Hello community,

here is the log from the commit of package kernel-source for openSUSE:Factory 
checked in at 2018-02-10 17:55:43
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kernel-source (Old)
 and      /work/SRC/openSUSE:Factory/.kernel-source.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kernel-source"

Sat Feb 10 17:55:43 2018 rev:406 rq:574110 version:4.15.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes        
2018-02-06 16:45:51.893303159 +0100
+++ /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes   
2018-02-10 17:55:44.565398118 +0100
@@ -1,0 +2,160 @@
+Thu Feb  8 07:52:04 CET 2018 - [email protected]
+
+- Linux 4.15.2 (bnc#1012628).
+- KVM: x86: Make indirect calls in emulator speculation safe
+  (bnc#1012628).
+- KVM: VMX: Make indirect call speculation safe (bnc#1012628).
+- x86/alternative: Print unadorned pointers (bnc#1012628).
+- auxdisplay: img-ascii-lcd: add missing
+  MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012628).
+- iio: adc/accel: Fix up module licenses (bnc#1012628).
+- pinctrl: pxa: pxa2xx: add missing
+  MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012628).
+- ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
+  (bnc#1012628).
+- KVM: nVMX: Eliminate vmcs02 pool (bnc#1012628).
+- KVM: VMX: introduce alloc_loaded_vmcs (bnc#1012628).
+- objtool: Improve retpoline alternative handling (bnc#1012628).
+- objtool: Add support for alternatives at the end of a section
+  (bnc#1012628).
+- objtool: Warn on stripped section symbol (bnc#1012628).
+- x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
+  (bnc#1012628).
+- x86/entry/64: Remove the SYSCALL64 fast path (bnc#1012628).
+- x86/entry/64: Push extra regs right away (bnc#1012628).
+- x86/asm: Move 'status' from thread_struct to thread_info
+  (bnc#1012628).
+- x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
+  (bnc#1012628).
+- x86/paravirt: Remove 'noreplace-paravirt' cmdline option
+  (bnc#1012628).
+- KVM: VMX: make MSR bitmaps per-VCPU (bnc#1012628).
+- x86/kvm: Update spectre-v1 mitigation (bnc#1012628).
+- x86/retpoline: Avoid retpolines for built-in __init functions
+  (bnc#1012628).
+- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
+  (bnc#1012628).
+- KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX
+  (bnc#1012628).
+- KVM/x86: Add IBPB support (bnc#1012628).
+- KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012628).
+- KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
+  (bnc#1012628).
+- KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL
+  (bnc#1012628).
+- serial: core: mark port as initialized after successful IRQ
+  change (bnc#1012628).
+- fpga: region: release of_parse_phandle nodes after use
+  (bnc#1012628).
+- commit 54903ae
+
+-------------------------------------------------------------------
+Mon Feb  5 15:52:19 CET 2018 - [email protected]
+
+- x86/pti: Mark constant arrays as __initconst (bsc#1068032
+  CVE-2017-5753).
+- x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on
+  Intel (bsc#1068032 CVE-2017-5753).
+- commit 7d4f257
+
+-------------------------------------------------------------------
+Mon Feb  5 14:15:56 CET 2018 - [email protected]
+
+- x86/speculation: Add basic IBRS support infrastructure
+  (bsc#1068032 CVE-2017-5753).
+- x86/pti: Do not enable PTI on CPUs which are not vulnerable
+  to Meltdown (bsc#1068032 CVE-2017-5753).
+- x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre
+  v2 microcodes (bsc#1068032 CVE-2017-5753).
+- x86/nospec: Fix header guards names (bsc#1068032 CVE-2017-5753).
+- x86/bugs: Drop one "mitigation" from dmesg (bsc#1068032
+  CVE-2017-5753).
+- x86/cpu/bugs: Make retpoline module warning conditional
+  (bsc#1068032 CVE-2017-5753).
+- x86/cpufeatures: Clean up Spectre v2 related CPUID flags
+  (bsc#1068032 CVE-2017-5753).
+- x86/retpoline: Simplify vmexit_fill_RSB() (bsc#1068032
+  CVE-2017-5753).
+- x86/speculation: Simplify indirect_branch_prediction_barrier()
+  (bsc#1068032 CVE-2017-5753).
+- module/retpoline: Warn about missing retpoline in module
+  (bsc#1068032 CVE-2017-5753).
+- x86/spectre: Check CONFIG_RETPOLINE in command line parser
+  (bsc#1068032 CVE-2017-5753).
+- x86/speculation: Use Indirect Branch Prediction Barrier in
+  context switch (bsc#1068032 CVE-2017-5753).
+- Refresh
+  patches.suse/0001-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch.
+- Refresh
+  patches.suse/0002-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch.
+- Refresh
+  patches.suse/0003-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch.
+- Refresh
+  patches.suse/0004-x86-msr-Add-definitions-for-new-speculation-control-.patch.
+- Refresh
+  patches.suse/0007-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch.
+- Refresh patches.suse/supported-flag.
+- Delete
+  patches.suse/0005-x86-pti-Do-not-enable-PTI-on-processors-which-are-no.patch.
+- Delete
+  patches.suse/0006-x86-cpufeature-Blacklist-SPEC_CTRL-on-early-Spectre-.patch.
+- Delete patches.suse/0008-x86-kvm-Add-IBPB-support.patch.
+- Delete
+  patches.suse/0009-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch.
+- Delete
+  patches.suse/0010-x86-mm-Only-flush-indirect-branches-when-switching-i.patch.
+- Delete
+  patches.suse/0011-x86-speculation-Add-basic-IBRS-support-infrastructur.patch.
+- Delete
+  
patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I-fix.patch.
+- Delete
+  patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I.patch.
+- Delete
+  patches.suse/0018-x86-vmx-Direct-access-to-MSR_IA32_SPEC_CTRL.patch.
+  Update to the patches from 4.16-rc1 and the updated IBRS patches from
+  the dwmw's repo.
+- commit cd20d46
+
+-------------------------------------------------------------------
+Mon Feb  5 10:50:15 CET 2018 - [email protected]
+
+- Documentation: Document array_index_nospec (bsc#1068032
+  CVE-2017-5715).
+- array_index_nospec: Sanitize speculative array de-references
+  (bsc#1068032 CVE-2017-5715).
+- x86: Implement array_index_mask_nospec (bsc#1068032
+  CVE-2017-5715).
+- x86: Introduce barrier_nospec (bsc#1068032 CVE-2017-5715).
+- x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
+  (bsc#1068032 CVE-2017-5715).
+- x86/usercopy: Replace open coded stac/clac with
+  __uaccess_{begin, end} (bsc#1068032 CVE-2017-5715).
+- x86/syscall: Sanitize syscall table de-references under
+  speculation (bsc#1068032 CVE-2017-5715).
+- nl80211: Sanitize array index in parse_txq_params (bsc#1068032
+  CVE-2017-5715).
+- x86/spectre: Report get_user mitigation for spectre_v1
+  (bsc#1068032 CVE-2017-5715).
+- Delete patches.suse/0001-Documentation-document-array_ptr.patch.
+- Delete
+  patches.suse/0002-asm-nospec-array_ptr-sanitize-speculative-array-de-r.patch.
+- Delete patches.suse/0003-x86-implement-array_ptr_mask.patch.
+- Delete
+  patches.suse/0004-x86-introduce-__uaccess_begin_nospec-and-ifence.patch.
+- Delete
+  patches.suse/0007-x86-narrow-out-of-bounds-syscalls-to-sys_read-under-.patch.
+- Delete
+  patches.suse/0009-kvm-x86-update-spectre-v1-mitigation.patch.
+- Delete
+  patches.suse/0010-nl80211-sanitize-array-index-in-parse_txq_params.patch.
+  Replace by the patches from 4.16-rc1.
+- commit 8343cab
+
+-------------------------------------------------------------------
+Mon Feb  5 10:43:09 CET 2018 - [email protected]
+
+- scsi: aacraid: remove redundant setting of variable c
+  (git-fixes).
+- commit 143e25c
+
+-------------------------------------------------------------------
@@ -98 +258,95 @@
-- commit 622b47a
+- Linux 4.15.1 (bnc#1012628).
+- x86/efi: Clarify that reset attack mitigation needs appropriate
+  userspace (bnc#1012628).
+- Input: synaptics-rmi4 - do not delete interrupt memory too early
+  (bnc#1012628).
+- Input: synaptics-rmi4 - unmask F03 interrupts when port is
+  opened (bnc#1012628).
+- test_firmware: fix missing unlock on error in
+  config_num_requests_store() (bnc#1012628).
+- iio: chemical: ccs811: Fix output of IIO_CONCENTRATION channels
+  (bnc#1012628).
+- iio: adc: stm32: fix scan of multiple channels with DMA
+  (bnc#1012628).
+- spi: imx: do not access registers while clocks disabled
+  (bnc#1012628).
+- serial: imx: Only wakeup via RTSDEN bit if the system has
+  RTS/CTS (bnc#1012628).
+- serial: 8250_dw: Revert "Improve clock rate setting"
+  (bnc#1012628).
+- serial: 8250_uniphier: fix error return code in
+  uniphier_uart_probe() (bnc#1012628).
+- serial: 8250_of: fix return code when probe function fails to
+  get reset (bnc#1012628).
+- mei: me: allow runtime pm for platform with D0i3 (bnc#1012628).
+- android: binder: use VM_ALLOC to get vm area (bnc#1012628).
+- ANDROID: binder: remove waitqueue when thread exits
+  (bnc#1012628).
+- usb/gadget: Fix "high bandwidth" check in
+  usb_gadget_ep_match_desc() (bnc#1012628).
+- usb: uas: unconditionally bring back host after reset
+  (bnc#1012628).
+- usb: f_fs: Prevent gadget unbind if it is already unbound
+  (bnc#1012628).
+- USB: serial: simple: add Motorola Tetra driver (bnc#1012628).
+- usbip: list: don't list devices attached to vhci_hcd
++++ 60 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes
++++ and /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes
dtb-armv6l.changes: same change
dtb-armv7l.changes: same change
kernel-64kb.changes: same change
kernel-debug.changes: same change
kernel-default.changes: same change
kernel-docs.changes: same change
kernel-lpae.changes: same change
kernel-obs-build.changes: same change
kernel-obs-qa.changes: same change
kernel-pae.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-syzkaller.changes: same change
kernel-vanilla.changes: same change
kernel-zfcpdump.changes: same change

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dtb-aarch64.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.633069869 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.633069869 +0100
@@ -17,7 +17,7 @@
 
 
 %define srcversion 4.15
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -29,9 +29,9 @@
 %(chmod +x 
%_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb})
 
 Name:           dtb-aarch64
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

dtb-armv6l.spec: same change
dtb-armv7l.spec: same change
++++++ kernel-64kb.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.697067551 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.701067407 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.15
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        Kernel with 64kb PAGE_SIZE
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

kernel-debug.spec: same change
kernel-default.spec: same change
++++++ kernel-docs.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.765065090 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.765065090 +0100
@@ -17,7 +17,7 @@
 
 
 %define srcversion 4.15
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -31,9 +31,9 @@
 Summary:        Kernel Documentation
 License:        GPL-2.0
 Group:          Documentation/Man
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

++++++ kernel-lpae.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.789064221 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.789064221 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.15
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        Kernel for LPAE enabled systems
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

++++++ kernel-obs-build.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.809063498 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.813063352 +0100
@@ -19,7 +19,7 @@
 
 #!BuildIgnore: post-build-checks
 
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -64,9 +64,9 @@
 Summary:        package kernel and initrd for OBS VM builds
 License:        GPL-2.0
 Group:          SLES
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

++++++ kernel-obs-qa.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.833062629 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.833062629 +0100
@@ -17,7 +17,7 @@
 # needsrootforbuild
 
 
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -36,9 +36,9 @@
 Summary:        Basic QA tests for the kernel
 License:        GPL-2.0
 Group:          SLES
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

++++++ kernel-pae.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.853061905 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.857061760 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.15
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        Kernel with PAE Support
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.873061181 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.877061036 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.15
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -30,9 +30,9 @@
 Summary:        The Linux Kernel Sources
 License:        GPL-2.0
 Group:          Development/Sources
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.897060312 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.897060312 +0100
@@ -24,10 +24,10 @@
 Summary:        Kernel Symbol Versions (modversions)
 License:        GPL-2.0
 Group:          Development/Sources
-Version:        4.15.1
+Version:        4.15.2
 %if %using_buildservice
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

++++++ kernel-syzkaller.spec ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:53.917059588 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:53.917059588 +0100
@@ -18,7 +18,7 @@
 
 
 %define srcversion 4.15
-%define patchversion 4.15.1
+%define patchversion 4.15.2
 %define variant %{nil}
 %define vanilla_only 0
 
@@ -58,9 +58,9 @@
 Summary:        Kernel used for fuzzing by syzkaller
 License:        GPL-2.0
 Group:          System/Kernel
-Version:        4.15.1
+Version:        4.15.2
 %if 0%{?is_kotd}
-Release:        <RELEASE>.g9df97e2
+Release:        <RELEASE>.gb34965a
 %else
 Release:        0
 %endif

kernel-vanilla.spec: same change
kernel-zfcpdump.spec: same change
++++++ patches.kernel.org.tar.bz2 ++++++
++++ 7050 lines of diff (skipped)

++++++ patches.suse.tar.bz2 ++++++
++++ 4185 lines of diff (skipped)

++++++ series.conf ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:54.857025561 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:54.861025417 +0100
@@ -83,6 +83,67 @@
        
patches.kernel.org/4.15.1-054-Input-synaptics-rmi4-do-not-delete-interrupt-m.patch
        
patches.kernel.org/4.15.1-055-x86-efi-Clarify-that-reset-attack-mitigation-n.patch
        patches.kernel.org/4.15.1-056-Linux-4.15.1.patch
+       
patches.kernel.org/4.15.2-001-KVM-x86-Make-indirect-calls-in-emulator-specul.patch
+       
patches.kernel.org/4.15.2-002-KVM-VMX-Make-indirect-call-speculation-safe.patch
+       
patches.kernel.org/4.15.2-003-module-retpoline-Warn-about-missing-retpoline-.patch
+       
patches.kernel.org/4.15.2-004-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch
+       
patches.kernel.org/4.15.2-005-x86-cpufeatures-Add-Intel-feature-bits-for-Spe.patch
+       
patches.kernel.org/4.15.2-006-x86-cpufeatures-Add-AMD-feature-bits-for-Specu.patch
+       
patches.kernel.org/4.15.2-007-x86-msr-Add-definitions-for-new-speculation-co.patch
+       
patches.kernel.org/4.15.2-008-x86-pti-Do-not-enable-PTI-on-CPUs-which-are-no.patch
+       
patches.kernel.org/4.15.2-009-x86-cpufeature-Blacklist-SPEC_CTRL-PRED_CMD-on.patch
+       
patches.kernel.org/4.15.2-010-x86-speculation-Add-basic-IBPB-Indirect-Branch.patch
+       
patches.kernel.org/4.15.2-011-x86-alternative-Print-unadorned-pointers.patch
+       patches.kernel.org/4.15.2-012-x86-nospec-Fix-header-guards-names.patch
+       
patches.kernel.org/4.15.2-013-x86-bugs-Drop-one-mitigation-from-dmesg.patch
+       
patches.kernel.org/4.15.2-014-x86-cpu-bugs-Make-retpoline-module-warning-con.patch
+       
patches.kernel.org/4.15.2-015-x86-cpufeatures-Clean-up-Spectre-v2-related-CP.patch
+       
patches.kernel.org/4.15.2-016-x86-retpoline-Simplify-vmexit_fill_RSB.patch
+       
patches.kernel.org/4.15.2-017-x86-speculation-Simplify-indirect_branch_predi.patch
+       
patches.kernel.org/4.15.2-018-auxdisplay-img-ascii-lcd-add-missing-MODULE_DE.patch
+       patches.kernel.org/4.15.2-019-iio-adc-accel-Fix-up-module-licenses.patch
+       
patches.kernel.org/4.15.2-020-pinctrl-pxa-pxa2xx-add-missing-MODULE_DESCRIPT.patch
+       
patches.kernel.org/4.15.2-021-ASoC-pcm512x-add-missing-MODULE_DESCRIPTION-AU.patch
+       patches.kernel.org/4.15.2-022-KVM-nVMX-Eliminate-vmcs02-pool.patch
+       patches.kernel.org/4.15.2-023-KVM-VMX-introduce-alloc_loaded_vmcs.patch
+       
patches.kernel.org/4.15.2-024-objtool-Improve-retpoline-alternative-handling.patch
+       
patches.kernel.org/4.15.2-025-objtool-Add-support-for-alternatives-at-the-en.patch
+       
patches.kernel.org/4.15.2-026-objtool-Warn-on-stripped-section-symbol.patch
+       
patches.kernel.org/4.15.2-027-x86-mm-Fix-overlap-of-i386-CPU_ENTRY_AREA-with.patch
+       
patches.kernel.org/4.15.2-028-x86-spectre-Check-CONFIG_RETPOLINE-in-command-.patch
+       
patches.kernel.org/4.15.2-029-x86-entry-64-Remove-the-SYSCALL64-fast-path.patch
+       
patches.kernel.org/4.15.2-030-x86-entry-64-Push-extra-regs-right-away.patch
+       
patches.kernel.org/4.15.2-031-x86-asm-Move-status-from-thread_struct-to-thre.patch
+       
patches.kernel.org/4.15.2-032-Documentation-Document-array_index_nospec.patch
+       
patches.kernel.org/4.15.2-033-array_index_nospec-Sanitize-speculative-array-.patch
+       
patches.kernel.org/4.15.2-034-x86-Implement-array_index_mask_nospec.patch
+       patches.kernel.org/4.15.2-035-x86-Introduce-barrier_nospec.patch
+       
patches.kernel.org/4.15.2-036-x86-Introduce-__uaccess_begin_nospec-and-uacce.patch
+       
patches.kernel.org/4.15.2-037-x86-usercopy-Replace-open-coded-stac-clac-with.patch
+       
patches.kernel.org/4.15.2-038-x86-uaccess-Use-__uaccess_begin_nospec-and-uac.patch
+       
patches.kernel.org/4.15.2-039-x86-get_user-Use-pointer-masking-to-limit-spec.patch
+       
patches.kernel.org/4.15.2-040-x86-syscall-Sanitize-syscall-table-de-referenc.patch
+       
patches.kernel.org/4.15.2-041-vfs-fdtable-Prevent-bounds-check-bypass-via-sp.patch
+       
patches.kernel.org/4.15.2-042-nl80211-Sanitize-array-index-in-parse_txq_para.patch
+       
patches.kernel.org/4.15.2-043-x86-spectre-Report-get_user-mitigation-for-spe.patch
+       
patches.kernel.org/4.15.2-044-x86-spectre-Fix-spelling-mistake-vunerable-vul.patch
+       
patches.kernel.org/4.15.2-045-x86-cpuid-Fix-up-virtual-IBRS-IBPB-STIBP-featu.patch
+       
patches.kernel.org/4.15.2-046-x86-speculation-Use-Indirect-Branch-Prediction.patch
+       
patches.kernel.org/4.15.2-047-x86-paravirt-Remove-noreplace-paravirt-cmdline.patch
+       patches.kernel.org/4.15.2-048-KVM-VMX-make-MSR-bitmaps-per-VCPU.patch
+       patches.kernel.org/4.15.2-049-x86-kvm-Update-spectre-v1-mitigation.patch
+       
patches.kernel.org/4.15.2-050-x86-retpoline-Avoid-retpolines-for-built-in-__.patch
+       
patches.kernel.org/4.15.2-051-x86-spectre-Simplify-spectre_v2-command-line-p.patch
+       
patches.kernel.org/4.15.2-052-x86-pti-Mark-constant-arrays-as-__initconst.patch
+       
patches.kernel.org/4.15.2-053-x86-speculation-Fix-typo-IBRS_ATT-which-should.patch
+       
patches.kernel.org/4.15.2-054-KVM-x86-Update-the-reverse_cpuid-list-to-inclu.patch
+       patches.kernel.org/4.15.2-055-KVM-x86-Add-IBPB-support.patch
+       
patches.kernel.org/4.15.2-056-KVM-VMX-Emulate-MSR_IA32_ARCH_CAPABILITIES.patch
+       
patches.kernel.org/4.15.2-057-KVM-VMX-Allow-direct-access-to-MSR_IA32_SPEC_C.patch
+       
patches.kernel.org/4.15.2-058-KVM-SVM-Allow-direct-access-to-MSR_IA32_SPEC_C.patch
+       
patches.kernel.org/4.15.2-059-serial-core-mark-port-as-initialized-after-suc.patch
+       
patches.kernel.org/4.15.2-060-fpga-region-release-of_parse_phandle-nodes-aft.patch
+       patches.kernel.org/4.15.2-061-Linux-4.15.2.patch
 
        ########################################################
        # Build fixes that apply to the vanilla kernel too.
@@ -108,6 +169,7 @@
        ########################################################
        # kbuild/module infrastructure fixes
        ########################################################
+
        patches.suse/rpm-kernel-config
        patches.suse/supported-flag
        patches.suse/supported-flag-underscores
@@ -129,36 +191,11 @@
        ########################################################
        patches.suse/setuid-dumpable-wrongdir
 
-       patches.suse/0001-Documentation-document-array_ptr.patch
-       
patches.suse/0002-asm-nospec-array_ptr-sanitize-speculative-array-de-r.patch
-       patches.suse/0003-x86-implement-array_ptr_mask.patch
-       patches.suse/0004-x86-introduce-__uaccess_begin_nospec-and-ifence.patch
-       patches.suse/0005-x86-__get_user-use-__uaccess_begin_nospec.patch
-       
patches.suse/0006-x86-get_user-use-pointer-masking-to-limit-speculatio.patch
-       
patches.suse/0007-x86-narrow-out-of-bounds-syscalls-to-sys_read-under-.patch
-       
patches.suse/0008-vfs-fdtable-prevent-bounds-check-bypass-via-speculat.patch
-       patches.suse/0009-kvm-x86-update-spectre-v1-mitigation.patch
-       patches.suse/0010-nl80211-sanitize-array-index-in-parse_txq_params.patch
-
-       patches.suse/0001-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch
-       
patches.suse/0002-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch
-       
patches.suse/0003-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch
-       
patches.suse/0004-x86-msr-Add-definitions-for-new-speculation-control-.patch
-       
patches.suse/0005-x86-pti-Do-not-enable-PTI-on-processors-which-are-no.patch
-       
patches.suse/0006-x86-cpufeature-Blacklist-SPEC_CTRL-on-early-Spectre-.patch
-       
patches.suse/0007-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch
-       patches.suse/0008-x86-kvm-Add-IBPB-support.patch
-       
patches.suse/0009-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch
-       
patches.suse/0010-x86-mm-Only-flush-indirect-branches-when-switching-i.patch
-       
patches.suse/0011-x86-speculation-Add-basic-IBRS-support-infrastructur.patch
-       
patches.suse/0012-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch
-       patches.suse/0013-x86-Simplify-spectre_v2-command-line-parsing.patch
-       
patches.suse/0014-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch
-       
patches.suse/0015-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch
-       patches.suse/0016-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch
-       
patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I.patch
-       
patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I-fix.patch
-       patches.suse/0018-x86-vmx-Direct-access-to-MSR_IA32_SPEC_CTRL.patch
+       
patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch
+       
patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch
+       
patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch
+       
patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch
+       patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch
 
        ########################################################
        # Architecture-specific patches. These used to be all
@@ -410,6 +447,8 @@
 
        patches.suse/megaraid-mbox-fix-SG_IO
 
+       patches.suse/scsi-aacraid-remove-redundant-setting-of-variable-c.patch
+
        ########################################################
        # DRM/Video
        ########################################################

++++++ source-timestamp ++++++
--- /var/tmp/diff_new_pack.7H0r22/_old  2018-02-10 17:55:54.901023969 +0100
+++ /var/tmp/diff_new_pack.7H0r22/_new  2018-02-10 17:55:54.901023969 +0100
@@ -1,3 +1,3 @@
-2018-02-04 20:20:08 +0100
-GIT Revision: 9df97e2cc9de99f99fbca51698b158ef5853f08d
+2018-02-08 07:53:26 +0100
+GIT Revision: b34965ab958833296ac68575af31dd314a58cd7b
 GIT Branch: stable


Reply via email to