Browse code

Kernels: Fix for CVE-2017-18232, CVE-2017-18249 & CVE-2018-10323

Some vulnerabilities had been reported in kernel. The fixes have
been backported to version 4.9.111

Change-Id: Icb9917056873342cf09fefb487dc595faa308b70
Signed-off-by: srinidhira0 <srinidhir@vmware.com>
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/5350
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Srivatsa S. Bhat <srivatsab@vmware.com>

srinidhira0 authored on 2018/07/13 00:32:53
Showing 7 changed files
1 1
new file mode 100644
... ...
@@ -0,0 +1,148 @@
0
+From 34ec80907c239ae294ed85da2958ecf287986009 Mon Sep 17 00:00:00 2001
1
+From: "Chao Yu Date: Wed, 22 Mar 2017 14:45:05 +0800" <yuchao0@huawei.com>
2
+Date: Mon, 16 Jul 2018 20:11:52 +0530
3
+Subject: [PATCH 1/2] f2fs: fix race condition in between free nid
4
+ allocator/initializer
5
+
6
+In below concurrent case, allocated nid can be loaded into free nid cache
7
+and be allocated again.
8
+
9
+Thread A                                Thread B
10
+- f2fs_create
11
+ - f2fs_new_inode
12
+  - alloc_nid
13
+   - __insert_nid_to_list(ALLOC_NID_LIST)
14
+                                        - f2fs_balance_fs_bg
15
+                                         - build_free_nids
16
+                                          - __build_free_nids
17
+                                           - scan_nat_page
18
+                                            - add_free_nid
19
+                                             - __lookup_nat_cache
20
+ - f2fs_add_link
21
+  - init_inode_metadata
22
+   - new_inode_page
23
+    - new_node_page
24
+     - set_node_addr
25
+ - alloc_nid_done
26
+  - __remove_nid_from_list(ALLOC_NID_LIST)
27
+                                             - __insert_nid_to_list(FREE_NID_LIST)
28
+
29
+This patch makes nat cache lookup and free nid list operation being atomical
30
+to avoid this race condition.
31
+
32
+Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
33
+Signed-off-by: Chao Yu <yuchao0@huawei.com>
34
+Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
35
+
36
+[ Srinidhi Rao : Backported this fix to 4.9 ]
37
+Signed-off-by: srinidhira0 <srinidhir@vmware.com>
38
+---
39
+ fs/f2fs/node.c | 75 ++++++++++++++++++++++++++++++++++++++++++----------------
40
+ 1 file changed, 54 insertions(+), 21 deletions(-)
41
+
42
+diff --git a/fs/f2fs/node.c b/fs/f2fs/node.c
43
+index 01177ec..653461e 100644
44
+--- a/fs/f2fs/node.c
45
+@@ -1702,8 +1702,10 @@ static void __del_from_free_nid_list(struct f2fs_nm_info *nm_i,
46
+ static int add_free_nid(struct f2fs_sb_info *sbi, nid_t nid, bool build)
47
+ {
48
+ 	struct f2fs_nm_info *nm_i = NM_I(sbi);
49
+-	struct free_nid *i;
50
++	struct free_nid *i, *e;
51
+ 	struct nat_entry *ne;
52
++	int err = -EINVAL;
53
++	int ret = 0;
54
+ 
55
+ 	if (!available_free_memory(sbi, FREE_NIDS))
56
+ 		return -1;
57
+@@ -1712,35 +1714,66 @@ static int add_free_nid(struct f2fs_sb_info *sbi, nid_t nid, bool build)
58
+ 	if (unlikely(nid == 0))
59
+ 		return 0;
60
+ 
61
+-	if (build) {
62
+-		/* do not add allocated nids */
63
+-		ne = __lookup_nat_cache(nm_i, nid);
64
+-		if (ne && (!get_nat_flag(ne, IS_CHECKPOINTED) ||
65
+-				nat_get_blkaddr(ne) != NULL_ADDR))
66
+-			return 0;
67
+-	}
68
+-
69
+ 	i = f2fs_kmem_cache_alloc(free_nid_slab, GFP_NOFS);
70
+ 	i->nid = nid;
71
+ 	i->state = NID_NEW;
72
+ 
73
+-	if (radix_tree_preload(GFP_NOFS)) {
74
+-		kmem_cache_free(free_nid_slab, i);
75
+-		return 0;
76
+-	}
77
++	if (radix_tree_preload(GFP_NOFS))
78
++		goto err;
79
+ 
80
+ 	spin_lock(&nm_i->free_nid_list_lock);
81
+-	if (radix_tree_insert(&nm_i->free_nid_root, i->nid, i)) {
82
+-		spin_unlock(&nm_i->free_nid_list_lock);
83
+-		radix_tree_preload_end();
84
+-		kmem_cache_free(free_nid_slab, i);
85
+-		return 0;
86
++
87
++	if (build) {
88
++
89
++		/*
90
++		 *   Thread A             Thread B
91
++		 *  - f2fs_create
92
++		 *   - f2fs_new_inode
93
++		 *    - alloc_nid
94
++		 *     - __insert_nid_to_list(ALLOC_NID_LIST)
95
++		 *                     - f2fs_balance_fs_bg
96
++		 *                      - build_free_nids
97
++		 *                       - __build_free_nids
98
++		 *                        - scan_nat_page
99
++		 *                         - add_free_nid
100
++		 *                          - __lookup_nat_cache
101
++		 *  - f2fs_add_link
102
++		 *   - init_inode_metadata
103
++		 *    - new_inode_page
104
++		 *     - new_node_page
105
++		 *      - set_node_addr
106
++		 *  - alloc_nid_done
107
++		 *   - __remove_nid_from_list(ALLOC_NID_LIST)
108
++		 *                         - __insert_nid_to_list(FREE_NID_LIST)
109
++		 */
110
++		ne = __lookup_nat_cache(nm_i, nid);
111
++		if (ne && (!get_nat_flag(ne, IS_CHECKPOINTED) ||
112
++					nat_get_blkaddr(ne) != NULL_ADDR))
113
++			goto err_out;
114
++
115
++		e = __lookup_free_nid_list(nm_i, nid);
116
++		if (e) {
117
++			if (e->state == NID_NEW)
118
++				ret = 1;
119
++			goto err_out;
120
++		}
121
+ 	}
122
+-	list_add_tail(&i->list, &nm_i->free_nid_list);
123
+-	nm_i->fcnt++;
124
++	ret = 1;
125
++
126
++	err = radix_tree_insert(&nm_i->free_nid_root, i->nid, i);
127
++	if (!err) {
128
++		list_add_tail(&i->list, &nm_i->free_nid_list);
129
++		nm_i->fcnt++;
130
++
131
++	}
132
++err_out:
133
+ 	spin_unlock(&nm_i->free_nid_list_lock);
134
+ 	radix_tree_preload_end();
135
+-	return 1;
136
++err:
137
++	if (err)
138
++		kmem_cache_free(free_nid_slab, i);
139
++
140
++	return ret;
141
+ }
142
+ 
143
+ static void remove_free_nid(struct f2fs_nm_info *nm_i, nid_t nid)
144
+-- 
145
+2.7.4
146
+
0 147
new file mode 100644
... ...
@@ -0,0 +1,300 @@
0
+From 0558f33c06bb910e2879e355192227a8e8f0219d Mon Sep 17 00:00:00 2001
1
+From: Jason Yan <yanaijie@huawei.com>
2
+Date: Fri, 8 Dec 2017 17:42:09 +0800
3
+Subject: [PATCH] scsi: libsas: direct call probe and destruct
4
+
5
+In commit 87c8331fcf72 ("[SCSI] libsas: prevent domain rediscovery
6
+competing with ata error handling") introduced disco mutex to prevent
7
+rediscovery competing with ata error handling and put the whole
8
+revalidation in the mutex. But the rphy add/remove needs to wait for the
9
+error handling which also grabs the disco mutex. This may leads to dead
10
+lock.So the probe and destruct event were introduce to do the rphy
11
+add/remove asynchronously and out of the lock.
12
+
13
+The asynchronously processed workers makes the whole discovery process
14
+not atomic, the other events may interrupt the process. For example,
15
+if a loss of signal event inserted before the probe event, the
16
+sas_deform_port() is called and the port will be deleted.
17
+
18
+And sas_port_delete() may run before the destruct event, but the
19
+port-x:x is the top parent of end device or expander. This leads to
20
+a kernel WARNING such as:
21
+
22
+[   82.042979] sysfs group 'power' not found for kobject 'phy-1:0:22'
23
+[   82.042983] ------------[ cut here ]------------
24
+[   82.042986] WARNING: CPU: 54 PID: 1714 at fs/sysfs/group.c:237
25
+sysfs_remove_group+0x94/0xa0
26
+[   82.043059] Call trace:
27
+[   82.043082] [<ffff0000082e7624>] sysfs_remove_group+0x94/0xa0
28
+[   82.043085] [<ffff00000864e320>] dpm_sysfs_remove+0x60/0x70
29
+[   82.043086] [<ffff00000863ee10>] device_del+0x138/0x308
30
+[   82.043089] [<ffff00000869a2d0>] sas_phy_delete+0x38/0x60
31
+[   82.043091] [<ffff00000869a86c>] do_sas_phy_delete+0x6c/0x80
32
+[   82.043093] [<ffff00000863dc20>] device_for_each_child+0x58/0xa0
33
+[   82.043095] [<ffff000008696f80>] sas_remove_children+0x40/0x50
34
+[   82.043100] [<ffff00000869d1bc>] sas_destruct_devices+0x64/0xa0
35
+[   82.043102] [<ffff0000080e93bc>] process_one_work+0x1fc/0x4b0
36
+[   82.043104] [<ffff0000080e96c0>] worker_thread+0x50/0x490
37
+[   82.043105] [<ffff0000080f0364>] kthread+0xfc/0x128
38
+[   82.043107] [<ffff0000080836c0>] ret_from_fork+0x10/0x50
39
+
40
+Make probe and destruct a direct call in the disco and revalidate function,
41
+but put them outside the lock. The whole discovery or revalidate won't
42
+be interrupted by other events. And the DISCE_PROBE and DISCE_DESTRUCT
43
+event are deleted as a result of the direct call.
44
+
45
+Introduce a new list to destruct the sas_port and put the port delete after
46
+the destruct. This makes sure the right order of destroying the sysfs
47
+kobject and fix the warning above.
48
+
49
+In sas_ex_revalidate_domain() have a loop to find all broadcasted
50
+device, and sometimes we have a chance to find the same expander twice.
51
+Because the sas_port will be deleted at the end of the whole revalidate
52
+process, sas_port with the same name cannot be added before this.
53
+Otherwise the sysfs will complain of creating duplicate filename. Since
54
+the LLDD will send broadcast for every device change, we can only
55
+process one expander's revalidation.
56
+
57
+[mkp: kbuild test robot warning]
58
+
59
+Signed-off-by: Jason Yan <yanaijie@huawei.com>
60
+CC: John Garry <john.garry@huawei.com>
61
+CC: Johannes Thumshirn <jthumshirn@suse.de>
62
+CC: Ewan Milne <emilne@redhat.com>
63
+CC: Christoph Hellwig <hch@lst.de>
64
+CC: Tomas Henzl <thenzl@redhat.com>
65
+CC: Dan Williams <dan.j.williams@intel.com>
66
+Reviewed-by: Hannes Reinecke <hare@suse.com>
67
+Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
68
+Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
69
+---
70
+ drivers/scsi/libsas/sas_ata.c      |  1 -
71
+ drivers/scsi/libsas/sas_discover.c | 32 ++++++++++++++++++--------------
72
+ drivers/scsi/libsas/sas_expander.c |  8 +++-----
73
+ drivers/scsi/libsas/sas_internal.h |  1 +
74
+ drivers/scsi/libsas/sas_port.c     |  3 +++
75
+ include/scsi/libsas.h              |  3 +--
76
+ include/scsi/scsi_transport_sas.h  |  1 +
77
+ 7 files changed, 27 insertions(+), 22 deletions(-)
78
+
79
+diff --git a/drivers/scsi/libsas/sas_ata.c b/drivers/scsi/libsas/sas_ata.c
80
+index 6f5e272..e018e76 100644
81
+--- a/drivers/scsi/libsas/sas_ata.c
82
+@@ -732,7 +732,6 @@ int sas_discover_sata(struct domain_device *dev)
83
+ 	if (res)
84
+ 		return res;
85
+ 
86
+-	sas_discover_event(dev->port, DISCE_PROBE);
87
+ 	return 0;
88
+ }
89
+ 
90
+diff --git a/drivers/scsi/libsas/sas_discover.c b/drivers/scsi/libsas/sas_discover.c
91
+index 60de662..487d734 100644
92
+--- a/drivers/scsi/libsas/sas_discover.c
93
+@@ -212,13 +212,9 @@ void sas_notify_lldd_dev_gone(struct domain_device *dev)
94
+ 	}
95
+ }
96
+ 
97
+-static void sas_probe_devices(struct work_struct *work)
98
++static void sas_probe_devices(struct asd_sas_port *port)
99
+ {
100
+ 	struct domain_device *dev, *n;
101
+-	struct sas_discovery_event *ev = to_sas_discovery_event(work);
102
+-	struct asd_sas_port *port = ev->port;
103
+-
104
+-	clear_bit(DISCE_PROBE, &port->disc.pending);
105
+ 
106
+ 	/* devices must be domain members before link recovery and probe */
107
+ 	list_for_each_entry(dev, &port->disco_list, disco_list_node) {
108
+@@ -294,7 +290,6 @@ int sas_discover_end_dev(struct domain_device *dev)
109
+ 	res = sas_notify_lldd_dev_found(dev);
110
+ 	if (res)
111
+ 		return res;
112
+-	sas_discover_event(dev->port, DISCE_PROBE);
113
+ 
114
+ 	return 0;
115
+ }
116
+@@ -353,13 +348,9 @@ static void sas_unregister_common_dev(struct asd_sas_port *port, struct domain_d
117
+ 	sas_put_device(dev);
118
+ }
119
+ 
120
+-static void sas_destruct_devices(struct work_struct *work)
121
++void sas_destruct_devices(struct asd_sas_port *port)
122
+ {
123
+ 	struct domain_device *dev, *n;
124
+-	struct sas_discovery_event *ev = to_sas_discovery_event(work);
125
+-	struct asd_sas_port *port = ev->port;
126
+-
127
+-	clear_bit(DISCE_DESTRUCT, &port->disc.pending);
128
+ 
129
+ 	list_for_each_entry_safe(dev, n, &port->destroy_list, disco_list_node) {
130
+ 		list_del_init(&dev->disco_list_node);
131
+@@ -370,6 +361,16 @@ static void sas_destruct_devices(struct work_struct *work)
132
+ 	}
133
+ }
134
+ 
135
++static void sas_destruct_ports(struct asd_sas_port *port)
136
++{
137
++	struct sas_port *sas_port, *p;
138
++
139
++	list_for_each_entry_safe(sas_port, p, &port->sas_port_del_list, del_list) {
140
++		list_del_init(&sas_port->del_list);
141
++		sas_port_delete(sas_port);
142
++	}
143
++}
144
++
145
+ void sas_unregister_dev(struct asd_sas_port *port, struct domain_device *dev)
146
+ {
147
+ 	if (!test_bit(SAS_DEV_DESTROY, &dev->state) &&
148
+@@ -384,7 +385,6 @@ void sas_unregister_dev(struct asd_sas_port *port, struct domain_device *dev)
149
+ 	if (!test_and_set_bit(SAS_DEV_DESTROY, &dev->state)) {
150
+ 		sas_rphy_unlink(dev->rphy);
151
+ 		list_move_tail(&dev->disco_list_node, &port->destroy_list);
152
+-		sas_discover_event(dev->port, DISCE_DESTRUCT);
153
+ 	}
154
+ }
155
+ 
156
+@@ -490,6 +490,8 @@ static void sas_discover_domain(struct work_struct *work)
157
+ 		port->port_dev = NULL;
158
+ 	}
159
+ 
160
++	sas_probe_devices(port);
161
++
162
+ 	SAS_DPRINTK("DONE DISCOVERY on port %d, pid:%d, result:%d\n", port->id,
163
+ 		    task_pid_nr(current), error);
164
+ }
165
+@@ -523,6 +525,10 @@ static void sas_revalidate_domain(struct work_struct *work)
166
+ 		    port->id, task_pid_nr(current), res);
167
+  out:
168
+ 	mutex_unlock(&ha->disco_mutex);
169
++
170
++	sas_destruct_devices(port);
171
++	sas_destruct_ports(port);
172
++	sas_probe_devices(port);
173
+ }
174
+ 
175
+ /* ---------- Events ---------- */
176
+@@ -578,10 +584,8 @@ void sas_init_disc(struct sas_discovery *disc, struct asd_sas_port *port)
177
+ 	static const work_func_t sas_event_fns[DISC_NUM_EVENTS] = {
178
+ 		[DISCE_DISCOVER_DOMAIN] = sas_discover_domain,
179
+ 		[DISCE_REVALIDATE_DOMAIN] = sas_revalidate_domain,
180
+-		[DISCE_PROBE] = sas_probe_devices,
181
+ 		[DISCE_SUSPEND] = sas_suspend_devices,
182
+ 		[DISCE_RESUME] = sas_resume_devices,
183
+-		[DISCE_DESTRUCT] = sas_destruct_devices,
184
+ 	};
185
+ 
186
+ 	disc->pending = 0;
187
+diff --git a/drivers/scsi/libsas/sas_expander.c b/drivers/scsi/libsas/sas_expander.c
188
+index 12886f9..8d7a769 100644
189
+--- a/drivers/scsi/libsas/sas_expander.c
190
+@@ -1905,7 +1905,8 @@ static void sas_unregister_devs_sas_addr(struct domain_device *parent,
191
+ 		sas_port_delete_phy(phy->port, phy->phy);
192
+ 		sas_device_set_phy(found, phy->port);
193
+ 		if (phy->port->num_phys == 0)
194
+-			sas_port_delete(phy->port);
195
++			list_add_tail(&phy->port->del_list,
196
++				&parent->port->sas_port_del_list);
197
+ 		phy->port = NULL;
198
+ 	}
199
+ }
200
+@@ -2113,7 +2114,7 @@ int sas_ex_revalidate_domain(struct domain_device *port_dev)
201
+ 	struct domain_device *dev = NULL;
202
+ 
203
+ 	res = sas_find_bcast_dev(port_dev, &dev);
204
+-	while (res == 0 && dev) {
205
++	if (res == 0 && dev) {
206
+ 		struct expander_device *ex = &dev->ex_dev;
207
+ 		int i = 0, phy_id;
208
+ 
209
+@@ -2125,9 +2126,6 @@ int sas_ex_revalidate_domain(struct domain_device *port_dev)
210
+ 			res = sas_rediscover(dev, phy_id);
211
+ 			i = phy_id + 1;
212
+ 		} while (i < ex->num_phys);
213
+-
214
+-		dev = NULL;
215
+-		res = sas_find_bcast_dev(port_dev, &dev);
216
+ 	}
217
+ 	return res;
218
+ }
219
+diff --git a/drivers/scsi/libsas/sas_internal.h b/drivers/scsi/libsas/sas_internal.h
220
+index 9cf0bc2..2cbbd11 100644
221
+--- a/drivers/scsi/libsas/sas_internal.h
222
+@@ -98,6 +98,7 @@ int sas_try_ata_reset(struct asd_sas_phy *phy);
223
+ void sas_hae_reset(struct work_struct *work);
224
+ 
225
+ void sas_free_device(struct kref *kref);
226
++void sas_destruct_devices(struct asd_sas_port *port);
227
+ 
228
+ #ifdef CONFIG_SCSI_SAS_HOST_SMP
229
+ extern int sas_smp_host_handler(struct Scsi_Host *shost, struct request *req,
230
+diff --git a/drivers/scsi/libsas/sas_port.c b/drivers/scsi/libsas/sas_port.c
231
+index d3c5297..5d3244c 100644
232
+--- a/drivers/scsi/libsas/sas_port.c
233
+@@ -66,6 +66,7 @@ static void sas_resume_port(struct asd_sas_phy *phy)
234
+ 		rc = sas_notify_lldd_dev_found(dev);
235
+ 		if (rc) {
236
+ 			sas_unregister_dev(port, dev);
237
++			sas_destruct_devices(port);
238
+ 			continue;
239
+ 		}
240
+ 
241
+@@ -219,6 +220,7 @@ void sas_deform_port(struct asd_sas_phy *phy, int gone)
242
+ 
243
+ 	if (port->num_phys == 1) {
244
+ 		sas_unregister_domain_devices(port, gone);
245
++		sas_destruct_devices(port);
246
+ 		sas_port_delete(port->port);
247
+ 		port->port = NULL;
248
+ 	} else {
249
+@@ -323,6 +325,7 @@ static void sas_init_port(struct asd_sas_port *port,
250
+ 	INIT_LIST_HEAD(&port->dev_list);
251
+ 	INIT_LIST_HEAD(&port->disco_list);
252
+ 	INIT_LIST_HEAD(&port->destroy_list);
253
++	INIT_LIST_HEAD(&port->sas_port_del_list);
254
+ 	spin_lock_init(&port->phy_list_lock);
255
+ 	INIT_LIST_HEAD(&port->phy_list);
256
+ 	port->ha = sas_ha;
257
+diff --git a/include/scsi/libsas.h b/include/scsi/libsas.h
258
+index 706a701..8a27e35 100644
259
+--- a/include/scsi/libsas.h
260
+@@ -87,10 +87,8 @@ enum discover_event {
261
+ 	DISCE_DISCOVER_DOMAIN   = 0U,
262
+ 	DISCE_REVALIDATE_DOMAIN = 1,
263
+ 	DISCE_PORT_GONE         = 2,
264
+-	DISCE_PROBE		= 3,
265
+ 	DISCE_SUSPEND		= 4,
266
+ 	DISCE_RESUME		= 5,
267
+-	DISCE_DESTRUCT		= 6,
268
+ 	DISC_NUM_EVENTS		= 7,
269
+ };
270
+ 
271
+@@ -269,6 +267,7 @@ struct asd_sas_port {
272
+ 	struct list_head dev_list;
273
+ 	struct list_head disco_list;
274
+ 	struct list_head destroy_list;
275
++	struct list_head sas_port_del_list;
276
+ 	enum   sas_linkrate linkrate;
277
+ 
278
+ 	struct sas_work work;
279
+diff --git a/include/scsi/scsi_transport_sas.h b/include/scsi/scsi_transport_sas.h
280
+index 0bd71e2..e6c7ff5 100644
281
+--- a/include/scsi/scsi_transport_sas.h
282
+@@ -145,6 +145,7 @@ struct sas_port {
283
+ 
284
+ 	struct mutex		phy_list_mutex;
285
+ 	struct list_head	phy_list;
286
++	struct list_head	del_list; /* libsas only */
287
+ };
288
+ 
289
+ #define dev_to_sas_port(d) \
290
+-- 
291
+2.7.4
292
+
0 293
new file mode 100644
... ...
@@ -0,0 +1,50 @@
0
+From ed5525ebec6548b92f7c6f026f5a23001e25f74e Mon Sep 17 00:00:00 2001
1
+From: "Eric Sandeen Date: Mon, 16 Apr 2018 23:07:27 -0700"
2
+ <sandeen@redhat.com>
3
+Date: Mon, 16 Jul 2018 20:13:54 +0530
4
+Subject: [PATCH] xfs: set format back to extents if xfs_bmap_extents_to_btree
5
+
6
+If xfs_bmap_extents_to_btree fails in a mode where we call
7
+xfs_iroot_realloc(-1) to de-allocate the root, set the
8
+format back to extents.
9
+
10
+Otherwise we can assume we can dereference ifp->if_broot
11
+based on the XFS_DINODE_FMT_BTREE format, and crash.
12
+
13
+Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=199423
14
+Signed-off-by: Eric Sandeen <sandeen@redhat.com>
15
+Reviewed-by: Christoph Hellwig <hch@lst.de>
16
+Reviewed-by: Darrick J. Wong <darrick.wong@oracle.com>
17
+Signed-off-by: Darrick J. Wong <darrick.wong@oracle.com>
18
+[ Srinidhi Rao : Backported this fix to 4.9 ]
19
+Signed-off-by: srinidhira0 <srinidhir@vmware.com>
20
+
21
+---
22
+ fs/xfs/libxfs/xfs_bmap.c | 4 ++++
23
+ 1 file changed, 4 insertions(+)
24
+
25
+diff --git a/fs/xfs/libxfs/xfs_bmap.c b/fs/xfs/libxfs/xfs_bmap.c
26
+index 8ad65d4..356385f 100644
27
+--- a/fs/xfs/libxfs/xfs_bmap.c
28
+@@ -781,6 +781,8 @@ xfs_bmap_extents_to_btree(
29
+ 	*logflagsp = 0;
30
+ 	if ((error = xfs_alloc_vextent(&args))) {
31
+ 		xfs_iroot_realloc(ip, -1, whichfork);
32
++		ASSERT(ifp->if_broot == NULL);
33
++		XFS_IFORK_FMT_SET(ip, whichfork, XFS_DINODE_FMT_EXTENTS);
34
+ 		xfs_btree_del_cursor(cur, XFS_BTREE_ERROR);
35
+ 		return error;
36
+ 	}
37
+@@ -801,6 +803,8 @@ xfs_bmap_extents_to_btree(
38
+ 	}
39
+ 	if (WARN_ON_ONCE(args.fsbno == NULLFSBLOCK)) {
40
+ 		xfs_iroot_realloc(ip, -1, whichfork);
41
++		ASSERT(ifp->if_broot == NULL);
42
++		XFS_IFORK_FMT_SET(ip, whichfork, XFS_DINODE_FMT_EXTENTS);
43
+ 		xfs_btree_del_cursor(cur, XFS_BTREE_ERROR);
44
+ 		return -ENOSPC;
45
+ 	}
46
+-- 
47
+2.7.4
48
+
... ...
@@ -2,7 +2,7 @@
2 2
 Summary:        Kernel
3 3
 Name:           linux-aws
4 4
 Version:        4.9.111
5
-Release:        2%{?kat_build:.%kat_build}%{?dist}
5
+Release:        3%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
... ...
@@ -59,6 +59,12 @@ Patch40:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
59 59
 # Fix for CVE-2017-18224
60 60
 Patch41:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
61 61
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
62
+# Fix for CVE-2017-18232
63
+Patch43:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
64
+# Fix for CVE-2017-18249
65
+Patch44:        0001-f2fs-fix-race-condition-in-between-free-nid-allocator-initializer.patch
66
+# Fix for CVE-2018-10323
67
+Patch45:        0001-xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch
62 68
 
63 69
 # For Spectre
64 70
 Patch52: 0141-locking-barriers-introduce-new-observable-speculatio.patch
... ...
@@ -231,6 +237,9 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
231 231
 %patch40 -p1
232 232
 %patch41 -p1
233 233
 %patch42 -p1
234
+%patch43 -p1
235
+%patch44 -p1
236
+%patch45 -p1
234 237
 
235 238
 %patch52 -p1
236 239
 %patch53 -p1
... ...
@@ -451,6 +460,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
451 451
 /usr/share/doc/*
452 452
 
453 453
 %changelog
454
+*   Thu Jul 12 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-3
455
+-   Fix CVE-2017-18232, CVE-2017-18249 and CVE-2018-10323
454 456
 *   Wed Jul 11 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-2
455 457
 -   Enable and use AppArmor security module by default.
456 458
 *   Sat Jul 07 2018 Alexey Makhalov <amakhalov@vmware.com> 4.9.111-1
... ...
@@ -2,7 +2,7 @@
2 2
 Summary:        Kernel
3 3
 Name:           linux-esx
4 4
 Version:        4.9.111
5
-Release:        1%{?dist}
5
+Release:        2%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
... ...
@@ -56,6 +56,12 @@ Patch40:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
56 56
 # Fix for CVE-2017-18224
57 57
 Patch41:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
58 58
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
59
+# Fix for CVE-2017-18232
60
+Patch43:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
61
+# Fix for CVE-2017-18249
62
+Patch44:        0001-f2fs-fix-race-condition-in-between-free-nid-allocator-initializer.patch
63
+# Fix for CVE-2018-10323
64
+Patch45:        0001-xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch
59 65
 
60 66
 # For Spectre
61 67
 Patch52: 0141-locking-barriers-introduce-new-observable-speculatio.patch
... ...
@@ -147,6 +153,9 @@ The Linux package contains the Linux kernel doc files
147 147
 %patch40 -p1
148 148
 %patch41 -p1
149 149
 %patch42 -p1
150
+%patch43 -p1
151
+%patch44 -p1
152
+%patch45 -p1
150 153
 
151 154
 %patch52 -p1
152 155
 %patch53 -p1
... ...
@@ -259,6 +268,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
259 259
 /usr/src/linux-headers-%{uname_r}
260 260
 
261 261
 %changelog
262
+*   Thu Jul 12 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-2
263
+-   Fix CVE-2017-18232, CVE-2017-18249 and CVE-2018-10323
262 264
 *   Sat Jul 07 2018 Alexey Makhalov <amakhalov@vmware.com> 4.9.111-1
263 265
 -   Update to version 4.9.111.
264 266
 -   .config: use =y for vmxnet3 instead of =m, use lz4 for bzImage.
... ...
@@ -2,7 +2,7 @@
2 2
 Summary:        Kernel
3 3
 Name:           linux-secure
4 4
 Version:        4.9.111
5
-Release:        1%{?kat_build:.%kat_build}%{?dist}
5
+Release:        2%{?kat_build:.%kat_build}%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
... ...
@@ -65,6 +65,12 @@ Patch42:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
65 65
 # Fix for CVE-2017-18224
66 66
 Patch43:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
67 67
 Patch44:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
68
+# Fix for CVE-2017-18232
69
+Patch45:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
70
+# Fix for CVE-2017-18249
71
+Patch46:        0001-f2fs-fix-race-condition-in-between-free-nid-allocator-initializer.patch
72
+# Fix for CVE-2018-10323
73
+Patch47:        0001-xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch
68 74
 
69 75
 # For Spectre
70 76
 Patch52: 0141-locking-barriers-introduce-new-observable-speculatio.patch
... ...
@@ -199,6 +205,9 @@ EOF
199 199
 %patch42 -p1
200 200
 %patch43 -p1
201 201
 %patch44 -p1
202
+%patch45 -p1
203
+%patch46 -p1
204
+%patch47 -p1
202 205
 
203 206
 # spectre
204 207
 %patch52 -p1
... ...
@@ -346,6 +355,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
346 346
 /usr/src/linux-headers-%{uname_r}
347 347
 
348 348
 %changelog
349
+*   Thu Jul 12 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-2
350
+-   Fix CVE-2017-18232, CVE-2017-18249 and CVE-2018-10323
349 351
 *   Sat Jul 07 2018 Alexey Makhalov <amakhalov@vmware.com> 4.9.111-1
350 352
 -   Update to version 4.9.111
351 353
 *   Wed Jun 27 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.109-2
... ...
@@ -2,7 +2,7 @@
2 2
 Summary:        Kernel
3 3
 Name:           linux
4 4
 Version:        4.9.111
5
-Release:        2%{?kat_build:.%kat_build}%{?dist}
5
+Release:        3%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
... ...
@@ -63,6 +63,12 @@ Patch40:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
63 63
 # Fix for CVE-2017-18224
64 64
 Patch41:        0001-ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
65 65
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
66
+# Fix for CVE-2017-18232
67
+Patch43:        0001-scsi-libsas-direct-call-probe-and-destruct.patch
68
+# Fix for CVE-2017-18249
69
+Patch44:        0001-f2fs-fix-race-condition-in-between-free-nid-allocator-initializer.patch
70
+# Fix for CVE-2018-10323
71
+Patch45:        0001-xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch
66 72
 
67 73
 # For Spectre
68 74
 Patch52: 0141-locking-barriers-introduce-new-observable-speculatio.patch
... ...
@@ -190,6 +196,9 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
190 190
 %patch40 -p1
191 191
 %patch41 -p1
192 192
 %patch42 -p1
193
+%patch43 -p1
194
+%patch44 -p1
195
+%patch45 -p1
193 196
 
194 197
 %patch52 -p1
195 198
 %patch53 -p1
... ...
@@ -373,6 +382,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
373 373
 /usr/share/doc/*
374 374
 
375 375
 %changelog
376
+*   Thu Jul 12 2018 Srinidhi Rao <srinidhir@vmware.com> 4.9.111-3
377
+-   Fix CVE-2017-18232, CVE-2017-18249 and CVE-2018-10323
376 378
 *   Wed Jul 11 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.111-2
377 379
 -   Enable and use AppArmor security module by default.
378 380
 *   Sat Jul 07 2018 Alexey Makhalov <amakhalov@vmware.com> 4.9.111-1