Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2018-02-10 17:55:43 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "kernel-source" Sat Feb 10 17:55:43 2018 rev:406 rq:574110 version:4.15.2 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2018-02-06 16:45:51.893303159 +0100 +++ /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes 2018-02-10 17:55:44.565398118 +0100 @@ -1,0 +2,160 @@ +Thu Feb 8 07:52:04 CET 2018 - jslaby@suse.cz + +- Linux 4.15.2 (bnc#1012628). +- KVM: x86: Make indirect calls in emulator speculation safe + (bnc#1012628). +- KVM: VMX: Make indirect call speculation safe (bnc#1012628). +- x86/alternative: Print unadorned pointers (bnc#1012628). +- auxdisplay: img-ascii-lcd: add missing + MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012628). +- iio: adc/accel: Fix up module licenses (bnc#1012628). +- pinctrl: pxa: pxa2xx: add missing + MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012628). +- ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE + (bnc#1012628). +- KVM: nVMX: Eliminate vmcs02 pool (bnc#1012628). +- KVM: VMX: introduce alloc_loaded_vmcs (bnc#1012628). +- objtool: Improve retpoline alternative handling (bnc#1012628). +- objtool: Add support for alternatives at the end of a section + (bnc#1012628). +- objtool: Warn on stripped section symbol (bnc#1012628). +- x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP + (bnc#1012628). +- x86/entry/64: Remove the SYSCALL64 fast path (bnc#1012628). +- x86/entry/64: Push extra regs right away (bnc#1012628). +- x86/asm: Move 'status' from thread_struct to thread_info + (bnc#1012628). +- x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" + (bnc#1012628). +- x86/paravirt: Remove 'noreplace-paravirt' cmdline option + (bnc#1012628). +- KVM: VMX: make MSR bitmaps per-VCPU (bnc#1012628). +- x86/kvm: Update spectre-v1 mitigation (bnc#1012628). +- x86/retpoline: Avoid retpolines for built-in __init functions + (bnc#1012628). +- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL + (bnc#1012628). +- KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX + (bnc#1012628). +- KVM/x86: Add IBPB support (bnc#1012628). +- KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012628). +- KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL + (bnc#1012628). +- KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL + (bnc#1012628). +- serial: core: mark port as initialized after successful IRQ + change (bnc#1012628). +- fpga: region: release of_parse_phandle nodes after use + (bnc#1012628). +- commit 54903ae + +------------------------------------------------------------------- +Mon Feb 5 15:52:19 CET 2018 - jslaby@suse.cz + +- x86/pti: Mark constant arrays as __initconst (bsc#1068032 + CVE-2017-5753). +- x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on + Intel (bsc#1068032 CVE-2017-5753). +- commit 7d4f257 + +------------------------------------------------------------------- +Mon Feb 5 14:15:56 CET 2018 - jslaby@suse.cz + +- x86/speculation: Add basic IBRS support infrastructure + (bsc#1068032 CVE-2017-5753). +- x86/pti: Do not enable PTI on CPUs which are not vulnerable + to Meltdown (bsc#1068032 CVE-2017-5753). +- x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre + v2 microcodes (bsc#1068032 CVE-2017-5753). +- x86/nospec: Fix header guards names (bsc#1068032 CVE-2017-5753). +- x86/bugs: Drop one "mitigation" from dmesg (bsc#1068032 + CVE-2017-5753). +- x86/cpu/bugs: Make retpoline module warning conditional + (bsc#1068032 CVE-2017-5753). +- x86/cpufeatures: Clean up Spectre v2 related CPUID flags + (bsc#1068032 CVE-2017-5753). +- x86/retpoline: Simplify vmexit_fill_RSB() (bsc#1068032 + CVE-2017-5753). +- x86/speculation: Simplify indirect_branch_prediction_barrier() + (bsc#1068032 CVE-2017-5753). +- module/retpoline: Warn about missing retpoline in module + (bsc#1068032 CVE-2017-5753). +- x86/spectre: Check CONFIG_RETPOLINE in command line parser + (bsc#1068032 CVE-2017-5753). +- x86/speculation: Use Indirect Branch Prediction Barrier in + context switch (bsc#1068032 CVE-2017-5753). +- Refresh + patches.suse/0001-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch. +- Refresh + patches.suse/0002-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch. +- Refresh + patches.suse/0003-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch. +- Refresh + patches.suse/0004-x86-msr-Add-definitions-for-new-speculation-control-.patch. +- Refresh + patches.suse/0007-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch. +- Refresh patches.suse/supported-flag. +- Delete + patches.suse/0005-x86-pti-Do-not-enable-PTI-on-processors-which-are-no.patch. +- Delete + patches.suse/0006-x86-cpufeature-Blacklist-SPEC_CTRL-on-early-Spectre-.patch. +- Delete patches.suse/0008-x86-kvm-Add-IBPB-support.patch. +- Delete + patches.suse/0009-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch. +- Delete + patches.suse/0010-x86-mm-Only-flush-indirect-branches-when-switching-i.patch. +- Delete + patches.suse/0011-x86-speculation-Add-basic-IBRS-support-infrastructur.patch. +- Delete + patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I-fix.patch. +- Delete + patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I.patch. +- Delete + patches.suse/0018-x86-vmx-Direct-access-to-MSR_IA32_SPEC_CTRL.patch. + Update to the patches from 4.16-rc1 and the updated IBRS patches from + the dwmw's repo. +- commit cd20d46 + +------------------------------------------------------------------- +Mon Feb 5 10:50:15 CET 2018 - jslaby@suse.cz + +- Documentation: Document array_index_nospec (bsc#1068032 + CVE-2017-5715). +- array_index_nospec: Sanitize speculative array de-references + (bsc#1068032 CVE-2017-5715). +- x86: Implement array_index_mask_nospec (bsc#1068032 + CVE-2017-5715). +- x86: Introduce barrier_nospec (bsc#1068032 CVE-2017-5715). +- x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec + (bsc#1068032 CVE-2017-5715). +- x86/usercopy: Replace open coded stac/clac with + __uaccess_{begin, end} (bsc#1068032 CVE-2017-5715). +- x86/syscall: Sanitize syscall table de-references under + speculation (bsc#1068032 CVE-2017-5715). +- nl80211: Sanitize array index in parse_txq_params (bsc#1068032 + CVE-2017-5715). +- x86/spectre: Report get_user mitigation for spectre_v1 + (bsc#1068032 CVE-2017-5715). +- Delete patches.suse/0001-Documentation-document-array_ptr.patch. +- Delete + patches.suse/0002-asm-nospec-array_ptr-sanitize-speculative-array-de-r.patch. +- Delete patches.suse/0003-x86-implement-array_ptr_mask.patch. +- Delete + patches.suse/0004-x86-introduce-__uaccess_begin_nospec-and-ifence.patch. +- Delete + patches.suse/0007-x86-narrow-out-of-bounds-syscalls-to-sys_read-under-.patch. +- Delete + patches.suse/0009-kvm-x86-update-spectre-v1-mitigation.patch. +- Delete + patches.suse/0010-nl80211-sanitize-array-index-in-parse_txq_params.patch. + Replace by the patches from 4.16-rc1. +- commit 8343cab + +------------------------------------------------------------------- +Mon Feb 5 10:43:09 CET 2018 - jslaby@suse.cz + +- scsi: aacraid: remove redundant setting of variable c + (git-fixes). +- commit 143e25c + +------------------------------------------------------------------- @@ -98 +258,95 @@ -- commit 622b47a +- Linux 4.15.1 (bnc#1012628). +- x86/efi: Clarify that reset attack mitigation needs appropriate + userspace (bnc#1012628). +- Input: synaptics-rmi4 - do not delete interrupt memory too early + (bnc#1012628). +- Input: synaptics-rmi4 - unmask F03 interrupts when port is + opened (bnc#1012628). +- test_firmware: fix missing unlock on error in + config_num_requests_store() (bnc#1012628). +- iio: chemical: ccs811: Fix output of IIO_CONCENTRATION channels + (bnc#1012628). +- iio: adc: stm32: fix scan of multiple channels with DMA + (bnc#1012628). +- spi: imx: do not access registers while clocks disabled + (bnc#1012628). +- serial: imx: Only wakeup via RTSDEN bit if the system has + RTS/CTS (bnc#1012628). +- serial: 8250_dw: Revert "Improve clock rate setting" + (bnc#1012628). +- serial: 8250_uniphier: fix error return code in + uniphier_uart_probe() (bnc#1012628). +- serial: 8250_of: fix return code when probe function fails to + get reset (bnc#1012628). +- mei: me: allow runtime pm for platform with D0i3 (bnc#1012628). +- android: binder: use VM_ALLOC to get vm area (bnc#1012628). +- ANDROID: binder: remove waitqueue when thread exits + (bnc#1012628). +- usb/gadget: Fix "high bandwidth" check in + usb_gadget_ep_match_desc() (bnc#1012628). +- usb: uas: unconditionally bring back host after reset + (bnc#1012628). +- usb: f_fs: Prevent gadget unbind if it is already unbound + (bnc#1012628). +- USB: serial: simple: add Motorola Tetra driver (bnc#1012628). +- usbip: list: don't list devices attached to vhci_hcd ++++ 60 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes ++++ and /work/SRC/openSUSE:Factory/.kernel-source.new/dtb-aarch64.changes dtb-armv6l.changes: same change dtb-armv7l.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-syzkaller.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.633069869 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.633069869 +0100 @@ -17,7 +17,7 @@ %define srcversion 4.15 -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -29,9 +29,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb}) Name: dtb-aarch64 -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.697067551 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.701067407 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.15 -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0 Group: System/Kernel -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif kernel-debug.spec: same change kernel-default.spec: same change ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.765065090 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.765065090 +0100 @@ -17,7 +17,7 @@ %define srcversion 4.15 -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -31,9 +31,9 @@ Summary: Kernel Documentation License: GPL-2.0 Group: Documentation/Man -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif ++++++ kernel-lpae.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.789064221 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.789064221 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.15 -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel for LPAE enabled systems License: GPL-2.0 Group: System/Kernel -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.809063498 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.813063352 +0100 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %define vanilla_only 0 @@ -64,9 +64,9 @@ Summary: package kernel and initrd for OBS VM builds License: GPL-2.0 Group: SLES -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.833062629 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.833062629 +0100 @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -36,9 +36,9 @@ Summary: Basic QA tests for the kernel License: GPL-2.0 Group: SLES -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.853061905 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.857061760 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.15 -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel with PAE Support License: GPL-2.0 Group: System/Kernel -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.873061181 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.877061036 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.15 -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %define vanilla_only 0 @@ -30,9 +30,9 @@ Summary: The Linux Kernel Sources License: GPL-2.0 Group: Development/Sources -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.897060312 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.897060312 +0100 @@ -24,10 +24,10 @@ Summary: Kernel Symbol Versions (modversions) License: GPL-2.0 Group: Development/Sources -Version: 4.15.1 +Version: 4.15.2 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif ++++++ kernel-syzkaller.spec ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:53.917059588 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:53.917059588 +0100 @@ -18,7 +18,7 @@ %define srcversion 4.15 -%define patchversion 4.15.1 +%define patchversion 4.15.2 %define variant %{nil} %define vanilla_only 0 @@ -58,9 +58,9 @@ Summary: Kernel used for fuzzing by syzkaller License: GPL-2.0 Group: System/Kernel -Version: 4.15.1 +Version: 4.15.2 %if 0%{?is_kotd} -Release: <RELEASE>.g9df97e2 +Release: <RELEASE>.gb34965a %else Release: 0 %endif kernel-vanilla.spec: same change kernel-zfcpdump.spec: same change ++++++ patches.kernel.org.tar.bz2 ++++++ ++++ 7050 lines of diff (skipped) ++++++ patches.suse.tar.bz2 ++++++ ++++ 4185 lines of diff (skipped) ++++++ series.conf ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:54.857025561 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:54.861025417 +0100 @@ -83,6 +83,67 @@ patches.kernel.org/4.15.1-054-Input-synaptics-rmi4-do-not-delete-interrupt-m.patch patches.kernel.org/4.15.1-055-x86-efi-Clarify-that-reset-attack-mitigation-n.patch patches.kernel.org/4.15.1-056-Linux-4.15.1.patch + patches.kernel.org/4.15.2-001-KVM-x86-Make-indirect-calls-in-emulator-specul.patch + patches.kernel.org/4.15.2-002-KVM-VMX-Make-indirect-call-speculation-safe.patch + patches.kernel.org/4.15.2-003-module-retpoline-Warn-about-missing-retpoline-.patch + patches.kernel.org/4.15.2-004-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch + patches.kernel.org/4.15.2-005-x86-cpufeatures-Add-Intel-feature-bits-for-Spe.patch + patches.kernel.org/4.15.2-006-x86-cpufeatures-Add-AMD-feature-bits-for-Specu.patch + patches.kernel.org/4.15.2-007-x86-msr-Add-definitions-for-new-speculation-co.patch + patches.kernel.org/4.15.2-008-x86-pti-Do-not-enable-PTI-on-CPUs-which-are-no.patch + patches.kernel.org/4.15.2-009-x86-cpufeature-Blacklist-SPEC_CTRL-PRED_CMD-on.patch + patches.kernel.org/4.15.2-010-x86-speculation-Add-basic-IBPB-Indirect-Branch.patch + patches.kernel.org/4.15.2-011-x86-alternative-Print-unadorned-pointers.patch + patches.kernel.org/4.15.2-012-x86-nospec-Fix-header-guards-names.patch + patches.kernel.org/4.15.2-013-x86-bugs-Drop-one-mitigation-from-dmesg.patch + patches.kernel.org/4.15.2-014-x86-cpu-bugs-Make-retpoline-module-warning-con.patch + patches.kernel.org/4.15.2-015-x86-cpufeatures-Clean-up-Spectre-v2-related-CP.patch + patches.kernel.org/4.15.2-016-x86-retpoline-Simplify-vmexit_fill_RSB.patch + patches.kernel.org/4.15.2-017-x86-speculation-Simplify-indirect_branch_predi.patch + patches.kernel.org/4.15.2-018-auxdisplay-img-ascii-lcd-add-missing-MODULE_DE.patch + patches.kernel.org/4.15.2-019-iio-adc-accel-Fix-up-module-licenses.patch + patches.kernel.org/4.15.2-020-pinctrl-pxa-pxa2xx-add-missing-MODULE_DESCRIPT.patch + patches.kernel.org/4.15.2-021-ASoC-pcm512x-add-missing-MODULE_DESCRIPTION-AU.patch + patches.kernel.org/4.15.2-022-KVM-nVMX-Eliminate-vmcs02-pool.patch + patches.kernel.org/4.15.2-023-KVM-VMX-introduce-alloc_loaded_vmcs.patch + patches.kernel.org/4.15.2-024-objtool-Improve-retpoline-alternative-handling.patch + patches.kernel.org/4.15.2-025-objtool-Add-support-for-alternatives-at-the-en.patch + patches.kernel.org/4.15.2-026-objtool-Warn-on-stripped-section-symbol.patch + patches.kernel.org/4.15.2-027-x86-mm-Fix-overlap-of-i386-CPU_ENTRY_AREA-with.patch + patches.kernel.org/4.15.2-028-x86-spectre-Check-CONFIG_RETPOLINE-in-command-.patch + patches.kernel.org/4.15.2-029-x86-entry-64-Remove-the-SYSCALL64-fast-path.patch + patches.kernel.org/4.15.2-030-x86-entry-64-Push-extra-regs-right-away.patch + patches.kernel.org/4.15.2-031-x86-asm-Move-status-from-thread_struct-to-thre.patch + patches.kernel.org/4.15.2-032-Documentation-Document-array_index_nospec.patch + patches.kernel.org/4.15.2-033-array_index_nospec-Sanitize-speculative-array-.patch + patches.kernel.org/4.15.2-034-x86-Implement-array_index_mask_nospec.patch + patches.kernel.org/4.15.2-035-x86-Introduce-barrier_nospec.patch + patches.kernel.org/4.15.2-036-x86-Introduce-__uaccess_begin_nospec-and-uacce.patch + patches.kernel.org/4.15.2-037-x86-usercopy-Replace-open-coded-stac-clac-with.patch + patches.kernel.org/4.15.2-038-x86-uaccess-Use-__uaccess_begin_nospec-and-uac.patch + patches.kernel.org/4.15.2-039-x86-get_user-Use-pointer-masking-to-limit-spec.patch + patches.kernel.org/4.15.2-040-x86-syscall-Sanitize-syscall-table-de-referenc.patch + patches.kernel.org/4.15.2-041-vfs-fdtable-Prevent-bounds-check-bypass-via-sp.patch + patches.kernel.org/4.15.2-042-nl80211-Sanitize-array-index-in-parse_txq_para.patch + patches.kernel.org/4.15.2-043-x86-spectre-Report-get_user-mitigation-for-spe.patch + patches.kernel.org/4.15.2-044-x86-spectre-Fix-spelling-mistake-vunerable-vul.patch + patches.kernel.org/4.15.2-045-x86-cpuid-Fix-up-virtual-IBRS-IBPB-STIBP-featu.patch + patches.kernel.org/4.15.2-046-x86-speculation-Use-Indirect-Branch-Prediction.patch + patches.kernel.org/4.15.2-047-x86-paravirt-Remove-noreplace-paravirt-cmdline.patch + patches.kernel.org/4.15.2-048-KVM-VMX-make-MSR-bitmaps-per-VCPU.patch + patches.kernel.org/4.15.2-049-x86-kvm-Update-spectre-v1-mitigation.patch + patches.kernel.org/4.15.2-050-x86-retpoline-Avoid-retpolines-for-built-in-__.patch + patches.kernel.org/4.15.2-051-x86-spectre-Simplify-spectre_v2-command-line-p.patch + patches.kernel.org/4.15.2-052-x86-pti-Mark-constant-arrays-as-__initconst.patch + patches.kernel.org/4.15.2-053-x86-speculation-Fix-typo-IBRS_ATT-which-should.patch + patches.kernel.org/4.15.2-054-KVM-x86-Update-the-reverse_cpuid-list-to-inclu.patch + patches.kernel.org/4.15.2-055-KVM-x86-Add-IBPB-support.patch + patches.kernel.org/4.15.2-056-KVM-VMX-Emulate-MSR_IA32_ARCH_CAPABILITIES.patch + patches.kernel.org/4.15.2-057-KVM-VMX-Allow-direct-access-to-MSR_IA32_SPEC_C.patch + patches.kernel.org/4.15.2-058-KVM-SVM-Allow-direct-access-to-MSR_IA32_SPEC_C.patch + patches.kernel.org/4.15.2-059-serial-core-mark-port-as-initialized-after-suc.patch + patches.kernel.org/4.15.2-060-fpga-region-release-of_parse_phandle-nodes-aft.patch + patches.kernel.org/4.15.2-061-Linux-4.15.2.patch ######################################################## # Build fixes that apply to the vanilla kernel too. @@ -108,6 +169,7 @@ ######################################################## # kbuild/module infrastructure fixes ######################################################## + patches.suse/rpm-kernel-config patches.suse/supported-flag patches.suse/supported-flag-underscores @@ -129,36 +191,11 @@ ######################################################## patches.suse/setuid-dumpable-wrongdir - patches.suse/0001-Documentation-document-array_ptr.patch - patches.suse/0002-asm-nospec-array_ptr-sanitize-speculative-array-de-r.patch - patches.suse/0003-x86-implement-array_ptr_mask.patch - patches.suse/0004-x86-introduce-__uaccess_begin_nospec-and-ifence.patch - patches.suse/0005-x86-__get_user-use-__uaccess_begin_nospec.patch - patches.suse/0006-x86-get_user-use-pointer-masking-to-limit-speculatio.patch - patches.suse/0007-x86-narrow-out-of-bounds-syscalls-to-sys_read-under-.patch - patches.suse/0008-vfs-fdtable-prevent-bounds-check-bypass-via-speculat.patch - patches.suse/0009-kvm-x86-update-spectre-v1-mitigation.patch - patches.suse/0010-nl80211-sanitize-array-index-in-parse_txq_params.patch - - patches.suse/0001-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch - patches.suse/0002-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch - patches.suse/0003-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch - patches.suse/0004-x86-msr-Add-definitions-for-new-speculation-control-.patch - patches.suse/0005-x86-pti-Do-not-enable-PTI-on-processors-which-are-no.patch - patches.suse/0006-x86-cpufeature-Blacklist-SPEC_CTRL-on-early-Spectre-.patch - patches.suse/0007-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch - patches.suse/0008-x86-kvm-Add-IBPB-support.patch - patches.suse/0009-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch - patches.suse/0010-x86-mm-Only-flush-indirect-branches-when-switching-i.patch - patches.suse/0011-x86-speculation-Add-basic-IBRS-support-infrastructur.patch - patches.suse/0012-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch - patches.suse/0013-x86-Simplify-spectre_v2-command-line-parsing.patch - patches.suse/0014-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch - patches.suse/0015-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch - patches.suse/0016-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch - patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I.patch - patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I-fix.patch - patches.suse/0018-x86-vmx-Direct-access-to-MSR_IA32_SPEC_CTRL.patch + patches.suse/0001-x86-speculation-Add-basic-IBRS-support-infrastructur.patch + patches.suse/0002-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch + patches.suse/0003-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch + patches.suse/0004-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch + patches.suse/0005-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch ######################################################## # Architecture-specific patches. These used to be all @@ -410,6 +447,8 @@ patches.suse/megaraid-mbox-fix-SG_IO + patches.suse/scsi-aacraid-remove-redundant-setting-of-variable-c.patch + ######################################################## # DRM/Video ######################################################## ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.7H0r22/_old 2018-02-10 17:55:54.901023969 +0100 +++ /var/tmp/diff_new_pack.7H0r22/_new 2018-02-10 17:55:54.901023969 +0100 @@ -1,3 +1,3 @@ -2018-02-04 20:20:08 +0100 -GIT Revision: 9df97e2cc9de99f99fbca51698b158ef5853f08d +2018-02-08 07:53:26 +0100 +GIT Revision: b34965ab958833296ac68575af31dd314a58cd7b GIT Branch: stable