Browse code

Kernels: Update to 6.1.45

revert-x86-entry-Align-entry-text-section-to-PMD-boundary.patch is to
improve .text size, however it's conflicting with SRSO (Speculative
Return Stack Overflow). Due to SRSO implementation, need to have
ALIGN_ENTRY_TEXT_BEGIN alignment.

linux-esx-6.1.41-2.ph5 —> No alignment:
[0.182910] Memory: 8135808K/8388088K available (8044K kernel code,
1042K rwdata, 3048K rodata, 1288K init, 3700K bss, 252020K reserved,
0K cma-reserved)

linux-esx-6.1.45-1.ph5 —> No alignment
[0.160993] Memory: 8148100K/8388088K available (8058K kernel code,
1042K rwdata, 3200K rodata, 1292K init, 3696K bss, 239728K reserved,
0K cma-reserved)

linux-esx-6.1.45-1.ph5 —> only ALIGN_ENTRY_TEXT_BEGIN
[0.158555] Memory: 8133760K/8388088K available (9233K kernel code,
1042K rwdata, 3200K rodata, 1292K init, 3696K bss, 254068K reserved,
0K cma-reserved)

Change-Id: Icbd3b47e170e2102bbe8bcac123e1ab2f57bf33b
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/c/photon/+/21522
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Ajay Kaher <akaher@vmware.com>
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/c/photon/+/22444
Reviewed-by: Keerthana K <keerthanak@vmware.com>
Tested-by: Ajay Kaher <akaher@vmware.com>

Ajay Kaher authored on 2023/08/15 01:18:01
Showing 14 changed files
... ...
@@ -1,7 +1,7 @@
1 1
 %define debug_package %{nil}
2 2
 Summary:        Linux API header files
3 3
 Name:           linux-api-headers
4
-Version:        6.1.39
4
+Version:        6.1.45
5 5
 Release:        1%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
... ...
@@ -9,7 +9,7 @@ Group:          System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution:   Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v6.x/linux-%{version}.tar.xz
12
-%define sha512 linux=20d468ae89b57dda82d7c7b814c3d8b1b510e1623775b09a8a0b0a8a0431461e0a1d2df2bfa01f3102932c8eef91405546898b50ec3e6f30015098bb39722b41
12
+%define sha512 linux=9a30afa4dbbf899aab8722574a3b914b2547beb0b36a7d80bd45f694f1649e974c6769700d3b5494bbd71964ba4f6b1ab430588266a08a38bc940871bb963e81
13 13
 BuildArch:      noarch
14 14
 %description
15 15
 The Linux API Headers expose the kernel's API for use by Glibc.
... ...
@@ -39,6 +39,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
39 39
 %{_includedir}/*
40 40
 
41 41
 %changelog
42
+* Mon Aug 14 2023 Ajay Kaher <akaher@vmware.com> 6.1.45-1
43
+- Update to version 6.1.45
42 44
 * Thu Jul 20 2023 Ashwin Dayanand Kamat <kashwindayan@vmware.com> 6.1.39-1
43 45
 - Update to version 6.1.39
44 46
 * Tue Jul 04 2023 Ashwin Dayanand Kamat <kashwindayan@vmware.com> 6.1.37-1
... ...
@@ -303,6 +303,7 @@ CONFIG_ARCH_PROC_KCORE_TEXT=y
303 303
 # Kernel Features
304 304
 
305 305
 # ARM errata workarounds via the alternatives framework
306
+CONFIG_AMPERE_ERRATUM_AC03_CPU_38=y
306 307
 CONFIG_ARM64_WORKAROUND_CLEAN_CACHE=y
307 308
 CONFIG_ARM64_ERRATUM_826319=y
308 309
 CONFIG_ARM64_ERRATUM_827319=y
... ...
@@ -437,7 +437,9 @@ CONFIG_RETHUNK=y
437 437
 CONFIG_CPU_UNRET_ENTRY=y
438 438
 CONFIG_CPU_IBPB_ENTRY=y
439 439
 CONFIG_CPU_IBRS_ENTRY=y
440
+CONFIG_CPU_SRSO=y
440 441
 # CONFIG_SLS is not set
442
+# CONFIG_GDS_FORCE_MITIGATION is not set
441 443
 CONFIG_ARCH_HAS_ADD_PAGES=y
442 444
 CONFIG_ARCH_MHP_MEMMAP_ON_MEMORY_ENABLE=y
443 445
 
... ...
@@ -559,6 +561,7 @@ CONFIG_GENERIC_SMP_IDLE_THREAD=y
559 559
 CONFIG_ARCH_HAS_FORTIFY_SOURCE=y
560 560
 CONFIG_ARCH_HAS_SET_MEMORY=y
561 561
 CONFIG_ARCH_HAS_SET_DIRECT_MAP=y
562
+CONFIG_ARCH_HAS_CPU_FINALIZE_INIT=y
562 563
 CONFIG_HAVE_ARCH_THREAD_STRUCT_WHITELIST=y
563 564
 CONFIG_ARCH_WANTS_DYNAMIC_TASK_STRUCT=y
564 565
 CONFIG_ARCH_WANTS_NO_INSTR=y
... ...
@@ -507,7 +507,9 @@ CONFIG_RETHUNK=y
507 507
 CONFIG_CPU_UNRET_ENTRY=y
508 508
 CONFIG_CPU_IBPB_ENTRY=y
509 509
 CONFIG_CPU_IBRS_ENTRY=y
510
+CONFIG_CPU_SRSO=y
510 511
 # CONFIG_SLS is not set
512
+# CONFIG_GDS_FORCE_MITIGATION is not set
511 513
 CONFIG_ARCH_HAS_ADD_PAGES=y
512 514
 CONFIG_ARCH_MHP_MEMMAP_ON_MEMORY_ENABLE=y
513 515
 
... ...
@@ -693,6 +695,7 @@ CONFIG_GENERIC_SMP_IDLE_THREAD=y
693 693
 CONFIG_ARCH_HAS_FORTIFY_SOURCE=y
694 694
 CONFIG_ARCH_HAS_SET_MEMORY=y
695 695
 CONFIG_ARCH_HAS_SET_DIRECT_MAP=y
696
+CONFIG_ARCH_HAS_CPU_FINALIZE_INIT=y
696 697
 CONFIG_HAVE_ARCH_THREAD_STRUCT_WHITELIST=y
697 698
 CONFIG_ARCH_WANTS_DYNAMIC_TASK_STRUCT=y
698 699
 CONFIG_ARCH_WANTS_NO_INSTR=y
... ...
@@ -479,7 +479,9 @@ CONFIG_RETHUNK=y
479 479
 CONFIG_CPU_UNRET_ENTRY=y
480 480
 CONFIG_CPU_IBPB_ENTRY=y
481 481
 CONFIG_CPU_IBRS_ENTRY=y
482
+CONFIG_CPU_SRSO=y
482 483
 # CONFIG_SLS is not set
484
+# CONFIG_GDS_FORCE_MITIGATION is not set
483 485
 CONFIG_ARCH_HAS_ADD_PAGES=y
484 486
 CONFIG_ARCH_MHP_MEMMAP_ON_MEMORY_ENABLE=y
485 487
 
... ...
@@ -697,6 +699,7 @@ CONFIG_GENERIC_SMP_IDLE_THREAD=y
697 697
 CONFIG_ARCH_HAS_FORTIFY_SOURCE=y
698 698
 CONFIG_ARCH_HAS_SET_MEMORY=y
699 699
 CONFIG_ARCH_HAS_SET_DIRECT_MAP=y
700
+CONFIG_ARCH_HAS_CPU_FINALIZE_INIT=y
700 701
 CONFIG_HAVE_ARCH_THREAD_STRUCT_WHITELIST=y
701 702
 CONFIG_ARCH_WANTS_DYNAMIC_TASK_STRUCT=y
702 703
 CONFIG_ARCH_WANTS_NO_INSTR=y
... ...
@@ -322,6 +322,7 @@ CONFIG_ARCH_ZYNQMP=y
322 322
 # Kernel Features
323 323
 
324 324
 # ARM errata workarounds via the alternatives framework
325
+CONFIG_AMPERE_ERRATUM_AC03_CPU_38=y
325 326
 CONFIG_ARM64_WORKAROUND_CLEAN_CACHE=y
326 327
 CONFIG_ARM64_ERRATUM_826319=y
327 328
 CONFIG_ARM64_ERRATUM_827319=y
... ...
@@ -493,7 +493,9 @@ CONFIG_RETHUNK=y
493 493
 CONFIG_CPU_UNRET_ENTRY=y
494 494
 CONFIG_CPU_IBPB_ENTRY=y
495 495
 CONFIG_CPU_IBRS_ENTRY=y
496
+CONFIG_CPU_SRSO=y
496 497
 # CONFIG_SLS is not set
498
+# CONFIG_GDS_FORCE_MITIGATION is not set
497 499
 CONFIG_ARCH_HAS_ADD_PAGES=y
498 500
 CONFIG_ARCH_MHP_MEMMAP_ON_MEMORY_ENABLE=y
499 501
 
... ...
@@ -710,6 +712,7 @@ CONFIG_GENERIC_SMP_IDLE_THREAD=y
710 710
 CONFIG_ARCH_HAS_FORTIFY_SOURCE=y
711 711
 CONFIG_ARCH_HAS_SET_MEMORY=y
712 712
 CONFIG_ARCH_HAS_SET_DIRECT_MAP=y
713
+CONFIG_ARCH_HAS_CPU_FINALIZE_INIT=y
713 714
 CONFIG_HAVE_ARCH_THREAD_STRUCT_WHITELIST=y
714 715
 CONFIG_ARCH_WANTS_DYNAMIC_TASK_STRUCT=y
715 716
 CONFIG_ARCH_WANTS_NO_INSTR=y
... ...
@@ -3,19 +3,25 @@ From: Keerthana K <keerthanak@vmware.com>
3 3
 Date: Fri, 17 Jun 2022 14:32:26 +0000
4 4
 Subject: [PATCH] scripts-kallsyms: Extra kallsyms parsing
5 5
 
6
+From: Keerthana K <keerthanak@vmware.com>
7
+
6 8
 Adding new option "--extra-symbols=<kallsyms-file>" to scripts/kallsyms.c
7 9
 This helps in adding required symbols to vmlinux when CONFIG_KALLSYMS_ALL
8 10
 is disabled.
11
+
12
+Signed-off-by: Keerthana K <keerthanak@vmware.com>
13
+[Ajay: Regenerated the patch for v6.1.45]
14
+Signed-off-by: Ajay Kaher <akaher@vmware.com>
9 15
 ---
10
- scripts/kallsyms.c      | 108 +++++++++++++++++++++++++++++++++++-----
16
+ scripts/kallsyms.c      | 111 ++++++++++++++++++++++++++++++++++++++++++------
11 17
  scripts/link-vmlinux.sh |   2 +
12
- 2 files changed, 98 insertions(+), 12 deletions(-)
18
+ 2 files changed, 101 insertions(+), 12 deletions(-)
13 19
 
14 20
 diff --git a/scripts/kallsyms.c b/scripts/kallsyms.c
15
-index 03fa07ad4..e8b0d024c 100644
21
+index 80aab2a..5b2aa41 100644
16 22
 --- a/scripts/kallsyms.c
17 23
 +++ b/scripts/kallsyms.c
18
-@@ -25,6 +25,8 @@
24
+@@ -26,6 +26,8 @@
19 25
  #include <string.h>
20 26
  #include <ctype.h>
21 27
  #include <limits.h>
... ...
@@ -24,7 +30,7 @@ index 03fa07ad4..e8b0d024c 100644
24 24
  
25 25
  #define ARRAY_SIZE(arr) (sizeof(arr) / sizeof(arr[0]))
26 26
  
27
-@@ -61,10 +63,15 @@ struct addr_range {
27
+@@ -63,10 +65,15 @@ struct addr_range {
28 28
  
29 29
  static unsigned long long _text;
30 30
  static unsigned long long relative_base;
... ...
@@ -40,24 +46,24 @@ index 03fa07ad4..e8b0d024c 100644
40 40
  #define text_range_text     (&text_ranges[0])
41 41
  #define text_range_inittext (&text_ranges[1])
42 42
  
43
-@@ -75,6 +82,7 @@ static struct addr_range percpu_range = {
43
+@@ -77,6 +84,7 @@ static struct addr_range percpu_range = {
44 44
  static struct sym_entry **table;
45 45
  static unsigned int table_size, table_cnt;
46 46
  static int all_symbols;
47 47
 +static int extra_symbols;
48 48
  static int absolute_percpu;
49 49
  static int base_relative;
50
- 
51
-@@ -87,7 +95,7 @@ static unsigned char best_table_len[256];
50
+ static int lto_clang;
51
+@@ -90,7 +98,7 @@ static unsigned char best_table_len[256];
52 52
  
53 53
  static void usage(void)
54 54
  {
55 55
 -	fprintf(stderr, "Usage: kallsyms [--all-symbols] [--absolute-percpu] "
56 56
 +	fprintf(stderr, "Usage: kallsyms --extra-symbols=<kallsyms-file> [--all-symbols] [--absolute-percpu] "
57
- 			"[--base-relative] in.map > out.S\n");
57
+ 			"[--base-relative] [--lto-clang] in.map > out.S\n");
58 58
  	exit(1);
59 59
  }
60
-@@ -211,6 +219,55 @@ static void check_symbol_range(const char *sym, unsigned long long addr,
60
+@@ -215,6 +223,55 @@ static void check_symbol_range(const char *sym, unsigned long long addr,
61 61
  	}
62 62
  }
63 63
  
... ...
@@ -113,7 +119,7 @@ index 03fa07ad4..e8b0d024c 100644
113 113
  static struct sym_entry *read_symbol(FILE *in)
114 114
  {
115 115
  	char name[KSYM_NAME_LEN_BUFFER+1], type;
116
-@@ -281,10 +338,17 @@ static int symbol_in_range(const struct sym_entry *s,
116
+@@ -285,10 +342,17 @@ static int symbol_in_range(const struct sym_entry *s,
117 117
  static int symbol_valid(const struct sym_entry *s)
118 118
  {
119 119
  	const char *name = sym_name(s);
... ...
@@ -131,7 +137,7 @@ index 03fa07ad4..e8b0d024c 100644
131 131
  		if (symbol_in_range(s, text_ranges,
132 132
  				    ARRAY_SIZE(text_ranges)) == 0)
133 133
  			return 0;
134
-@@ -813,25 +877,44 @@ static void record_relative_base(void)
134
+@@ -883,26 +947,48 @@ static void record_relative_base(void)
135 135
  
136 136
  int main(int argc, char **argv)
137 137
  {
... ...
@@ -140,17 +146,18 @@ index 03fa07ad4..e8b0d024c 100644
140 140
 -			{"all-symbols",     no_argument, &all_symbols,     1},
141 141
 -			{"absolute-percpu", no_argument, &absolute_percpu, 1},
142 142
 -			{"base-relative",   no_argument, &base_relative,   1},
143
+-			{"lto-clang",       no_argument, &lto_clang,       1},
143 144
 -			{},
144 145
 -		};
145
--
146
--		int c = getopt_long(argc, argv, "", long_options, NULL);
147 146
 +	char *sym_file = NULL;
148 147
 +	int opt = 0, index = 0;
149
-+
148
+ 
149
+-		int c = getopt_long(argc, argv, "", long_options, NULL);
150 150
 +	static struct option long_options[] = {
151 151
 +		{"all-symbols",     no_argument,       NULL, 'l'},
152 152
 +		{"absolute-percpu", no_argument,       NULL, 'a'},
153 153
 +		{"base-relative",   no_argument,       NULL, 'b'},
154
++		{"lto-clang",       no_argument,       NULL, 'c'},
154 155
 +		{"extra-symbols",   required_argument, NULL, 's'},
155 156
 +		{},
156 157
 +	};
... ...
@@ -167,6 +174,9 @@ index 03fa07ad4..e8b0d024c 100644
167 167
 +			break;
168 168
 +		case 'b':
169 169
 +			base_relative = 1;
170
++			break;
171
++		case 'c':
172
++			lto_clang = 1;
170 173
  			break;
171 174
 -		if (c != 0)
172 175
 +		case 's':
... ...
@@ -187,7 +197,7 @@ index 03fa07ad4..e8b0d024c 100644
187 187
  	read_map(argv[optind]);
188 188
  	shrink_table();
189 189
  	if (absolute_percpu)
190
-@@ -842,5 +925,6 @@ int main(int argc, char **argv)
190
+@@ -913,5 +999,6 @@ int main(int argc, char **argv)
191 191
  	optimize_token_table();
192 192
  	write_src();
193 193
  
... ...
@@ -195,11 +205,11 @@ index 03fa07ad4..e8b0d024c 100644
195 195
  	return 0;
196 196
  }
197 197
 diff --git a/scripts/link-vmlinux.sh b/scripts/link-vmlinux.sh
198
-index 918470d76..58d3210e5 100755
198
+index 32e5739..85d9115 100755
199 199
 --- a/scripts/link-vmlinux.sh
200 200
 +++ b/scripts/link-vmlinux.sh
201
-@@ -156,6 +156,8 @@ kallsyms()
202
- 		kallsymopt="${kallsymopt} --base-relative"
201
+@@ -160,6 +160,8 @@ kallsyms()
202
+ 		kallsymopt="${kallsymopt} --lto-clang"
203 203
  	fi
204 204
  
205 205
 +	kallsymopt="${kallsymopt} --extra-symbols=crypto/fips_canister-kallsyms"
... ...
@@ -1,6 +1,6 @@
1
-From 2f7412ba9c6af5ab16bdbb4a3fdb1dcd2b4fd3c2 Mon Sep 17 00:00:00 2001
1
+From 91ad0689c9d94c1b12b47fac687b860e85593775 Mon Sep 17 00:00:00 2001
2 2
 From: Thomas Gleixner <tglx@linutronix.de>
3
-Date: Mon, 4 Dec 2017 15:07:46 +0100
3
+Date: Wed, 30 Aug 2023 11:38:29 +0530
4 4
 Subject: [PATCH] x86/entry: Align entry text section to PMD boundary
5 5
 
6 6
 The (irq)entry text must be visible in the user space page tables. To allow
... ...
@@ -17,6 +17,9 @@ code. There is no security risk of doing that. As a bonus, we reduce
17 17
 kernel size by 40%. 2MB aligning increases kernel .text size from
18 18
 6MB to 10MB, by adding padding between and after entry text.
19 19
 
20
+[Ajay] Reverting only ALIGN_ENTRY_TEXT_END, ALIGN_ENTRY_TEXT_BEGIN
21
+requires for SRSO (Speculative Return Stack Overflow).
22
+
20 23
 Signed-off-by: Alexey Makhalov <amakhalov@vmware.com>
21 24
 Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
22 25
 Cc: Andy Lutomirski <luto@kernel.org>
... ...
@@ -40,42 +43,37 @@ Cc: hughd@google.com
40 40
 Cc: keescook@google.com
41 41
 Signed-off-by: Ingo Molnar <mingo@kernel.org>
42 42
 ---
43
- arch/x86/kernel/vmlinux.lds.S | 7 -------
44
- 1 file changed, 7 deletions(-)
43
+ arch/x86/kernel/vmlinux.lds.S | 3 ---
44
+ 1 file changed, 3 deletions(-)
45 45
 
46 46
 diff --git a/arch/x86/kernel/vmlinux.lds.S b/arch/x86/kernel/vmlinux.lds.S
47
-index d2a8b5a24a44..1e413a9326aa 100644
47
+index fd03f5a..478857c 100644
48 48
 --- a/arch/x86/kernel/vmlinux.lds.S
49 49
 +++ b/arch/x86/kernel/vmlinux.lds.S
50
-@@ -66,9 +66,6 @@ jiffies = jiffies_64;
51
- 		__end_rodata_hpage_align = .;			\
50
+@@ -67,7 +67,6 @@ jiffies = jiffies_64;
52 51
  		__end_rodata_aligned = .;
53 52
  
54
--#define ALIGN_ENTRY_TEXT_BEGIN	. = ALIGN(PMD_SIZE);
53
+ #define ALIGN_ENTRY_TEXT_BEGIN	. = ALIGN(PMD_SIZE);
55 54
 -#define ALIGN_ENTRY_TEXT_END	. = ALIGN(PMD_SIZE);
56
--
55
+ 
57 56
  /*
58 57
   * This section contains data which will be mapped as decrypted. Memory
59
-  * encryption operates on a page basis. Make this section PMD-aligned
60
-@@ -93,8 +90,6 @@ jiffies = jiffies_64;
61
- 		. = ALIGN(PAGE_SIZE);				\
58
+@@ -94,7 +93,6 @@ jiffies = jiffies_64;
62 59
  		__end_rodata_aligned = .;
63 60
  
64
--#define ALIGN_ENTRY_TEXT_BEGIN
61
+ #define ALIGN_ENTRY_TEXT_BEGIN
65 62
 -#define ALIGN_ENTRY_TEXT_END
66 63
  #define BSS_DECRYPTED
67 64
  
68 65
  #endif
69
-@@ -132,9 +127,7 @@ SECTIONS
70
- 		CPUIDLE_TEXT
71
- 		LOCK_TEXT
72
- 		KPROBES_TEXT
73
--		ALIGN_ENTRY_TEXT_BEGIN
74
- 		ENTRY_TEXT
66
+@@ -147,7 +145,6 @@ SECTIONS
67
+ 		. = srso_untrain_ret_alias | (1 << 2) | (1 << 8) | (1 << 14) | (1 << 20);
68
+ 		*(.text.__x86.rethunk_safe)
69
+ #endif
75 70
 -		ALIGN_ENTRY_TEXT_END
76 71
  		SOFTIRQENTRY_TEXT
77 72
  		STATIC_CALL_TEXT
78 73
  		*(.gnu.warning)
79 74
 -- 
80
-2.11.0
75
+2.7.4
81 76
 
... ...
@@ -22,8 +22,8 @@
22 22
 
23 23
 Summary:        Kernel
24 24
 Name:           linux-esx
25
-Version:        6.1.41
26
-Release:        2%{?kat_build:.kat}%{?dist}
25
+Version:        6.1.45
26
+Release:        1%{?kat_build:.kat}%{?dist}
27 27
 License:        GPLv2
28 28
 URL:            http://www.kernel.org
29 29
 Group:          System Environment/Kernel
... ...
@@ -34,7 +34,7 @@ Distribution:   Photon
34 34
 %define _modulesdir /lib/modules/%{uname_r}
35 35
 
36 36
 Source0:        http://www.kernel.org/pub/linux/kernel/v6.x/linux-%{version}.tar.xz
37
-%define sha512 linux=82101034257f746e1b6717d374a7960c1a83f93e8c2912e159c6eda6ea7605ff3c8505d37cc55ee0aadaddc964475c7ece4c26ed60407877d6eeaa7938de7c91
37
+%define sha512 linux=9a30afa4dbbf899aab8722574a3b914b2547beb0b36a7d80bd45f694f1649e974c6769700d3b5494bbd71964ba4f6b1ab430588266a08a38bc940871bb963e81
38 38
 
39 39
 Source1:        config-esx_%{_arch}
40 40
 Source2:        initramfs.trigger
... ...
@@ -505,6 +505,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
505 505
 %{_usrsrc}/linux-headers-%{uname_r}
506 506
 
507 507
 %changelog
508
+* Wed Nov 22 2023 Ajay Kaher <akaher@vmware.com> 6.1.45-1
509
+- Update to version 6.1.45
508 510
 * Wed Nov 22 2023 Ajay Kaher <akaher@vmware.com> 6.1.41-2
509 511
 - Fix: unconditional preserve CR4.MCE
510 512
 * Wed Nov 22 2023 Ashwin Dayanand Kamat <kashwindayan@vmware.com> 6.1.41-1
... ...
@@ -15,8 +15,8 @@
15 15
 
16 16
 Summary:        Kernel
17 17
 Name:           linux-rt
18
-Version:        6.1.41
19
-Release:        4%{?kat_build:.kat}%{?dist}
18
+Version:        6.1.45
19
+Release:        1%{?kat_build:.kat}%{?dist}
20 20
 License:        GPLv2
21 21
 URL:            http://www.kernel.org
22 22
 Group:          System Environment/Kernel
... ...
@@ -29,7 +29,7 @@ Distribution:   Photon
29 29
 %define _modulesdir /lib/modules/%{uname_r}
30 30
 
31 31
 Source0:        http://www.kernel.org/pub/linux/kernel/v6.x/linux-%{version}.tar.xz
32
-%define sha512 linux=82101034257f746e1b6717d374a7960c1a83f93e8c2912e159c6eda6ea7605ff3c8505d37cc55ee0aadaddc964475c7ece4c26ed60407877d6eeaa7938de7c91
32
+%define sha512 linux=9a30afa4dbbf899aab8722574a3b914b2547beb0b36a7d80bd45f694f1649e974c6769700d3b5494bbd71964ba4f6b1ab430588266a08a38bc940871bb963e81
33 33
 
34 34
 %ifarch x86_64
35 35
 Source1:    config-rt
... ...
@@ -520,6 +520,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
520 520
 %{_usrsrc}/linux-headers-%{uname_r}
521 521
 
522 522
 %changelog
523
+* Wed Nov 22 2023 Ajay Kaher <akaher@vmware.com> 6.1.45-1
524
+- Update to version 6.1.45
523 525
 * Wed Nov 22 2023 Kuntal Nayak <nkuntal@vmware.com> 6.1.41-4
524 526
 - Enable Kconfig CONFIG_KEXEC_FILE for kexec signature verify
525 527
 * Wed Nov 22 2023 Srish Srinivasan <ssrish@vmware.com> 6.1.41-3
... ...
@@ -15,8 +15,8 @@
15 15
 
16 16
 Summary:        Kernel
17 17
 Name:           linux-secure
18
-Version:        6.1.41
19
-Release:        3%{?kat_build:.kat}%{?dist}
18
+Version:        6.1.45
19
+Release:        1%{?kat_build:.kat}%{?dist}
20 20
 License:        GPLv2
21 21
 URL:            http://www.kernel.org
22 22
 Group:          System Environment/Kernel
... ...
@@ -27,7 +27,7 @@ Distribution:   Photon
27 27
 %define _modulesdir /lib/modules/%{uname_r}
28 28
 
29 29
 Source0:        http://www.kernel.org/pub/linux/kernel/v6.x/linux-%{version}.tar.xz
30
-%define sha512 linux=82101034257f746e1b6717d374a7960c1a83f93e8c2912e159c6eda6ea7605ff3c8505d37cc55ee0aadaddc964475c7ece4c26ed60407877d6eeaa7938de7c91
30
+%define sha512 linux=9a30afa4dbbf899aab8722574a3b914b2547beb0b36a7d80bd45f694f1649e974c6769700d3b5494bbd71964ba4f6b1ab430588266a08a38bc940871bb963e81
31 31
 Source1:        config-secure
32 32
 Source2:        initramfs.trigger
33 33
 # contains pre, postun, filetriggerun tasks
... ...
@@ -428,6 +428,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
428 428
 %endif
429 429
 
430 430
 %changelog
431
+* Wed Nov 22 2023 Ajay Kaher <akaher@vmware.com> 6.1.45-1
432
+- Update to version 6.1.45
431 433
 * Wed Nov 22 2023 Kuntal Nayak <nkuntal@vmware.com> 6.1.41-3
432 434
 - Enable Kconfig CONFIG_KEXEC_FILE for kexec signature verify
433 435
 * Wed Nov 22 2023 Ajay Kaher <akaher@vmware.com> 6.1.41-2
... ...
@@ -22,8 +22,8 @@
22 22
 
23 23
 Summary:        Kernel
24 24
 Name:           linux
25
-Version:        6.1.41
26
-Release:        4%{?kat_build:.kat}%{?dist}
25
+Version:        6.1.45
26
+Release:        1%{?kat_build:.kat}%{?dist}
27 27
 License:        GPLv2
28 28
 URL:            http://www.kernel.org/
29 29
 Group:          System Environment/Kernel
... ...
@@ -34,7 +34,7 @@ Distribution:   Photon
34 34
 %define _modulesdir /lib/modules/%{uname_r}
35 35
 
36 36
 Source0:        http://www.kernel.org/pub/linux/kernel/v6.x/linux-%{version}.tar.xz
37
-%define sha512 linux=82101034257f746e1b6717d374a7960c1a83f93e8c2912e159c6eda6ea7605ff3c8505d37cc55ee0aadaddc964475c7ece4c26ed60407877d6eeaa7938de7c91
37
+%define sha512 linux=9a30afa4dbbf899aab8722574a3b914b2547beb0b36a7d80bd45f694f1649e974c6769700d3b5494bbd71964ba4f6b1ab430588266a08a38bc940871bb963e81
38 38
 
39 39
 Source1:        config_%{_arch}
40 40
 Source2:        initramfs.trigger
... ...
@@ -714,6 +714,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
714 714
 %{_datadir}/bash-completion/completions/bpftool
715 715
 
716 716
 %changelog
717
+* Wed Nov 22 2023 Ajay Kaher <akaher@vmware.com> 6.1.45-1
718
+- Update to version 6.1.45
717 719
 * Wed Nov 22 2023 Srish Srinivasan <ssrish@vmware.com> 6.1.41-4
718 720
 - Enable CONFIG_DEBUG_INFO_BTF=y
719 721
 * Wed Nov 22 2023 Kuntal Nayak <nkuntal@vmware.com> 6.1.41-3
... ...
@@ -3618,16 +3618,6 @@ index 3b9e86108..b6159f89a 100644
3618 3618
  	struct hrtimer *timer = &cpuctx->hrtimer;
3619 3619
  	struct pmu *pmu = cpuctx->ctx.pmu;
3620 3620
  	unsigned long flags;
3621
-@@ -11155,8 +11156,7 @@ perf_event_mux_interval_ms_store(struct device *dev,
3622
- 		cpuctx = per_cpu_ptr(pmu->pmu_cpu_context, cpu);
3623
- 		cpuctx->hrtimer_interval = ns_to_ktime(NSEC_PER_MSEC * timer);
3624
- 
3625
--		cpu_function_call(cpu,
3626
--			(remote_function_f)perf_mux_hrtimer_restart, cpuctx);
3627
-+		cpu_function_call(cpu, perf_mux_hrtimer_restart, cpuctx);
3628
- 	}
3629
- 	cpus_read_unlock();
3630
- 	mutex_unlock(&mux_interval_mutex);
3631 3621
 diff --git a/kernel/module/main.c b/kernel/module/main.c
3632 3622
 index 7a627345d..bcac0eee0 100644
3633 3623
 --- a/kernel/module/main.c