Extras:
- Remove OCFS2 CVE patches as those fixes have been merged in 4.9.114
stable branch.
Change-Id: Iaccc045658962224084e203fd45e7d898c16fc46
Signed-off-by: srinidhira0 <srinidhir@vmware.com>
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/5397
Reviewed-by: Ajay Kaher <akaher@vmware.com>
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Srivatsa S. Bhat <srivatsab@vmware.com>
| ... | ... |
@@ -1,6 +1,6 @@ |
| 1 | 1 |
Summary: Linux API header files |
| 2 | 2 |
Name: linux-api-headers |
| 3 |
-Version: 4.9.111 |
|
| 3 |
+Version: 4.9.114 |
|
| 4 | 4 |
Release: 1%{?dist}
|
| 5 | 5 |
License: GPLv2 |
| 6 | 6 |
URL: http://www.kernel.org/ |
| ... | ... |
@@ -8,7 +8,7 @@ Group: System Environment/Kernel |
| 8 | 8 |
Vendor: VMware, Inc. |
| 9 | 9 |
Distribution: Photon |
| 10 | 10 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 11 |
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3 |
|
| 11 |
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99 |
|
| 12 | 12 |
BuildArch: noarch |
| 13 | 13 |
Patch0: Implement-the-f-xattrat-family-of-functions.patch |
| 14 | 14 |
%description |
| ... | ... |
@@ -27,6 +27,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
|
| 27 | 27 |
%defattr(-,root,root) |
| 28 | 28 |
%{_includedir}/*
|
| 29 | 29 |
%changelog |
| 30 |
+* Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1 |
|
| 31 |
+- Update to version 4.9.114 |
|
| 30 | 32 |
* Sat Jul 07 2018 Alexey Makhalov <amakhalov@vmware.com> 4.9.111-1 |
| 31 | 33 |
- Update to version 4.9.111 |
| 32 | 34 |
* Thu Jun 21 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.109-1 |
| 33 | 35 |
deleted file mode 100644 |
| ... | ... |
@@ -1,121 +0,0 @@ |
| 1 |
-From 3e4c56d41eef5595035872a2ec5a483f42e8917f Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: alex chen <alex.chen@huawei.com> |
|
| 3 |
-Date: Wed, 15 Nov 2017 17:31:44 -0800 |
|
| 4 |
-Subject: [PATCH] ocfs2: ip_alloc_sem should be taken in ocfs2_get_block() |
|
| 5 |
- |
|
| 6 |
-ip_alloc_sem should be taken in ocfs2_get_block() when reading file in |
|
| 7 |
-DIRECT mode to prevent concurrent access to extent tree with |
|
| 8 |
-ocfs2_dio_end_io_write(), which may cause BUGON in the following |
|
| 9 |
-situation: |
|
| 10 |
- |
|
| 11 |
-read file 'A' end_io of writing file 'A' |
|
| 12 |
-vfs_read |
|
| 13 |
- __vfs_read |
|
| 14 |
- ocfs2_file_read_iter |
|
| 15 |
- generic_file_read_iter |
|
| 16 |
- ocfs2_direct_IO |
|
| 17 |
- __blockdev_direct_IO |
|
| 18 |
- do_blockdev_direct_IO |
|
| 19 |
- do_direct_IO |
|
| 20 |
- get_more_blocks |
|
| 21 |
- ocfs2_get_block |
|
| 22 |
- ocfs2_extent_map_get_blocks |
|
| 23 |
- ocfs2_get_clusters |
|
| 24 |
- ocfs2_get_clusters_nocache() |
|
| 25 |
- ocfs2_search_extent_list |
|
| 26 |
- return the index of record which |
|
| 27 |
- contains the v_cluster, that is |
|
| 28 |
- v_cluster > rec[i]->e_cpos. |
|
| 29 |
- ocfs2_dio_end_io |
|
| 30 |
- ocfs2_dio_end_io_write |
|
| 31 |
- down_write(&oi->ip_alloc_sem); |
|
| 32 |
- ocfs2_mark_extent_written |
|
| 33 |
- ocfs2_change_extent_flag |
|
| 34 |
- ocfs2_split_extent |
|
| 35 |
- ... |
|
| 36 |
- --> modify the rec[i]->e_cpos, resulting |
|
| 37 |
- in v_cluster < rec[i]->e_cpos. |
|
| 38 |
- BUG_ON(v_cluster < le32_to_cpu(rec->e_cpos)) |
|
| 39 |
- |
|
| 40 |
-[alex.chen@huawei.com: v3] |
|
| 41 |
- Link: http://lkml.kernel.org/r/59EF3614.6050008@huawei.com |
|
| 42 |
-Link: http://lkml.kernel.org/r/59EF3614.6050008@huawei.com |
|
| 43 |
-Fixes: c15471f79506 ("ocfs2: fix sparse file & data ordering issue in direct io")
|
|
| 44 |
-Signed-off-by: Alex Chen <alex.chen@huawei.com> |
|
| 45 |
-Reviewed-by: Jun Piao <piaojun@huawei.com> |
|
| 46 |
-Reviewed-by: Joseph Qi <jiangqi903@gmail.com> |
|
| 47 |
-Reviewed-by: Gang He <ghe@suse.com> |
|
| 48 |
-Acked-by: Changwei Ge <ge.changwei@h3c.com> |
|
| 49 |
-Cc: Mark Fasheh <mfasheh@versity.com> |
|
| 50 |
-Cc: Joel Becker <jlbec@evilplan.org> |
|
| 51 |
-Cc: Junxiao Bi <junxiao.bi@oracle.com> |
|
| 52 |
-Signed-off-by: Andrew Morton <akpm@linux-foundation.org> |
|
| 53 |
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> |
|
| 54 |
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu> |
|
| 55 |
- fs/ocfs2/aops.c | 26 ++++++++++++++++++-------- |
|
| 56 |
- 1 file changed, 18 insertions(+), 8 deletions(-) |
|
| 57 |
- |
|
| 58 |
-diff --git a/fs/ocfs2/aops.c b/fs/ocfs2/aops.c |
|
| 59 |
-index f2961b1..c26d046 100644 |
|
| 60 |
-+++ b/fs/ocfs2/aops.c |
|
| 61 |
-@@ -134,6 +134,19 @@ static int ocfs2_symlink_get_block(struct inode *inode, sector_t iblock, |
|
| 62 |
- return err; |
|
| 63 |
- } |
|
| 64 |
- |
|
| 65 |
-+static int ocfs2_lock_get_block(struct inode *inode, sector_t iblock, |
|
| 66 |
-+ struct buffer_head *bh_result, int create) |
|
| 67 |
-+{
|
|
| 68 |
-+ int ret = 0; |
|
| 69 |
-+ struct ocfs2_inode_info *oi = OCFS2_I(inode); |
|
| 70 |
-+ |
|
| 71 |
-+ down_read(&oi->ip_alloc_sem); |
|
| 72 |
-+ ret = ocfs2_get_block(inode, iblock, bh_result, create); |
|
| 73 |
-+ up_read(&oi->ip_alloc_sem); |
|
| 74 |
-+ |
|
| 75 |
-+ return ret; |
|
| 76 |
-+} |
|
| 77 |
-+ |
|
| 78 |
- int ocfs2_get_block(struct inode *inode, sector_t iblock, |
|
| 79 |
- struct buffer_head *bh_result, int create) |
|
| 80 |
- {
|
|
| 81 |
-@@ -2120,7 +2133,7 @@ static void ocfs2_dio_free_write_ctx(struct inode *inode, |
|
| 82 |
- * called like this: dio->get_blocks(dio->inode, fs_startblk, |
|
| 83 |
- * fs_count, map_bh, dio->rw == WRITE); |
|
| 84 |
- */ |
|
| 85 |
--static int ocfs2_dio_get_block(struct inode *inode, sector_t iblock, |
|
| 86 |
-+static int ocfs2_dio_wr_get_block(struct inode *inode, sector_t iblock, |
|
| 87 |
- struct buffer_head *bh_result, int create) |
|
| 88 |
- {
|
|
| 89 |
- struct ocfs2_super *osb = OCFS2_SB(inode->i_sb); |
|
| 90 |
-@@ -2146,12 +2159,9 @@ static int ocfs2_dio_get_block(struct inode *inode, sector_t iblock, |
|
| 91 |
- * while file size will be changed. |
|
| 92 |
- */ |
|
| 93 |
- if (pos + total_len <= i_size_read(inode)) {
|
|
| 94 |
-- down_read(&oi->ip_alloc_sem); |
|
| 95 |
-- /* This is the fast path for re-write. */ |
|
| 96 |
-- ret = ocfs2_get_block(inode, iblock, bh_result, create); |
|
| 97 |
-- |
|
| 98 |
-- up_read(&oi->ip_alloc_sem); |
|
| 99 |
- |
|
| 100 |
-+ /* This is the fast path for re-write. */ |
|
| 101 |
-+ ret = ocfs2_lock_get_block(inode, iblock, bh_result, create); |
|
| 102 |
- if (buffer_mapped(bh_result) && |
|
| 103 |
- !buffer_new(bh_result) && |
|
| 104 |
- ret == 0) |
|
| 105 |
-@@ -2416,9 +2426,9 @@ static ssize_t ocfs2_direct_IO(struct kiocb *iocb, struct iov_iter *iter) |
|
| 106 |
- return 0; |
|
| 107 |
- |
|
| 108 |
- if (iov_iter_rw(iter) == READ) |
|
| 109 |
-- get_block = ocfs2_get_block; |
|
| 110 |
-+ get_block = ocfs2_lock_get_block; |
|
| 111 |
- else |
|
| 112 |
-- get_block = ocfs2_dio_get_block; |
|
| 113 |
-+ get_block = ocfs2_dio_wr_get_block; |
|
| 114 |
- |
|
| 115 |
- return __blockdev_direct_IO(iocb, inode, inode->i_sb->s_bdev, |
|
| 116 |
- iter, get_block, |
|
| 117 |
-2.7.4 |
|
| 118 |
- |
| 119 | 1 |
deleted file mode 100644 |
| ... | ... |
@@ -1,208 +0,0 @@ |
| 1 |
-From 853bc26a7ea39e354b9f8889ae7ad1492ffa28d2 Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: alex chen <alex.chen@huawei.com> |
|
| 3 |
-Date: Wed, 15 Nov 2017 17:31:48 -0800 |
|
| 4 |
-Subject: [PATCH] ocfs2: subsystem.su_mutex is required while accessing the |
|
| 5 |
- item->ci_parent |
|
| 6 |
- |
|
| 7 |
-The subsystem.su_mutex is required while accessing the item->ci_parent, |
|
| 8 |
-otherwise, NULL pointer dereference to the item->ci_parent will be |
|
| 9 |
-triggered in the following situation: |
|
| 10 |
- |
|
| 11 |
-add node delete node |
|
| 12 |
-sys_write |
|
| 13 |
- vfs_write |
|
| 14 |
- configfs_write_file |
|
| 15 |
- o2nm_node_store |
|
| 16 |
- o2nm_node_local_write |
|
| 17 |
- do_rmdir |
|
| 18 |
- vfs_rmdir |
|
| 19 |
- configfs_rmdir |
|
| 20 |
- mutex_lock(&subsys->su_mutex); |
|
| 21 |
- unlink_obj |
|
| 22 |
- item->ci_group = NULL; |
|
| 23 |
- item->ci_parent = NULL; |
|
| 24 |
- to_o2nm_cluster_from_node |
|
| 25 |
- node->nd_item.ci_parent->ci_parent |
|
| 26 |
- BUG since of NULL pointer dereference to nd_item.ci_parent |
|
| 27 |
- |
|
| 28 |
-Moreover, the o2nm_cluster also should be protected by the |
|
| 29 |
-subsystem.su_mutex. |
|
| 30 |
- |
|
| 31 |
-[alex.chen@huawei.com: v2] |
|
| 32 |
- Link: http://lkml.kernel.org/r/59EEAA69.9080703@huawei.com |
|
| 33 |
-Link: http://lkml.kernel.org/r/59E9B36A.10700@huawei.com |
|
| 34 |
-Signed-off-by: Alex Chen <alex.chen@huawei.com> |
|
| 35 |
-Reviewed-by: Jun Piao <piaojun@huawei.com> |
|
| 36 |
-Reviewed-by: Joseph Qi <jiangqi903@gmail.com> |
|
| 37 |
-Cc: Mark Fasheh <mfasheh@versity.com> |
|
| 38 |
-Cc: Joel Becker <jlbec@evilplan.org> |
|
| 39 |
-Cc: Junxiao Bi <junxiao.bi@oracle.com> |
|
| 40 |
-Signed-off-by: Andrew Morton <akpm@linux-foundation.org> |
|
| 41 |
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> |
|
| 42 |
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu> |
|
| 43 |
- fs/ocfs2/cluster/nodemanager.c | 63 ++++++++++++++++++++++++++++++++++++------ |
|
| 44 |
- 1 file changed, 55 insertions(+), 8 deletions(-) |
|
| 45 |
- |
|
| 46 |
-diff --git a/fs/ocfs2/cluster/nodemanager.c b/fs/ocfs2/cluster/nodemanager.c |
|
| 47 |
-index a51200e..da64c3a2 100644 |
|
| 48 |
-+++ b/fs/ocfs2/cluster/nodemanager.c |
|
| 49 |
-@@ -40,6 +40,9 @@ char *o2nm_fence_method_desc[O2NM_FENCE_METHODS] = {
|
|
| 50 |
- "panic", /* O2NM_FENCE_PANIC */ |
|
| 51 |
- }; |
|
| 52 |
- |
|
| 53 |
-+static inline void o2nm_lock_subsystem(void); |
|
| 54 |
-+static inline void o2nm_unlock_subsystem(void); |
|
| 55 |
-+ |
|
| 56 |
- struct o2nm_node *o2nm_get_node_by_num(u8 node_num) |
|
| 57 |
- {
|
|
| 58 |
- struct o2nm_node *node = NULL; |
|
| 59 |
-@@ -181,7 +184,10 @@ static struct o2nm_cluster *to_o2nm_cluster_from_node(struct o2nm_node *node) |
|
| 60 |
- {
|
|
| 61 |
- /* through the first node_set .parent |
|
| 62 |
- * mycluster/nodes/mynode == o2nm_cluster->o2nm_node_group->o2nm_node */ |
|
| 63 |
-- return to_o2nm_cluster(node->nd_item.ci_parent->ci_parent); |
|
| 64 |
-+ if (node->nd_item.ci_parent) |
|
| 65 |
-+ return to_o2nm_cluster(node->nd_item.ci_parent->ci_parent); |
|
| 66 |
-+ else |
|
| 67 |
-+ return NULL; |
|
| 68 |
- } |
|
| 69 |
- |
|
| 70 |
- enum {
|
|
| 71 |
-@@ -194,7 +200,7 @@ static ssize_t o2nm_node_num_store(struct config_item *item, const char *page, |
|
| 72 |
- size_t count) |
|
| 73 |
- {
|
|
| 74 |
- struct o2nm_node *node = to_o2nm_node(item); |
|
| 75 |
-- struct o2nm_cluster *cluster = to_o2nm_cluster_from_node(node); |
|
| 76 |
-+ struct o2nm_cluster *cluster; |
|
| 77 |
- unsigned long tmp; |
|
| 78 |
- char *p = (char *)page; |
|
| 79 |
- int ret = 0; |
|
| 80 |
-@@ -214,6 +220,13 @@ static ssize_t o2nm_node_num_store(struct config_item *item, const char *page, |
|
| 81 |
- !test_bit(O2NM_NODE_ATTR_PORT, &node->nd_set_attributes)) |
|
| 82 |
- return -EINVAL; /* XXX */ |
|
| 83 |
- |
|
| 84 |
-+ o2nm_lock_subsystem(); |
|
| 85 |
-+ cluster = to_o2nm_cluster_from_node(node); |
|
| 86 |
-+ if (!cluster) {
|
|
| 87 |
-+ o2nm_unlock_subsystem(); |
|
| 88 |
-+ return -EINVAL; |
|
| 89 |
-+ } |
|
| 90 |
-+ |
|
| 91 |
- write_lock(&cluster->cl_nodes_lock); |
|
| 92 |
- if (cluster->cl_nodes[tmp]) |
|
| 93 |
- ret = -EEXIST; |
|
| 94 |
-@@ -226,6 +239,8 @@ static ssize_t o2nm_node_num_store(struct config_item *item, const char *page, |
|
| 95 |
- set_bit(tmp, cluster->cl_nodes_bitmap); |
|
| 96 |
- } |
|
| 97 |
- write_unlock(&cluster->cl_nodes_lock); |
|
| 98 |
-+ o2nm_unlock_subsystem(); |
|
| 99 |
-+ |
|
| 100 |
- if (ret) |
|
| 101 |
- return ret; |
|
| 102 |
- |
|
| 103 |
-@@ -269,7 +284,7 @@ static ssize_t o2nm_node_ipv4_address_store(struct config_item *item, |
|
| 104 |
- size_t count) |
|
| 105 |
- {
|
|
| 106 |
- struct o2nm_node *node = to_o2nm_node(item); |
|
| 107 |
-- struct o2nm_cluster *cluster = to_o2nm_cluster_from_node(node); |
|
| 108 |
-+ struct o2nm_cluster *cluster; |
|
| 109 |
- int ret, i; |
|
| 110 |
- struct rb_node **p, *parent; |
|
| 111 |
- unsigned int octets[4]; |
|
| 112 |
-@@ -286,6 +301,13 @@ static ssize_t o2nm_node_ipv4_address_store(struct config_item *item, |
|
| 113 |
- be32_add_cpu(&ipv4_addr, octets[i] << (i * 8)); |
|
| 114 |
- } |
|
| 115 |
- |
|
| 116 |
-+ o2nm_lock_subsystem(); |
|
| 117 |
-+ cluster = to_o2nm_cluster_from_node(node); |
|
| 118 |
-+ if (!cluster) {
|
|
| 119 |
-+ o2nm_unlock_subsystem(); |
|
| 120 |
-+ return -EINVAL; |
|
| 121 |
-+ } |
|
| 122 |
-+ |
|
| 123 |
- ret = 0; |
|
| 124 |
- write_lock(&cluster->cl_nodes_lock); |
|
| 125 |
- if (o2nm_node_ip_tree_lookup(cluster, ipv4_addr, &p, &parent)) |
|
| 126 |
-@@ -298,6 +320,8 @@ static ssize_t o2nm_node_ipv4_address_store(struct config_item *item, |
|
| 127 |
- rb_insert_color(&node->nd_ip_node, &cluster->cl_node_ip_tree); |
|
| 128 |
- } |
|
| 129 |
- write_unlock(&cluster->cl_nodes_lock); |
|
| 130 |
-+ o2nm_unlock_subsystem(); |
|
| 131 |
-+ |
|
| 132 |
- if (ret) |
|
| 133 |
- return ret; |
|
| 134 |
- |
|
| 135 |
-@@ -315,7 +339,7 @@ static ssize_t o2nm_node_local_store(struct config_item *item, const char *page, |
|
| 136 |
- size_t count) |
|
| 137 |
- {
|
|
| 138 |
- struct o2nm_node *node = to_o2nm_node(item); |
|
| 139 |
-- struct o2nm_cluster *cluster = to_o2nm_cluster_from_node(node); |
|
| 140 |
-+ struct o2nm_cluster *cluster; |
|
| 141 |
- unsigned long tmp; |
|
| 142 |
- char *p = (char *)page; |
|
| 143 |
- ssize_t ret; |
|
| 144 |
-@@ -333,17 +357,26 @@ static ssize_t o2nm_node_local_store(struct config_item *item, const char *page, |
|
| 145 |
- !test_bit(O2NM_NODE_ATTR_PORT, &node->nd_set_attributes)) |
|
| 146 |
- return -EINVAL; /* XXX */ |
|
| 147 |
- |
|
| 148 |
-+ o2nm_lock_subsystem(); |
|
| 149 |
-+ cluster = to_o2nm_cluster_from_node(node); |
|
| 150 |
-+ if (!cluster) {
|
|
| 151 |
-+ ret = -EINVAL; |
|
| 152 |
-+ goto out; |
|
| 153 |
-+ } |
|
| 154 |
-+ |
|
| 155 |
- /* the only failure case is trying to set a new local node |
|
| 156 |
- * when a different one is already set */ |
|
| 157 |
- if (tmp && tmp == cluster->cl_has_local && |
|
| 158 |
-- cluster->cl_local_node != node->nd_num) |
|
| 159 |
-- return -EBUSY; |
|
| 160 |
-+ cluster->cl_local_node != node->nd_num) {
|
|
| 161 |
-+ ret = -EBUSY; |
|
| 162 |
-+ goto out; |
|
| 163 |
-+ } |
|
| 164 |
- |
|
| 165 |
- /* bring up the rx thread if we're setting the new local node. */ |
|
| 166 |
- if (tmp && !cluster->cl_has_local) {
|
|
| 167 |
- ret = o2net_start_listening(node); |
|
| 168 |
- if (ret) |
|
| 169 |
-- return ret; |
|
| 170 |
-+ goto out; |
|
| 171 |
- } |
|
| 172 |
- |
|
| 173 |
- if (!tmp && cluster->cl_has_local && |
|
| 174 |
-@@ -358,7 +391,11 @@ static ssize_t o2nm_node_local_store(struct config_item *item, const char *page, |
|
| 175 |
- cluster->cl_local_node = node->nd_num; |
|
| 176 |
- } |
|
| 177 |
- |
|
| 178 |
-- return count; |
|
| 179 |
-+ ret = count; |
|
| 180 |
-+ |
|
| 181 |
-+out: |
|
| 182 |
-+ o2nm_unlock_subsystem(); |
|
| 183 |
-+ return ret; |
|
| 184 |
- } |
|
| 185 |
- |
|
| 186 |
- CONFIGFS_ATTR(o2nm_node_, num); |
|
| 187 |
-@@ -738,6 +775,16 @@ static struct o2nm_cluster_group o2nm_cluster_group = {
|
|
| 188 |
- }, |
|
| 189 |
- }; |
|
| 190 |
- |
|
| 191 |
-+static inline void o2nm_lock_subsystem(void) |
|
| 192 |
-+{
|
|
| 193 |
-+ mutex_lock(&o2nm_cluster_group.cs_subsys.su_mutex); |
|
| 194 |
-+} |
|
| 195 |
-+ |
|
| 196 |
-+static inline void o2nm_unlock_subsystem(void) |
|
| 197 |
-+{
|
|
| 198 |
-+ mutex_unlock(&o2nm_cluster_group.cs_subsys.su_mutex); |
|
| 199 |
-+} |
|
| 200 |
-+ |
|
| 201 |
- int o2nm_depend_item(struct config_item *item) |
|
| 202 |
- {
|
|
| 203 |
- return configfs_depend_item(&o2nm_cluster_group.cs_subsys, item); |
|
| 204 |
-2.7.4 |
|
| 205 |
- |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux-aws |
| 4 |
-Version: 4.9.111 |
|
| 5 |
-Release: 5%{?kat_build:.%kat_build}%{?dist}
|
|
| 4 |
+Version: 4.9.114 |
|
| 5 |
+Release: 1%{?kat_build:.%kat_build}%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3 |
|
| 12 |
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99 |
|
| 13 | 13 |
Source1: config-aws |
| 14 | 14 |
Source2: initramfs.trigger |
| 15 | 15 |
# common |
| ... | ... |
@@ -50,14 +50,10 @@ Patch33: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 50 | 50 |
# Fixes for CVE-2018-1000026 |
| 51 | 51 |
Patch34: 0001-net-create-skb_gso_validate_mac_len.patch |
| 52 | 52 |
Patch35: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
| 53 |
-# Fix for CVE-2017-18216 |
|
| 54 |
-Patch37: 0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch |
|
| 55 | 53 |
# Fix for CVE-2018-8043 |
| 56 | 54 |
Patch38: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 57 | 55 |
# Fix for CVE-2017-18241 |
| 58 | 56 |
Patch40: 0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch |
| 59 |
-# Fix for CVE-2017-18224 |
|
| 60 |
-Patch41: 0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch |
|
| 61 | 57 |
Patch42: 0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch |
| 62 | 58 |
# Fix for CVE-2017-18232 |
| 63 | 59 |
Patch43: 0001-scsi-libsas-direct-call-probe-and-destruct.patch |
| ... | ... |
@@ -242,10 +238,8 @@ This package contains the 'perf' performance analysis tools for Linux kernel. |
| 242 | 242 |
%patch33 -p1 |
| 243 | 243 |
%patch34 -p1 |
| 244 | 244 |
%patch35 -p1 |
| 245 |
-%patch37 -p1 |
|
| 246 | 245 |
%patch38 -p1 |
| 247 | 246 |
%patch40 -p1 |
| 248 |
-%patch41 -p1 |
|
| 249 | 247 |
%patch42 -p1 |
| 250 | 248 |
%patch43 -p1 |
| 251 | 249 |
%patch44 -p1 |
| ... | ... |
@@ -477,6 +471,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
|
| 477 | 477 |
/usr/share/doc/* |
| 478 | 478 |
|
| 479 | 479 |
%changelog |
| 480 |
+* Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1 |
|
| 481 |
+- Update to version 4.9.114 |
|
| 480 | 482 |
* Thu Jul 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-5 |
| 481 | 483 |
- Apply out-of-tree patches needed for AppArmor. |
| 482 | 484 |
* Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-4 |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux-esx |
| 4 |
-Version: 4.9.111 |
|
| 5 |
-Release: 3%{?dist}
|
|
| 4 |
+Version: 4.9.114 |
|
| 5 |
+Release: 1%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3 |
|
| 12 |
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99 |
|
| 13 | 13 |
Source1: config-esx |
| 14 | 14 |
Source2: initramfs.trigger |
| 15 | 15 |
# common |
| ... | ... |
@@ -47,14 +47,10 @@ Patch33: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 47 | 47 |
# Fixes for CVE-2018-1000026 |
| 48 | 48 |
Patch34: 0001-net-create-skb_gso_validate_mac_len.patch |
| 49 | 49 |
Patch35: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
| 50 |
-# Fix for CVE-2017-18216 |
|
| 51 |
-Patch37: 0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch |
|
| 52 | 50 |
# Fix for CVE-2018-8043 |
| 53 | 51 |
Patch38: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 54 | 52 |
# Fix for CVE-2017-18241 |
| 55 | 53 |
Patch40: 0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch |
| 56 |
-# Fix for CVE-2017-18224 |
|
| 57 |
-Patch41: 0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch |
|
| 58 | 54 |
Patch42: 0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch |
| 59 | 55 |
# Fix for CVE-2017-18232 |
| 60 | 56 |
Patch43: 0001-scsi-libsas-direct-call-probe-and-destruct.patch |
| ... | ... |
@@ -152,10 +148,8 @@ The Linux package contains the Linux kernel doc files |
| 152 | 152 |
%patch33 -p1 |
| 153 | 153 |
%patch34 -p1 |
| 154 | 154 |
%patch35 -p1 |
| 155 |
-%patch37 -p1 |
|
| 156 | 155 |
%patch38 -p1 |
| 157 | 156 |
%patch40 -p1 |
| 158 |
-%patch41 -p1 |
|
| 159 | 157 |
%patch42 -p1 |
| 160 | 158 |
%patch43 -p1 |
| 161 | 159 |
%patch44 -p1 |
| ... | ... |
@@ -275,6 +269,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
|
| 275 | 275 |
/usr/src/linux-headers-%{uname_r}
|
| 276 | 276 |
|
| 277 | 277 |
%changelog |
| 278 |
+* Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1 |
|
| 279 |
+- Update to version 4.9.114 |
|
| 278 | 280 |
* Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-3 |
| 279 | 281 |
- Fix CVE-2018-10322 |
| 280 | 282 |
* Thu Jul 12 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-2 |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux-secure |
| 4 |
-Version: 4.9.111 |
|
| 5 |
-Release: 4%{?kat_build:.%kat_build}%{?dist}
|
|
| 4 |
+Version: 4.9.114 |
|
| 5 |
+Release: 1%{?kat_build:.%kat_build}%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3 |
|
| 12 |
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99 |
|
| 13 | 13 |
Source1: config-secure |
| 14 | 14 |
Source2: aufs4.9.tar.gz |
| 15 | 15 |
%define sha1 aufs=ebe716ce4b638a3772c7cd3161abbfe11d584906 |
| ... | ... |
@@ -56,14 +56,10 @@ Patch35: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 56 | 56 |
# Fixes for CVE-2018-1000026 |
| 57 | 57 |
Patch36: 0001-net-create-skb_gso_validate_mac_len.patch |
| 58 | 58 |
Patch37: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
| 59 |
-# Fix for CVE-2017-18216 |
|
| 60 |
-Patch39: 0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch |
|
| 61 | 59 |
# Fix for CVE-2018-8043 |
| 62 | 60 |
Patch40: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 63 | 61 |
# Fix for CVE-2017-18241 |
| 64 | 62 |
Patch42: 0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch |
| 65 |
-# Fix for CVE-2017-18224 |
|
| 66 |
-Patch43: 0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch |
|
| 67 | 63 |
Patch44: 0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch |
| 68 | 64 |
# Fix for CVE-2017-18232 |
| 69 | 65 |
Patch45: 0001-scsi-libsas-direct-call-probe-and-destruct.patch |
| ... | ... |
@@ -208,10 +204,8 @@ EOF |
| 208 | 208 |
%patch35 -p1 |
| 209 | 209 |
%patch36 -p1 |
| 210 | 210 |
%patch37 -p1 |
| 211 |
-%patch39 -p1 |
|
| 212 | 211 |
%patch40 -p1 |
| 213 | 212 |
%patch42 -p1 |
| 214 |
-%patch43 -p1 |
|
| 215 | 213 |
%patch44 -p1 |
| 216 | 214 |
%patch45 -p1 |
| 217 | 215 |
%patch46 -p1 |
| ... | ... |
@@ -370,6 +364,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
|
| 370 | 370 |
/usr/src/linux-headers-%{uname_r}
|
| 371 | 371 |
|
| 372 | 372 |
%changelog |
| 373 |
+* Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1 |
|
| 374 |
+- Update to version 4.9.114 |
|
| 373 | 375 |
* Thu Jul 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-4 |
| 374 | 376 |
- Apply out-of-tree patches needed for AppArmor. |
| 375 | 377 |
* Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-3 |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux |
| 4 |
-Version: 4.9.111 |
|
| 5 |
-Release: 5%{?kat_build:.%kat_build}%{?dist}
|
|
| 4 |
+Version: 4.9.114 |
|
| 5 |
+Release: 1%{?kat_build:.%kat_build}%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3 |
|
| 12 |
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99 |
|
| 13 | 13 |
Source1: config |
| 14 | 14 |
Source2: initramfs.trigger |
| 15 | 15 |
%define ena_version 1.1.3 |
| ... | ... |
@@ -54,14 +54,11 @@ Patch33: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 54 | 54 |
# Fixes for CVE-2018-1000026 |
| 55 | 55 |
Patch34: 0001-net-create-skb_gso_validate_mac_len.patch |
| 56 | 56 |
Patch35: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
| 57 |
-# Fix for CVE-2017-18216 |
|
| 58 |
-Patch37: 0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch |
|
| 59 | 57 |
# Fix for CVE-2018-8043 |
| 60 | 58 |
Patch38: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 61 | 59 |
# Fix for CVE-2017-18241 |
| 62 | 60 |
Patch40: 0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch |
| 63 |
-# Fix for CVE-2017-18224 |
|
| 64 |
-Patch41: 0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch |
|
| 61 |
+ |
|
| 65 | 62 |
Patch42: 0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch |
| 66 | 63 |
# Fix for CVE-2017-18232 |
| 67 | 64 |
Patch43: 0001-scsi-libsas-direct-call-probe-and-destruct.patch |
| ... | ... |
@@ -200,10 +197,8 @@ This package contains the 'perf' performance analysis tools for Linux kernel. |
| 200 | 200 |
%patch33 -p1 |
| 201 | 201 |
%patch34 -p1 |
| 202 | 202 |
%patch35 -p1 |
| 203 |
-%patch37 -p1 |
|
| 204 | 203 |
%patch38 -p1 |
| 205 | 204 |
%patch40 -p1 |
| 206 |
-%patch41 -p1 |
|
| 207 | 205 |
%patch42 -p1 |
| 208 | 206 |
%patch43 -p1 |
| 209 | 207 |
%patch44 -p1 |
| ... | ... |
@@ -397,6 +392,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
|
| 397 | 397 |
/usr/share/doc/* |
| 398 | 398 |
|
| 399 | 399 |
%changelog |
| 400 |
+* Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1 |
|
| 401 |
+- Update to version 4.9.114 |
|
| 400 | 402 |
* Thu Jul 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-5 |
| 401 | 403 |
- Apply out-of-tree patches needed for AppArmor. |
| 402 | 404 |
* Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-4 |