>CVE-2025-38634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: davinci: Add NULL check in davinci_lpsc_clk_register()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
davinci_lpsc_clk_register() does not check for this case, which results
in a NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue and ensuring
no resources are left allocated.</Note>
    </Notes>
    <CVE>CVE-2025-38635</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_nfacct: don't assume acct name is null-terminated

BUG: KASAN: slab-out-of-bounds in .. lib/vsprintf.c:721
Read of size 1 at addr ffff88801eac95c8 by task syz-executor183/5851
[..]
 string+0x231/0x2b0 lib/vsprintf.c:721
 vsnprintf+0x739/0xf00 lib/vsprintf.c:2874
 [..]
 nfacct_mt_checkentry+0xd2/0xe0 net/netfilter/xt_nfacct.c:41
 xt_check_match+0x3d1/0xab0 net/netfilter/x_tables.c:523

nfnl_acct_find_get() handles non-null input, but the error
printk relied on its presence.</Note>
    </Notes>
    <CVE>CVE-2025-38639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Disable migration in nf_hook_run_bpf().

syzbot reported that the netfilter bpf prog can be called without
migration disabled in xmit path.

Then the assertion in __bpf_prog_run() fails, triggering the splat
below. [0]

Let's use bpf_prog_run_pin_on_cpu() in nf_hook_run_bpf().

[0]:
BUG: assuming non migratable context at ./include/linux/filter.h:703
in_atomic(): 0, irqs_disabled(): 0, migration_disabled() 0 pid: 5829, name: sshd-session
3 locks held by sshd-session/5829:
 #0: ffff88807b4e4218 (sk_lock-AF_INET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1667 [inline]
 #0: ffff88807b4e4218 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x20/0x50 net/ipv4/tcp.c:1395
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: __ip_queue_xmit+0x69/0x26c0 net/ipv4/ip_output.c:470
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: nf_hook+0xb2/0x680 include/linux/netfilter.h:241
CPU: 0 UID: 0 PID: 5829 Comm: sshd-session Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
 __cant_migrate kernel/sched/core.c:8860 [inline]
 __cant_migrate+0x1c7/0x250 kernel/sched/core.c:8834
 __bpf_prog_run include/linux/filter.h:703 [inline]
 bpf_prog_run include/linux/filter.h:725 [inline]
 nf_hook_run_bpf+0x83/0x1e0 net/netfilter/nf_bpf_link.c:20
 nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
 nf_hook_slow+0xbb/0x200 net/netfilter/core.c:623
 nf_hook+0x370/0x680 include/linux/netfilter.h:272
 NF_HOOK_COND include/linux/netfilter.h:305 [inline]
 ip_output+0x1bc/0x2a0 net/ipv4/ip_output.c:433
 dst_output include/net/dst.h:459 [inline]
 ip_local_out net/ipv4/ip_output.c:129 [inline]
 __ip_queue_xmit+0x1d7d/0x26c0 net/ipv4/ip_output.c:527
 __tcp_transmit_skb+0x2686/0x3e90 net/ipv4/tcp_output.c:1479
 tcp_transmit_skb net/ipv4/tcp_output.c:1497 [inline]
 tcp_write_xmit+0x1274/0x84e0 net/ipv4/tcp_output.c:2838
 __tcp_push_pending_frames+0xaf/0x390 net/ipv4/tcp_output.c:3021
 tcp_push+0x225/0x700 net/ipv4/tcp.c:759
 tcp_sendmsg_locked+0x1870/0x42b0 net/ipv4/tcp.c:1359
 tcp_sendmsg+0x2e/0x50 net/ipv4/tcp.c:1396
 inet_sendmsg+0xb9/0x140 net/ipv4/af_inet.c:851
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg net/socket.c:727 [inline]
 sock_write_iter+0x4aa/0x5b0 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x6c7/0x1150 fs/read_write.c:686
 ksys_write+0x1f8/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fe7d365d407
Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
RSP:</Note>
    </Notes>
    <CVE>CVE-2025-38640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()

Callers of wdev_chandef() must hold the wiphy mutex.

But the worker cfg80211_propagate_cac_done_wk() never takes the lock.
Which triggers the warning below with the mesh_peer_connected_dfs
test from hostapd and not (yet) released mac80211 code changes:

WARNING: CPU: 0 PID: 495 at net/wireless/chan.c:1552 wdev_chandef+0x60/0x165
Modules linked in:
CPU: 0 UID: 0 PID: 495 Comm: kworker/u4:2 Not tainted 6.14.0-rc5-wt-g03960e6f9d47 #33 13c287eeabfe1efea01c0bcc863723ab082e17cf
Workqueue: cfg80211 cfg80211_propagate_cac_done_wk
Stack:
 00000000 00000001 ffffff00 6093267c
 00000000 6002ec30 6d577c50 60037608
 00000000 67e8d108 6063717b 00000000
Call Trace:
 [&lt;6002ec30&gt;] ? _printk+0x0/0x98
 [&lt;6003c2b3&gt;] show_stack+0x10e/0x11a
 [&lt;6002ec30&gt;] ? _printk+0x0/0x98
 [&lt;60037608&gt;] dump_stack_lvl+0x71/0xb8
 [&lt;6063717b&gt;] ? wdev_chandef+0x60/0x165
 [&lt;6003766d&gt;] dump_stack+0x1e/0x20
 [&lt;6005d1b7&gt;] __warn+0x101/0x20f
 [&lt;6005d3a8&gt;] warn_slowpath_fmt+0xe3/0x15d
 [&lt;600b0c5c&gt;] ? mark_lock.part.0+0x0/0x4ec
 [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16
 [&lt;600b11a2&gt;] ? mark_held_locks+0x5a/0x6e
 [&lt;6005d2c5&gt;] ? warn_slowpath_fmt+0x0/0x15d
 [&lt;60052e53&gt;] ? unblock_signals+0x3a/0xe7
 [&lt;60052f2d&gt;] ? um_set_signals+0x2d/0x43
 [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16
 [&lt;607508b2&gt;] ? lock_is_held_type+0x207/0x21f
 [&lt;6063717b&gt;] wdev_chandef+0x60/0x165
 [&lt;605f89b4&gt;] regulatory_propagate_dfs_state+0x247/0x43f
 [&lt;60052f00&gt;] ? um_set_signals+0x0/0x43
 [&lt;605e6bfd&gt;] cfg80211_propagate_cac_done_wk+0x3a/0x4a
 [&lt;6007e460&gt;] process_scheduled_works+0x3bc/0x60e
 [&lt;6007d0ec&gt;] ? move_linked_works+0x4d/0x81
 [&lt;6007d120&gt;] ? assign_work+0x0/0xaa
 [&lt;6007f81f&gt;] worker_thread+0x220/0x2dc
 [&lt;600786ef&gt;] ? set_pf_worker+0x0/0x57
 [&lt;60087c96&gt;] ? to_kthread+0x0/0x43
 [&lt;6008ab3c&gt;] kthread+0x2d3/0x2e2
 [&lt;6007f5ff&gt;] ? worker_thread+0x0/0x2dc
 [&lt;6006c05b&gt;] ? calculate_sigpending+0x0/0x56
 [&lt;6003b37d&gt;] new_thread_handler+0x4a/0x64
irq event stamp: 614611
hardirqs last  enabled at (614621): [&lt;00000000600bc96b&gt;] __up_console_sem+0x82/0xaf
hardirqs last disabled at (614630): [&lt;00000000600bc92c&gt;] __up_console_sem+0x43/0xaf
softirqs last  enabled at (614268): [&lt;00000000606c55c6&gt;] __ieee80211_wake_queue+0x933/0x985
softirqs last disabled at (614266): [&lt;00000000606c52d6&gt;] __ieee80211_wake_queue+0x643/0x985</Note>
    </Notes>
    <CVE>CVE-2025-38643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: reject TDLS operations when station is not associated

syzbot triggered a WARN in ieee80211_tdls_oper() by sending
NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,
before association completed and without prior TDLS setup.

This left internal state like sdata-&gt;u.mgd.tdls_peer uninitialized,
leading to a WARN_ON() in code paths that assumed it was valid.

Reject the operation early if not in station mode or not associated.</Note>
    </Notes>
    <CVE>CVE-2025-38644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Check device memory pointer before usage

Add a NULL check before accessing device memory to prevent a crash if
dev-&gt;dm allocation in mlx5_init_once() fails.</Note>
    </Notes>
    <CVE>CVE-2025-38645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band

With a quite rare chance, RX report might be problematic to make SW think
a packet is received on 6 GHz band even if the chip does not support 6 GHz
band actually. Since SW won't initialize stuffs for unsupported bands, NULL
dereference will happen then in the sequence, rtw89_vif_rx_stats_iter() -&gt;
rtw89_core_cancel_6ghz_probe_tx(). So, add a check to avoid it.

The following is a crash log for this case.

 BUG: kernel NULL pointer dereference, address: 0000000000000032
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 1 PID: 1907 Comm: irq/131-rtw89_p Tainted: G     U             6.6.56-05896-g89f5fb0eb30b #1 (HASH:1400 4)
 Hardware name: Google Telith/Telith, BIOS Google_Telith.15217.747.0 11/12/2024
 RIP: 0010:rtw89_vif_rx_stats_iter+0xd2/0x310 [rtw89_core]
 Code: 4c 89 7d c8 48 89 55 c0 49 8d 44 24 02 48 89 45 b8 45 31 ff eb 11
 41 c6 45 3a 01 41 b7 01 4d 8b 6d 00 4d 39 f5 74 42 8b 43 10 &lt;41&gt; 33 45
 32 0f b7 4b 14 66 41 33 4d 36 0f b7 c9 09 c1 74 d8 4d 85
 RSP: 0018:ffff9f3080138ca0 EFLAGS: 00010246
 RAX: 00000000b8bf5770 RBX: ffff91b5e8c639c0 RCX: 0000000000000011
 RDX: ffff91b582de1be8 RSI: 0000000000000000 RDI: ffff91b5e8c639e6
 RBP: ffff9f3080138d00 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff91b59de70000 R11: ffffffffc069be50 R12: ffff91b5e8c639e4
 R13: 0000000000000000 R14: ffff91b5828020b8 R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff91b8efa40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000032 CR3: 00000002bf838000 CR4: 0000000000750ee0
 PKRU: 55555554
 Call Trace:
  &lt;IRQ&gt;
  ? __die_body+0x68/0xb0
  ? page_fault_oops+0x379/0x3e0
  ? exc_page_fault+0x4f/0xa0
  ? asm_exc_page_fault+0x22/0x30
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ? rtw89_vif_rx_stats_iter+0xd2/0x310 [rtw89_core (HASH:1400 5)]
  __iterate_interfaces+0x59/0x110 [mac80211 (HASH:1400 6)]
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ieee80211_iterate_active_interfaces_atomic+0x36/0x50 [mac80211 (HASH:1400 6)]
  rtw89_core_rx_to_mac80211+0xfd/0x1b0 [rtw89_core (HASH:1400 5)]
  rtw89_core_rx+0x43a/0x980 [rtw89_core (HASH:1400 5)]</Note>
    </Notes>
    <CVE>CVE-2025-38646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hfsplus: remove mutex_lock check in hfsplus_free_extents

Syzbot reported an issue in hfsplus filesystem:

------------[ cut here ]------------
WARNING: CPU: 0 PID: 4400 at fs/hfsplus/extents.c:346
	hfsplus_free_extents+0x700/0xad0
Call Trace:
&lt;TASK&gt;
hfsplus_file_truncate+0x768/0xbb0 fs/hfsplus/extents.c:606
hfsplus_write_begin+0xc2/0xd0 fs/hfsplus/inode.c:56
cont_expand_zero fs/buffer.c:2383 [inline]
cont_write_begin+0x2cf/0x860 fs/buffer.c:2446
hfsplus_write_begin+0x86/0xd0 fs/hfsplus/inode.c:52
generic_cont_expand_simple+0x151/0x250 fs/buffer.c:2347
hfsplus_setattr+0x168/0x280 fs/hfsplus/inode.c:263
notify_change+0xe38/0x10f0 fs/attr.c:420
do_truncate+0x1fb/0x2e0 fs/open.c:65
do_sys_ftruncate+0x2eb/0x380 fs/open.c:193
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

To avoid deadlock, Commit 31651c607151 ("hfsplus: avoid deadlock
on file truncation") unlock extree before hfsplus_free_extents(),
and add check wheather extree is locked in hfsplus_free_extents().

However, when operations such as hfsplus_file_release,
hfsplus_setattr, hfsplus_unlink, and hfsplus_get_block are executed
concurrently in different files, it is very likely to trigger the
WARN_ON, which will lead syzbot and xfstest to consider it as an
abnormality.

The comment above this warning also describes one of the easy
triggering situations, which can easily trigger and cause
xfstest&amp;syzbot to report errors.

[task A]			[task B]
-&gt;hfsplus_file_release
  -&gt;hfsplus_file_truncate
    -&gt;hfs_find_init
      -&gt;mutex_lock
    -&gt;mutex_unlock
				-&gt;hfsplus_write_begin
				  -&gt;hfsplus_get_block
				    -&gt;hfsplus_file_extend
				      -&gt;hfsplus_ext_read_extent
				        -&gt;hfs_find_init
					  -&gt;mutex_lock
    -&gt;hfsplus_free_extents
      WARN_ON(mutex_is_locked) !!!

Several threads could try to lock the shared extents tree.
And warning can be triggered in one thread when another thread
has locked the tree. This is the wrong behavior of the code and
we need to remove the warning.</Note>
    </Notes>
    <CVE>CVE-2025-38650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start()

Preserve the error code if iwl_setup_deferred_work() fails.  The current
code returns ERR_PTR(0) (which is NULL) on this path.  I believe the
missing error code potentially leads to a use after free involving
debugfs.</Note>
    </Notes>
    <CVE>CVE-2025-38656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gfs2: No more self recovery

When a node withdraws and it turns out that it is the only node that has
the filesystem mounted, gfs2 currently tries to replay the local journal
to bring the filesystem back into a consistent state.  Not only is that
a very bad idea, it has also never worked because gfs2_recover_func()
will refuse to do anything during a withdraw.

However, before even getting to this point, gfs2_recover_func()
dereferences sdp-&gt;sd_jdesc-&gt;jd_inode.  This was a use-after-free before
commit 04133b607a78 ("gfs2: Prevent double iput for journal on error")
and is a NULL pointer dereference since then.

Simply get rid of self recovery to fix that.</Note>
    </Notes>
    <CVE>CVE-2025-38659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

[ceph] parse_longname(): strrchr() expects NUL-terminated string

... and parse_longname() is not guaranteed that.  That's the reason
why it uses kmemdup_nul() to build the argument for kstrtou64();
the problem is, kstrtou64() is not the only thing that need it.

Just get a NUL-terminated copy of the entire thing and be done
with that...</Note>
    </Notes>
    <CVE>CVE-2025-38660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: reject invalid file types when reading inodes

To prevent inodes with invalid file types from tripping through the vfs
and causing malfunctions or assertion failures, add a missing sanity check
when reading an inode from a block device.  If the file type is not valid,
treat it as a filesystem error.</Note>
    </Notes>
    <CVE>CVE-2025-38663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ice: Fix a null pointer dereference in ice_copy_and_init_pkg()

Add check for the return value of devm_kmemdup()
to prevent potential null pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2025-38664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode

Andrei Lalaev reported a NULL pointer deref when a CAN device is
restarted from Bus Off and the driver does not implement the struct
can_priv::do_set_mode callback.

There are 2 code path that call struct can_priv::do_set_mode:
- directly by a manual restart from the user space, via
  can_changelink()
- delayed automatic restart after bus off (deactivated by default)

To prevent the NULL pointer deference, refuse a manual restart or
configure the automatic restart delay in can_changelink() and report
the error via extack to user space.

As an additional safety measure let can_restart() return an error if
can_priv::do_set_mode is not set instead of dereferencing it
unchecked.</Note>
    </Notes>
    <CVE>CVE-2025-38665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix NULL dereference on unbind due to stale coupling data

Failing to reset coupling_desc.n_coupled after freeing coupled_rdevs can
lead to NULL pointer dereference when regulators are accessed post-unbind.

This can happen during runtime PM or other regulator operations that rely
on coupling metadata.

For example, on ridesx4, unbinding the 'reg-dummy' platform device triggers
a panic in regulator_lock_recursive() due to stale coupling state.

Ensure n_coupled is set to 0 to prevent access to invalid pointers.</Note>
    </Notes>
    <CVE>CVE-2025-38668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()

`cpu_switch_to()` and `call_on_irq_stack()` manipulate SP to change
to different stacks along with the Shadow Call Stack if it is enabled.
Those two stack changes cannot be done atomically and both functions
can be interrupted by SErrors or Debug Exceptions which, though unlikely,
is very much broken : if interrupted, we can end up with mismatched stacks
and Shadow Call Stack leading to clobbered stacks.

In `cpu_switch_to()`, it can happen when SP_EL0 points to the new task,
but x18 stills points to the old task's SCS. When the interrupt handler
tries to save the task's SCS pointer, it will save the old task
SCS pointer (x18) into the new task struct (pointed to by SP_EL0),
clobbering it.

In `call_on_irq_stack()`, it can happen when switching from the task stack
to the IRQ stack and when switching back. In both cases, we can be
interrupted when the SCS pointer points to the IRQ SCS, but SP points to
the task stack. The nested interrupt handler pushes its return addresses
on the IRQ SCS. It then detects that SP points to the task stack,
calls `call_on_irq_stack()` and clobbers the task SCS pointer with
the IRQ SCS pointer, which it will also use !

This leads to tasks returning to addresses on the wrong SCS,
or even on the IRQ SCS, triggering kernel panics via CONFIG_VMAP_STACK
or FPAC if enabled.

This is possible on a default config, but unlikely.
However, when enabling CONFIG_ARM64_PSEUDO_NMI, DAIF is unmasked and
instead the GIC is responsible for filtering what interrupts the CPU
should receive based on priority.
Given the goal of emulating NMIs, pseudo-NMIs can be received by the CPU
even in `cpu_switch_to()` and `call_on_irq_stack()`, possibly *very*
frequently depending on the system configuration and workload, leading
to unpredictable kernel panics.

Completely mask DAIF in `cpu_switch_to()` and restore it when returning.
Do the same in `call_on_irq_stack()`, but restore and mask around
the branch.
Mask DAIF even if CONFIG_SHADOW_CALL_STACK is not enabled for consistency
of behaviour between all configurations.

Introduce and use an assembly macro for saving and masking DAIF,
as the existing one saves but only masks IF.</Note>
    </Notes>
    <CVE>CVE-2025-38670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i2c: qup: jump out of the loop in case of timeout

Original logic only sets the return value but doesn't jump out of the
loop if the bus is kept active by a client. This is not expected. A
malicious or buggy i2c client can hang the kernel in this case and
should be avoided. This is observed during a long time test with a
PCA953x GPIO extender.

Fix it by changing the logic to not only sets the return value, but also
jumps out of the loop and return to the caller with -ETIMEDOUT.</Note>
    </Notes>
    <CVE>CVE-2025-38671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Avoid stack buffer overflow from kernel cmdline

While the kernel command line is considered trusted in most environments,
avoid writing 1 byte past the end of "acpiid" if the "str" argument is
maximum length.</Note>
    </Notes>
    <CVE>CVE-2025-38676</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject duplicate device on updates

A chain/flowtable update with duplicated devices in the same batch is
possible. Unfortunately, netdev event path only removes the first
device that is found, leaving unregistered the hook of the duplicated
device.

Check if a duplicated device exists in the transaction batch, bail out
with EEXIST in such case.

WARNING is hit when unregistering the hook:

 [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150
 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                  6.16.0+ #170 PREEMPT(full)
 [...]
 [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150</Note>
    </Notes>
    <CVE>CVE-2025-38678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: venus: Fix OOB read due to missing payload bound check

Currently, The event_seq_changed() handler processes a variable number
of properties sent by the firmware. The number of properties is indicated
by the firmware and used to iterate over the payload. However, the
payload size is not being validated against the actual message length.

This can lead to out-of-bounds memory access if the firmware provides a
property count that exceeds the data available in the payload. Such a
condition can result in kernel crashes or potential information leaks if
memory beyond the buffer is accessed.

Fix this by properly validating the remaining size of the payload before
each property access and updating bounds accordingly as properties are
parsed.

This ensures that property parsing is safely bounded within the received
message buffer and protects against malformed or malicious firmware
behavior.</Note>
    </Notes>
    <CVE>CVE-2025-38679</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: use old 'nbands' while purging unused classes

Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify()
after recent changes from Lion [2]. The problem is: in ets_qdisc_change()
we purge unused DWRR queues; the value of 'q-&gt;nbands' is the new one, and
the cleanup should be done with the old one. The problem is here since my
first attempts to fix ets_qdisc_change(), but it surfaced again after the
recent qdisc len accounting fixes. Fix it purging idle DWRR queues before
assigning a new value of 'q-&gt;nbands', so that all purge operations find a
consistent configuration:

 - old 'q-&gt;nbands' because it's needed by ets_class_find()
 - old 'q-&gt;nstrict' because it's needed by ets_class_is_strict()

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 62 UID: 0 PID: 39457 Comm: tc Kdump: loaded Not tainted 6.12.0-116.el10.x86_64 #1 PREEMPT(voluntary)
 Hardware name: Dell Inc. PowerEdge R640/06DKY5, BIOS 2.12.2 07/09/2021
 RIP: 0010:__list_del_entry_valid_or_report+0x4/0x80
 Code: ff 4c 39 c7 0f 84 39 19 8e ff b8 01 00 00 00 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa &lt;48&gt; 8b 17 48 8b 4f 08 48 85 d2 0f 84 56 19 8e ff 48 85 c9 0f 84 ab
 RSP: 0018:ffffba186009f400 EFLAGS: 00010202
 RAX: 00000000000000d6 RBX: 0000000000000000 RCX: 0000000000000004
 RDX: ffff9f0fa29b69c0 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffffffc12c2400 R08: 0000000000000008 R09: 0000000000000004
 R10: ffffffffffffffff R11: 0000000000000004 R12: 0000000000000000
 R13: ffff9f0f8cfe0000 R14: 0000000000100005 R15: 0000000000000000
 FS:  00007f2154f37480(0000) GS:ffff9f269c1c0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000001530be001 CR4: 00000000007726f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ets_class_qlen_notify+0x65/0x90 [sch_ets]
  qdisc_tree_reduce_backlog+0x74/0x110
  ets_qdisc_change+0x630/0xa40 [sch_ets]
  __tc_modify_qdisc.constprop.0+0x216/0x7f0
  tc_modify_qdisc+0x7c/0x120
  rtnetlink_rcv_msg+0x145/0x3f0
  netlink_rcv_skb+0x53/0x100
  netlink_unicast+0x245/0x390
  netlink_sendmsg+0x21b/0x470
  ____sys_sendmsg+0x39d/0x3d0
  ___sys_sendmsg+0x9a/0xe0
  __sys_sendmsg+0x7a/0xd0
  do_syscall_64+0x7d/0x160
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 RIP: 0033:0x7f2155114084
 Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d 25 f0 0c 00 00 74 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
 RSP: 002b:00007fff1fd7a988 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000560ec063e5e0 RCX: 00007f2155114084
 RDX: 0000000000000000 RSI: 00007fff1fd7a9f0 RDI: 0000000000000003
 RBP: 00007fff1fd7aa60 R08: 0000000000000010 R09: 000000000000003f
 R10: 0000560ee9b3a010 R11: 0000000000000202 R12: 00007fff1fd7aae0
 R13: 000000006891ccde R14: 0000560ec063e5e0 R15: 00007fff1fd7aad0
  &lt;/TASK&gt;

 [1] https://lore.kernel.org/netdev/e08c7f4a6882f260011909a868311c6e9b54f3e4.1639153474.git.dcaratti@redhat.com/
 [2] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/</Note>
    </Notes>
    <CVE>CVE-2025-38684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr

A syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data()
when an inode had the INLINE_DATA_FL flag set but was missing the
system.data extended attribute.

Since this can happen due to a maiciouly fuzzed file system, we
shouldn't BUG, but rather, report it as a corrupted file system.

Add similar replacements of BUG_ON with EXT4_ERROR_INODE() ii
ext4_create_inline_data() and ext4_inline_data_truncate().</Note>
    </Notes>
    <CVE>CVE-2025-38701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Make dma-fences compliant with the safe access rules

Xe can free some of the data pointed to by the dma-fences it exports. Most
notably the timeline name can get freed if userspace closes the associated
submit queue. At the same time the fence could have been exported to a
third party (for example a sync_fence fd) which will then cause an use-
after-free on subsequent access.

To make this safe we need to make the driver compliant with the newly
documented dma-fence rules. Driver has to ensure a RCU grace period
between signalling a fence and freeing any data pointed to by said fence.

For the timeline name we simply make the queue be freed via kfree_rcu and
for the shared lock associated with multiple queues we add a RCU grace
period before freeing the per GT structure holding the lock.</Note>
    </Notes>
    <CVE>CVE-2025-38703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix null pointer access

Writing a string without delimiters (' ', '\n', '\0') to the under
gpu_od/fan_ctrl sysfs or pp_power_profile_mode for the CUSTOM profile
will result in a null pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2025-38705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

loop: Avoid updating block size under exclusive owner

Syzbot came up with a reproducer where a loop device block size is
changed underneath a mounted filesystem. This causes a mismatch between
the block device block size and the block size stored in the superblock
causing confusion in various places such as fs/buffer.c. The particular
issue triggered by syzbot was a warning in __getblk_slow() due to
requested buffer size not matching block device block size.

Fix the problem by getting exclusive hold of the loop device to change
its block size. This fails if somebody (such as filesystem) has already
an exclusive ownership of the block device and thus prevents modifying
the loop device under some exclusive owner which doesn't expect it.</Note>
    </Notes>
    <CVE>CVE-2025-38709</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gfs2: Validate i_depth for exhash directories

A fuzzer test introduced corruption that ends up with a depth of 0 in
dir_e_read(), causing an undefined shift by 32 at:

  index = hash &gt;&gt; (32 - dip-&gt;i_depth);

As calculated in an open-coded way in dir_make_exhash(), the minimum
depth for an exhash directory is ilog2(sdp-&gt;sd_hash_ptrs) and 0 is
invalid as sdp-&gt;sd_hash_ptrs is fixed as sdp-&gt;bsize / 16 at mount time.

So we can avoid the undefined behaviour by checking for depth values
lower than the minimum in gfs2_dinode_in(). Values greater than the
maximum are already being checked for there.

Also switch the calculation in dir_make_exhash() to use ilog2() to
clarify how the depth is calculated.

Tested with the syzkaller repro.c and xfstests '-g quick'.</Note>
    </Notes>
    <CVE>CVE-2025-38710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: fix refcount leak on table dump

There is a reference count leak in ctnetlink_dump_table():
      if (res &lt; 0) {
                nf_conntrack_get(&amp;ct-&gt;ct_general); // HERE
                cb-&gt;args[1] = (unsigned long)ct;
                ...

While its very unlikely, its possible that ct == last.
If this happens, then the refcount of ct was already incremented.
This 2nd increment is never undone.

This prevents the conntrack object from being released, which in turn
keeps prevents cnet-&gt;count from dropping back to 0.

This will then block the netns dismantle (or conntrack rmmod) as
nf_conntrack_cleanup_net_list() will wait forever.

This can be reproduced by running conntrack_resize.sh selftest in a loop.
It takes ~20 minutes for me on a preemptible kernel on average before
I see a runaway kworker spinning in nf_conntrack_cleanup_net_list.

One fix would to change this to:
        if (res &lt; 0) {
		if (ct != last)
	                nf_conntrack_get(&amp;ct-&gt;ct_general);

But this reference counting isn't needed in the first place.
We can just store a cookie value instead.

A followup patch will do the same for ctnetlink_exp_dump_table,
it looks to me as if this has the same problem and like
ctnetlink_dump_table, we only need a 'skip hint', not the actual
object so we can apply the same cookie strategy there as well.</Note>
    </Notes>
    <CVE>CVE-2025-38721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

habanalabs: fix UAF in export_dmabuf()

As soon as we'd inserted a file reference into descriptor table, another
thread could close it.  That's fine for the case when all we are doing is
returning that descriptor to userland (it's a race, but it's a userland
race and there's nothing the kernel can do about it).  However, if we
follow fd_install() with any kind of access to objects that would be
destroyed on close (be it the struct file itself or anything destroyed
by its -&gt;release()), we have a UAF.

dma_buf_fd() is a combination of reserving a descriptor and fd_install().
habanalabs export_dmabuf() calls it and then proceeds to access the
objects destroyed on close.  In particular, it grabs an extra reference to
another struct file that will be dropped as part of -&gt;release() for ours;
that "will be" is actually "might have already been".

Fix that by reserving descriptor before anything else and do fd_install()
only when everything had been set up.  As a side benefit, we no longer
have the failure exit with file already created, but reference to
underlying file (as well as -&gt;dmabuf_export_cnt, etc.) not grabbed yet;
unlike dma_buf_fd(), fd_install() can't fail.</Note>
    </Notes>
    <CVE>CVE-2025-38722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: commit partial buffers on retry

Ring provided buffers are potentially only valid within the single
execution context in which they were acquired. io_uring deals with this
and invalidates them on retry. But on the networking side, if
MSG_WAITALL is set, or if the socket is of the streaming type and too
little was processed, then it will hang on to the buffer rather than
recycle or commit it. This is problematic for two reasons:

1) If someone unregisters the provided buffer ring before a later retry,
   then the req-&gt;buf_list will no longer be valid.

2) If multiple sockers are using the same buffer group, then multiple
   receives can consume the same memory. This can cause data corruption
   in the application, as either receive could land in the same
   userspace buffer.

Fix this by disallowing partial retries from pinning a provided buffer
across multiple executions, if ring provided buffers are used.</Note>
    </Notes>
    <CVE>CVE-2025-38730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject: don't leak dst refcount for loopback packets

recent patches to add a WARN() when replacing skb dst entry found an
old bug:

WARNING: include/linux/skbuff.h:1165 skb_dst_check_unset include/linux/skbuff.h:1164 [inline]
WARNING: include/linux/skbuff.h:1165 skb_dst_set include/linux/skbuff.h:1210 [inline]
WARNING: include/linux/skbuff.h:1165 nf_reject_fill_skb_dst+0x2a4/0x330 net/ipv4/netfilter/nf_reject_ipv4.c:234
[..]
Call Trace:
 nf_send_unreach+0x17b/0x6e0 net/ipv4/netfilter/nf_reject_ipv4.c:325
 nft_reject_inet_eval+0x4bc/0x690 net/netfilter/nft_reject_inet.c:27
 expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]
 ..

This is because blamed commit forgot about loopback packets.
Such packets already have a dst_entry attached, even at PRE_ROUTING stage.

Instead of checking hook just check if the skb already has a route
attached to it.</Note>
    </Notes>
    <CVE>CVE-2025-38732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix backlog accounting in qdisc_dequeue_internal

This issue applies for the following qdiscs: hhf, fq, fq_codel, and
fq_pie, and occurs in their change handlers when adjusting to the new
limit. The problem is the following in the values passed to the
subsequent qdisc_tree_reduce_backlog call given a tbf parent:

   When the tbf parent runs out of tokens, skbs of these qdiscs will
   be placed in gso_skb. Their peek handlers are qdisc_peek_dequeued,
   which accounts for both qlen and backlog. However, in the case of
   qdisc_dequeue_internal, ONLY qlen is accounted for when pulling
   from gso_skb. This means that these qdiscs are missing a
   qdisc_qstats_backlog_dec when dropping packets to satisfy the
   new limit in their change handlers.

   One can observe this issue with the following (with tc patched to
   support a limit of 0):

   export TARGET=fq
   tc qdisc del dev lo root
   tc qdisc add dev lo root handle 1: tbf rate 8bit burst 100b latency 1ms
   tc qdisc replace dev lo handle 3: parent 1:1 $TARGET limit 1000
   echo ''; echo 'add child'; tc -s -d qdisc show dev lo
   ping -I lo -f -c2 -s32 -W0.001 127.0.0.1 2&gt;&amp;1 &gt;/dev/null
   echo ''; echo 'after ping'; tc -s -d qdisc show dev lo
   tc qdisc change dev lo handle 3: parent 1:1 $TARGET limit 0
   echo ''; echo 'after limit drop'; tc -s -d qdisc show dev lo
   tc qdisc replace dev lo handle 2: parent 1:1 sfq
   echo ''; echo 'post graft'; tc -s -d qdisc show dev lo

   The second to last show command shows 0 packets but a positive
   number (74) of backlog bytes. The problem becomes clearer in the
   last show command, where qdisc_purge_queue triggers
   qdisc_tree_reduce_backlog with the positive backlog and causes an
   underflow in the tbf parent's backlog (4096 Mb instead of 0).

To fix this issue, the codepath for all clients of qdisc_dequeue_internal
has been simplified: codel, pie, hhf, fq, fq_pie, and fq_codel.
qdisc_dequeue_internal handles the backlog adjustments for all cases that
do not directly use the dequeue handler.

The old fq_codel_change limit adjustment loop accumulated the arguments to
the subsequent qdisc_tree_reduce_backlog call through the cstats field.
However, this is confusing and error prone as fq_codel_dequeue could also
potentially mutate this field (which qdisc_dequeue_internal calls in the
non gso_skb case), so we have unified the code here with other qdiscs.</Note>
    </Notes>
    <CVE>CVE-2025-39677</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd/hsmp: Ensure sock-&gt;metric_tbl_addr is non-NULL

If metric table address is not allocated, accessing metrics_bin will
result in a NULL pointer dereference, so add a check.</Note>
    </Notes>
    <CVE>CVE-2025-39678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper

Since

  923f3a2b48bd ("x86/resctrl: Query LLC monitoring properties once during boot")

resctrl_cpu_detect() has been moved from common CPU initialization code to
the vendor-specific BSP init helper, while Hygon didn't put that call in their
code.

This triggers a division by zero fault during early booting stage on our
machines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries
to calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale.

Add the missing resctrl_cpu_detect() in the Hygon BSP init helper.

  [ bp: Massage commit message. ]</Note>
    </Notes>
    <CVE>CVE-2025-39681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tls: fix handling of zero-length records on the rx_list

Each recvmsg() call must process either
 - only contiguous DATA records (any number of them)
 - one non-DATA record

If the next record has different type than what has already been
processed we break out of the main processing loop. If the record
has already been decrypted (which may be the case for TLS 1.3 where
we don't know type until decryption) we queue the pending record
to the rx_list. Next recvmsg() will pick it up from there.

Queuing the skb to rx_list after zero-copy decrypt is not possible,
since in that case we decrypted directly to the user space buffer,
and we don't have an skb to queue (darg.skb points to the ciphertext
skb for access to metadata like length).

Only data records are allowed zero-copy, and we break the processing
loop after each non-data record. So we should never zero-copy and
then find out that the record type has changed. The corner case
we missed is when the initial record comes from rx_list, and it's
zero length.</Note>
    </Notes>
    <CVE>CVE-2025-39682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs/buffer: fix use-after-free when call bh_read() helper

There's issue as follows:
BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110
Read of size 8 at addr ffffc9000168f7f8 by task swapper/3/0
CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_address_description.constprop.0+0x2c/0x390
 print_report+0xb4/0x270
 kasan_report+0xb8/0xf0
 end_buffer_read_sync+0xe3/0x110
 end_bio_bh_io_sync+0x56/0x80
 blk_update_request+0x30a/0x720
 scsi_end_request+0x51/0x2b0
 scsi_io_completion+0xe3/0x480
 ? scsi_device_unbusy+0x11e/0x160
 blk_complete_reqs+0x7b/0x90
 handle_softirqs+0xef/0x370
 irq_exit_rcu+0xa5/0xd0
 sysvec_apic_timer_interrupt+0x6e/0x90
 &lt;/IRQ&gt;

 Above issue happens when do ntfs3 filesystem mount, issue may happens
 as follows:
           mount                            IRQ
ntfs_fill_super
  read_cache_page
    do_read_cache_folio
      filemap_read_folio
        mpage_read_folio
	 do_mpage_readpage
	  ntfs_get_block_vbo
	   bh_read
	     submit_bh
	     wait_on_buffer(bh);
	                            blk_complete_reqs
				     scsi_io_completion
				      scsi_end_request
				       blk_update_request
				        end_bio_bh_io_sync
					 end_buffer_read_sync
					  __end_buffer_read_notouch
					   unlock_buffer

            wait_on_buffer(bh);--&gt; return will return to caller

					  put_bh
					    --&gt; trigger stack-out-of-bounds
In the mpage_read_folio() function, the stack variable 'map_bh' is
passed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and
wait_on_buffer() returns to continue processing, the stack variable
is likely to be reclaimed. Consequently, during the end_buffer_read_sync()
process, calling put_bh() may result in stack overrun.

If the bh is not allocated on the stack, it belongs to a folio.  Freeing
a buffer head which belongs to a folio is done by drop_buffers() which
will fail to free buffers which are still locked.  So it is safe to call
put_bh() before __end_buffer_read_notouch().</Note>
    </Notes>
    <CVE>CVE-2025-39691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Flush delayed SKBs while releasing RXE resources

When skb packets are sent out, these skb packets still depends on
the rxe resources, for example, QP, sk, when these packets are
destroyed.

If these rxe resources are released when the skb packets are destroyed,
the call traces will appear.

To avoid skb packets hang too long time in some network devices,
a timestamp is added when these skb packets are created. If these
skb packets hang too long time in network devices, these network
devices can free these skb packets to release rxe resources.</Note>
    </Notes>
    <CVE>CVE-2025-39695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net, hsr: reject HSR frame if skb can't hold tag

Receiving HSR frame with insufficient space to hold HSR tag in the skb
can result in a crash (kernel BUG):

[   45.390915] skbuff: skb_under_panic: text:ffffffff86f32cac len:26 put:14 head:ffff888042418000 data:ffff888042417ff4 tail:0xe end:0x180 dev:bridge_slave_1
[   45.392559] ------------[ cut here ]------------
[   45.392912] kernel BUG at net/core/skbuff.c:211!
[   45.393276] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   45.393809] CPU: 1 UID: 0 PID: 2496 Comm: reproducer Not tainted 6.15.0 #12 PREEMPT(undef)
[   45.394433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   45.395273] RIP: 0010:skb_panic+0x15b/0x1d0

&lt;snip registers, remove unreliable trace&gt;

[   45.402911] Call Trace:
[   45.403105]  &lt;IRQ&gt;
[   45.404470]  skb_push+0xcd/0xf0
[   45.404726]  br_dev_queue_push_xmit+0x7c/0x6c0
[   45.406513]  br_forward_finish+0x128/0x260
[   45.408483]  __br_forward+0x42d/0x590
[   45.409464]  maybe_deliver+0x2eb/0x420
[   45.409763]  br_flood+0x174/0x4a0
[   45.410030]  br_handle_frame_finish+0xc7c/0x1bc0
[   45.411618]  br_handle_frame+0xac3/0x1230
[   45.413674]  __netif_receive_skb_core.constprop.0+0x808/0x3df0
[   45.422966]  __netif_receive_skb_one_core+0xb4/0x1f0
[   45.424478]  __netif_receive_skb+0x22/0x170
[   45.424806]  process_backlog+0x242/0x6d0
[   45.425116]  __napi_poll+0xbb/0x630
[   45.425394]  net_rx_action+0x4d1/0xcc0
[   45.427613]  handle_softirqs+0x1a4/0x580
[   45.427926]  do_softirq+0x74/0x90
[   45.428196]  &lt;/IRQ&gt;

This issue was found by syzkaller.

The panic happens in br_dev_queue_push_xmit() once it receives a
corrupted skb with ETH header already pushed in linear data. When it
attempts the skb_push() call, there's not enough headroom and
skb_push() panics.

The corrupted skb is put on the queue by HSR layer, which makes a
sequence of unintended transformations when it receives a specific
corrupted HSR frame (with incomplete TAG).

Fix it by dropping and consuming frames that are not long enough to
contain both ethernet and hsr headers.

Alternative fix would be to check for enough headroom before skb_push()
in br_dev_queue_push_xmit().

In the reproducer, this is injected via AF_PACKET, but I don't easily
see why it couldn't be sent over the wire from adjacent network.

Further Details:

In the reproducer, the following network interface chain is set up:

 ────────────────┐    ────────────────┐
| veth0_to_hsr   ├───┤  hsr_slave0    ┼───┐
 ────────────────┘    ────────────────┘   |
                                          |  ──────┐
                                          ├─┤ hsr0 ├───┐
                                          |  ──────┘   |
 ────────────────┐    ────────────────┐   |            | ────────┐
| veth1_to_hsr   ┼───┤  hsr_slave1    ├───┘             ┤        |
 ────────────────┘    ────────────────┘                 ┼ bridge |
                                                       ||        |
                                                       | ────────┘
                                                       |
                                         ───────┐      |
                                        |  ...  ├──────┘
                                         ───────┘

To trigger the events leading up to crash, reproducer sends a corrupted
HSR fr
---truncated---</Note>
    </Notes>
    <CVE>CVE-2025-39703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix a Null pointer dereference vulnerability

[Why]
A null pointer dereference vulnerability exists in the AMD display driver's
(DC module) cleanup function dc_destruct().
When display control context (dc-&gt;ctx) construction fails
(due to memory allocation failure), this pointer remains NULL.
During subsequent error handling when dc_destruct() is called,
there's no NULL check before dereferencing the perf_trace member
(dc-&gt;ctx-&gt;perf_trace), causing a kernel null pointer dereference crash.

[How]
Check if dc-&gt;ctx is non-NULL before dereferencing.

(Updated commit text and removed unnecessary error message)
(cherry picked from commit 9dd8e2ba268c636c240a918e0a31e6feaee19404)</Note>
    </Notes>
    <CVE>CVE-2025-39705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities

HUBBUB structure is not initialized on DCE hardware, so check if it is NULL
to avoid null dereference while accessing amdgpu_dm_capabilities file in
debugfs.</Note>
    </Notes>
    <CVE>CVE-2025-39707</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls

Both the ACE and CSI driver are missing a mei_cldev_disable() call in
their remove() function.

This causes the mei_cl client to stay part of the mei_device-&gt;file_list
list even though its memory is freed by mei_cl_bus_dev_release() calling
kfree(cldev-&gt;cl).

This leads to a use-after-free when mei_vsc_remove() runs mei_stop()
which first removes all mei bus devices calling mei_ace_remove() and
mei_csi_remove() followed by mei_cl_bus_dev_release() and then calls
mei_cl_all_disconnect() which walks over mei_device-&gt;file_list dereferecing
the just freed cldev-&gt;cl.

And mei_vsc_remove() it self is run at shutdown because of the
platform_device_unregister(tp-&gt;pdev) in vsc_tp_shutdown()

When building a kernel with KASAN this leads to the following KASAN report:

[ 106.634504] ==================================================================
[ 106.634623] BUG: KASAN: slab-use-after-free in mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei
[ 106.634683] Read of size 4 at addr ffff88819cb62018 by task systemd-shutdow/1
[ 106.634729]
[ 106.634767] Tainted: [E]=UNSIGNED_MODULE
[ 106.634770] Hardware name: Dell Inc. XPS 16 9640/09CK4V, BIOS 1.12.0 02/10/2025
[ 106.634773] Call Trace:
[ 106.634777]  &lt;TASK&gt;
...
[ 106.634871] kasan_report (mm/kasan/report.c:221 mm/kasan/report.c:636)
[ 106.634901] mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei
[ 106.634921] mei_cl_all_disconnect (drivers/misc/mei/client.c:2165 (discriminator 4)) mei
[ 106.634941] mei_reset (drivers/misc/mei/init.c:163) mei
...
[ 106.635042] mei_stop (drivers/misc/mei/init.c:348) mei
[ 106.635062] mei_vsc_remove (drivers/misc/mei/mei_dev.h:784 drivers/misc/mei/platform-vsc.c:393) mei_vsc
[ 106.635066] platform_remove (drivers/base/platform.c:1424)

Add the missing mei_cldev_disable() calls so that the mei_cl gets removed
from mei_device-&gt;file_list before it is freed to fix this.</Note>
    </Notes>
    <CVE>CVE-2025-39711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put()

When receiving a vsock packet in the guest, only the virtqueue buffer
size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,
virtio_vsock_skb_rx_put() uses the length from the packet header as the
length argument to skb_put(), potentially resulting in SKB overflow if
the host has gone wonky.

Validate the length as advertised by the packet header before calling
virtio_vsock_skb_rx_put().</Note>
    </Notes>
    <CVE>CVE-2025-39718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not allow relocation of partially dropped subvolumes

[BUG]
There is an internal report that balance triggered transaction abort,
with the following call trace:

  item 85 key (594509824 169 0) itemoff 12599 itemsize 33
          extent refs 1 gen 197740 flags 2
          ref#0: tree block backref root 7
  item 86 key (594558976 169 0) itemoff 12566 itemsize 33
          extent refs 1 gen 197522 flags 2
          ref#0: tree block backref root 7
 ...
 BTRFS error (device loop0): extent item not found for insert, bytenr 594526208 num_bytes 16384 parent 449921024 root_objectid 934 owner 1 offset 0
 BTRFS error (device loop0): failed to run delayed ref for logical 594526208 num_bytes 16384 type 182 action 1 ref_mod 1: -117
 ------------[ cut here ]------------
 BTRFS: Transaction aborted (error -117)
 WARNING: CPU: 1 PID: 6963 at ../fs/btrfs/extent-tree.c:2168 btrfs_run_delayed_refs+0xfa/0x110 [btrfs]

And btrfs check doesn't report anything wrong related to the extent
tree.

[CAUSE]
The cause is a little complex, firstly the extent tree indeed doesn't
have the backref for 594526208.

The extent tree only have the following two backrefs around that bytenr
on-disk:

        item 65 key (594509824 METADATA_ITEM 0) itemoff 13880 itemsize 33
                refs 1 gen 197740 flags TREE_BLOCK
                tree block skinny level 0
                (176 0x7) tree block backref root CSUM_TREE
        item 66 key (594558976 METADATA_ITEM 0) itemoff 13847 itemsize 33
                refs 1 gen 197522 flags TREE_BLOCK
                tree block skinny level 0
                (176 0x7) tree block backref root CSUM_TREE

But the such missing backref item is not an corruption on disk, as the
offending delayed ref belongs to subvolume 934, and that subvolume is
being dropped:

        item 0 key (934 ROOT_ITEM 198229) itemoff 15844 itemsize 439
                generation 198229 root_dirid 256 bytenr 10741039104 byte_limit 0 bytes_used 345571328
                last_snapshot 198229 flags 0x1000000000001(RDONLY) refs 0
                drop_progress key (206324 EXTENT_DATA 2711650304) drop_level 2
                level 2 generation_v2 198229

And that offending tree block 594526208 is inside the dropped range of
that subvolume.  That explains why there is no backref item for that
bytenr and why btrfs check is not reporting anything wrong.

But this also shows another problem, as btrfs will do all the orphan
subvolume cleanup at a read-write mount.

So half-dropped subvolume should not exist after an RW mount, and
balance itself is also exclusive to subvolume cleanup, meaning we
shouldn't hit a subvolume half-dropped during relocation.

The root cause is, there is no orphan item for this subvolume.
In fact there are 5 subvolumes from around 2021 that have the same
problem.

It looks like the original report has some older kernels running, and
caused those zombie subvolumes.

Thankfully upstream commit 8d488a8c7ba2 ("btrfs: fix subvolume/snapshot
deletion not triggered on mount") has long fixed the bug.

[ENHANCEMENT]
For repairing such old fs, btrfs-progs will be enhanced.

Considering how delayed the problem will show up (at run delayed ref
time) and at that time we have to abort transaction already, it is too
late.

Instead here we reject any half-dropped subvolume for reloc tree at the
earliest time, preventing confusion and extra time wasted on debugging
similar bugs.</Note>
    </Notes>
    <CVE>CVE-2025-39738</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix rcu_read_unlock() deadloop due to IRQ work

During rcu_read_unlock_special(), if this happens during irq_exit(), we
can lockup if an IPI is issued. This is because the IPI itself triggers
the irq_exit() path causing a recursive lock up.

This is precisely what Xiongfeng found when invoking a BPF program on
the trace_tick_stop() tracepoint As shown in the trace below. Fix by
managing the irq_work state correctly.

irq_exit()
  __irq_exit_rcu()
    /* in_hardirq() returns false after this */
    preempt_count_sub(HARDIRQ_OFFSET)
    tick_irq_exit()
      tick_nohz_irq_exit()
	    tick_nohz_stop_sched_tick()
	      trace_tick_stop()  /* a bpf prog is hooked on this trace point */
		   __bpf_trace_tick_stop()
		      bpf_trace_run2()
			    rcu_read_unlock_special()
                              /* will send a IPI to itself */
			      irq_work_queue_on(&amp;rdp-&gt;defer_qs_iw, rdp-&gt;cpu);

A simple reproducer can also be obtained by doing the following in
tick_irq_exit(). It will hang on boot without the patch:

  static inline void tick_irq_exit(void)
  {
 +	rcu_read_lock();
 +	WRITE_ONCE(current-&gt;rcu_read_unlock_special.b.need_qs, true);
 +	rcu_read_unlock();
 +

[neeraj: Apply Frederic's suggested fix for PREEMPT_RT]</Note>
    </Notes>
    <CVE>CVE-2025-39744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: shutdown driver when hardware is unreliable

In rare cases, ath10k may lose connection with the PCIe bus due to
some unknown reasons, which could further lead to system crashes during
resuming due to watchdog timeout:

ath10k_pci 0000:01:00.0: wmi command 20486 timeout, restarting hardware
ath10k_pci 0000:01:00.0: already restarting
ath10k_pci 0000:01:00.0: failed to stop WMI vdev 0: -11
ath10k_pci 0000:01:00.0: failed to stop vdev 0: -11
ieee80211 phy0: PM: **** DPM device timeout ****
Call Trace:
 panic+0x125/0x315
 dpm_watchdog_set+0x54/0x54
 dpm_watchdog_handler+0x57/0x57
 call_timer_fn+0x31/0x13c

At this point, all WMI commands will timeout and attempt to restart
device. So set a threshold for consecutive restart failures. If the
threshold is exceeded, consider the hardware is unreliable and all
ath10k operations should be skipped to avoid system crash.

fail_cont_count and pending_recovery are atomic variables, and
do not involve complex conditional logic. Therefore, even if recovery
check and reconfig complete are executed concurrently, the recovery
mechanism will not be broken.

Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1</Note>
    </Notes>
    <CVE>CVE-2025-39746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Add error handling for krealloc in metadata setup

Function msm_ioctl_gem_info_set_metadata() now checks for krealloc
failure and returns -ENOMEM, avoiding potential NULL pointer dereference.
Explicitly avoids __GFP_NOFAIL due to deadlock risks and allocation constraints.

Patchwork: https://patchwork.freedesktop.org/patch/661235/</Note>
    </Notes>
    <CVE>CVE-2025-39747</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rcu: Protect -&gt;defer_qs_iw_pending from data race

On kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is
invoked within an interrupts-disabled region of code [1], it will invoke
rcu_read_unlock_special(), which uses an irq-work handler to force the
system to notice when the RCU read-side critical section actually ends.
That end won't happen until interrupts are enabled at the soonest.

In some kernels, such as those booted with rcutree.use_softirq=y, the
irq-work handler is used unconditionally.

The per-CPU rcu_data structure's -&gt;defer_qs_iw_pending field is
updated by the irq-work handler and is both read and updated by
rcu_read_unlock_special().  This resulted in the following KCSAN splat:

------------------------------------------------------------------------

BUG: KCSAN: data-race in rcu_preempt_deferred_qs_handler / rcu_read_unlock_special

read to 0xffff96b95f42d8d8 of 1 bytes by task 90 on cpu 8:
 rcu_read_unlock_special+0x175/0x260
 __rcu_read_unlock+0x92/0xa0
 rt_spin_unlock+0x9b/0xc0
 __local_bh_enable+0x10d/0x170
 __local_bh_enable_ip+0xfb/0x150
 rcu_do_batch+0x595/0xc40
 rcu_cpu_kthread+0x4e9/0x830
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

write to 0xffff96b95f42d8d8 of 1 bytes by task 88 on cpu 8:
 rcu_preempt_deferred_qs_handler+0x1e/0x30
 irq_work_single+0xaf/0x160
 run_irq_workd+0x91/0xc0
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

no locks held by irq_work/8/88.
irq event stamp: 200272
hardirqs last  enabled at (200272): [&lt;ffffffffb0f56121&gt;] finish_task_switch+0x131/0x320
hardirqs last disabled at (200271): [&lt;ffffffffb25c7859&gt;] __schedule+0x129/0xd70
softirqs last  enabled at (0): [&lt;ffffffffb0ee093f&gt;] copy_process+0x4df/0x1cc0
softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0

------------------------------------------------------------------------

The problem is that irq-work handlers run with interrupts enabled, which
means that rcu_preempt_deferred_qs_handler() could be interrupted,
and that interrupt handler might contain an RCU read-side critical
section, which might invoke rcu_read_unlock_special().  In the strict
KCSAN mode of operation used by RCU, this constitutes a data race on
the -&gt;defer_qs_iw_pending field.

This commit therefore disables interrupts across the portion of the
rcu_preempt_deferred_qs_handler() that updates the -&gt;defer_qs_iw_pending
field.  This suffices because this handler is not a fast path.</Note>
    </Notes>
    <CVE>CVE-2025-39749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/smaps: fix race between smaps_hugetlb_range and migration

smaps_hugetlb_range() handles the pte without holdling ptl, and may be
concurrenct with migration, leaing to BUG_ON in pfn_swap_entry_to_page(). 
The race is as follows.

smaps_hugetlb_range              migrate_pages
  huge_ptep_get
                                   remove_migration_ptes
				   folio_unlock
  pfn_swap_entry_folio
    BUG_ON

To fix it, hold ptl lock in smaps_hugetlb_range().</Note>
    </Notes>
    <CVE>CVE-2025-39754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: remove refcounting in expectation dumpers

Same pattern as previous patch: do not keep the expectation object
alive via refcount, only store a cookie value and then use that
as the skip hint for dump resumption.

AFAICS this has the same issue as the one resolved in the conntrack
dumper, when we do
  if (!refcount_inc_not_zero(&amp;exp-&gt;use))

to increment the refcount, there is a chance that exp == last, which
causes a double-increment of the refcount and subsequent memory leak.</Note>
    </Notes>
    <CVE>CVE-2025-39764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit

The following setup can trigger a WARNING in htb_activate due to
the condition: !cl-&gt;leaf.q-&gt;q.qlen

tc qdisc del dev lo root
tc qdisc add dev lo root handle 1: htb default 1
tc class add dev lo parent 1: classid 1:1 \
       htb rate 64bit
tc qdisc add dev lo parent 1:1 handle f: \
       cake memlimit 1b
ping -I lo -f -c1 -s64 -W0.001 127.0.0.1

This is because the low memlimit leads to a low buffer_limit, which
causes packet dropping. However, cake_enqueue still returns
NET_XMIT_SUCCESS, causing htb_enqueue to call htb_activate with an
empty child qdisc. We should return NET_XMIT_CN when packets are
dropped from the same tin and flow.

I do not believe return value of NET_XMIT_CN is necessary for packet
drops in the case of ack filtering, as that is meant to optimize
performance, not to signal congestion.</Note>
    </Notes>
    <CVE>CVE-2025-39766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM

When performing Generic Segmentation Offload (GSO) on an IPv6 packet that
contains extension headers, the kernel incorrectly requests checksum offload
if the egress device only advertises NETIF_F_IPV6_CSUM feature, which has
a strict contract: it supports checksum offload only for plain TCP or UDP
over IPv6 and explicitly does not support packets with extension headers.
The current GSO logic violates this contract by failing to disable the feature
for packets with extension headers, such as those used in GREoIPv6 tunnels.

This violation results in the device being asked to perform an operation
it cannot support, leading to a `skb_warn_bad_offload` warning and a collapse
of network throughput. While device TSO/USO is correctly bypassed in favor
of software GSO for these packets, the GSO stack must be explicitly told not
to request checksum offload.

Mask NETIF_F_IPV6_CSUM, NETIF_F_TSO6 and NETIF_F_GSO_UDP_L4
in gso_features_check if the IPv6 header contains extension headers to compute
checksum in software.

The exception is a BIG TCP extension, which, as stated in commit
68e068cabd2c6c53 ("net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets"):
"The feature is only enabled on devices that support BIG TCP TSO.
The header is only present for PF_PACKET taps like tcpdump,
and not transmitted by physical devices."

kernel log output (truncated):
WARNING: CPU: 1 PID: 5273 at net/core/dev.c:3535 skb_warn_bad_offload+0x81/0x140
...
Call Trace:
 &lt;TASK&gt;
 skb_checksum_help+0x12a/0x1f0
 validate_xmit_skb+0x1a3/0x2d0
 validate_xmit_skb_list+0x4f/0x80
 sch_direct_xmit+0x1a2/0x380
 __dev_xmit_skb+0x242/0x670
 __dev_queue_xmit+0x3fc/0x7f0
 ip6_finish_output2+0x25e/0x5d0
 ip6_finish_output+0x1fc/0x3f0
 ip6_tnl_xmit+0x608/0xc00 [ip6_tunnel]
 ip6gre_tunnel_xmit+0x1c0/0x390 [ip6_gre]
 dev_hard_start_xmit+0x63/0x1c0
 __dev_queue_xmit+0x6d0/0x7f0
 ip6_finish_output2+0x214/0x5d0
 ip6_finish_output+0x1fc/0x3f0
 ip6_xmit+0x2ca/0x6f0
 ip6_finish_output+0x1fc/0x3f0
 ip6_xmit+0x2ca/0x6f0
 inet6_csk_xmit+0xeb/0x150
 __tcp_transmit_skb+0x555/0xa80
 tcp_write_xmit+0x32a/0xe90
 tcp_sendmsg_locked+0x437/0x1110
 tcp_sendmsg+0x2f/0x50
...
skb linear:   00000000: e4 3d 1a 7d ec 30 e4 3d 1a 7e 5d 90 86 dd 60 0e
skb linear:   00000010: 00 0a 1b 34 3c 40 20 11 00 00 00 00 00 00 00 00
skb linear:   00000020: 00 00 00 00 00 12 20 11 00 00 00 00 00 00 00 00
skb linear:   00000030: 00 00 00 00 00 11 2f 00 04 01 04 01 01 00 00 00
skb linear:   00000040: 86 dd 60 0e 00 0a 1b 00 06 40 20 23 00 00 00 00
skb linear:   00000050: 00 00 00 00 00 00 00 00 00 12 20 23 00 00 00 00
skb linear:   00000060: 00 00 00 00 00 00 00 00 00 11 bf 96 14 51 13 f9
skb linear:   00000070: ae 27 a0 a8 2b e3 80 18 00 40 5b 6f 00 00 01 01
skb linear:   00000080: 08 0a 42 d4 50 d5 4b 70 f8 1a</Note>
    </Notes>
    <CVE>CVE-2025-39770</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix soft lockup in br_multicast_query_expired()

When set multicast_query_interval to a large value, the local variable
'time' in br_multicast_send_query() may overflow. If the time is smaller
than jiffies, the timer will expire immediately, and then call mod_timer()
again, which creates a loop and may trigger the following soft lockup
issue.

  watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]
  CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)
  Call Trace:
   &lt;IRQ&gt;
   __netdev_alloc_skb+0x2e/0x3a0
   br_ip6_multicast_alloc_query+0x212/0x1b70
   __br_multicast_send_query+0x376/0xac0
   br_multicast_send_query+0x299/0x510
   br_multicast_query_expired.constprop.0+0x16d/0x1b0
   call_timer_fn+0x3b/0x2a0
   __run_timers+0x619/0x950
   run_timer_softirq+0x11c/0x220
   handle_softirqs+0x18e/0x560
   __irq_exit_rcu+0x158/0x1a0
   sysvec_apic_timer_interrupt+0x76/0x90
   &lt;/IRQ&gt;

This issue can be reproduced with:
  ip link add br0 type bridge
  echo 1 &gt; /sys/class/net/br0/bridge/multicast_querier
  echo 0xffffffffffffffff &gt;
  	/sys/class/net/br0/bridge/multicast_query_interval
  ip link set dev br0 up

The multicast_startup_query_interval can also cause this issue. Similar to
the commit 99b40610956a ("net: bridge: mcast: add and enforce query
interval minimum"), add check for the query interval maximum to fix this
issue.</Note>
    </Notes>
    <CVE>CVE-2025-39773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jbd2: prevent softlockup in jbd2_log_do_checkpoint()

Both jbd2_log_do_checkpoint() and jbd2_journal_shrink_checkpoint_list()
periodically release j_list_lock after processing a batch of buffers to
avoid long hold times on the j_list_lock. However, since both functions
contend for j_list_lock, the combined time spent waiting and processing
can be significant.

jbd2_journal_shrink_checkpoint_list() explicitly calls cond_resched() when
need_resched() is true to avoid softlockups during prolonged operations.
But jbd2_log_do_checkpoint() only exits its loop when need_resched() is
true, relying on potentially sleeping functions like __flush_batch() or
wait_on_buffer() to trigger rescheduling. If those functions do not sleep,
the kernel may hit a softlockup.

watchdog: BUG: soft lockup - CPU#3 stuck for 156s! [kworker/u129:2:373]
CPU: 3 PID: 373 Comm: kworker/u129:2 Kdump: loaded Not tainted 6.6.0+ #10
Hardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.27 06/13/2017
Workqueue: writeback wb_workfn (flush-7:2)
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : native_queued_spin_lock_slowpath+0x358/0x418
lr : jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]
Call trace:
 native_queued_spin_lock_slowpath+0x358/0x418
 jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]
 __jbd2_log_wait_for_space+0xfc/0x2f8 [jbd2]
 add_transaction_credits+0x3bc/0x418 [jbd2]
 start_this_handle+0xf8/0x560 [jbd2]
 jbd2__journal_start+0x118/0x228 [jbd2]
 __ext4_journal_start_sb+0x110/0x188 [ext4]
 ext4_do_writepages+0x3dc/0x740 [ext4]
 ext4_writepages+0xa4/0x190 [ext4]
 do_writepages+0x94/0x228
 __writeback_single_inode+0x48/0x318
 writeback_sb_inodes+0x204/0x590
 __writeback_inodes_wb+0x54/0xf8
 wb_writeback+0x2cc/0x3d8
 wb_do_writeback+0x2e0/0x2f8
 wb_workfn+0x80/0x2a8
 process_one_work+0x178/0x3e8
 worker_thread+0x234/0x3b8
 kthread+0xf0/0x108
 ret_from_fork+0x10/0x20

So explicitly call cond_resched() in jbd2_log_do_checkpoint() to avoid
softlockup.</Note>
    </Notes>
    <CVE>CVE-2025-39782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: mdt_loader: Ensure we don't read past the ELF header

When the MDT loader is used in remoteproc, the ELF header is sanitized
beforehand, but that's not necessary the case for other clients.

Validate the size of the firmware buffer to ensure that we don't read
past the end as we iterate over the header. e_phentsize and e_shentsize
are validated as well, to ensure that the assumptions about step size in
the traversal are valid.</Note>
    </Notes>
    <CVE>CVE-2025-39787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfrm: Duplicate SPI Handling

The issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI
Netlink message, which triggers the kernel function xfrm_alloc_spi().
This function is expected to ensure uniqueness of the Security Parameter
Index (SPI) for inbound Security Associations (SAs). However, it can
return success even when the requested SPI is already in use, leading
to duplicate SPIs assigned to multiple inbound SAs, differentiated
only by their destination addresses.

This behavior causes inconsistencies during SPI lookups for inbound packets.
Since the lookup may return an arbitrary SA among those with the same SPI,
packet processing can fail, resulting in packet drops.

According to RFC 4301 section 4.4.2 , for inbound processing a unicast SA
is uniquely identified by the SPI and optionally protocol.

Reproducing the Issue Reliably:
To consistently reproduce the problem, restrict the available SPI range in
charon.conf : spi_min = 0x10000000 spi_max = 0x10000002
This limits the system to only 2 usable SPI values.
Next, create more than 2 Child SA. each using unique pair of src/dst address.
As soon as the 3rd Child SA is initiated, it will be assigned a duplicate
SPI, since the SPI pool is already exhausted.
With a narrow SPI range, the issue is consistently reproducible.
With a broader/default range, it becomes rare and unpredictable.

Current implementation:
xfrm_spi_hash() lookup function computes hash using daddr, proto, and family.
So if two SAs have the same SPI but different destination addresses, then
they will:
a. Hash into different buckets
b. Be stored in different linked lists (byspi + h)
c. Not be seen in the same hlist_for_each_entry_rcu() iteration.
As a result, the lookup will result in NULL and kernel allows that Duplicate SPI

Proposed Change:
xfrm_state_lookup_spi_proto() does a truly global search - across all states,
regardless of hash bucket and matches SPI and proto.</Note>
    </Notes>
    <CVE>CVE-2025-39797</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Add error handling for old state CRTC in atomic_disable

Introduce error handling to address an issue where, after a hotplug
event, the cursor continues to update. This situation can lead to a
kernel panic due to accessing the NULL `old_state-&gt;crtc`.

E,g.
Unable to handle kernel NULL pointer dereference at virtual address
Call trace:
 mtk_crtc_plane_disable+0x24/0x140
 mtk_plane_atomic_update+0x8c/0xa8
 drm_atomic_helper_commit_planes+0x114/0x2c8
 drm_atomic_helper_commit_tail_rpm+0x4c/0x158
 commit_tail+0xa0/0x168
 drm_atomic_helper_commit+0x110/0x120
 drm_atomic_commit+0x8c/0xe0
 drm_atomic_helper_update_plane+0xd4/0x128
 __setplane_atomic+0xcc/0x110
 drm_mode_cursor_common+0x250/0x440
 drm_mode_cursor_ioctl+0x44/0x70
 drm_ioctl+0x264/0x5d8
 __arm64_sys_ioctl+0xd8/0x510
 invoke_syscall+0x6c/0xe0
 do_el0_svc+0x68/0xe8
 el0_svc+0x34/0x60
 el0t_64_sync_handler+0x1c/0xf8
 el0t_64_sync+0x180/0x188

Adding NULL pointer checks to ensure stability by preventing operations
on an invalid CRTC state.</Note>
    </Notes>
    <CVE>CVE-2025-39807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/xe/vm: Clear the scratch_pt pointer on error

Avoid triggering a dereference of an error pointer on cleanup in
xe_vm_free_scratch() by clearing any scratch_pt error pointer.

(cherry picked from commit 358ee50ab565f3c8ea32480e9d03127a81ba32f8)</Note>
    </Notes>
    <CVE>CVE-2025-39811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths

Since the buffers are mapped from userspace, it is prudent to use
READ_ONCE() to read the value into a local variable, and use that for
any other actions taken. Having a stable read of the buffer length
avoids worrying about it changing after checking, or being read multiple
times.

Similarly, the buffer may well change in between it being picked and
being committed. Ensure the looping for incremental ring buffer commit
stops if it hits a zero sized buffer, as no further progress can be made
at that point.</Note>
    </Notes>
    <CVE>CVE-2025-39816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: use array_index_nospec with indices that come from guest

min and dest_id are guest-controlled indices. Using array_index_nospec()
after the bounds checks clamps these values to mitigate speculative execution
side-channels.</Note>
    </Notes>
    <CVE>CVE-2025-39823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix race with concurrent opens in rename(2)

Besides sending the rename request to the server, the rename process
also involves closing any deferred close, waiting for outstanding I/O
to complete as well as marking all existing open handles as deleted to
prevent them from deferring closes, which increases the race window
for potential concurrent opens on the target file.

Fix this by unhashing the dentry in advance to prevent any concurrent
opens on the target.</Note>
    </Notes>
    <CVE>CVE-2025-39825</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path

In the error path of hws_pool_buddy_init(), the buddy allocator cleanup
doesn't free the allocator structure itself, causing a memory leak.

Add the missing kfree() to properly release all allocated memory.</Note>
    </Notes>
    <CVE>CVE-2025-39830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow

When an invalid stc_type is provided, the function allocates memory for
shared_stc but jumps to unlock_and_out without freeing it, causing a
memory leak.

Fix by jumping to free_shared_stc label instead to ensure proper cleanup.</Note>
    </Notes>
    <CVE>CVE-2025-39834</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfs: do not propagate ENODATA disk errors into xattr code

ENODATA (aka ENOATTR) has a very specific meaning in the xfs xattr code;
namely, that the requested attribute name could not be found.

However, a medium error from disk may also return ENODATA. At best,
this medium error may escape to userspace as "attribute not found"
when in fact it's an IO (disk) error.

At worst, we may oops in xfs_attr_leaf_get() when we do:

	error = xfs_attr_leaf_hasname(args, &amp;bp);
	if (error == -ENOATTR)  {
		xfs_trans_brelse(args-&gt;trans, bp);
		return error;
	}

because an ENODATA/ENOATTR error from disk leaves us with a null bp,
and the xfs_trans_brelse will then null-deref it.

As discussed on the list, we really need to modify the lower level
IO functions to trap all disk errors and ensure that we don't let
unique errors like this leak up into higher xfs functions - many
like this should be remapped to EIO.

However, this patch directly addresses a reported bug in the xattr
code, and should be safe to backport to stable kernels. A larger-scope
patch to handle more unique errors at lower levels can follow later.

(Note, prior to 07120f1abdff we did not oops, but we did return the
wrong error code to userspace.)</Note>
    </Notes>
    <CVE>CVE-2025-39835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cifs: prevent NULL pointer dereference in UTF16 conversion

There can be a NULL pointer dereference bug here. NULL is passed to
__cifs_sfu_make_node without checks, which passes it unchecked to
cifs_strndup_to_utf16, which in turn passes it to
cifs_local_to_utf16_bytes where '*from' is dereferenced, causing a crash.

This patch adds a check for NULL 'src' in cifs_strndup_to_utf16 and
returns NULL early to prevent dereferencing NULL pointer.

Found by Linux Verification Center (linuxtesting.org) with SVACE</Note>
    </Notes>
    <CVE>CVE-2025-39838</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: prevent release journal inode after journal shutdown

Before calling ocfs2_delete_osb(), ocfs2_journal_shutdown() has already
been executed in ocfs2_dismount_volume(), so osb-&gt;journal must be NULL. 
Therefore, the following calltrace will inevitably fail when it reaches
jbd2_journal_release_jbd_inode().

ocfs2_dismount_volume()-&gt;
  ocfs2_delete_osb()-&gt;
    ocfs2_free_slot_info()-&gt;
      __ocfs2_free_slot_info()-&gt;
        evict()-&gt;
          ocfs2_evict_inode()-&gt;
            ocfs2_clear_inode()-&gt;
	      jbd2_journal_release_jbd_inode(osb-&gt;journal-&gt;j_journal,

Adding osb-&gt;journal checks will prevent null-ptr-deref during the above
execution path.</Note>
    </Notes>
    <CVE>CVE-2025-39842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync()

BUG: kernel NULL pointer dereference, address: 00000000000002ec
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP PTI
CPU: 28 UID: 0 PID: 343 Comm: kworker/28:1 Kdump: loaded Tainted: G        OE       6.17.0-rc2+ #9 NONE
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
Workqueue: smc_hs_wq smc_listen_work [smc]
RIP: 0010:smc_ib_is_sg_need_sync+0x9e/0xd0 [smc]
...
Call Trace:
 &lt;TASK&gt;
 smcr_buf_map_link+0x211/0x2a0 [smc]
 __smc_buf_create+0x522/0x970 [smc]
 smc_buf_create+0x3a/0x110 [smc]
 smc_find_rdma_v2_device_serv+0x18f/0x240 [smc]
 ? smc_vlan_by_tcpsk+0x7e/0xe0 [smc]
 smc_listen_find_device+0x1dd/0x2b0 [smc]
 smc_listen_work+0x30f/0x580 [smc]
 process_one_work+0x18c/0x340
 worker_thread+0x242/0x360
 kthread+0xe7/0x220
 ret_from_fork+0x13a/0x160
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

If the software RoCE device is used, ibdev-&gt;dma_device is a null pointer.
As a result, the problem occurs. Null pointer detection is added to
prevent problems.</Note>
    </Notes>
    <CVE>CVE-2025-39857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tee: fix NULL pointer dereference in tee_shm_put

tee_shm_put have NULL pointer dereference:

__optee_disable_shm_cache --&gt;
	shm = reg_pair_to_ptr(...);//shm maybe return NULL
        tee_shm_free(shm); --&gt;
		tee_shm_put(shm);//crash

Add check in tee_shm_put to fix it.

panic log:
Unable to handle kernel paging request at virtual address 0000000000100cca
Mem abort info:
ESR = 0x0000000096000004
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x04: level 0 translation fault
Data abort info:
ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
CM = 0, WnR = 0, TnD = 0, TagAccess = 0
GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=0000002049d07000
[0000000000100cca] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 0000000096000004 [#1] SMP
CPU: 2 PID: 14442 Comm: systemd-sleep Tainted: P OE ------- ----
6.6.0-39-generic #38
Source Version: 938b255f6cb8817c95b0dd5c8c2944acfce94b07
Hardware name: greatwall GW-001Y1A-FTH, BIOS Great Wall BIOS V3.0
10/26/2022
pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : tee_shm_put+0x24/0x188
lr : tee_shm_free+0x14/0x28
sp : ffff001f98f9faf0
x29: ffff001f98f9faf0 x28: ffff0020df543cc0 x27: 0000000000000000
x26: ffff001f811344a0 x25: ffff8000818dac00 x24: ffff800082d8d048
x23: ffff001f850fcd18 x22: 0000000000000001 x21: ffff001f98f9fb88
x20: ffff001f83e76218 x19: ffff001f83e761e0 x18: 000000000000ffff
x17: 303a30303a303030 x16: 0000000000000000 x15: 0000000000000003
x14: 0000000000000001 x13: 0000000000000000 x12: 0101010101010101
x11: 0000000000000001 x10: 0000000000000001 x9 : ffff800080e08d0c
x8 : ffff001f98f9fb88 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : ffff001f83e761e0 x1 : 00000000ffff001f x0 : 0000000000100cca
Call trace:
tee_shm_put+0x24/0x188
tee_shm_free+0x14/0x28
__optee_disable_shm_cache+0xa8/0x108
optee_shutdown+0x28/0x38
platform_shutdown+0x28/0x40
device_shutdown+0x144/0x2b0
kernel_power_off+0x3c/0x80
hibernate+0x35c/0x388
state_store+0x64/0x80
kobj_attr_store+0x14/0x28
sysfs_kf_write+0x48/0x60
kernfs_fop_write_iter+0x128/0x1c0
vfs_write+0x270/0x370
ksys_write+0x6c/0x100
__arm64_sys_write+0x20/0x30
invoke_syscall+0x4c/0x120
el0_svc_common.constprop.0+0x44/0xf0
do_el0_svc+0x24/0x38
el0_svc+0x24/0x88
el0t_64_sync_handler+0x134/0x150
el0t_64_sync+0x14c/0x15</Note>
    </Notes>
    <CVE>CVE-2025-39865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix recursive semaphore deadlock in fiemap call

syzbot detected a OCFS2 hang due to a recursive semaphore on a
FS_IOC_FIEMAP of the extent list on a specially crafted mmap file.

context_switch kernel/sched/core.c:5357 [inline]
   __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961
   __schedule_loop kernel/sched/core.c:7043 [inline]
   schedule+0x165/0x360 kernel/sched/core.c:7058
   schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7115
   rwsem_down_write_slowpath+0x872/0xfe0 kernel/locking/rwsem.c:1185
   __down_write_common kernel/locking/rwsem.c:1317 [inline]
   __down_write kernel/locking/rwsem.c:1326 [inline]
   down_write+0x1ab/0x1f0 kernel/locking/rwsem.c:1591
   ocfs2_page_mkwrite+0x2ff/0xc40 fs/ocfs2/mmap.c:142
   do_page_mkwrite+0x14d/0x310 mm/memory.c:3361
   wp_page_shared mm/memory.c:3762 [inline]
   do_wp_page+0x268d/0x5800 mm/memory.c:3981
   handle_pte_fault mm/memory.c:6068 [inline]
   __handle_mm_fault+0x1033/0x5440 mm/memory.c:6195
   handle_mm_fault+0x40a/0x8e0 mm/memory.c:6364
   do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387
   handle_page_fault arch/x86/mm/fault.c:1476 [inline]
   exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532
   asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0010:copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline]
RIP: 0010:raw_copy_to_user arch/x86/include/asm/uaccess_64.h:147 [inline]
RIP: 0010:_inline_copy_to_user include/linux/uaccess.h:197 [inline]
RIP: 0010:_copy_to_user+0x85/0xb0 lib/usercopy.c:26
Code: e8 00 bc f7 fc 4d 39 fc 72 3d 4d 39 ec 77 38 e8 91 b9 f7 fc 4c 89
f7 89 de e8 47 25 5b fd 0f 01 cb 4c 89 ff 48 89 d9 4c 89 f6 &lt;f3&gt; a4 0f
1f 00 48 89 cb 0f 01 ca 48 89 d8 5b 41 5c 41 5d 41 5e 41
RSP: 0018:ffffc9000403f950 EFLAGS: 00050256
RAX: ffffffff84c7f101 RBX: 0000000000000038 RCX: 0000000000000038
RDX: 0000000000000000 RSI: ffffc9000403f9e0 RDI: 0000200000000060
RBP: ffffc9000403fa90 R08: ffffc9000403fa17 R09: 1ffff92000807f42
R10: dffffc0000000000 R11: fffff52000807f43 R12: 0000200000000098
R13: 00007ffffffff000 R14: ffffc9000403f9e0 R15: 0000200000000060
   copy_to_user include/linux/uaccess.h:225 [inline]
   fiemap_fill_next_extent+0x1c0/0x390 fs/ioctl.c:145
   ocfs2_fiemap+0x888/0xc90 fs/ocfs2/extent_map.c:806
   ioctl_fiemap fs/ioctl.c:220 [inline]
   do_vfs_ioctl+0x1173/0x1430 fs/ioctl.c:532
   __do_sys_ioctl fs/ioctl.c:596 [inline]
   __se_sys_ioctl+0x82/0x170 fs/ioctl.c:584
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5f13850fd9
RSP: 002b:00007ffe3b3518b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f5f13850fd9
RDX: 0000200000000040 RSI: 00000000c020660b RDI: 0000000000000004
RBP: 6165627472616568 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe3b3518f0
R13: 00007ffe3b351b18 R14: 431bde82d7b634db R15: 00007f5f1389a03b

ocfs2_fiemap() takes a read lock of the ip_alloc_sem semaphore (since
v2.6.22-527-g7307de80510a) and calls fiemap_fill_next_extent() to read the
extent list of this running mmap executable.  The user supplied buffer to
hold the fiemap information page faults calling ocfs2_page_mkwrite() which
will take a write lock (since v2.6.27-38-g00dc417fa3e7) of the same
semaphore.  This recursive semaphore will hold filesystem locks and causes
a hang of the fileystem.

The ip_alloc_sem protects the inode extent list and size.  Release the
read semphore before calling fiemap_fill_next_extent() in ocfs2_fiemap()
and ocfs2_fiemap_inline().  This does an unnecessary semaphore lock/unlock
on the last extent but simplifies the error path.</Note>
    </Notes>
    <CVE>CVE-2025-39885</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event

Currently, in ath12k_service_ready_ext_event(), svc_rdy_ext.mac_phy_caps
is not freed in the failure case, causing a memory leak. The following
trace is observed in kmemleak:

unreferenced object 0xffff8b3eb5789c00 (size 1024):
 comm "softirq", pid 0, jiffies 4294942577
 hex dump (first 32 bytes):
   00 00 00 00 01 00 00 00 00 00 00 00 7b 00 00 10  ............{...
   01 00 00 00 00 00 00 00 01 00 00 00 1f 38 00 00  .............8..
 backtrace (crc 44e1c357):
   __kmalloc_noprof+0x30b/0x410
   ath12k_wmi_mac_phy_caps_parse+0x84/0x100 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_wmi_svc_rdy_ext_parse+0x308/0x4c0 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_service_ready_ext_event.isra.0+0x44/0xd0 [ath12k]
   ath12k_wmi_op_rx+0x2eb/0xd70 [ath12k]
   ath12k_htc_rx_completion_handler+0x1f4/0x330 [ath12k]
   ath12k_ce_recv_process_cb+0x218/0x300 [ath12k]
   ath12k_pci_ce_workqueue+0x1b/0x30 [ath12k]
   process_one_work+0x219/0x680
   bh_worker+0x198/0x1f0
   tasklet_action+0x13/0x30
   handle_softirqs+0xca/0x460
   __irq_exit_rcu+0xbe/0x110
   irq_exit_rcu+0x9/0x30

Free svc_rdy_ext.mac_phy_caps in the error case to fix this memory leak.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1</Note>
    </Notes>
    <CVE>CVE-2025-39890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix incorrect map used in eee linkmode

incorrectly used ixgbe_lp_map in loops intended to populate the
supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map.
This results in incorrect bit setting and potential out-of-bounds
access, since ixgbe_lp_map and ixgbe_ls_map have different sizes
and purposes.

ixgbe_lp_map[i] -&gt; ixgbe_ls_map[i]

Use ixgbe_ls_map for supported and advertised linkmodes, and keep
ixgbe_lp_map usage only for link partner (lp_advertised) mapping.</Note>
    </Notes>
    <CVE>CVE-2025-39922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/vmscape: Add conditional IBPB mitigation

VMSCAPE is a vulnerability that exploits insufficient branch predictor
isolation between a guest and a userspace hypervisor (like QEMU). Existing
mitigations already protect kernel/KVM from a malicious guest. Userspace
can additionally be protected by flushing the branch predictors after a
VMexit.

Since it is the userspace that consumes the poisoned branch predictors,
conditionally issue an IBPB after a VMexit and before returning to
userspace. Workloads that frequently switch between hypervisor and
userspace will incur the most overhead from the new IBPB.

This new IBPB is not integrated with the existing IBPB sites. For
instance, a task can use the existing speculation control prctl() to
get an IBPB at context switch time. With this implementation, the
IBPB is doubled up: one at context switch and another before running
userspace.

The intent is to integrate and optimize these cases post-embargo.

[ dhansen: elaborate on suboptimal IBPB solution ]</Note>
    </Notes>
    <CVE>CVE-2025-40300</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:kernel-default-6.4.0-150700.53.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim's tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2025-53905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-9.1.1629-150500.20.33.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-data-common-9.1.1629-150500.20.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim's zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2025-53906</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-9.1.1629-150500.20.33.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-data-common-9.1.1629-150500.20.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim's internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.</Note>
    </Notes>
    <CVE>CVE-2025-55157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-9.1.1629-150500.20.33.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-data-common-9.1.1629-150500.20.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim's internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406.</Note>
    </Notes>
    <CVE>CVE-2025-55158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-9.1.1629-150500.20.33.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:vim-data-common-9.1.1629-150500.20.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.</Note>
    </Notes>
    <CVE>CVE-2025-59375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libexpat1-2.7.1-150700.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.</Note>
    </Notes>
    <CVE>CVE-2025-8114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libssh-config-0.9.8-150600.11.6.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libssh4-0.9.8-150600.11.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.</Note>
    </Notes>
    <CVE>CVE-2025-8277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libssh-config-0.9.8-150600.11.6.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libssh4-0.9.8-150600.11.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.</Note>
    </Notes>
    <CVE>CVE-2025-9230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libopenssl1_1-1.1.1w-150700.11.6.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libopenssl3-3.2.3-150700.5.21.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:openssl-3-3.2.3-150700.5.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Samba, in the vfs_streams_xattr module, where uninitialized heap memory could be written into alternate data streams. This allows an authenticated user to read residual memory content that may include sensitive data, resulting in an information disclosure vulnerability.</Note>
    </Notes>
    <CVE>CVE-2025-9640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:libldb2-4.21.8+git.418.e80c9b2a88c-150700.3.11.2</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp7-byos-v20251022-x86-64:samba-client-libs-4.21.8+git.418.e80c9b2a88c-150700.3.11.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
</cvrfdoc>
