diff --git a/config.tar.bz2 b/config.tar.bz2 index 1e21c15e..2d616cf2 100644 --- a/config.tar.bz2 +++ b/config.tar.bz2 @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:1306a412d54424197f7fff2d83746e3710dd87efa2a9d68e9ca60c75a56cfcc4 -size 191648 +oid sha256:41bfbb044ac2520904345a1abb38b0cfa62b0c6055b6119158341c3f2b267fed +size 191747 diff --git a/dtb-aarch64.changes b/dtb-aarch64.changes index 9e392adb..99e38959 100644 --- a/dtb-aarch64.changes +++ b/dtb-aarch64.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/dtb-aarch64.spec b/dtb-aarch64.spec index 1057b2ca..e7065c41 100644 --- a/dtb-aarch64.spec +++ b/dtb-aarch64.spec @@ -17,7 +17,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-aarch64 -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif diff --git a/dtb-armv6l.changes b/dtb-armv6l.changes index 9e392adb..99e38959 100644 --- a/dtb-armv6l.changes +++ b/dtb-armv6l.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/dtb-armv6l.spec b/dtb-armv6l.spec index b71be35c..6ec1a3d4 100644 --- a/dtb-armv6l.spec +++ b/dtb-armv6l.spec @@ -17,7 +17,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-armv6l -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif diff --git a/dtb-armv7l.changes b/dtb-armv7l.changes index 9e392adb..99e38959 100644 --- a/dtb-armv7l.changes +++ b/dtb-armv7l.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/dtb-armv7l.spec b/dtb-armv7l.spec index e6a47a80..d1f2e2bf 100644 --- a/dtb-armv7l.spec +++ b/dtb-armv7l.spec @@ -17,7 +17,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-armv7l -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif diff --git a/kernel-64kb.changes b/kernel-64kb.changes index 9e392adb..99e38959 100644 --- a/kernel-64kb.changes +++ b/kernel-64kb.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-64kb.spec b/kernel-64kb.spec index f468301a..ccfea0d9 100644 --- a/kernel-64kb.spec +++ b/kernel-64kb.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-64kb Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh diff --git a/kernel-debug.changes b/kernel-debug.changes index 9e392adb..99e38959 100644 --- a/kernel-debug.changes +++ b/kernel-debug.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-debug.spec b/kernel-debug.spec index 80130e32..b9e891bb 100644 --- a/kernel-debug.spec +++ b/kernel-debug.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-debug Summary: A Debug Version of the Kernel License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %ifarch ppc64 Provides: kernel-kdump = 2.6.28 Obsoletes: kernel-kdump <= 2.6.28 diff --git a/kernel-default.changes b/kernel-default.changes index 9e392adb..99e38959 100644 --- a/kernel-default.changes +++ b/kernel-default.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-default.spec b/kernel-default.spec index 053265fd..843a97ad 100644 --- a/kernel-default.spec +++ b/kernel-default.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-default Summary: The Standard Kernel License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %ifarch %ix86 Provides: kernel-smp = 2.6.17 Obsoletes: kernel-smp <= 2.6.17 diff --git a/kernel-docs.changes b/kernel-docs.changes index 9e392adb..99e38959 100644 --- a/kernel-docs.changes +++ b/kernel-docs.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-docs.spec b/kernel-docs.spec index 96216929..9013b4d5 100644 --- a/kernel-docs.spec +++ b/kernel-docs.spec @@ -17,7 +17,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -31,9 +31,9 @@ Name: kernel-docs Summary: Kernel Documentation License: GPL-2.0 Group: Documentation/Man -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding %endif Url: http://www.kernel.org/ Provides: %name = %version-%source_rel -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea BuildArch: noarch BuildRoot: %{_tmppath}/%{name}-%{version}-build Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz diff --git a/kernel-kvmsmall.changes b/kernel-kvmsmall.changes index 9e392adb..99e38959 100644 --- a/kernel-kvmsmall.changes +++ b/kernel-kvmsmall.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-kvmsmall.spec b/kernel-kvmsmall.spec index 58d3305b..6fd56148 100644 --- a/kernel-kvmsmall.spec +++ b/kernel-kvmsmall.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-kvmsmall Summary: The Small Developer Kernel for KVM License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh diff --git a/kernel-lpae.changes b/kernel-lpae.changes index 9e392adb..99e38959 100644 --- a/kernel-lpae.changes +++ b/kernel-lpae.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-lpae.spec b/kernel-lpae.spec index ec13b28f..7f694b15 100644 --- a/kernel-lpae.spec +++ b/kernel-lpae.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-lpae Summary: Kernel for LPAE enabled systems License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh diff --git a/kernel-obs-build.changes b/kernel-obs-build.changes index 9e392adb..99e38959 100644 --- a/kernel-obs-build.changes +++ b/kernel-obs-build.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-obs-build.spec b/kernel-obs-build.spec index 54c5fbb8..10e09c62 100644 --- a/kernel-obs-build.spec +++ b/kernel-obs-build.spec @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -45,7 +45,7 @@ BuildRequires: util-linux %endif %endif %endif -BuildRequires: kernel%kernel_flavor-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +BuildRequires: kernel%kernel_flavor-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %if 0%{?rhel_version} BuildRequires: kernel @@ -64,9 +64,9 @@ BuildRequires: dracut Summary: package kernel and initrd for OBS VM builds License: GPL-2.0 Group: SLES -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif diff --git a/kernel-obs-qa.changes b/kernel-obs-qa.changes index 9e392adb..99e38959 100644 --- a/kernel-obs-qa.changes +++ b/kernel-obs-qa.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-obs-qa.spec b/kernel-obs-qa.spec index c5961c75..5d401999 100644 --- a/kernel-obs-qa.spec +++ b/kernel-obs-qa.spec @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -36,9 +36,9 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build Summary: Basic QA tests for the kernel License: GPL-2.0 Group: SLES -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif diff --git a/kernel-pae.changes b/kernel-pae.changes index 9e392adb..99e38959 100644 --- a/kernel-pae.changes +++ b/kernel-pae.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-pae.spec b/kernel-pae.spec index 53e946cf..a7c060cf 100644 --- a/kernel-pae.spec +++ b/kernel-pae.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-pae Summary: Kernel with PAE Support License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %ifarch %ix86 Provides: kernel-bigsmp = 2.6.17 Obsoletes: kernel-bigsmp <= 2.6.17 diff --git a/kernel-source.changes b/kernel-source.changes index 9e392adb..99e38959 100644 --- a/kernel-source.changes +++ b/kernel-source.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-source.spec b/kernel-source.spec index 6d5cb249..fefc662a 100644 --- a/kernel-source.spec +++ b/kernel-source.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -30,9 +30,9 @@ Name: kernel-source Summary: The Linux Kernel Sources License: GPL-2.0 Group: Development/Sources -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -43,7 +43,7 @@ BuildRequires: fdupes BuildRequires: sed Requires(post): coreutils sed Provides: %name = %version-%source_rel -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea Provides: linux Provides: multiversion(kernel) Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz diff --git a/kernel-syms.changes b/kernel-syms.changes index 9e392adb..99e38959 100644 --- a/kernel-syms.changes +++ b/kernel-syms.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-syms.spec b/kernel-syms.spec index 3e2f5943..1a7205f3 100644 --- a/kernel-syms.spec +++ b/kernel-syms.spec @@ -24,10 +24,10 @@ Name: kernel-syms Summary: Kernel Symbol Versions (modversions) License: GPL-2.0 Group: Development/Sources -Version: 5.1.1 +Version: 5.1.2 %if %using_buildservice %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -55,7 +55,7 @@ Requires: kernel-zfcpdump-devel = %version-%source_rel %endif Requires: pesign-obs-integration Provides: %name = %version-%source_rel -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea Provides: multiversion(kernel) Source: README.KSYMS Requires: kernel-devel%variant = %version-%source_rel diff --git a/kernel-vanilla.changes b/kernel-vanilla.changes index 9e392adb..99e38959 100644 --- a/kernel-vanilla.changes +++ b/kernel-vanilla.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-vanilla.spec b/kernel-vanilla.spec index a38416a7..8855da6a 100644 --- a/kernel-vanilla.spec +++ b/kernel-vanilla.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-vanilla Summary: The Standard Kernel - without any SUSE patches License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh diff --git a/kernel-zfcpdump.changes b/kernel-zfcpdump.changes index 9e392adb..99e38959 100644 --- a/kernel-zfcpdump.changes +++ b/kernel-zfcpdump.changes @@ -1,3 +1,76 @@ +------------------------------------------------------------------- +Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz + +- Linux 5.1.2 (bnc#1012628). +- x86/speculation/mds: Fix documentation typo (bnc#1012628). +- Documentation: Correct the possible MDS sysfs values + (bnc#1012628). +- x86/mds: Add MDSUM variant to the MDS documentation + (bnc#1012628). +- x86/speculation/mds: Add 'mitigations=' support for MDS + (bnc#1012628). +- s390/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- powerpc/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation: Support 'mitigations=' cmdline option + (bnc#1012628). +- cpu/speculation: Add 'mitigations=' cmdline option + (bnc#1012628). +- x86/speculation/mds: Print SMT vulnerable on MSBDS with + mitigations off (bnc#1012628). +- x86/speculation/mds: Fix comment (bnc#1012628). +- x86/speculation/mds: Add SMT warning message (bnc#1012628). +- x86/speculation: Move arch_smt_update() call to after mitigation + decisions (bnc#1012628). +- x86/speculation/mds: Add mds=full,nosmt cmdline option + (bnc#1012628). +- Documentation: Add MDS vulnerability documentation + (bnc#1012628). +- Documentation: Move L1TF to separate directory (bnc#1012628). +- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628). +- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628). +- x86/speculation/mds: Add mitigation control for MDS + (bnc#1012628). +- x86/speculation/mds: Conditionally clear CPU buffers on idle + entry (bnc#1012628). +- x86/kvm/vmx: Add MDS protection when L1D Flush is not active + (bnc#1012628). +- x86/speculation/mds: Clear CPU buffers on exit to user + (bnc#1012628). +- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628). +- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628). +- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628). +- x86/speculation/mds: Add basic bug infrastructure for MDS + (bnc#1012628). +- x86/speculation: Consolidate CPU whitelists (bnc#1012628). +- x86/msr-index: Cleanup bit defines (bnc#1012628). +- commit 5a8c05f + +------------------------------------------------------------------- +Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz + +- config: keep LSM empty in s390x/zfcpdump + This config doesn't really build AppArmor and always had + DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty. +- commit 3073856 + +------------------------------------------------------------------- +Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz + +- config: enable AppArmor by default again (bsc#1134906) + AppArmor used to be enabled in kernel by default by after the recent + introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor + again. +- commit 953db35 + +------------------------------------------------------------------- +Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz + +- Update upstream reference: + patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch +- commit 133a780 + ------------------------------------------------------------------- Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz diff --git a/kernel-zfcpdump.spec b/kernel-zfcpdump.spec index 36907e3f..173515f7 100644 --- a/kernel-zfcpdump.spec +++ b/kernel-zfcpdump.spec @@ -18,7 +18,7 @@ %define srcversion 5.1 -%define patchversion 5.1.1 +%define patchversion 5.1.2 %define variant %{nil} %define vanilla_only 0 @@ -62,9 +62,9 @@ Name: kernel-zfcpdump Summary: The IBM System Z zfcpdump Kernel License: GPL-2.0 Group: System/Kernel -Version: 5.1.1 +Version: 5.1.2 %if 0%{?is_kotd} -Release: .g65f0348 +Release: .g08094c3 %else Release: 0 %endif @@ -169,10 +169,10 @@ Conflicts: hyper-v < 4 Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 -Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea +Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea # END COMMON DEPS -Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70 +Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea %obsolete_rebuilds %name Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz Source2: source-post.sh diff --git a/patches.kernel.org.tar.bz2 b/patches.kernel.org.tar.bz2 index 4fd91c2e..b776e193 100644 --- a/patches.kernel.org.tar.bz2 +++ b/patches.kernel.org.tar.bz2 @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:919dfefe67cc4e8d2c8757a5c718846c57e639e09c525fd60e041a3f1a8048f3 -size 37830 +oid sha256:db6f8cead32aae7200c94cfc9272647622f75ca314a4a1923c2b94fd00958daf +size 72995 diff --git a/patches.suse.tar.bz2 b/patches.suse.tar.bz2 index 542a6222..4b41b0dd 100644 --- a/patches.suse.tar.bz2 +++ b/patches.suse.tar.bz2 @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:57517beb3baf09b9046be289d22ff09ff095bc8b93446d991186a28bea5acbbe -size 42129 +oid sha256:7cb77fb7f8317224cf5dea4a5ffe56a9197752b8e5e73005071ec0a6b2499fe0 +size 42094 diff --git a/series.conf b/series.conf index c1f79c59..b8476b0b 100644 --- a/series.conf +++ b/series.conf @@ -58,6 +58,34 @@ patches.kernel.org/5.1.1-029-locking-futex-Allow-low-level-atomic-operations.patch patches.kernel.org/5.1.1-030-arm64-futex-Bound-number-of-LDXR-STXR-loops-in-.patch patches.kernel.org/5.1.1-031-Linux-5.1.1.patch + patches.kernel.org/5.1.2-001-x86-msr-index-Cleanup-bit-defines.patch + patches.kernel.org/5.1.2-002-x86-speculation-Consolidate-CPU-whitelists.patch + patches.kernel.org/5.1.2-003-x86-speculation-mds-Add-basic-bug-infrastructur.patch + patches.kernel.org/5.1.2-004-x86-speculation-mds-Add-BUG_MSBDS_ONLY.patch + patches.kernel.org/5.1.2-005-x86-kvm-Expose-X86_FEATURE_MD_CLEAR-to-guests.patch + patches.kernel.org/5.1.2-006-x86-speculation-mds-Add-mds_clear_cpu_buffers.patch + patches.kernel.org/5.1.2-007-x86-speculation-mds-Clear-CPU-buffers-on-exit-t.patch + patches.kernel.org/5.1.2-008-x86-kvm-vmx-Add-MDS-protection-when-L1D-Flush-i.patch + patches.kernel.org/5.1.2-009-x86-speculation-mds-Conditionally-clear-CPU-buf.patch + patches.kernel.org/5.1.2-010-x86-speculation-mds-Add-mitigation-control-for-.patch + patches.kernel.org/5.1.2-011-x86-speculation-mds-Add-sysfs-reporting-for-MDS.patch + patches.kernel.org/5.1.2-012-x86-speculation-mds-Add-mitigation-mode-VMWERV.patch + patches.kernel.org/5.1.2-013-Documentation-Move-L1TF-to-separate-directory.patch + patches.kernel.org/5.1.2-014-Documentation-Add-MDS-vulnerability-documentati.patch + patches.kernel.org/5.1.2-015-x86-speculation-mds-Add-mds-full-nosmt-cmdline-.patch + patches.kernel.org/5.1.2-016-x86-speculation-Move-arch_smt_update-call-to-af.patch + patches.kernel.org/5.1.2-017-x86-speculation-mds-Add-SMT-warning-message.patch + patches.kernel.org/5.1.2-018-x86-speculation-mds-Fix-comment.patch + patches.kernel.org/5.1.2-019-x86-speculation-mds-Print-SMT-vulnerable-on-MSB.patch + patches.kernel.org/5.1.2-020-cpu-speculation-Add-mitigations-cmdline-option.patch + patches.kernel.org/5.1.2-021-x86-speculation-Support-mitigations-cmdline-opt.patch + patches.kernel.org/5.1.2-022-powerpc-speculation-Support-mitigations-cmdline.patch + patches.kernel.org/5.1.2-023-s390-speculation-Support-mitigations-cmdline-op.patch + patches.kernel.org/5.1.2-024-x86-speculation-mds-Add-mitigations-support-for.patch + patches.kernel.org/5.1.2-025-x86-mds-Add-MDSUM-variant-to-the-MDS-documentat.patch + patches.kernel.org/5.1.2-026-Documentation-Correct-the-possible-MDS-sysfs-va.patch + patches.kernel.org/5.1.2-027-x86-speculation-mds-Fix-documentation-typo.patch + patches.kernel.org/5.1.2-028-Linux-5.1.2.patch ######################################################## # Build fixes that apply to the vanilla kernel too. diff --git a/source-timestamp b/source-timestamp index 049004ef..cd9113f4 100644 --- a/source-timestamp +++ b/source-timestamp @@ -1,3 +1,3 @@ -2019-05-11 17:16:51 +0000 -GIT Revision: 65f034823e6b696100f8a0bb23af2666d5597d70 +2019-05-14 18:21:06 +0000 +GIT Revision: 08094c3e7184c834a637fa15f7b4a3ec0ee750ea GIT Branch: stable