Browse code

kernels: version update to 4.9.114

Extras:
- Remove OCFS2 CVE patches as those fixes have been merged in 4.9.114
stable branch.

Change-Id: Iaccc045658962224084e203fd45e7d898c16fc46
Signed-off-by: srinidhira0 <srinidhir@vmware.com>
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/5397
Reviewed-by: Ajay Kaher <akaher@vmware.com>
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Srivatsa S. Bhat <srivatsab@vmware.com>

srinidhira0 authored on 2018/07/25 00:40:11
Showing 7 changed files
... ...
@@ -1,6 +1,6 @@
1 1
 Summary:	Linux API header files
2 2
 Name:		linux-api-headers
3
-Version:	4.9.111
3
+Version:	4.9.114
4 4
 Release:	1%{?dist}
5 5
 License:	GPLv2
6 6
 URL:		http://www.kernel.org/
... ...
@@ -8,7 +8,7 @@ Group:		System Environment/Kernel
8 8
 Vendor:		VMware, Inc.
9 9
 Distribution: Photon
10 10
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
11
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3
11
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99
12 12
 BuildArch:	noarch
13 13
 Patch0:         Implement-the-f-xattrat-family-of-functions.patch
14 14
 %description
... ...
@@ -27,6 +27,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
27 27
 %defattr(-,root,root)
28 28
 %{_includedir}/*
29 29
 %changelog
30
+*   Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1
31
+-   Update to version 4.9.114
30 32
 *   Sat Jul 07 2018 Alexey Makhalov <amakhalov@vmware.com> 4.9.111-1
31 33
 -   Update to version 4.9.111
32 34
 *   Thu Jun 21 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.109-1
33 35
deleted file mode 100644
... ...
@@ -1,121 +0,0 @@
1
-From 3e4c56d41eef5595035872a2ec5a483f42e8917f Mon Sep 17 00:00:00 2001
2
-From: alex chen <alex.chen@huawei.com>
3
-Date: Wed, 15 Nov 2017 17:31:44 -0800
4
-Subject: [PATCH] ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()
5
-
6
-ip_alloc_sem should be taken in ocfs2_get_block() when reading file in
7
-DIRECT mode to prevent concurrent access to extent tree with
8
-ocfs2_dio_end_io_write(), which may cause BUGON in the following
9
-situation:
10
-
11
-read file 'A'                                  end_io of writing file 'A'
12
-vfs_read
13
- __vfs_read
14
-  ocfs2_file_read_iter
15
-   generic_file_read_iter
16
-    ocfs2_direct_IO
17
-     __blockdev_direct_IO
18
-      do_blockdev_direct_IO
19
-       do_direct_IO
20
-        get_more_blocks
21
-         ocfs2_get_block
22
-          ocfs2_extent_map_get_blocks
23
-           ocfs2_get_clusters
24
-            ocfs2_get_clusters_nocache()
25
-             ocfs2_search_extent_list
26
-              return the index of record which
27
-              contains the v_cluster, that is
28
-              v_cluster > rec[i]->e_cpos.
29
-                                                ocfs2_dio_end_io
30
-                                                 ocfs2_dio_end_io_write
31
-                                                  down_write(&oi->ip_alloc_sem);
32
-                                                  ocfs2_mark_extent_written
33
-                                                   ocfs2_change_extent_flag
34
-                                                    ocfs2_split_extent
35
-                                                     ...
36
-                                                 --> modify the rec[i]->e_cpos, resulting
37
-                                                     in v_cluster < rec[i]->e_cpos.
38
-             BUG_ON(v_cluster < le32_to_cpu(rec->e_cpos))
39
-
40
-[alex.chen@huawei.com: v3]
41
-  Link: http://lkml.kernel.org/r/59EF3614.6050008@huawei.com
42
-Link: http://lkml.kernel.org/r/59EF3614.6050008@huawei.com
43
-Fixes: c15471f79506 ("ocfs2: fix sparse file & data ordering issue in direct io")
44
-Signed-off-by: Alex Chen <alex.chen@huawei.com>
45
-Reviewed-by: Jun Piao <piaojun@huawei.com>
46
-Reviewed-by: Joseph Qi <jiangqi903@gmail.com>
47
-Reviewed-by: Gang He <ghe@suse.com>
48
-Acked-by: Changwei Ge <ge.changwei@h3c.com>
49
-Cc: Mark Fasheh <mfasheh@versity.com>
50
-Cc: Joel Becker <jlbec@evilplan.org>
51
-Cc: Junxiao Bi <junxiao.bi@oracle.com>
52
-Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
53
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
54
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
55
- fs/ocfs2/aops.c | 26 ++++++++++++++++++--------
56
- 1 file changed, 18 insertions(+), 8 deletions(-)
57
-
58
-diff --git a/fs/ocfs2/aops.c b/fs/ocfs2/aops.c
59
-index f2961b1..c26d046 100644
60
-+++ b/fs/ocfs2/aops.c
61
-@@ -134,6 +134,19 @@ static int ocfs2_symlink_get_block(struct inode *inode, sector_t iblock,
62
- 	return err;
63
- }
64
- 
65
-+static int ocfs2_lock_get_block(struct inode *inode, sector_t iblock,
66
-+		    struct buffer_head *bh_result, int create)
67
-+{
68
-+	int ret = 0;
69
-+	struct ocfs2_inode_info *oi = OCFS2_I(inode);
70
-+
71
-+	down_read(&oi->ip_alloc_sem);
72
-+	ret = ocfs2_get_block(inode, iblock, bh_result, create);
73
-+	up_read(&oi->ip_alloc_sem);
74
-+
75
-+	return ret;
76
-+}
77
-+
78
- int ocfs2_get_block(struct inode *inode, sector_t iblock,
79
- 		    struct buffer_head *bh_result, int create)
80
- {
81
-@@ -2120,7 +2133,7 @@ static void ocfs2_dio_free_write_ctx(struct inode *inode,
82
-  * called like this: dio->get_blocks(dio->inode, fs_startblk,
83
-  * 					fs_count, map_bh, dio->rw == WRITE);
84
-  */
85
--static int ocfs2_dio_get_block(struct inode *inode, sector_t iblock,
86
-+static int ocfs2_dio_wr_get_block(struct inode *inode, sector_t iblock,
87
- 			       struct buffer_head *bh_result, int create)
88
- {
89
- 	struct ocfs2_super *osb = OCFS2_SB(inode->i_sb);
90
-@@ -2146,12 +2159,9 @@ static int ocfs2_dio_get_block(struct inode *inode, sector_t iblock,
91
- 	 * while file size will be changed.
92
- 	 */
93
- 	if (pos + total_len <= i_size_read(inode)) {
94
--		down_read(&oi->ip_alloc_sem);
95
--		/* This is the fast path for re-write. */
96
--		ret = ocfs2_get_block(inode, iblock, bh_result, create);
97
--
98
--		up_read(&oi->ip_alloc_sem);
99
- 
100
-+		/* This is the fast path for re-write. */
101
-+		ret = ocfs2_lock_get_block(inode, iblock, bh_result, create);
102
- 		if (buffer_mapped(bh_result) &&
103
- 		    !buffer_new(bh_result) &&
104
- 		    ret == 0)
105
-@@ -2416,9 +2426,9 @@ static ssize_t ocfs2_direct_IO(struct kiocb *iocb, struct iov_iter *iter)
106
- 		return 0;
107
- 
108
- 	if (iov_iter_rw(iter) == READ)
109
--		get_block = ocfs2_get_block;
110
-+		get_block = ocfs2_lock_get_block;
111
- 	else
112
--		get_block = ocfs2_dio_get_block;
113
-+		get_block = ocfs2_dio_wr_get_block;
114
- 
115
- 	return __blockdev_direct_IO(iocb, inode, inode->i_sb->s_bdev,
116
- 				    iter, get_block,
117
-2.7.4
118
-
119 1
deleted file mode 100644
... ...
@@ -1,208 +0,0 @@
1
-From 853bc26a7ea39e354b9f8889ae7ad1492ffa28d2 Mon Sep 17 00:00:00 2001
2
-From: alex chen <alex.chen@huawei.com>
3
-Date: Wed, 15 Nov 2017 17:31:48 -0800
4
-Subject: [PATCH] ocfs2: subsystem.su_mutex is required while accessing the
5
- item->ci_parent
6
-
7
-The subsystem.su_mutex is required while accessing the item->ci_parent,
8
-otherwise, NULL pointer dereference to the item->ci_parent will be
9
-triggered in the following situation:
10
-
11
-add node                     delete node
12
-sys_write
13
- vfs_write
14
-  configfs_write_file
15
-   o2nm_node_store
16
-    o2nm_node_local_write
17
-                             do_rmdir
18
-                              vfs_rmdir
19
-                               configfs_rmdir
20
-                                mutex_lock(&subsys->su_mutex);
21
-                                unlink_obj
22
-                                 item->ci_group = NULL;
23
-                                 item->ci_parent = NULL;
24
-	 to_o2nm_cluster_from_node
25
-	  node->nd_item.ci_parent->ci_parent
26
-	  BUG since of NULL pointer dereference to nd_item.ci_parent
27
-
28
-Moreover, the o2nm_cluster also should be protected by the
29
-subsystem.su_mutex.
30
-
31
-[alex.chen@huawei.com: v2]
32
-  Link: http://lkml.kernel.org/r/59EEAA69.9080703@huawei.com
33
-Link: http://lkml.kernel.org/r/59E9B36A.10700@huawei.com
34
-Signed-off-by: Alex Chen <alex.chen@huawei.com>
35
-Reviewed-by: Jun Piao <piaojun@huawei.com>
36
-Reviewed-by: Joseph Qi <jiangqi903@gmail.com>
37
-Cc: Mark Fasheh <mfasheh@versity.com>
38
-Cc: Joel Becker <jlbec@evilplan.org>
39
-Cc: Junxiao Bi <junxiao.bi@oracle.com>
40
-Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
41
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
42
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
43
- fs/ocfs2/cluster/nodemanager.c | 63 ++++++++++++++++++++++++++++++++++++------
44
- 1 file changed, 55 insertions(+), 8 deletions(-)
45
-
46
-diff --git a/fs/ocfs2/cluster/nodemanager.c b/fs/ocfs2/cluster/nodemanager.c
47
-index a51200e..da64c3a2 100644
48
-+++ b/fs/ocfs2/cluster/nodemanager.c
49
-@@ -40,6 +40,9 @@ char *o2nm_fence_method_desc[O2NM_FENCE_METHODS] = {
50
- 		"panic",	/* O2NM_FENCE_PANIC */
51
- };
52
- 
53
-+static inline void o2nm_lock_subsystem(void);
54
-+static inline void o2nm_unlock_subsystem(void);
55
-+
56
- struct o2nm_node *o2nm_get_node_by_num(u8 node_num)
57
- {
58
- 	struct o2nm_node *node = NULL;
59
-@@ -181,7 +184,10 @@ static struct o2nm_cluster *to_o2nm_cluster_from_node(struct o2nm_node *node)
60
- {
61
- 	/* through the first node_set .parent
62
- 	 * mycluster/nodes/mynode == o2nm_cluster->o2nm_node_group->o2nm_node */
63
--	return to_o2nm_cluster(node->nd_item.ci_parent->ci_parent);
64
-+	if (node->nd_item.ci_parent)
65
-+		return to_o2nm_cluster(node->nd_item.ci_parent->ci_parent);
66
-+	else
67
-+		return NULL;
68
- }
69
- 
70
- enum {
71
-@@ -194,7 +200,7 @@ static ssize_t o2nm_node_num_store(struct config_item *item, const char *page,
72
- 				   size_t count)
73
- {
74
- 	struct o2nm_node *node = to_o2nm_node(item);
75
--	struct o2nm_cluster *cluster = to_o2nm_cluster_from_node(node);
76
-+	struct o2nm_cluster *cluster;
77
- 	unsigned long tmp;
78
- 	char *p = (char *)page;
79
- 	int ret = 0;
80
-@@ -214,6 +220,13 @@ static ssize_t o2nm_node_num_store(struct config_item *item, const char *page,
81
- 	    !test_bit(O2NM_NODE_ATTR_PORT, &node->nd_set_attributes))
82
- 		return -EINVAL; /* XXX */
83
- 
84
-+	o2nm_lock_subsystem();
85
-+	cluster = to_o2nm_cluster_from_node(node);
86
-+	if (!cluster) {
87
-+		o2nm_unlock_subsystem();
88
-+		return -EINVAL;
89
-+	}
90
-+
91
- 	write_lock(&cluster->cl_nodes_lock);
92
- 	if (cluster->cl_nodes[tmp])
93
- 		ret = -EEXIST;
94
-@@ -226,6 +239,8 @@ static ssize_t o2nm_node_num_store(struct config_item *item, const char *page,
95
- 		set_bit(tmp, cluster->cl_nodes_bitmap);
96
- 	}
97
- 	write_unlock(&cluster->cl_nodes_lock);
98
-+	o2nm_unlock_subsystem();
99
-+
100
- 	if (ret)
101
- 		return ret;
102
- 
103
-@@ -269,7 +284,7 @@ static ssize_t o2nm_node_ipv4_address_store(struct config_item *item,
104
- 					    size_t count)
105
- {
106
- 	struct o2nm_node *node = to_o2nm_node(item);
107
--	struct o2nm_cluster *cluster = to_o2nm_cluster_from_node(node);
108
-+	struct o2nm_cluster *cluster;
109
- 	int ret, i;
110
- 	struct rb_node **p, *parent;
111
- 	unsigned int octets[4];
112
-@@ -286,6 +301,13 @@ static ssize_t o2nm_node_ipv4_address_store(struct config_item *item,
113
- 		be32_add_cpu(&ipv4_addr, octets[i] << (i * 8));
114
- 	}
115
- 
116
-+	o2nm_lock_subsystem();
117
-+	cluster = to_o2nm_cluster_from_node(node);
118
-+	if (!cluster) {
119
-+		o2nm_unlock_subsystem();
120
-+		return -EINVAL;
121
-+	}
122
-+
123
- 	ret = 0;
124
- 	write_lock(&cluster->cl_nodes_lock);
125
- 	if (o2nm_node_ip_tree_lookup(cluster, ipv4_addr, &p, &parent))
126
-@@ -298,6 +320,8 @@ static ssize_t o2nm_node_ipv4_address_store(struct config_item *item,
127
- 		rb_insert_color(&node->nd_ip_node, &cluster->cl_node_ip_tree);
128
- 	}
129
- 	write_unlock(&cluster->cl_nodes_lock);
130
-+	o2nm_unlock_subsystem();
131
-+
132
- 	if (ret)
133
- 		return ret;
134
- 
135
-@@ -315,7 +339,7 @@ static ssize_t o2nm_node_local_store(struct config_item *item, const char *page,
136
- 				     size_t count)
137
- {
138
- 	struct o2nm_node *node = to_o2nm_node(item);
139
--	struct o2nm_cluster *cluster = to_o2nm_cluster_from_node(node);
140
-+	struct o2nm_cluster *cluster;
141
- 	unsigned long tmp;
142
- 	char *p = (char *)page;
143
- 	ssize_t ret;
144
-@@ -333,17 +357,26 @@ static ssize_t o2nm_node_local_store(struct config_item *item, const char *page,
145
- 	    !test_bit(O2NM_NODE_ATTR_PORT, &node->nd_set_attributes))
146
- 		return -EINVAL; /* XXX */
147
- 
148
-+	o2nm_lock_subsystem();
149
-+	cluster = to_o2nm_cluster_from_node(node);
150
-+	if (!cluster) {
151
-+		ret = -EINVAL;
152
-+		goto out;
153
-+	}
154
-+
155
- 	/* the only failure case is trying to set a new local node
156
- 	 * when a different one is already set */
157
- 	if (tmp && tmp == cluster->cl_has_local &&
158
--	    cluster->cl_local_node != node->nd_num)
159
--		return -EBUSY;
160
-+	    cluster->cl_local_node != node->nd_num) {
161
-+		ret = -EBUSY;
162
-+		goto out;
163
-+	}
164
- 
165
- 	/* bring up the rx thread if we're setting the new local node. */
166
- 	if (tmp && !cluster->cl_has_local) {
167
- 		ret = o2net_start_listening(node);
168
- 		if (ret)
169
--			return ret;
170
-+			goto out;
171
- 	}
172
- 
173
- 	if (!tmp && cluster->cl_has_local &&
174
-@@ -358,7 +391,11 @@ static ssize_t o2nm_node_local_store(struct config_item *item, const char *page,
175
- 		cluster->cl_local_node = node->nd_num;
176
- 	}
177
- 
178
--	return count;
179
-+	ret = count;
180
-+
181
-+out:
182
-+	o2nm_unlock_subsystem();
183
-+	return ret;
184
- }
185
- 
186
- CONFIGFS_ATTR(o2nm_node_, num);
187
-@@ -738,6 +775,16 @@ static struct o2nm_cluster_group o2nm_cluster_group = {
188
- 	},
189
- };
190
- 
191
-+static inline void o2nm_lock_subsystem(void)
192
-+{
193
-+	mutex_lock(&o2nm_cluster_group.cs_subsys.su_mutex);
194
-+}
195
-+
196
-+static inline void o2nm_unlock_subsystem(void)
197
-+{
198
-+	mutex_unlock(&o2nm_cluster_group.cs_subsys.su_mutex);
199
-+}
200
-+
201
- int o2nm_depend_item(struct config_item *item)
202
- {
203
- 	return configfs_depend_item(&o2nm_cluster_group.cs_subsys, item);
204
-2.7.4
205
-
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-aws
4
-Version:        4.9.111
5
-Release:        5%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.9.114
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution: 	Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3
12
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99
13 13
 Source1:	config-aws
14 14
 Source2:	initramfs.trigger
15 15
 # common
... ...
@@ -50,14 +50,10 @@ Patch33:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
50 50
 # Fixes for CVE-2018-1000026
51 51
 Patch34:        0001-net-create-skb_gso_validate_mac_len.patch
52 52
 Patch35:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
53
-# Fix for CVE-2017-18216
54
-Patch37:        0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch
55 53
 # Fix for CVE-2018-8043
56 54
 Patch38:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
57 55
 # Fix for CVE-2017-18241
58 56
 Patch40:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
59
-# Fix for CVE-2017-18224
60
-Patch41:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
61 57
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
62 58
 # Fix for CVE-2017-18232
63 59
 Patch43:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
... ...
@@ -242,10 +238,8 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
242 242
 %patch33 -p1
243 243
 %patch34 -p1
244 244
 %patch35 -p1
245
-%patch37 -p1
246 245
 %patch38 -p1
247 246
 %patch40 -p1
248
-%patch41 -p1
249 247
 %patch42 -p1
250 248
 %patch43 -p1
251 249
 %patch44 -p1
... ...
@@ -477,6 +471,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
477 477
 /usr/share/doc/*
478 478
 
479 479
 %changelog
480
+*   Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1
481
+-   Update to version 4.9.114
480 482
 *   Thu Jul 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-5
481 483
 -   Apply out-of-tree patches needed for AppArmor.
482 484
 *   Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-4
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-esx
4
-Version:        4.9.111
5
-Release:        3%{?dist}
4
+Version:        4.9.114
5
+Release:        1%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution:   Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3
12
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99
13 13
 Source1:        config-esx
14 14
 Source2:        initramfs.trigger
15 15
 # common
... ...
@@ -47,14 +47,10 @@ Patch33:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
47 47
 # Fixes for CVE-2018-1000026
48 48
 Patch34:        0001-net-create-skb_gso_validate_mac_len.patch
49 49
 Patch35:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
50
-# Fix for CVE-2017-18216
51
-Patch37:        0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch
52 50
 # Fix for CVE-2018-8043
53 51
 Patch38:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
54 52
 # Fix for CVE-2017-18241
55 53
 Patch40:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
56
-# Fix for CVE-2017-18224
57
-Patch41:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
58 54
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
59 55
 # Fix for CVE-2017-18232
60 56
 Patch43:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
... ...
@@ -152,10 +148,8 @@ The Linux package contains the Linux kernel doc files
152 152
 %patch33 -p1
153 153
 %patch34 -p1
154 154
 %patch35 -p1
155
-%patch37 -p1
156 155
 %patch38 -p1
157 156
 %patch40 -p1
158
-%patch41 -p1
159 157
 %patch42 -p1
160 158
 %patch43 -p1
161 159
 %patch44 -p1
... ...
@@ -275,6 +269,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
275 275
 /usr/src/linux-headers-%{uname_r}
276 276
 
277 277
 %changelog
278
+*   Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1
279
+-   Update to version 4.9.114
278 280
 *   Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-3
279 281
 -   Fix CVE-2018-10322
280 282
 *   Thu Jul 12 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-2
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-secure
4
-Version:        4.9.111
5
-Release:        4%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.9.114
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution:   Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3
12
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99
13 13
 Source1:        config-secure
14 14
 Source2:        aufs4.9.tar.gz
15 15
 %define sha1 aufs=ebe716ce4b638a3772c7cd3161abbfe11d584906
... ...
@@ -56,14 +56,10 @@ Patch35:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
56 56
 # Fixes for CVE-2018-1000026
57 57
 Patch36:        0001-net-create-skb_gso_validate_mac_len.patch
58 58
 Patch37:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
59
-# Fix for CVE-2017-18216
60
-Patch39:        0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch
61 59
 # Fix for CVE-2018-8043
62 60
 Patch40:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
63 61
 # Fix for CVE-2017-18241
64 62
 Patch42:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
65
-# Fix for CVE-2017-18224
66
-Patch43:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
67 63
 Patch44:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
68 64
 # Fix for CVE-2017-18232
69 65
 Patch45:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
... ...
@@ -208,10 +204,8 @@ EOF
208 208
 %patch35 -p1
209 209
 %patch36 -p1
210 210
 %patch37 -p1
211
-%patch39 -p1
212 211
 %patch40 -p1
213 212
 %patch42 -p1
214
-%patch43 -p1
215 213
 %patch44 -p1
216 214
 %patch45 -p1
217 215
 %patch46 -p1
... ...
@@ -370,6 +364,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
370 370
 /usr/src/linux-headers-%{uname_r}
371 371
 
372 372
 %changelog
373
+*   Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1
374
+-   Update to version 4.9.114
373 375
 *   Thu Jul 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-4
374 376
 -   Apply out-of-tree patches needed for AppArmor.
375 377
 *   Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-3
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux
4
-Version:        4.9.111
5
-Release:        5%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.9.114
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution: 	Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=4130f2b7979e04c94bef21755d413560961311a3
12
+%define sha1 linux=e6fd3e5317a88f945e26c85471d0152e062f2d99
13 13
 Source1:	config
14 14
 Source2:	initramfs.trigger
15 15
 %define ena_version 1.1.3
... ...
@@ -54,14 +54,11 @@ Patch33:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
54 54
 # Fixes for CVE-2018-1000026
55 55
 Patch34:        0001-net-create-skb_gso_validate_mac_len.patch
56 56
 Patch35:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
57
-# Fix for CVE-2017-18216
58
-Patch37:        0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch
59 57
 # Fix for CVE-2018-8043
60 58
 Patch38:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
61 59
 # Fix for CVE-2017-18241
62 60
 Patch40:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
63
-# Fix for CVE-2017-18224
64
-Patch41:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
61
+
65 62
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
66 63
 # Fix for CVE-2017-18232
67 64
 Patch43:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
... ...
@@ -200,10 +197,8 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
200 200
 %patch33 -p1
201 201
 %patch34 -p1
202 202
 %patch35 -p1
203
-%patch37 -p1
204 203
 %patch38 -p1
205 204
 %patch40 -p1
206
-%patch41 -p1
207 205
 %patch42 -p1
208 206
 %patch43 -p1
209 207
 %patch44 -p1
... ...
@@ -397,6 +392,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
397 397
 /usr/share/doc/*
398 398
 
399 399
 %changelog
400
+*   Mon Jul 23 2018 srinidhira0 <srinidhir@vmware.com> 4.9.114-1
401
+-   Update to version 4.9.114
400 402
 *   Thu Jul 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-5
401 403
 -   Apply out-of-tree patches needed for AppArmor.
402 404
 *   Thu Jul 17 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-4