commit d6e8aab45978d5943878ae13ab2b290e693aff4d
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1158
This commit is contained in:
parent
0690308d69
commit
a2e71edfb4
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:1206597af5c7e843e35816a3b208f11400c09d620992a80b7c8c1198592c591f
|
||||
size 213703
|
||||
oid sha256:5e59edc7c43c8ab775b9791d34c41679a9447d5af1a0574a9f03fa05a9291397
|
||||
size 213759
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-aarch64
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv6l
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv7l
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%ifarch ppc64
|
||||
Provides: kernel-kdump = 2.6.28
|
||||
Obsoletes: kernel-kdump <= 2.6.28
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%ifarch %ix86
|
||||
Provides: kernel-smp = 2.6.17
|
||||
Obsoletes: kernel-smp <= 2.6.17
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -33,7 +33,7 @@ License: GPL-2.0
|
||||
Group: Documentation/Man
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
|
||||
%endif
|
||||
Url: http://www.kernel.org/
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
BuildArch: noarch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -45,7 +45,7 @@ BuildRequires: util-linux
|
||||
%endif
|
||||
%endif
|
||||
%endif
|
||||
BuildRequires: kernel%kernel_flavor-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
BuildRequires: kernel%kernel_flavor-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
|
||||
%if 0%{?rhel_version}
|
||||
BuildRequires: kernel
|
||||
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -38,7 +38,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%ifarch %ix86
|
||||
Provides: kernel-bigsmp = 2.6.17
|
||||
Obsoletes: kernel-bigsmp <= 2.6.17
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -32,7 +32,7 @@ License: GPL-2.0
|
||||
Group: Development/Sources
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -43,7 +43,7 @@ BuildRequires: fdupes
|
||||
BuildRequires: sed
|
||||
Requires(post): coreutils sed
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: linux
|
||||
Provides: multiversion(kernel)
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -27,7 +27,7 @@ Group: Development/Sources
|
||||
Version: 5.2.11
|
||||
%if %using_buildservice
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel
|
||||
%endif
|
||||
Requires: pesign-obs-integration
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: multiversion(kernel)
|
||||
Source: README.KSYMS
|
||||
Requires: kernel-devel%variant = %version-%source_rel
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,16 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
|
||||
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
|
||||
(where the feature is not available). This extends the number of functions
|
||||
which are protected by "stack canary" check to catch functions writing past
|
||||
their stack frame.
|
||||
This change was requested by SUSE security to make our kernels more
|
||||
resistant to some types of stack overflow attacks. Tests performed by
|
||||
kernel performance teams confirmed that performance impact is acceptable.
|
||||
- commit d6e8aab
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.11
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g533dae1
|
||||
Release: <RELEASE>.gd6e8aab
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
|
||||
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,3 @@
|
||||
2019-09-03 09:43:17 +0000
|
||||
GIT Revision: 533dae19dd625d5978c3334db69118d063a58630
|
||||
2019-09-04 06:10:12 +0000
|
||||
GIT Revision: d6e8aab45978d5943878ae13ab2b290e693aff4d
|
||||
GIT Branch: stable
|
||||
|
Loading…
Reference in New Issue
Block a user