commit 08094c3e7184c834a637fa15f7b4a3ec0ee750ea
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1074
This commit is contained in:
parent
a867a623ce
commit
baab4d621d
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:1306a412d54424197f7fff2d83746e3710dd87efa2a9d68e9ca60c75a56cfcc4
|
||||
size 191648
|
||||
oid sha256:41bfbb044ac2520904345a1abb38b0cfa62b0c6055b6119158341c3f2b267fed
|
||||
size 191747
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -29,9 +29,9 @@
|
||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
||||
|
||||
Name: dtb-aarch64
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -29,9 +29,9 @@
|
||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
||||
|
||||
Name: dtb-armv6l
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -29,9 +29,9 @@
|
||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
||||
|
||||
Name: dtb-armv7l
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-64kb
|
||||
Summary: Kernel with 64kb PAGE_SIZE
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-debug
|
||||
Summary: A Debug Version of the Kernel
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%ifarch ppc64
|
||||
Provides: kernel-kdump = 2.6.28
|
||||
Obsoletes: kernel-kdump <= 2.6.28
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-default
|
||||
Summary: The Standard Kernel
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%ifarch %ix86
|
||||
Provides: kernel-smp = 2.6.17
|
||||
Obsoletes: kernel-smp <= 2.6.17
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -31,9 +31,9 @@ Name: kernel-docs
|
||||
Summary: Kernel Documentation
|
||||
License: GPL-2.0
|
||||
Group: Documentation/Man
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
|
||||
%endif
|
||||
Url: http://www.kernel.org/
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
BuildArch: noarch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-kvmsmall
|
||||
Summary: The Small Developer Kernel for KVM
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-lpae
|
||||
Summary: Kernel for LPAE enabled systems
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -19,7 +19,7 @@
|
||||
|
||||
#!BuildIgnore: post-build-checks
|
||||
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -45,7 +45,7 @@ BuildRequires: util-linux
|
||||
%endif
|
||||
%endif
|
||||
%endif
|
||||
BuildRequires: kernel%kernel_flavor-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
BuildRequires: kernel%kernel_flavor-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
|
||||
%if 0%{?rhel_version}
|
||||
BuildRequires: kernel
|
||||
@ -64,9 +64,9 @@ BuildRequires: dracut
|
||||
Summary: package kernel and initrd for OBS VM builds
|
||||
License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
||||
# needsrootforbuild
|
||||
|
||||
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@ -36,9 +36,9 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
Summary: Basic QA tests for the kernel
|
||||
License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-pae
|
||||
Summary: Kernel with PAE Support
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%ifarch %ix86
|
||||
Provides: kernel-bigsmp = 2.6.17
|
||||
Obsoletes: kernel-bigsmp <= 2.6.17
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -30,9 +30,9 @@ Name: kernel-source
|
||||
Summary: The Linux Kernel Sources
|
||||
License: GPL-2.0
|
||||
Group: Development/Sources
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -43,7 +43,7 @@ BuildRequires: fdupes
|
||||
BuildRequires: sed
|
||||
Requires(post): coreutils sed
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: linux
|
||||
Provides: multiversion(kernel)
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -24,10 +24,10 @@ Name: kernel-syms
|
||||
Summary: Kernel Symbol Versions (modversions)
|
||||
License: GPL-2.0
|
||||
Group: Development/Sources
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if %using_buildservice
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -55,7 +55,7 @@ Requires: kernel-zfcpdump-devel = %version-%source_rel
|
||||
%endif
|
||||
Requires: pesign-obs-integration
|
||||
Provides: %name = %version-%source_rel
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: multiversion(kernel)
|
||||
Source: README.KSYMS
|
||||
Requires: kernel-devel%variant = %version-%source_rel
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-vanilla
|
||||
Summary: The Standard Kernel - without any SUSE patches
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
- Linux 5.1.2 (bnc#1012628).
|
||||
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||
- Documentation: Correct the possible MDS sysfs values
|
||||
(bnc#1012628).
|
||||
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||
(bnc#1012628).
|
||||
- s390/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Support 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||
mitigations off (bnc#1012628).
|
||||
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||
decisions (bnc#1012628).
|
||||
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||
(bnc#1012628).
|
||||
- Documentation: Add MDS vulnerability documentation
|
||||
(bnc#1012628).
|
||||
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||
- x86/speculation/mds: Add mitigation control for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||
entry (bnc#1012628).
|
||||
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||
(bnc#1012628).
|
||||
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||
(bnc#1012628).
|
||||
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||
- commit 5a8c05f
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: keep LSM empty in s390x/zfcpdump
|
||||
This config doesn't really build AppArmor and always had
|
||||
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||
- commit 3073856
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- config: enable AppArmor by default again (bsc#1134906)
|
||||
AppArmor used to be enabled in kernel by default by after the recent
|
||||
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||
again.
|
||||
- commit 953db35
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||
|
||||
- Update upstream reference:
|
||||
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||
- commit 133a780
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
||||
|
||||
|
||||
%define srcversion 5.1
|
||||
%define patchversion 5.1.1
|
||||
%define patchversion 5.1.2
|
||||
%define variant %{nil}
|
||||
%define vanilla_only 0
|
||||
|
||||
@ -62,9 +62,9 @@ Name: kernel-zfcpdump
|
||||
Summary: The IBM System Z zfcpdump Kernel
|
||||
License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 5.1.1
|
||||
Version: 5.1.2
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g65f0348
|
||||
Release: <RELEASE>.g08094c3
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
||||
Conflicts: libc.so.6()(64bit)
|
||||
%endif
|
||||
Provides: kernel = %version-%source_rel
|
||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
# END COMMON DEPS
|
||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
%obsolete_rebuilds %name
|
||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||
Source2: source-post.sh
|
||||
|
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:919dfefe67cc4e8d2c8757a5c718846c57e639e09c525fd60e041a3f1a8048f3
|
||||
size 37830
|
||||
oid sha256:db6f8cead32aae7200c94cfc9272647622f75ca314a4a1923c2b94fd00958daf
|
||||
size 72995
|
||||
|
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:57517beb3baf09b9046be289d22ff09ff095bc8b93446d991186a28bea5acbbe
|
||||
size 42129
|
||||
oid sha256:7cb77fb7f8317224cf5dea4a5ffe56a9197752b8e5e73005071ec0a6b2499fe0
|
||||
size 42094
|
||||
|
28
series.conf
28
series.conf
@ -58,6 +58,34 @@
|
||||
patches.kernel.org/5.1.1-029-locking-futex-Allow-low-level-atomic-operations.patch
|
||||
patches.kernel.org/5.1.1-030-arm64-futex-Bound-number-of-LDXR-STXR-loops-in-.patch
|
||||
patches.kernel.org/5.1.1-031-Linux-5.1.1.patch
|
||||
patches.kernel.org/5.1.2-001-x86-msr-index-Cleanup-bit-defines.patch
|
||||
patches.kernel.org/5.1.2-002-x86-speculation-Consolidate-CPU-whitelists.patch
|
||||
patches.kernel.org/5.1.2-003-x86-speculation-mds-Add-basic-bug-infrastructur.patch
|
||||
patches.kernel.org/5.1.2-004-x86-speculation-mds-Add-BUG_MSBDS_ONLY.patch
|
||||
patches.kernel.org/5.1.2-005-x86-kvm-Expose-X86_FEATURE_MD_CLEAR-to-guests.patch
|
||||
patches.kernel.org/5.1.2-006-x86-speculation-mds-Add-mds_clear_cpu_buffers.patch
|
||||
patches.kernel.org/5.1.2-007-x86-speculation-mds-Clear-CPU-buffers-on-exit-t.patch
|
||||
patches.kernel.org/5.1.2-008-x86-kvm-vmx-Add-MDS-protection-when-L1D-Flush-i.patch
|
||||
patches.kernel.org/5.1.2-009-x86-speculation-mds-Conditionally-clear-CPU-buf.patch
|
||||
patches.kernel.org/5.1.2-010-x86-speculation-mds-Add-mitigation-control-for-.patch
|
||||
patches.kernel.org/5.1.2-011-x86-speculation-mds-Add-sysfs-reporting-for-MDS.patch
|
||||
patches.kernel.org/5.1.2-012-x86-speculation-mds-Add-mitigation-mode-VMWERV.patch
|
||||
patches.kernel.org/5.1.2-013-Documentation-Move-L1TF-to-separate-directory.patch
|
||||
patches.kernel.org/5.1.2-014-Documentation-Add-MDS-vulnerability-documentati.patch
|
||||
patches.kernel.org/5.1.2-015-x86-speculation-mds-Add-mds-full-nosmt-cmdline-.patch
|
||||
patches.kernel.org/5.1.2-016-x86-speculation-Move-arch_smt_update-call-to-af.patch
|
||||
patches.kernel.org/5.1.2-017-x86-speculation-mds-Add-SMT-warning-message.patch
|
||||
patches.kernel.org/5.1.2-018-x86-speculation-mds-Fix-comment.patch
|
||||
patches.kernel.org/5.1.2-019-x86-speculation-mds-Print-SMT-vulnerable-on-MSB.patch
|
||||
patches.kernel.org/5.1.2-020-cpu-speculation-Add-mitigations-cmdline-option.patch
|
||||
patches.kernel.org/5.1.2-021-x86-speculation-Support-mitigations-cmdline-opt.patch
|
||||
patches.kernel.org/5.1.2-022-powerpc-speculation-Support-mitigations-cmdline.patch
|
||||
patches.kernel.org/5.1.2-023-s390-speculation-Support-mitigations-cmdline-op.patch
|
||||
patches.kernel.org/5.1.2-024-x86-speculation-mds-Add-mitigations-support-for.patch
|
||||
patches.kernel.org/5.1.2-025-x86-mds-Add-MDSUM-variant-to-the-MDS-documentat.patch
|
||||
patches.kernel.org/5.1.2-026-Documentation-Correct-the-possible-MDS-sysfs-va.patch
|
||||
patches.kernel.org/5.1.2-027-x86-speculation-mds-Fix-documentation-typo.patch
|
||||
patches.kernel.org/5.1.2-028-Linux-5.1.2.patch
|
||||
|
||||
########################################################
|
||||
# Build fixes that apply to the vanilla kernel too.
|
||||
|
@ -1,3 +1,3 @@
|
||||
2019-05-11 17:16:51 +0000
|
||||
GIT Revision: 65f034823e6b696100f8a0bb23af2666d5597d70
|
||||
2019-05-14 18:21:06 +0000
|
||||
GIT Revision: 08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||
GIT Branch: stable
|
||||
|
Loading…
Reference in New Issue
Block a user