From 467cedff05f5021e11fbff9845b82090b55d82ae Mon Sep 17 00:00:00 2001 From: Jenkins OS Date: Mon, 17 Jul 2017 20:23:39 +0000 Subject: [PATCH] sys-kernel/coreos-sources: bump to 4.12.2 --- ...2.0.ebuild => coreos-kernel-4.12.2.ebuild} | 0 ....0.ebuild => coreos-modules-4.12.2.ebuild} | 0 .../sys-kernel/coreos-sources/Manifest | 1 + ....0.ebuild => coreos-sources-4.12.2.ebuild} | 1 + .../z0001-efi-Add-EFI_SECURE_BOOT-bit.patch | 12 +++--- ...to-lock-down-access-to-the-running-k.patch | 16 ++++---- ...e-kernel-if-booted-in-secure-boot-mo.patch | 12 +++--- ...ignatures-if-the-kernel-is-locked-do.patch | 8 ++-- ...-and-dev-kmem-when-the-kernel-is-loc.patch | 8 ++-- ...-runtime-if-the-kernel-is-locked-dow.patch | 8 ++-- ...-flag-in-boot-params-across-kexec-re.patch | 8 ++-- ...le-at-runtime-if-securelevel-has-bee.patch | 8 ++-- ...sable-when-the-kernel-is-locked-down.patch | 8 ++-- ...sable-when-the-kernel-is-locked-down.patch | 8 ++-- ...R-access-when-the-kernel-is-locked-d.patch | 12 +++--- ...-port-access-when-the-kernel-is-lock.patch | 10 ++--- ...-access-when-the-kernel-is-locked-do.patch | 8 ++-- ...t-debugfs-interface-when-the-kernel-.patch | 8 ++-- ...s-to-custom_method-when-the-kernel-i.patch | 8 ++-- ..._rsdp-kernel-param-when-the-kernel-h.patch | 8 ++-- ...I-table-override-if-the-kernel-is-lo.patch | 8 ++-- ...I-error-injection-if-the-kernel-is-l.patch | 8 ++-- ...nel-image-access-functions-when-the-.patch | 8 ++-- ...z0020-scsi-Lock-down-the-eata-driver.patch | 8 ++-- ...CIS-storage-when-the-kernel-is-locke.patch | 8 ++-- .../4.12/z0022-Lock-down-TIOCSSERIAL.patch | 8 ++-- ...lative-path-for-KBUILD_SRC-from-CURD.patch | 8 ++-- .../z0024-Add-arm64-coreos-verity-hash.patch | 8 ++-- ...0025-vmbus-re-enable-channel-tasklet.patch | 40 +++++++++++++++++++ 29 files changed, 149 insertions(+), 107 deletions(-) rename sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/{coreos-kernel-4.12.0.ebuild => coreos-kernel-4.12.2.ebuild} (100%) rename sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/{coreos-modules-4.12.0.ebuild => coreos-modules-4.12.2.ebuild} (100%) rename sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/{coreos-sources-4.12.0.ebuild => coreos-sources-4.12.2.ebuild} (97%) create mode 100644 sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0025-vmbus-re-enable-channel-tasklet.patch diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-4.12.0.ebuild b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-4.12.2.ebuild similarity index 100% rename from sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-4.12.0.ebuild rename to sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-4.12.2.ebuild diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-4.12.0.ebuild b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-4.12.2.ebuild similarity index 100% rename from sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-4.12.0.ebuild rename to sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-4.12.2.ebuild diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest index 0f29bd0b5a..9b6d25dd95 100644 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest +++ b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest @@ -1 +1,2 @@ DIST linux-4.12.tar.xz 99186576 SHA256 a45c3becd4d08ce411c14628a949d08e2433d8cdeca92036c7013980e93858ab SHA512 8e81b41b253e63233e92948941f44c6482acb52aa3a3fd172f03a38a86f2c35b2ad4fd407acd1bc3964673eba344fe104d3a03e3ff4bf9cd1f22bd44263bd728 WHIRLPOOL 3b97da251c2ba4ace4a27b708f2b1dcf94cb1b59aaeded6acb74bd98f0d3e33f1df83670665e4186d99a55daa84c88d539d93e20f0ff18a6d46ef326c48dd375 +DIST patch-4.12.2.xz 14660 SHA256 8447d28c88834bac75653a0370a6f30615688db4756b953720e9b024537e34ac SHA512 3d3e7cea82b20ba841d74f6f63e635143a52ee1428017792aa210ee591fcccf7ee1475c1576257722f0f5891547b69a192d48723ab6f4c189841e17ed8013300 WHIRLPOOL aa231e904ac23186cc1fcf380cbef9ee5d1e877af7a79003ad14fbb409ff2c3aa8a4613b7f9d87ae958283d3ed4009983e6cfca71177787fce24c39c80332508 diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-4.12.0.ebuild b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-4.12.2.ebuild similarity index 97% rename from sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-4.12.0.ebuild rename to sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-4.12.2.ebuild index 8e306611f2..8d1c06c3c6 100644 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-4.12.0.ebuild +++ b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-4.12.2.ebuild @@ -44,4 +44,5 @@ UNIPATCH_LIST=" ${PATCH_DIR}/z0022-Lock-down-TIOCSSERIAL.patch \ ${PATCH_DIR}/z0023-kbuild-derive-relative-path-for-KBUILD_SRC-from-CURD.patch \ ${PATCH_DIR}/z0024-Add-arm64-coreos-verity-hash.patch \ + ${PATCH_DIR}/z0025-vmbus-re-enable-channel-tasklet.patch \ " diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0001-efi-Add-EFI_SECURE_BOOT-bit.patch b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0001-efi-Add-EFI_SECURE_BOOT-bit.patch index 5ae27cd028..4caa8afe1d 100644 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0001-efi-Add-EFI_SECURE_BOOT-bit.patch +++ b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0001-efi-Add-EFI_SECURE_BOOT-bit.patch @@ -1,7 +1,7 @@ -From 3f3cb677d70e6b5c77420792b9dc3c7183313b22 Mon Sep 17 00:00:00 2001 +From cfa603453e1ce4a90b4181a770fc17967e93d092 Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Mon, 21 Nov 2016 23:55:55 +0000 -Subject: [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit +Subject: [PATCH 01/25] efi: Add EFI_SECURE_BOOT bit UEFI machines can be booted in Secure Boot mode. Add a EFI_SECURE_BOOT bit that can be passed to efi_enabled() to find out whether secure boot is @@ -18,10 +18,10 @@ Signed-off-by: David Howells 2 files changed, 2 insertions(+) diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c -index f818236..3a3ef6e 100644 +index 36646f19d40b..87ef54e64842 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c -@@ -1183,6 +1183,7 @@ void __init setup_arch(char **cmdline_p) +@@ -1190,6 +1190,7 @@ void __init setup_arch(char **cmdline_p) pr_info("Secure boot disabled\n"); break; case efi_secureboot_mode_enabled: @@ -30,7 +30,7 @@ index f818236..3a3ef6e 100644 break; default: diff --git a/include/linux/efi.h b/include/linux/efi.h -index ec36f42..381b3f6 100644 +index ec36f42a2add..381b3f6670d3 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h @@ -1069,6 +1069,7 @@ extern int __init efi_setup_pcdp_console(char *); @@ -42,5 +42,5 @@ index ec36f42..381b3f6 100644 #ifdef CONFIG_EFI /* -- -2.9.4 +2.13.0 diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0002-Add-the-ability-to-lock-down-access-to-the-running-k.patch b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0002-Add-the-ability-to-lock-down-access-to-the-running-k.patch index 83ba3730d6..0bfcb35f5b 100644 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0002-Add-the-ability-to-lock-down-access-to-the-running-k.patch +++ b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0002-Add-the-ability-to-lock-down-access-to-the-running-k.patch @@ -1,7 +1,7 @@ -From 5d520de1931337577f000d9d082fea40e388e546 Mon Sep 17 00:00:00 2001 +From 835ca0ffa0228cacbec3e2d17864053302bb0479 Mon Sep 17 00:00:00 2001 From: David Howells Date: Mon, 21 Nov 2016 23:36:17 +0000 -Subject: [PATCH 02/24] Add the ability to lock down access to the running +Subject: [PATCH 02/25] Add the ability to lock down access to the running kernel image Provide a single call to allow kernel code to determine whether the system @@ -21,7 +21,7 @@ Signed-off-by: David Howells create mode 100644 security/lock_down.c diff --git a/include/linux/kernel.h b/include/linux/kernel.h -index 13bc08a..282a168 100644 +index 13bc08aba704..282a1684d6e8 100644 --- a/include/linux/kernel.h +++ b/include/linux/kernel.h @@ -276,6 +276,15 @@ extern int oops_may_print(void); @@ -41,7 +41,7 @@ index 13bc08a..282a168 100644 int __must_check _kstrtoul(const char *s, unsigned int base, unsigned long *res); int __must_check _kstrtol(const char *s, unsigned int base, long *res); diff --git a/include/linux/security.h b/include/linux/security.h -index af675b5..68bab18 100644 +index af675b576645..68bab18ddd57 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -1698,5 +1698,16 @@ static inline void free_secdata(void *secdata) @@ -62,7 +62,7 @@ index af675b5..68bab18 100644 #endif /* ! __LINUX_SECURITY_H */ diff --git a/security/Kconfig b/security/Kconfig -index 93027fd..4baac4a 100644 +index 93027fdf47d1..4baac4aab277 100644 --- a/security/Kconfig +++ b/security/Kconfig @@ -189,6 +189,21 @@ config STATIC_USERMODEHELPER_PATH @@ -88,7 +88,7 @@ index 93027fd..4baac4a 100644 source security/smack/Kconfig source security/tomoyo/Kconfig diff --git a/security/Makefile b/security/Makefile -index f2d71cd..8c4a43e 100644 +index f2d71cdb8e19..8c4a43e3d4e0 100644 --- a/security/Makefile +++ b/security/Makefile @@ -29,3 +29,6 @@ obj-$(CONFIG_CGROUP_DEVICE) += device_cgroup.o @@ -100,7 +100,7 @@ index f2d71cd..8c4a43e 100644 +obj-$(CONFIG_LOCK_DOWN_KERNEL) += lock_down.o diff --git a/security/lock_down.c b/security/lock_down.c new file mode 100644 -index 0000000..5788c60 +index 000000000000..5788c60ff4e1 --- /dev/null +++ b/security/lock_down.c @@ -0,0 +1,40 @@ @@ -145,5 +145,5 @@ index 0000000..5788c60 +} +EXPORT_SYMBOL(kernel_is_locked_down); -- -2.9.4 +2.13.0 diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mo.patch b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mo.patch index cf664d7c01..b716a4d697 100644 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mo.patch +++ b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/4.12/z0003-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mo.patch @@ -1,7 +1,7 @@ -From b60bbf065c75ec4b32387d0b2396f3d7c8402a09 Mon Sep 17 00:00:00 2001 +From 44a561a24da72b39d2df450f9a3da7c3682d1fe5 Mon Sep 17 00:00:00 2001 From: David Howells Date: Mon, 21 Nov 2016 23:55:55 +0000 -Subject: [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode +Subject: [PATCH 03/25] efi: Lock down the kernel if booted in secure boot mode UEFI Secure Boot provides a mechanism for ensuring that the firmware will only load signed bootloaders and kernels. Certain use cases may also @@ -16,7 +16,7 @@ Signed-off-by: David Howells 2 files changed, 19 insertions(+), 1 deletion(-) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig -index 0efb4c9..4d1c53b 100644 +index 0efb4c9497bc..4d1c53bb8411 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1827,6 +1827,18 @@ config EFI_MIXED @@ -39,7 +39,7 @@ index 0efb4c9..4d1c53b 100644 def_bool y prompt "Enable seccomp to safely compute untrusted bytecode" diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c -index 3a3ef6e..f6990c0 100644 +index 87ef54e64842..4c4d758d4be1 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c @@ -69,6 +69,7 @@ @@ -50,7 +50,7 @@ index 3a3ef6e..f6990c0 100644 #include #include