<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Kconfig</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>a6021aa2 - ACPI: EC: make EC support compile-time conditional</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#a6021aa2</link>
        <description>ACPI: EC: make EC support compile-time conditionalThe embedded controller code is mainly used on x86 laptops and cannotwork without PC style I/O port access.Make this a user-visible configuration option that is default enabledon x86 but otherwise disabled, and that can never be enabled unlessCONFIG_HAS_IOPORT is also available.The empty stubs in internal.h help ignore the EC code in configurationsthat don&apos;t support it. In order to see those stubs, the sbshc code alsohas to include this header and drop duplicate declarations.All the direct callers of ec_read/ec_write already had an x86dependency and now also need to depend on APCI_EC.Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Acked-by: Guenter Roeck &lt;linux@roeck-us.net&gt;Acked-by: Hans de Goede &lt;hdegoede@redhat.com&gt;Link: https://patch.msgid.link/20241011061948.3211423-1-arnd@kernel.org[ rjw: Subject edits ]Signed-off-by: Rafael J. Wysocki &lt;rafael.j.wysocki@intel.com&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Fri, 11 Oct 2024 06:18:17 +0000</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
<item>
        <title>cf8e8658 - arch: Remove Itanium (IA-64) architecture</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#cf8e8658</link>
        <description>arch: Remove Itanium (IA-64) architectureThe Itanium architecture is obsolete, and an informal survey [0] revealsthat any residual use of Itanium hardware in production is mostly HP-UXor OpenVMS based. The use of Linux on Itanium appears to be limited toenthusiasts that occasionally boot a fresh Linux kernel to see whetherthings are still working as intended, and perhaps to churn out somedistro packages that are rarely used in practice.None of the original companies behind Itanium still produce or supportany hardware or software for the architecture, and it is listed as&apos;Orphaned&apos; in the MAINTAINERS file, as apparently, none of the engineersthat contributed on behalf of those companies (nor anyone else, for thatmatter) have been willing to support or maintain the architectureupstream or even be responsible for applying the odd fix. The Intelfirmware team removed all IA-64 support from the Tianocore/EDK2reference implementation of EFI in 2018. (Itanium is the originalarchitecture for which EFI was developed, and the way Linux supports itdeviates significantly from other architectures.) Some distros, such asDebian and Gentoo, still maintain [unofficial] ia64 ports, but many havedropped support years ago.While the argument is being made [1] that there is a &apos;for the commongood&apos; angle to being able to build and run existing projects such as theGrid Community Toolkit [2] on Itanium for interoperability testing, thefact remains that none of those projects are known to be deployed onLinux/ia64, and very few people actually have access to such a system inthe first place. Even if there were ways imaginable in which Linux/ia64could be put to good use today, what matters is whether anyone isactually doing that, and this does not appear to be the case.There are no emulators widely available, and so boot testing Itanium isgenerally infeasible for ordinary contributors. GCC still supports IA-64but its compile farm [3] no longer has any IA-64 machines. GLIBC wouldlike to get rid of IA-64 [4] too because it would permit some overduecode cleanups. In summary, the benefits to the ecosystem of having IA-64be part of it are mostly theoretical, whereas the maintenance overheadof keeping it supported is real.So let&apos;s rip off the band aid, and remove the IA-64 arch code entirely.This follows the timeline proposed by the Debian/ia64 maintainer [5],which removes support in a controlled manner, leaving IA-64 in a knowngood state in the most recent LTS release. Other projects will followonce the kernel support is removed.[0] https://lore.kernel.org/all/CAMj1kXFCMh_578jniKpUtx_j8ByHnt=s7S+yQ+vGbKt9ud7+kQ@mail.gmail.com/[1] https://lore.kernel.org/all/0075883c-7c51-00f5-2c2d-5119c1820410@web.de/[2] https://gridcf.org/gct-docs/latest/index.html[3] https://cfarm.tetaneutral.net/machines/list/[4] https://lore.kernel.org/all/87bkiilpc4.fsf@mid.deneb.enyo.de/[5] https://lore.kernel.org/all/ff58a3e76e5102c94bb5946d99187b358def688a.camel@physik.fu-berlin.de/Acked-by: Tony Luck &lt;tony.luck@intel.com&gt;Signed-off-by: Ard Biesheuvel &lt;ardb@kernel.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Thu, 20 Oct 2022 13:54:33 +0000</pubDate>
        <dc:creator>Ard Biesheuvel &lt;ardb@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>1fbb0b20 - char: add HAS_IOPORT dependencies</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#1fbb0b20</link>
        <description>char: add HAS_IOPORT dependenciesIn a future patch HAS_IOPORT=n will result in inb()/outb() and friendsnot being declared. We thus need to add HAS_IOPORT as dependency forthose drivers using them.Co-developed-by: Arnd Bergmann &lt;arnd@kernel.org&gt;Signed-off-by: Arnd Bergmann &lt;arnd@kernel.org&gt;Signed-off-by: Niklas Schnelle &lt;schnelle@linux.ibm.com&gt;Link: https://lore.kernel.org/r/20230522105049.1467313-4-schnelle@linux.ibm.comSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Mon, 22 May 2023 10:50:08 +0000</pubDate>
        <dc:creator>Niklas Schnelle &lt;schnelle@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>9b12f050 - char: pcmcia: remove all the drivers</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#9b12f050</link>
        <description>char: pcmcia: remove all the driversThese char PCMCIA drivers are buggy[1] and receive only minimal care. Itwas concluded[2], that we should try to remove most pcmcia driverscompletely. Let&apos;s start with these char broken one.Note that I also removed a UAPI header: include/uapi/linux/cm4000_cs.h.I found only coccinelle tests mentioning some ioctl constants from thatfile. But they are not actually used. Anyway, should someone complain,we may reintroduce the header (or its parts).[1] https://lore.kernel.org/all/f41c2765-80e0-48bc-b1e4-8cfd3230fd4a@www.fastmail.com/[2] https://lore.kernel.org/all/c5b39544-a4fb-4796-a046-0b9be9853787@app.fastmail.com/Signed-off-by: Jiri Slaby (SUSE) &lt;jirislaby@kernel.org&gt;Cc: &quot;Hyunwoo Kim&quot; &lt;imv4bel@gmail.com&gt;Cc: Harald Welte &lt;laforge@gnumonks.org&gt;Cc: Lubomir Rintel &lt;lkundrak@v3.sk&gt;Cc: Arnd Bergmann &lt;arnd@arndb.de&gt;Cc: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Acked-by: Dominik Brodowski &lt;linux@dominikbrodowski.net&gt;Reviewed-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Link: https://lore.kernel.org/r/20230222092302.6348-2-jirislaby@kernel.orgSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Wed, 22 Feb 2023 09:23:02 +0000</pubDate>
        <dc:creator>Jiri Slaby &lt;jirislaby@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>b9b01a56 - random: use random.trust_{bootloader,cpu} command line option only</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#b9b01a56</link>
        <description>random: use random.trust_{bootloader,cpu} command line option onlyIt&apos;s very unusual to have both a command line option and a compile timeoption, and apparently that&apos;s confusing to people. Also, basicallyeverybody enables the compile time option now, which means people whowant to disable this wind up having to use the command line option toensure that anyway. So just reduce the number of moving pieces and nixthe compile time option in favor of the more versatile command lineoption.Signed-off-by: Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Tue, 01 Nov 2022 12:03:55 +0000</pubDate>
        <dc:creator>Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;</dc:creator>
    </item>
<item>
        <title>1208ec59 - char: remove VR41XX related char driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#1208ec59</link>
        <description>char: remove VR41XX related char driverCommit d3164e2f3b0a (&quot;MIPS: Remove VR41xx support&quot;) removed supportfor MIPS VR41xx platform, so remove exclusive drivers for thisplatform, too.Signed-off-by: Thomas Bogendoerfer &lt;tsbogend@alpha.franken.de&gt;Link: https://lore.kernel.org/r/20220716130802.11660-1-tsbogend@alpha.franken.deSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Sat, 16 Jul 2022 13:08:01 +0000</pubDate>
        <dc:creator>Thomas Bogendoerfer &lt;tsbogend@alpha.franken.de&gt;</dc:creator>
    </item>
<item>
        <title>9592eef7 - random: remove CONFIG_ARCH_RANDOM</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#9592eef7</link>
        <description>random: remove CONFIG_ARCH_RANDOMWhen RDRAND was introduced, there was much discussion on whether itshould be trusted and how the kernel should handle that. Initially, twomechanisms cropped up, CONFIG_ARCH_RANDOM, a compile time switch, and&quot;nordrand&quot;, a boot-time switch.Later the thinking evolved. With a properly designed RNG, using RDRANDvalues alone won&apos;t harm anything, even if the outputs are malicious.Rather, the issue is whether those values are being *trusted* to be goodor not. And so a new set of options were introduced as the realones that people use -- CONFIG_RANDOM_TRUST_CPU and &quot;random.trust_cpu&quot;.With these options, RDRAND is used, but it&apos;s not always credited. So inthe worst case, it does nothing, and in the best case, maybe it helps.Along the way, CONFIG_ARCH_RANDOM&apos;s meaning got sort of pulled into thecenter and became something certain platforms force-select.The old options don&apos;t really help with much, and it&apos;s a bit odd to havespecial handling for these instructions when the kernel can deal finewith the existence or untrusted existence or broken existence ornon-existence of that CPU capability.Simplify the situation by removing CONFIG_ARCH_RANDOM and using theordinary asm-generic fallback pattern instead, keeping the two optionsthat are actually used. For now it leaves &quot;nordrand&quot; for now, as theremoval of that will take a different route.Acked-by: Michael Ellerman &lt;mpe@ellerman.id.au&gt;Acked-by: Catalin Marinas &lt;catalin.marinas@arm.com&gt;Acked-by: Borislav Petkov &lt;bp@suse.de&gt;Acked-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Acked-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Signed-off-by: Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Tue, 05 Jul 2022 18:48:41 +0000</pubDate>
        <dc:creator>Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;</dc:creator>
    </item>
<item>
        <title>846bb97e - random: credit cpu and bootloader seeds by default</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#846bb97e</link>
        <description>random: credit cpu and bootloader seeds by defaultThis commit changes the default Kconfig values of RANDOM_TRUST_CPU andRANDOM_TRUST_BOOTLOADER to be Y by default. It does not change anyexisting configs or change any kernel behavior. The reason for this isseveral fold.As background, I recently had an email thread with the kernelmaintainers of Fedora/RHEL, Debian, Ubuntu, Gentoo, Arch, NixOS, Alpine,SUSE, and Void as recipients. I noted that some distros trust RDRAND,some trust EFI, and some trust both, and I asked why or why not. Therewasn&apos;t really much of a &quot;debate&quot; but rather an interesting discussion ofwhat the historical reasons have been for this, and it came up that somedistros just missed the introduction of the bootloader Kconfig knob,while another didn&apos;t want to enable it until there was a boot timeswitch to turn it off for more concerned users (which has since beenadded). The result of the rather uneventful discussion is that everymajor Linux distro enables these two options by default.While I didn&apos;t have really too strong of an opinion going into thisthread -- and I mostly wanted to learn what the distros&apos; thinking wasone way or another -- ultimately I think their choice was a decentenough one for a default option (which can be disabled at boot time).I&apos;ll try to summarize the pros and cons:Pros:- The RNG machinery gets initialized super quickly, and there&apos;s no  messing around with subsequent blocking behavior.- The bootloader mechanism is used by kexec in order for the prior  kernel to initialize the RNG of the next kernel, which increases  the entropy available to early boot daemons of the next kernel.- Previous objections related to backdoors centered around  Dual_EC_DRBG-like kleptographic systems, in which observing some  amount of the output stream enables an adversary holding the right key  to determine the entire output stream.  This used to be a partially justified concern, because RDRAND output  was mixed into the output stream in varying ways, some of which may  have lacked pre-image resistance (e.g. XOR or an LFSR).  But this is no longer the case. Now, all usage of RDRAND and  bootloader seeds go through a cryptographic hash function. This means  that the CPU would have to compute a hash pre-image, which is not  considered to be feasible (otherwise the hash function would be  terribly broken).- More generally, if the CPU is backdoored, the RNG is probably not the  realistic vector of choice for an attacker.- These CPU or bootloader seeds are far from being the only source of  entropy. Rather, there is generally a pretty huge amount of entropy,  not all of which is credited, especially on CPUs that support  instructions like RDRAND. In other words, assuming RDRAND outputs all  zeros, an attacker would *still* have to accurately model every single  other entropy source also in use.- The RNG now reseeds itself quite rapidly during boot, starting at 2  seconds, then 4, then 8, then 16, and so forth, so that other sources  of entropy get used without much delay.- Paranoid users can set random.trust_{cpu,bootloader}=no in the kernel  command line, and paranoid system builders can set the Kconfig options  to N, so there&apos;s no reduction or restriction of optionality.- It&apos;s a practical default.- All the distros have it set this way. Microsoft and Apple trust it  too. Bandwagon.Cons:- RDRAND *could* still be backdoored with something like a fixed key or  limited space serial number seed or another indexable scheme like  that. (However, it&apos;s hard to imagine threat models where the CPU is  backdoored like this, yet people are still okay making *any*  computations with it or connecting it to networks, etc.)- RDRAND *could* be defective, rather than backdoored, and produce  garbage that is in one way or another insufficient for crypto.- Suggesting a *reduction* in paranoia, as this commit effectively does,  may cause some to question my personal integrity as a &quot;security  person&quot;.- Bootloader seeds and RDRAND are generally very difficult if not all  together impossible to audit.Keep in mind that this doesn&apos;t actually change any behavior. Thisis just a change in the default Kconfig value. The distros already areshipping kernels that set things this way.Ard made an additional argument in [1]:    We&apos;re at the mercy of firmware and micro-architecture anyway, given    that we are also relying on it to ensure that every instruction in    the kernel&apos;s executable image has been faithfully copied to memory,    and that the CPU implements those instructions as documented. So I    don&apos;t think firmware or ISA bugs related to RNGs deserve special    treatment - if they are broken, we should quirk around them like we    usually do. So enabling these by default is a step in the right    direction IMHO.In [2], Phil pointed out that having this disabled masked a bug that CIotherwise would have caught:    A clean 5.15.45 boots cleanly, whereas a downstream kernel shows the    static key warning (but it does go on to boot). The significant    difference is that our defconfigs set CONFIG_RANDOM_TRUST_BOOTLOADER=y    defining that on top of multi_v7_defconfig demonstrates the issue on    a clean 5.15.45. Conversely, not setting that option in a    downstream kernel build avoids the warning[1] https://lore.kernel.org/lkml/CAMj1kXGi+ieviFjXv9zQBSaGyyzeGW_VpMpTLJK8PJb2QHEQ-w@mail.gmail.com/[2] https://lore.kernel.org/lkml/c47c42e3-1d56-5859-a6ad-976a1a3381c6@raspberrypi.com/Cc: Theodore Ts&apos;o &lt;tytso@mit.edu&gt;Reviewed-by: Ard Biesheuvel &lt;ardb@kernel.org&gt;Signed-off-by: Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Sun, 05 Jun 2022 16:30:46 +0000</pubDate>
        <dc:creator>Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;</dc:creator>
    </item>
<item>
        <title>7ea4aa70 - char: ttyprintk: register console</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#7ea4aa70</link>
        <description>char: ttyprintk: register consoleRegister a console in the ttyprintk driver so that it can be selectedfor /dev/console with console=ttyprintk on the kernel command line,similar to other console drivers.Signed-off-by: Vincent Whitchurch &lt;vincent.whitchurch@axis.com&gt;Link: https://lore.kernel.org/r/20220215141750.92808-1-vincent.whitchurch@axis.comSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Tue, 15 Feb 2022 14:17:49 +0000</pubDate>
        <dc:creator>Vincent Whitchurch &lt;vincent.whitchurch@axis.com&gt;</dc:creator>
    </item>
<item>
        <title>d97c68d1 - random: treat bootloader trust toggle the same way as cpu trust toggle</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#d97c68d1</link>
        <description>random: treat bootloader trust toggle the same way as cpu trust toggleIf CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.But, the user can disable (or enable) this behavior by setting`random.trust_cpu=0/1` on the kernel command line. This allows systembuilders to do reasonable things while avoiding howls from tinfoilhatters. (Or vice versa.)CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regardsthe seed passed via EFI or device tree, which might come from RDRAND ora TPM or somewhere else. In order to allow distros to more easily enablethis while avoiding those same howls (or vice versa), this commit addsthe corresponding `random.trust_bootloader=0/1` toggle.Cc: Theodore Ts&apos;o &lt;tytso@mit.edu&gt;Cc: Graham Christensen &lt;graham@grahamc.com&gt;Reviewed-by: Ard Biesheuvel &lt;ardb@kernel.org&gt;Reviewed-by: Dominik Brodowski &lt;linux@dominikbrodowski.net&gt;Link: https://github.com/NixOS/nixpkgs/pull/165355Signed-off-by: Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Wed, 23 Mar 2022 03:43:12 +0000</pubDate>
        <dc:creator>Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;</dc:creator>
    </item>
<item>
        <title>9e1b28b7 - char: move RANDOM_TRUST_CPU &amp; RANDOM_TRUST_BOOTLOADER into the Character devices menu</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#9e1b28b7</link>
        <description>char: move RANDOM_TRUST_CPU &amp; RANDOM_TRUST_BOOTLOADER into the Character devices menuInclude RANDOM_TRUST_CPU and RANDOM_TRUST_BOOTLOADER inside the&quot;Character devices&quot; menu so that they are listed (presented)with other Character devices.Cc: Arnd Bergmann &lt;arnd@arndb.de&gt;Cc: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Cc: Hsin-Yi Wang &lt;hsinyi@chromium.org&gt;Cc: Theodore Ts&apos;o &lt;tytso@mit.edu&gt;Signed-off-by: Randy Dunlap &lt;rdunlap@infradead.org&gt;Link: https://lore.kernel.org/r/20210816000531.17934-1-rdunlap@infradead.orgSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Mon, 16 Aug 2021 00:05:31 +0000</pubDate>
        <dc:creator>Randy Dunlap &lt;rdunlap@infradead.org&gt;</dc:creator>
    </item>
<item>
        <title>603e4922 - remove the raw driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#603e4922</link>
        <description>remove the raw driverThe raw driver used to provide direct unbuffered access to block devicesbefore O_DIRECT was invented.  It has been obsolete for more than adecade.Acked-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Acked-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Link: https://lore.kernel.org/lkml/Pine.LNX.4.64.0703180754060.6605@CPE00045a9c397f-CM001225dbafb6/Signed-off-by: Christoph Hellwig &lt;hch@lst.de&gt;Link: https://lore.kernel.org/r/20210531072526.97052-1-hch@lst.deSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Mon, 31 May 2021 07:25:26 +0000</pubDate>
        <dc:creator>Christoph Hellwig &lt;hch@lst.de&gt;</dc:creator>
    </item>
<item>
        <title>ed5aecd3 - tty: remove broken r3964 line discipline</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#ed5aecd3</link>
        <description>tty: remove broken r3964 line disciplineNoone stepped up in the past two years since it was marked as BROKEN bycommit c7084edc3f6d (tty: mark Siemens R3964 line discipline as BROKEN).Remove the line discipline for good.Three remarks:* we remove also the uapi header (as noone is able to use that interface  anyway)* we do *not* remove the N_R3964 constant definition from tty.h, so it  remains reserved.* in_interrupt() check is now removed from vt&apos;s con_put_char. Noone else  calls tty_operations::put_char from interrupt context.Signed-off-by: Jiri Slaby &lt;jslaby@suse.cz&gt;Link: https://lore.kernel.org/r/20210505091928.22010-2-jslaby@suse.czSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Wed, 05 May 2021 09:18:54 +0000</pubDate>
        <dc:creator>Jiri Slaby &lt;jslaby@suse.cz&gt;</dc:creator>
    </item>
<item>
        <title>bbcd53c9 - drivers/char: remove /dev/kmem for good</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#bbcd53c9</link>
        <description>drivers/char: remove /dev/kmem for goodPatch series &quot;drivers/char: remove /dev/kmem for good&quot;.Exploring /dev/kmem and /dev/mem in the context of memory hot(un)plug andmemory ballooning, I started questioning the existence of /dev/kmem.Comparing it with the /proc/kcore implementation, it does not seem to beable to deal with things likea) Pages unmapped from the direct mapping (e.g., to be used by secretmem)  -&gt; kern_addr_valid(). virt_addr_valid() is not sufficient.b) Special cases like gart aperture memory that is not to be touched  -&gt; mem_pfn_is_ram()Unless I am missing something, it&apos;s at least broken in some cases and mightfault/crash the machine.Looks like its existence has been questioned before in 2005 and 2010 [1],after ~11 additional years, it might make sense to revive the discussion.CONFIG_DEVKMEM is only enabled in a single defconfig (on purpose or bymistake?).  All distributions disable it: in Ubuntu it has been disabledfor more than 10 years, in Debian since 2.6.31, in Fedora at leaststarting with FC3, in RHEL starting with RHEL4, in SUSE starting from15sp2, and OpenSUSE has it disabled as well.1) /dev/kmem was popular for rootkits [2] before it got disabled   basically everywhere. Ubuntu documents [3] &quot;There is no modern user of   /dev/kmem any more beyond attackers using it to load kernel rootkits.&quot;.   RHEL documents in a BZ [5] &quot;it served no practical purpose other than to   serve as a potential security problem or to enable binary module drivers   to access structures/functions they shouldn&apos;t be touching&quot;2) /proc/kcore is a decent interface to have a controlled way to read   kernel memory for debugging puposes. (will need some extensions to   deal with memory offlining/unplug, memory ballooning, and poisoned   pages, though)3) It might be useful for corner case debugging [1]. KDB/KGDB might be a   better fit, especially, to write random memory; harder to shoot   yourself into the foot.4) &quot;Kernel Memory Editor&quot; [4] hasn&apos;t seen any updates since 2000 and seems   to be incompatible with 64bit [1]. For educational purposes,   /proc/kcore might be used to monitor value updates -- or older   kernels can be used.5) It&apos;s broken on arm64, and therefore, completely disabled there.Looks like it&apos;s essentially unused and has been replaced by bettersuited interfaces for individual tasks (/proc/kcore, KDB/KGDB). Let&apos;sjust remove it.[1] https://lwn.net/Articles/147901/[2] https://www.linuxjournal.com/article/10505[3] https://wiki.ubuntu.com/Security/Features#A.2Fdev.2Fkmem_disabled[4] https://sourceforge.net/projects/kme/[5] https://bugzilla.redhat.com/show_bug.cgi?id=154796Link: https://lkml.kernel.org/r/20210324102351.6932-1-david@redhat.comLink: https://lkml.kernel.org/r/20210324102351.6932-2-david@redhat.comSigned-off-by: David Hildenbrand &lt;david@redhat.com&gt;Acked-by: Michal Hocko &lt;mhocko@suse.com&gt;Acked-by: Kees Cook &lt;keescook@chromium.org&gt;Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;Cc: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Cc: &quot;Alexander A. Klimov&quot; &lt;grandmaster@al2klimov.de&gt;Cc: Alexander Viro &lt;viro@zeniv.linux.org.uk&gt;Cc: Alexandre Belloni &lt;alexandre.belloni@bootlin.com&gt;Cc: Andrew Lunn &lt;andrew@lunn.ch&gt;Cc: Andrey Zhizhikin &lt;andrey.zhizhikin@leica-geosystems.com&gt;Cc: Arnd Bergmann &lt;arnd@arndb.de&gt;Cc: Benjamin Herrenschmidt &lt;benh@kernel.crashing.org&gt;Cc: Brian Cain &lt;bcain@codeaurora.org&gt;Cc: Christian Borntraeger &lt;borntraeger@de.ibm.com&gt;Cc: Christophe Leroy &lt;christophe.leroy@csgroup.eu&gt;Cc: Chris Zankel &lt;chris@zankel.net&gt;Cc: Corentin Labbe &lt;clabbe@baylibre.com&gt;Cc: &quot;David S. Miller&quot; &lt;davem@davemloft.net&gt;Cc: &quot;Eric W. Biederman&quot; &lt;ebiederm@xmission.com&gt;Cc: Geert Uytterhoeven &lt;geert@linux-m68k.org&gt;Cc: Gerald Schaefer &lt;gerald.schaefer@linux.ibm.com&gt;Cc: Greentime Hu &lt;green.hu@gmail.com&gt;Cc: Gregory Clement &lt;gregory.clement@bootlin.com&gt;Cc: Heiko Carstens &lt;hca@linux.ibm.com&gt;Cc: Helge Deller &lt;deller@gmx.de&gt;Cc: Hillf Danton &lt;hdanton@sina.com&gt;Cc: huang ying &lt;huang.ying.caritas@gmail.com&gt;Cc: Ingo Molnar &lt;mingo@kernel.org&gt;Cc: Ivan Kokshaysky &lt;ink@jurassic.park.msu.ru&gt;Cc: &quot;James E.J. Bottomley&quot; &lt;James.Bottomley@HansenPartnership.com&gt;Cc: James Troup &lt;james.troup@canonical.com&gt;Cc: Jiaxun Yang &lt;jiaxun.yang@flygoat.com&gt;Cc: Jonas Bonn &lt;jonas@southpole.se&gt;Cc: Jonathan Corbet &lt;corbet@lwn.net&gt;Cc: Kairui Song &lt;kasong@redhat.com&gt;Cc: Krzysztof Kozlowski &lt;krzk@kernel.org&gt;Cc: Kuninori Morimoto &lt;kuninori.morimoto.gx@renesas.com&gt;Cc: Liviu Dudau &lt;liviu.dudau@arm.com&gt;Cc: Lorenzo Pieralisi &lt;lorenzo.pieralisi@arm.com&gt;Cc: Luc Van Oostenryck &lt;luc.vanoostenryck@gmail.com&gt;Cc: Luis Chamberlain &lt;mcgrof@kernel.org&gt;Cc: Matthew Wilcox &lt;willy@infradead.org&gt;Cc: Matt Turner &lt;mattst88@gmail.com&gt;Cc: Max Filippov &lt;jcmvbkbc@gmail.com&gt;Cc: Michael Ellerman &lt;mpe@ellerman.id.au&gt;Cc: Mike Rapoport &lt;rppt@kernel.org&gt;Cc: Mikulas Patocka &lt;mpatocka@redhat.com&gt;Cc: Minchan Kim &lt;minchan@kernel.org&gt;Cc: Niklas Schnelle &lt;schnelle@linux.ibm.com&gt;Cc: Oleksiy Avramchenko &lt;oleksiy.avramchenko@sonymobile.com&gt;Cc: openrisc@lists.librecores.orgCc: Palmer Dabbelt &lt;palmerdabbelt@google.com&gt;Cc: Paul Mackerras &lt;paulus@samba.org&gt;Cc: &quot;Pavel Machek (CIP)&quot; &lt;pavel@denx.de&gt;Cc: Pavel Machek &lt;pavel@ucw.cz&gt;Cc: &quot;Peter Zijlstra (Intel)&quot; &lt;peterz@infradead.org&gt;Cc: Pierre Morel &lt;pmorel@linux.ibm.com&gt;Cc: Randy Dunlap &lt;rdunlap@infradead.org&gt;Cc: Richard Henderson &lt;rth@twiddle.net&gt;Cc: Rich Felker &lt;dalias@libc.org&gt;Cc: Robert Richter &lt;rric@kernel.org&gt;Cc: Rob Herring &lt;robh@kernel.org&gt;Cc: Russell King &lt;linux@armlinux.org.uk&gt;Cc: Sam Ravnborg &lt;sam@ravnborg.org&gt;Cc: Sebastian Andrzej Siewior &lt;bigeasy@linutronix.de&gt;Cc: Sebastian Hesselbarth &lt;sebastian.hesselbarth@gmail.com&gt;Cc: sparclinux@vger.kernel.orgCc: Stafford Horne &lt;shorne@gmail.com&gt;Cc: Stefan Kristiansson &lt;stefan.kristiansson@saunalahti.fi&gt;Cc: Steven Rostedt &lt;rostedt@goodmis.org&gt;Cc: Sudeep Holla &lt;sudeep.holla@arm.com&gt;Cc: Theodore Dubois &lt;tblodt@icloud.com&gt;Cc: Thomas Bogendoerfer &lt;tsbogend@alpha.franken.de&gt;Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;Cc: Vasily Gorbik &lt;gor@linux.ibm.com&gt;Cc: Viresh Kumar &lt;viresh.kumar@linaro.org&gt;Cc: William Cohen &lt;wcohen@redhat.com&gt;Cc: Xiaoming Ni &lt;nixiaoming@huawei.com&gt;Cc: Yoshinori Sato &lt;ysato@users.sourceforge.jp&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Fri, 07 May 2021 01:05:55 +0000</pubDate>
        <dc:creator>David Hildenbrand &lt;david@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>9f30eb29 - char: virtio: Select VIRTIO from VIRTIO_CONSOLE.</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#9f30eb29</link>
        <description>char: virtio: Select VIRTIO from VIRTIO_CONSOLE.Make it possible to have virtio console built-in whenother virtio drivers are modular.Signed-off-by: Michal Suchanek &lt;msuchanek@suse.de&gt;Reviewed-by: Amit Shah &lt;amit@kernel.org&gt;Link: https://lore.kernel.org/r/20200831165850.26163-1-msuchanek@suse.deSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Mon, 31 Aug 2020 16:58:50 +0000</pubDate>
        <dc:creator>Michal Suchanek &lt;msuchanek@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>4e74eeb2 - char: Replace HTTP links with HTTPS ones</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#4e74eeb2</link>
        <description>char: Replace HTTP links with HTTPS onesRationale:Reduces attack surface on kernel devs opening the links for MITMas HTTPS traffic is much harder to manipulate.Deterministic algorithm:For each file:  If not .svg:    For each line:      If doesn&apos;t contain `\bxmlns\b`:        For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`:	  If neither `\bgnu\.org/license`, nor `\bmozilla\.org/MPL\b`:            If both the HTTP and HTTPS versions            return 200 OK and serve the same content:              Replace HTTP with HTTPS.Signed-off-by: Alexander A. Klimov &lt;grandmaster@al2klimov.de&gt;Link: https://lore.kernel.org/r/20200713104453.33414-1-grandmaster@al2klimov.deSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Mon, 13 Jul 2020 10:44:53 +0000</pubDate>
        <dc:creator>Alexander A. Klimov &lt;grandmaster@al2klimov.de&gt;</dc:creator>
    </item>
<item>
        <title>a7f7f624 - treewide: replace &apos;---help---&apos; in Kconfig files with &apos;help&apos;</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#a7f7f624</link>
        <description>treewide: replace &apos;---help---&apos; in Kconfig files with &apos;help&apos;Since commit 84af7a6194e4 (&quot;checkpatch: kconfig: prefer &apos;help&apos; over&apos;---help---&apos;&quot;), the number of &apos;---help---&apos; has been graduallydecreasing, but there are still more than 2400 instances.This commit finishes the conversion. While I touched the lines,I also fixed the indentation.There are a variety of indentation styles found.  a) 4 spaces + &apos;---help---&apos;  b) 7 spaces + &apos;---help---&apos;  c) 8 spaces + &apos;---help---&apos;  d) 1 space + 1 tab + &apos;---help---&apos;  e) 1 tab + &apos;---help---&apos;    (correct indentation)  f) 1 tab + 1 space + &apos;---help---&apos;  g) 1 tab + 2 spaces + &apos;---help---&apos;In order to convert all of them to 1 tab + &apos;help&apos;, I ran thefollowing commend:  $ find . -name &apos;Kconfig*&apos; | xargs sed -i &apos;s/^[[:space:]]*---help---/\thelp/&apos;Signed-off-by: Masahiro Yamada &lt;masahiroy@kernel.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Sat, 13 Jun 2020 16:50:22 +0000</pubDate>
        <dc:creator>Masahiro Yamada &lt;masahiroy@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>7ade8495 - powerpc: Remove Xilinx PPC405/PPC440 support</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#7ade8495</link>
        <description>powerpc: Remove Xilinx PPC405/PPC440 supportThe latest Xilinx design tools called ISE and EDK has been released inOctober 2013. New tool doesn&apos;t support any PPC405/PPC440 new designs.These platforms are no longer supported and tested.PowerPC 405/440 port is orphan from 2013 bycommit cdeb89943bfc (&quot;MAINTAINERS: Fix incorrect status tag&quot;) andcommit 19624236cce1 (&quot;MAINTAINERS: Update Grant&apos;s email address and maintainership&quot;)that&apos;s why it is time to remove the support fot these platforms.Signed-off-by: Michal Simek &lt;michal.simek@xilinx.com&gt;Signed-off-by: Christophe Leroy &lt;christophe.leroy@csgroup.eu&gt;Acked-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Signed-off-by: Michael Ellerman &lt;mpe@ellerman.id.au&gt;Link: https://lore.kernel.org/r/8c593895e2cb57d232d85ce4d8c3a1aa7f0869cc.1590079968.git.christophe.leroy@csgroup.eu

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Thu, 21 May 2020 16:55:52 +0000</pubDate>
        <dc:creator>Michal Simek &lt;michal.simek@xilinx.com&gt;</dc:creator>
    </item>
<item>
        <title>f52ef24b - rtc/alpha: remove legacy rtc driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#f52ef24b</link>
        <description>rtc/alpha: remove legacy rtc driverThe old drivers/char/rtc.c driver was originally the implementationfor x86 PCs but got subsequently replaced by the rtc class driveron all architectures except alpha.Move alpha over to the portable driver and remove the old onefor good.The CONFIG_JS_RTC option was only ever used on SPARC32 buthas not been available for many years, this was used to buildthe same rtc driver with a different module name.Cc: Richard Henderson &lt;rth@twiddle.net&gt;Cc: Ivan Kokshaysky &lt;ink@jurassic.park.msu.ru&gt;Cc: Matt Turner &lt;mattst88@gmail.com&gt;Cc: linux-alpha@vger.kernel.orgCc: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Signed-off-by: Alexandre Belloni &lt;alexandre.belloni@bootlin.com&gt;Link: https://lore.kernel.org/r/20200226224322.187960-2-alexandre.belloni@bootlin.comSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Wed, 26 Feb 2020 22:43:22 +0000</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
<item>
        <title>8067c0b0 - rtc/ia64: remove legacy efirtc driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/char/Kconfig#8067c0b0</link>
        <description>rtc/ia64: remove legacy efirtc driverThere are two EFI RTC drivers, the original drivers/char/efirtc.cdriver and the more modern drivers/rtc/rtc-efi.c.Both implement the same interface, but the new one does soin a more portable way.Move everything over to that one and remove the old one.Cc: linux-ia64@vger.kernel.orgCc: Fenghua Yu &lt;fenghua.yu@intel.com&gt;Cc: Tony Luck &lt;tony.luck@intel.com&gt;Cc: Stephane Eranian &lt;eranian@google.com&gt;Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Signed-off-by: Alexandre Belloni &lt;alexandre.belloni@bootlin.com&gt;Link: https://lore.kernel.org/r/20200226224322.187960-1-alexandre.belloni@bootlin.comSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/char/Kconfig</description>
        <pubDate>Wed, 26 Feb 2020 22:43:21 +0000</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
</channel>
</rss>
