4d0d54
import kernel-rt-4.18.0-193.14.3.rt13.67.el8_2
@@ -1 +1 @@
|
|
1
|
-
SOURCES/linux-4.18.0-193.
|
1
|
+
SOURCES/linux-4.18.0-193.14.3.rt13.67.el8_2.tar.xz
|
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
7d175a53e97e1a2449eec92560e29eeeca45489a SOURCES/linux-4.18.0-193.14.3.rt13.67.el8_2.tar.xz
|
@@ -42,10 +42,10 @@
|
|
42
42
|
# define buildid .local
|
43
43
|
|
44
44
|
%define rpmversion 4.18.0
|
45
|
-
%define pkgrelease 193.
|
45
|
+
%define pkgrelease 193.14.3.rt13.67.el8_2
|
46
46
|
|
47
47
|
# allow pkg_release to have configurable %%{?dist} tag
|
48
|
-
%define specrelease 193.
|
48
|
+
%define specrelease 193.14.3.rt13.67%{?dist}
|
49
49
|
|
50
50
|
%define pkg_release %{specrelease}%{?buildid}
|
51
51
|
|
@@ -149,7 +149,7 @@
|
|
149
149
|
# The preempt RT patch level
|
150
150
|
%global rttag .rt13
|
151
151
|
# realtimeN
|
152
|
-
%global rtbuild .
|
152
|
+
%global rtbuild .67
|
153
153
|
%define with_doc 0
|
154
154
|
%define with_headers 0
|
155
155
|
%define with_cross_headers 0
|
@@ -409,7 +409,7 @@ BuildRequires: asciidoc
|
|
409
409
|
|
410
410
|
Source0: linux-%{rpmversion}-%{pkgrelease}.tar.xz
|
411
411
|
|
412
|
-
|
412
|
+
Source9: x509.genkey
|
413
413
|
|
414
414
|
# Name of the packaged file containing signing key
|
415
415
|
%ifarch ppc64le
|
@@ -421,34 +421,44 @@ Source11: x509.genkey
|
|
421
421
|
|
422
422
|
%if %{?released_kernel}
|
423
423
|
|
424
|
-
|
425
|
-
|
424
|
+
Source10: redhatsecurebootca5.cer
|
425
|
+
Source11: redhatsecurebootca3.cer
|
426
|
+
Source12: redhatsecureboot501.cer
|
427
|
+
Source13: redhatsecureboot301.cer
|
426
428
|
Source14: secureboot_s390.cer
|
427
429
|
Source15: secureboot_ppc.cer
|
428
430
|
|
429
|
-
%define
|
431
|
+
%define secureboot_ca_0 %{SOURCE11}
|
432
|
+
%define secureboot_ca_1 %{SOURCE10}
|
430
433
|
%ifarch x86_64 aarch64
|
431
|
-
%define
|
432
|
-
%define
|
434
|
+
%define secureboot_key_0 %{SOURCE13}
|
435
|
+
%define pesign_name_0 redhatsecureboot301
|
436
|
+
%define secureboot_key_1 %{SOURCE12}
|
437
|
+
%define pesign_name_1 redhatsecureboot501
|
433
438
|
%endif
|
434
439
|
%ifarch s390x
|
435
|
-
%define
|
436
|
-
%define
|
440
|
+
%define secureboot_key_0 %{SOURCE14}
|
441
|
+
%define pesign_name_0 redhatsecureboot302
|
437
442
|
%endif
|
438
443
|
%ifarch ppc64le
|
439
|
-
%define
|
440
|
-
%define
|
444
|
+
%define secureboot_key_0 %{SOURCE15}
|
445
|
+
%define pesign_name_0 redhatsecureboot303
|
441
446
|
%endif
|
442
447
|
|
443
448
|
# released_kernel
|
444
449
|
%else
|
445
450
|
|
451
|
+
Source11: redhatsecurebootca4.cer
|
446
452
|
Source12: redhatsecurebootca2.cer
|
447
|
-
Source13:
|
453
|
+
Source13: redhatsecureboot401.cer
|
454
|
+
Source14: redhatsecureboot003.cer
|
448
455
|
|
449
|
-
%define
|
450
|
-
%define
|
451
|
-
%define
|
456
|
+
%define secureboot_ca_0 %{SOURCE11}
|
457
|
+
%define secureboot_ca_1 %{SOURCE12}
|
458
|
+
%define secureboot_key_0 %{SOURCE13}
|
459
|
+
%define pesign_name_0 redhatsecureboot401
|
460
|
+
%define secureboot_key_1 %{SOURCE14}
|
461
|
+
%define pesign_name_1 redhatsecureboot003
|
452
462
|
|
453
463
|
# released_kernel
|
454
464
|
%endif
|
@@ -1179,7 +1189,7 @@ BuildKernel() {
|
|
1179
1189
|
cp configs/$Config .config
|
1180
1190
|
|
1181
1191
|
%if %{signkernel}%{signmodules}
|
1182
|
-
cp %{
|
1192
|
+
cp %{SOURCE9} certs/.
|
1183
1193
|
%endif
|
1184
1194
|
|
1185
1195
|
Arch=`head -1 .config | cut -b 3-`
|
@@ -1245,11 +1255,13 @@ BuildKernel() {
|
|
1245
1255
|
fi
|
1246
1256
|
|
1247
1257
|
%ifarch x86_64 aarch64
|
1248
|
-
%pesign -s -i $SignImage -o vmlinuz.
|
1258
|
+
%pesign -s -i $SignImage -o vmlinuz.tmp -a %{secureboot_ca_0} -c %{secureboot_key_0} -n %{pesign_name_0}
|
1259
|
+
%pesign -s -i vmlinuz.tmp -o vmlinuz.signed -a %{secureboot_ca_1} -c %{secureboot_key_1} -n %{pesign_name_1}
|
1260
|
+
rm vmlinuz.tmp
|
1249
1261
|
%endif
|
1250
1262
|
%ifarch s390x ppc64le
|
1251
1263
|
if [ -x /usr/bin/rpm-sign ]; then
|
1252
|
-
rpm-sign --key "%{
|
1264
|
+
rpm-sign --key "%{pesign_name_0}" --lkmsign $SignImage --output vmlinuz.signed
|
1253
1265
|
elif [ $DoModules -eq 1 ]; then
|
1254
1266
|
chmod +x scripts/sign-file
|
1255
1267
|
./scripts/sign-file -p sha256 certs/signing_key.pem certs/signing_key.x509 $SignImage vmlinuz.signed
|
@@ -1645,11 +1657,17 @@ BuildKernel() {
|
|
1645
1657
|
|
1646
1658
|
# Red Hat UEFI Secure Boot CA cert, which can be used to authenticate the kernel
|
1647
1659
|
mkdir -p $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer
|
1648
|
-
|
1660
|
+
%ifarch x86_64 aarch64
|
1661
|
+
install -m 0644 %{secureboot_ca_0} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca-20200609.cer
|
1662
|
+
install -m 0644 %{secureboot_ca_1} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca-20140212.cer
|
1663
|
+
ln -s kernel-signing-ca-20200609.cer $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca.cer
|
1664
|
+
%else
|
1665
|
+
install -m 0644 %{secureboot_ca_0} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca.cer
|
1666
|
+
%endif
|
1649
1667
|
%ifarch s390x ppc64le
|
1650
1668
|
if [ $DoModules -eq 1 ]; then
|
1651
1669
|
if [ -x /usr/bin/rpm-sign ]; then
|
1652
|
-
install -m 0644 %{
|
1670
|
+
install -m 0644 %{secureboot_key_0} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/%{signing_key_filename}
|
1653
1671
|
else
|
1654
1672
|
install -m 0644 certs/signing_key.x509.sign${Flav} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca.cer
|
1655
1673
|
openssl x509 -in certs/signing_key.pem.sign${Flav} -outform der -out $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/%{signing_key_filename}
|
@@ -2404,12 +2422,7 @@ fi
|
|
2404
2422
|
/lib/modules/%{KVERREL}%{?3:+%{3}}/updates\
|
2405
2423
|
/lib/modules/%{KVERREL}%{?3:+%{3}}/weak-updates\
|
2406
2424
|
/lib/modules/%{KVERREL}%{?3:+%{3}}/bls.conf\
|
2407
|
-
%{_datadir}/doc/kernel-keys/%{KVERREL}%{?3:+%{3
|
2425
|
+
%{_datadir}/doc/kernel-keys/%{KVERREL}%{?3:+%{3}}\
|
2408
|
-
%ifarch s390x ppc64le\
|
2409
|
-
%if 0%{!?4:1}\
|
2410
|
-
%{_datadir}/doc/kernel-keys/%{KVERREL}%{?3:+%{3}}/%{signing_key_filename} \
|
2411
|
-
%endif\
|
2412
|
-
%endif\
|
2413
2426
|
%if %{1}\
|
2414
2427
|
/lib/modules/%{KVERREL}%{?3:+%{3}}/vdso\
|
2415
2428
|
/etc/ld.so.conf.d/%{name}-%{KVERREL}%{?3:+%{3}}.conf\
|
@@ -2465,6 +2478,31 @@ fi
|
|
2465
2478
|
#
|
2466
2479
|
#
|
2467
2480
|
%changelog
|
2481
|
+
* Sun Jul 19 2020 Luis Claudio R. Goncalves <lgoncalv@redhat.com> [4.18.0-193.14.3.rt13.67.el8_2]
|
2482
|
+
- Reverse keys order for dual-signing (Frantisek Hrbata) [1837433 1837434] {CVE-2020-10713}
|
2483
|
+
|
2484
|
+
* Sun Jul 19 2020 Luis Claudio R. Goncalves <lgoncalv@redhat.com> [4.18.0-193.14.2.rt13.66.el8_2]
|
2485
|
+
- [kernel] Move to dual-signing to split signing keys up better (pjones) [1837433 1837434] {CVE-2020-10713}
|
2486
|
+
- [crypto] pefile: Tolerate other pefile signatures after first (Lenny Szubowicz) [1837433 1837434] {CVE-2020-10713}
|
2487
|
+
- [acpi] ACPI: configfs: Disallow loading ACPI tables when locked down (Lenny Szubowicz) [1852968 1852969] {CVE-2020-15780}
|
2488
|
+
- [firmware] efi: Restrict efivar_ssdt_load when the kernel is locked down (Lenny Szubowicz) [1852948 1852949] {CVE-2019-20908}
|
2489
|
+
|
2490
|
+
* Mon Jul 13 2020 Luis Claudio R. Goncalves <lgoncalv@redhat.com> [4.18.0-193.14.1.rt13.65.el8_2]
|
2491
|
+
- [md] dm mpath: add DM device name to Failing/Reinstating path log messages (Mike Snitzer) [1852050 1822975]
|
2492
|
+
- [md] dm mpath: enhance queue_if_no_path debugging (Mike Snitzer) [1852050 1822975]
|
2493
|
+
- [md] dm mpath: restrict queue_if_no_path state machine (Mike Snitzer) [1852050 1822975]
|
2494
|
+
- [md] dm mpath: simplify __must_push_back (Mike Snitzer) [1852050 1822975]
|
2495
|
+
- [md] dm: use DMDEBUG macros now that they use pr_debug variants (Mike Snitzer) [1852050 1822975]
|
2496
|
+
- [include] dm: use dynamic debug instead of compile-time config option (Mike Snitzer) [1852050 1822975]
|
2497
|
+
- [md] dm mpath: switch paths in dm_blk_ioctl() code path (Mike Snitzer) [1852050 1822975]
|
2498
|
+
- [md] dm multipath: use updated MPATHF_QUEUE_IO on mapping for bio-based mpath (Mike Snitzer) [1852050 1822975]
|
2499
|
+
- [md] dm: bump version of core and various targets (Mike Snitzer) [1852050 1822975]
|
2500
|
+
- [md] dm mpath: Add timeout mechanism for queue_if_no_path (Mike Snitzer) [1852050 1822975]
|
2501
|
+
- [md] dm mpath: use true_false for bool variable (Mike Snitzer) [1852050 1822975]
|
2502
|
+
- [md] dm mpath: remove harmful bio-based optimization (Mike Snitzer) [1852050 1822975]
|
2503
|
+
- [scsi] scsi: libiscsi: fall back to sendmsg for slab pages (Maurizio Lombardi) [1852048 1825775]
|
2504
|
+
- [s390] s390/mm: fix panic in gup_fast on large pud (Philipp Rudo) [1853336 1816980]
|
2505
|
+
|
2468
2506
|
* Tue Jul 07 2020 Luis Claudio R. Goncalves <lgoncalv@redhat.com> [4.18.0-193.13.1.rt13.64.el8_2]
|
2469
2507
|
- [x86] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (Lenny Szubowicz) [1846180 1824005]
|
2470
2508
|
|