commit 94938f2da208dc47ee939d4cafbe9a1d7fc120ae

OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1161
This commit is contained in:
Michal Suchanek 2019-09-10 06:08:36 +00:00 committed by Git OBS Bridge
parent af21f9d477
commit aa66d4689f
34 changed files with 384 additions and 48 deletions

View File

@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1 version https://git-lfs.github.com/spec/v1
oid sha256:5e59edc7c43c8ab775b9791d34c41679a9447d5af1a0574a9f03fa05a9291397 oid sha256:82bf42e88268c1673cb90eff1b9b983dd6d45e92f42b9a1289c9184e711bf610
size 213759 size 213723

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-aarch64 Name: dtb-aarch64
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv6l Name: dtb-armv6l
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -31,7 +31,7 @@
Name: dtb-armv7l Name: dtb-armv7l
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name %obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%ifarch ppc64 %ifarch ppc64
Provides: kernel-kdump = 2.6.28 Provides: kernel-kdump = 2.6.28
Obsoletes: kernel-kdump <= 2.6.28 Obsoletes: kernel-kdump <= 2.6.28

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%ifarch %ix86 %ifarch %ix86
Provides: kernel-smp = 2.6.17 Provides: kernel-smp = 2.6.17
Obsoletes: kernel-smp <= 2.6.17 Obsoletes: kernel-smp <= 2.6.17

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -33,7 +33,7 @@ License: GPL-2.0
Group: Documentation/Man Group: Documentation/Man
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
%endif %endif
Url: http://www.kernel.org/ Url: http://www.kernel.org/
Provides: %name = %version-%source_rel Provides: %name = %version-%source_rel
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
BuildArch: noarch BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRoot: %{_tmppath}/%{name}-%{version}-build
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name %obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name %obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -45,7 +45,7 @@ BuildRequires: util-linux
%endif %endif
%endif %endif
%endif %endif
BuildRequires: kernel%kernel_flavor-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 BuildRequires: kernel%kernel_flavor-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%if 0%{?rhel_version} %if 0%{?rhel_version}
BuildRequires: kernel BuildRequires: kernel
@ -66,7 +66,7 @@ License: GPL-2.0
Group: SLES Group: SLES
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -38,7 +38,7 @@ License: GPL-2.0
Group: SLES Group: SLES
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%ifarch %ix86 %ifarch %ix86
Provides: kernel-bigsmp = 2.6.17 Provides: kernel-bigsmp = 2.6.17
Obsoletes: kernel-bigsmp <= 2.6.17 Obsoletes: kernel-bigsmp <= 2.6.17

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -32,7 +32,7 @@ License: GPL-2.0
Group: Development/Sources Group: Development/Sources
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -43,7 +43,7 @@ BuildRequires: fdupes
BuildRequires: sed BuildRequires: sed
Requires(post): coreutils sed Requires(post): coreutils sed
Provides: %name = %version-%source_rel Provides: %name = %version-%source_rel
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: linux Provides: linux
Provides: multiversion(kernel) Provides: multiversion(kernel)
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -27,7 +27,7 @@ Group: Development/Sources
Version: 5.2.13 Version: 5.2.13
%if %using_buildservice %if %using_buildservice
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel
%endif %endif
Requires: pesign-obs-integration Requires: pesign-obs-integration
Provides: %name = %version-%source_rel Provides: %name = %version-%source_rel
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: multiversion(kernel) Provides: multiversion(kernel)
Source: README.KSYMS Source: README.KSYMS
Requires: kernel-devel%variant = %version-%source_rel Requires: kernel-devel%variant = %version-%source_rel

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name %obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh Source2: source-post.sh

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
free object pointer on a per-cache basis making it more difficult to
locate kernel objects via exploits probing the cache metadata.
This change was requested by the upstream openSUSE community to make
the kernel more resistent to slab freelist attacks. Tests conducted
by the kernel performance teams confirmed that the performance impact
is detectable but negligible.
- commit 94938f2
-------------------------------------------------------------------
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
- config: enable STACKPROTECTOR_STRONG also on armv6hl
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
enable it here as well.
- commit f434a32
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz

View File

@ -66,7 +66,7 @@ License: GPL-2.0
Group: System/Kernel Group: System/Kernel
Version: 5.2.13 Version: 5.2.13
%if 0%{?is_kotd} %if 0%{?is_kotd}
Release: <RELEASE>.gacd8e88 Release: <RELEASE>.g94938f2
%else %else
Release: 0 Release: 0
%endif %endif
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
Conflicts: libc.so.6()(64bit) Conflicts: libc.so.6()(64bit)
%endif %endif
Provides: kernel = %version-%source_rel Provides: kernel = %version-%source_rel
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
# END COMMON DEPS # END COMMON DEPS
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561 Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
%obsolete_rebuilds %name %obsolete_rebuilds %name
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
Source2: source-post.sh Source2: source-post.sh

View File

@ -1,3 +1,3 @@
2019-09-06 10:49:17 +0000 2019-09-09 12:37:33 +0000
GIT Revision: acd8e88224e971d4efd3d9b1a86c87b58ac24561 GIT Revision: 94938f2da208dc47ee939d4cafbe9a1d7fc120ae
GIT Branch: stable GIT Branch: stable