commit 94938f2da208dc47ee939d4cafbe9a1d7fc120ae
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1161
This commit is contained in:
parent
af21f9d477
commit
aa66d4689f
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:5e59edc7c43c8ab775b9791d34c41679a9447d5af1a0574a9f03fa05a9291397
|
||||
size 213759
|
||||
oid sha256:82bf42e88268c1673cb90eff1b9b983dd6d45e92f42b9a1289c9184e711bf610
|
||||
size 213723
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-aarch64
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv6l
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv7l
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%ifarch ppc64
|
||||
Provides: kernel-kdump = 2.6.28
|
||||
Obsoletes: kernel-kdump <= 2.6.28
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%ifarch %ix86
|
||||
Provides: kernel-smp = 2.6.17
|
||||
Obsoletes: kernel-smp <= 2.6.17
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -33,7 +33,7 @@ License: GPL-2.0
|
||||
Group: Documentation/Man
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
|
||||
%endif
|
||||
Url: http://www.kernel.org/
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
BuildArch: noarch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -45,7 +45,7 @@ BuildRequires: util-linux
|
||||
%endif
|
||||
%endif
|
||||
%endif
|
||||
BuildRequires: kernel%kernel_flavor-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
BuildRequires: kernel%kernel_flavor-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
|
||||
%if 0%{?rhel_version}
|
||||
BuildRequires: kernel
|
||||
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -38,7 +38,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%ifarch %ix86
|
||||
Provides: kernel-bigsmp = 2.6.17
|
||||
Obsoletes: kernel-bigsmp <= 2.6.17
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -32,7 +32,7 @@ License: GPL-2.0
|
||||
Group: Development/Sources
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -43,7 +43,7 @@ BuildRequires: fdupes
|
||||
BuildRequires: sed
|
||||
Requires(post): coreutils sed
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: linux
|
||||
Provides: multiversion(kernel)
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -27,7 +27,7 @@ Group: Development/Sources
|
||||
Version: 5.2.13
|
||||
%if %using_buildservice
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel
|
||||
%endif
|
||||
Requires: pesign-obs-integration
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: multiversion(kernel)
|
||||
Source: README.KSYMS
|
||||
Requires: kernel-devel%variant = %version-%source_rel
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,24 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||
|
||||
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||
free object pointer on a per-cache basis making it more difficult to
|
||||
locate kernel objects via exploits probing the cache metadata.
|
||||
This change was requested by the upstream openSUSE community to make
|
||||
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||
by the kernel performance teams confirmed that the performance impact
|
||||
is detectable but negligible.
|
||||
- commit 94938f2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||
enable it here as well.
|
||||
- commit f434a32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.2.13
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gacd8e88
|
||||
Release: <RELEASE>.g94938f2
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,3 @@
|
||||
2019-09-06 10:49:17 +0000
|
||||
GIT Revision: acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
||||
2019-09-09 12:37:33 +0000
|
||||
GIT Revision: 94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||
GIT Branch: stable
|
||||
|
Loading…
Reference in New Issue
Block a user