commit 2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1

OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1054
This commit is contained in:
Jiri Slaby 2019-04-17 06:57:14 +00:00 committed by Git OBS Bridge
parent 0b1f14a741
commit 75ba616d17
35 changed files with 352 additions and 54 deletions

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-aarch64
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv6l
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv7l
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%ifarch ppc64
Provides: kernel-kdump = 2.6.28
Obsoletes: kernel-kdump <= 2.6.28

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%ifarch %ix86
Provides: kernel-smp = 2.6.17
Obsoletes: kernel-smp <= 2.6.17

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -33,7 +33,7 @@ License: GPL-2.0
Group: Documentation/Man
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
%endif
Url: http://www.kernel.org/
Provides: %name = %version-%source_rel
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -45,7 +45,7 @@ BuildRequires: util-linux
%endif
%endif
%endif
BuildRequires: kernel%kernel_flavor-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
BuildRequires: kernel%kernel_flavor-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%if 0%{?rhel_version}
BuildRequires: kernel
@ -66,7 +66,7 @@ License: GPL-2.0
Group: SLES
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -38,7 +38,7 @@ License: GPL-2.0
Group: SLES
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%ifarch %ix86
Provides: kernel-bigsmp = 2.6.17
Obsoletes: kernel-bigsmp <= 2.6.17

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -32,7 +32,7 @@ License: GPL-2.0
Group: Development/Sources
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -43,7 +43,7 @@ BuildRequires: fdupes
BuildRequires: sed
Requires(post): coreutils sed
Provides: %name = %version-%source_rel
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: linux
Provides: multiversion(kernel)
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -27,7 +27,7 @@ Group: Development/Sources
Version: 5.0.7
%if %using_buildservice
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -55,7 +55,7 @@ Requires: kernel-zfcpdump-devel = %version-%source_rel
%endif
Requires: pesign-obs-integration
Provides: %name = %version-%source_rel
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: multiversion(kernel)
Source: README.KSYMS
Requires: kernel-devel%variant = %version-%source_rel

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
- Delete
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
- Delete
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
- Delete
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
- Delete
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
- Delete
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
based on exploiting deep call stacks low."
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
- commit 2cfda4d
-------------------------------------------------------------------
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz

View File

@ -64,7 +64,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.0.7
%if 0%{?is_kotd}
Release: <RELEASE>.g8a6bcaf
Release: <RELEASE>.g2cfda4d
%else
Release: 0
%endif
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
# END COMMON DEPS
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:bf15c5415b4231c35d8ded709c60f618ed8fae819b5f3c36bc7887ae8a424e30
size 64932
oid sha256:484e9dff78c735205f9d7e215bf13f9feec990da6110c568a7f163cdfdedf594
size 57700

View File

@ -884,12 +884,6 @@
########################################################
patches.suse/setuid-dumpable-wrongdir
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch
########################################################
# Architecture-specific patches. These used to be all
# at the end of series.conf, but since we don't do

View File

@ -1,3 +1,3 @@
2019-04-15 10:44:40 +0000
GIT Revision: 8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
2019-04-17 06:41:55 +0000
GIT Revision: 2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
GIT Branch: stable