commit 80acc6576a154b5866520e600dba5148884bc07f
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1685
This commit is contained in:
parent
b5d2152512
commit
5a36481e06
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:46bec84001bdb3bf397735f439edbc2005fb6816cff5cbc2993b26f13e66a900
|
||||
size 305763
|
||||
oid sha256:054c67cc3a88e93deec2974d1862e21dfe66b59d24461dd1a0f41bce22e446bd
|
||||
size 305380
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -29,9 +29,9 @@
|
||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink})
|
||||
|
||||
Name: dtb-aarch64
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -29,9 +29,9 @@
|
||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink})
|
||||
|
||||
Name: dtb-armv6l
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -29,9 +29,9 @@
|
||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink})
|
||||
|
||||
Name: dtb-armv7l
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -29,9 +29,9 @@
|
||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink})
|
||||
|
||||
Name: dtb-riscv64
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-64kb
|
||||
Summary: Kernel with 64kb PAGE_SIZE
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source3: kernel-source.rpmlintrc
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-debug
|
||||
Summary: A Debug Version of the Kernel
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%ifarch ppc64
|
||||
Provides: kernel-kdump = 2.6.28
|
||||
Obsoletes: kernel-kdump <= 2.6.28
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-default
|
||||
Summary: The Standard Kernel
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%ifarch %ix86
|
||||
Provides: kernel-smp = 2.6.17
|
||||
Obsoletes: kernel-smp <= 2.6.17
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -31,9 +31,9 @@ Name: kernel-docs
|
||||
Summary: Kernel Documentation
|
||||
License: GPL-2.0-only
|
||||
Group: Documentation/Man
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -64,7 +64,7 @@ BuildRequires: texlive-zapfding
|
||||
%endif
|
||||
Url: http://www.kernel.org/
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
BuildArch: noarch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-kvmsmall
|
||||
Summary: The Small Developer Kernel for KVM
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source3: kernel-source.rpmlintrc
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-lpae
|
||||
Summary: Kernel for LPAE enabled systems
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source3: kernel-source.rpmlintrc
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -19,7 +19,7 @@
|
||||
|
||||
#!BuildIgnore: post-build-checks
|
||||
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -45,7 +45,7 @@ BuildRequires: util-linux
|
||||
%endif
|
||||
%endif
|
||||
%endif
|
||||
BuildRequires: kernel%kernel_flavor-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
BuildRequires: kernel%kernel_flavor-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
|
||||
%if 0%{?rhel_version}
|
||||
BuildRequires: kernel
|
||||
@ -64,9 +64,9 @@ BuildRequires: dracut
|
||||
Summary: package kernel and initrd for OBS VM builds
|
||||
License: GPL-2.0-only
|
||||
Group: SLES
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
# needsrootforbuild
|
||||
|
||||
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -36,9 +36,9 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
Summary: Basic QA tests for the kernel
|
||||
License: GPL-2.0-only
|
||||
Group: SLES
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-pae
|
||||
Summary: Kernel with PAE Support
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%ifarch %ix86
|
||||
Provides: kernel-bigsmp = 2.6.17
|
||||
Obsoletes: kernel-bigsmp <= 2.6.17
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -35,9 +35,9 @@ Name: kernel-source
|
||||
Summary: The Linux Kernel Sources
|
||||
License: GPL-2.0-only
|
||||
Group: Development/Sources
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -48,7 +48,7 @@ BuildRequires: fdupes
|
||||
BuildRequires: sed
|
||||
Requires(post): coreutils sed
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: linux
|
||||
Provides: multiversion(kernel)
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -24,10 +24,10 @@ Name: kernel-syms
|
||||
Summary: Kernel Symbol Versions (modversions)
|
||||
License: GPL-2.0-only
|
||||
Group: Development/Sources
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if %using_buildservice
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel
|
||||
%endif
|
||||
Requires: pesign-obs-integration
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: multiversion(kernel)
|
||||
Source: README.KSYMS
|
||||
Requires: kernel-devel%variant = %version-%source_rel
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-vanilla
|
||||
Summary: The Standard Kernel - without any SUSE patches
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source3: kernel-source.rpmlintrc
|
||||
|
@ -1,3 +1,101 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.16.14 (bsc#1012628).
|
||||
- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC
|
||||
GPE" (bsc#1012628).
|
||||
- xen/netfront: react properly to failing
|
||||
gnttab_end_foreign_access_ref() (bsc#1012628).
|
||||
- xen/gnttab: fix gnttab_end_foreign_access() without page
|
||||
specified (bsc#1012628).
|
||||
- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen/9p: use alloc/free_pages_exact() (bsc#1012628).
|
||||
- xen: remove gnttab_query_foreign_access() (bsc#1012628).
|
||||
- xen/gntalloc: don't use gnttab_query_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/scsifront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/netfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/blkfront: don't use gnttab_query_foreign_access() for
|
||||
mapped status (bsc#1012628).
|
||||
- xen/grant-table: add gnttab_try_end_foreign_access()
|
||||
(bsc#1012628).
|
||||
- xen/xenbus: don't let xenbus_grant_ring() remove grants in
|
||||
error case (bsc#1012628).
|
||||
- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628).
|
||||
- arm64: Do not include __READ_ONCE() block in assembly files
|
||||
(bsc#1012628).
|
||||
- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628).
|
||||
- ARM: fix co-processor register typo (bsc#1012628).
|
||||
- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628).
|
||||
- arm64: proton-pack: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- arm64: Use the clearbhb instruction in mitigations
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered
|
||||
and migrated (bsc#1012628).
|
||||
- arm64: Mitigate spectre style branch history side channels
|
||||
(bsc#1012628).
|
||||
- Update config files.
|
||||
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part
|
||||
of Spectre-v2 (bsc#1012628).
|
||||
- arm64: Add percpu vectors for EL1 (bsc#1012628).
|
||||
- arm64: entry: Add macro for reading symbol addresses from the
|
||||
trampoline (bsc#1012628).
|
||||
- arm64: entry: Add vectors that have the bhb mitigation sequences
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for
|
||||
mitigations (bsc#1012628).
|
||||
- arm64: entry: Allow the trampoline text to occupy multiple pages
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the kpti trampoline's kpti sequence optional
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Move trampoline macros out of ifdef'd section
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Don't assume tramp_vectors is the start of the
|
||||
vectors (bsc#1012628).
|
||||
- arm64: entry: Allow tramp_alias to access symbols after the
|
||||
4K boundary (bsc#1012628).
|
||||
- arm64: entry: Move the trampoline data page before the text page
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Free up another register on kpti's tramp_exit path
|
||||
(bsc#1012628).
|
||||
- arm64: entry: Make the trampoline cleanup optional
|
||||
(bsc#1012628).
|
||||
- KVM: arm64: Allow indirect vectors to be used without
|
||||
SPECTRE_V3A (bsc#1012628).
|
||||
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
|
||||
(bsc#1012628).
|
||||
- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628).
|
||||
- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628).
|
||||
- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628).
|
||||
- ARM: include unprivileged BPF status in Spectre V2 reporting
|
||||
(bsc#1012628).
|
||||
- ARM: Spectre-BHB workaround (bsc#1012628).
|
||||
- Update config files.
|
||||
- ARM: use LOADADDR() to get load address of sections
|
||||
(bsc#1012628).
|
||||
- ARM: early traps initialisation (bsc#1012628).
|
||||
- ARM: report Spectre v2 status through sysfs (bsc#1012628).
|
||||
- Update config files.
|
||||
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF +
|
||||
SMT (bsc#1012628).
|
||||
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Update link to AMD speculation whitepaper
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Use generic retpoline by default on AMD
|
||||
(bsc#1012628).
|
||||
- x86/speculation: Include unprivileged eBPF status in Spectre
|
||||
v2 mitigation reporting (bsc#1012628).
|
||||
- Documentation/hw-vuln: Update spectre doc (bsc#1012628).
|
||||
- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628).
|
||||
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
|
||||
(bsc#1012628).
|
||||
- commit 80acc65
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.16
|
||||
%define patchversion 5.16.13
|
||||
%define patchversion 5.16.14
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
%define compress_modules zstd
|
||||
@ -107,9 +107,9 @@ Name: kernel-zfcpdump
|
||||
Summary: The IBM System Z zfcpdump Kernel
|
||||
License: GPL-2.0-only
|
||||
Group: System/Kernel
|
||||
Version: 5.16.13
|
||||
Version: 5.16.14
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g9251332
|
||||
Release: <RELEASE>.g80acc65
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -231,10 +231,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source3: kernel-source.rpmlintrc
|
||||
|
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:2c956bb8a8a5c1c7e2eb66971585ed0754c6de31537343f3e6a675cefd1efc2a
|
||||
size 1679286
|
||||
oid sha256:3bf03f639e8e80470cca23e1aa0a40d84f0021706f1a0f0c00076588831c7dbb
|
||||
size 1730637
|
||||
|
54
series.conf
54
series.conf
@ -2297,6 +2297,60 @@
|
||||
patches.kernel.org/5.16.13-183-s390-ftrace-fix-ftrace_caller-ftrace_regs_cal.patch
|
||||
patches.kernel.org/5.16.13-184-KVM-x86-mmu-Passing-up-the-error-state-of-mmu.patch
|
||||
patches.kernel.org/5.16.13-185-Linux-5.16.13.patch
|
||||
patches.kernel.org/5.16.14-001-x86-speculation-Rename-RETPOLINE_AMD-to-RETPO.patch
|
||||
patches.kernel.org/5.16.14-002-x86-speculation-Add-eIBRS-Retpoline-options.patch
|
||||
patches.kernel.org/5.16.14-003-Documentation-hw-vuln-Update-spectre-doc.patch
|
||||
patches.kernel.org/5.16.14-004-x86-speculation-Include-unprivileged-eBPF-sta.patch
|
||||
patches.kernel.org/5.16.14-005-x86-speculation-Use-generic-retpoline-by-defa.patch
|
||||
patches.kernel.org/5.16.14-006-x86-speculation-Update-link-to-AMD-speculatio.patch
|
||||
patches.kernel.org/5.16.14-007-x86-speculation-Warn-about-Spectre-v2-LFENCE-.patch
|
||||
patches.kernel.org/5.16.14-008-x86-speculation-Warn-about-eIBRS-LFENCE-Unpri.patch
|
||||
patches.kernel.org/5.16.14-009-ARM-report-Spectre-v2-status-through-sysfs.patch
|
||||
patches.kernel.org/5.16.14-010-ARM-early-traps-initialisation.patch
|
||||
patches.kernel.org/5.16.14-011-ARM-use-LOADADDR-to-get-load-address-of-secti.patch
|
||||
patches.kernel.org/5.16.14-012-ARM-Spectre-BHB-workaround.patch
|
||||
patches.kernel.org/5.16.14-013-ARM-include-unprivileged-BPF-status-in-Spectr.patch
|
||||
patches.kernel.org/5.16.14-014-arm64-add-ID_AA64ISAR2_EL1-sys-register.patch
|
||||
patches.kernel.org/5.16.14-015-arm64-cpufeature-add-HWCAP-for-FEAT_AFP.patch
|
||||
patches.kernel.org/5.16.14-016-arm64-cpufeature-add-HWCAP-for-FEAT_RPRES.patch
|
||||
patches.kernel.org/5.16.14-017-arm64-entry.S-Add-ventry-overflow-sanity-chec.patch
|
||||
patches.kernel.org/5.16.14-018-arm64-spectre-Rename-spectre_v4_patch_fw_miti.patch
|
||||
patches.kernel.org/5.16.14-019-KVM-arm64-Allow-indirect-vectors-to-be-used-w.patch
|
||||
patches.kernel.org/5.16.14-020-arm64-entry-Make-the-trampoline-cleanup-optio.patch
|
||||
patches.kernel.org/5.16.14-021-arm64-entry-Free-up-another-register-on-kpti-.patch
|
||||
patches.kernel.org/5.16.14-022-arm64-entry-Move-the-trampoline-data-page-bef.patch
|
||||
patches.kernel.org/5.16.14-023-arm64-entry-Allow-tramp_alias-to-access-symbo.patch
|
||||
patches.kernel.org/5.16.14-024-arm64-entry-Don-t-assume-tramp_vectors-is-the.patch
|
||||
patches.kernel.org/5.16.14-025-arm64-entry-Move-trampoline-macros-out-of-ifd.patch
|
||||
patches.kernel.org/5.16.14-026-arm64-entry-Make-the-kpti-trampoline-s-kpti-s.patch
|
||||
patches.kernel.org/5.16.14-027-arm64-entry-Allow-the-trampoline-text-to-occu.patch
|
||||
patches.kernel.org/5.16.14-028-arm64-entry-Add-non-kpti-__bp_harden_el1_vect.patch
|
||||
patches.kernel.org/5.16.14-029-arm64-entry-Add-vectors-that-have-the-bhb-mit.patch
|
||||
patches.kernel.org/5.16.14-030-arm64-entry-Add-macro-for-reading-symbol-addr.patch
|
||||
patches.kernel.org/5.16.14-031-arm64-Add-percpu-vectors-for-EL1.patch
|
||||
patches.kernel.org/5.16.14-032-arm64-proton-pack-Report-Spectre-BHB-vulnerab.patch
|
||||
patches.kernel.org/5.16.14-033-arm64-Mitigate-spectre-style-branch-history-s.patch
|
||||
patches.kernel.org/5.16.14-034-KVM-arm64-Allow-SMCCC_ARCH_WORKAROUND_3-to-be.patch
|
||||
patches.kernel.org/5.16.14-035-arm64-Use-the-clearbhb-instruction-in-mitigat.patch
|
||||
patches.kernel.org/5.16.14-036-arm64-proton-pack-Include-unprivileged-eBPF-s.patch
|
||||
patches.kernel.org/5.16.14-037-ARM-fix-build-error-when-BPF_SYSCALL-is-disab.patch
|
||||
patches.kernel.org/5.16.14-038-ARM-fix-co-processor-register-typo.patch
|
||||
patches.kernel.org/5.16.14-039-ARM-Do-not-use-NOCROSSREFS-directive-with-ld..patch
|
||||
patches.kernel.org/5.16.14-040-arm64-Do-not-include-__READ_ONCE-block-in-ass.patch
|
||||
patches.kernel.org/5.16.14-041-ARM-fix-build-warning-in-proc-v7-bugs.c.patch
|
||||
patches.kernel.org/5.16.14-042-xen-xenbus-don-t-let-xenbus_grant_ring-remove.patch
|
||||
patches.kernel.org/5.16.14-043-xen-grant-table-add-gnttab_try_end_foreign_ac.patch
|
||||
patches.kernel.org/5.16.14-044-xen-blkfront-don-t-use-gnttab_query_foreign_a.patch
|
||||
patches.kernel.org/5.16.14-045-xen-netfront-don-t-use-gnttab_query_foreign_a.patch
|
||||
patches.kernel.org/5.16.14-046-xen-scsifront-don-t-use-gnttab_query_foreign_.patch
|
||||
patches.kernel.org/5.16.14-047-xen-gntalloc-don-t-use-gnttab_query_foreign_a.patch
|
||||
patches.kernel.org/5.16.14-048-xen-remove-gnttab_query_foreign_access.patch
|
||||
patches.kernel.org/5.16.14-049-xen-9p-use-alloc-free_pages_exact.patch
|
||||
patches.kernel.org/5.16.14-050-xen-pvcalls-use-alloc-free_pages_exact.patch
|
||||
patches.kernel.org/5.16.14-051-xen-gnttab-fix-gnttab_end_foreign_access-with.patch
|
||||
patches.kernel.org/5.16.14-052-xen-netfront-react-properly-to-failing-gnttab.patch
|
||||
patches.kernel.org/5.16.14-053-Revert-ACPI-PM-s2idle-Cancel-wakeup-before-di.patch
|
||||
patches.kernel.org/5.16.14-054-Linux-5.16.14.patch
|
||||
|
||||
########################################################
|
||||
# Build fixes that apply to the vanilla kernel too.
|
||||
|
@ -1,3 +1,3 @@
|
||||
2022-03-10 04:48:38 +0000
|
||||
GIT Revision: 9251332ff1e4a16ec32675d0d105a62f577bb017
|
||||
2022-03-11 12:33:34 +0000
|
||||
GIT Revision: 80acc6576a154b5866520e600dba5148884bc07f
|
||||
GIT Branch: stable
|
||||
|
Loading…
Reference in New Issue
Block a user