From 5a36481e060c29e773977285af54a0cd2ef1440e0b1f9f013a3b59e154216fb1 Mon Sep 17 00:00:00 2001 From: Jiri Slaby Date: Fri, 11 Mar 2022 12:46:50 +0000 Subject: [PATCH] commit 80acc6576a154b5866520e600dba5148884bc07f OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1685 --- config.tar.bz2 | 4 +- dtb-aarch64.changes | 98 ++++++++++++++++++++++++++++++++++++++ dtb-aarch64.spec | 6 +-- dtb-armv6l.changes | 98 ++++++++++++++++++++++++++++++++++++++ dtb-armv6l.spec | 6 +-- dtb-armv7l.changes | 98 ++++++++++++++++++++++++++++++++++++++ dtb-armv7l.spec | 6 +-- dtb-riscv64.changes | 98 ++++++++++++++++++++++++++++++++++++++ dtb-riscv64.spec | 6 +-- kernel-64kb.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-64kb.spec | 12 ++--- kernel-debug.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-debug.spec | 12 ++--- kernel-default.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-default.spec | 12 ++--- kernel-docs.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-docs.spec | 8 ++-- kernel-kvmsmall.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-kvmsmall.spec | 12 ++--- kernel-lpae.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-lpae.spec | 12 ++--- kernel-obs-build.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-obs-build.spec | 8 ++-- kernel-obs-qa.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-obs-qa.spec | 6 +-- kernel-pae.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-pae.spec | 12 ++--- kernel-source.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-source.spec | 8 ++-- kernel-syms.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-syms.spec | 6 +-- kernel-vanilla.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-vanilla.spec | 12 ++--- kernel-zfcpdump.changes | 98 ++++++++++++++++++++++++++++++++++++++ kernel-zfcpdump.spec | 12 ++--- patches.kernel.org.tar.bz2 | 4 +- series.conf | 54 +++++++++++++++++++++ source-timestamp | 4 +- 38 files changed, 1804 insertions(+), 84 deletions(-) diff --git a/config.tar.bz2 b/config.tar.bz2 index 59c761c4..fee64c08 100644 --- a/config.tar.bz2 +++ b/config.tar.bz2 @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:46bec84001bdb3bf397735f439edbc2005fb6816cff5cbc2993b26f13e66a900 -size 305763 +oid sha256:054c67cc3a88e93deec2974d1862e21dfe66b59d24461dd1a0f41bce22e446bd +size 305380 diff --git a/dtb-aarch64.changes b/dtb-aarch64.changes index 86de8822..14bc9ab3 100644 --- a/dtb-aarch64.changes +++ b/dtb-aarch64.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/dtb-aarch64.spec b/dtb-aarch64.spec index 3d8c1b4c..d2ca28fb 100644 --- a/dtb-aarch64.spec +++ b/dtb-aarch64.spec @@ -17,7 +17,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink}) Name: dtb-aarch64 -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif diff --git a/dtb-armv6l.changes b/dtb-armv6l.changes index 86de8822..14bc9ab3 100644 --- a/dtb-armv6l.changes +++ b/dtb-armv6l.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/dtb-armv6l.spec b/dtb-armv6l.spec index 00997811..cd6dcebe 100644 --- a/dtb-armv6l.spec +++ b/dtb-armv6l.spec @@ -17,7 +17,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink}) Name: dtb-armv6l -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif diff --git a/dtb-armv7l.changes b/dtb-armv7l.changes index 86de8822..14bc9ab3 100644 --- a/dtb-armv7l.changes +++ b/dtb-armv7l.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/dtb-armv7l.spec b/dtb-armv7l.spec index 65786f46..2f0189a4 100644 --- a/dtb-armv7l.spec +++ b/dtb-armv7l.spec @@ -17,7 +17,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink}) Name: dtb-armv7l -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif diff --git a/dtb-riscv64.changes b/dtb-riscv64.changes index 86de8822..14bc9ab3 100644 --- a/dtb-riscv64.changes +++ b/dtb-riscv64.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/dtb-riscv64.spec b/dtb-riscv64.spec index d0cf116a..682fa137 100644 --- a/dtb-riscv64.spec +++ b/dtb-riscv64.spec @@ -17,7 +17,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build,fdupes_relink}) Name: dtb-riscv64 -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif diff --git a/kernel-64kb.changes b/kernel-64kb.changes index 86de8822..14bc9ab3 100644 --- a/kernel-64kb.changes +++ b/kernel-64kb.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-64kb.spec b/kernel-64kb.spec index d78f3ce3..a0c61b6e 100644 --- a/kernel-64kb.spec +++ b/kernel-64kb.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-64kb Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc diff --git a/kernel-debug.changes b/kernel-debug.changes index 86de8822..14bc9ab3 100644 --- a/kernel-debug.changes +++ b/kernel-debug.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-debug.spec b/kernel-debug.spec index a4db0140..69091e2d 100644 --- a/kernel-debug.spec +++ b/kernel-debug.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-debug Summary: A Debug Version of the Kernel License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %ifarch ppc64 Provides: kernel-kdump = 2.6.28 Obsoletes: kernel-kdump <= 2.6.28 diff --git a/kernel-default.changes b/kernel-default.changes index 86de8822..14bc9ab3 100644 --- a/kernel-default.changes +++ b/kernel-default.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-default.spec b/kernel-default.spec index f888c2ca..1b4f5fe3 100644 --- a/kernel-default.spec +++ b/kernel-default.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-default Summary: The Standard Kernel License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %ifarch %ix86 Provides: kernel-smp = 2.6.17 Obsoletes: kernel-smp <= 2.6.17 diff --git a/kernel-docs.changes b/kernel-docs.changes index 86de8822..14bc9ab3 100644 --- a/kernel-docs.changes +++ b/kernel-docs.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-docs.spec b/kernel-docs.spec index e8ce15ee..ff801e05 100644 --- a/kernel-docs.spec +++ b/kernel-docs.spec @@ -17,7 +17,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -31,9 +31,9 @@ Name: kernel-docs Summary: Kernel Documentation License: GPL-2.0-only Group: Documentation/Man -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -64,7 +64,7 @@ BuildRequires: texlive-zapfding %endif Url: http://www.kernel.org/ Provides: %name = %version-%source_rel -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f BuildArch: noarch BuildRoot: %{_tmppath}/%{name}-%{version}-build Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz diff --git a/kernel-kvmsmall.changes b/kernel-kvmsmall.changes index 86de8822..14bc9ab3 100644 --- a/kernel-kvmsmall.changes +++ b/kernel-kvmsmall.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-kvmsmall.spec b/kernel-kvmsmall.spec index d67138e9..8b1f8515 100644 --- a/kernel-kvmsmall.spec +++ b/kernel-kvmsmall.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-kvmsmall Summary: The Small Developer Kernel for KVM License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc diff --git a/kernel-lpae.changes b/kernel-lpae.changes index 86de8822..14bc9ab3 100644 --- a/kernel-lpae.changes +++ b/kernel-lpae.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-lpae.spec b/kernel-lpae.spec index a53ede5d..887f75ae 100644 --- a/kernel-lpae.spec +++ b/kernel-lpae.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-lpae Summary: Kernel for LPAE enabled systems License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc diff --git a/kernel-obs-build.changes b/kernel-obs-build.changes index 86de8822..14bc9ab3 100644 --- a/kernel-obs-build.changes +++ b/kernel-obs-build.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-obs-build.spec b/kernel-obs-build.spec index 1bd79765..b61f4b80 100644 --- a/kernel-obs-build.spec +++ b/kernel-obs-build.spec @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 @@ -45,7 +45,7 @@ BuildRequires: util-linux %endif %endif %endif -BuildRequires: kernel%kernel_flavor-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +BuildRequires: kernel%kernel_flavor-srchash-80acc6576a154b5866520e600dba5148884bc07f %if 0%{?rhel_version} BuildRequires: kernel @@ -64,9 +64,9 @@ BuildRequires: dracut Summary: package kernel and initrd for OBS VM builds License: GPL-2.0-only Group: SLES -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif diff --git a/kernel-obs-qa.changes b/kernel-obs-qa.changes index 86de8822..14bc9ab3 100644 --- a/kernel-obs-qa.changes +++ b/kernel-obs-qa.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-obs-qa.spec b/kernel-obs-qa.spec index 5d81b91a..e2a4bf02 100644 --- a/kernel-obs-qa.spec +++ b/kernel-obs-qa.spec @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -36,9 +36,9 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build Summary: Basic QA tests for the kernel License: GPL-2.0-only Group: SLES -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif diff --git a/kernel-pae.changes b/kernel-pae.changes index 86de8822..14bc9ab3 100644 --- a/kernel-pae.changes +++ b/kernel-pae.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-pae.spec b/kernel-pae.spec index 8bba6c1e..07a42bd5 100644 --- a/kernel-pae.spec +++ b/kernel-pae.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-pae Summary: Kernel with PAE Support License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %ifarch %ix86 Provides: kernel-bigsmp = 2.6.17 Obsoletes: kernel-bigsmp <= 2.6.17 diff --git a/kernel-source.changes b/kernel-source.changes index 86de8822..14bc9ab3 100644 --- a/kernel-source.changes +++ b/kernel-source.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-source.spec b/kernel-source.spec index 0184d18f..427ecdb8 100644 --- a/kernel-source.spec +++ b/kernel-source.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 @@ -35,9 +35,9 @@ Name: kernel-source Summary: The Linux Kernel Sources License: GPL-2.0-only Group: Development/Sources -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -48,7 +48,7 @@ BuildRequires: fdupes BuildRequires: sed Requires(post): coreutils sed Provides: %name = %version-%source_rel -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f Provides: linux Provides: multiversion(kernel) Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz diff --git a/kernel-syms.changes b/kernel-syms.changes index 86de8822..14bc9ab3 100644 --- a/kernel-syms.changes +++ b/kernel-syms.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-syms.spec b/kernel-syms.spec index 6490c799..4992a20b 100644 --- a/kernel-syms.spec +++ b/kernel-syms.spec @@ -24,10 +24,10 @@ Name: kernel-syms Summary: Kernel Symbol Versions (modversions) License: GPL-2.0-only Group: Development/Sources -Version: 5.16.13 +Version: 5.16.14 %if %using_buildservice %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel %endif Requires: pesign-obs-integration Provides: %name = %version-%source_rel -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f Provides: multiversion(kernel) Source: README.KSYMS Requires: kernel-devel%variant = %version-%source_rel diff --git a/kernel-vanilla.changes b/kernel-vanilla.changes index 86de8822..14bc9ab3 100644 --- a/kernel-vanilla.changes +++ b/kernel-vanilla.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-vanilla.spec b/kernel-vanilla.spec index 7de24e75..bff1220b 100644 --- a/kernel-vanilla.spec +++ b/kernel-vanilla.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-vanilla Summary: The Standard Kernel - without any SUSE patches License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc diff --git a/kernel-zfcpdump.changes b/kernel-zfcpdump.changes index 86de8822..14bc9ab3 100644 --- a/kernel-zfcpdump.changes +++ b/kernel-zfcpdump.changes @@ -1,3 +1,101 @@ +------------------------------------------------------------------- +Fri Mar 11 13:02:42 CET 2022 - jslaby@suse.cz + +- Linux 5.16.14 (bsc#1012628). +- Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC + GPE" (bsc#1012628). +- xen/netfront: react properly to failing + gnttab_end_foreign_access_ref() (bsc#1012628). +- xen/gnttab: fix gnttab_end_foreign_access() without page + specified (bsc#1012628). +- xen/pvcalls: use alloc/free_pages_exact() (bsc#1012628). +- xen/9p: use alloc/free_pages_exact() (bsc#1012628). +- xen: remove gnttab_query_foreign_access() (bsc#1012628). +- xen/gntalloc: don't use gnttab_query_foreign_access() + (bsc#1012628). +- xen/scsifront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/netfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/blkfront: don't use gnttab_query_foreign_access() for + mapped status (bsc#1012628). +- xen/grant-table: add gnttab_try_end_foreign_access() + (bsc#1012628). +- xen/xenbus: don't let xenbus_grant_ring() remove grants in + error case (bsc#1012628). +- ARM: fix build warning in proc-v7-bugs.c (bsc#1012628). +- arm64: Do not include __READ_ONCE() block in assembly files + (bsc#1012628). +- ARM: Do not use NOCROSSREFS directive with ld.lld (bsc#1012628). +- ARM: fix co-processor register typo (bsc#1012628). +- ARM: fix build error when BPF_SYSCALL is disabled (bsc#1012628). +- arm64: proton-pack: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- arm64: Use the clearbhb instruction in mitigations + (bsc#1012628). +- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered + and migrated (bsc#1012628). +- arm64: Mitigate spectre style branch history side channels + (bsc#1012628). +- Update config files. +- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part + of Spectre-v2 (bsc#1012628). +- arm64: Add percpu vectors for EL1 (bsc#1012628). +- arm64: entry: Add macro for reading symbol addresses from the + trampoline (bsc#1012628). +- arm64: entry: Add vectors that have the bhb mitigation sequences + (bsc#1012628). +- arm64: entry: Add non-kpti __bp_harden_el1_vectors for + mitigations (bsc#1012628). +- arm64: entry: Allow the trampoline text to occupy multiple pages + (bsc#1012628). +- arm64: entry: Make the kpti trampoline's kpti sequence optional + (bsc#1012628). +- arm64: entry: Move trampoline macros out of ifdef'd section + (bsc#1012628). +- arm64: entry: Don't assume tramp_vectors is the start of the + vectors (bsc#1012628). +- arm64: entry: Allow tramp_alias to access symbols after the + 4K boundary (bsc#1012628). +- arm64: entry: Move the trampoline data page before the text page + (bsc#1012628). +- arm64: entry: Free up another register on kpti's tramp_exit path + (bsc#1012628). +- arm64: entry: Make the trampoline cleanup optional + (bsc#1012628). +- KVM: arm64: Allow indirect vectors to be used without + SPECTRE_V3A (bsc#1012628). +- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit + (bsc#1012628). +- arm64: entry.S: Add ventry overflow sanity checks (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_RPRES (bsc#1012628). +- arm64: cpufeature: add HWCAP for FEAT_AFP (bsc#1012628). +- arm64: add ID_AA64ISAR2_EL1 sys register (bsc#1012628). +- ARM: include unprivileged BPF status in Spectre V2 reporting + (bsc#1012628). +- ARM: Spectre-BHB workaround (bsc#1012628). +- Update config files. +- ARM: use LOADADDR() to get load address of sections + (bsc#1012628). +- ARM: early traps initialisation (bsc#1012628). +- ARM: report Spectre v2 status through sysfs (bsc#1012628). +- Update config files. +- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + + SMT (bsc#1012628). +- x86/speculation: Warn about Spectre v2 LFENCE mitigation + (bsc#1012628). +- x86/speculation: Update link to AMD speculation whitepaper + (bsc#1012628). +- x86/speculation: Use generic retpoline by default on AMD + (bsc#1012628). +- x86/speculation: Include unprivileged eBPF status in Spectre + v2 mitigation reporting (bsc#1012628). +- Documentation/hw-vuln: Update spectre doc (bsc#1012628). +- x86/speculation: Add eIBRS + Retpoline options (bsc#1012628). +- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE + (bsc#1012628). +- commit 80acc65 + ------------------------------------------------------------------- Wed Mar 9 12:12:51 CET 2022 - tiwai@suse.de diff --git a/kernel-zfcpdump.spec b/kernel-zfcpdump.spec index ce0975a1..a38a0d1b 100644 --- a/kernel-zfcpdump.spec +++ b/kernel-zfcpdump.spec @@ -18,7 +18,7 @@ %define srcversion 5.16 -%define patchversion 5.16.13 +%define patchversion 5.16.14 %define variant %{nil} %define vanilla_only 0 %define compress_modules zstd @@ -107,9 +107,9 @@ Name: kernel-zfcpdump Summary: The IBM System Z zfcpdump Kernel License: GPL-2.0-only Group: System/Kernel -Version: 5.16.13 +Version: 5.16.14 %if 0%{?is_kotd} -Release: .g9251332 +Release: .g80acc65 %else Release: 0 %endif @@ -231,10 +231,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 -Provides: kernel-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: kernel-%build_flavor-base-srchash-80acc6576a154b5866520e600dba5148884bc07f +Provides: kernel-srchash-80acc6576a154b5866520e600dba5148884bc07f # END COMMON DEPS -Provides: %name-srchash-9251332ff1e4a16ec32675d0d105a62f577bb017 +Provides: %name-srchash-80acc6576a154b5866520e600dba5148884bc07f %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc diff --git a/patches.kernel.org.tar.bz2 b/patches.kernel.org.tar.bz2 index 9e2e0602..d708cea7 100644 --- a/patches.kernel.org.tar.bz2 +++ b/patches.kernel.org.tar.bz2 @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:2c956bb8a8a5c1c7e2eb66971585ed0754c6de31537343f3e6a675cefd1efc2a -size 1679286 +oid sha256:3bf03f639e8e80470cca23e1aa0a40d84f0021706f1a0f0c00076588831c7dbb +size 1730637 diff --git a/series.conf b/series.conf index fdc7a687..9f740978 100644 --- a/series.conf +++ b/series.conf @@ -2297,6 +2297,60 @@ patches.kernel.org/5.16.13-183-s390-ftrace-fix-ftrace_caller-ftrace_regs_cal.patch patches.kernel.org/5.16.13-184-KVM-x86-mmu-Passing-up-the-error-state-of-mmu.patch patches.kernel.org/5.16.13-185-Linux-5.16.13.patch + patches.kernel.org/5.16.14-001-x86-speculation-Rename-RETPOLINE_AMD-to-RETPO.patch + patches.kernel.org/5.16.14-002-x86-speculation-Add-eIBRS-Retpoline-options.patch + patches.kernel.org/5.16.14-003-Documentation-hw-vuln-Update-spectre-doc.patch + patches.kernel.org/5.16.14-004-x86-speculation-Include-unprivileged-eBPF-sta.patch + patches.kernel.org/5.16.14-005-x86-speculation-Use-generic-retpoline-by-defa.patch + patches.kernel.org/5.16.14-006-x86-speculation-Update-link-to-AMD-speculatio.patch + patches.kernel.org/5.16.14-007-x86-speculation-Warn-about-Spectre-v2-LFENCE-.patch + patches.kernel.org/5.16.14-008-x86-speculation-Warn-about-eIBRS-LFENCE-Unpri.patch + patches.kernel.org/5.16.14-009-ARM-report-Spectre-v2-status-through-sysfs.patch + patches.kernel.org/5.16.14-010-ARM-early-traps-initialisation.patch + patches.kernel.org/5.16.14-011-ARM-use-LOADADDR-to-get-load-address-of-secti.patch + patches.kernel.org/5.16.14-012-ARM-Spectre-BHB-workaround.patch + patches.kernel.org/5.16.14-013-ARM-include-unprivileged-BPF-status-in-Spectr.patch + patches.kernel.org/5.16.14-014-arm64-add-ID_AA64ISAR2_EL1-sys-register.patch + patches.kernel.org/5.16.14-015-arm64-cpufeature-add-HWCAP-for-FEAT_AFP.patch + patches.kernel.org/5.16.14-016-arm64-cpufeature-add-HWCAP-for-FEAT_RPRES.patch + patches.kernel.org/5.16.14-017-arm64-entry.S-Add-ventry-overflow-sanity-chec.patch + patches.kernel.org/5.16.14-018-arm64-spectre-Rename-spectre_v4_patch_fw_miti.patch + patches.kernel.org/5.16.14-019-KVM-arm64-Allow-indirect-vectors-to-be-used-w.patch + patches.kernel.org/5.16.14-020-arm64-entry-Make-the-trampoline-cleanup-optio.patch + patches.kernel.org/5.16.14-021-arm64-entry-Free-up-another-register-on-kpti-.patch + patches.kernel.org/5.16.14-022-arm64-entry-Move-the-trampoline-data-page-bef.patch + patches.kernel.org/5.16.14-023-arm64-entry-Allow-tramp_alias-to-access-symbo.patch + patches.kernel.org/5.16.14-024-arm64-entry-Don-t-assume-tramp_vectors-is-the.patch + patches.kernel.org/5.16.14-025-arm64-entry-Move-trampoline-macros-out-of-ifd.patch + patches.kernel.org/5.16.14-026-arm64-entry-Make-the-kpti-trampoline-s-kpti-s.patch + patches.kernel.org/5.16.14-027-arm64-entry-Allow-the-trampoline-text-to-occu.patch + patches.kernel.org/5.16.14-028-arm64-entry-Add-non-kpti-__bp_harden_el1_vect.patch + patches.kernel.org/5.16.14-029-arm64-entry-Add-vectors-that-have-the-bhb-mit.patch + patches.kernel.org/5.16.14-030-arm64-entry-Add-macro-for-reading-symbol-addr.patch + patches.kernel.org/5.16.14-031-arm64-Add-percpu-vectors-for-EL1.patch + patches.kernel.org/5.16.14-032-arm64-proton-pack-Report-Spectre-BHB-vulnerab.patch + patches.kernel.org/5.16.14-033-arm64-Mitigate-spectre-style-branch-history-s.patch + patches.kernel.org/5.16.14-034-KVM-arm64-Allow-SMCCC_ARCH_WORKAROUND_3-to-be.patch + patches.kernel.org/5.16.14-035-arm64-Use-the-clearbhb-instruction-in-mitigat.patch + patches.kernel.org/5.16.14-036-arm64-proton-pack-Include-unprivileged-eBPF-s.patch + patches.kernel.org/5.16.14-037-ARM-fix-build-error-when-BPF_SYSCALL-is-disab.patch + patches.kernel.org/5.16.14-038-ARM-fix-co-processor-register-typo.patch + patches.kernel.org/5.16.14-039-ARM-Do-not-use-NOCROSSREFS-directive-with-ld..patch + patches.kernel.org/5.16.14-040-arm64-Do-not-include-__READ_ONCE-block-in-ass.patch + patches.kernel.org/5.16.14-041-ARM-fix-build-warning-in-proc-v7-bugs.c.patch + patches.kernel.org/5.16.14-042-xen-xenbus-don-t-let-xenbus_grant_ring-remove.patch + patches.kernel.org/5.16.14-043-xen-grant-table-add-gnttab_try_end_foreign_ac.patch + patches.kernel.org/5.16.14-044-xen-blkfront-don-t-use-gnttab_query_foreign_a.patch + patches.kernel.org/5.16.14-045-xen-netfront-don-t-use-gnttab_query_foreign_a.patch + patches.kernel.org/5.16.14-046-xen-scsifront-don-t-use-gnttab_query_foreign_.patch + patches.kernel.org/5.16.14-047-xen-gntalloc-don-t-use-gnttab_query_foreign_a.patch + patches.kernel.org/5.16.14-048-xen-remove-gnttab_query_foreign_access.patch + patches.kernel.org/5.16.14-049-xen-9p-use-alloc-free_pages_exact.patch + patches.kernel.org/5.16.14-050-xen-pvcalls-use-alloc-free_pages_exact.patch + patches.kernel.org/5.16.14-051-xen-gnttab-fix-gnttab_end_foreign_access-with.patch + patches.kernel.org/5.16.14-052-xen-netfront-react-properly-to-failing-gnttab.patch + patches.kernel.org/5.16.14-053-Revert-ACPI-PM-s2idle-Cancel-wakeup-before-di.patch + patches.kernel.org/5.16.14-054-Linux-5.16.14.patch ######################################################## # Build fixes that apply to the vanilla kernel too. diff --git a/source-timestamp b/source-timestamp index 7600dfe9..872643f3 100644 --- a/source-timestamp +++ b/source-timestamp @@ -1,3 +1,3 @@ -2022-03-10 04:48:38 +0000 -GIT Revision: 9251332ff1e4a16ec32675d0d105a62f577bb017 +2022-03-11 12:33:34 +0000 +GIT Revision: 80acc6576a154b5866520e600dba5148884bc07f GIT Branch: stable