To make systemtap back to work.
Change-Id: I08a6b56d9c93c01a6671dc6de3a8161b8c764d12
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/5261
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Srivatsa S. Bhat <srivatsab@vmware.com>
| ... | ... |
@@ -1,14 +1,14 @@ |
| 1 | 1 |
Summary: Linux API header files |
| 2 | 2 |
Name: linux-api-headers |
| 3 |
-Version: 4.4.131 |
|
| 4 |
-Release: 2%{?dist}
|
|
| 3 |
+Version: 4.4.137 |
|
| 4 |
+Release: 1%{?dist}
|
|
| 5 | 5 |
License: GPLv2 |
| 6 | 6 |
URL: http://www.kernel.org/ |
| 7 | 7 |
Group: System Environment/Kernel |
| 8 | 8 |
Vendor: VMware, Inc. |
| 9 | 9 |
Distribution: Photon |
| 10 | 10 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 11 |
-%define sha1 linux=6811784d7abf4cd84f99c188c397b893deb35551 |
|
| 11 |
+%define sha1 linux=05b18bc780fb6f534dbf47825945b4e6eca15143 |
|
| 12 | 12 |
BuildArch: noarch |
| 13 | 13 |
# From SPECS/linux and used by linux-esx only |
| 14 | 14 |
# It provides f*xattrat syscalls |
| ... | ... |
@@ -29,6 +29,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
|
| 29 | 29 |
%defattr(-,root,root) |
| 30 | 30 |
%{_includedir}/*
|
| 31 | 31 |
%changelog |
| 32 |
+* Wed Jun 13 2018 Alexey Makhalov <amakhalov@vmware.com> 4.4.137-1 |
|
| 33 |
+- Update to version 4.4.137 |
|
| 32 | 34 |
* Mon May 21 2018 Bo Gan <ganb@vmware.com> 4.4.131-2 |
| 33 | 35 |
- Sync with syscall number change for f*xattrat syscalls family |
| 34 | 36 |
* Fri May 04 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.4.131-1 |
| 35 | 37 |
deleted file mode 100644 |
| ... | ... |
@@ -1,38 +0,0 @@ |
| 1 |
-From 0ddcff49b672239dda94d70d0fcf50317a9f4b51 Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: "weiyongjun (A)" <weiyongjun1@huawei.com> |
|
| 3 |
-Date: Thu, 18 Jan 2018 02:23:34 +0000 |
|
| 4 |
-Subject: [PATCH] mac80211_hwsim: fix possible memory leak in |
|
| 5 |
- hwsim_new_radio_nl() |
|
| 6 |
- |
|
| 7 |
-'hwname' is malloced in hwsim_new_radio_nl() and should be freed |
|
| 8 |
-before leaving from the error handling cases, otherwise it will cause |
|
| 9 |
-memory leak. |
|
| 10 |
- |
|
| 11 |
-Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length")
|
|
| 12 |
-Signed-off-by: Wei Yongjun <weiyongjun1@huawei.com> |
|
| 13 |
-Reviewed-by: Ben Hutchings <ben.hutchings@codethink.co.uk> |
|
| 14 |
-Signed-off-by: Johannes Berg <johannes.berg@intel.com> |
|
| 15 |
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu> |
|
| 16 |
- drivers/net/wireless/mac80211_hwsim.c | 4 +++- |
|
| 17 |
- 1 file changed, 3 insertions(+), 1 deletion(-) |
|
| 18 |
- |
|
| 19 |
-diff --git a/drivers/net/wireless/mac80211_hwsim.c b/drivers/net/wireless/mac80211_hwsim.c |
|
| 20 |
-index 8a9164d..e8b770a 100644 |
|
| 21 |
-+++ b/drivers/net/wireless/mac80211_hwsim.c |
|
| 22 |
-@@ -2925,8 +2925,10 @@ static int hwsim_new_radio_nl(struct sk_buff *msg, struct genl_info *info) |
|
| 23 |
- if (info->attrs[HWSIM_ATTR_REG_CUSTOM_REG]) {
|
|
| 24 |
- u32 idx = nla_get_u32(info->attrs[HWSIM_ATTR_REG_CUSTOM_REG]); |
|
| 25 |
- |
|
| 26 |
-- if (idx >= ARRAY_SIZE(hwsim_world_regdom_custom)) |
|
| 27 |
-+ if (idx >= ARRAY_SIZE(hwsim_world_regdom_custom)) {
|
|
| 28 |
-+ kfree(hwname); |
|
| 29 |
- return -EINVAL; |
|
| 30 |
-+ } |
|
| 31 |
- param.regd = hwsim_world_regdom_custom[idx]; |
|
| 32 |
- } |
|
| 33 |
- |
|
| 34 |
-2.7.4 |
|
| 35 |
- |
| ... | ... |
@@ -105,7 +105,7 @@ index 7d344259..3c42478 100644 |
| 105 | 105 |
+ |
| 106 | 106 |
static struct sk_buff *skb_reorder_vlan_header(struct sk_buff *skb) |
| 107 | 107 |
{
|
| 108 |
- if (skb_cow(skb, skb_headroom(skb)) < 0) {
|
|
| 108 |
+ int mac_len; |
|
| 109 | 109 |
diff --git a/net/sched/sch_tbf.c b/net/sched/sch_tbf.c |
| 110 | 110 |
index c2fbde7..93d6a21 100644 |
| 111 | 111 |
--- a/net/sched/sch_tbf.c |
| 112 | 112 |
deleted file mode 100644 |
| ... | ... |
@@ -1,47 +0,0 @@ |
| 1 |
-From 1572e45a924f254d9570093abde46430c3172e3d Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: Tan Xiaojun <tanxiaojun@huawei.com> |
|
| 3 |
-Date: Thu, 23 Feb 2017 14:04:39 +0800 |
|
| 4 |
-Subject: [PATCH] perf/core: Fix the perf_cpu_time_max_percent check |
|
| 5 |
- |
|
| 6 |
-Use "proc_dointvec_minmax" instead of "proc_dointvec" to check the input |
|
| 7 |
-value from user-space. |
|
| 8 |
- |
|
| 9 |
-If not, we can set a big value and some vars will overflow like |
|
| 10 |
-"sysctl_perf_event_sample_rate" which will cause a lot of unexpected |
|
| 11 |
-problems. |
|
| 12 |
- |
|
| 13 |
-Signed-off-by: Tan Xiaojun <tanxiaojun@huawei.com> |
|
| 14 |
-Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> |
|
| 15 |
-Cc: <acme@kernel.org> |
|
| 16 |
-Cc: <alexander.shishkin@linux.intel.com> |
|
| 17 |
-Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> |
|
| 18 |
-Cc: Arnaldo Carvalho de Melo <acme@redhat.com> |
|
| 19 |
-Cc: Jiri Olsa <jolsa@redhat.com> |
|
| 20 |
-Cc: Linus Torvalds <torvalds@linux-foundation.org> |
|
| 21 |
-Cc: Peter Zijlstra <peterz@infradead.org> |
|
| 22 |
-Cc: Stephane Eranian <eranian@google.com> |
|
| 23 |
-Cc: Thomas Gleixner <tglx@linutronix.de> |
|
| 24 |
-Cc: Vince Weaver <vincent.weaver@maine.edu> |
|
| 25 |
-Link: http://lkml.kernel.org/r/1487829879-56237-1-git-send-email-tanxiaojun@huawei.com |
|
| 26 |
-Signed-off-by: Ingo Molnar <mingo@kernel.org> |
|
| 27 |
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu> |
|
| 28 |
- kernel/events/core.c | 2 +- |
|
| 29 |
- 1 file changed, 1 insertion(+), 1 deletion(-) |
|
| 30 |
- |
|
| 31 |
-diff --git a/kernel/events/core.c b/kernel/events/core.c |
|
| 32 |
-index 6aeb0ef..92d1f12 100644 |
|
| 33 |
-+++ b/kernel/events/core.c |
|
| 34 |
-@@ -229,7 +229,7 @@ int perf_cpu_time_max_percent_handler(struct ctl_table *table, int write, |
|
| 35 |
- void __user *buffer, size_t *lenp, |
|
| 36 |
- loff_t *ppos) |
|
| 37 |
- {
|
|
| 38 |
-- int ret = proc_dointvec(table, write, buffer, lenp, ppos); |
|
| 39 |
-+ int ret = proc_dointvec_minmax(table, write, buffer, lenp, ppos); |
|
| 40 |
- |
|
| 41 |
- if (ret || !write) |
|
| 42 |
- return ret; |
|
| 43 |
-2.7.4 |
|
| 44 |
- |
| ... | ... |
@@ -186,6 +186,7 @@ CONFIG_RD_LZMA=y |
| 186 | 186 |
CONFIG_RD_XZ=y |
| 187 | 187 |
CONFIG_RD_LZO=y |
| 188 | 188 |
CONFIG_RD_LZ4=y |
| 189 |
+CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE=y |
|
| 189 | 190 |
# CONFIG_CC_OPTIMIZE_FOR_SIZE is not set |
| 190 | 191 |
CONFIG_SYSCTL=y |
| 191 | 192 |
CONFIG_ANON_INODES=y |
| ... | ... |
@@ -1350,7 +1351,9 @@ CONFIG_CEPH_LIB=m |
| 1350 | 1350 |
# CONFIG_CEPH_LIB_USE_DNS_RESOLVER is not set |
| 1351 | 1351 |
# CONFIG_NFC is not set |
| 1352 | 1352 |
# CONFIG_LWTUNNEL is not set |
| 1353 |
+CONFIG_DST_CACHE=y |
|
| 1353 | 1354 |
CONFIG_HAVE_BPF_JIT=y |
| 1355 |
+CONFIG_HAVE_EBPF_JIT=y |
|
| 1354 | 1356 |
|
| 1355 | 1357 |
# |
| 1356 | 1358 |
# Device Drivers |
| ... | ... |
@@ -180,6 +180,7 @@ CONFIG_RD_LZMA=y |
| 180 | 180 |
CONFIG_RD_XZ=y |
| 181 | 181 |
CONFIG_RD_LZO=y |
| 182 | 182 |
CONFIG_RD_LZ4=y |
| 183 |
+CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE=y |
|
| 183 | 184 |
# CONFIG_CC_OPTIMIZE_FOR_SIZE is not set |
| 184 | 185 |
CONFIG_SYSCTL=y |
| 185 | 186 |
CONFIG_ANON_INODES=y |
| ... | ... |
@@ -1154,7 +1155,9 @@ CONFIG_NET_9P=m |
| 1154 | 1154 |
# CONFIG_CEPH_LIB is not set |
| 1155 | 1155 |
# CONFIG_NFC is not set |
| 1156 | 1156 |
# CONFIG_LWTUNNEL is not set |
| 1157 |
+CONFIG_DST_CACHE=y |
|
| 1157 | 1158 |
CONFIG_HAVE_BPF_JIT=y |
| 1159 |
+CONFIG_HAVE_EBPF_JIT=y |
|
| 1158 | 1160 |
|
| 1159 | 1161 |
# |
| 1160 | 1162 |
# Device Drivers |
| 1161 | 1163 |
new file mode 100644 |
| ... | ... |
@@ -0,0 +1,150 @@ |
| 0 |
+From 00f30dfb8966dc12d852807c1c691c28a33c966c Mon Sep 17 00:00:00 2001 |
|
| 1 |
+From: Masami Hiramatsu <mhiramat@kernel.org> |
|
| 2 |
+Date: Tue, 12 Jun 2018 23:10:56 +0000 |
|
| 3 |
+Subject: [PATCH] kprobes/x86: Do not modify singlestep buffer while resuming |
|
| 4 |
+ |
|
| 5 |
+commit 804dec5bda9b4fcdab5f67fe61db4a0498af5221 upstream. |
|
| 6 |
+ |
|
| 7 |
+Do not modify singlestep execution buffer (kprobe.ainsn.insn) |
|
| 8 |
+while resuming from single-stepping, instead, modifies |
|
| 9 |
+the buffer to add a jump back instruction at preparing |
|
| 10 |
+buffer. |
|
| 11 |
+ |
|
| 12 |
+Commit 176bee4cfcec ("kprobes/x86: Set kprobes pages read-only")
|
|
| 13 |
+introduced a bug in stable 4.4.y by making singlestep buffer page |
|
| 14 |
+read-only. Attempts to modify singlestep buffer, to insert a jump |
|
| 15 |
+instruction, at resume_execution() lead to kernel panic. |
|
| 16 |
+ |
|
| 17 |
+ BUG: unable to handle kernel paging request at ffffffffa0011001 |
|
| 18 |
+ IP: [<ffffffff8105711c>] resume_execution+0x14c/0x1a0 |
|
| 19 |
+ PGD 1c0f067 PUD 1c10063 PMD 42ac74067 PTE 41cc35061 |
|
| 20 |
+ Oops: 0003 [#1] SMP |
|
| 21 |
+ Modules linked in: stap_6eaf26e7bd7018624e4c19b7486f4bb8_1857(OE) ipt_MASQUERADE(E) nf_nat_masquerade_ipv4(E) <...> |
|
| 22 |
+ CPU: 5 PID: 1857 Comm: stapio Tainted: G OE 4.4.136+ #1 |
|
| 23 |
+ Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 01/24/2017 |
|
| 24 |
+ task: ffff880425044940 ti: ffff88042d160000 task.ti: ffff88042d160000 |
|
| 25 |
+ RIP: 0010:[<ffffffff8105711c>] [<ffffffff8105711c>] resume_execution+0x14c/0x1a0 |
|
| 26 |
+ RSP: 0018:ffff88043fd4aeb0 EFLAGS: 00010086 |
|
| 27 |
+ RAX: ffffffffa0011001 RBX: ffff88043fd4af58 RCX: 0000000000000006 |
|
| 28 |
+ RDX: ffffffff811b9f71 RSI: ffff88043fd4af58 RDI: 0000000000000055 |
|
| 29 |
+ RBP: ffff88043fd4aee8 R08: 0000000000000001 R09: ffff88041cce8100 |
|
| 30 |
+ R10: 0000000000000004 R11: ffff8804252d9238 R12: ffff88042c6051c0 |
|
| 31 |
+ R13: ffffffff811b9f70 R14: ffff88042d163f08 R15: ffffffffa0011000 |
|
| 32 |
+ FS: 00007f05f6439740(0000) GS:ffff88043fd40000(0000) knlGS:0000000000000000 |
|
| 33 |
+ CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 |
|
| 34 |
+ CR2: ffffffffa0011001 CR3: 000000042944a000 CR4: 0000000000160670 |
|
| 35 |
+ Stack: |
|
| 36 |
+ ffff88043fd4fee0 0000000000000000 ffff88043fd4fee0 ffff88043fd4af58 |
|
| 37 |
+ ffff88042c6051c0 0000000000000000 00007ffd23764640 ffff88043fd4af10 |
|
| 38 |
+ ffffffff810571a8 ffff88043fd4af58 ffff880425044940 0000000000000000 |
|
| 39 |
+ Call Trace: |
|
| 40 |
+ <#DB> |
|
| 41 |
+ [<ffffffff810571a8>] kprobe_debug_handler+0x38/0xd0 |
|
| 42 |
+ [<ffffffff81016de2>] do_debug+0x82/0x1b0 |
|
| 43 |
+ [<ffffffff817e6aa5>] debug+0x35/0x70 |
|
| 44 |
+ <<EOE>> |
|
| 45 |
+ [<ffffffff811bac51>] ? SyS_read+0x41/0xa0 |
|
| 46 |
+ [<ffffffff817e48a1>] entry_SYSCALL_64_fastpath+0x1e/0x95 |
|
| 47 |
+ |
|
| 48 |
+Issue was found and fix was verified by running systemtap: |
|
| 49 |
+ stap -v -e 'probe vfs.read {printf("read performed\n"); exit()}'
|
|
| 50 |
+ |
|
| 51 |
+Fixes: 176bee4cfcec ("kprobes/x86: Set kprobes pages read-only")
|
|
| 52 |
+Cc: stable@vger.kernel.org # v4.4 |
|
| 53 |
+Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org> |
|
| 54 |
+Cc: Ananth N Mavinakayanahalli <ananth@linux.vnet.ibm.com> |
|
| 55 |
+Cc: Andrey Ryabinin <aryabinin@virtuozzo.com> |
|
| 56 |
+Cc: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com> |
|
| 57 |
+Cc: Borislav Petkov <bp@alien8.de> |
|
| 58 |
+Cc: Brian Gerst <brgerst@gmail.com> |
|
| 59 |
+Cc: David S . Miller <davem@davemloft.net> |
|
| 60 |
+Cc: Denys Vlasenko <dvlasenk@redhat.com> |
|
| 61 |
+Cc: H. Peter Anvin <hpa@zytor.com> |
|
| 62 |
+Cc: Josh Poimboeuf <jpoimboe@redhat.com> |
|
| 63 |
+Cc: Linus Torvalds <torvalds@linux-foundation.org> |
|
| 64 |
+Cc: Peter Zijlstra <peterz@infradead.org> |
|
| 65 |
+Cc: Thomas Gleixner <tglx@linutronix.de> |
|
| 66 |
+Cc: Ye Xiaolong <xiaolong.ye@intel.com> |
|
| 67 |
+Link: http://lkml.kernel.org/r/149076361560.22469.1610155860343077495.stgit@devbox |
|
| 68 |
+Signed-off-by: Ingo Molnar <mingo@kernel.org> |
|
| 69 |
+Reviewed-by/Acked-by: "Steven Rostedt (VMware)" <rostedt@goodmis.org> |
|
| 70 |
+Signed-off-by: Alexey Makhalov <amakhalov@vmware.com> |
|
| 71 |
+--- |
|
| 72 |
+ arch/x86/kernel/kprobes/core.c | 42 ++++++++++++++++++++---------------------- |
|
| 73 |
+ 1 file changed, 20 insertions(+), 22 deletions(-) |
|
| 74 |
+ |
|
| 75 |
+diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c |
|
| 76 |
+index df9be5b91270..1f5c47a49e35 100644 |
|
| 77 |
+--- a/arch/x86/kernel/kprobes/core.c |
|
| 78 |
+@@ -411,25 +411,38 @@ void free_insn_page(void *page) |
|
| 79 |
+ module_memfree(page); |
|
| 80 |
+ } |
|
| 81 |
+ |
|
| 82 |
++/* Prepare reljump right after instruction to boost */ |
|
| 83 |
++static void prepare_boost(struct kprobe *p, int length) |
|
| 84 |
++{
|
|
| 85 |
++ if (can_boost(p->ainsn.insn, p->addr) && |
|
| 86 |
++ MAX_INSN_SIZE - length >= RELATIVEJUMP_SIZE) {
|
|
| 87 |
++ /* |
|
| 88 |
++ * These instructions can be executed directly if it |
|
| 89 |
++ * jumps back to correct address. |
|
| 90 |
++ */ |
|
| 91 |
++ synthesize_reljump(p->ainsn.insn + length, p->addr + length); |
|
| 92 |
++ p->ainsn.boostable = 1; |
|
| 93 |
++ } else {
|
|
| 94 |
++ p->ainsn.boostable = -1; |
|
| 95 |
++ } |
|
| 96 |
++} |
|
| 97 |
++ |
|
| 98 |
+ static int arch_copy_kprobe(struct kprobe *p) |
|
| 99 |
+ {
|
|
| 100 |
+- int ret; |
|
| 101 |
++ int len; |
|
| 102 |
+ |
|
| 103 |
+ set_memory_rw((unsigned long)p->ainsn.insn & PAGE_MASK, 1); |
|
| 104 |
+ |
|
| 105 |
+ /* Copy an instruction with recovering if other optprobe modifies it.*/ |
|
| 106 |
+- ret = __copy_instruction(p->ainsn.insn, p->addr); |
|
| 107 |
+- if (!ret) |
|
| 108 |
++ len = __copy_instruction(p->ainsn.insn, p->addr); |
|
| 109 |
++ if (!len) |
|
| 110 |
+ return -EINVAL; |
|
| 111 |
+ |
|
| 112 |
+ /* |
|
| 113 |
+ * __copy_instruction can modify the displacement of the instruction, |
|
| 114 |
+ * but it doesn't affect boostable check. |
|
| 115 |
+ */ |
|
| 116 |
+- if (can_boost(p->ainsn.insn, p->addr)) |
|
| 117 |
+- p->ainsn.boostable = 0; |
|
| 118 |
+- else |
|
| 119 |
+- p->ainsn.boostable = -1; |
|
| 120 |
++ prepare_boost(p, len); |
|
| 121 |
+ |
|
| 122 |
+ set_memory_ro((unsigned long)p->ainsn.insn & PAGE_MASK, 1); |
|
| 123 |
+ |
|
| 124 |
+@@ -894,21 +907,6 @@ static void resume_execution(struct kprobe *p, struct pt_regs *regs, |
|
| 125 |
+ break; |
|
| 126 |
+ } |
|
| 127 |
+ |
|
| 128 |
+- if (p->ainsn.boostable == 0) {
|
|
| 129 |
+- if ((regs->ip > copy_ip) && |
|
| 130 |
+- (regs->ip - copy_ip) + 5 < MAX_INSN_SIZE) {
|
|
| 131 |
+- /* |
|
| 132 |
+- * These instructions can be executed directly if it |
|
| 133 |
+- * jumps back to correct address. |
|
| 134 |
+- */ |
|
| 135 |
+- synthesize_reljump((void *)regs->ip, |
|
| 136 |
+- (void *)orig_ip + (regs->ip - copy_ip)); |
|
| 137 |
+- p->ainsn.boostable = 1; |
|
| 138 |
+- } else {
|
|
| 139 |
+- p->ainsn.boostable = -1; |
|
| 140 |
+- } |
|
| 141 |
+- } |
|
| 142 |
+- |
|
| 143 |
+ regs->ip += orig_ip - copy_ip; |
|
| 144 |
+ |
|
| 145 |
+ no_change: |
|
| 146 |
+-- |
|
| 147 |
+2.14.2 |
|
| 148 |
+ |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux-esx |
| 4 |
-Version: 4.4.131 |
|
| 5 |
-Release: 3%{?dist}
|
|
| 4 |
+Version: 4.4.137 |
|
| 5 |
+Release: 1%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=6811784d7abf4cd84f99c188c397b893deb35551 |
|
| 12 |
+%define sha1 linux=05b18bc780fb6f534dbf47825945b4e6eca15143 |
|
| 13 | 13 |
Source1: config-esx |
| 14 | 14 |
Patch0: double-tcp_mem-limits.patch |
| 15 | 15 |
Patch1: linux-4.4-sysctl-sched_weighted_cpuload_uses_rla.patch |
| ... | ... |
@@ -23,7 +23,7 @@ Patch8: 04-quiet-boot.patch |
| 23 | 23 |
Patch9: 05-pv-ops.patch |
| 24 | 24 |
Patch10: 06-sunrpc.patch |
| 25 | 25 |
Patch11: vmxnet3-1.4.6.0-avoid-calling-pskb_may_pull-with-interrupts-disabled.patch |
| 26 |
- |
|
| 26 |
+Patch12: kprobes-x86-Do-not-modify-singlestep-buffer-while-re.patch |
|
| 27 | 27 |
Patch13: REVERT-sched-fair-Beef-up-wake_wide.patch |
| 28 | 28 |
Patch14: e1000e-prevent-div-by-zero-if-TIMINCA-is-zero.patch |
| 29 | 29 |
|
| ... | ... |
@@ -40,14 +40,10 @@ Patch26: init-do_mounts-recreate-dev-root.patch |
| 40 | 40 |
# Fixes for CVE-2018-1000026 |
| 41 | 41 |
Patch27: 0001-net-create-skb_gso_validate_mac_len.patch |
| 42 | 42 |
Patch28: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
| 43 |
-# Fix for CVE-2017-18255 |
|
| 44 |
-Patch29: 0001-perf-core-Fix-the-perf_cpu_time_max_percent-check.patch |
|
| 45 | 43 |
# Fix for CVE-2018-8043 |
| 46 | 44 |
Patch30: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 47 | 45 |
# Fix for CVE-2017-18216 |
| 48 | 46 |
Patch31: 0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch |
| 49 |
-# Fix for CVE-2018-8087 |
|
| 50 |
-Patch32: 0001-mac80211_hwsim-fix-possible-memory-leak-in-hwsim_new.patch |
|
| 51 | 47 |
# Fix for CVE-2017-18241 |
| 52 | 48 |
Patch33: 0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch |
| 53 | 49 |
|
| ... | ... |
@@ -114,7 +110,7 @@ The Linux package contains the Linux kernel doc files |
| 114 | 114 |
%patch9 -p1 |
| 115 | 115 |
%patch10 -p1 |
| 116 | 116 |
%patch11 -p1 |
| 117 |
- |
|
| 117 |
+%patch12 -p1 |
|
| 118 | 118 |
%patch13 -p1 |
| 119 | 119 |
%patch14 -p1 |
| 120 | 120 |
|
| ... | ... |
@@ -130,10 +126,8 @@ The Linux package contains the Linux kernel doc files |
| 130 | 130 |
%patch26 -p1 |
| 131 | 131 |
%patch27 -p1 |
| 132 | 132 |
%patch28 -p1 |
| 133 |
-%patch29 -p1 |
|
| 134 | 133 |
%patch30 -p1 |
| 135 | 134 |
%patch31 -p1 |
| 136 |
-%patch32 -p1 |
|
| 137 | 135 |
%patch33 -p1 |
| 138 | 136 |
|
| 139 | 137 |
%patch52 -p1 |
| ... | ... |
@@ -238,6 +232,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
|
| 238 | 238 |
/usr/src/linux-headers-%{uname_r}
|
| 239 | 239 |
|
| 240 | 240 |
%changelog |
| 241 |
+* Wed Jun 13 2018 Alexey Makhalov <amakhalov@vmware.com> 4.4.137-1 |
|
| 242 |
+- Update to version 4.4.137. Fix panic in kprobe. |
|
| 241 | 243 |
* Fri May 18 2018 Bo Gan <ganb@vmware.com> 4.4.131-3 |
| 242 | 244 |
- rebase fXxattrat syscall number to avoid conflict with new syscalls |
| 243 | 245 |
* Fri May 04 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.4.131-2 |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux |
| 4 |
-Version: 4.4.131 |
|
| 5 |
-Release: 3%{?kat_build:.%kat_build}%{?dist}
|
|
| 4 |
+Version: 4.4.137 |
|
| 5 |
+Release: 1%{?kat_build:.%kat_build}%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/%{name}-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=6811784d7abf4cd84f99c188c397b893deb35551 |
|
| 12 |
+%define sha1 linux=05b18bc780fb6f534dbf47825945b4e6eca15143 |
|
| 13 | 13 |
Source1: config |
| 14 | 14 |
%define ena_version 1.1.3 |
| 15 | 15 |
Source2: https://github.com/amzn/amzn-drivers/archive/ena_linux_1.1.3.tar.gz |
| ... | ... |
@@ -26,7 +26,7 @@ Patch7: vmxnet3-1.4.6.0-avoid-calling-pskb_may_pull-with-interrupts-disa |
| 26 | 26 |
Patch8: perf-top-sigsegv-fix.patch |
| 27 | 27 |
Patch9: REVERT-sched-fair-Beef-up-wake_wide.patch |
| 28 | 28 |
Patch10: e1000e-prevent-div-by-zero-if-TIMINCA-is-zero.patch |
| 29 |
- |
|
| 29 |
+Patch11: kprobes-x86-Do-not-modify-singlestep-buffer-while-re.patch |
|
| 30 | 30 |
Patch12: vmxnet3-1.4.6.0-fix-lock-imbalance-in-vmxnet3_tq_xmit.patch |
| 31 | 31 |
Patch13: vmxnet3-1.4.7.0-set-CHECKSUM_UNNECESSARY-for-IPv6-packets.patch |
| 32 | 32 |
Patch14: vmxnet3-1.4.8.0-segCnt-can-be-1-for-LRO-packets.patch |
| ... | ... |
@@ -39,14 +39,10 @@ Patch18: 0002-allow-also-ecb-cipher_null.patch |
| 39 | 39 |
# Fixes for CVE-2018-1000026 |
| 40 | 40 |
Patch19: 0001-net-create-skb_gso_validate_mac_len.patch |
| 41 | 41 |
Patch20: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
| 42 |
-# Fix for CVE-2017-18255 |
|
| 43 |
-Patch21: 0001-perf-core-Fix-the-perf_cpu_time_max_percent-check.patch |
|
| 44 | 42 |
# Fix for CVE-2018-8043 |
| 45 | 43 |
Patch22: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 46 | 44 |
# Fix for CVE-2017-18216 |
| 47 | 45 |
Patch23: 0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch |
| 48 |
-# Fix for CVE-2018-8087 |
|
| 49 |
-Patch24: 0001-mac80211_hwsim-fix-possible-memory-leak-in-hwsim_new.patch |
|
| 50 | 46 |
# Fix for CVE-2017-18241 |
| 51 | 47 |
Patch25: 0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch |
| 52 | 48 |
Patch26: Implement-the-f-xattrat-family-of-functions.patch |
| ... | ... |
@@ -151,7 +147,7 @@ This package contains the 'perf' performance analysis tools for Linux kernel. |
| 151 | 151 |
%patch8 -p1 |
| 152 | 152 |
%patch9 -p1 |
| 153 | 153 |
%patch10 -p1 |
| 154 |
- |
|
| 154 |
+%patch11 -p1 |
|
| 155 | 155 |
%patch12 -p1 |
| 156 | 156 |
%patch13 -p1 |
| 157 | 157 |
%patch14 -p1 |
| ... | ... |
@@ -161,10 +157,8 @@ This package contains the 'perf' performance analysis tools for Linux kernel. |
| 161 | 161 |
%patch18 -p1 |
| 162 | 162 |
%patch19 -p1 |
| 163 | 163 |
%patch20 -p1 |
| 164 |
-%patch21 -p1 |
|
| 165 | 164 |
%patch22 -p1 |
| 166 | 165 |
%patch23 -p1 |
| 167 |
-%patch24 -p1 |
|
| 168 | 166 |
%patch25 -p1 |
| 169 | 167 |
%patch26 -p1 |
| 170 | 168 |
|
| ... | ... |
@@ -338,6 +332,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
|
| 338 | 338 |
/usr/share/perf-core |
| 339 | 339 |
|
| 340 | 340 |
%changelog |
| 341 |
+* Wed Jun 13 2018 Alexey Makhalov <amakhalov@vmware.com> 4.4.137-1 |
|
| 342 |
+- Update to version 4.4.137. Fix panic in kprobe. |
|
| 341 | 343 |
* Mon May 21 2018 Bo Gan <ganb@vmware.com> 4.4.131-3 |
| 342 | 344 |
- Implement the f*xattrat family of syscalls (Previously linux-esx only) |
| 343 | 345 |
* Fri May 04 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.4.131-2 |