Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kernel-source for openSUSE:Factory checked in at 2023-07-16 17:28:34 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kernel-source (Old) and /work/SRC/openSUSE:Factory/.kernel-source.new.3193 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kernel-source" Sun Jul 16 17:28:34 2023 rev:696 rq:1098277 version:6.4.3 Changes: -------- --- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes 2023-07-11 15:56:54.373032780 +0200 +++ /work/SRC/openSUSE:Factory/.kernel-source.new.3193/dtb-aarch64.changes 2023-07-16 17:28:36.711919435 +0200 @@ -1,0 +2,9 @@ +Tue Jul 11 07:03:09 CEST 2023 - jsl...@suse.cz + +- Linux 6.4.3 (bsc#1012628). +- mm: call arch_swap_restore() from do_swap_page() (bsc#1012628). +- bootmem: remove the vmemmap pages from kmemleak in + free_bootmem_page (bsc#1012628). +- commit 5fb5b21 + +------------------------------------------------------------------- @@ -2019 +2028 @@ -- commit 0d0e269 +- commit 5ab030f dtb-armv6l.changes: same change dtb-armv7l.changes: same change dtb-riscv64.changes: same change kernel-64kb.changes: same change kernel-debug.changes: same change kernel-default.changes: same change kernel-docs.changes: same change kernel-kvmsmall.changes: same change kernel-lpae.changes: same change kernel-obs-build.changes: same change kernel-obs-qa.changes: same change kernel-pae.changes: same change kernel-source.changes: same change kernel-syms.changes: same change kernel-vanilla.changes: same change kernel-zfcpdump.changes: same change New: ---- _buildconfig-standard-x86_64 _buildinfo-standard-x86_64.xml ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ dtb-aarch64.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.327953030 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.331953054 +0200 @@ -17,7 +17,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -25,9 +25,9 @@ %(chmod +x %_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build}) Name: dtb-aarch64 -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif dtb-armv6l.spec: same change dtb-armv7l.spec: same change dtb-riscv64.spec: same change ++++++ kernel-64kb.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.435953676 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.439953700 +0200 @@ -18,7 +18,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: Kernel with 64kb PAGE_SIZE License: GPL-2.0-only Group: System/Kernel -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -245,10 +245,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a # END COMMON DEPS -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %obsolete_rebuilds %name Source0: https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc @@ -1346,8 +1346,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %obsolete_rebuilds %name-base %ifarch %ix86 ++++++ kernel-debug.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.463953844 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.467953868 +0200 @@ -18,7 +18,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: A Debug Version of the Kernel License: GPL-2.0-only Group: System/Kernel -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -245,10 +245,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a # END COMMON DEPS -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %ifarch ppc64 Provides: kernel-kdump = 2.6.28 Obsoletes: kernel-kdump <= 2.6.28 @@ -1352,8 +1352,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %ifarch ppc64 Provides: kernel-kdump-base = 2.6.28 ++++++ kernel-default.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.491954011 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.495954035 +0200 @@ -18,7 +18,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: The Standard Kernel License: GPL-2.0-only Group: System/Kernel -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -245,10 +245,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a # END COMMON DEPS -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %ifarch %ix86 Provides: kernel-smp = 2.6.17 Obsoletes: kernel-smp <= 2.6.17 @@ -1395,8 +1395,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %ifarch %ix86 Provides: kernel-trace-base = 3.13 ++++++ kernel-docs.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.515954155 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.519954179 +0200 @@ -17,7 +17,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %define build_html 1 %define build_pdf 0 @@ -30,9 +30,9 @@ Summary: Kernel Documentation License: GPL-2.0-only Group: Documentation/Man -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -83,7 +83,7 @@ %endif URL: https://www.kernel.org/ Provides: %name = %version-%source_rel -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a BuildArch: noarch Source0: https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc ++++++ kernel-kvmsmall.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.543954322 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.547954346 +0200 @@ -18,7 +18,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: The Small Developer Kernel for KVM License: GPL-2.0-only Group: System/Kernel -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -245,10 +245,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a # END COMMON DEPS -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %obsolete_rebuilds %name Source0: https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc @@ -1350,8 +1350,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %obsolete_rebuilds %name-base %ifarch %ix86 kernel-lpae.spec: same change ++++++ kernel-obs-build.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.599954657 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.603954681 +0200 @@ -19,7 +19,7 @@ #!BuildIgnore: post-build-checks -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -44,7 +44,7 @@ %endif %endif %endif -BuildRequires: kernel%kernel_flavor-srchash-b97b89494481f3409297e494e466bdd42b1311ab +BuildRequires: kernel%kernel_flavor-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %if 0%{?rhel_version} BuildRequires: kernel @@ -56,9 +56,9 @@ Summary: package kernel and initrd for OBS VM builds License: GPL-2.0-only Group: SLES -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif ++++++ kernel-obs-qa.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.627954825 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.631954849 +0200 @@ -17,7 +17,7 @@ # needsrootforbuild -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -32,9 +32,9 @@ Summary: Basic QA tests for the kernel License: GPL-2.0-only Group: SLES -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif ++++++ kernel-pae.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.651954969 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.659955016 +0200 @@ -18,7 +18,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: Kernel with PAE Support License: GPL-2.0-only Group: System/Kernel -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -245,10 +245,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a # END COMMON DEPS -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %ifarch %ix86 Provides: kernel-bigsmp = 2.6.17 Obsoletes: kernel-bigsmp <= 2.6.17 @@ -1372,8 +1372,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %ifarch %ix86 Provides: kernel-vmi-base = 2.6.38 ++++++ kernel-source.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.683955160 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.687955184 +0200 @@ -17,7 +17,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -30,9 +30,9 @@ %endif Name: kernel-source -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -49,7 +49,7 @@ BuildRequires: sed Requires(post): coreutils sed Provides: %name = %version-%source_rel -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a Provides: linux Provides: multiversion(kernel) Source0: https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz ++++++ kernel-syms.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.711955327 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.715955352 +0200 @@ -24,10 +24,10 @@ Summary: Kernel Symbol Versions (modversions) License: GPL-2.0-only Group: Development/Sources -Version: 6.4.2 +Version: 6.4.3 %if %using_buildservice %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -52,7 +52,7 @@ %endif Requires: pesign-obs-integration Provides: %name = %version-%source_rel -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a Provides: multiversion(kernel) Source: README.KSYMS Requires: kernel-devel%variant = %version-%source_rel ++++++ kernel-vanilla.spec ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:42.739955495 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:42.747955543 +0200 @@ -18,7 +18,7 @@ %define srcversion 6.4 -%define patchversion 6.4.2 +%define patchversion 6.4.3 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux xz @@ -112,9 +112,9 @@ Summary: The Standard Kernel - without any SUSE patches License: GPL-2.0-only Group: System/Kernel -Version: 6.4.2 +Version: 6.4.3 %if 0%{?is_kotd} -Release: <RELEASE>.gb97b894 +Release: <RELEASE>.g5ab030f %else Release: 0 %endif @@ -245,10 +245,10 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a # END COMMON DEPS -Provides: %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %obsolete_rebuilds %name Source0: https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz Source3: kernel-source.rpmlintrc @@ -1343,8 +1343,8 @@ Conflicts: libc.so.6()(64bit) %endif Provides: kernel = %version-%source_rel -Provides: kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab -Provides: kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab +Provides: kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a +Provides: kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a %obsolete_rebuilds %name-base %ifarch %ix86 kernel-zfcpdump.spec: same change ++++++ _buildconfig-standard-x86_64 ++++++ ++++ 3863 lines (skipped) ++++++ _buildinfo-standard-x86_64.xml ++++++ <buildinfo project="Devel:Kernel:stable" repository="standard" downloadurl="http://download.suse.de/ibs"> <arch>x86_64</arch> <debuginfo>1</debuginfo> <subpack>kernel-default</subpack> <subpack>kernel-default-devel</subpack> <subpack>kernel-default-extra</subpack> <subpack>kernel-default-vdso</subpack> <bdep name="liblua5_4-5" preinstall="1" notmeta="1" version="5.4.6" release="1.46" arch="x86_64" hdrmd5="215092f3b9788e833f0a56d345ecaff2" project="SUSE:Factory:Head" repository="standard"/> <bdep name="aaa_base" preinstall="1" notmeta="1" version="84.87+git20230329.b39efbc" release="1.4" arch="x86_64" hdrmd5="40d26d16f91bce0c24682a4350af3db5" project="SUSE:Factory:Head" repository="standard"/> <bdep name="filesystem" preinstall="1" notmeta="1" version="84.87" release="12.1" arch="x86_64" hdrmd5="90c43fd93bc3e3084c58148ff7c9a648" project="SUSE:Factory:Head" repository="standard"/> <bdep name="attr" preinstall="1" notmeta="1" version="2.5.1" release="1.423" arch="x86_64" hdrmd5="5d84d4daecbd21a5b3b62c07c76c889f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="bash" preinstall="1" notmeta="1" version="5.2.15" release="8.84" arch="x86_64" hdrmd5="faed6a0fea297e36628f564ffe590f55" project="SUSE:Factory:Head" repository="standard"/> <bdep name="bash-sh" preinstall="1" version="5.2.15" release="8.84" arch="noarch" hdrmd5="c05b64ea61a5ac8f05f4200a42559139" project="SUSE:Factory:Head" repository="standard"/> <bdep name="coreutils" preinstall="1" version="9.3" release="1.85" arch="x86_64" hdrmd5="bb20b2cd8c865b44a60272da10a44bad" project="SUSE:Factory:Head" repository="standard"/> <bdep name="diffutils" preinstall="1" notmeta="1" version="3.10" release="1.59" arch="x86_64" hdrmd5="7e951654e14f45b3ae8f7fcd6f55f734" project="SUSE:Factory:Head" repository="standard"/> <bdep name="fillup" preinstall="1" notmeta="1" version="1.42" release="279.4" arch="x86_64" hdrmd5="bd75eb15b28f4051d521ab22795d2286" project="SUSE:Factory:Head" repository="standard"/> <bdep name="glibc" preinstall="1" notmeta="1" version="2.37" release="4.43" arch="x86_64" hdrmd5="d409d342ed7bd79fd43b5d320b469f46" project="SUSE:Factory:Head" repository="standard"/> <bdep name="grep" preinstall="1" notmeta="1" version="3.11" release="1.2" arch="x86_64" hdrmd5="3757c8d331cdf02276ab1850c3055a64" project="SUSE:Factory:Head" repository="standard"/> <bdep name="pam" preinstall="1" notmeta="1" version="1.5.3" release="1.68" arch="x86_64" hdrmd5="4d6afb7e4fdfb82245614793bbbcb3c9" project="SUSE:Factory:Head" repository="standard"/> <bdep name="permissions" preinstall="1" notmeta="1" version="1699_20230602" release="1.27" arch="x86_64" hdrmd5="23b119779a8ee81066874b0a9416f698" project="SUSE:Factory:Head" repository="standard"/> <bdep name="rpm" preinstall="1" notmeta="1" version="4.18.0" release="5.31" arch="x86_64" hdrmd5="592c5c62a8f00913408f48f4954ae805" project="SUSE:Factory:Head" repository="standard"/> <bdep name="rpm-config-SUSE" preinstall="1" notmeta="1" version="20220926" release="1.4" arch="noarch" hdrmd5="a983c39701f2a013d776343ee9891e58" project="SUSE:Factory:Head" repository="standard"/> <bdep name="sed" preinstall="1" notmeta="1" version="4.9" release="2.7" arch="x86_64" hdrmd5="ca9875eba8bb7bbd41837c1fffae365d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="tar" preinstall="1" notmeta="1" version="1.34" release="10.7" arch="x86_64" hdrmd5="7b281ed9aacdcc5f78384712ea6a8b58" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libbz2-1" preinstall="1" notmeta="1" version="1.0.8" release="5.169" arch="x86_64" hdrmd5="ec8745849dfd6e791d12236cefab1204" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgcc_s1" preinstall="1" notmeta="1" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="2434c9ccf107768b822633e365202e32" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libncurses6" preinstall="1" notmeta="1" version="6.4.20230617" release="15.16" arch="x86_64" hdrmd5="de18c02344fcc8956dde13bbdac367b4" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libreadline8" preinstall="1" notmeta="1" version="8.2" release="2.225" arch="x86_64" hdrmd5="befc0166d562133688771f539d5cf79f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libz1" preinstall="1" notmeta="1" version="1.2.13" release="4.73" arch="x86_64" hdrmd5="ef1fa6392754d11997e02681f96aa17c" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libselinux1" preinstall="1" notmeta="1" version="3.5" release="3.27" arch="x86_64" hdrmd5="1ffa2c620ea21685cb4eee3a60d6ba73" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgcrypt20" preinstall="1" notmeta="1" version="1.10.2" release="2.52" arch="x86_64" hdrmd5="05ba2a07624dbe826d29e2afe11706dc" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgpg-error0" preinstall="1" notmeta="1" version="1.47" release="1.108" arch="x86_64" hdrmd5="a7dfd20d6d4907872b85b15ab06fad31" project="SUSE:Factory:Head" repository="standard"/> <bdep name="liblzma5" preinstall="1" notmeta="1" version="5.4.3" release="1.79" arch="x86_64" hdrmd5="324b2e4a6361a9dbbb69e93e11ba13db" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libcap2" preinstall="1" notmeta="1" version="2.69" release="1.66" arch="x86_64" hdrmd5="9cc7cdb524274c0b3da3d6c0fe23564b" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libacl1" preinstall="1" notmeta="1" version="2.3.1" release="2.285" arch="x86_64" hdrmd5="74f12861ada62b83df820b6892d886c3" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libattr1" preinstall="1" notmeta="1" version="2.5.1" release="1.423" arch="x86_64" hdrmd5="436474df9ae3d520705f69d0e8f13d7d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libpopt0" preinstall="1" notmeta="1" version="1.19" release="1.231" arch="x86_64" hdrmd5="1551e0f25db33a848d831f9436bc7fd6" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libelf1" preinstall="1" notmeta="1" version="0.189" release="3.76" arch="x86_64" hdrmd5="1c5ccd99d1df7153fef239467b0b4a74" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libzstd1" preinstall="1" notmeta="1" version="1.5.5" release="3.55" arch="x86_64" hdrmd5="f51232803d41ededcac1eda103a4fdf0" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libpcre2-8-0" preinstall="1" notmeta="1" version="10.42" release="3.183" arch="x86_64" hdrmd5="cf2fe5751a662bef2f55761198954883" project="SUSE:Factory:Head" repository="standard"/> <bdep name="util-linux" vminstall="1" version="2.39" release="1.10" arch="x86_64" hdrmd5="89e2a9d6cab33a38b4d6bf300e1363f3" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libmount1" vminstall="1" version="2.39" release="1.10" arch="x86_64" hdrmd5="f98afb4820f209190f71ea2a794fdff9" project="SUSE:Factory:Head" repository="standard"/> <bdep name="perl-base" vminstall="1" version="5.36.1" release="1.24" arch="x86_64" hdrmd5="d15198b1af001af1e1e9d017baa2f4ef" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libdb-4_8" vminstall="1" notmeta="1" version="4.8.30" release="42.9" arch="x86_64" hdrmd5="ffb36acf1785032cdea0927929461433" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libblkid1" vminstall="1" version="2.39" release="1.10" arch="x86_64" hdrmd5="5cb92a52ab4cbf1bac8e532bd63239f8" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libuuid1" vminstall="1" version="2.39" release="1.10" arch="x86_64" hdrmd5="f70640b59a2e9ffb43304b7818c0df61" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsmartcols1" vminstall="1" version="2.39" release="1.10" arch="x86_64" hdrmd5="5b62210322be7cd0f41ade51669a9419" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libcrypt1" vminstall="1" version="4.4.35" release="1.1" arch="x86_64" hdrmd5="8ee16c0dffa0ffefb0e8f6aa52d0cf91" project="SUSE:Factory:Head" repository="standard"/> <bdep name="kernel-obs-build" vminstall="1" notmeta="1" version="6.3.9" release="1.17" arch="x86_64" hdrmd5="3661aa4fd376d237752be7f1a9b1cde9" project="SUSE:Factory:Head" repository="standard"/> <bdep name="bc" version="1.07.1" release="4.452" arch="x86_64" hdrmd5="e813346cd68173f234fe404ceb46146e" project="SUSE:Factory:Head" repository="standard"/> <bdep name="bison" version="3.8.2" release="3.233" arch="x86_64" hdrmd5="c3e3562004a48c43419368aca9261ecb" project="SUSE:Factory:Head" repository="standard"/> <bdep name="fdupes" version="2.2.1" release="1.240" arch="x86_64" hdrmd5="c06a5ca73aead457581191d8184cfe97" project="SUSE:Factory:Head" repository="standard"/> <bdep name="flex" version="2.6.4" release="6.415" arch="x86_64" hdrmd5="331aeb994a7f125dde7ffa9db6909829" project="SUSE:Factory:Head" repository="standard"/> <bdep name="hmaccalc" version="0.9.14" release="2.471" arch="x86_64" hdrmd5="6800a6f31003d6916325076eb910ecc5" project="SUSE:Factory:Head" repository="standard"/> <bdep name="jq" version="1.6" release="3.9" arch="x86_64" hdrmd5="f32982bf3744ce2f6671b9d74c036f70" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libopenssl-devel" version="3.1.1" release="2.11" arch="noarch" hdrmd5="54effe6612cff23213305c9ea122ff26" project="SUSE:Factory:Head" repository="standard"/> <bdep name="openssl" version="3.1.1" release="2.11" arch="noarch" hdrmd5="581c34e127e127d77583524d8cf42631" project="SUSE:Factory:Head" repository="standard"/> <bdep name="pesign-obs-integration" version="10.2+git20230612.4699910" release="2.1" arch="x86_64" hdrmd5="70bec52b7eb3a89dac2136c8ae7a802e" project="SUSE:Factory:Head" repository="standard"/> <bdep name="dwarves" version="1.25" release="1.2" arch="x86_64" hdrmd5="f6f5dfadeff6afe7badc41756a84bf34" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libelf-devel" version="0.189" release="3.76" arch="x86_64" hdrmd5="fd919719d29a670bccca828b99dfe907" project="SUSE:Factory:Head" repository="standard"/> <bdep name="elfutils" version="0.189" release="3.76" arch="x86_64" hdrmd5="7bacadd96c504ad4ba44b4f2e5f82860" project="SUSE:Factory:Head" repository="standard"/> <bdep name="zstd" version="1.5.5" release="3.55" arch="x86_64" hdrmd5="a4ad63ecdf9d35224cf5ecd7cb3c0691" project="SUSE:Factory:Head" repository="standard"/> <bdep name="rpm-build" version="4.18.0" release="5.31" arch="x86_64" hdrmd5="5435bd950a8ffdf95015f99dea6a13d1" project="SUSE:Factory:Head" repository="standard"/> <bdep name="gcc-PIE" version="13" release="1.168" arch="x86_64" hdrmd5="9b04c0d66f289cb7cbe3565790f46b87" project="SUSE:Factory:Head" repository="standard"/> <bdep name="kmod" version="30" release="5.1" arch="x86_64" hdrmd5="8d5049bd7331ac946dab27df18fa873d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="m4" version="1.4.18" release="7.251" arch="x86_64" hdrmd5="468a33c93c99f5775830781612229454" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgmp10" version="6.2.1" release="4.364" arch="x86_64" hdrmd5="de6485b51ecd9d26cb0f1a5096dd2d50" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libstdc++6" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="8d5bf8858da7ef4d31d242c3c49666ef" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libfl-devel" version="2.6.4" release="6.415" arch="x86_64" hdrmd5="0e8b17bd735c32287bd2a1140e0d1593" project="SUSE:Factory:Head" repository="standard"/> <bdep name="mozilla-nss" version="3.90" release="1.2" arch="x86_64" hdrmd5="001c63deb6a34f4cf0e999a1bcbd2196" project="SUSE:Factory:Head" repository="standard"/> <bdep name="mozilla-nspr" version="4.35" release="1.16" arch="x86_64" hdrmd5="e40d70ea2795c84142bc2b784da3d802" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libjq1" version="1.6" release="3.9" arch="x86_64" hdrmd5="ac2afd3c9240228067cd50cb9b4ef63f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="pkgconf-pkg-config" version="1.8.0" release="2.183" arch="x86_64" hdrmd5="e8a481328df6bf763239eab70db10a57" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libopenssl3" version="3.1.1" release="2.9" arch="x86_64" hdrmd5="9c72c0fc7d0e6e0d37d1f554bda345a0" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libopenssl-3-devel" version="3.1.1" release="2.9" arch="x86_64" hdrmd5="7f2d9ec16592aa9f007a38b02ac90d9a" project="SUSE:Factory:Head" repository="standard"/> <bdep name="openssl-3" version="3.1.1" release="2.9" arch="x86_64" hdrmd5="950076f8f52ce259912b963ceb96cf16" project="SUSE:Factory:Head" repository="standard"/> <bdep name="mozilla-nss-tools" version="3.90" release="1.2" arch="x86_64" hdrmd5="b3635b75e34645e7c5216b43c3a9bb62" project="SUSE:Factory:Head" repository="standard"/> <bdep name="fipscheck" version="1.7.0" release="1.211" arch="x86_64" hdrmd5="ff0c5620678d035c63328a3d2eda4e04" project="SUSE:Factory:Head" repository="standard"/> <bdep name="pesign" version="116" release="1.10" arch="x86_64" hdrmd5="2d694c7d930b043fbb57ebfa28570de5" project="SUSE:Factory:Head" repository="standard"/> <bdep name="suse-module-tools" version="16.0.32" release="1.1" arch="x86_64" hdrmd5="b0fcb0813bae9740c4e02a370d28aa05" project="SUSE:Factory:Head" repository="standard"/> <bdep name="python310-base" version="3.10.12" release="1.4" arch="x86_64" hdrmd5="e1aec7c20cb42c752b7464fba7b88444" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libbpf1" version="1.2.0" release="1.2" arch="x86_64" hdrmd5="7898c801a14199b060e816c0f57678ee" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libdwarves1" version="1.25" release="1.2" arch="x86_64" hdrmd5="9610046282d5431a928897e1bf1ef586" project="SUSE:Factory:Head" repository="standard"/> <bdep name="glibc-devel" version="2.37" release="4.43" arch="x86_64" hdrmd5="0694e30d0386f19b692da82721817bb4" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libdw1" version="0.189" release="3.76" arch="x86_64" hdrmd5="531559a31931aeafa67f3df1cb8e4c51" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libasm1" version="0.189" release="3.76" arch="x86_64" hdrmd5="ef8fc22bc0ee75b7f6bfd3cd58f60b57" project="SUSE:Factory:Head" repository="standard"/> <bdep name="findutils" version="4.9.0" release="2.192" arch="x86_64" hdrmd5="cd7d3205608f29706e00d9f39fda7668" project="SUSE:Factory:Head" repository="standard"/> <bdep name="xz" version="5.4.3" release="1.79" arch="x86_64" hdrmd5="4fb86077af5b0dc2fd14aa271bae7e8c" project="SUSE:Factory:Head" repository="standard"/> <bdep name="gcc" version="13" release="1.168" arch="x86_64" hdrmd5="1a41853d9e6deee988efa7b0dcda1d7f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="cpio" version="2.13" release="5.204" arch="x86_64" hdrmd5="1fc842e54aa87438c48e3f2f42ee9949" project="SUSE:Factory:Head" repository="standard"/> <bdep name="make" version="4.4.1" release="2.129" arch="x86_64" hdrmd5="d9e4074bcb153cc24b3aedc4b3084e38" project="SUSE:Factory:Head" repository="standard"/> <bdep name="bzip2" version="1.0.8" release="5.169" arch="x86_64" hdrmd5="d15bd37a55dc5aa025b0abafb4da9436" project="SUSE:Factory:Head" repository="standard"/> <bdep name="file" version="5.44" release="2.79" arch="x86_64" hdrmd5="aa892572891470bc252c0847a5a8c71f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="binutils" version="2.40" release="5.33" arch="x86_64" hdrmd5="1e4bf50e76d57ddf6cb394ba5a09da0c" project="SUSE:Factory:Head" repository="standard"/> <bdep name="gawk" version="5.2.2" release="2.62" arch="x86_64" hdrmd5="4c3735f99b0a1e2f8ef4809cf03c3af4" project="SUSE:Factory:Head" repository="standard"/> <bdep name="patch" version="2.7.6" release="6.278" arch="x86_64" hdrmd5="4cf1ccce9019eca23528608c7c07fb9e" project="SUSE:Factory:Head" repository="standard"/> <bdep name="which" version="2.21" release="5.292" arch="x86_64" hdrmd5="da12908b83bcb0b55a9ad7721de73b33" project="SUSE:Factory:Head" repository="standard"/> <bdep name="glibc-locale-base" version="2.37" release="4.43" arch="x86_64" hdrmd5="b251981d5a1cd71087f70dfab0f403f5" project="SUSE:Factory:Head" repository="standard"/> <bdep name="dwz" version="0.15" release="2.229" arch="x86_64" hdrmd5="720a4e4e1c974239cd3c3f4bce2f34bb" project="SUSE:Factory:Head" repository="standard"/> <bdep name="systemd-rpm-macros" version="24" release="1.21" arch="noarch" hdrmd5="070828150b359e9cc72fc43950340253" project="SUSE:Factory:Head" repository="standard"/> <bdep name="librpmbuild9" version="4.18.0" release="5.31" arch="x86_64" hdrmd5="c861330e5e91284d3610aeed5fdadcc3" project="SUSE:Factory:Head" repository="standard"/> <bdep name="debugedit" version="5.0" release="5.227" arch="x86_64" hdrmd5="ce1865ea46b205f386d8a03e097d735d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="gcc13-PIE" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="426b0c621532b36fe16e6facb3608a28" project="SUSE:Factory:Head" repository="standard"/> <bdep name="rpm-build-perl" version="4.18.0" release="5.31" arch="x86_64" hdrmd5="3b9e124d585947d4e5970f99a751178c" project="SUSE:Factory:Head" repository="standard"/> <bdep name="python-rpm-packaging" version="20210526+a18ca48" release="1.261" arch="noarch" hdrmd5="47554a60a3f24d87bd432c7cdceedfa6" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libfl2" version="2.6.4" release="6.415" arch="x86_64" hdrmd5="115aeebc323dea53f00b77ab8ae086ac" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libfreebl3" version="3.90" release="1.2" arch="x86_64" hdrmd5="689675aefa26e0d20179cf59d8e59b3a" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsoftokn3" version="3.90" release="1.2" arch="x86_64" hdrmd5="4c3527b7733210a9830886c97c8ba758" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libonig5" version="6.9.8" release="1.15" arch="x86_64" hdrmd5="fba9be6581ea616fa7d9794508d101b9" project="SUSE:Factory:Head" repository="standard"/> <bdep name="pkgconf-m4" version="1.8.0" release="2.183" arch="noarch" hdrmd5="8714cb4343d2eeb2abb84a08abc7d688" project="SUSE:Factory:Head" repository="standard"/> <bdep name="pkgconf" version="1.8.0" release="2.183" arch="x86_64" hdrmd5="beeb3c703da67408952b3a71c752c4b8" project="SUSE:Factory:Head" repository="standard"/> <bdep name="crypto-policies" version="20230420.3d08ae7" release="1.54" arch="noarch" hdrmd5="f997400300ff78fb046c2551599ad3ab" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libfipscheck1" version="1.7.0" release="1.211" arch="x86_64" hdrmd5="ec76517cfde261bc03c64b09e522cb6f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libefivar1" version="38" release="1.32" arch="x86_64" hdrmd5="bb96fd129b07451f23165fe322311786" project="SUSE:Factory:Head" repository="standard"/> <bdep name="sysuser-shadow" version="3.1" release="5.251" arch="noarch" hdrmd5="9fd262f3d4c0950ee21341c25c5bdd78" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libpython3_10-1_0" version="3.10.12" release="1.4" arch="x86_64" hdrmd5="32796fd11d1a8a7e6a7996bd239d46ee" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libexpat1" version="2.5.0" release="2.203" arch="x86_64" hdrmd5="75a7f2f8edcffeb49c95163e8c17c11b" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libffi8" version="3.4.4" release="1.220" arch="x86_64" hdrmd5="55e47e607a658e966e9a7887956746a0" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libmpdec3" version="2.5.1" release="2.372" arch="x86_64" hdrmd5="1bce08461151913727bddea875f6da58" project="SUSE:Factory:Head" repository="standard"/> <bdep name="linux-glibc-devel" version="6.4" release="1.4" arch="x86_64" hdrmd5="d4e562872462a856f13d5ae169146d6e" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libxcrypt-devel" version="4.4.35" release="1.1" arch="x86_64" hdrmd5="8427e7edda1452d19665efc3ee944655" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libmagic1" version="5.44" release="2.79" arch="x86_64" hdrmd5="633af0fcbc8b51030a58d80631acd200" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libaudit1" version="3.0.9" release="1.178" arch="x86_64" hdrmd5="e79a2fc57bcc86adfa3a803690bcadd1" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libcap-ng0" version="0.8.3" release="2.77" arch="x86_64" hdrmd5="934c33b11bda99635df692d8d38cafaa" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libeconf0" version="0.5.2" release="1.139" arch="x86_64" hdrmd5="2ed8f8db098313fcfe039bc2023755f7" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libutempter0" version="1.2.1" release="1.94" arch="x86_64" hdrmd5="905733337a21e4df40b04690cfe04028" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libfdisk1" version="2.39" release="1.10" arch="x86_64" hdrmd5="2304baff007ca6e53f08b45908ab1ad6" project="SUSE:Factory:Head" repository="standard"/> <bdep name="gcc13" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="138d4565e98b967afbea848f3f9a6045" project="SUSE:Factory:Head" repository="standard"/> <bdep name="cpp" version="13" release="1.168" arch="x86_64" hdrmd5="e5bbe3c2c600bc075df76f39bb384348" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libseccomp2" version="2.5.4" release="2.260" arch="x86_64" hdrmd5="9f266f49c909e526b0b6057e0d943109" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libctf-nobfd0" version="2.40" release="5.33" arch="x86_64" hdrmd5="58b29e84236f135fbd3f0931baaf5eb1" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libctf0" version="2.40" release="5.33" arch="x86_64" hdrmd5="74f945a58eccecc4c0a39b302ddb2eb9" project="SUSE:Factory:Head" repository="standard"/> <bdep name="update-alternatives" version="1.21.8" release="2.61" arch="x86_64" hdrmd5="ce6b337a9d219dc17c2fb04e2340bd1d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libmpfr6" version="4.2.0" release="3.26" arch="x86_64" hdrmd5="5e63ca64768f081597991fba4aea1244" project="SUSE:Factory:Head" repository="standard"/> <bdep name="python310-packaging" version="23.1" release="2.90" arch="noarch" hdrmd5="5e11e7894ac3e7112212238fc12fe71c" project="SUSE:Factory:Head" repository="standard"/> <bdep name="python-rpm-macros" version="20230609.6fe8111" release="2.21" arch="noarch" hdrmd5="467f71d9a5adf820900ede0c01931d3d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="system-user-root" version="20190513" release="2.324" arch="noarch" hdrmd5="0da330fbcf9fd54d3797ae25dd61f643" project="SUSE:Factory:Head" repository="standard"/> <bdep name="compat-usrmerge-tools" version="84.87" release="5.349" arch="x86_64" hdrmd5="9015aee464de04477ed9298c3c14c8cc" project="SUSE:Factory:Head" repository="standard"/> <bdep name="terminfo-base" version="6.4.20230617" release="15.16" arch="x86_64" hdrmd5="3ad0905e0c772b70c091d902c6eee8bc" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsqlite3-0" version="3.42.0" release="1.3" arch="x86_64" hdrmd5="1f6bce6768a48bb2848b66e43c885fac" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libpkgconf3" version="1.8.0" release="2.183" arch="x86_64" hdrmd5="b0aaa4f3cdf6c686703be77e90102ece" project="SUSE:Factory:Head" repository="standard"/> <bdep name="chkstat" version="1699_20230602" release="1.27" arch="x86_64" hdrmd5="2ec6de3461edbd924404ce1f3e90f11f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="permissions-config" version="1699_20230602" release="1.27" arch="noarch" hdrmd5="cf70207a578e47433509dd59ee318e92" project="SUSE:Factory:Head" repository="standard"/> <bdep name="file-magic" version="5.44" release="2.79" arch="noarch" hdrmd5="4407405f8b492049c4c50c374865192c" project="SUSE:Factory:Head" repository="standard"/> <bdep name="system-group-hardware" version="20170617" release="24.354" arch="noarch" hdrmd5="2e057d7eccae263b4550d9e4a2850ddc" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libmpc3" version="1.3.1" release="1.215" arch="x86_64" hdrmd5="d17cc377f2dd192f698beeaeefae46b8" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libisl23" version="0.26" release="1.122" arch="x86_64" hdrmd5="52f8ea215a0c32ee3b8be3ed6fe62849" project="SUSE:Factory:Head" repository="standard"/> <bdep name="cpp13" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="8b19787667cd585fb18e935a5cd89dd2" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libasan8" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="d78be04157793d8115541a2e97eea338" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libatomic1" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="2695ee38189b9d99351e536aba2301b1" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgomp1" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="9ce38729ba6d397d353fb62a76a4b307" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libhwasan0" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="3d88324105cc439802cadcf3aede62ef" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libitm1" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="f435495162a3ba6d855e90a1fa20130b" project="SUSE:Factory:Head" repository="standard"/> <bdep name="liblsan0" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="9543f7d597b68ab88332d6f0ee56ea5d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libtsan2" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="9eeb80c40194a7aae76bcf5cf38e085f" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libubsan1" version="13.1.1+git7364" release="1.48" arch="x86_64" hdrmd5="3483f53809f08f90acdd7c5a57f695ee" project="SUSE:Factory:Head" repository="standard"/> <bdep name="zlib-devel" version="1.2.13" release="4.73" arch="x86_64" hdrmd5="ce2884855b161ee72456d62acb3d0067" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libzstd-devel" version="1.5.5" release="3.55" arch="x86_64" hdrmd5="45fe373688364e102804fcc6b83d551e" project="SUSE:Factory:Head" repository="standard"/> <bdep name="gzip" version="1.12" release="3.200" arch="x86_64" hdrmd5="30179bae0e08fc8d2dc23d9996860f53" project="SUSE:Factory:Head" repository="standard"/> <bdep name="mozilla-nss-certs" version="3.90" release="1.2" arch="x86_64" hdrmd5="4ab2514ffa7d5fae1a72f7a45c3152c3" project="SUSE:Factory:Head" repository="standard"/> <bdep name="shadow" version="4.13" release="6.96" arch="x86_64" hdrmd5="48e443fdb256fa87641c5d1103ef8edf" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsemanage2" version="3.5" release="1.178" arch="x86_64" hdrmd5="35bac053c1b96272ade04dd19c54dc30" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsubid4" version="4.13" release="6.96" arch="x86_64" hdrmd5="ffd07b55fb003d8a9bf6a8416ed21935" project="SUSE:Factory:Head" repository="standard"/> <bdep name="login_defs" version="4.13" release="6.96" arch="noarch" hdrmd5="3dcb51fe2daf56953c15777b48c1967b" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsepol2" version="3.5" release="1.184" arch="x86_64" hdrmd5="9887ac63011262162208104796dc36a6" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsemanage-conf" version="3.5" release="1.178" arch="x86_64" hdrmd5="9ae281fe721692a63ca2ebe820848410" project="SUSE:Factory:Head" repository="standard"/> <bdep name="gdb" notmeta="1" version="13.2" release="1.1" arch="x86_64" hdrmd5="85fb0b5b7b2f8d96fd60e79a6712c85a" project="SUSE:Factory:Head" repository="standard"/> <bdep name="vim" notmeta="1" version="9.0.1632" release="1.1" arch="x86_64" hdrmd5="b862ef214ec5034251488f3903f63d3d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="strace" notmeta="1" version="6.4" release="1.2" arch="x86_64" hdrmd5="8dea26627816c45e39e8651a18181754" project="SUSE:Factory:Head" repository="standard"/> <bdep name="less" notmeta="1" version="633" release="2.29" arch="x86_64" hdrmd5="48524d6db3e335ad7faf54fda46b7497" project="SUSE:Factory:Head" repository="standard"/> <bdep name="perl" notmeta="1" version="5.36.1" release="1.24" arch="x86_64" hdrmd5="5fcf8185bca6fb17182a73c999780b38" project="SUSE:Factory:Head" repository="standard"/> <bdep name="build-mkbaselibs" notmeta="1" version="20230628" release="1.1" arch="noarch" hdrmd5="f335b361ef0db387c349f7128c82b90c" project="SUSE:Factory:Head" repository="standard"/> <bdep name="compat-usrmerge-build" notmeta="1" version="84.87" release="5.349" arch="x86_64" hdrmd5="7a68fec8745a1f2cffdadbe84524e8d8" project="SUSE:Factory:Head" repository="standard"/> <bdep name="brp-check-suse" notmeta="1" version="84.87+git20230324.8680ce4" release="1.4" arch="x86_64" hdrmd5="13319d085c3363c98b95ac1c7630153d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="post-build-checks" notmeta="1" version="84.87+git20230328.de7e9df" release="1.1" arch="noarch" hdrmd5="f9748fcaa2f76b21403b761f92cfc1ee" project="SUSE:Factory:Head" repository="standard"/> <bdep name="build-compare" notmeta="1" version="20230617T171717.50241a8" release="1.5" arch="noarch" hdrmd5="d2a2c7d0055ab91f729b0f1119fdf1d8" project="SUSE:Factory:Head" repository="standard"/> <bdep name="suse-module-tools-scriptlets" notmeta="1" version="16.0.32" release="1.1" arch="x86_64" hdrmd5="cbb2ce963c4d43c924d4a93ede5123f9" project="SUSE:Factory:Head" repository="standard"/> <bdep name="babeltrace" notmeta="1" version="1.5.8" release="3.26" arch="x86_64" hdrmd5="01b6f150271fe7abb0073e28132fa046" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsource-highlight4" notmeta="1" version="3.1.9" release="5.28" arch="x86_64" hdrmd5="cbad973bcb5a6ac850d9245639f1bbd8" project="SUSE:Factory:Head" repository="standard"/> <bdep name="alts" notmeta="1" version="1.2+30.a5431e9" release="1.2" arch="x86_64" hdrmd5="83ec3cb83b14158e1f41a8e612f5924b" project="SUSE:Factory:Head" repository="standard"/> <bdep name="vim-data-common" notmeta="1" version="9.0.1632" release="1.1" arch="noarch" hdrmd5="65e6d4d425119e5a294175f5660c025a" project="SUSE:Factory:Head" repository="standard"/> <bdep name="xxd" notmeta="1" version="9.0.1632" release="1.1" arch="x86_64" hdrmd5="b468eda2389d3a65af376aba7a731bc0" project="SUSE:Factory:Head" repository="standard"/> <bdep name="ncurses-utils" notmeta="1" version="6.4.20230617" release="15.16" arch="x86_64" hdrmd5="0428637bb179ff9e717baeba5895d374" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgdbm6" notmeta="1" version="1.23" release="1.317" arch="x86_64" hdrmd5="bd8e81e43102db4f3df17e9289924e70" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgdbm_compat4" notmeta="1" version="1.23" release="1.317" arch="x86_64" hdrmd5="634b62c42496ba9a014bb4b7989f3c3e" project="SUSE:Factory:Head" repository="standard"/> <bdep name="aaa_base-malloccheck" notmeta="1" version="84.87+git20230329.b39efbc" release="1.4" arch="x86_64" hdrmd5="fd92f79d53fa541e29265a4889429208" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libglib-2_0-0" notmeta="1" version="2.76.3" release="1.3" arch="x86_64" hdrmd5="e02cd3804fb1b277d0950fbf6ee4388d" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libgmodule-2_0-0" notmeta="1" version="2.76.3" release="1.3" arch="x86_64" hdrmd5="cb498cf0602663b6f37a3c16378c6a00" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libalternatives1" notmeta="1" version="1.2+30.a5431e9" release="1.2" arch="x86_64" hdrmd5="e2d93a4d3982c41df2d16b20f941f460" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libdebuginfod1" notmeta="1" version="0.189" release="3.1" arch="x86_64" hdrmd5="4e6350cb3cca733adfe3288fa08ef019" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libcurl4" notmeta="1" version="8.1.2" release="1.1" arch="x86_64" hdrmd5="5d08590bae29420850b1774fbfe103ee" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libldap2" notmeta="1" version="2.6.4" release="2.1" arch="x86_64" hdrmd5="6a18a45adf7ce45b12138ad56520d7d3" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libbrotlidec1" notmeta="1" version="1.0.9" release="3.6" arch="x86_64" hdrmd5="11e74982c898863b95a62ddb32aa0502" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libidn2-0" notmeta="1" version="2.3.4" release="1.7" arch="x86_64" hdrmd5="a3acd77299b738ec93ed290614cd8e0b" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libssh4" notmeta="1" version="0.10.5" release="1.3" arch="x86_64" hdrmd5="8fca0392e95166e6207b0126cc059e25" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libnghttp2-14" notmeta="1" version="1.54.0" release="1.1" arch="x86_64" hdrmd5="21ba2e9005cd40918163f8a420925316" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libpsl5" notmeta="1" version="0.21.2" release="1.11" arch="x86_64" hdrmd5="0cc9321f3d38493fa50ddd548cbaa62b" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libsasl2-3" notmeta="1" version="2.1.28" release="5.3" arch="x86_64" hdrmd5="c11cfdffc364764a70c893c18af81184" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libbrotlicommon1" notmeta="1" version="1.0.9" release="3.6" arch="x86_64" hdrmd5="c3a0f01e51e66eea2f7b590e853ec637" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libunistring5" notmeta="1" version="1.1" release="2.2" arch="x86_64" hdrmd5="6b6323c99d714d080dc4a670347864a5" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libssh-config" notmeta="1" version="0.10.5" release="1.3" arch="x86_64" hdrmd5="d1dddbad15e38ead63ed67453b3ebcbb" project="SUSE:Factory:Head" repository="standard"/> <bdep name="krb5-mini" notmeta="1" version="1.20.1" release="6.5" arch="x86_64" hdrmd5="3f6d758fbcf923e1370c706ab6a1aa25" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libcom_err2" notmeta="1" version="1.47.0" release="1.2" arch="x86_64" hdrmd5="5f0cfff1b5adbe03158fea75c6421986" project="SUSE:Factory:Head" repository="standard"/> <bdep name="libverto1" notmeta="1" version="0.3.2" release="3.1" arch="x86_64" hdrmd5="aef76e0a871fdfb679452a3137612c92" project="SUSE:Factory:Head" repository="standard"/> <bdep name="lua54" notmeta="1" version="5.4.6" release="1.46" arch="x86_64" hdrmd5="fdfddf9794edb69253ebe60c98663e3b" project="SUSE:Factory:Head" repository="standard"/> <path project="Devel:Kernel:stable" repository="standard" url="http://download.suse.de/ibs/Devel:/Kernel:/stable/standard/"/> <path project="SUSE:Factory:Head" repository="standard" url="http://download.suse.de/ibs/SUSE:/Factory:/Head/standard/"/> </buildinfo> ++++++ config.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/arm64/default new/config/arm64/default --- old/config/arm64/default 2023-07-10 11:51:35.000000000 +0200 +++ new/config/arm64/default 2023-07-11 08:23:11.000000000 +0200 @@ -12384,6 +12384,7 @@ # CONFIG_SECURITY_SAFESETID is not set CONFIG_SECURITY_LOCKDOWN_LSM=y CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y +CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT=y CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/armv6hl/default new/config/armv6hl/default --- old/config/armv6hl/default 2023-07-10 11:51:35.000000000 +0200 +++ new/config/armv6hl/default 2023-07-11 08:23:11.000000000 +0200 @@ -8382,6 +8382,7 @@ # CONFIG_SECURITY_SAFESETID is not set CONFIG_SECURITY_LOCKDOWN_LSM=y CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y +# CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT is not set CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/armv7hl/default new/config/armv7hl/default --- old/config/armv7hl/default 2023-07-10 11:51:35.000000000 +0200 +++ new/config/armv7hl/default 2023-07-11 08:23:11.000000000 +0200 @@ -11869,6 +11869,7 @@ # CONFIG_SECURITY_SAFESETID is not set CONFIG_SECURITY_LOCKDOWN_LSM=y CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y +# CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT is not set CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/riscv64/default new/config/riscv64/default --- old/config/riscv64/default 2023-07-10 11:51:35.000000000 +0200 +++ new/config/riscv64/default 2023-07-11 08:23:11.000000000 +0200 @@ -9356,6 +9356,7 @@ # CONFIG_SECURITY_SAFESETID is not set CONFIG_SECURITY_LOCKDOWN_LSM=y CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y +# CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT is not set CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/config/x86_64/default new/config/x86_64/default --- old/config/x86_64/default 2023-07-10 11:51:35.000000000 +0200 +++ new/config/x86_64/default 2023-07-11 08:23:11.000000000 +0200 @@ -10336,6 +10336,7 @@ # CONFIG_SECURITY_SAFESETID is not set CONFIG_SECURITY_LOCKDOWN_LSM=y CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y +CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT=y CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set ++++++ patches.kernel.org.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch new/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch --- old/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch 2023-07-11 07:03:09.000000000 +0200 @@ -0,0 +1,48 @@ +From: Suren Baghdasaryan <sur...@google.com> +Date: Sat, 8 Jul 2023 12:12:10 -0700 +Subject: [PATCH] mm: lock a vma before stack expansion +Patch-mainline: 6.4.3 +References: bsc#1012628 bsc#1212775 +Git-commit: c137381f71aec755fbf47cd4e9bd4dce752c054c + +commit c137381f71aec755fbf47cd4e9bd4dce752c054c upstream. + +With recent changes necessitating mmap_lock to be held for write while +expanding a stack, per-VMA locks should follow the same rules and be +write-locked to prevent page faults into the VMA being expanded. Add +the necessary locking. + +Cc: sta...@vger.kernel.org +Signed-off-by: Suren Baghdasaryan <sur...@google.com> +Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> +Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + mm/mmap.c | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/mm/mmap.c b/mm/mmap.c +index bc510361..059c0fb2 100644 +--- a/mm/mmap.c ++++ b/mm/mmap.c +@@ -1975,6 +1975,8 @@ static int expand_upwards(struct vm_area_struct *vma, unsigned long address) + return -ENOMEM; + } + ++ /* Lock the VMA before expanding to prevent concurrent page faults */ ++ vma_start_write(vma); + /* + * vma->vm_start/vm_end cannot change under us because the caller + * is required to hold the mmap_lock in read mode. We need the +@@ -2062,6 +2064,8 @@ int expand_downwards(struct vm_area_struct *vma, unsigned long address) + return -ENOMEM; + } + ++ /* Lock the VMA before expanding to prevent concurrent page faults */ ++ vma_start_write(vma); + /* + * vma->vm_start/vm_end cannot change under us because the caller + * is required to hold the mmap_lock in read mode. We need the +-- +2.35.3 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch new/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch --- old/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch 2023-07-11 07:03:09.000000000 +0200 @@ -0,0 +1,48 @@ +From: Suren Baghdasaryan <sur...@google.com> +Date: Sat, 8 Jul 2023 12:12:11 -0700 +Subject: [PATCH] mm: lock newly mapped VMA which can be modified after it + becomes visible +Patch-mainline: 6.4.3 +References: bsc#1012628 bsc#1212775 +Git-commit: 33313a747e81af9f31d0d45de78c9397fa3655eb + +commit 33313a747e81af9f31d0d45de78c9397fa3655eb upstream. + +mmap_region adds a newly created VMA into VMA tree and might modify it +afterwards before dropping the mmap_lock. This poses a problem for page +faults handled under per-VMA locks because they don't take the mmap_lock +and can stumble on this VMA while it's still being modified. Currently +this does not pose a problem since post-addition modifications are done +only for file-backed VMAs, which are not handled under per-VMA lock. +However, once support for handling file-backed page faults with per-VMA +locks is added, this will become a race. + +Fix this by write-locking the VMA before inserting it into the VMA tree. +Other places where a new VMA is added into VMA tree do not modify it +after the insertion, so do not need the same locking. + +Cc: sta...@vger.kernel.org +Signed-off-by: Suren Baghdasaryan <sur...@google.com> +Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> +Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + mm/mmap.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/mm/mmap.c b/mm/mmap.c +index 059c0fb2..74e96a14 100644 +--- a/mm/mmap.c ++++ b/mm/mmap.c +@@ -2804,6 +2804,8 @@ unsigned long mmap_region(struct file *file, unsigned long addr, + if (vma->vm_file) + i_mmap_lock_write(vma->vm_file->f_mapping); + ++ /* Lock the VMA since it is modified after insertion into VMA tree */ ++ vma_start_write(vma); + vma_iter_store(&vmi, vma); + mm->map_count++; + if (vma->vm_file) { +-- +2.35.3 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch new/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch --- old/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch 2023-07-11 07:03:09.000000000 +0200 @@ -0,0 +1,49 @@ +From: Hugh Dickins <hu...@google.com> +Date: Sat, 8 Jul 2023 16:04:00 -0700 +Subject: [PATCH] mm: lock newly mapped VMA with corrected ordering +Patch-mainline: 6.4.3 +References: bsc#1012628 bsc#1212775 +Git-commit: 1c7873e3364570ec89343ff4877e0f27a7b21a61 + +commit 1c7873e3364570ec89343ff4877e0f27a7b21a61 upstream. + +Lockdep is certainly right to complain about + + (&vma->vm_lock->lock){++++}-{3:3}, at: vma_start_write+0x2d/0x3f + but task is already holding lock: + (&mapping->i_mmap_rwsem){+.+.}-{3:3}, at: mmap_region+0x4dc/0x6db + +Invert those to the usual ordering. + +Fixes: 33313a747e81 ("mm: lock newly mapped VMA which can be modified after it becomes visible") +Cc: sta...@vger.kernel.org +Signed-off-by: Hugh Dickins <hu...@google.com> +Tested-by: Suren Baghdasaryan <sur...@google.com> +Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> +Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + mm/mmap.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/mm/mmap.c b/mm/mmap.c +index 74e96a14..30bf7772 100644 +--- a/mm/mmap.c ++++ b/mm/mmap.c +@@ -2801,11 +2801,11 @@ unsigned long mmap_region(struct file *file, unsigned long addr, + if (vma_iter_prealloc(&vmi)) + goto close_and_free_vma; + ++ /* Lock the VMA since it is modified after insertion into VMA tree */ ++ vma_start_write(vma); + if (vma->vm_file) + i_mmap_lock_write(vma->vm_file->f_mapping); + +- /* Lock the VMA since it is modified after insertion into VMA tree */ +- vma_start_write(vma); + vma_iter_store(&vmi, vma); + mm->map_count++; + if (vma->vm_file) { +-- +2.35.3 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch new/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch --- old/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch 2023-07-11 07:03:09.000000000 +0200 @@ -0,0 +1,54 @@ +From: Peter Collingbourne <p...@google.com> +Date: Mon, 22 May 2023 17:43:08 -0700 +Subject: [PATCH] mm: call arch_swap_restore() from do_swap_page() +References: bsc#1012628 +Patch-mainline: 6.4.3 +Git-commit: 6dca4ac6fc91fd41ea4d6c4511838d37f4e0eab2 + +commit 6dca4ac6fc91fd41ea4d6c4511838d37f4e0eab2 upstream. + +Commit c145e0b47c77 ("mm: streamline COW logic in do_swap_page()") moved +the call to swap_free() before the call to set_pte_at(), which meant that +the MTE tags could end up being freed before set_pte_at() had a chance to +restore them. Fix it by adding a call to the arch_swap_restore() hook +before the call to swap_free(). + +Link: https://lkml.kernel.org/r/20230523004312.1807357-2-...@google.com +Link: https://linux-review.googlesource.com/id/I6470efa669e8bd2f841049b8c61020c510678965 +Fixes: c145e0b47c77 ("mm: streamline COW logic in do_swap_page()") +Signed-off-by: Peter Collingbourne <p...@google.com> +Reported-by: Qun-wei Lin <qun-wei....@mediatek.com> +Closes: https://lore.kernel.org/all/5050805753ac469e8d727c797c2218a9d780d434.ca...@mediatek.com/ +Acked-by: David Hildenbrand <da...@redhat.com> +Acked-by: "Huang, Ying" <ying.hu...@intel.com> +Reviewed-by: Steven Price <steven.pr...@arm.com> +Acked-by: Catalin Marinas <catalin.mari...@arm.com> +Cc: <sta...@vger.kernel.org> [6.1+] +Signed-off-by: Andrew Morton <a...@linux-foundation.org> +Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + mm/memory.c | 7 +++++++ + 1 file changed, 7 insertions(+) + +diff --git a/mm/memory.c b/mm/memory.c +index 5ce82a76..07bab1e7 100644 +--- a/mm/memory.c ++++ b/mm/memory.c +@@ -3932,6 +3932,13 @@ vm_fault_t do_swap_page(struct vm_fault *vmf) + } + } + ++ /* ++ * Some architectures may have to restore extra metadata to the page ++ * when reading from swap. This metadata may be indexed by swap entry ++ * so this must be called before swap_free(). ++ */ ++ arch_swap_restore(entry, folio); ++ + /* + * Remove the swap entry and conditionally try to free up the swapcache. + * We're already holding a reference on the page but haven't mapped it +-- +2.35.3 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch new/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch --- old/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch 2023-07-11 07:03:09.000000000 +0200 @@ -0,0 +1,56 @@ +From: Liu Shixin <liushix...@huawei.com> +Date: Tue, 4 Jul 2023 18:19:42 +0800 +Subject: [PATCH] bootmem: remove the vmemmap pages from kmemleak in + free_bootmem_page +References: bsc#1012628 +Patch-mainline: 6.4.3 +Git-commit: 028725e73375a1ff080bbdf9fb503306d0116f28 + +commit 028725e73375a1ff080bbdf9fb503306d0116f28 upstream. + +commit dd0ff4d12dd2 ("bootmem: remove the vmemmap pages from kmemleak in +put_page_bootmem") fix an overlaps existing problem of kmemleak. But the +problem still existed when HAVE_BOOTMEM_INFO_NODE is disabled, because in +this case, free_bootmem_page() will call free_reserved_page() directly. + +Fix the problem by adding kmemleak_free_part() in free_bootmem_page() when +HAVE_BOOTMEM_INFO_NODE is disabled. + +Link: https://lkml.kernel.org/r/20230704101942.2819426-1-liushix...@huawei.com +Fixes: f41f2ed43ca5 ("mm: hugetlb: free the vmemmap pages associated with each HugeTLB page") +Signed-off-by: Liu Shixin <liushix...@huawei.com> +Acked-by: Muchun Song <songmuc...@bytedance.com> +Cc: Matthew Wilcox <wi...@infradead.org> +Cc: Mike Kravetz <mike.krav...@oracle.com> +Cc: Oscar Salvador <osalva...@suse.de> +Cc: <sta...@vger.kernel.org> +Signed-off-by: Andrew Morton <a...@linux-foundation.org> +Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + include/linux/bootmem_info.h | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/include/linux/bootmem_info.h b/include/linux/bootmem_info.h +index cc35d010..e1a3c9c9 100644 +--- a/include/linux/bootmem_info.h ++++ b/include/linux/bootmem_info.h +@@ -3,6 +3,7 @@ + #define __LINUX_BOOTMEM_INFO_H + + #include <linux/mm.h> ++#include <linux/kmemleak.h> + + /* + * Types for free bootmem stored in page->lru.next. These have to be in +@@ -59,6 +60,7 @@ static inline void get_page_bootmem(unsigned long info, struct page *page, + + static inline void free_bootmem_page(struct page *page) + { ++ kmemleak_free_part(page_to_virt(page), PAGE_SIZE); + free_reserved_page(page); + } + #endif +-- +2.35.3 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch new/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch --- old/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch 2023-07-11 07:03:09.000000000 +0200 @@ -0,0 +1,70 @@ +From: Suren Baghdasaryan <sur...@google.com> +Date: Sat, 8 Jul 2023 12:12:12 -0700 +Subject: [PATCH] fork: lock VMAs of the parent process when forking +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit +Patch-mainline: 6.4.3 +References: bsc#1012628 bsc#1212775 +Git-commit: fb49c455323ff8319a123dd312be9082c49a23a5 + +commit fb49c455323ff8319a123dd312be9082c49a23a5 upstream. + +When forking a child process, the parent write-protects anonymous pages +and COW-shares them with the child being forked using copy_present_pte(). + +We must not take any concurrent page faults on the source vma's as they +are being processed, as we expect both the vma and the pte's behind it +to be stable. For example, the anon_vma_fork() expects the parents +vma->anon_vma to not change during the vma copy. + +A concurrent page fault on a page newly marked read-only by the page +copy might trigger wp_page_copy() and a anon_vma_prepare(vma) on the +source vma, defeating the anon_vma_clone() that wasn't done because the +parent vma originally didn't have an anon_vma, but we now might end up +copying a pte entry for a page that has one. + +Before the per-vma lock based changes, the mmap_lock guaranteed +exclusion with concurrent page faults. But now we need to do a +vma_start_write() to make sure no concurrent faults happen on this vma +while it is being processed. + +This fix can potentially regress some fork-heavy workloads. Kernel +build time did not show noticeable regression on a 56-core machine while +a stress test mapping 10000 VMAs and forking 5000 times in a tight loop +shows ~5% regression. If such fork time regression is unacceptable, +disabling CONFIG_PER_VMA_LOCK should restore its performance. Further +optimizations are possible if this regression proves to be problematic. + +Suggested-by: David Hildenbrand <da...@redhat.com> +Reported-by: Jiri Slaby <jirisl...@kernel.org> +Closes: https://lore.kernel.org/all/dbdef34c-3a07-5951-e1ae-e9c6e3cdf...@kernel.org/ +Reported-by: Holger Hoffstätte <hol...@applied-asynchrony.com> +Closes: https://lore.kernel.org/all/b198d649-f4bf-b971-31d0-e8433ec2a...@applied-asynchrony.com/ +Reported-by: Jacob Young <jacobly....@gmail.com> +Closes: https://bugzilla.kernel.org/show_bug.cgi?id=217624 +Fixes: 0bff0aaea03e ("x86/mm: try VMA lock-based page fault handling first") +Cc: sta...@vger.kernel.org +Signed-off-by: Suren Baghdasaryan <sur...@google.com> +Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> +Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + kernel/fork.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/kernel/fork.c b/kernel/fork.c +index 41c96410..8103ffd2 100644 +--- a/kernel/fork.c ++++ b/kernel/fork.c +@@ -690,6 +690,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm, + for_each_vma(old_vmi, mpnt) { + struct file *file; + ++ vma_start_write(mpnt); + if (mpnt->vm_flags & VM_DONTCOPY) { + vm_stat_account(mm, mpnt->vm_flags, -vma_pages(mpnt)); + continue; +-- +2.35.3 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch new/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch --- old/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch 1970-01-01 01:00:00.000000000 +0100 +++ new/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch 2023-07-11 07:03:09.000000000 +0200 @@ -0,0 +1,40 @@ +From: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Date: Tue, 11 Jul 2023 06:31:05 +0200 +Subject: [PATCH] Linux 6.4.3 +References: bsc#1012628 +Patch-mainline: 6.4.3 +Git-commit: 160f4124ea8b4cd6c86867e111fa55e266345a16 + +Link: https://lore.kernel.org/r/20230709111345.297026...@linuxfoundation.org +Tested-by: Ronald Warsow <rwar...@gmx.de +Link: https://lore.kernel.org/r/20230709203826.141774...@linuxfoundation.org +Tested-by: Ronald Warsow <rwar...@gmx.de> +Tested-by: Bagas Sanjaya <bagasdo...@gmail.com> +Tested-by: Linux Kernel Functional Testing <l...@linaro.org> +Tested-by: Chris Paterson (CIP) <chris.paters...@renesas.com> +Tested-by: Salvatore Bonaccorso <car...@debian.org> +Tested-by: Guenter Roeck <li...@roeck-us.net> +Tested-by: Takeshi Ogasawara <takeshi.ogasaw...@futuring-girl.com> +Tested-by: Ron Economos <r...@w6rz.net> +Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> +Signed-off-by: Jiri Slaby <jsl...@suse.cz> +--- + Makefile | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/Makefile b/Makefile +index bcac8155..56abbcac 100644 +--- a/Makefile ++++ b/Makefile +@@ -1,7 +1,7 @@ + # SPDX-License-Identifier: GPL-2.0 + VERSION = 6 + PATCHLEVEL = 4 +-SUBLEVEL = 2 ++SUBLEVEL = 3 + EXTRAVERSION = + NAME = Hurr durr I'ma ninja sloth + +-- +2.35.3 + ++++++ patches.suse.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch new/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch --- old/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch 2023-07-10 12:03:25.000000000 +0200 +++ new/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,67 +0,0 @@ -From: Suren Baghdasaryan <sur...@google.com> -Date: Sat, 8 Jul 2023 12:12:12 -0700 -Subject: fork: lock VMAs of the parent process when forking -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit -Git-commit: fb49c455323ff8319a123dd312be9082c49a23a5 -Patch-mainline: v6.5-rc1 -References: bsc#1212775 - -When forking a child process, the parent write-protects anonymous pages -and COW-shares them with the child being forked using copy_present_pte(). - -We must not take any concurrent page faults on the source vma's as they -are being processed, as we expect both the vma and the pte's behind it -to be stable. For example, the anon_vma_fork() expects the parents -vma->anon_vma to not change during the vma copy. - -A concurrent page fault on a page newly marked read-only by the page -copy might trigger wp_page_copy() and a anon_vma_prepare(vma) on the -source vma, defeating the anon_vma_clone() that wasn't done because the -parent vma originally didn't have an anon_vma, but we now might end up -copying a pte entry for a page that has one. - -Before the per-vma lock based changes, the mmap_lock guaranteed -exclusion with concurrent page faults. But now we need to do a -vma_start_write() to make sure no concurrent faults happen on this vma -while it is being processed. - -This fix can potentially regress some fork-heavy workloads. Kernel -build time did not show noticeable regression on a 56-core machine while -a stress test mapping 10000 VMAs and forking 5000 times in a tight loop -shows ~5% regression. If such fork time regression is unacceptable, -disabling CONFIG_PER_VMA_LOCK should restore its performance. Further -optimizations are possible if this regression proves to be problematic. - -Suggested-by: David Hildenbrand <da...@redhat.com> -Reported-by: Jiri Slaby <jirisl...@kernel.org> -Closes: https://lore.kernel.org/all/dbdef34c-3a07-5951-e1ae-e9c6e3cdf...@kernel.org/ -Reported-by: Holger Hoffstätte <hol...@applied-asynchrony.com> -Closes: https://lore.kernel.org/all/b198d649-f4bf-b971-31d0-e8433ec2a...@applied-asynchrony.com/ -Reported-by: Jacob Young <jacobly....@gmail.com> -Closes: https://bugzilla.kernel.org/show_bug.cgi?id=217624 -Fixes: 0bff0aaea03e ("x86/mm: try VMA lock-based page fault handling first") -Cc: sta...@vger.kernel.org -Signed-off-by: Suren Baghdasaryan <sur...@google.com> -Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> -Signed-off-by: Jiri Slaby <jsl...@suse.cz> ---- - kernel/fork.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/kernel/fork.c b/kernel/fork.c -index b85814e6..d2e12b6d 100644 ---- a/kernel/fork.c -+++ b/kernel/fork.c -@@ -686,6 +686,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm, - for_each_vma(old_vmi, mpnt) { - struct file *file; - -+ vma_start_write(mpnt); - if (mpnt->vm_flags & VM_DONTCOPY) { - vm_stat_account(mm, mpnt->vm_flags, -vma_pages(mpnt)); - continue; --- -2.35.3 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/mm-lock-a-vma-before-stack-expansion.patch new/patches.suse/mm-lock-a-vma-before-stack-expansion.patch --- old/patches.suse/mm-lock-a-vma-before-stack-expansion.patch 2023-07-10 12:03:25.000000000 +0200 +++ new/patches.suse/mm-lock-a-vma-before-stack-expansion.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,45 +0,0 @@ -From: Suren Baghdasaryan <sur...@google.com> -Date: Sat, 8 Jul 2023 12:12:10 -0700 -Subject: mm: lock a vma before stack expansion -Git-commit: c137381f71aec755fbf47cd4e9bd4dce752c054c -Patch-mainline: v6.5-rc1 -References: bsc#1212775 - -With recent changes necessitating mmap_lock to be held for write while -expanding a stack, per-VMA locks should follow the same rules and be -write-locked to prevent page faults into the VMA being expanded. Add -the necessary locking. - -Cc: sta...@vger.kernel.org -Signed-off-by: Suren Baghdasaryan <sur...@google.com> -Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> -Signed-off-by: Jiri Slaby <jsl...@suse.cz> ---- - mm/mmap.c | 4 ++++ - 1 file changed, 4 insertions(+) - -diff --git a/mm/mmap.c b/mm/mmap.c -index 204ddcd5..c66e4622 100644 ---- a/mm/mmap.c -+++ b/mm/mmap.c -@@ -1977,6 +1977,8 @@ static int expand_upwards(struct vm_area_struct *vma, unsigned long address) - return -ENOMEM; - } - -+ /* Lock the VMA before expanding to prevent concurrent page faults */ -+ vma_start_write(vma); - /* - * vma->vm_start/vm_end cannot change under us because the caller - * is required to hold the mmap_lock in read mode. We need the -@@ -2064,6 +2066,8 @@ int expand_downwards(struct vm_area_struct *vma, unsigned long address) - return -ENOMEM; - } - -+ /* Lock the VMA before expanding to prevent concurrent page faults */ -+ vma_start_write(vma); - /* - * vma->vm_start/vm_end cannot change under us because the caller - * is required to hold the mmap_lock in read mode. We need the --- -2.35.3 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch new/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch --- old/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch 2023-07-10 12:03:25.000000000 +0200 +++ new/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,45 +0,0 @@ -From: Suren Baghdasaryan <sur...@google.com> -Date: Sat, 8 Jul 2023 12:12:11 -0700 -Subject: mm: lock newly mapped VMA which can be modified after it becomes - visible -Git-commit: 33313a747e81af9f31d0d45de78c9397fa3655eb -Patch-mainline: v6.5-rc1 -References: bsc#1212775 - -mmap_region adds a newly created VMA into VMA tree and might modify it -afterwards before dropping the mmap_lock. This poses a problem for page -faults handled under per-VMA locks because they don't take the mmap_lock -and can stumble on this VMA while it's still being modified. Currently -this does not pose a problem since post-addition modifications are done -only for file-backed VMAs, which are not handled under per-VMA lock. -However, once support for handling file-backed page faults with per-VMA -locks is added, this will become a race. - -Fix this by write-locking the VMA before inserting it into the VMA tree. -Other places where a new VMA is added into VMA tree do not modify it -after the insertion, so do not need the same locking. - -Cc: sta...@vger.kernel.org -Signed-off-by: Suren Baghdasaryan <sur...@google.com> -Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> -Signed-off-by: Jiri Slaby <jsl...@suse.cz> ---- - mm/mmap.c | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/mm/mmap.c b/mm/mmap.c -index c66e4622..84c71431 100644 ---- a/mm/mmap.c -+++ b/mm/mmap.c -@@ -2812,6 +2812,8 @@ unsigned long mmap_region(struct file *file, unsigned long addr, - if (vma->vm_file) - i_mmap_lock_write(vma->vm_file->f_mapping); - -+ /* Lock the VMA since it is modified after insertion into VMA tree */ -+ vma_start_write(vma); - vma_iter_store(&vmi, vma); - mm->map_count++; - if (vma->vm_file) { --- -2.35.3 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch new/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch --- old/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch 2023-07-10 12:03:25.000000000 +0200 +++ new/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch 1970-01-01 01:00:00.000000000 +0100 @@ -1,46 +0,0 @@ -From: Hugh Dickins <hu...@google.com> -Date: Sat, 8 Jul 2023 16:04:00 -0700 -Subject: mm: lock newly mapped VMA with corrected ordering -Git-commit: 1c7873e3364570ec89343ff4877e0f27a7b21a61 -Patch-mainline: v6.5-rc1 -References: bsc#1212775 - -Lockdep is certainly right to complain about - - (&vma->vm_lock->lock){++++}-{3:3}, at: vma_start_write+0x2d/0x3f - but task is already holding lock: - (&mapping->i_mmap_rwsem){+.+.}-{3:3}, at: mmap_region+0x4dc/0x6db - -Invert those to the usual ordering. - -Fixes: 33313a747e81 ("mm: lock newly mapped VMA which can be modified after it becomes visible") -Cc: sta...@vger.kernel.org -Signed-off-by: Hugh Dickins <hu...@google.com> -Tested-by: Suren Baghdasaryan <sur...@google.com> -Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> -Signed-off-by: Jiri Slaby <jsl...@suse.cz> ---- - mm/mmap.c | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/mm/mmap.c b/mm/mmap.c -index 84c71431..3eda23c9 100644 ---- a/mm/mmap.c -+++ b/mm/mmap.c -@@ -2809,11 +2809,11 @@ unsigned long mmap_region(struct file *file, unsigned long addr, - if (vma_iter_prealloc(&vmi)) - goto close_and_free_vma; - -+ /* Lock the VMA since it is modified after insertion into VMA tree */ -+ vma_start_write(vma); - if (vma->vm_file) - i_mmap_lock_write(vma->vm_file->f_mapping); - -- /* Lock the VMA since it is modified after insertion into VMA tree */ -- vma_start_write(vma); - vma_iter_store(&vmi, vma); - mm->map_count++; - if (vma->vm_file) { --- -2.35.3 - ++++++ series.conf ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:43.827962003 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:43.831962027 +0200 @@ -75,6 +75,13 @@ patches.kernel.org/6.4.2-013-drm-amdgpu-Validate-VM-ioctl-flags.patch patches.kernel.org/6.4.2-014-arch-arm64-mm-fault-Fix-undeclared-variable-err.patch patches.kernel.org/6.4.2-015-Linux-6.4.2.patch + patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch + patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch + patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch + patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch + patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch + patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch + patches.kernel.org/6.4.3-007-Linux-6.4.3.patch ######################################################## # Build fixes that apply to the vanilla kernel too. @@ -104,10 +111,6 @@ ######################################################## patches.suse/regulator-axp20x-Add-AXP15060-support.patch patches.suse/HID-microsoft-Add-rumble-support-to-latest-xbox-cont.patch - patches.suse/mm-lock-a-vma-before-stack-expansion.patch - patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch - patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch - patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch ######################################################## # end of sorted patches ######################################################## @@ -217,11 +220,11 @@ # Bug 1198101 - VUL-0: shim: openSUSE tumbleweed not fully locked down? Add opensuse-cert-prompt back to openSUSE shim # Lock down functions for secure boot -+jlee patches.suse/0001-security-lockdown-expose-a-hook-to-lock-the-kernel-down.patch -+jlee patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch -+jlee patches.suse/0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mode.patch -+jlee patches.suse/0004-efi-Lock-down-the-kernel-at-the-integrity-level-if-b.patch -+jlee patches.suse/arm64-lock-down-kernel-in-secure-boot-mode.patch + patches.suse/0001-security-lockdown-expose-a-hook-to-lock-the-kernel-down.patch + patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch + patches.suse/0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mode.patch + patches.suse/0004-efi-Lock-down-the-kernel-at-the-integrity-level-if-b.patch + patches.suse/arm64-lock-down-kernel-in-secure-boot-mode.patch # crypto ++++++ source-timestamp ++++++ --- /var/tmp/diff_new_pack.NSmxXP/_old 2023-07-16 17:28:43.847962123 +0200 +++ /var/tmp/diff_new_pack.NSmxXP/_new 2023-07-16 17:28:43.851962147 +0200 @@ -1,4 +1,4 @@ -2023-07-10 10:03:25 +0000 -GIT Revision: b97b89494481f3409297e494e466bdd42b1311ab +2023-07-11 06:23:11 +0000 +GIT Revision: 5ab030f1f07fd96746960bce337ec62fc11b6a9a GIT Branch: stable