Hello community,
here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2016-02-17 10:23:15
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kernel-source (Old)
and /work/SRC/openSUSE:Factory/.kernel-source.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source"
Changes:
--------
--- /work/SRC/openSUSE:Factory/kernel-source/kernel-debug.changes 2016-02-01 19:55:22.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.kernel-source.new/kernel-debug.changes 2016-02-17 10:23:16.000000000 +0100
@@ -1,0 +2,72 @@
+Mon Feb 15 12:03:27 CET 2016 - tiwai@suse.de
+
+- ALSA: usb-audio: avoid freeing umidi object twice
+ (CVE-2016-2384,bsc#966693).
+- commit 6398c2d
+
+-------------------------------------------------------------------
+Thu Feb 11 09:46:23 CET 2016 - jslaby@suse.cz
+
+- rpm/kernel-obs-build.spec.in: do not limit TasksMax
+ We run with build as PID 1 (boo#965564).
+- commit 39b708b
+
+-------------------------------------------------------------------
+Wed Feb 10 10:19:40 CET 2016 - mmarek@suse.com
+
+- rpm/kernel-binary.spec.in: Adapt certificate handling for changes in v4.3
+- commit 589be33
+
+-------------------------------------------------------------------
+Tue Feb 2 17:31:39 CET 2016 - tiwai@suse.de
+
+- Revert "xfs: clear PF_NOFREEZE for xfsaild kthread"
+ (boo#962250).
+- commit ddc5d70
+
+-------------------------------------------------------------------
+Mon Feb 1 23:16:05 CET 2016 - dmueller@suse.com
+
+- Disable CMOS RTC
+ This Motorola compatible RTC doesn't exist on ARMv7, and triggers
+ an non-root triggerable immediate panic on the system when being
+ accessed, so we better don't include it.
+- commit 2b16688
+
+-------------------------------------------------------------------
+Mon Feb 1 16:44:17 CET 2016 - jslaby@suse.cz
+
+- drm/i915: Pin the ifbdev for the info->system_base GGTT mmapping
+ (bnc#962866).
+- drm/i915: Fix failure paths around initial fbdev allocation
+ (bnc#962866).
+- drm/i915: Fix double unref in intelfb_alloc failure path
+ (bnc#962866).
+- commit 283b562
+
+-------------------------------------------------------------------
+Mon Feb 1 09:26:44 CET 2016 - jslaby@suse.cz
+
+- Refresh
+ patches.fixes/0001-tty-Fix-unsafe-ldisc-reference-via-ioctl-TIOCGETD.patch.
+- Refresh
+ patches.fixes/0002-n_tty-Fix-unsafe-reference-to-other-ldisc.patch.
+ Upstream status.
+- commit ce7756a
+
+-------------------------------------------------------------------
+Mon Feb 1 09:15:22 CET 2016 - jslaby@suse.cz
+
+- Linux 4.4.1 (boo#960710 bnc#962075 CVE-2016-0728).
+- Delete
+ patches.drivers/ALSA-hda-Flush-the-pending-probe-work-at-remove.
+- Delete patches.fixes/keys-fix-leak.patch.
+- commit b969f5d
+
+-------------------------------------------------------------------
+Sun Jan 31 22:31:35 CET 2016 - tiwai@suse.de
+
+- sd: Optimal I/O size is in bytes, not sectors (boo#961263).
+- commit 2198765
+
+-------------------------------------------------------------------
@@ -18,0 +91,15 @@
+
+-------------------------------------------------------------------
+Tue Jan 26 12:46:26 CET 2016 - jslaby@suse.cz
+
+- n_tty: Fix unsafe reference to "other" ldisc (bnc#961500
+ CVE-2016-0723).
+- tty: Fix unsafe ldisc reference via ioctl(TIOCGETD) (bnc#961500
+ CVE-2016-0723).
+- commit 4ca6fa4
+
+-------------------------------------------------------------------
+Tue Jan 26 10:39:45 CET 2016 - mmarek@suse.com
+
+- rpm/kernel-spec-macros: Do not modify the release string in PTFs (bsc#963449)
+- commit dc2b096
kernel-default.changes: same change
kernel-docs.changes: same change
kernel-lpae.changes: same change
kernel-obs-build.changes: same change
kernel-obs-qa.changes: same change
kernel-pae.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-vanilla.changes: same change
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ kernel-debug.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:20.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:20.000000000 +0100
@@ -20,7 +20,7 @@
# needssslcertforbuild
%define srcversion 4.4
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%define vanilla_only 0
@@ -46,7 +46,7 @@
# Define some CONFIG variables as rpm macros as well. (rpm cannot handle
# defining them all at once.)
-%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
+%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_MODULE_SIG_KEY CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
%{expand:%(eval "$(test -n "%cpu_arch_flavor" && tar -xjf %_sourcedir/config.tar.bz2 --to-stdout config/%cpu_arch_flavor)"; for config in %config_vars; do echo "%%global $config ${!config:-n}"; done)}
%define split_base (%CONFIG_SPLIT_PACKAGE == "y")
%define split_extra (%CONFIG_SPLIT_PACKAGE == "y" && %CONFIG_SUSE_KERNEL_SUPPORTED == "y")
@@ -61,9 +61,9 @@
Summary: A Debug Version of the Kernel
License: GPL-2.0
Group: System/Kernel
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
@@ -481,31 +481,27 @@
%_sourcedir/modversions --unpack . < $_
fi
-# copy optional module signing files:
-# *.x509, *.crt
-# - certificates with pubkeys used to verify module and firmware signatures
-# at runtime. *.crt files assumed to be in the PEM format.
-# signing_key.priv
-# - unencrypted private key used to sign modules and firmware during build
-# x509.genkey
-# - openssl req config to generate a new signing_key.{x509,priv} pair for the
-# build
-for f in %_sourcedir/*.x509 %_sourcedir/{signing_key.priv,x509.genkey}; do
- if test -e "$f"; then
- cp "$f" .
- fi
-done
+# copy module signing certificate(s)
+found_sigkey=false
for f in %_sourcedir/*.crt; do
if ! test -e "$f"; then
continue
fi
- out=${f##*/}
- out=${out%.crt}.x509
- openssl x509 -inform PEM -in "$f" -outform DER -out "$out"
+ if test "${f##*/}" = %CONFIG_MODULE_SIG_KEY; then
+ found_sigkey=true
+ cp "$f" .
+ else
+ cat "$f" >>keyring.crt
+ fi
done
-# Convince kernel/Makefile not to generate a new keypair
-touch x509.genkey
-touch signing_key.x509
+if ! $found_sigkey; then
+ echo "warning: %CONFIG_MODULE_SIG_KEY not found"
+ # Let certs/Makefile generate a keypair
+ ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "certs/signing_key.pem"
+fi
+if test -s keyring.crt; then
+ ../scripts/config --set-str SYSTEM_TRUSTED_KEYS_FILENAME "keyring.crt"
+fi
MAKE_ARGS="$MAKE_ARGS %{?_smp_mflags}"
kernel-default.spec: same change
++++++ kernel-docs.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:20.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:20.000000000 +0100
@@ -16,7 +16,7 @@
#
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%include %_sourcedir/kernel-spec-macros
@@ -27,9 +27,9 @@
Summary: Kernel Documentation (man pages)
License: GPL-2.0
Group: Documentation/Man
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
++++++ kernel-lpae.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:20.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:20.000000000 +0100
@@ -20,7 +20,7 @@
# needssslcertforbuild
%define srcversion 4.4
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%define vanilla_only 0
@@ -46,7 +46,7 @@
# Define some CONFIG variables as rpm macros as well. (rpm cannot handle
# defining them all at once.)
-%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
+%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_MODULE_SIG_KEY CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
%{expand:%(eval "$(test -n "%cpu_arch_flavor" && tar -xjf %_sourcedir/config.tar.bz2 --to-stdout config/%cpu_arch_flavor)"; for config in %config_vars; do echo "%%global $config ${!config:-n}"; done)}
%define split_base (%CONFIG_SPLIT_PACKAGE == "y")
%define split_extra (%CONFIG_SPLIT_PACKAGE == "y" && %CONFIG_SUSE_KERNEL_SUPPORTED == "y")
@@ -61,9 +61,9 @@
Summary: Kernel for LPAE enabled systems
License: GPL-2.0
Group: System/Kernel
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
@@ -475,31 +475,27 @@
%_sourcedir/modversions --unpack . < $_
fi
-# copy optional module signing files:
-# *.x509, *.crt
-# - certificates with pubkeys used to verify module and firmware signatures
-# at runtime. *.crt files assumed to be in the PEM format.
-# signing_key.priv
-# - unencrypted private key used to sign modules and firmware during build
-# x509.genkey
-# - openssl req config to generate a new signing_key.{x509,priv} pair for the
-# build
-for f in %_sourcedir/*.x509 %_sourcedir/{signing_key.priv,x509.genkey}; do
- if test -e "$f"; then
- cp "$f" .
- fi
-done
+# copy module signing certificate(s)
+found_sigkey=false
for f in %_sourcedir/*.crt; do
if ! test -e "$f"; then
continue
fi
- out=${f##*/}
- out=${out%.crt}.x509
- openssl x509 -inform PEM -in "$f" -outform DER -out "$out"
+ if test "${f##*/}" = %CONFIG_MODULE_SIG_KEY; then
+ found_sigkey=true
+ cp "$f" .
+ else
+ cat "$f" >>keyring.crt
+ fi
done
-# Convince kernel/Makefile not to generate a new keypair
-touch x509.genkey
-touch signing_key.x509
+if ! $found_sigkey; then
+ echo "warning: %CONFIG_MODULE_SIG_KEY not found"
+ # Let certs/Makefile generate a keypair
+ ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "certs/signing_key.pem"
+fi
+if test -s keyring.crt; then
+ ../scripts/config --set-str SYSTEM_TRUSTED_KEYS_FILENAME "keyring.crt"
+fi
MAKE_ARGS="$MAKE_ARGS %{?_smp_mflags}"
++++++ kernel-obs-build.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:20.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:20.000000000 +0100
@@ -19,7 +19,7 @@
#!BuildIgnore: post-build-checks
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%include %_sourcedir/kernel-spec-macros
@@ -51,9 +51,9 @@
Summary: package kernel and initrd for OBS VM builds
License: GPL-2.0
Group: SLES
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
@@ -96,6 +96,10 @@
modprobe binfmt_misc
EOF
chmod a+rx /usr/lib/dracut/modules.d/80obs/setup_obs.sh
+# Configure systemd in kernel-obs-build's initrd not to limit TasksMax,
+# we run with build as PID 1 (boo#965564)
+echo "DefaultTasksMax=infinity" >> /etc/systemd/system.conf
+echo "DefaultTasksAccounting=no" >> /etc/systemd/system.conf
# a longer list to have them also available for qemu cross builds where x86_64 kernel runs in eg. arm env.
# this list of modules where available on build workers of build.opensuse.org, so we stay compatible.
++++++ kernel-obs-qa.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:20.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:20.000000000 +0100
@@ -17,7 +17,7 @@
# needsrootforbuild
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%include %_sourcedir/kernel-spec-macros
@@ -36,9 +36,9 @@
Summary: Basic QA tests for the kernel
License: GPL-2.0
Group: SLES
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
++++++ kernel-pae.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:20.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:20.000000000 +0100
@@ -20,7 +20,7 @@
# needssslcertforbuild
%define srcversion 4.4
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%define vanilla_only 0
@@ -46,7 +46,7 @@
# Define some CONFIG variables as rpm macros as well. (rpm cannot handle
# defining them all at once.)
-%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
+%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_MODULE_SIG_KEY CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
%{expand:%(eval "$(test -n "%cpu_arch_flavor" && tar -xjf %_sourcedir/config.tar.bz2 --to-stdout config/%cpu_arch_flavor)"; for config in %config_vars; do echo "%%global $config ${!config:-n}"; done)}
%define split_base (%CONFIG_SPLIT_PACKAGE == "y")
%define split_extra (%CONFIG_SPLIT_PACKAGE == "y" && %CONFIG_SUSE_KERNEL_SUPPORTED == "y")
@@ -61,9 +61,9 @@
Summary: Kernel with PAE Support
License: GPL-2.0
Group: System/Kernel
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
@@ -501,31 +501,27 @@
%_sourcedir/modversions --unpack . < $_
fi
-# copy optional module signing files:
-# *.x509, *.crt
-# - certificates with pubkeys used to verify module and firmware signatures
-# at runtime. *.crt files assumed to be in the PEM format.
-# signing_key.priv
-# - unencrypted private key used to sign modules and firmware during build
-# x509.genkey
-# - openssl req config to generate a new signing_key.{x509,priv} pair for the
-# build
-for f in %_sourcedir/*.x509 %_sourcedir/{signing_key.priv,x509.genkey}; do
- if test -e "$f"; then
- cp "$f" .
- fi
-done
+# copy module signing certificate(s)
+found_sigkey=false
for f in %_sourcedir/*.crt; do
if ! test -e "$f"; then
continue
fi
- out=${f##*/}
- out=${out%.crt}.x509
- openssl x509 -inform PEM -in "$f" -outform DER -out "$out"
+ if test "${f##*/}" = %CONFIG_MODULE_SIG_KEY; then
+ found_sigkey=true
+ cp "$f" .
+ else
+ cat "$f" >>keyring.crt
+ fi
done
-# Convince kernel/Makefile not to generate a new keypair
-touch x509.genkey
-touch signing_key.x509
+if ! $found_sigkey; then
+ echo "warning: %CONFIG_MODULE_SIG_KEY not found"
+ # Let certs/Makefile generate a keypair
+ ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "certs/signing_key.pem"
+fi
+if test -s keyring.crt; then
+ ../scripts/config --set-str SYSTEM_TRUSTED_KEYS_FILENAME "keyring.crt"
+fi
MAKE_ARGS="$MAKE_ARGS %{?_smp_mflags}"
++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:21.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:21.000000000 +0100
@@ -18,7 +18,7 @@
%define srcversion 4.4
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%define vanilla_only 0
@@ -30,9 +30,9 @@
Summary: The Linux Kernel Sources
License: GPL-2.0
Group: Development/Sources
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:21.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:21.000000000 +0100
@@ -24,10 +24,10 @@
Summary: Kernel Symbol Versions (modversions)
License: GPL-2.0
Group: Development/Sources
-Version: 4.4.0
+Version: 4.4.1
%if %using_buildservice
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
++++++ kernel-vanilla.spec ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:21.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:21.000000000 +0100
@@ -20,7 +20,7 @@
# needssslcertforbuild
%define srcversion 4.4
-%define patchversion 4.4.0
+%define patchversion 4.4.1
%define variant %{nil}
%define vanilla_only 0
@@ -46,7 +46,7 @@
# Define some CONFIG variables as rpm macros as well. (rpm cannot handle
# defining them all at once.)
-%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
+%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_MODULE_SIG_KEY CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
%{expand:%(eval "$(test -n "%cpu_arch_flavor" && tar -xjf %_sourcedir/config.tar.bz2 --to-stdout config/%cpu_arch_flavor)"; for config in %config_vars; do echo "%%global $config ${!config:-n}"; done)}
%define split_base (%CONFIG_SPLIT_PACKAGE == "y")
%define split_extra (%CONFIG_SPLIT_PACKAGE == "y" && %CONFIG_SUSE_KERNEL_SUPPORTED == "y")
@@ -61,9 +61,9 @@
Summary: The Standard Kernel - without any SUSE patches
License: GPL-2.0
Group: System/Kernel
-Version: 4.4.0
+Version: 4.4.1
%if 0%{?is_kotd}
-Release: <RELEASE>.g9f68b90
+Release: <RELEASE>.g6398c2d
%else
Release: 0
%endif
@@ -474,31 +474,27 @@
%_sourcedir/modversions --unpack . < $_
fi
-# copy optional module signing files:
-# *.x509, *.crt
-# - certificates with pubkeys used to verify module and firmware signatures
-# at runtime. *.crt files assumed to be in the PEM format.
-# signing_key.priv
-# - unencrypted private key used to sign modules and firmware during build
-# x509.genkey
-# - openssl req config to generate a new signing_key.{x509,priv} pair for the
-# build
-for f in %_sourcedir/*.x509 %_sourcedir/{signing_key.priv,x509.genkey}; do
- if test -e "$f"; then
- cp "$f" .
- fi
-done
+# copy module signing certificate(s)
+found_sigkey=false
for f in %_sourcedir/*.crt; do
if ! test -e "$f"; then
continue
fi
- out=${f##*/}
- out=${out%.crt}.x509
- openssl x509 -inform PEM -in "$f" -outform DER -out "$out"
+ if test "${f##*/}" = %CONFIG_MODULE_SIG_KEY; then
+ found_sigkey=true
+ cp "$f" .
+ else
+ cat "$f" >>keyring.crt
+ fi
done
-# Convince kernel/Makefile not to generate a new keypair
-touch x509.genkey
-touch signing_key.x509
+if ! $found_sigkey; then
+ echo "warning: %CONFIG_MODULE_SIG_KEY not found"
+ # Let certs/Makefile generate a keypair
+ ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "certs/signing_key.pem"
+fi
+if test -s keyring.crt; then
+ ../scripts/config --set-str SYSTEM_TRUSTED_KEYS_FILENAME "keyring.crt"
+fi
MAKE_ARGS="$MAKE_ARGS %{?_smp_mflags}"
++++++ config.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/armv7hl/default new/config/armv7hl/default
--- old/config/armv7hl/default 2016-01-27 18:30:19.000000000 +0100
+++ new/config/armv7hl/default 2016-02-04 18:43:46.000000000 +0100
@@ -1,6 +1,6 @@
#
# Automatically generated file; DO NOT EDIT.
-# Linux/arm 4.4.0 Kernel Configuration
+# Linux/arm 4.4.1 Kernel Configuration
#
CONFIG_ARM=y
CONFIG_ARM_HAS_SG_CHAIN=y
@@ -3618,7 +3618,6 @@
CONFIG_HW_RANDOM_TPM=m
CONFIG_HW_RANDOM_MSM=m
CONFIG_HW_RANDOM_ST=m
-CONFIG_NVRAM=y
CONFIG_R3964=m
# CONFIG_APPLICOM is not set
CONFIG_RAW_DRIVER=m
@@ -6628,7 +6627,7 @@
#
# Platform RTC drivers
#
-CONFIG_RTC_DRV_CMOS=y
+# CONFIG_RTC_DRV_CMOS is not set
# CONFIG_RTC_DRV_DS1286 is not set
# CONFIG_RTC_DRV_DS1511 is not set
# CONFIG_RTC_DRV_DS1553 is not set
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/armv7hl/lpae new/config/armv7hl/lpae
--- old/config/armv7hl/lpae 2016-01-27 18:30:19.000000000 +0100
+++ new/config/armv7hl/lpae 2016-02-04 18:43:46.000000000 +0100
@@ -1,6 +1,6 @@
#
# Automatically generated file; DO NOT EDIT.
-# Linux/arm 4.4.0 Kernel Configuration
+# Linux/arm 4.4.1 Kernel Configuration
#
CONFIG_ARM=y
CONFIG_ARM_HAS_SG_CHAIN=y
@@ -3486,7 +3486,6 @@
CONFIG_HW_RANDOM_EXYNOS=m
CONFIG_HW_RANDOM_TPM=m
CONFIG_HW_RANDOM_MSM=m
-CONFIG_NVRAM=y
CONFIG_R3964=m
# CONFIG_APPLICOM is not set
CONFIG_RAW_DRIVER=m
@@ -6300,7 +6299,7 @@
#
# Platform RTC drivers
#
-CONFIG_RTC_DRV_CMOS=y
+# CONFIG_RTC_DRV_CMOS is not set
# CONFIG_RTC_DRV_DS1286 is not set
# CONFIG_RTC_DRV_DS1511 is not set
# CONFIG_RTC_DRV_DS1553 is not set
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/armv7hl/vanilla new/config/armv7hl/vanilla
--- old/config/armv7hl/vanilla 2016-01-27 18:30:19.000000000 +0100
+++ new/config/armv7hl/vanilla 2016-02-04 18:43:46.000000000 +0100
@@ -3614,7 +3614,6 @@
CONFIG_HW_RANDOM_TPM=m
CONFIG_HW_RANDOM_MSM=m
CONFIG_HW_RANDOM_ST=m
-CONFIG_NVRAM=y
CONFIG_R3964=m
# CONFIG_APPLICOM is not set
CONFIG_RAW_DRIVER=m
@@ -6622,7 +6621,7 @@
#
# Platform RTC drivers
#
-CONFIG_RTC_DRV_CMOS=y
+# CONFIG_RTC_DRV_CMOS is not set
# CONFIG_RTC_DRV_DS1286 is not set
# CONFIG_RTC_DRV_DS1511 is not set
# CONFIG_RTC_DRV_DS1553 is not set
++++++ kernel-binary.spec.in ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:21.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:21.000000000 +0100
@@ -46,7 +46,7 @@
# Define some CONFIG variables as rpm macros as well. (rpm cannot handle
# defining them all at once.)
-%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
+%define config_vars CONFIG_MODULES CONFIG_MODULE_SIG CONFIG_MODULE_SIG_KEY CONFIG_KMSG_IDS CONFIG_SPLIT_PACKAGE CONFIG_SUSE_KERNEL_SUPPORTED CONFIG_EFI_STUB
%{expand:%(eval "$(test -n "%cpu_arch_flavor" && tar -xjf %_sourcedir/config.tar.bz2 --to-stdout config/%cpu_arch_flavor)"; for config in %config_vars; do echo "%%global $config ${!config:-n}"; done)}
%define split_base (%CONFIG_SPLIT_PACKAGE == "y")
%define split_extra (%CONFIG_SPLIT_PACKAGE == "y" && %CONFIG_SUSE_KERNEL_SUPPORTED == "y")
@@ -350,31 +350,27 @@
%_sourcedir/modversions --unpack . < $_
fi
-# copy optional module signing files:
-# *.x509, *.crt
-# - certificates with pubkeys used to verify module and firmware signatures
-# at runtime. *.crt files assumed to be in the PEM format.
-# signing_key.priv
-# - unencrypted private key used to sign modules and firmware during build
-# x509.genkey
-# - openssl req config to generate a new signing_key.{x509,priv} pair for the
-# build
-for f in %_sourcedir/*.x509 %_sourcedir/{signing_key.priv,x509.genkey}; do
- if test -e "$f"; then
- cp "$f" .
- fi
-done
+# copy module signing certificate(s)
+found_sigkey=false
for f in %_sourcedir/*.crt; do
if ! test -e "$f"; then
continue
fi
- out=${f##*/}
- out=${out%.crt}.x509
- openssl x509 -inform PEM -in "$f" -outform DER -out "$out"
+ if test "${f##*/}" = %CONFIG_MODULE_SIG_KEY; then
+ found_sigkey=true
+ cp "$f" .
+ else
+ cat "$f" >>keyring.crt
+ fi
done
-# Convince kernel/Makefile not to generate a new keypair
-touch x509.genkey
-touch signing_key.x509
+if ! $found_sigkey; then
+ echo "warning: %CONFIG_MODULE_SIG_KEY not found"
+ # Let certs/Makefile generate a keypair
+ ../scripts/config --set-str CONFIG_MODULE_SIG_KEY "certs/signing_key.pem"
+fi
+if test -s keyring.crt; then
+ ../scripts/config --set-str SYSTEM_TRUSTED_KEYS_FILENAME "keyring.crt"
+fi
MAKE_ARGS="$MAKE_ARGS %{?_smp_mflags}"
++++++ kernel-obs-build.spec.in ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:21.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:21.000000000 +0100
@@ -96,6 +96,10 @@
modprobe binfmt_misc
EOF
chmod a+rx /usr/lib/dracut/modules.d/80obs/setup_obs.sh
+# Configure systemd in kernel-obs-build's initrd not to limit TasksMax,
+# we run with build as PID 1 (boo#965564)
+echo "DefaultTasksMax=infinity" >> /etc/systemd/system.conf
+echo "DefaultTasksAccounting=no" >> /etc/systemd/system.conf
# a longer list to have them also available for qemu cross builds where x86_64 kernel runs in eg. arm env.
# this list of modules where available on build workers of build.opensuse.org, so we stay compatible.
++++++ kernel-spec-macros ++++++
--- /var/tmp/diff_new_pack.zz1aLr/_old 2016-02-17 10:23:21.000000000 +0100
+++ /var/tmp/diff_new_pack.zz1aLr/_new 2016-02-17 10:23:21.000000000 +0100
@@ -10,9 +10,11 @@
# generated by the build service. If the release string has a non-digit
# suffix, we keep that suffix and strip the rightmost digit component.
# This is used in KOTD builds: 2.1.g1234567 -> 2.g1234567
+# In PTF projects, there is no rebuild counter, so we leave the release
+# string intact.
%define source_rel %release
%define obsolete_rebuilds() %nil
-%if %using_buildservice
+%if %using_buildservice && ! 0%{?is_ptf}
%define source_rel %(echo %release | sed -r 's/\\.[0-9]+($|\\.[^.]*[^.0-9][^.]*$)/\\1/')
# If the rebuild counter is > 1, obsolete all previous rebuilds (boo#867595)
%define obsolete_rebuilds() %( %{verbose:set -x} \
++++++ patches.drivers.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.drivers/ALSA-hda-Flush-the-pending-probe-work-at-remove new/patches.drivers/ALSA-hda-Flush-the-pending-probe-work-at-remove
--- old/patches.drivers/ALSA-hda-Flush-the-pending-probe-work-at-remove 2016-01-20 17:43:09.000000000 +0100
+++ new/patches.drivers/ALSA-hda-Flush-the-pending-probe-work-at-remove 1970-01-01 01:00:00.000000000 +0100
@@ -1,46 +0,0 @@
-From 991f86d7ae4e1f8c15806e62f97af519e3cdd860 Mon Sep 17 00:00:00 2001
-From: Takashi Iwai