commit 94938f2da208dc47ee939d4cafbe9a1d7fc120ae

OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1161
This commit is contained in:
Michal Suchanek 2019-09-10 06:08:36 +00:00 committed by Git OBS Bridge
parent af21f9d477
commit aa66d4689f
34 changed files with 384 additions and 48 deletions

View File

@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:5e59edc7c43c8ab775b9791d34c41679a9447d5af1a0574a9f03fa05a9291397
size 213759
oid sha256:82bf42e88268c1673cb90eff1b9b983dd6d45e92f42b9a1289c9184e711bf610
size 213723

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-aarch64
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv6l
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv7l
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%ifarch ppc64
Provides: kernel-kdump = 2.6.28
Obsoletes: kernel-kdump <= 2.6.28

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%ifarch %ix86
Provides: kernel-smp = 2.6.17
Obsoletes: kernel-smp <= 2.6.17

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -33,7 +33,7 @@ License: GPL-2.0
Group: Documentation/Man
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
%endif
Url: http://www.kernel.org/
Provides: %name = %version-%source_rel
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -45,7 +45,7 @@ BuildRequires: util-linux
%endif
%endif
%endif
BuildRequires: kernel%kernel_flavor-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
BuildRequires: kernel%kernel_flavor-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%if 0%{?rhel_version}
BuildRequires: kernel
@ -66,7 +66,7 @@ License: GPL-2.0
Group: SLES
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -38,7 +38,7 @@ License: GPL-2.0
Group: SLES
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%ifarch %ix86
Provides: kernel-bigsmp = 2.6.17
Obsoletes: kernel-bigsmp <= 2.6.17

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -32,7 +32,7 @@ License: GPL-2.0
Group: Development/Sources
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -43,7 +43,7 @@ BuildRequires: fdupes
BuildRequires: sed
Requires(post): coreutils sed
Provides: %name = %version-%source_rel
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: linux
Provides: multiversion(kernel)
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -27,7 +27,7 @@ Group: Development/Sources
Version: 5.2.13
%if %using_buildservice
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel
%endif
Requires: pesign-obs-integration
Provides: %name = %version-%source_rel
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: multiversion(kernel)
Source: README.KSYMS
Requires: kernel-devel%variant = %version-%source_rel

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
-------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel
Version: 5.2.13
%if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88
Release: <RELEASE>.g94938f2
%else
Release: 0
%endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit)
%endif
Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh

View File

@ -1,3 +1,3 @@
2019-09-06 10:49:17 +0000
GIT Revision: acd8e88224e971d4efd3d9b1a86c87b58ac24561
2019-09-09 12:37:33 +0000
GIT Revision: 94938f2da208dc47ee939d4cafbe9a1d7fc120ae
GIT Branch: stable