Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2018-01-31 19:48:58 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source" Wed Jan 31 19:48:58 2018 rev:403 rq:570460 version:4.14.15 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2018-01-26 13:38:16.804712003 +0100 +++ /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes 2018-01-31 19:48:59.913548906 +0100 @@ -1,0 +2,127 @@ +Mon Jan 29 09:15:43 CET 2018 - jsl...@suse.cz + +- Revert "module: Add retpoline tag to VERMAGIC" (fix loading + of KMPs). +- commit 9a6fca5 + +------------------------------------------------------------------- +Fri Jan 26 09:52:08 CET 2018 - jsl...@suse.cz + +- Refresh + patches.suse/netfilter-nfnetlink_cthelper-Add-missing-permission-.patch. +- Refresh + patches.suse/netfilter-xt_osf-Add-missing-permission-checks.patch. +- Refresh patches.suse/scsi-libfc-fix-ELS-request-handling.patch. + Update upstream status. +- commit 12e5c10 + +------------------------------------------------------------------- +Fri Jan 26 08:40:10 CET 2018 - jsl...@suse.cz + +- x86/ibrs: Add new helper macros to save/restore + MSR_IA32_SPEC_CTRL fix (bsc#1068032 CVE-2017-5753). +- commit 6f87133 + +------------------------------------------------------------------- +Thu Jan 25 21:47:49 CET 2018 - jsl...@suse.cz + +- Delete patches.suse/orc-fix-retpolines-segfaults.patch. + No longer needed. +- commit 9e84548 + +------------------------------------------------------------------- +Thu Jan 25 21:46:34 CET 2018 - jsl...@suse.cz + +- x86/cpufeatures: Add Intel feature bits for Speculation Control + (bsc#1068032 CVE-2017-5715). +- x86/cpufeatures: Add AMD feature bits for Speculation Control + (bsc#1068032 CVE-2017-5715). +- x86/pti: Do not enable PTI on processors which are not + vulnerable to Meltdown (bsc#1068032 CVE-2017-5715). +- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2 + microcodes (bsc#1068032 CVE-2017-5715). +- x86/speculation: Add basic IBPB (Indirect Branch Prediction + Barrier) support (bsc#1068032 CVE-2017-5715). +- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715). +- x86/speculation: Use Indirect Branch Prediction Barrier in + context switch (bsc#1068032 CVE-2017-5715). +- x86/mm: Only flush indirect branches when switching into non + dumpable process (bsc#1068032 CVE-2017-5715). +- x86/speculation: Add basic IBRS support infrastructure + (bsc#1068032 CVE-2017-5715). +- x86/speculation: Add inlines to control Indirect Branch + Speculation (bsc#1068032 CVE-2017-5715). +- x86: Simplify spectre_v2 command line parsing (bsc#1068032 + CVE-2017-5715). +- x86/idle: Control Indirect Branch Speculation in idle + (bsc#1068032 CVE-2017-5715). +- x86/enter: Create macros to restrict/unrestrict Indirect Branch + Speculation (bsc#1068032 CVE-2017-5715). +- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032 + CVE-2017-5715). +- x86/ibrs: Add new helper macros to save/restore + MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715). +- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032 + CVE-2017-5715). +- Delete + patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch. +- Delete + patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch. +- Delete + patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch. +- Delete + patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch. +- Delete + patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch. +- Delete + patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch. +- Delete + patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch. +- Delete + patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch. +- Delete + patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch. +- Delete + patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch. +- Delete + patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch. +- Delete + patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch. +- Delete + patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch. +- Delete + patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch. +- Delete + patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch. +- Delete + patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch. +- Delete + patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch. +- Delete + patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch. +- Delete + patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch. +- Delete + patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch. +- Delete + patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch. +- Delete + patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch. +- Delete + patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch. +- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch. +- Delete + patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch. +- Delete + patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch. +- Delete + patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch. +- Delete + patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch. +- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch. +- Delete + patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch. + Update spectre_v1 to the upstream patches. +- commit 67b0a37 + +------------------------------------------------------------------- dtb-armv6l.changes: same change dtb-armv7l.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-syzkaller.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.241254686 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.245254501 +0100 @@ -31,7 +31,7 @@ Name: dtb-aarch64 Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.349249665 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.353249479 +0100 @@ -60,7 +60,7 @@ Group: System/Kernel Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif kernel-debug.spec: same change kernel-default.spec: same change ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.445245202 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.449245016 +0100 @@ -33,7 +33,7 @@ Group: Documentation/Man Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif ++++++ kernel-lpae.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.489243156 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.497242784 +0100 @@ -60,7 +60,7 @@ Group: System/Kernel Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.525241482 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.529241296 +0100 @@ -59,7 +59,7 @@ Group: SLES Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif kernel-obs-qa.spec: same change ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.585238692 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.589238506 +0100 @@ -60,7 +60,7 @@ Group: System/Kernel Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.617237205 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.621237019 +0100 @@ -32,7 +32,7 @@ Group: Development/Sources Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.649235716 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.653235531 +0100 @@ -27,7 +27,7 @@ Version: 4.14.15 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif ++++++ kernel-syzkaller.spec ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:06.673234601 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:06.673234601 +0100 @@ -60,7 +60,7 @@ Group: System/Kernel Version: 4.14.15 %if 0%{?is_kotd} -Release: <RELEASE>.g5b3d0ce +Release: <RELEASE>.g9a6fca5 %else Release: 0 %endif kernel-vanilla.spec: same change kernel-zfcpdump.spec: same change ++++++ patches.suse.tar.bz2 ++++++ ++++ 5244 lines of diff (skipped) ++++++ series.conf ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:07.677187920 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:07.681187734 +0100 @@ -1535,6 +1535,7 @@ ######################################################## # Scheduler / Core ######################################################## + patches.suse/revert-module-Add-retpoline-tag-to-VERMAGIC.patch patches.suse/revert-futex-Prevent-overflow-by-strengthen-input-va.patch patches.suse/setuid-dumpable-wrongdir @@ -1551,41 +1552,25 @@ patches.suse/0009-kvm-x86-update-spectre-v1-mitigation.patch patches.suse/0010-nl80211-sanitize-array-index-in-parse_txq_params.patch - patches.suse/0001-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch - patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch - patches.suse/0003-x86-msr-Add-definitions-for-new-speculation-control-.patch - - patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch - patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch - patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch - patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch - patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch - patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch - patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch - patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch - patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch - patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch - patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch - patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch - patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch - patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch - patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch - patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch - patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch - patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch - patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch - patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch - patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch - patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch - patches.suse/0030-Use-the-ibrs_inuse-variable.patch - patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch - patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch - patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch - patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch - patches.suse/0035-Use-the-ibpb_inuse-variable.patch - patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch - - patches.suse/orc-fix-retpolines-segfaults.patch + patches.suse/0001-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch + patches.suse/0002-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch + patches.suse/0003-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch + patches.suse/0004-x86-msr-Add-definitions-for-new-speculation-control-.patch + patches.suse/0005-x86-pti-Do-not-enable-PTI-on-processors-which-are-no.patch + patches.suse/0006-x86-cpufeature-Blacklist-SPEC_CTRL-on-early-Spectre-.patch + patches.suse/0007-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch + patches.suse/0008-x86-kvm-Add-IBPB-support.patch + patches.suse/0009-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch + patches.suse/0010-x86-mm-Only-flush-indirect-branches-when-switching-i.patch + patches.suse/0011-x86-speculation-Add-basic-IBRS-support-infrastructur.patch + patches.suse/0012-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch + patches.suse/0013-x86-Simplify-spectre_v2-command-line-parsing.patch + patches.suse/0014-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch + patches.suse/0015-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch + patches.suse/0016-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch + patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I.patch + patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I-fix.patch + patches.suse/0018-x86-vmx-Direct-access-to-MSR_IA32_SPEC_CTRL.patch ######################################################## # Architecture-specific patches. These used to be all ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.IyhK9Q/_old 2018-01-31 19:49:07.717186060 +0100 +++ /var/tmp/diff_new_pack.IyhK9Q/_new 2018-01-31 19:49:07.721185874 +0100 @@ -1,3 +1,3 @@ -2018-01-25 14:26:16 +0100 -GIT Revision: 5b3d0ced9505101bb6a7c1f0eb4978d8f7e9d005 +2018-01-29 09:15:43 +0100 +GIT Revision: 9a6fca576ed483a18c4ef64b85e247fcb33e4c1b GIT Branch: stable