commit 8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1055
This commit is contained in:
parent
75ba616d17
commit
a99d038045
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-aarch64
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv6l
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv7l
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%ifarch ppc64
|
||||
Provides: kernel-kdump = 2.6.28
|
||||
Obsoletes: kernel-kdump <= 2.6.28
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%ifarch %ix86
|
||||
Provides: kernel-smp = 2.6.17
|
||||
Obsoletes: kernel-smp <= 2.6.17
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -33,7 +33,7 @@ License: GPL-2.0
|
||||
Group: Documentation/Man
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
|
||||
%endif
|
||||
Url: http://www.kernel.org/
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
BuildArch: noarch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -45,7 +45,7 @@ BuildRequires: util-linux
|
||||
%endif
|
||||
%endif
|
||||
%endif
|
||||
BuildRequires: kernel%kernel_flavor-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
BuildRequires: kernel%kernel_flavor-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
|
||||
%if 0%{?rhel_version}
|
||||
BuildRequires: kernel
|
||||
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -38,7 +38,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%ifarch %ix86
|
||||
Provides: kernel-bigsmp = 2.6.17
|
||||
Obsoletes: kernel-bigsmp <= 2.6.17
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -32,7 +32,7 @@ License: GPL-2.0
|
||||
Group: Development/Sources
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -43,7 +43,7 @@ BuildRequires: fdupes
|
||||
BuildRequires: sed
|
||||
Requires(post): coreutils sed
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: linux
|
||||
Provides: multiversion(kernel)
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -27,7 +27,7 @@ Group: Development/Sources
|
||||
Version: 5.0.7
|
||||
%if %using_buildservice
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -55,7 +55,7 @@ Requires: kernel-zfcpdump-devel = %version-%source_rel
|
||||
%endif
|
||||
Requires: pesign-obs-integration
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: multiversion(kernel)
|
||||
Source: README.KSYMS
|
||||
Requires: kernel-devel%variant = %version-%source_rel
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,22 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 20:14:10 CEST 2019 - jkosina@suse.cz
|
||||
|
||||
- Delete
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
|
||||
- Delete
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch.
|
||||
- Delete
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
Drop SUSE-specific IBRS-on-SKL implementation. Please refer to
|
||||
page 16 of Intel's paper [1]: "Intel considers the risk of an attack
|
||||
based on exploiting deep call stacks low."
|
||||
[1] https://software.intel.com/security-software-guidance/api-app/sites/default/files/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
|
||||
- commit 2cfda4d
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 12:44:40 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -64,7 +64,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.0.7
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g2cfda4d
|
||||
Release: <RELEASE>.g8a6bcaf
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: kernel-%build_flavor-base-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
Provides: kernel-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
Provides: %name-srchash-8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:484e9dff78c735205f9d7e215bf13f9feec990da6110c568a7f163cdfdedf594
|
||||
size 57700
|
||||
oid sha256:bf15c5415b4231c35d8ded709c60f618ed8fae819b5f3c36bc7887ae8a424e30
|
||||
size 64932
|
||||
|
@ -884,6 +884,12 @@
|
||||
########################################################
|
||||
patches.suse/setuid-dumpable-wrongdir
|
||||
|
||||
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch
|
||||
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch
|
||||
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch
|
||||
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch
|
||||
patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch
|
||||
|
||||
########################################################
|
||||
# Architecture-specific patches. These used to be all
|
||||
# at the end of series.conf, but since we don't do
|
||||
|
@ -1,3 +1,3 @@
|
||||
2019-04-17 06:41:55 +0000
|
||||
GIT Revision: 2cfda4d1d1e1e98c4dffaf10f9cf8c433237ded1
|
||||
2019-04-15 10:44:40 +0000
|
||||
GIT Revision: 8a6bcaff649fe1ebc483fd261eca6095e34b9b9a
|
||||
GIT Branch: stable
|
||||
|
Loading…
Reference in New Issue
Block a user