commit d6e8aab45978d5943878ae13ab2b290e693aff4d

OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1158
This commit is contained in:
Jiri Slaby 2019-09-04 07:58:14 +00:00 committed by Git OBS Bridge
parent 0690308d69
commit a2e71edfb4
34 changed files with 256 additions and 48 deletions

View File

@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:1206597af5c7e843e35816a3b208f11400c09d620992a80b7c8c1198592c591f
size 213703
oid sha256:5e59edc7c43c8ab775b9791d34c41679a9447d5af1a0574a9f03fa05a9291397
size 213759

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-aarch64
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv6l
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv7l
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%ifarch ppc64
Provides: kernel-kdump = 2.6.28
Obsoletes: kernel-kdump <= 2.6.28

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%ifarch %ix86
Provides: kernel-smp = 2.6.17
Obsoletes: kernel-smp <= 2.6.17

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -33,7 +33,7 @@ License: GPL-2.0
Group: Documentation/Man
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
%endif
Url: http://www.kernel.org/
Provides: %name = %version-%source_rel
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -45,7 +45,7 @@ BuildRequires: util-linux
%endif
%endif
%endif
BuildRequires: kernel%kernel_flavor-srchash-533dae19dd625d5978c3334db69118d063a58630
BuildRequires: kernel%kernel_flavor-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%if 0%{?rhel_version}
BuildRequires: kernel
@ -66,7 +66,7 @@ License: GPL-2.0
Group: SLES
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -38,7 +38,7 @@ License: GPL-2.0
Group: SLES
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%ifarch %ix86
Provides: kernel-bigsmp = 2.6.17
Obsoletes: kernel-bigsmp <= 2.6.17

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -32,7 +32,7 @@ License: GPL-2.0
Group: Development/Sources
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -43,7 +43,7 @@ BuildRequires: fdupes
BuildRequires: sed
Requires(post): coreutils sed
Provides: %name = %version-%source_rel
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: linux
Provides: multiversion(kernel)
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -27,7 +27,7 @@ Group: Development/Sources
Version: 5.2.11
%if %using_buildservice
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel
%endif
Requires: pesign-obs-integration
Provides: %name = %version-%source_rel
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: multiversion(kernel)
Source: README.KSYMS
Requires: kernel-devel%variant = %version-%source_rel

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Sep 3 12:47:56 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG (jsc#SLE-9120 bsc#1130365)
Enable CONFIG_STACKPROTECTOR_STRONG on all architectures except s390x
(where the feature is not available). This extends the number of functions
which are protected by "stack canary" check to catch functions writing past
their stack frame.
This change was requested by SUSE security to make our kernels more
resistant to some types of stack overflow attacks. Tests performed by
kernel performance teams confirmed that performance impact is acceptable.
- commit d6e8aab
-------------------------------------------------------------------
Thu Aug 29 08:41:19 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.11
%if 0%{?is_kotd}
Release: <RELEASE>.g533dae1
Release: <RELEASE>.gd6e8aab
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: kernel-%build_flavor-base-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
Provides: kernel-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
# END COMMON DEPS
Provides: %name-srchash-533dae19dd625d5978c3334db69118d063a58630
Provides: %name-srchash-d6e8aab45978d5943878ae13ab2b290e693aff4d
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,3 @@
2019-09-03 09:43:17 +0000
GIT Revision: 533dae19dd625d5978c3334db69118d063a58630
2019-09-04 06:10:12 +0000
GIT Revision: d6e8aab45978d5943878ae13ab2b290e693aff4d
GIT Branch: stable