commit 94938f2da208dc47ee939d4cafbe9a1d7fc120ae
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1161
This commit is contained in:
parent
af21f9d477
commit
aa66d4689f
@ -1,3 +1,3 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
version https://git-lfs.github.com/spec/v1
|
||||||
oid sha256:5e59edc7c43c8ab775b9791d34c41679a9447d5af1a0574a9f03fa05a9291397
|
oid sha256:82bf42e88268c1673cb90eff1b9b983dd6d45e92f42b9a1289c9184e711bf610
|
||||||
size 213759
|
size 213723
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
Name: dtb-aarch64
|
Name: dtb-aarch64
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
Name: dtb-armv6l
|
Name: dtb-armv6l
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
Name: dtb-armv7l
|
Name: dtb-armv7l
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%ifarch ppc64
|
%ifarch ppc64
|
||||||
Provides: kernel-kdump = 2.6.28
|
Provides: kernel-kdump = 2.6.28
|
||||||
Obsoletes: kernel-kdump <= 2.6.28
|
Obsoletes: kernel-kdump <= 2.6.28
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%ifarch %ix86
|
%ifarch %ix86
|
||||||
Provides: kernel-smp = 2.6.17
|
Provides: kernel-smp = 2.6.17
|
||||||
Obsoletes: kernel-smp <= 2.6.17
|
Obsoletes: kernel-smp <= 2.6.17
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -33,7 +33,7 @@ License: GPL-2.0
|
|||||||
Group: Documentation/Man
|
Group: Documentation/Man
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
|
|||||||
%endif
|
%endif
|
||||||
Url: http://www.kernel.org/
|
Url: http://www.kernel.org/
|
||||||
Provides: %name = %version-%source_rel
|
Provides: %name = %version-%source_rel
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -45,7 +45,7 @@ BuildRequires: util-linux
|
|||||||
%endif
|
%endif
|
||||||
%endif
|
%endif
|
||||||
%endif
|
%endif
|
||||||
BuildRequires: kernel%kernel_flavor-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
BuildRequires: kernel%kernel_flavor-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
|
|
||||||
%if 0%{?rhel_version}
|
%if 0%{?rhel_version}
|
||||||
BuildRequires: kernel
|
BuildRequires: kernel
|
||||||
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: SLES
|
Group: SLES
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ License: GPL-2.0
|
|||||||
Group: SLES
|
Group: SLES
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%ifarch %ix86
|
%ifarch %ix86
|
||||||
Provides: kernel-bigsmp = 2.6.17
|
Provides: kernel-bigsmp = 2.6.17
|
||||||
Obsoletes: kernel-bigsmp <= 2.6.17
|
Obsoletes: kernel-bigsmp <= 2.6.17
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ License: GPL-2.0
|
|||||||
Group: Development/Sources
|
Group: Development/Sources
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -43,7 +43,7 @@ BuildRequires: fdupes
|
|||||||
BuildRequires: sed
|
BuildRequires: sed
|
||||||
Requires(post): coreutils sed
|
Requires(post): coreutils sed
|
||||||
Provides: %name = %version-%source_rel
|
Provides: %name = %version-%source_rel
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: linux
|
Provides: linux
|
||||||
Provides: multiversion(kernel)
|
Provides: multiversion(kernel)
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -27,7 +27,7 @@ Group: Development/Sources
|
|||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if %using_buildservice
|
%if %using_buildservice
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -52,7 +52,7 @@ Requires: kernel-pae-devel = %version-%source_rel
|
|||||||
%endif
|
%endif
|
||||||
Requires: pesign-obs-integration
|
Requires: pesign-obs-integration
|
||||||
Provides: %name = %version-%source_rel
|
Provides: %name = %version-%source_rel
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: multiversion(kernel)
|
Provides: multiversion(kernel)
|
||||||
Source: README.KSYMS
|
Source: README.KSYMS
|
||||||
Requires: kernel-devel%variant = %version-%source_rel
|
Requires: kernel-devel%variant = %version-%source_rel
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,24 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 11:50:58 CEST 2019 - mgorman@suse.de
|
||||||
|
|
||||||
|
- config: enable SLAB_FREELIST_HARDENED (bsc#1127808)
|
||||||
|
Enable SLAB_FREELIST_HARDENED on all architectures. This obscures the
|
||||||
|
free object pointer on a per-cache basis making it more difficult to
|
||||||
|
locate kernel objects via exploits probing the cache metadata.
|
||||||
|
This change was requested by the upstream openSUSE community to make
|
||||||
|
the kernel more resistent to slab freelist attacks. Tests conducted
|
||||||
|
by the kernel performance teams confirmed that the performance impact
|
||||||
|
is detectable but negligible.
|
||||||
|
- commit 94938f2
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 9 06:49:29 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable STACKPROTECTOR_STRONG also on armv6hl
|
||||||
|
Recently reenabled armv6hl architecture has STACKPROTECTOR_STRONG disabled,
|
||||||
|
enable it here as well.
|
||||||
|
- commit f434a32
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
Fri Sep 6 12:49:15 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.2.13
|
Version: 5.2.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.gacd8e88
|
Release: <RELEASE>.g94938f2
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -171,10 +171,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-%build_flavor-base-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
Provides: kernel-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: kernel-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
Provides: %name-srchash-94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
2019-09-06 10:49:17 +0000
|
2019-09-09 12:37:33 +0000
|
||||||
GIT Revision: acd8e88224e971d4efd3d9b1a86c87b58ac24561
|
GIT Revision: 94938f2da208dc47ee939d4cafbe9a1d7fc120ae
|
||||||
GIT Branch: stable
|
GIT Branch: stable
|
||||||
|
Loading…
Reference in New Issue
Block a user