Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kernel-source for openSUSE:Factory 
checked in at 2023-07-16 17:28:34
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kernel-source (Old)
 and      /work/SRC/openSUSE:Factory/.kernel-source.new.3193 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kernel-source"

Sun Jul 16 17:28:34 2023 rev:696 rq:1098277 version:6.4.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/kernel-source/dtb-aarch64.changes        
2023-07-11 15:56:54.373032780 +0200
+++ /work/SRC/openSUSE:Factory/.kernel-source.new.3193/dtb-aarch64.changes      
2023-07-16 17:28:36.711919435 +0200
@@ -1,0 +2,9 @@
+Tue Jul 11 07:03:09 CEST 2023 - jsl...@suse.cz
+
+- Linux 6.4.3 (bsc#1012628).
+- mm: call arch_swap_restore() from do_swap_page() (bsc#1012628).
+- bootmem: remove the vmemmap pages from kmemleak in
+  free_bootmem_page (bsc#1012628).
+- commit 5fb5b21
+
+-------------------------------------------------------------------
@@ -2019 +2028 @@
-- commit 0d0e269
+- commit 5ab030f
dtb-armv6l.changes: same change
dtb-armv7l.changes: same change
dtb-riscv64.changes: same change
kernel-64kb.changes: same change
kernel-debug.changes: same change
kernel-default.changes: same change
kernel-docs.changes: same change
kernel-kvmsmall.changes: same change
kernel-lpae.changes: same change
kernel-obs-build.changes: same change
kernel-obs-qa.changes: same change
kernel-pae.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-vanilla.changes: same change
kernel-zfcpdump.changes: same change

New:
----
  _buildconfig-standard-x86_64
  _buildinfo-standard-x86_64.xml

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dtb-aarch64.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.327953030 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.331953054 +0200
@@ -17,7 +17,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -25,9 +25,9 @@
 %(chmod +x 
%_sourcedir/{guards,apply-patches,check-for-config-changes,group-source-files.pl,split-modules,modversions,kabi.pl,mkspec,compute-PATCHVERSION.sh,arch-symbols,log.sh,try-disable-staging-driver,compress-vmlinux.sh,mkspec-dtb,check-module-license,klp-symbols,splitflist,mergedep,moddep,modflist,kernel-subpackage-build})
 
 Name:           dtb-aarch64
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif

dtb-armv6l.spec: same change
dtb-armv7l.spec: same change
dtb-riscv64.spec: same change
++++++ kernel-64kb.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.435953676 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.439953700 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        Kernel with 64kb PAGE_SIZE
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -245,10 +245,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 # END COMMON DEPS
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 %obsolete_rebuilds %name
 Source0:        
https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc
@@ -1346,8 +1346,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

++++++ kernel-debug.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.463953844 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.467953868 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        A Debug Version of the Kernel
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -245,10 +245,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 # END COMMON DEPS
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 %ifarch ppc64
 Provides:       kernel-kdump = 2.6.28
 Obsoletes:      kernel-kdump <= 2.6.28
@@ -1352,8 +1352,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 
 %ifarch ppc64
 Provides:       kernel-kdump-base = 2.6.28

++++++ kernel-default.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.491954011 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.495954035 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        The Standard Kernel
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -245,10 +245,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 # END COMMON DEPS
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 %ifarch %ix86
 Provides:       kernel-smp = 2.6.17
 Obsoletes:      kernel-smp <= 2.6.17
@@ -1395,8 +1395,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 
 %ifarch %ix86
 Provides:       kernel-trace-base = 3.13

++++++ kernel-docs.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.515954155 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.519954179 +0200
@@ -17,7 +17,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 %define build_html 1
 %define build_pdf 0
@@ -30,9 +30,9 @@
 Summary:        Kernel Documentation
 License:        GPL-2.0-only
 Group:          Documentation/Man
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -83,7 +83,7 @@
 %endif
 URL:            https://www.kernel.org/
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 BuildArch:      noarch
 Source0:        
https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc

++++++ kernel-kvmsmall.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.543954322 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.547954346 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        The Small Developer Kernel for KVM
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -245,10 +245,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 # END COMMON DEPS
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 %obsolete_rebuilds %name
 Source0:        
https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc
@@ -1350,8 +1350,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

kernel-lpae.spec: same change
++++++ kernel-obs-build.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.599954657 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.603954681 +0200
@@ -19,7 +19,7 @@
 
 #!BuildIgnore: post-build-checks
 
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -44,7 +44,7 @@
 %endif
 %endif
 %endif
-BuildRequires:  
kernel%kernel_flavor-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+BuildRequires:  
kernel%kernel_flavor-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 
 %if 0%{?rhel_version}
 BuildRequires:  kernel
@@ -56,9 +56,9 @@
 Summary:        package kernel and initrd for OBS VM builds
 License:        GPL-2.0-only
 Group:          SLES
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif

++++++ kernel-obs-qa.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.627954825 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.631954849 +0200
@@ -17,7 +17,7 @@
 # needsrootforbuild
 
 
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -32,9 +32,9 @@
 Summary:        Basic QA tests for the kernel
 License:        GPL-2.0-only
 Group:          SLES
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif

++++++ kernel-pae.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.651954969 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.659955016 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        Kernel with PAE Support
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -245,10 +245,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 # END COMMON DEPS
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 %ifarch %ix86
 Provides:       kernel-bigsmp = 2.6.17
 Obsoletes:      kernel-bigsmp <= 2.6.17
@@ -1372,8 +1372,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 
 %ifarch %ix86
 Provides:       kernel-vmi-base = 2.6.38

++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.683955160 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.687955184 +0200
@@ -17,7 +17,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 
 %include %_sourcedir/kernel-spec-macros
@@ -30,9 +30,9 @@
 %endif
 
 Name:           kernel-source
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -49,7 +49,7 @@
 BuildRequires:  sed
 Requires(post): coreutils sed
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 Provides:       linux
 Provides:       multiversion(kernel)
 Source0:        
https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz

++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.711955327 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.715955352 +0200
@@ -24,10 +24,10 @@
 Summary:        Kernel Symbol Versions (modversions)
 License:        GPL-2.0-only
 Group:          Development/Sources
-Version:        6.4.2
+Version:        6.4.3
 %if %using_buildservice
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -52,7 +52,7 @@
 %endif
 Requires:       pesign-obs-integration
 Provides:       %name = %version-%source_rel
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 Provides:       multiversion(kernel)
 Source:         README.KSYMS
 Requires:       kernel-devel%variant = %version-%source_rel

++++++ kernel-vanilla.spec ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:42.739955495 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:42.747955543 +0200
@@ -18,7 +18,7 @@
 
 
 %define srcversion 6.4
-%define patchversion 6.4.2
+%define patchversion 6.4.3
 %define variant %{nil}
 %define compress_modules zstd
 %define compress_vmlinux xz
@@ -112,9 +112,9 @@
 Summary:        The Standard Kernel - without any SUSE patches
 License:        GPL-2.0-only
 Group:          System/Kernel
-Version:        6.4.2
+Version:        6.4.3
 %if 0%{?is_kotd}
-Release:        <RELEASE>.gb97b894
+Release:        <RELEASE>.g5ab030f
 %else
 Release:        0
 %endif
@@ -245,10 +245,10 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 # END COMMON DEPS
-Provides:       %name-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       %name-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 %obsolete_rebuilds %name
 Source0:        
https://www.kernel.org/pub/linux/kernel/v6.x/linux-%srcversion.tar.xz
 Source3:        kernel-source.rpmlintrc
@@ -1343,8 +1343,8 @@
 Conflicts:      libc.so.6()(64bit)
 %endif
 Provides:       kernel = %version-%source_rel
-Provides:       
kernel-%build_flavor-base-srchash-b97b89494481f3409297e494e466bdd42b1311ab
-Provides:       kernel-srchash-b97b89494481f3409297e494e466bdd42b1311ab
+Provides:       
kernel-%build_flavor-base-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
+Provides:       kernel-srchash-5ab030f1f07fd96746960bce337ec62fc11b6a9a
 
 %obsolete_rebuilds %name-base
 %ifarch %ix86

kernel-zfcpdump.spec: same change
++++++ _buildconfig-standard-x86_64 ++++++
++++ 3863 lines (skipped)

++++++ _buildinfo-standard-x86_64.xml ++++++
<buildinfo project="Devel:Kernel:stable" repository="standard" 
downloadurl="http://download.suse.de/ibs";>
  <arch>x86_64</arch>
  <debuginfo>1</debuginfo>
  <subpack>kernel-default</subpack>
  <subpack>kernel-default-devel</subpack>
  <subpack>kernel-default-extra</subpack>
  <subpack>kernel-default-vdso</subpack>
  <bdep name="liblua5_4-5" preinstall="1" notmeta="1" version="5.4.6" 
release="1.46" arch="x86_64" hdrmd5="215092f3b9788e833f0a56d345ecaff2" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="aaa_base" preinstall="1" notmeta="1" 
version="84.87+git20230329.b39efbc" release="1.4" arch="x86_64" 
hdrmd5="40d26d16f91bce0c24682a4350af3db5" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="filesystem" preinstall="1" notmeta="1" version="84.87" 
release="12.1" arch="x86_64" hdrmd5="90c43fd93bc3e3084c58148ff7c9a648" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="attr" preinstall="1" notmeta="1" version="2.5.1" release="1.423" 
arch="x86_64" hdrmd5="5d84d4daecbd21a5b3b62c07c76c889f" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="bash" preinstall="1" notmeta="1" version="5.2.15" release="8.84" 
arch="x86_64" hdrmd5="faed6a0fea297e36628f564ffe590f55" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="bash-sh" preinstall="1" version="5.2.15" release="8.84" 
arch="noarch" hdrmd5="c05b64ea61a5ac8f05f4200a42559139" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="coreutils" preinstall="1" version="9.3" release="1.85" 
arch="x86_64" hdrmd5="bb20b2cd8c865b44a60272da10a44bad" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="diffutils" preinstall="1" notmeta="1" version="3.10" 
release="1.59" arch="x86_64" hdrmd5="7e951654e14f45b3ae8f7fcd6f55f734" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="fillup" preinstall="1" notmeta="1" version="1.42" release="279.4" 
arch="x86_64" hdrmd5="bd75eb15b28f4051d521ab22795d2286" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="glibc" preinstall="1" notmeta="1" version="2.37" release="4.43" 
arch="x86_64" hdrmd5="d409d342ed7bd79fd43b5d320b469f46" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="grep" preinstall="1" notmeta="1" version="3.11" release="1.2" 
arch="x86_64" hdrmd5="3757c8d331cdf02276ab1850c3055a64" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="pam" preinstall="1" notmeta="1" version="1.5.3" release="1.68" 
arch="x86_64" hdrmd5="4d6afb7e4fdfb82245614793bbbcb3c9" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="permissions" preinstall="1" notmeta="1" version="1699_20230602" 
release="1.27" arch="x86_64" hdrmd5="23b119779a8ee81066874b0a9416f698" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="rpm" preinstall="1" notmeta="1" version="4.18.0" release="5.31" 
arch="x86_64" hdrmd5="592c5c62a8f00913408f48f4954ae805" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="rpm-config-SUSE" preinstall="1" notmeta="1" version="20220926" 
release="1.4" arch="noarch" hdrmd5="a983c39701f2a013d776343ee9891e58" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="sed" preinstall="1" notmeta="1" version="4.9" release="2.7" 
arch="x86_64" hdrmd5="ca9875eba8bb7bbd41837c1fffae365d" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="tar" preinstall="1" notmeta="1" version="1.34" release="10.7" 
arch="x86_64" hdrmd5="7b281ed9aacdcc5f78384712ea6a8b58" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libbz2-1" preinstall="1" notmeta="1" version="1.0.8" 
release="5.169" arch="x86_64" hdrmd5="ec8745849dfd6e791d12236cefab1204" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libgcc_s1" preinstall="1" notmeta="1" version="13.1.1+git7364" 
release="1.48" arch="x86_64" hdrmd5="2434c9ccf107768b822633e365202e32" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libncurses6" preinstall="1" notmeta="1" version="6.4.20230617" 
release="15.16" arch="x86_64" hdrmd5="de18c02344fcc8956dde13bbdac367b4" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libreadline8" preinstall="1" notmeta="1" version="8.2" 
release="2.225" arch="x86_64" hdrmd5="befc0166d562133688771f539d5cf79f" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libz1" preinstall="1" notmeta="1" version="1.2.13" release="4.73" 
arch="x86_64" hdrmd5="ef1fa6392754d11997e02681f96aa17c" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libselinux1" preinstall="1" notmeta="1" version="3.5" 
release="3.27" arch="x86_64" hdrmd5="1ffa2c620ea21685cb4eee3a60d6ba73" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libgcrypt20" preinstall="1" notmeta="1" version="1.10.2" 
release="2.52" arch="x86_64" hdrmd5="05ba2a07624dbe826d29e2afe11706dc" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libgpg-error0" preinstall="1" notmeta="1" version="1.47" 
release="1.108" arch="x86_64" hdrmd5="a7dfd20d6d4907872b85b15ab06fad31" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="liblzma5" preinstall="1" notmeta="1" version="5.4.3" 
release="1.79" arch="x86_64" hdrmd5="324b2e4a6361a9dbbb69e93e11ba13db" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libcap2" preinstall="1" notmeta="1" version="2.69" release="1.66" 
arch="x86_64" hdrmd5="9cc7cdb524274c0b3da3d6c0fe23564b" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libacl1" preinstall="1" notmeta="1" version="2.3.1" 
release="2.285" arch="x86_64" hdrmd5="74f12861ada62b83df820b6892d886c3" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libattr1" preinstall="1" notmeta="1" version="2.5.1" 
release="1.423" arch="x86_64" hdrmd5="436474df9ae3d520705f69d0e8f13d7d" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libpopt0" preinstall="1" notmeta="1" version="1.19" 
release="1.231" arch="x86_64" hdrmd5="1551e0f25db33a848d831f9436bc7fd6" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libelf1" preinstall="1" notmeta="1" version="0.189" 
release="3.76" arch="x86_64" hdrmd5="1c5ccd99d1df7153fef239467b0b4a74" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libzstd1" preinstall="1" notmeta="1" version="1.5.5" 
release="3.55" arch="x86_64" hdrmd5="f51232803d41ededcac1eda103a4fdf0" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libpcre2-8-0" preinstall="1" notmeta="1" version="10.42" 
release="3.183" arch="x86_64" hdrmd5="cf2fe5751a662bef2f55761198954883" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="util-linux" vminstall="1" version="2.39" release="1.10" 
arch="x86_64" hdrmd5="89e2a9d6cab33a38b4d6bf300e1363f3" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libmount1" vminstall="1" version="2.39" release="1.10" 
arch="x86_64" hdrmd5="f98afb4820f209190f71ea2a794fdff9" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="perl-base" vminstall="1" version="5.36.1" release="1.24" 
arch="x86_64" hdrmd5="d15198b1af001af1e1e9d017baa2f4ef" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libdb-4_8" vminstall="1" notmeta="1" version="4.8.30" 
release="42.9" arch="x86_64" hdrmd5="ffb36acf1785032cdea0927929461433" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libblkid1" vminstall="1" version="2.39" release="1.10" 
arch="x86_64" hdrmd5="5cb92a52ab4cbf1bac8e532bd63239f8" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libuuid1" vminstall="1" version="2.39" release="1.10" 
arch="x86_64" hdrmd5="f70640b59a2e9ffb43304b7818c0df61" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libsmartcols1" vminstall="1" version="2.39" release="1.10" 
arch="x86_64" hdrmd5="5b62210322be7cd0f41ade51669a9419" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libcrypt1" vminstall="1" version="4.4.35" release="1.1" 
arch="x86_64" hdrmd5="8ee16c0dffa0ffefb0e8f6aa52d0cf91" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="kernel-obs-build" vminstall="1" notmeta="1" version="6.3.9" 
release="1.17" arch="x86_64" hdrmd5="3661aa4fd376d237752be7f1a9b1cde9" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="bc" version="1.07.1" release="4.452" arch="x86_64" 
hdrmd5="e813346cd68173f234fe404ceb46146e" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="bison" version="3.8.2" release="3.233" arch="x86_64" 
hdrmd5="c3e3562004a48c43419368aca9261ecb" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="fdupes" version="2.2.1" release="1.240" arch="x86_64" 
hdrmd5="c06a5ca73aead457581191d8184cfe97" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="flex" version="2.6.4" release="6.415" arch="x86_64" 
hdrmd5="331aeb994a7f125dde7ffa9db6909829" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="hmaccalc" version="0.9.14" release="2.471" arch="x86_64" 
hdrmd5="6800a6f31003d6916325076eb910ecc5" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="jq" version="1.6" release="3.9" arch="x86_64" 
hdrmd5="f32982bf3744ce2f6671b9d74c036f70" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libopenssl-devel" version="3.1.1" release="2.11" arch="noarch" 
hdrmd5="54effe6612cff23213305c9ea122ff26" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="openssl" version="3.1.1" release="2.11" arch="noarch" 
hdrmd5="581c34e127e127d77583524d8cf42631" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="pesign-obs-integration" version="10.2+git20230612.4699910" 
release="2.1" arch="x86_64" hdrmd5="70bec52b7eb3a89dac2136c8ae7a802e" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="dwarves" version="1.25" release="1.2" arch="x86_64" 
hdrmd5="f6f5dfadeff6afe7badc41756a84bf34" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libelf-devel" version="0.189" release="3.76" arch="x86_64" 
hdrmd5="fd919719d29a670bccca828b99dfe907" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="elfutils" version="0.189" release="3.76" arch="x86_64" 
hdrmd5="7bacadd96c504ad4ba44b4f2e5f82860" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="zstd" version="1.5.5" release="3.55" arch="x86_64" 
hdrmd5="a4ad63ecdf9d35224cf5ecd7cb3c0691" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="rpm-build" version="4.18.0" release="5.31" arch="x86_64" 
hdrmd5="5435bd950a8ffdf95015f99dea6a13d1" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="gcc-PIE" version="13" release="1.168" arch="x86_64" 
hdrmd5="9b04c0d66f289cb7cbe3565790f46b87" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="kmod" version="30" release="5.1" arch="x86_64" 
hdrmd5="8d5049bd7331ac946dab27df18fa873d" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="m4" version="1.4.18" release="7.251" arch="x86_64" 
hdrmd5="468a33c93c99f5775830781612229454" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libgmp10" version="6.2.1" release="4.364" arch="x86_64" 
hdrmd5="de6485b51ecd9d26cb0f1a5096dd2d50" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libstdc++6" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="8d5bf8858da7ef4d31d242c3c49666ef" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libfl-devel" version="2.6.4" release="6.415" arch="x86_64" 
hdrmd5="0e8b17bd735c32287bd2a1140e0d1593" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="mozilla-nss" version="3.90" release="1.2" arch="x86_64" 
hdrmd5="001c63deb6a34f4cf0e999a1bcbd2196" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="mozilla-nspr" version="4.35" release="1.16" arch="x86_64" 
hdrmd5="e40d70ea2795c84142bc2b784da3d802" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libjq1" version="1.6" release="3.9" arch="x86_64" 
hdrmd5="ac2afd3c9240228067cd50cb9b4ef63f" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="pkgconf-pkg-config" version="1.8.0" release="2.183" arch="x86_64" 
hdrmd5="e8a481328df6bf763239eab70db10a57" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libopenssl3" version="3.1.1" release="2.9" arch="x86_64" 
hdrmd5="9c72c0fc7d0e6e0d37d1f554bda345a0" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libopenssl-3-devel" version="3.1.1" release="2.9" arch="x86_64" 
hdrmd5="7f2d9ec16592aa9f007a38b02ac90d9a" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="openssl-3" version="3.1.1" release="2.9" arch="x86_64" 
hdrmd5="950076f8f52ce259912b963ceb96cf16" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="mozilla-nss-tools" version="3.90" release="1.2" arch="x86_64" 
hdrmd5="b3635b75e34645e7c5216b43c3a9bb62" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="fipscheck" version="1.7.0" release="1.211" arch="x86_64" 
hdrmd5="ff0c5620678d035c63328a3d2eda4e04" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="pesign" version="116" release="1.10" arch="x86_64" 
hdrmd5="2d694c7d930b043fbb57ebfa28570de5" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="suse-module-tools" version="16.0.32" release="1.1" arch="x86_64" 
hdrmd5="b0fcb0813bae9740c4e02a370d28aa05" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="python310-base" version="3.10.12" release="1.4" arch="x86_64" 
hdrmd5="e1aec7c20cb42c752b7464fba7b88444" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libbpf1" version="1.2.0" release="1.2" arch="x86_64" 
hdrmd5="7898c801a14199b060e816c0f57678ee" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libdwarves1" version="1.25" release="1.2" arch="x86_64" 
hdrmd5="9610046282d5431a928897e1bf1ef586" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="glibc-devel" version="2.37" release="4.43" arch="x86_64" 
hdrmd5="0694e30d0386f19b692da82721817bb4" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libdw1" version="0.189" release="3.76" arch="x86_64" 
hdrmd5="531559a31931aeafa67f3df1cb8e4c51" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libasm1" version="0.189" release="3.76" arch="x86_64" 
hdrmd5="ef8fc22bc0ee75b7f6bfd3cd58f60b57" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="findutils" version="4.9.0" release="2.192" arch="x86_64" 
hdrmd5="cd7d3205608f29706e00d9f39fda7668" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="xz" version="5.4.3" release="1.79" arch="x86_64" 
hdrmd5="4fb86077af5b0dc2fd14aa271bae7e8c" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="gcc" version="13" release="1.168" arch="x86_64" 
hdrmd5="1a41853d9e6deee988efa7b0dcda1d7f" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="cpio" version="2.13" release="5.204" arch="x86_64" 
hdrmd5="1fc842e54aa87438c48e3f2f42ee9949" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="make" version="4.4.1" release="2.129" arch="x86_64" 
hdrmd5="d9e4074bcb153cc24b3aedc4b3084e38" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="bzip2" version="1.0.8" release="5.169" arch="x86_64" 
hdrmd5="d15bd37a55dc5aa025b0abafb4da9436" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="file" version="5.44" release="2.79" arch="x86_64" 
hdrmd5="aa892572891470bc252c0847a5a8c71f" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="binutils" version="2.40" release="5.33" arch="x86_64" 
hdrmd5="1e4bf50e76d57ddf6cb394ba5a09da0c" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="gawk" version="5.2.2" release="2.62" arch="x86_64" 
hdrmd5="4c3735f99b0a1e2f8ef4809cf03c3af4" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="patch" version="2.7.6" release="6.278" arch="x86_64" 
hdrmd5="4cf1ccce9019eca23528608c7c07fb9e" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="which" version="2.21" release="5.292" arch="x86_64" 
hdrmd5="da12908b83bcb0b55a9ad7721de73b33" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="glibc-locale-base" version="2.37" release="4.43" arch="x86_64" 
hdrmd5="b251981d5a1cd71087f70dfab0f403f5" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="dwz" version="0.15" release="2.229" arch="x86_64" 
hdrmd5="720a4e4e1c974239cd3c3f4bce2f34bb" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="systemd-rpm-macros" version="24" release="1.21" arch="noarch" 
hdrmd5="070828150b359e9cc72fc43950340253" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="librpmbuild9" version="4.18.0" release="5.31" arch="x86_64" 
hdrmd5="c861330e5e91284d3610aeed5fdadcc3" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="debugedit" version="5.0" release="5.227" arch="x86_64" 
hdrmd5="ce1865ea46b205f386d8a03e097d735d" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="gcc13-PIE" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="426b0c621532b36fe16e6facb3608a28" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="rpm-build-perl" version="4.18.0" release="5.31" arch="x86_64" 
hdrmd5="3b9e124d585947d4e5970f99a751178c" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="python-rpm-packaging" version="20210526+a18ca48" release="1.261" 
arch="noarch" hdrmd5="47554a60a3f24d87bd432c7cdceedfa6" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libfl2" version="2.6.4" release="6.415" arch="x86_64" 
hdrmd5="115aeebc323dea53f00b77ab8ae086ac" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libfreebl3" version="3.90" release="1.2" arch="x86_64" 
hdrmd5="689675aefa26e0d20179cf59d8e59b3a" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libsoftokn3" version="3.90" release="1.2" arch="x86_64" 
hdrmd5="4c3527b7733210a9830886c97c8ba758" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libonig5" version="6.9.8" release="1.15" arch="x86_64" 
hdrmd5="fba9be6581ea616fa7d9794508d101b9" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="pkgconf-m4" version="1.8.0" release="2.183" arch="noarch" 
hdrmd5="8714cb4343d2eeb2abb84a08abc7d688" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="pkgconf" version="1.8.0" release="2.183" arch="x86_64" 
hdrmd5="beeb3c703da67408952b3a71c752c4b8" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="crypto-policies" version="20230420.3d08ae7" release="1.54" 
arch="noarch" hdrmd5="f997400300ff78fb046c2551599ad3ab" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libfipscheck1" version="1.7.0" release="1.211" arch="x86_64" 
hdrmd5="ec76517cfde261bc03c64b09e522cb6f" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libefivar1" version="38" release="1.32" arch="x86_64" 
hdrmd5="bb96fd129b07451f23165fe322311786" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="sysuser-shadow" version="3.1" release="5.251" arch="noarch" 
hdrmd5="9fd262f3d4c0950ee21341c25c5bdd78" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libpython3_10-1_0" version="3.10.12" release="1.4" arch="x86_64" 
hdrmd5="32796fd11d1a8a7e6a7996bd239d46ee" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libexpat1" version="2.5.0" release="2.203" arch="x86_64" 
hdrmd5="75a7f2f8edcffeb49c95163e8c17c11b" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libffi8" version="3.4.4" release="1.220" arch="x86_64" 
hdrmd5="55e47e607a658e966e9a7887956746a0" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libmpdec3" version="2.5.1" release="2.372" arch="x86_64" 
hdrmd5="1bce08461151913727bddea875f6da58" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="linux-glibc-devel" version="6.4" release="1.4" arch="x86_64" 
hdrmd5="d4e562872462a856f13d5ae169146d6e" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libxcrypt-devel" version="4.4.35" release="1.1" arch="x86_64" 
hdrmd5="8427e7edda1452d19665efc3ee944655" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libmagic1" version="5.44" release="2.79" arch="x86_64" 
hdrmd5="633af0fcbc8b51030a58d80631acd200" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libaudit1" version="3.0.9" release="1.178" arch="x86_64" 
hdrmd5="e79a2fc57bcc86adfa3a803690bcadd1" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libcap-ng0" version="0.8.3" release="2.77" arch="x86_64" 
hdrmd5="934c33b11bda99635df692d8d38cafaa" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libeconf0" version="0.5.2" release="1.139" arch="x86_64" 
hdrmd5="2ed8f8db098313fcfe039bc2023755f7" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libutempter0" version="1.2.1" release="1.94" arch="x86_64" 
hdrmd5="905733337a21e4df40b04690cfe04028" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libfdisk1" version="2.39" release="1.10" arch="x86_64" 
hdrmd5="2304baff007ca6e53f08b45908ab1ad6" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="gcc13" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="138d4565e98b967afbea848f3f9a6045" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="cpp" version="13" release="1.168" arch="x86_64" 
hdrmd5="e5bbe3c2c600bc075df76f39bb384348" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libseccomp2" version="2.5.4" release="2.260" arch="x86_64" 
hdrmd5="9f266f49c909e526b0b6057e0d943109" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libctf-nobfd0" version="2.40" release="5.33" arch="x86_64" 
hdrmd5="58b29e84236f135fbd3f0931baaf5eb1" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libctf0" version="2.40" release="5.33" arch="x86_64" 
hdrmd5="74f945a58eccecc4c0a39b302ddb2eb9" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="update-alternatives" version="1.21.8" release="2.61" 
arch="x86_64" hdrmd5="ce6b337a9d219dc17c2fb04e2340bd1d" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libmpfr6" version="4.2.0" release="3.26" arch="x86_64" 
hdrmd5="5e63ca64768f081597991fba4aea1244" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="python310-packaging" version="23.1" release="2.90" arch="noarch" 
hdrmd5="5e11e7894ac3e7112212238fc12fe71c" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="python-rpm-macros" version="20230609.6fe8111" release="2.21" 
arch="noarch" hdrmd5="467f71d9a5adf820900ede0c01931d3d" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="system-user-root" version="20190513" release="2.324" 
arch="noarch" hdrmd5="0da330fbcf9fd54d3797ae25dd61f643" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="compat-usrmerge-tools" version="84.87" release="5.349" 
arch="x86_64" hdrmd5="9015aee464de04477ed9298c3c14c8cc" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="terminfo-base" version="6.4.20230617" release="15.16" 
arch="x86_64" hdrmd5="3ad0905e0c772b70c091d902c6eee8bc" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libsqlite3-0" version="3.42.0" release="1.3" arch="x86_64" 
hdrmd5="1f6bce6768a48bb2848b66e43c885fac" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libpkgconf3" version="1.8.0" release="2.183" arch="x86_64" 
hdrmd5="b0aaa4f3cdf6c686703be77e90102ece" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="chkstat" version="1699_20230602" release="1.27" arch="x86_64" 
hdrmd5="2ec6de3461edbd924404ce1f3e90f11f" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="permissions-config" version="1699_20230602" release="1.27" 
arch="noarch" hdrmd5="cf70207a578e47433509dd59ee318e92" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="file-magic" version="5.44" release="2.79" arch="noarch" 
hdrmd5="4407405f8b492049c4c50c374865192c" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="system-group-hardware" version="20170617" release="24.354" 
arch="noarch" hdrmd5="2e057d7eccae263b4550d9e4a2850ddc" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libmpc3" version="1.3.1" release="1.215" arch="x86_64" 
hdrmd5="d17cc377f2dd192f698beeaeefae46b8" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libisl23" version="0.26" release="1.122" arch="x86_64" 
hdrmd5="52f8ea215a0c32ee3b8be3ed6fe62849" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="cpp13" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="8b19787667cd585fb18e935a5cd89dd2" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libasan8" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="d78be04157793d8115541a2e97eea338" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libatomic1" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="2695ee38189b9d99351e536aba2301b1" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libgomp1" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="9ce38729ba6d397d353fb62a76a4b307" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libhwasan0" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="3d88324105cc439802cadcf3aede62ef" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libitm1" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="f435495162a3ba6d855e90a1fa20130b" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="liblsan0" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="9543f7d597b68ab88332d6f0ee56ea5d" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libtsan2" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="9eeb80c40194a7aae76bcf5cf38e085f" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libubsan1" version="13.1.1+git7364" release="1.48" arch="x86_64" 
hdrmd5="3483f53809f08f90acdd7c5a57f695ee" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="zlib-devel" version="1.2.13" release="4.73" arch="x86_64" 
hdrmd5="ce2884855b161ee72456d62acb3d0067" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libzstd-devel" version="1.5.5" release="3.55" arch="x86_64" 
hdrmd5="45fe373688364e102804fcc6b83d551e" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="gzip" version="1.12" release="3.200" arch="x86_64" 
hdrmd5="30179bae0e08fc8d2dc23d9996860f53" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="mozilla-nss-certs" version="3.90" release="1.2" arch="x86_64" 
hdrmd5="4ab2514ffa7d5fae1a72f7a45c3152c3" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="shadow" version="4.13" release="6.96" arch="x86_64" 
hdrmd5="48e443fdb256fa87641c5d1103ef8edf" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libsemanage2" version="3.5" release="1.178" arch="x86_64" 
hdrmd5="35bac053c1b96272ade04dd19c54dc30" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libsubid4" version="4.13" release="6.96" arch="x86_64" 
hdrmd5="ffd07b55fb003d8a9bf6a8416ed21935" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="login_defs" version="4.13" release="6.96" arch="noarch" 
hdrmd5="3dcb51fe2daf56953c15777b48c1967b" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libsepol2" version="3.5" release="1.184" arch="x86_64" 
hdrmd5="9887ac63011262162208104796dc36a6" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libsemanage-conf" version="3.5" release="1.178" arch="x86_64" 
hdrmd5="9ae281fe721692a63ca2ebe820848410" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="gdb" notmeta="1" version="13.2" release="1.1" arch="x86_64" 
hdrmd5="85fb0b5b7b2f8d96fd60e79a6712c85a" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="vim" notmeta="1" version="9.0.1632" release="1.1" arch="x86_64" 
hdrmd5="b862ef214ec5034251488f3903f63d3d" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="strace" notmeta="1" version="6.4" release="1.2" arch="x86_64" 
hdrmd5="8dea26627816c45e39e8651a18181754" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="less" notmeta="1" version="633" release="2.29" arch="x86_64" 
hdrmd5="48524d6db3e335ad7faf54fda46b7497" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="perl" notmeta="1" version="5.36.1" release="1.24" arch="x86_64" 
hdrmd5="5fcf8185bca6fb17182a73c999780b38" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="build-mkbaselibs" notmeta="1" version="20230628" release="1.1" 
arch="noarch" hdrmd5="f335b361ef0db387c349f7128c82b90c" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="compat-usrmerge-build" notmeta="1" version="84.87" 
release="5.349" arch="x86_64" hdrmd5="7a68fec8745a1f2cffdadbe84524e8d8" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="brp-check-suse" notmeta="1" version="84.87+git20230324.8680ce4" 
release="1.4" arch="x86_64" hdrmd5="13319d085c3363c98b95ac1c7630153d" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="post-build-checks" notmeta="1" 
version="84.87+git20230328.de7e9df" release="1.1" arch="noarch" 
hdrmd5="f9748fcaa2f76b21403b761f92cfc1ee" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="build-compare" notmeta="1" version="20230617T171717.50241a8" 
release="1.5" arch="noarch" hdrmd5="d2a2c7d0055ab91f729b0f1119fdf1d8" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="suse-module-tools-scriptlets" notmeta="1" version="16.0.32" 
release="1.1" arch="x86_64" hdrmd5="cbb2ce963c4d43c924d4a93ede5123f9" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="babeltrace" notmeta="1" version="1.5.8" release="3.26" 
arch="x86_64" hdrmd5="01b6f150271fe7abb0073e28132fa046" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libsource-highlight4" notmeta="1" version="3.1.9" release="5.28" 
arch="x86_64" hdrmd5="cbad973bcb5a6ac850d9245639f1bbd8" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="alts" notmeta="1" version="1.2+30.a5431e9" release="1.2" 
arch="x86_64" hdrmd5="83ec3cb83b14158e1f41a8e612f5924b" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="vim-data-common" notmeta="1" version="9.0.1632" release="1.1" 
arch="noarch" hdrmd5="65e6d4d425119e5a294175f5660c025a" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="xxd" notmeta="1" version="9.0.1632" release="1.1" arch="x86_64" 
hdrmd5="b468eda2389d3a65af376aba7a731bc0" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="ncurses-utils" notmeta="1" version="6.4.20230617" release="15.16" 
arch="x86_64" hdrmd5="0428637bb179ff9e717baeba5895d374" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libgdbm6" notmeta="1" version="1.23" release="1.317" 
arch="x86_64" hdrmd5="bd8e81e43102db4f3df17e9289924e70" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libgdbm_compat4" notmeta="1" version="1.23" release="1.317" 
arch="x86_64" hdrmd5="634b62c42496ba9a014bb4b7989f3c3e" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="aaa_base-malloccheck" notmeta="1" 
version="84.87+git20230329.b39efbc" release="1.4" arch="x86_64" 
hdrmd5="fd92f79d53fa541e29265a4889429208" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libglib-2_0-0" notmeta="1" version="2.76.3" release="1.3" 
arch="x86_64" hdrmd5="e02cd3804fb1b277d0950fbf6ee4388d" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libgmodule-2_0-0" notmeta="1" version="2.76.3" release="1.3" 
arch="x86_64" hdrmd5="cb498cf0602663b6f37a3c16378c6a00" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libalternatives1" notmeta="1" version="1.2+30.a5431e9" 
release="1.2" arch="x86_64" hdrmd5="e2d93a4d3982c41df2d16b20f941f460" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libdebuginfod1" notmeta="1" version="0.189" release="3.1" 
arch="x86_64" hdrmd5="4e6350cb3cca733adfe3288fa08ef019" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libcurl4" notmeta="1" version="8.1.2" release="1.1" arch="x86_64" 
hdrmd5="5d08590bae29420850b1774fbfe103ee" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libldap2" notmeta="1" version="2.6.4" release="2.1" arch="x86_64" 
hdrmd5="6a18a45adf7ce45b12138ad56520d7d3" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libbrotlidec1" notmeta="1" version="1.0.9" release="3.6" 
arch="x86_64" hdrmd5="11e74982c898863b95a62ddb32aa0502" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libidn2-0" notmeta="1" version="2.3.4" release="1.7" 
arch="x86_64" hdrmd5="a3acd77299b738ec93ed290614cd8e0b" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libssh4" notmeta="1" version="0.10.5" release="1.3" arch="x86_64" 
hdrmd5="8fca0392e95166e6207b0126cc059e25" project="SUSE:Factory:Head" 
repository="standard"/>
  <bdep name="libnghttp2-14" notmeta="1" version="1.54.0" release="1.1" 
arch="x86_64" hdrmd5="21ba2e9005cd40918163f8a420925316" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libpsl5" notmeta="1" version="0.21.2" release="1.11" 
arch="x86_64" hdrmd5="0cc9321f3d38493fa50ddd548cbaa62b" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libsasl2-3" notmeta="1" version="2.1.28" release="5.3" 
arch="x86_64" hdrmd5="c11cfdffc364764a70c893c18af81184" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libbrotlicommon1" notmeta="1" version="1.0.9" release="3.6" 
arch="x86_64" hdrmd5="c3a0f01e51e66eea2f7b590e853ec637" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libunistring5" notmeta="1" version="1.1" release="2.2" 
arch="x86_64" hdrmd5="6b6323c99d714d080dc4a670347864a5" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libssh-config" notmeta="1" version="0.10.5" release="1.3" 
arch="x86_64" hdrmd5="d1dddbad15e38ead63ed67453b3ebcbb" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="krb5-mini" notmeta="1" version="1.20.1" release="6.5" 
arch="x86_64" hdrmd5="3f6d758fbcf923e1370c706ab6a1aa25" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libcom_err2" notmeta="1" version="1.47.0" release="1.2" 
arch="x86_64" hdrmd5="5f0cfff1b5adbe03158fea75c6421986" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="libverto1" notmeta="1" version="0.3.2" release="3.1" 
arch="x86_64" hdrmd5="aef76e0a871fdfb679452a3137612c92" 
project="SUSE:Factory:Head" repository="standard"/>
  <bdep name="lua54" notmeta="1" version="5.4.6" release="1.46" arch="x86_64" 
hdrmd5="fdfddf9794edb69253ebe60c98663e3b" project="SUSE:Factory:Head" 
repository="standard"/>
  <path project="Devel:Kernel:stable" repository="standard" 
url="http://download.suse.de/ibs/Devel:/Kernel:/stable/standard/"/>
  <path project="SUSE:Factory:Head" repository="standard" 
url="http://download.suse.de/ibs/SUSE:/Factory:/Head/standard/"/>
</buildinfo>

++++++ config.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/arm64/default new/config/arm64/default
--- old/config/arm64/default    2023-07-10 11:51:35.000000000 +0200
+++ new/config/arm64/default    2023-07-11 08:23:11.000000000 +0200
@@ -12384,6 +12384,7 @@
 # CONFIG_SECURITY_SAFESETID is not set
 CONFIG_SECURITY_LOCKDOWN_LSM=y
 CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y
+CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT=y
 CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/armv6hl/default new/config/armv6hl/default
--- old/config/armv6hl/default  2023-07-10 11:51:35.000000000 +0200
+++ new/config/armv6hl/default  2023-07-11 08:23:11.000000000 +0200
@@ -8382,6 +8382,7 @@
 # CONFIG_SECURITY_SAFESETID is not set
 CONFIG_SECURITY_LOCKDOWN_LSM=y
 CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y
+# CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT is not set
 CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/armv7hl/default new/config/armv7hl/default
--- old/config/armv7hl/default  2023-07-10 11:51:35.000000000 +0200
+++ new/config/armv7hl/default  2023-07-11 08:23:11.000000000 +0200
@@ -11869,6 +11869,7 @@
 # CONFIG_SECURITY_SAFESETID is not set
 CONFIG_SECURITY_LOCKDOWN_LSM=y
 CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y
+# CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT is not set
 CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/riscv64/default new/config/riscv64/default
--- old/config/riscv64/default  2023-07-10 11:51:35.000000000 +0200
+++ new/config/riscv64/default  2023-07-11 08:23:11.000000000 +0200
@@ -9356,6 +9356,7 @@
 # CONFIG_SECURITY_SAFESETID is not set
 CONFIG_SECURITY_LOCKDOWN_LSM=y
 CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y
+# CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT is not set
 CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/config/x86_64/default new/config/x86_64/default
--- old/config/x86_64/default   2023-07-10 11:51:35.000000000 +0200
+++ new/config/x86_64/default   2023-07-11 08:23:11.000000000 +0200
@@ -10336,6 +10336,7 @@
 # CONFIG_SECURITY_SAFESETID is not set
 CONFIG_SECURITY_LOCKDOWN_LSM=y
 CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y
+CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT=y
 CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY is not set
 # CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY is not set



++++++ patches.kernel.org.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch 
new/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch
--- old/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch 
1970-01-01 01:00:00.000000000 +0100
+++ new/patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch 
2023-07-11 07:03:09.000000000 +0200
@@ -0,0 +1,48 @@
+From: Suren Baghdasaryan <sur...@google.com>
+Date: Sat, 8 Jul 2023 12:12:10 -0700
+Subject: [PATCH] mm: lock a vma before stack expansion
+Patch-mainline: 6.4.3
+References: bsc#1012628 bsc#1212775
+Git-commit: c137381f71aec755fbf47cd4e9bd4dce752c054c
+
+commit c137381f71aec755fbf47cd4e9bd4dce752c054c upstream.
+
+With recent changes necessitating mmap_lock to be held for write while
+expanding a stack, per-VMA locks should follow the same rules and be
+write-locked to prevent page faults into the VMA being expanded. Add
+the necessary locking.
+
+Cc: sta...@vger.kernel.org
+Signed-off-by: Suren Baghdasaryan <sur...@google.com>
+Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ mm/mmap.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/mm/mmap.c b/mm/mmap.c
+index bc510361..059c0fb2 100644
+--- a/mm/mmap.c
++++ b/mm/mmap.c
+@@ -1975,6 +1975,8 @@ static int expand_upwards(struct vm_area_struct *vma, 
unsigned long address)
+               return -ENOMEM;
+       }
+ 
++      /* Lock the VMA before expanding to prevent concurrent page faults */
++      vma_start_write(vma);
+       /*
+        * vma->vm_start/vm_end cannot change under us because the caller
+        * is required to hold the mmap_lock in read mode.  We need the
+@@ -2062,6 +2064,8 @@ int expand_downwards(struct vm_area_struct *vma, 
unsigned long address)
+               return -ENOMEM;
+       }
+ 
++      /* Lock the VMA before expanding to prevent concurrent page faults */
++      vma_start_write(vma);
+       /*
+        * vma->vm_start/vm_end cannot change under us because the caller
+        * is required to hold the mmap_lock in read mode.  We need the
+-- 
+2.35.3
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch
 
new/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch
--- 
old/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch
      1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch
      2023-07-11 07:03:09.000000000 +0200
@@ -0,0 +1,48 @@
+From: Suren Baghdasaryan <sur...@google.com>
+Date: Sat, 8 Jul 2023 12:12:11 -0700
+Subject: [PATCH] mm: lock newly mapped VMA which can be modified after it
+ becomes visible
+Patch-mainline: 6.4.3
+References: bsc#1012628 bsc#1212775
+Git-commit: 33313a747e81af9f31d0d45de78c9397fa3655eb
+
+commit 33313a747e81af9f31d0d45de78c9397fa3655eb upstream.
+
+mmap_region adds a newly created VMA into VMA tree and might modify it
+afterwards before dropping the mmap_lock.  This poses a problem for page
+faults handled under per-VMA locks because they don't take the mmap_lock
+and can stumble on this VMA while it's still being modified.  Currently
+this does not pose a problem since post-addition modifications are done
+only for file-backed VMAs, which are not handled under per-VMA lock.
+However, once support for handling file-backed page faults with per-VMA
+locks is added, this will become a race.
+
+Fix this by write-locking the VMA before inserting it into the VMA tree.
+Other places where a new VMA is added into VMA tree do not modify it
+after the insertion, so do not need the same locking.
+
+Cc: sta...@vger.kernel.org
+Signed-off-by: Suren Baghdasaryan <sur...@google.com>
+Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ mm/mmap.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/mm/mmap.c b/mm/mmap.c
+index 059c0fb2..74e96a14 100644
+--- a/mm/mmap.c
++++ b/mm/mmap.c
+@@ -2804,6 +2804,8 @@ unsigned long mmap_region(struct file *file, unsigned 
long addr,
+       if (vma->vm_file)
+               i_mmap_lock_write(vma->vm_file->f_mapping);
+ 
++      /* Lock the VMA since it is modified after insertion into VMA tree */
++      vma_start_write(vma);
+       vma_iter_store(&vmi, vma);
+       mm->map_count++;
+       if (vma->vm_file) {
+-- 
+2.35.3
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch
 
new/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch
--- 
old/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch
      1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch
      2023-07-11 07:03:09.000000000 +0200
@@ -0,0 +1,49 @@
+From: Hugh Dickins <hu...@google.com>
+Date: Sat, 8 Jul 2023 16:04:00 -0700
+Subject: [PATCH] mm: lock newly mapped VMA with corrected ordering
+Patch-mainline: 6.4.3
+References: bsc#1012628 bsc#1212775
+Git-commit: 1c7873e3364570ec89343ff4877e0f27a7b21a61
+
+commit 1c7873e3364570ec89343ff4877e0f27a7b21a61 upstream.
+
+Lockdep is certainly right to complain about
+
+  (&vma->vm_lock->lock){++++}-{3:3}, at: vma_start_write+0x2d/0x3f
+                 but task is already holding lock:
+  (&mapping->i_mmap_rwsem){+.+.}-{3:3}, at: mmap_region+0x4dc/0x6db
+
+Invert those to the usual ordering.
+
+Fixes: 33313a747e81 ("mm: lock newly mapped VMA which can be modified after it 
becomes visible")
+Cc: sta...@vger.kernel.org
+Signed-off-by: Hugh Dickins <hu...@google.com>
+Tested-by: Suren Baghdasaryan <sur...@google.com>
+Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ mm/mmap.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/mm/mmap.c b/mm/mmap.c
+index 74e96a14..30bf7772 100644
+--- a/mm/mmap.c
++++ b/mm/mmap.c
+@@ -2801,11 +2801,11 @@ unsigned long mmap_region(struct file *file, unsigned 
long addr,
+       if (vma_iter_prealloc(&vmi))
+               goto close_and_free_vma;
+ 
++      /* Lock the VMA since it is modified after insertion into VMA tree */
++      vma_start_write(vma);
+       if (vma->vm_file)
+               i_mmap_lock_write(vma->vm_file->f_mapping);
+ 
+-      /* Lock the VMA since it is modified after insertion into VMA tree */
+-      vma_start_write(vma);
+       vma_iter_store(&vmi, vma);
+       mm->map_count++;
+       if (vma->vm_file) {
+-- 
+2.35.3
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch
 
new/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch
--- 
old/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch
  1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch
  2023-07-11 07:03:09.000000000 +0200
@@ -0,0 +1,54 @@
+From: Peter Collingbourne <p...@google.com>
+Date: Mon, 22 May 2023 17:43:08 -0700
+Subject: [PATCH] mm: call arch_swap_restore() from do_swap_page()
+References: bsc#1012628
+Patch-mainline: 6.4.3
+Git-commit: 6dca4ac6fc91fd41ea4d6c4511838d37f4e0eab2
+
+commit 6dca4ac6fc91fd41ea4d6c4511838d37f4e0eab2 upstream.
+
+Commit c145e0b47c77 ("mm: streamline COW logic in do_swap_page()") moved
+the call to swap_free() before the call to set_pte_at(), which meant that
+the MTE tags could end up being freed before set_pte_at() had a chance to
+restore them.  Fix it by adding a call to the arch_swap_restore() hook
+before the call to swap_free().
+
+Link: https://lkml.kernel.org/r/20230523004312.1807357-2-...@google.com
+Link: 
https://linux-review.googlesource.com/id/I6470efa669e8bd2f841049b8c61020c510678965
+Fixes: c145e0b47c77 ("mm: streamline COW logic in do_swap_page()")
+Signed-off-by: Peter Collingbourne <p...@google.com>
+Reported-by: Qun-wei Lin <qun-wei....@mediatek.com>
+Closes: 
https://lore.kernel.org/all/5050805753ac469e8d727c797c2218a9d780d434.ca...@mediatek.com/
+Acked-by: David Hildenbrand <da...@redhat.com>
+Acked-by: "Huang, Ying" <ying.hu...@intel.com>
+Reviewed-by: Steven Price <steven.pr...@arm.com>
+Acked-by: Catalin Marinas <catalin.mari...@arm.com>
+Cc: <sta...@vger.kernel.org>   [6.1+]
+Signed-off-by: Andrew Morton <a...@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ mm/memory.c | 7 +++++++
+ 1 file changed, 7 insertions(+)
+
+diff --git a/mm/memory.c b/mm/memory.c
+index 5ce82a76..07bab1e7 100644
+--- a/mm/memory.c
++++ b/mm/memory.c
+@@ -3932,6 +3932,13 @@ vm_fault_t do_swap_page(struct vm_fault *vmf)
+               }
+       }
+ 
++      /*
++       * Some architectures may have to restore extra metadata to the page
++       * when reading from swap. This metadata may be indexed by swap entry
++       * so this must be called before swap_free().
++       */
++      arch_swap_restore(entry, folio);
++
+       /*
+        * Remove the swap entry and conditionally try to free up the swapcache.
+        * We're already holding a reference on the page but haven't mapped it
+-- 
+2.35.3
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch
 
new/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch
--- 
old/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch
      1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch
      2023-07-11 07:03:09.000000000 +0200
@@ -0,0 +1,56 @@
+From: Liu Shixin <liushix...@huawei.com>
+Date: Tue, 4 Jul 2023 18:19:42 +0800
+Subject: [PATCH] bootmem: remove the vmemmap pages from kmemleak in
+ free_bootmem_page
+References: bsc#1012628
+Patch-mainline: 6.4.3
+Git-commit: 028725e73375a1ff080bbdf9fb503306d0116f28
+
+commit 028725e73375a1ff080bbdf9fb503306d0116f28 upstream.
+
+commit dd0ff4d12dd2 ("bootmem: remove the vmemmap pages from kmemleak in
+put_page_bootmem") fix an overlaps existing problem of kmemleak.  But the
+problem still existed when HAVE_BOOTMEM_INFO_NODE is disabled, because in
+this case, free_bootmem_page() will call free_reserved_page() directly.
+
+Fix the problem by adding kmemleak_free_part() in free_bootmem_page() when
+HAVE_BOOTMEM_INFO_NODE is disabled.
+
+Link: https://lkml.kernel.org/r/20230704101942.2819426-1-liushix...@huawei.com
+Fixes: f41f2ed43ca5 ("mm: hugetlb: free the vmemmap pages associated with each 
HugeTLB page")
+Signed-off-by: Liu Shixin <liushix...@huawei.com>
+Acked-by: Muchun Song <songmuc...@bytedance.com>
+Cc: Matthew Wilcox <wi...@infradead.org>
+Cc: Mike Kravetz <mike.krav...@oracle.com>
+Cc: Oscar Salvador <osalva...@suse.de>
+Cc: <sta...@vger.kernel.org>
+Signed-off-by: Andrew Morton <a...@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ include/linux/bootmem_info.h | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/include/linux/bootmem_info.h b/include/linux/bootmem_info.h
+index cc35d010..e1a3c9c9 100644
+--- a/include/linux/bootmem_info.h
++++ b/include/linux/bootmem_info.h
+@@ -3,6 +3,7 @@
+ #define __LINUX_BOOTMEM_INFO_H
+ 
+ #include <linux/mm.h>
++#include <linux/kmemleak.h>
+ 
+ /*
+  * Types for free bootmem stored in page->lru.next. These have to be in
+@@ -59,6 +60,7 @@ static inline void get_page_bootmem(unsigned long info, 
struct page *page,
+ 
+ static inline void free_bootmem_page(struct page *page)
+ {
++      kmemleak_free_part(page_to_virt(page), PAGE_SIZE);
+       free_reserved_page(page);
+ }
+ #endif
+-- 
+2.35.3
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch
 
new/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch
--- 
old/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch
      1970-01-01 01:00:00.000000000 +0100
+++ 
new/patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch
      2023-07-11 07:03:09.000000000 +0200
@@ -0,0 +1,70 @@
+From: Suren Baghdasaryan <sur...@google.com>
+Date: Sat, 8 Jul 2023 12:12:12 -0700
+Subject: [PATCH] fork: lock VMAs of the parent process when forking
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+Patch-mainline: 6.4.3
+References: bsc#1012628 bsc#1212775
+Git-commit: fb49c455323ff8319a123dd312be9082c49a23a5
+
+commit fb49c455323ff8319a123dd312be9082c49a23a5 upstream.
+
+When forking a child process, the parent write-protects anonymous pages
+and COW-shares them with the child being forked using copy_present_pte().
+
+We must not take any concurrent page faults on the source vma's as they
+are being processed, as we expect both the vma and the pte's behind it
+to be stable.  For example, the anon_vma_fork() expects the parents
+vma->anon_vma to not change during the vma copy.
+
+A concurrent page fault on a page newly marked read-only by the page
+copy might trigger wp_page_copy() and a anon_vma_prepare(vma) on the
+source vma, defeating the anon_vma_clone() that wasn't done because the
+parent vma originally didn't have an anon_vma, but we now might end up
+copying a pte entry for a page that has one.
+
+Before the per-vma lock based changes, the mmap_lock guaranteed
+exclusion with concurrent page faults.  But now we need to do a
+vma_start_write() to make sure no concurrent faults happen on this vma
+while it is being processed.
+
+This fix can potentially regress some fork-heavy workloads.  Kernel
+build time did not show noticeable regression on a 56-core machine while
+a stress test mapping 10000 VMAs and forking 5000 times in a tight loop
+shows ~5% regression.  If such fork time regression is unacceptable,
+disabling CONFIG_PER_VMA_LOCK should restore its performance.  Further
+optimizations are possible if this regression proves to be problematic.
+
+Suggested-by: David Hildenbrand <da...@redhat.com>
+Reported-by: Jiri Slaby <jirisl...@kernel.org>
+Closes: 
https://lore.kernel.org/all/dbdef34c-3a07-5951-e1ae-e9c6e3cdf...@kernel.org/
+Reported-by: Holger Hoffstätte <hol...@applied-asynchrony.com>
+Closes: 
https://lore.kernel.org/all/b198d649-f4bf-b971-31d0-e8433ec2a...@applied-asynchrony.com/
+Reported-by: Jacob Young <jacobly....@gmail.com>
+Closes: https://bugzilla.kernel.org/show_bug.cgi?id=217624
+Fixes: 0bff0aaea03e ("x86/mm: try VMA lock-based page fault handling first")
+Cc: sta...@vger.kernel.org
+Signed-off-by: Suren Baghdasaryan <sur...@google.com>
+Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ kernel/fork.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/kernel/fork.c b/kernel/fork.c
+index 41c96410..8103ffd2 100644
+--- a/kernel/fork.c
++++ b/kernel/fork.c
+@@ -690,6 +690,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm,
+       for_each_vma(old_vmi, mpnt) {
+               struct file *file;
+ 
++              vma_start_write(mpnt);
+               if (mpnt->vm_flags & VM_DONTCOPY) {
+                       vm_stat_account(mm, mpnt->vm_flags, -vma_pages(mpnt));
+                       continue;
+-- 
+2.35.3
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch 
new/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch
--- old/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch  1970-01-01 
01:00:00.000000000 +0100
+++ new/patches.kernel.org/6.4.3-007-Linux-6.4.3.patch  2023-07-11 
07:03:09.000000000 +0200
@@ -0,0 +1,40 @@
+From: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Date: Tue, 11 Jul 2023 06:31:05 +0200
+Subject: [PATCH] Linux 6.4.3
+References: bsc#1012628
+Patch-mainline: 6.4.3
+Git-commit: 160f4124ea8b4cd6c86867e111fa55e266345a16
+
+Link: https://lore.kernel.org/r/20230709111345.297026...@linuxfoundation.org
+Tested-by: Ronald Warsow <rwar...@gmx.de
+Link: https://lore.kernel.org/r/20230709203826.141774...@linuxfoundation.org
+Tested-by: Ronald Warsow <rwar...@gmx.de>
+Tested-by: Bagas Sanjaya <bagasdo...@gmail.com>
+Tested-by: Linux Kernel Functional Testing <l...@linaro.org>
+Tested-by: Chris Paterson (CIP) <chris.paters...@renesas.com>
+Tested-by: Salvatore Bonaccorso <car...@debian.org>
+Tested-by: Guenter Roeck <li...@roeck-us.net>
+Tested-by: Takeshi Ogasawara <takeshi.ogasaw...@futuring-girl.com>
+Tested-by: Ron Economos <r...@w6rz.net>
+Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
+Signed-off-by: Jiri Slaby <jsl...@suse.cz>
+---
+ Makefile | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/Makefile b/Makefile
+index bcac8155..56abbcac 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,7 +1,7 @@
+ # SPDX-License-Identifier: GPL-2.0
+ VERSION = 6
+ PATCHLEVEL = 4
+-SUBLEVEL = 2
++SUBLEVEL = 3
+ EXTRAVERSION =
+ NAME = Hurr durr I'ma ninja sloth
+ 
+-- 
+2.35.3
+

++++++ patches.suse.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch 
new/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch
--- old/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch    
2023-07-10 12:03:25.000000000 +0200
+++ new/patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch    
1970-01-01 01:00:00.000000000 +0100
@@ -1,67 +0,0 @@
-From: Suren Baghdasaryan <sur...@google.com>
-Date: Sat, 8 Jul 2023 12:12:12 -0700
-Subject: fork: lock VMAs of the parent process when forking
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-Git-commit: fb49c455323ff8319a123dd312be9082c49a23a5
-Patch-mainline: v6.5-rc1
-References: bsc#1212775
-
-When forking a child process, the parent write-protects anonymous pages
-and COW-shares them with the child being forked using copy_present_pte().
-
-We must not take any concurrent page faults on the source vma's as they
-are being processed, as we expect both the vma and the pte's behind it
-to be stable.  For example, the anon_vma_fork() expects the parents
-vma->anon_vma to not change during the vma copy.
-
-A concurrent page fault on a page newly marked read-only by the page
-copy might trigger wp_page_copy() and a anon_vma_prepare(vma) on the
-source vma, defeating the anon_vma_clone() that wasn't done because the
-parent vma originally didn't have an anon_vma, but we now might end up
-copying a pte entry for a page that has one.
-
-Before the per-vma lock based changes, the mmap_lock guaranteed
-exclusion with concurrent page faults.  But now we need to do a
-vma_start_write() to make sure no concurrent faults happen on this vma
-while it is being processed.
-
-This fix can potentially regress some fork-heavy workloads.  Kernel
-build time did not show noticeable regression on a 56-core machine while
-a stress test mapping 10000 VMAs and forking 5000 times in a tight loop
-shows ~5% regression.  If such fork time regression is unacceptable,
-disabling CONFIG_PER_VMA_LOCK should restore its performance.  Further
-optimizations are possible if this regression proves to be problematic.
-
-Suggested-by: David Hildenbrand <da...@redhat.com>
-Reported-by: Jiri Slaby <jirisl...@kernel.org>
-Closes: 
https://lore.kernel.org/all/dbdef34c-3a07-5951-e1ae-e9c6e3cdf...@kernel.org/
-Reported-by: Holger Hoffstätte <hol...@applied-asynchrony.com>
-Closes: 
https://lore.kernel.org/all/b198d649-f4bf-b971-31d0-e8433ec2a...@applied-asynchrony.com/
-Reported-by: Jacob Young <jacobly....@gmail.com>
-Closes: https://bugzilla.kernel.org/show_bug.cgi?id=217624
-Fixes: 0bff0aaea03e ("x86/mm: try VMA lock-based page fault handling first")
-Cc: sta...@vger.kernel.org
-Signed-off-by: Suren Baghdasaryan <sur...@google.com>
-Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
-Signed-off-by: Jiri Slaby <jsl...@suse.cz>
----
- kernel/fork.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/kernel/fork.c b/kernel/fork.c
-index b85814e6..d2e12b6d 100644
---- a/kernel/fork.c
-+++ b/kernel/fork.c
-@@ -686,6 +686,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm,
-       for_each_vma(old_vmi, mpnt) {
-               struct file *file;
- 
-+              vma_start_write(mpnt);
-               if (mpnt->vm_flags & VM_DONTCOPY) {
-                       vm_stat_account(mm, mpnt->vm_flags, -vma_pages(mpnt));
-                       continue;
--- 
-2.35.3
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/mm-lock-a-vma-before-stack-expansion.patch 
new/patches.suse/mm-lock-a-vma-before-stack-expansion.patch
--- old/patches.suse/mm-lock-a-vma-before-stack-expansion.patch 2023-07-10 
12:03:25.000000000 +0200
+++ new/patches.suse/mm-lock-a-vma-before-stack-expansion.patch 1970-01-01 
01:00:00.000000000 +0100
@@ -1,45 +0,0 @@
-From: Suren Baghdasaryan <sur...@google.com>
-Date: Sat, 8 Jul 2023 12:12:10 -0700
-Subject: mm: lock a vma before stack expansion
-Git-commit: c137381f71aec755fbf47cd4e9bd4dce752c054c
-Patch-mainline: v6.5-rc1
-References: bsc#1212775
-
-With recent changes necessitating mmap_lock to be held for write while
-expanding a stack, per-VMA locks should follow the same rules and be
-write-locked to prevent page faults into the VMA being expanded. Add
-the necessary locking.
-
-Cc: sta...@vger.kernel.org
-Signed-off-by: Suren Baghdasaryan <sur...@google.com>
-Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
-Signed-off-by: Jiri Slaby <jsl...@suse.cz>
----
- mm/mmap.c | 4 ++++
- 1 file changed, 4 insertions(+)
-
-diff --git a/mm/mmap.c b/mm/mmap.c
-index 204ddcd5..c66e4622 100644
---- a/mm/mmap.c
-+++ b/mm/mmap.c
-@@ -1977,6 +1977,8 @@ static int expand_upwards(struct vm_area_struct *vma, 
unsigned long address)
-               return -ENOMEM;
-       }
- 
-+      /* Lock the VMA before expanding to prevent concurrent page faults */
-+      vma_start_write(vma);
-       /*
-        * vma->vm_start/vm_end cannot change under us because the caller
-        * is required to hold the mmap_lock in read mode.  We need the
-@@ -2064,6 +2066,8 @@ int expand_downwards(struct vm_area_struct *vma, 
unsigned long address)
-               return -ENOMEM;
-       }
- 
-+      /* Lock the VMA before expanding to prevent concurrent page faults */
-+      vma_start_write(vma);
-       /*
-        * vma->vm_start/vm_end cannot change under us because the caller
-        * is required to hold the mmap_lock in read mode.  We need the
--- 
-2.35.3
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch 
new/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch
--- old/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch 
2023-07-10 12:03:25.000000000 +0200
+++ new/patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch 
1970-01-01 01:00:00.000000000 +0100
@@ -1,45 +0,0 @@
-From: Suren Baghdasaryan <sur...@google.com>
-Date: Sat, 8 Jul 2023 12:12:11 -0700
-Subject: mm: lock newly mapped VMA which can be modified after it becomes
- visible
-Git-commit: 33313a747e81af9f31d0d45de78c9397fa3655eb
-Patch-mainline: v6.5-rc1
-References: bsc#1212775
-
-mmap_region adds a newly created VMA into VMA tree and might modify it
-afterwards before dropping the mmap_lock.  This poses a problem for page
-faults handled under per-VMA locks because they don't take the mmap_lock
-and can stumble on this VMA while it's still being modified.  Currently
-this does not pose a problem since post-addition modifications are done
-only for file-backed VMAs, which are not handled under per-VMA lock.
-However, once support for handling file-backed page faults with per-VMA
-locks is added, this will become a race.
-
-Fix this by write-locking the VMA before inserting it into the VMA tree.
-Other places where a new VMA is added into VMA tree do not modify it
-after the insertion, so do not need the same locking.
-
-Cc: sta...@vger.kernel.org
-Signed-off-by: Suren Baghdasaryan <sur...@google.com>
-Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
-Signed-off-by: Jiri Slaby <jsl...@suse.cz>
----
- mm/mmap.c | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/mm/mmap.c b/mm/mmap.c
-index c66e4622..84c71431 100644
---- a/mm/mmap.c
-+++ b/mm/mmap.c
-@@ -2812,6 +2812,8 @@ unsigned long mmap_region(struct file *file, unsigned 
long addr,
-       if (vma->vm_file)
-               i_mmap_lock_write(vma->vm_file->f_mapping);
- 
-+      /* Lock the VMA since it is modified after insertion into VMA tree */
-+      vma_start_write(vma);
-       vma_iter_store(&vmi, vma);
-       mm->map_count++;
-       if (vma->vm_file) {
--- 
-2.35.3
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch 
new/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch
--- old/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch     
2023-07-10 12:03:25.000000000 +0200
+++ new/patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch     
1970-01-01 01:00:00.000000000 +0100
@@ -1,46 +0,0 @@
-From: Hugh Dickins <hu...@google.com>
-Date: Sat, 8 Jul 2023 16:04:00 -0700
-Subject: mm: lock newly mapped VMA with corrected ordering
-Git-commit: 1c7873e3364570ec89343ff4877e0f27a7b21a61
-Patch-mainline: v6.5-rc1
-References: bsc#1212775
-
-Lockdep is certainly right to complain about
-
-  (&vma->vm_lock->lock){++++}-{3:3}, at: vma_start_write+0x2d/0x3f
-                 but task is already holding lock:
-  (&mapping->i_mmap_rwsem){+.+.}-{3:3}, at: mmap_region+0x4dc/0x6db
-
-Invert those to the usual ordering.
-
-Fixes: 33313a747e81 ("mm: lock newly mapped VMA which can be modified after it 
becomes visible")
-Cc: sta...@vger.kernel.org
-Signed-off-by: Hugh Dickins <hu...@google.com>
-Tested-by: Suren Baghdasaryan <sur...@google.com>
-Signed-off-by: Linus Torvalds <torva...@linux-foundation.org>
-Signed-off-by: Jiri Slaby <jsl...@suse.cz>
----
- mm/mmap.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/mm/mmap.c b/mm/mmap.c
-index 84c71431..3eda23c9 100644
---- a/mm/mmap.c
-+++ b/mm/mmap.c
-@@ -2809,11 +2809,11 @@ unsigned long mmap_region(struct file *file, unsigned 
long addr,
-       if (vma_iter_prealloc(&vmi))
-               goto close_and_free_vma;
- 
-+      /* Lock the VMA since it is modified after insertion into VMA tree */
-+      vma_start_write(vma);
-       if (vma->vm_file)
-               i_mmap_lock_write(vma->vm_file->f_mapping);
- 
--      /* Lock the VMA since it is modified after insertion into VMA tree */
--      vma_start_write(vma);
-       vma_iter_store(&vmi, vma);
-       mm->map_count++;
-       if (vma->vm_file) {
--- 
-2.35.3
-

++++++ series.conf ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:43.827962003 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:43.831962027 +0200
@@ -75,6 +75,13 @@
        patches.kernel.org/6.4.2-013-drm-amdgpu-Validate-VM-ioctl-flags.patch
        
patches.kernel.org/6.4.2-014-arch-arm64-mm-fault-Fix-undeclared-variable-err.patch
        patches.kernel.org/6.4.2-015-Linux-6.4.2.patch
+       patches.kernel.org/6.4.3-001-mm-lock-a-vma-before-stack-expansion.patch
+       
patches.kernel.org/6.4.3-002-mm-lock-newly-mapped-VMA-which-can-be-modified-.patch
+       
patches.kernel.org/6.4.3-003-mm-lock-newly-mapped-VMA-with-corrected-orderin.patch
+       
patches.kernel.org/6.4.3-004-mm-call-arch_swap_restore-from-do_swap_page.patch
+       
patches.kernel.org/6.4.3-005-bootmem-remove-the-vmemmap-pages-from-kmemleak-.patch
+       
patches.kernel.org/6.4.3-006-fork-lock-VMAs-of-the-parent-process-when-forki.patch
+       patches.kernel.org/6.4.3-007-Linux-6.4.3.patch
 
        ########################################################
        # Build fixes that apply to the vanilla kernel too.
@@ -104,10 +111,6 @@
        ########################################################
        patches.suse/regulator-axp20x-Add-AXP15060-support.patch
        patches.suse/HID-microsoft-Add-rumble-support-to-latest-xbox-cont.patch
-       patches.suse/mm-lock-a-vma-before-stack-expansion.patch
-       patches.suse/mm-lock-newly-mapped-VMA-which-can-be-modified-after.patch
-       patches.suse/fork-lock-VMAs-of-the-parent-process-when-forking.patch
-       patches.suse/mm-lock-newly-mapped-VMA-with-corrected-ordering.patch
        ########################################################
        # end of sorted patches
        ########################################################
@@ -217,11 +220,11 @@
 
        # Bug 1198101 - VUL-0: shim: openSUSE tumbleweed not fully locked down? 
Add opensuse-cert-prompt back to openSUSE shim
        # Lock down functions for secure boot
-+jlee  
patches.suse/0001-security-lockdown-expose-a-hook-to-lock-the-kernel-down.patch
-+jlee  
patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch
-+jlee  
patches.suse/0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mode.patch
-+jlee  
patches.suse/0004-efi-Lock-down-the-kernel-at-the-integrity-level-if-b.patch
-+jlee  patches.suse/arm64-lock-down-kernel-in-secure-boot-mode.patch
+       
patches.suse/0001-security-lockdown-expose-a-hook-to-lock-the-kernel-down.patch
+       
patches.suse/0002-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-boot-mode.patch
+       
patches.suse/0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mode.patch
+       
patches.suse/0004-efi-Lock-down-the-kernel-at-the-integrity-level-if-b.patch
+       patches.suse/arm64-lock-down-kernel-in-secure-boot-mode.patch
 
        # crypto
 

++++++ source-timestamp ++++++
--- /var/tmp/diff_new_pack.NSmxXP/_old  2023-07-16 17:28:43.847962123 +0200
+++ /var/tmp/diff_new_pack.NSmxXP/_new  2023-07-16 17:28:43.851962147 +0200
@@ -1,4 +1,4 @@
-2023-07-10 10:03:25 +0000
-GIT Revision: b97b89494481f3409297e494e466bdd42b1311ab
+2023-07-11 06:23:11 +0000
+GIT Revision: 5ab030f1f07fd96746960bce337ec62fc11b6a9a
 GIT Branch: stable
 

Reply via email to