Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package suse-module-tools for 
openSUSE:Factory checked in at 2026-05-16 19:24:05
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/suse-module-tools (Old)
 and      /work/SRC/openSUSE:Factory/.suse-module-tools.new.1966 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "suse-module-tools"

Sat May 16 19:24:05 2026 rev:98 rq:1353446 version:16.1.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/suse-module-tools/suse-module-tools.changes      
2026-02-26 18:38:07.467272090 +0100
+++ 
/work/SRC/openSUSE:Factory/.suse-module-tools.new.1966/suse-module-tools.changes
    2026-05-16 19:24:39.658370731 +0200
@@ -1,0 +2,10 @@
+Fri May 15 14:02:29 UTC 2026 - Martin Wilck <[email protected]>
+
+- Update to version 16.1.5:
+  * Support XBOOTLDR (jsc#PED-16142)
+  * modprobe.conf: split RNDIS blacklist, add interactive unblacklist support
+    (boo#1262299, boo#1217268)
+  * weak-modules2: don't remove symlinks in the rpm --reinstall case
+    (bsc#1257055)
+
+-------------------------------------------------------------------

Old:
----
  suse-module-tools-16.1.4.obscpio

New:
----
  suse-module-tools-16.1.5.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ suse-module-tools.spec ++++++
--- /var/tmp/diff_new_pack.vpIG1A/_old  2026-05-16 19:24:40.410401509 +0200
+++ /var/tmp/diff_new_pack.vpIG1A/_new  2026-05-16 19:24:40.414401672 +0200
@@ -37,7 +37,7 @@
 %global modprobe_conf_rpmsave %(echo "%{modprobe_conf_files}" | sed 's,\\([^ 
]*\\),%{_sysconfdir}/modprobe.d/\\1.conf.rpmsave,g')
 
 Name:           suse-module-tools
-Version:        16.1.4
+Version:        16.1.5
 Release:        0
 Summary:        Configuration for module loading and SUSE-specific utilities 
for KMPs
 License:        GPL-2.0-or-later

++++++ _scmsync.obsinfo ++++++
--- /var/tmp/diff_new_pack.vpIG1A/_old  2026-05-16 19:24:40.458403474 +0200
+++ /var/tmp/diff_new_pack.vpIG1A/_new  2026-05-16 19:24:40.462403637 +0200
@@ -1,5 +1,5 @@
-mtime: 1771969325
-commit: f7c3b445516092be5708068ac1e9ac186b50fdb0d8225893b12a3a6e9121dca6
+mtime: 1778862802
+commit: 970d83c299838964ec6c7297d40e1ae539e46ce98f31ec60e111bcb0487cce80
 url: https://src.opensuse.org/mwilck/suse-module-tools
 revision: factory
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.vpIG1A/_old  2026-05-16 19:24:40.494404947 +0200
+++ /var/tmp/diff_new_pack.vpIG1A/_new  2026-05-16 19:24:40.498405111 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/openSUSE/suse-module-tools.git</param>
-              <param 
name="changesrevision">5df554fb1022d504d1f84a1ca50701fbdb66dbdc</param></service></servicedata>
+              <param 
name="changesrevision">8eecf697314544ae71460baf8ec83a80d4101c35</param></service></servicedata>
 (No newline at EOF)
 

++++++ build.specials.obscpio ++++++

++++++ build.specials.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/.gitignore new/.gitignore
--- old/.gitignore      1970-01-01 01:00:00.000000000 +0100
+++ new/.gitignore      2026-05-15 18:33:22.000000000 +0200
@@ -0,0 +1 @@
+.osc

++++++ suse-module-tools-16.1.4.obscpio -> suse-module-tools-16.1.5.obscpio 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/suse-module-tools-16.1.4/README.md 
new/suse-module-tools-16.1.5/README.md
--- old/suse-module-tools-16.1.4/README.md      2026-02-24 22:36:03.000000000 
+0100
+++ new/suse-module-tools-16.1.5/README.md      2026-05-15 15:57:34.000000000 
+0200
@@ -80,6 +80,28 @@
 temporarily otherwise.
 
 
+## Other blacklisted modules
+
+Some kernel modules that are not file systems are also blacklisted by default
+because they are considered insecure (e.g. RNDIS drivers, bsc#1205767,
+jsc#PED-5731). The same un-blacklisting mechanism applies: running
+`modprobe $MODULE` in a terminal will trigger an interactive prompt offering
+to permanently un-blacklist the module.
+
+For example, to enable USB tethering with Android devices that use the RNDIS
+protocol:
+
+    # modprobe rndis_host
+    unblacklist: loading module rndis_host
+    unblacklist: Do you want to un-blacklist rndis_host permanently 
(<y>es/<n>o/n<e>ver)? y
+    unblacklist: rndis_host un-blacklisted by creating 
/etc/modprobe.d/50-blacklist-rndis.conf
+
+Answering **y** creates a symlink to `/dev/null`, permanently enabling the 
module
+across reboots and package upgrades. Answering **never** creates an override 
file
+that keeps the module blacklisted even if the vendor file is modified in future
+package updates.
+
+
 ## Weak modules
 
 This package contains the script `weak-modules2` which is necessary to make
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/suse-module-tools-16.1.4/modprobe.conf/common/50-blacklist-rndis.conf 
new/suse-module-tools-16.1.5/modprobe.conf/common/50-blacklist-rndis.conf
--- old/suse-module-tools-16.1.4/modprobe.conf/common/50-blacklist-rndis.conf   
2026-02-24 22:36:03.000000000 +0100
+++ new/suse-module-tools-16.1.5/modprobe.conf/common/50-blacklist-rndis.conf   
2026-05-15 15:57:34.000000000 +0200
@@ -1,5 +1,8 @@
-# RNDIS is considered insecure (bsc#1205767, jsc#PED-5731)
-blacklist rndis_wlan
-blacklist usb_f_rndis
+# DO NOT EDIT THIS FILE!
+#
+# The rndis_host module is blacklisted by default because RNDIS is
+# considered insecure (bsc#1205767, jsc#PED-5731).
 blacklist rndis_host
-
+# The module can be un-blacklisted by running "modprobe rndis_host".
+# See README.md in the suse-module-tools package for details.
+install rndis_host /usr/lib/module-init-tools/unblacklist rndis_host 
50-blacklist-rndis; /sbin/modprobe --ignore-install rndis_host
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/suse-module-tools-16.1.4/modprobe.conf/common/60-blacklist-usb_f_rndis.conf 
new/suse-module-tools-16.1.5/modprobe.conf/common/60-blacklist-usb_f_rndis.conf
--- 
old/suse-module-tools-16.1.4/modprobe.conf/common/60-blacklist-usb_f_rndis.conf 
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/suse-module-tools-16.1.5/modprobe.conf/common/60-blacklist-usb_f_rndis.conf 
    2026-05-15 15:57:34.000000000 +0200
@@ -0,0 +1,8 @@
+# DO NOT EDIT THIS FILE!
+#
+# The usb_f_rndis module is blacklisted by default because RNDIS is
+# considered insecure (bsc#1205767, jsc#PED-5731).
+blacklist usb_f_rndis
+# The module can be un-blacklisted by running "modprobe usb_f_rndis".
+# See README.md in the suse-module-tools package for details.
+install usb_f_rndis /usr/lib/module-init-tools/unblacklist usb_f_rndis; 
/sbin/modprobe --ignore-install usb_f_rndis
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/suse-module-tools-16.1.4/regenerate-initrd-posttrans 
new/suse-module-tools-16.1.5/regenerate-initrd-posttrans
--- old/suse-module-tools-16.1.4/regenerate-initrd-posttrans    2026-02-24 
22:36:03.000000000 +0100
+++ new/suse-module-tools-16.1.5/regenerate-initrd-posttrans    2026-05-15 
15:57:34.000000000 +0200
@@ -46,11 +46,11 @@
        exit 0
 fi
 
-# If we are inside a transaction and using a separate /boot/efi
-# partition (ESP) then we cannot touch it, as we will escape the
-# atomicity promise.  We need to delay the call to this script after
-# the transaction has been completed.  The component that will call
-# again regenerate-initrd-posttrans to generate the new initrd is the
+# If we are inside a transaction and using a separate ESP partition
+# then we cannot touch it, as we will escape the atomicity promise.
+# We need to delay the call to this script after the transaction has
+# been completed.  The component that will call again
+# regenerate-initrd-posttrans to generate the new initrd is the
 # sdbootutil snapper plugin (this time outside the live transaction),
 # and the tukit plugin will migrate the signal from inside the
 # transaction to outside.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/suse-module-tools-16.1.4/suse-module-tools.spec 
new/suse-module-tools-16.1.5/suse-module-tools.spec
--- old/suse-module-tools-16.1.4/suse-module-tools.spec 2026-02-24 
22:36:03.000000000 +0100
+++ new/suse-module-tools-16.1.5/suse-module-tools.spec 2026-05-15 
15:57:34.000000000 +0200
@@ -37,7 +37,7 @@
 %global modprobe_conf_rpmsave %(echo "%{modprobe_conf_files}" | sed 's,\\([^ 
]*\\),%{_sysconfdir}/modprobe.d/\\1.conf.rpmsave,g')
 
 Name:           suse-module-tools
-Version:        16.1.4
+Version:        16.1.5
 Release:        0
 Summary:        Configuration for module loading and SUSE-specific utilities 
for KMPs
 License:        GPL-2.0-or-later
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/suse-module-tools-16.1.4/unblacklist 
new/suse-module-tools-16.1.5/unblacklist
--- old/suse-module-tools-16.1.4/unblacklist    2026-02-24 22:36:03.000000000 
+0100
+++ new/suse-module-tools-16.1.5/unblacklist    2026-05-15 15:57:34.000000000 
+0200
@@ -1,5 +1,5 @@
 #! /bin/sh
-# Copyright (c) 2021-2024 SUSE LLC
+# Copyright (c) 2021-2025 SUSE LLC
 # SPDX-License-Identifier: GPL-2.0-or-later
 
 ME="${0##*/}"
@@ -19,20 +19,49 @@
     exit 1
 fi
 
-if [ $# -ne 1 ]; then
-    echo "Usage: $ME module" >&2
+if [ $# -lt 1 ] || [ $# -gt 2 ]; then
+    echo "Usage: $ME module [config-basename]" >&2
     exit 1
 fi
 
 MODULE=$1
-if [ -z "$MODULE" ] || \
-       [ ! -f /lib/modprobe.d/60-blacklist_fs-"$MODULE".conf -a \
-        ! -f /usr/lib/modprobe.d/60-blacklist_fs-"$MODULE".conf ]; then
+
+# Determine which vendor config file covers this module, and set CONF to
+# the corresponding override path in /etc/modprobe.d/.
+#
+# Two calling conventions are supported:
+#
+#   unblacklist MODULE
+#     Used by filesystem blacklists (60-blacklist_fs-MODULE.conf) and
+#     non-filesystem blacklists that follow the 60-blacklist-MODULE.conf
+#     naming convention.  The vendor file is located by pattern.
+#
+#   unblacklist MODULE CONFIG-BASENAME
+#     Used when the vendor filename does not encode the module name
+#     (e.g. 50-blacklist-rndis.conf for rndis_host).  The basename is
+#     supplied explicitly by the install directive in the vendor file so
+#     that the correct /etc/ override is created.
+#
+CONF=""
+if [ -n "${2:-}" ]; then
+    # Explicit config basename supplied by the install directive.
+    # Validate that the referenced vendor file actually exists to guard
+    # against typos in install directives.
+    if [ -f "/usr/lib/modprobe.d/$2.conf" ]; then
+        CONF="/etc/modprobe.d/$2.conf"
+    else
+        echo "$ME: vendor file /usr/lib/modprobe.d/$2.conf not found" >&2
+        exit 1
+    fi
+elif [ -f "/usr/lib/modprobe.d/60-blacklist_fs-$MODULE.conf" ]; then
+    CONF="/etc/modprobe.d/60-blacklist_fs-$MODULE.conf"
+elif [ -f "/usr/lib/modprobe.d/60-blacklist-$MODULE.conf" ]; then
+    CONF="/etc/modprobe.d/60-blacklist-$MODULE.conf"
+else
     echo "$ME: Invalid or unknown module \"$MODULE\"" >&2
     exit 1
 fi
 
-CONF=/etc/modprobe.d/60-blacklist_fs-"$MODULE".conf
 if [ -L "$CONF" ]; then
     if [ x"$(readlink -f "$CONF")" = x/dev/null ]; then
        # already linked to /dev/null
@@ -42,7 +71,7 @@
        exit 1
     fi
 elif [ -f "$CONF" ]; then
-    if ! grep -E -q "^[        ]*blacklist[    ]+$MODULE" "$CONF"; then
+    if ! grep -E -q "^[[:space:]]*blacklist[[:space:]]+$MODULE" "$CONF"; then
        # not blacklisted
        exit 0
     fi
@@ -55,7 +84,7 @@
     exit 1
 fi
 
-echo "$ME: loading $MODULE file system module" >&2
+echo "$ME: loading module $MODULE" >&2
 _a=
 while [ -z "$_a" ]; do
     echo -n "$ME: Do you want to un-blacklist $MODULE permanently 
(<y>es/<n>o/n<e>ver)? " >&2
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/suse-module-tools-16.1.4/weak-modules2 
new/suse-module-tools-16.1.5/weak-modules2
--- old/suse-module-tools-16.1.4/weak-modules2  2026-02-24 22:36:03.000000000 
+0100
+++ new/suse-module-tools-16.1.5/weak-modules2  2026-05-15 15:57:34.000000000 
+0200
@@ -480,7 +480,9 @@
     if [ -n "$SDBOOTUTIL" ]; then
        if [ -z "$TRANSACTIONAL_UPDATE" ] && [ -s '/etc/kernel/entry-token' ]; 
then
            read -r _ initrd <<<"$(sdbootutil --entry-keys=initrd show-entry 
$krel)"
-           initrd="/boot/efi$initrd"
+           # The initrd can be in the ESP (/boot/efi, /boot) or in
+           # the XBOOTLDR (/boot), depending on the installation
+           initrd="$(bootctl --print-boot-path)$initrd"
        fi
     fi
     echo "$initrd"

++++++ suse-module-tools.obsinfo ++++++
--- /var/tmp/diff_new_pack.vpIG1A/_old  2026-05-16 19:24:40.814418044 +0200
+++ /var/tmp/diff_new_pack.vpIG1A/_new  2026-05-16 19:24:40.818418207 +0200
@@ -1,5 +1,5 @@
 name: suse-module-tools
-version: 16.1.4
-mtime: 1771968963
-commit: 5df554fb1022d504d1f84a1ca50701fbdb66dbdc
+version: 16.1.5
+mtime: 1778853454
+commit: 8eecf697314544ae71460baf8ec83a80d4101c35
 

Reply via email to