Browse code

kernels: Fix panic in kprobe

To make systemtap back to work.

Change-Id: I08a6b56d9c93c01a6671dc6de3a8161b8c764d12
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/5261
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Srivatsa S. Bhat <srivatsab@vmware.com>

Alexey Makhalov authored on 2018/06/14 04:46:08
Showing 9 changed files
... ...
@@ -1,14 +1,14 @@
1 1
 Summary:	Linux API header files
2 2
 Name:		linux-api-headers
3
-Version:	4.4.131
4
-Release:	2%{?dist}
3
+Version:	4.4.137
4
+Release:	1%{?dist}
5 5
 License:	GPLv2
6 6
 URL:		http://www.kernel.org/
7 7
 Group:		System Environment/Kernel
8 8
 Vendor:		VMware, Inc.
9 9
 Distribution: Photon
10 10
 Source0:    	http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
11
-%define sha1 linux=6811784d7abf4cd84f99c188c397b893deb35551
11
+%define sha1 linux=05b18bc780fb6f534dbf47825945b4e6eca15143
12 12
 BuildArch:	noarch
13 13
 # From SPECS/linux and used by linux-esx only
14 14
 # It provides f*xattrat syscalls
... ...
@@ -29,6 +29,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
29 29
 %defattr(-,root,root)
30 30
 %{_includedir}/*
31 31
 %changelog
32
+*   Wed Jun 13 2018 Alexey Makhalov <amakhalov@vmware.com> 4.4.137-1
33
+-   Update to version 4.4.137
32 34
 *   Mon May 21 2018 Bo Gan <ganb@vmware.com> 4.4.131-2
33 35
 -   Sync with syscall number change for f*xattrat syscalls family
34 36
 *   Fri May 04 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.4.131-1
35 37
deleted file mode 100644
... ...
@@ -1,38 +0,0 @@
1
-From 0ddcff49b672239dda94d70d0fcf50317a9f4b51 Mon Sep 17 00:00:00 2001
2
-From: "weiyongjun (A)" <weiyongjun1@huawei.com>
3
-Date: Thu, 18 Jan 2018 02:23:34 +0000
4
-Subject: [PATCH] mac80211_hwsim: fix possible memory leak in
5
- hwsim_new_radio_nl()
6
-
7
-'hwname' is malloced in hwsim_new_radio_nl() and should be freed
8
-before leaving from the error handling cases, otherwise it will cause
9
-memory leak.
10
-
11
-Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length")
12
-Signed-off-by: Wei Yongjun <weiyongjun1@huawei.com>
13
-Reviewed-by: Ben Hutchings <ben.hutchings@codethink.co.uk>
14
-Signed-off-by: Johannes Berg <johannes.berg@intel.com>
15
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
16
- drivers/net/wireless/mac80211_hwsim.c | 4 +++-
17
- 1 file changed, 3 insertions(+), 1 deletion(-)
18
-
19
-diff --git a/drivers/net/wireless/mac80211_hwsim.c b/drivers/net/wireless/mac80211_hwsim.c
20
-index 8a9164d..e8b770a 100644
21
-+++ b/drivers/net/wireless/mac80211_hwsim.c
22
-@@ -2925,8 +2925,10 @@ static int hwsim_new_radio_nl(struct sk_buff *msg, struct genl_info *info)
23
- 	if (info->attrs[HWSIM_ATTR_REG_CUSTOM_REG]) {
24
- 		u32 idx = nla_get_u32(info->attrs[HWSIM_ATTR_REG_CUSTOM_REG]);
25
- 
26
--		if (idx >= ARRAY_SIZE(hwsim_world_regdom_custom))
27
-+		if (idx >= ARRAY_SIZE(hwsim_world_regdom_custom)) {
28
-+			kfree(hwname);
29
- 			return -EINVAL;
30
-+		}
31
- 		param.regd = hwsim_world_regdom_custom[idx];
32
- 	}
33
- 
34
-2.7.4
35
-
... ...
@@ -105,7 +105,7 @@ index 7d344259..3c42478 100644
105 105
 +
106 106
  static struct sk_buff *skb_reorder_vlan_header(struct sk_buff *skb)
107 107
  {
108
- 	if (skb_cow(skb, skb_headroom(skb)) < 0) {
108
+ 	int mac_len;
109 109
 diff --git a/net/sched/sch_tbf.c b/net/sched/sch_tbf.c
110 110
 index c2fbde7..93d6a21 100644
111 111
 --- a/net/sched/sch_tbf.c
112 112
deleted file mode 100644
... ...
@@ -1,47 +0,0 @@
1
-From 1572e45a924f254d9570093abde46430c3172e3d Mon Sep 17 00:00:00 2001
2
-From: Tan Xiaojun <tanxiaojun@huawei.com>
3
-Date: Thu, 23 Feb 2017 14:04:39 +0800
4
-Subject: [PATCH] perf/core: Fix the perf_cpu_time_max_percent check
5
-
6
-Use "proc_dointvec_minmax" instead of "proc_dointvec" to check the input
7
-value from user-space.
8
-
9
-If not, we can set a big value and some vars will overflow like
10
-"sysctl_perf_event_sample_rate" which will cause a lot of unexpected
11
-problems.
12
-
13
-Signed-off-by: Tan Xiaojun <tanxiaojun@huawei.com>
14
-Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
15
-Cc: <acme@kernel.org>
16
-Cc: <alexander.shishkin@linux.intel.com>
17
-Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
18
-Cc: Arnaldo Carvalho de Melo <acme@redhat.com>
19
-Cc: Jiri Olsa <jolsa@redhat.com>
20
-Cc: Linus Torvalds <torvalds@linux-foundation.org>
21
-Cc: Peter Zijlstra <peterz@infradead.org>
22
-Cc: Stephane Eranian <eranian@google.com>
23
-Cc: Thomas Gleixner <tglx@linutronix.de>
24
-Cc: Vince Weaver <vincent.weaver@maine.edu>
25
-Link: http://lkml.kernel.org/r/1487829879-56237-1-git-send-email-tanxiaojun@huawei.com
26
-Signed-off-by: Ingo Molnar <mingo@kernel.org>
27
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
28
- kernel/events/core.c | 2 +-
29
- 1 file changed, 1 insertion(+), 1 deletion(-)
30
-
31
-diff --git a/kernel/events/core.c b/kernel/events/core.c
32
-index 6aeb0ef..92d1f12 100644
33
-+++ b/kernel/events/core.c
34
-@@ -229,7 +229,7 @@ int perf_cpu_time_max_percent_handler(struct ctl_table *table, int write,
35
- 				void __user *buffer, size_t *lenp,
36
- 				loff_t *ppos)
37
- {
38
--	int ret = proc_dointvec(table, write, buffer, lenp, ppos);
39
-+	int ret = proc_dointvec_minmax(table, write, buffer, lenp, ppos);
40
- 
41
- 	if (ret || !write)
42
- 		return ret;
43
-2.7.4
44
-
... ...
@@ -186,6 +186,7 @@ CONFIG_RD_LZMA=y
186 186
 CONFIG_RD_XZ=y
187 187
 CONFIG_RD_LZO=y
188 188
 CONFIG_RD_LZ4=y
189
+CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE=y
189 190
 # CONFIG_CC_OPTIMIZE_FOR_SIZE is not set
190 191
 CONFIG_SYSCTL=y
191 192
 CONFIG_ANON_INODES=y
... ...
@@ -1350,7 +1351,9 @@ CONFIG_CEPH_LIB=m
1350 1350
 # CONFIG_CEPH_LIB_USE_DNS_RESOLVER is not set
1351 1351
 # CONFIG_NFC is not set
1352 1352
 # CONFIG_LWTUNNEL is not set
1353
+CONFIG_DST_CACHE=y
1353 1354
 CONFIG_HAVE_BPF_JIT=y
1355
+CONFIG_HAVE_EBPF_JIT=y
1354 1356
 
1355 1357
 #
1356 1358
 # Device Drivers
... ...
@@ -180,6 +180,7 @@ CONFIG_RD_LZMA=y
180 180
 CONFIG_RD_XZ=y
181 181
 CONFIG_RD_LZO=y
182 182
 CONFIG_RD_LZ4=y
183
+CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE=y
183 184
 # CONFIG_CC_OPTIMIZE_FOR_SIZE is not set
184 185
 CONFIG_SYSCTL=y
185 186
 CONFIG_ANON_INODES=y
... ...
@@ -1154,7 +1155,9 @@ CONFIG_NET_9P=m
1154 1154
 # CONFIG_CEPH_LIB is not set
1155 1155
 # CONFIG_NFC is not set
1156 1156
 # CONFIG_LWTUNNEL is not set
1157
+CONFIG_DST_CACHE=y
1157 1158
 CONFIG_HAVE_BPF_JIT=y
1159
+CONFIG_HAVE_EBPF_JIT=y
1158 1160
 
1159 1161
 #
1160 1162
 # Device Drivers
1161 1163
new file mode 100644
... ...
@@ -0,0 +1,150 @@
0
+From 00f30dfb8966dc12d852807c1c691c28a33c966c Mon Sep 17 00:00:00 2001
1
+From: Masami Hiramatsu <mhiramat@kernel.org>
2
+Date: Tue, 12 Jun 2018 23:10:56 +0000
3
+Subject: [PATCH] kprobes/x86: Do not modify singlestep buffer while resuming
4
+
5
+commit 804dec5bda9b4fcdab5f67fe61db4a0498af5221 upstream.
6
+
7
+Do not modify singlestep execution buffer (kprobe.ainsn.insn)
8
+while resuming from single-stepping, instead, modifies
9
+the buffer to add a jump back instruction at preparing
10
+buffer.
11
+
12
+Commit 176bee4cfcec ("kprobes/x86: Set kprobes pages read-only")
13
+introduced a bug in stable 4.4.y by making singlestep buffer page
14
+read-only. Attempts to modify singlestep buffer, to insert a jump
15
+instruction, at resume_execution() lead to kernel panic.
16
+
17
+  BUG: unable to handle kernel paging request at ffffffffa0011001
18
+  IP: [<ffffffff8105711c>] resume_execution+0x14c/0x1a0
19
+  PGD 1c0f067 PUD 1c10063 PMD 42ac74067 PTE 41cc35061
20
+  Oops: 0003 [#1] SMP
21
+  Modules linked in: stap_6eaf26e7bd7018624e4c19b7486f4bb8_1857(OE) ipt_MASQUERADE(E) nf_nat_masquerade_ipv4(E) <...>
22
+  CPU: 5 PID: 1857 Comm: stapio Tainted: G           OE   4.4.136+ #1
23
+  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 01/24/2017
24
+  task: ffff880425044940 ti: ffff88042d160000 task.ti: ffff88042d160000
25
+  RIP: 0010:[<ffffffff8105711c>]  [<ffffffff8105711c>] resume_execution+0x14c/0x1a0
26
+  RSP: 0018:ffff88043fd4aeb0  EFLAGS: 00010086
27
+  RAX: ffffffffa0011001 RBX: ffff88043fd4af58 RCX: 0000000000000006
28
+  RDX: ffffffff811b9f71 RSI: ffff88043fd4af58 RDI: 0000000000000055
29
+  RBP: ffff88043fd4aee8 R08: 0000000000000001 R09: ffff88041cce8100
30
+  R10: 0000000000000004 R11: ffff8804252d9238 R12: ffff88042c6051c0
31
+  R13: ffffffff811b9f70 R14: ffff88042d163f08 R15: ffffffffa0011000
32
+  FS:  00007f05f6439740(0000) GS:ffff88043fd40000(0000) knlGS:0000000000000000
33
+  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
34
+  CR2: ffffffffa0011001 CR3: 000000042944a000 CR4: 0000000000160670
35
+  Stack:
36
+   ffff88043fd4fee0 0000000000000000 ffff88043fd4fee0 ffff88043fd4af58
37
+   ffff88042c6051c0 0000000000000000 00007ffd23764640 ffff88043fd4af10
38
+   ffffffff810571a8 ffff88043fd4af58 ffff880425044940 0000000000000000
39
+  Call Trace:
40
+   <#DB>
41
+   [<ffffffff810571a8>] kprobe_debug_handler+0x38/0xd0
42
+   [<ffffffff81016de2>] do_debug+0x82/0x1b0
43
+   [<ffffffff817e6aa5>] debug+0x35/0x70
44
+   <<EOE>>
45
+   [<ffffffff811bac51>] ? SyS_read+0x41/0xa0
46
+   [<ffffffff817e48a1>] entry_SYSCALL_64_fastpath+0x1e/0x95
47
+
48
+Issue was found and fix was verified by running systemtap:
49
+  stap -v -e 'probe vfs.read {printf("read performed\n"); exit()}'
50
+
51
+Fixes: 176bee4cfcec ("kprobes/x86: Set kprobes pages read-only")
52
+Cc: stable@vger.kernel.org # v4.4
53
+Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
54
+Cc: Ananth N Mavinakayanahalli <ananth@linux.vnet.ibm.com>
55
+Cc: Andrey Ryabinin <aryabinin@virtuozzo.com>
56
+Cc: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
57
+Cc: Borislav Petkov <bp@alien8.de>
58
+Cc: Brian Gerst <brgerst@gmail.com>
59
+Cc: David S . Miller <davem@davemloft.net>
60
+Cc: Denys Vlasenko <dvlasenk@redhat.com>
61
+Cc: H. Peter Anvin <hpa@zytor.com>
62
+Cc: Josh Poimboeuf <jpoimboe@redhat.com>
63
+Cc: Linus Torvalds <torvalds@linux-foundation.org>
64
+Cc: Peter Zijlstra <peterz@infradead.org>
65
+Cc: Thomas Gleixner <tglx@linutronix.de>
66
+Cc: Ye Xiaolong <xiaolong.ye@intel.com>
67
+Link: http://lkml.kernel.org/r/149076361560.22469.1610155860343077495.stgit@devbox
68
+Signed-off-by: Ingo Molnar <mingo@kernel.org>
69
+Reviewed-by/Acked-by: "Steven Rostedt (VMware)" <rostedt@goodmis.org>
70
+Signed-off-by: Alexey Makhalov <amakhalov@vmware.com>
71
+---
72
+ arch/x86/kernel/kprobes/core.c | 42 ++++++++++++++++++++----------------------
73
+ 1 file changed, 20 insertions(+), 22 deletions(-)
74
+
75
+diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c
76
+index df9be5b91270..1f5c47a49e35 100644
77
+--- a/arch/x86/kernel/kprobes/core.c
78
+@@ -411,25 +411,38 @@ void free_insn_page(void *page)
79
+ 	module_memfree(page);
80
+ }
81
+ 
82
++/* Prepare reljump right after instruction to boost */
83
++static void prepare_boost(struct kprobe *p, int length)
84
++{
85
++	if (can_boost(p->ainsn.insn, p->addr) &&
86
++	    MAX_INSN_SIZE - length >= RELATIVEJUMP_SIZE) {
87
++		/*
88
++		 * These instructions can be executed directly if it
89
++		 * jumps back to correct address.
90
++		 */
91
++		synthesize_reljump(p->ainsn.insn + length, p->addr + length);
92
++		p->ainsn.boostable = 1;
93
++	} else {
94
++		p->ainsn.boostable = -1;
95
++	}
96
++}
97
++
98
+ static int arch_copy_kprobe(struct kprobe *p)
99
+ {
100
+-	int ret;
101
++	int len;
102
+ 
103
+ 	set_memory_rw((unsigned long)p->ainsn.insn & PAGE_MASK, 1);
104
+ 
105
+ 	/* Copy an instruction with recovering if other optprobe modifies it.*/
106
+-	ret = __copy_instruction(p->ainsn.insn, p->addr);
107
+-	if (!ret)
108
++	len = __copy_instruction(p->ainsn.insn, p->addr);
109
++	if (!len)
110
+ 		return -EINVAL;
111
+ 
112
+ 	/*
113
+ 	 * __copy_instruction can modify the displacement of the instruction,
114
+ 	 * but it doesn't affect boostable check.
115
+ 	 */
116
+-	if (can_boost(p->ainsn.insn, p->addr))
117
+-		p->ainsn.boostable = 0;
118
+-	else
119
+-		p->ainsn.boostable = -1;
120
++	prepare_boost(p, len);
121
+ 
122
+ 	set_memory_ro((unsigned long)p->ainsn.insn & PAGE_MASK, 1);
123
+ 
124
+@@ -894,21 +907,6 @@ static void resume_execution(struct kprobe *p, struct pt_regs *regs,
125
+ 		break;
126
+ 	}
127
+ 
128
+-	if (p->ainsn.boostable == 0) {
129
+-		if ((regs->ip > copy_ip) &&
130
+-		    (regs->ip - copy_ip) + 5 < MAX_INSN_SIZE) {
131
+-			/*
132
+-			 * These instructions can be executed directly if it
133
+-			 * jumps back to correct address.
134
+-			 */
135
+-			synthesize_reljump((void *)regs->ip,
136
+-				(void *)orig_ip + (regs->ip - copy_ip));
137
+-			p->ainsn.boostable = 1;
138
+-		} else {
139
+-			p->ainsn.boostable = -1;
140
+-		}
141
+-	}
142
+-
143
+ 	regs->ip += orig_ip - copy_ip;
144
+ 
145
+ no_change:
146
+-- 
147
+2.14.2
148
+
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:       Kernel
3 3
 Name:          linux-esx
4
-Version:       4.4.131
5
-Release:       3%{?dist}
4
+Version:       4.4.137
5
+Release:       1%{?dist}
6 6
 License:       GPLv2
7 7
 URL:           http://www.kernel.org/
8 8
 Group:         System Environment/Kernel
9 9
 Vendor:        VMware, Inc.
10 10
 Distribution:  Photon
11 11
 Source0:       http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=6811784d7abf4cd84f99c188c397b893deb35551
12
+%define sha1 linux=05b18bc780fb6f534dbf47825945b4e6eca15143
13 13
 Source1:       config-esx
14 14
 Patch0:        double-tcp_mem-limits.patch
15 15
 Patch1:        linux-4.4-sysctl-sched_weighted_cpuload_uses_rla.patch
... ...
@@ -23,7 +23,7 @@ Patch8:        04-quiet-boot.patch
23 23
 Patch9:        05-pv-ops.patch
24 24
 Patch10:       06-sunrpc.patch
25 25
 Patch11:       vmxnet3-1.4.6.0-avoid-calling-pskb_may_pull-with-interrupts-disabled.patch
26
-
26
+Patch12:       kprobes-x86-Do-not-modify-singlestep-buffer-while-re.patch
27 27
 Patch13:       REVERT-sched-fair-Beef-up-wake_wide.patch
28 28
 Patch14:       e1000e-prevent-div-by-zero-if-TIMINCA-is-zero.patch
29 29
 
... ...
@@ -40,14 +40,10 @@ Patch26:       init-do_mounts-recreate-dev-root.patch
40 40
 # Fixes for CVE-2018-1000026
41 41
 Patch27:       0001-net-create-skb_gso_validate_mac_len.patch
42 42
 Patch28:       0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
43
-# Fix for CVE-2017-18255
44
-Patch29:       0001-perf-core-Fix-the-perf_cpu_time_max_percent-check.patch
45 43
 # Fix for CVE-2018-8043
46 44
 Patch30:       0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
47 45
 # Fix for CVE-2017-18216
48 46
 Patch31:       0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch
49
-# Fix for CVE-2018-8087
50
-Patch32:       0001-mac80211_hwsim-fix-possible-memory-leak-in-hwsim_new.patch
51 47
 # Fix for CVE-2017-18241
52 48
 Patch33:       0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
53 49
 
... ...
@@ -114,7 +110,7 @@ The Linux package contains the Linux kernel doc files
114 114
 %patch9 -p1
115 115
 %patch10 -p1
116 116
 %patch11 -p1
117
-
117
+%patch12 -p1
118 118
 %patch13 -p1
119 119
 %patch14 -p1
120 120
 
... ...
@@ -130,10 +126,8 @@ The Linux package contains the Linux kernel doc files
130 130
 %patch26 -p1
131 131
 %patch27 -p1
132 132
 %patch28 -p1
133
-%patch29 -p1
134 133
 %patch30 -p1
135 134
 %patch31 -p1
136
-%patch32 -p1
137 135
 %patch33 -p1
138 136
 
139 137
 %patch52 -p1
... ...
@@ -238,6 +232,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
238 238
 /usr/src/linux-headers-%{uname_r}
239 239
 
240 240
 %changelog
241
+*   Wed Jun 13 2018 Alexey Makhalov <amakhalov@vmware.com> 4.4.137-1
242
+-   Update to version 4.4.137. Fix panic in kprobe.
241 243
 *   Fri May 18 2018 Bo Gan <ganb@vmware.com> 4.4.131-3
242 244
 -   rebase fXxattrat syscall number to avoid conflict with new syscalls
243 245
 *   Fri May 04 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.4.131-2
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux
4
-Version:    	4.4.131
5
-Release:        3%{?kat_build:.%kat_build}%{?dist}
4
+Version:    	4.4.137
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution: 	Photon
11 11
 Source0:    	http://www.kernel.org/pub/linux/kernel/v4.x/%{name}-%{version}.tar.xz
12
-%define sha1 linux=6811784d7abf4cd84f99c188c397b893deb35551
12
+%define sha1 linux=05b18bc780fb6f534dbf47825945b4e6eca15143
13 13
 Source1:	config
14 14
 %define ena_version 1.1.3
15 15
 Source2:    	https://github.com/amzn/amzn-drivers/archive/ena_linux_1.1.3.tar.gz
... ...
@@ -26,7 +26,7 @@ Patch7:	        vmxnet3-1.4.6.0-avoid-calling-pskb_may_pull-with-interrupts-disa
26 26
 Patch8:		perf-top-sigsegv-fix.patch
27 27
 Patch9:         REVERT-sched-fair-Beef-up-wake_wide.patch
28 28
 Patch10:        e1000e-prevent-div-by-zero-if-TIMINCA-is-zero.patch
29
-
29
+Patch11:        kprobes-x86-Do-not-modify-singlestep-buffer-while-re.patch
30 30
 Patch12:        vmxnet3-1.4.6.0-fix-lock-imbalance-in-vmxnet3_tq_xmit.patch
31 31
 Patch13:        vmxnet3-1.4.7.0-set-CHECKSUM_UNNECESSARY-for-IPv6-packets.patch
32 32
 Patch14:        vmxnet3-1.4.8.0-segCnt-can-be-1-for-LRO-packets.patch
... ...
@@ -39,14 +39,10 @@ Patch18:        0002-allow-also-ecb-cipher_null.patch
39 39
 # Fixes for CVE-2018-1000026
40 40
 Patch19:        0001-net-create-skb_gso_validate_mac_len.patch
41 41
 Patch20:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
42
-# Fix for CVE-2017-18255
43
-Patch21:        0001-perf-core-Fix-the-perf_cpu_time_max_percent-check.patch
44 42
 # Fix for CVE-2018-8043
45 43
 Patch22:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
46 44
 # Fix for CVE-2017-18216
47 45
 Patch23:        0001-ocfs2-subsystem.su_mutex-is-required-while-accessing.patch
48
-# Fix for CVE-2018-8087
49
-Patch24:        0001-mac80211_hwsim-fix-possible-memory-leak-in-hwsim_new.patch
50 46
 # Fix for CVE-2017-18241
51 47
 Patch25:        0001-f2fs-fix-a-panic-caused-by-NULL-flush_cmd_control.patch
52 48
 Patch26:        Implement-the-f-xattrat-family-of-functions.patch
... ...
@@ -151,7 +147,7 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
151 151
 %patch8 -p1
152 152
 %patch9 -p1
153 153
 %patch10 -p1
154
-
154
+%patch11 -p1
155 155
 %patch12 -p1
156 156
 %patch13 -p1
157 157
 %patch14 -p1
... ...
@@ -161,10 +157,8 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
161 161
 %patch18 -p1
162 162
 %patch19 -p1
163 163
 %patch20 -p1
164
-%patch21 -p1
165 164
 %patch22 -p1
166 165
 %patch23 -p1
167
-%patch24 -p1
168 166
 %patch25 -p1
169 167
 %patch26 -p1
170 168
 
... ...
@@ -338,6 +332,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
338 338
 /usr/share/perf-core
339 339
 
340 340
 %changelog
341
+*   Wed Jun 13 2018 Alexey Makhalov <amakhalov@vmware.com> 4.4.137-1
342
+-   Update to version 4.4.137. Fix panic in kprobe.
341 343
 *   Mon May 21 2018 Bo Gan <ganb@vmware.com> 4.4.131-3
342 344
 -   Implement the f*xattrat family of syscalls (Previously linux-esx only)
343 345
 *   Fri May 04 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.4.131-2