commit 08094c3e7184c834a637fa15f7b4a3ec0ee750ea
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=1074
This commit is contained in:
parent
a867a623ce
commit
baab4d621d
@ -1,3 +1,3 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
version https://git-lfs.github.com/spec/v1
|
||||||
oid sha256:1306a412d54424197f7fff2d83746e3710dd87efa2a9d68e9ca60c75a56cfcc4
|
oid sha256:41bfbb044ac2520904345a1abb38b0cfa62b0c6055b6119158341c3f2b267fed
|
||||||
size 191648
|
size 191747
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
|
|
||||||
%include %_sourcedir/kernel-spec-macros
|
%include %_sourcedir/kernel-spec-macros
|
||||||
@ -29,9 +29,9 @@
|
|||||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
||||||
|
|
||||||
Name: dtb-aarch64
|
Name: dtb-aarch64
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
|
|
||||||
%include %_sourcedir/kernel-spec-macros
|
%include %_sourcedir/kernel-spec-macros
|
||||||
@ -29,9 +29,9 @@
|
|||||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
||||||
|
|
||||||
Name: dtb-armv6l
|
Name: dtb-armv6l
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
|
|
||||||
%include %_sourcedir/kernel-spec-macros
|
%include %_sourcedir/kernel-spec-macros
|
||||||
@ -29,9 +29,9 @@
|
|||||||
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
%(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
|
||||||
|
|
||||||
Name: dtb-armv7l
|
Name: dtb-armv7l
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-64kb
|
|||||||
Summary: Kernel with 64kb PAGE_SIZE
|
Summary: Kernel with 64kb PAGE_SIZE
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-debug
|
|||||||
Summary: A Debug Version of the Kernel
|
Summary: A Debug Version of the Kernel
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%ifarch ppc64
|
%ifarch ppc64
|
||||||
Provides: kernel-kdump = 2.6.28
|
Provides: kernel-kdump = 2.6.28
|
||||||
Obsoletes: kernel-kdump <= 2.6.28
|
Obsoletes: kernel-kdump <= 2.6.28
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-default
|
|||||||
Summary: The Standard Kernel
|
Summary: The Standard Kernel
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%ifarch %ix86
|
%ifarch %ix86
|
||||||
Provides: kernel-smp = 2.6.17
|
Provides: kernel-smp = 2.6.17
|
||||||
Obsoletes: kernel-smp <= 2.6.17
|
Obsoletes: kernel-smp <= 2.6.17
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
|
|
||||||
%include %_sourcedir/kernel-spec-macros
|
%include %_sourcedir/kernel-spec-macros
|
||||||
@ -31,9 +31,9 @@ Name: kernel-docs
|
|||||||
Summary: Kernel Documentation
|
Summary: Kernel Documentation
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: Documentation/Man
|
Group: Documentation/Man
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -63,7 +63,7 @@ BuildRequires: texlive-zapfding
|
|||||||
%endif
|
%endif
|
||||||
Url: http://www.kernel.org/
|
Url: http://www.kernel.org/
|
||||||
Provides: %name = %version-%source_rel
|
Provides: %name = %version-%source_rel
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-kvmsmall
|
|||||||
Summary: The Small Developer Kernel for KVM
|
Summary: The Small Developer Kernel for KVM
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-lpae
|
|||||||
Summary: Kernel for LPAE enabled systems
|
Summary: Kernel for LPAE enabled systems
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
|
|
||||||
#!BuildIgnore: post-build-checks
|
#!BuildIgnore: post-build-checks
|
||||||
|
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -45,7 +45,7 @@ BuildRequires: util-linux
|
|||||||
%endif
|
%endif
|
||||||
%endif
|
%endif
|
||||||
%endif
|
%endif
|
||||||
BuildRequires: kernel%kernel_flavor-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
BuildRequires: kernel%kernel_flavor-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
|
|
||||||
%if 0%{?rhel_version}
|
%if 0%{?rhel_version}
|
||||||
BuildRequires: kernel
|
BuildRequires: kernel
|
||||||
@ -64,9 +64,9 @@ BuildRequires: dracut
|
|||||||
Summary: package kernel and initrd for OBS VM builds
|
Summary: package kernel and initrd for OBS VM builds
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: SLES
|
Group: SLES
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
# needsrootforbuild
|
# needsrootforbuild
|
||||||
|
|
||||||
|
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
|
|
||||||
%include %_sourcedir/kernel-spec-macros
|
%include %_sourcedir/kernel-spec-macros
|
||||||
@ -36,9 +36,9 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
|||||||
Summary: Basic QA tests for the kernel
|
Summary: Basic QA tests for the kernel
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: SLES
|
Group: SLES
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-pae
|
|||||||
Summary: Kernel with PAE Support
|
Summary: Kernel with PAE Support
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%ifarch %ix86
|
%ifarch %ix86
|
||||||
Provides: kernel-bigsmp = 2.6.17
|
Provides: kernel-bigsmp = 2.6.17
|
||||||
Obsoletes: kernel-bigsmp <= 2.6.17
|
Obsoletes: kernel-bigsmp <= 2.6.17
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -30,9 +30,9 @@ Name: kernel-source
|
|||||||
Summary: The Linux Kernel Sources
|
Summary: The Linux Kernel Sources
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: Development/Sources
|
Group: Development/Sources
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -43,7 +43,7 @@ BuildRequires: fdupes
|
|||||||
BuildRequires: sed
|
BuildRequires: sed
|
||||||
Requires(post): coreutils sed
|
Requires(post): coreutils sed
|
||||||
Provides: %name = %version-%source_rel
|
Provides: %name = %version-%source_rel
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: linux
|
Provides: linux
|
||||||
Provides: multiversion(kernel)
|
Provides: multiversion(kernel)
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -24,10 +24,10 @@ Name: kernel-syms
|
|||||||
Summary: Kernel Symbol Versions (modversions)
|
Summary: Kernel Symbol Versions (modversions)
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: Development/Sources
|
Group: Development/Sources
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if %using_buildservice
|
%if %using_buildservice
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -55,7 +55,7 @@ Requires: kernel-zfcpdump-devel = %version-%source_rel
|
|||||||
%endif
|
%endif
|
||||||
Requires: pesign-obs-integration
|
Requires: pesign-obs-integration
|
||||||
Provides: %name = %version-%source_rel
|
Provides: %name = %version-%source_rel
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: multiversion(kernel)
|
Provides: multiversion(kernel)
|
||||||
Source: README.KSYMS
|
Source: README.KSYMS
|
||||||
Requires: kernel-devel%variant = %version-%source_rel
|
Requires: kernel-devel%variant = %version-%source_rel
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-vanilla
|
|||||||
Summary: The Standard Kernel - without any SUSE patches
|
Summary: The Standard Kernel - without any SUSE patches
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,76 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 20:20:41 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Linux 5.1.2 (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix documentation typo (bnc#1012628).
|
||||||
|
- Documentation: Correct the possible MDS sysfs values
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/mds: Add MDSUM variant to the MDS documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add 'mitigations=' support for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- s390/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- powerpc/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Support 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- cpu/speculation: Add 'mitigations=' cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Print SMT vulnerable on MSBDS with
|
||||||
|
mitigations off (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Fix comment (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add SMT warning message (bnc#1012628).
|
||||||
|
- x86/speculation: Move arch_smt_update() call to after mitigation
|
||||||
|
decisions (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds=full,nosmt cmdline option
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Add MDS vulnerability documentation
|
||||||
|
(bnc#1012628).
|
||||||
|
- Documentation: Move L1TF to separate directory (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation mode VMWERV (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add sysfs reporting for MDS (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mitigation control for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Conditionally clear CPU buffers on idle
|
||||||
|
entry (bnc#1012628).
|
||||||
|
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Clear CPU buffers on exit to user
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bnc#1012628).
|
||||||
|
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bnc#1012628).
|
||||||
|
- x86/speculation/mds: Add basic bug infrastructure for MDS
|
||||||
|
(bnc#1012628).
|
||||||
|
- x86/speculation: Consolidate CPU whitelists (bnc#1012628).
|
||||||
|
- x86/msr-index: Cleanup bit defines (bnc#1012628).
|
||||||
|
- commit 5a8c05f
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:37:17 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: keep LSM empty in s390x/zfcpdump
|
||||||
|
This config doesn't really build AppArmor and always had
|
||||||
|
DEFAULT_SECURITY_DAC so it seems more consistent to keep LSM list empty.
|
||||||
|
- commit 3073856
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:08:04 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- config: enable AppArmor by default again (bsc#1134906)
|
||||||
|
AppArmor used to be enabled in kernel by default by after the recent
|
||||||
|
introduction of CONFIG_LSM, we disabled all LSM modules. Enable AppArmor
|
||||||
|
again.
|
||||||
|
- commit 953db35
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue May 14 10:01:25 CEST 2019 - mkubecek@suse.cz
|
||||||
|
|
||||||
|
- Update upstream reference:
|
||||||
|
patches.suse/efifb-Omit-memory-map-check-on-legacy-boot.patch
|
||||||
|
- commit 133a780
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
Sat May 11 19:16:25 CEST 2019 - jslaby@suse.cz
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
|
|
||||||
%define srcversion 5.1
|
%define srcversion 5.1
|
||||||
%define patchversion 5.1.1
|
%define patchversion 5.1.2
|
||||||
%define variant %{nil}
|
%define variant %{nil}
|
||||||
%define vanilla_only 0
|
%define vanilla_only 0
|
||||||
|
|
||||||
@ -62,9 +62,9 @@ Name: kernel-zfcpdump
|
|||||||
Summary: The IBM System Z zfcpdump Kernel
|
Summary: The IBM System Z zfcpdump Kernel
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 5.1.1
|
Version: 5.1.2
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g65f0348
|
Release: <RELEASE>.g08094c3
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
@ -169,10 +169,10 @@ Conflicts: hyper-v < 4
|
|||||||
Conflicts: libc.so.6()(64bit)
|
Conflicts: libc.so.6()(64bit)
|
||||||
%endif
|
%endif
|
||||||
Provides: kernel = %version-%source_rel
|
Provides: kernel = %version-%source_rel
|
||||||
Provides: kernel-%build_flavor-base-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-%build_flavor-base-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
Provides: kernel-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: kernel-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
# END COMMON DEPS
|
# END COMMON DEPS
|
||||||
Provides: %name-srchash-65f034823e6b696100f8a0bb23af2666d5597d70
|
Provides: %name-srchash-08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
%obsolete_rebuilds %name
|
%obsolete_rebuilds %name
|
||||||
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
Source0: http://www.kernel.org/pub/linux/kernel/v5.x/linux-%srcversion.tar.xz
|
||||||
Source2: source-post.sh
|
Source2: source-post.sh
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
version https://git-lfs.github.com/spec/v1
|
||||||
oid sha256:919dfefe67cc4e8d2c8757a5c718846c57e639e09c525fd60e041a3f1a8048f3
|
oid sha256:db6f8cead32aae7200c94cfc9272647622f75ca314a4a1923c2b94fd00958daf
|
||||||
size 37830
|
size 72995
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
version https://git-lfs.github.com/spec/v1
|
||||||
oid sha256:57517beb3baf09b9046be289d22ff09ff095bc8b93446d991186a28bea5acbbe
|
oid sha256:7cb77fb7f8317224cf5dea4a5ffe56a9197752b8e5e73005071ec0a6b2499fe0
|
||||||
size 42129
|
size 42094
|
||||||
|
28
series.conf
28
series.conf
@ -58,6 +58,34 @@
|
|||||||
patches.kernel.org/5.1.1-029-locking-futex-Allow-low-level-atomic-operations.patch
|
patches.kernel.org/5.1.1-029-locking-futex-Allow-low-level-atomic-operations.patch
|
||||||
patches.kernel.org/5.1.1-030-arm64-futex-Bound-number-of-LDXR-STXR-loops-in-.patch
|
patches.kernel.org/5.1.1-030-arm64-futex-Bound-number-of-LDXR-STXR-loops-in-.patch
|
||||||
patches.kernel.org/5.1.1-031-Linux-5.1.1.patch
|
patches.kernel.org/5.1.1-031-Linux-5.1.1.patch
|
||||||
|
patches.kernel.org/5.1.2-001-x86-msr-index-Cleanup-bit-defines.patch
|
||||||
|
patches.kernel.org/5.1.2-002-x86-speculation-Consolidate-CPU-whitelists.patch
|
||||||
|
patches.kernel.org/5.1.2-003-x86-speculation-mds-Add-basic-bug-infrastructur.patch
|
||||||
|
patches.kernel.org/5.1.2-004-x86-speculation-mds-Add-BUG_MSBDS_ONLY.patch
|
||||||
|
patches.kernel.org/5.1.2-005-x86-kvm-Expose-X86_FEATURE_MD_CLEAR-to-guests.patch
|
||||||
|
patches.kernel.org/5.1.2-006-x86-speculation-mds-Add-mds_clear_cpu_buffers.patch
|
||||||
|
patches.kernel.org/5.1.2-007-x86-speculation-mds-Clear-CPU-buffers-on-exit-t.patch
|
||||||
|
patches.kernel.org/5.1.2-008-x86-kvm-vmx-Add-MDS-protection-when-L1D-Flush-i.patch
|
||||||
|
patches.kernel.org/5.1.2-009-x86-speculation-mds-Conditionally-clear-CPU-buf.patch
|
||||||
|
patches.kernel.org/5.1.2-010-x86-speculation-mds-Add-mitigation-control-for-.patch
|
||||||
|
patches.kernel.org/5.1.2-011-x86-speculation-mds-Add-sysfs-reporting-for-MDS.patch
|
||||||
|
patches.kernel.org/5.1.2-012-x86-speculation-mds-Add-mitigation-mode-VMWERV.patch
|
||||||
|
patches.kernel.org/5.1.2-013-Documentation-Move-L1TF-to-separate-directory.patch
|
||||||
|
patches.kernel.org/5.1.2-014-Documentation-Add-MDS-vulnerability-documentati.patch
|
||||||
|
patches.kernel.org/5.1.2-015-x86-speculation-mds-Add-mds-full-nosmt-cmdline-.patch
|
||||||
|
patches.kernel.org/5.1.2-016-x86-speculation-Move-arch_smt_update-call-to-af.patch
|
||||||
|
patches.kernel.org/5.1.2-017-x86-speculation-mds-Add-SMT-warning-message.patch
|
||||||
|
patches.kernel.org/5.1.2-018-x86-speculation-mds-Fix-comment.patch
|
||||||
|
patches.kernel.org/5.1.2-019-x86-speculation-mds-Print-SMT-vulnerable-on-MSB.patch
|
||||||
|
patches.kernel.org/5.1.2-020-cpu-speculation-Add-mitigations-cmdline-option.patch
|
||||||
|
patches.kernel.org/5.1.2-021-x86-speculation-Support-mitigations-cmdline-opt.patch
|
||||||
|
patches.kernel.org/5.1.2-022-powerpc-speculation-Support-mitigations-cmdline.patch
|
||||||
|
patches.kernel.org/5.1.2-023-s390-speculation-Support-mitigations-cmdline-op.patch
|
||||||
|
patches.kernel.org/5.1.2-024-x86-speculation-mds-Add-mitigations-support-for.patch
|
||||||
|
patches.kernel.org/5.1.2-025-x86-mds-Add-MDSUM-variant-to-the-MDS-documentat.patch
|
||||||
|
patches.kernel.org/5.1.2-026-Documentation-Correct-the-possible-MDS-sysfs-va.patch
|
||||||
|
patches.kernel.org/5.1.2-027-x86-speculation-mds-Fix-documentation-typo.patch
|
||||||
|
patches.kernel.org/5.1.2-028-Linux-5.1.2.patch
|
||||||
|
|
||||||
########################################################
|
########################################################
|
||||||
# Build fixes that apply to the vanilla kernel too.
|
# Build fixes that apply to the vanilla kernel too.
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
2019-05-11 17:16:51 +0000
|
2019-05-14 18:21:06 +0000
|
||||||
GIT Revision: 65f034823e6b696100f8a0bb23af2666d5597d70
|
GIT Revision: 08094c3e7184c834a637fa15f7b4a3ec0ee750ea
|
||||||
GIT Branch: stable
|
GIT Branch: stable
|
||||||
|
Loading…
Reference in New Issue
Block a user