import OL kernel-5.14.0-503.14.1.el9_5
This commit is contained in:
parent
e1910dcf75
commit
766b57b471
8
.gitignore
vendored
8
.gitignore
vendored
@ -1,7 +1,9 @@
|
||||
SOURCES/kernel-abi-stablelists-5.14.0-503.11.1.el9_5.tar.bz2
|
||||
SOURCES/kernel-kabi-dw-5.14.0-503.11.1.el9_5.tar.bz2
|
||||
SOURCES/linux-5.14.0-503.11.1.el9_5.tar.xz
|
||||
SOURCES/kernel-abi-stablelists-5.14.0-503.14.1.el9_5.tar.bz2
|
||||
SOURCES/kernel-kabi-dw-5.14.0-503.14.1.el9_5.tar.bz2
|
||||
SOURCES/linux-5.14.0-503.14.1.el9_5.tar.xz
|
||||
SOURCES/nvidiagpuoot001.x509
|
||||
SOURCES/olima1.x509
|
||||
SOURCES/olimaca1.x509
|
||||
SOURCES/rheldup3.x509
|
||||
SOURCES/rhelima.x509
|
||||
SOURCES/rhelima_centos.x509
|
||||
|
@ -1,7 +1,9 @@
|
||||
698c7316cba7a757d7e9388067de6a473d60b30d SOURCES/kernel-abi-stablelists-5.14.0-503.11.1.el9_5.tar.bz2
|
||||
fce46b31961fd6ae1d1455ea6fcd390ac488544a SOURCES/kernel-kabi-dw-5.14.0-503.11.1.el9_5.tar.bz2
|
||||
d398fe8d92b217b2717301e60754fbcdabf421a1 SOURCES/linux-5.14.0-503.11.1.el9_5.tar.xz
|
||||
540a1ffaf8cf2db9c8ea53b37750f63303a5bbb7 SOURCES/kernel-abi-stablelists-5.14.0-503.14.1.el9_5.tar.bz2
|
||||
6a94c9e2209f272b809bbc3c396ce4faf4006126 SOURCES/kernel-kabi-dw-5.14.0-503.14.1.el9_5.tar.bz2
|
||||
e33f827fbee2a7809a5eb6b6561f2cf46c262179 SOURCES/linux-5.14.0-503.14.1.el9_5.tar.xz
|
||||
4fff8080e88afffc06d8ef5004db8d53bb21237f SOURCES/nvidiagpuoot001.x509
|
||||
706ae01dd14efa38f0f565a3706acac19c78df02 SOURCES/olima1.x509
|
||||
6e3f0d61414c0b50f48dc2d4c3b3cd024e1c3a43 SOURCES/olimaca1.x509
|
||||
95b9b811c7b0a6c98b2eafc4e7d6d24f2cb63289 SOURCES/rheldup3.x509
|
||||
99e571f9de4188f3b5fdf1f84ff73f6cc4bb6a0e SOURCES/rhelima.x509
|
||||
61d5a223ff0c79189505abae77e0087c4b2d2b47 SOURCES/rhelima_centos.x509
|
||||
|
59
SOURCES/1000-debrand-some-messages.patch
Normal file
59
SOURCES/1000-debrand-some-messages.patch
Normal file
@ -0,0 +1,59 @@
|
||||
From 6ca79c451f7508fc1916113fd0cdba2140c14818 Mon Sep 17 00:00:00 2001
|
||||
From: Louis Abel <label@rockylinux.org>
|
||||
Date: Wed, 20 Sep 2023 14:16:05 -0700
|
||||
Subject: [PATCH] debrand some messages
|
||||
|
||||
Modified-by: Alex Burmashev <alexander.burmashev@oracle.com>
|
||||
---
|
||||
kernel/rh_shadowman.c | 55 ++++++++++++++++++++++---------------------
|
||||
4 files changed, 34 insertions(+), 33 deletions(-)
|
||||
|
||||
diff --git a/kernel/rh_shadowman.c b/kernel/rh_shadowman.c
|
||||
index 018d5c633..d05ea0790 100644
|
||||
--- a/kernel/rh_shadowman.c
|
||||
+++ b/kernel/rh_shadowman.c
|
||||
@@ -1,39 +1 @@
|
||||
-#include <linux/kernel.h>
|
||||
-#include <linux/module.h>
|
||||
-#include <linux/printk.h>
|
||||
-
|
||||
-/* Display a shadowman logo on the console screen */
|
||||
-static int __init rh_shadowman(char *str)
|
||||
-{
|
||||
- pr_info("RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRRRRRRRrrrrrrrrrrrrrrrORHRrrHRRRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRRRRRHrr8rrrrrrrrrrrrrrrrrrrrhRRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRHRRRRRRRRRRRrrHRHRRRHHHrrrrrrrrrrrrrHRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRRRRHrrrrrHrrrrrrrrrrrrrrrrrrrrRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRHh88hhRHrrrrrrrrrrrrrrrrrrrrrrrrrrHRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRrrrrrrrrrRHRH8rrrrrrrrrrrrrrrrrrrrrrr8RRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRH8rrrrrrrrrrRHRRRRRRRRRHrrrrrrrrrrrrrrrrRrhHRHRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRROrrrrrrrrrrrORRRRRRRRRRRrrrrrrrrrrrrrHrrrrrrhRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRROrrrrrrrrrrrrrrr8RRRRHRrrrrrrrrrrrrrrrrrrrrrHRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRRHhrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRH. .HHHrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRR. .RRhRRHH8rrrrrrrrrrrrrrrrrrrrr8RRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRR~ .RRRRRRRRRHHh8OOOOO8HRRHRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("R,```` RRR8 .hHRRRh\\hHH:=HRh.RRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RR ORRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRR ,HHtaa HRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRO. .RRRRO. . .RRRRRRR\n");
|
||||
- pr_info("RRRRRR ,RRHh, :RRRRRRRR\n");
|
||||
- pr_info("RRRRRRRR HRR :RRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRr .. ,RRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRRt . .HRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRRRRRRr. =RRRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info("RRRRRRRRRRRRRRRRRRRRRRRRHHr: .:tRhRRRRRRRRRRRRRRRRRRRRRRRRRR\n");
|
||||
- pr_info(" ");
|
||||
- pr_info(" Long Live Shadowman!");
|
||||
- pr_info("576527726520686972696e6721a68747470733a2f2f7777772e7265646861742e636f6d2f6a6f6273");
|
||||
- pr_info(" ");
|
||||
- return 1;
|
||||
-}
|
||||
-
|
||||
-__setup("shadowman", rh_shadowman);
|
||||
+// This file has been intentionally left blank
|
||||
--
|
||||
2.41.0
|
||||
|
||||
|
@ -12,7 +12,7 @@ RHEL_MINOR = 5
|
||||
#
|
||||
# Use this spot to avoid future merge conflicts.
|
||||
# Do not trim this comment.
|
||||
RHEL_RELEASE = 503.11.1
|
||||
RHEL_RELEASE = 503.14.1
|
||||
|
||||
#
|
||||
# ZSTREAM
|
||||
|
19
SOURCES/bug34729535-change-certified-hw-message.patch
Normal file
19
SOURCES/bug34729535-change-certified-hw-message.patch
Normal file
@ -0,0 +1,19 @@
|
||||
Update message about certified hardware list.
|
||||
|
||||
Orabug: 34729535
|
||||
|
||||
Signed-off-by: Kevin Lyons <kevin.x.lyons@oracle.com>
|
||||
Reviewed-by: Laurence Rochfort <laurence.rochfort@oracle.com>
|
||||
---
|
||||
diff -ruN linux-5.14.0-160.el8.x86_64.orig/init/main.c linux-5.14.0-160.el8.x86_64/init/main.c
|
||||
--- linux-5.14.0-160.el8.x86_64.orig/init/main.c 2022-08-25 13:57:06.000000000 -0700
|
||||
+++ linux-5.14.0-160.el8.x86_64/init/main.c 2022-10-26 13:15:39.700724777 -0700
|
||||
@@ -936,7 +936,7 @@
|
||||
boot_cpu_init();
|
||||
page_address_init();
|
||||
pr_notice("%s", linux_banner);
|
||||
- pr_notice("The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com.\n");
|
||||
+ pr_notice("The list of certified hardware for Oracle Linux 9 can be viewed at the Oracle Linux Certification List https://linux.oracle.com/hardware-certifications\n");
|
||||
early_security_init();
|
||||
setup_arch(&command_line);
|
||||
setup_boot_config();
|
@ -1,3 +1,37 @@
|
||||
* Thu Nov 07 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.14.1.el9_5]
|
||||
- ext4: fix off by one issue in alloc_flex_gd() (Pavel Reichl) [RHEL-65318]
|
||||
- ping: fix address binding wrt vrf (Antoine Tenart) [RHEL-57564 RHEL-50920]
|
||||
- smb: client: stop flooding dmesg in smb2_calc_signature() (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: print failed session logoffs with FYI (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: propagate error from cifs_construct_tcon() (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: fix DFS failover in multiuser mounts (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: fix DFS interlink failover (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: improve purging of cached referrals (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: avoid unnecessary reconnects when refreshing referrals (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (Paulo Alcantara) [RHEL-36346 RHEL-57983]
|
||||
- smb: client: fix deadlock in smb2_find_smb_tcon() (Paulo Alcantara) [RHEL-36346 RHEL-57983]
|
||||
- cifs: Fix reacquisition of volume cookie on still-live connection (Paulo Alcantara) [RHEL-36346 RHEL-57983]
|
||||
Resolves: RHEL-36346, RHEL-57564, RHEL-65318
|
||||
|
||||
* Fri Nov 01 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.13.1.el9_5]
|
||||
- efi: libstub: Move screen_info handling to common code (Maxim Levitsky) [RHEL-65344]
|
||||
- mpls: Reduce skb re-allocations due to skb_cow() (Guillaume Nault) [RHEL-61697]
|
||||
- mptcp: pm: Fix uaf in __timer_delete_sync (CKI Backport Bot) [RHEL-64678 RHEL-60737] {CVE-2024-46858}
|
||||
- ceph: fix cap ref leak via netfs init_request (Patrick Donnelly) [RHEL-62667 RHEL-61459]
|
||||
- gitlab-ci: provide consistent kcidb_tree_name (Michael Hofmann)
|
||||
Resolves: RHEL-61697, RHEL-62667, RHEL-64678, RHEL-65344
|
||||
|
||||
* Thu Oct 24 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.12.1.el9_5]
|
||||
- net: nexthop: Initialize all fields in dumped nexthops (Antoine Tenart) [RHEL-55080] {CVE-2024-42283}
|
||||
- tracing/osnoise: Fix build when timerlat is not enabled (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- tracing/timerlat: Only clear timer if a kthread exists (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- tracing/osnoise: Use a cpumask to know what threads are kthreads (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- iommufd: Require drivers to supply the cache_invalidate_user ops (CKI Backport Bot) [RHEL-60681 RHEL-60761] {CVE-2024-46824}
|
||||
- Revert "fw loader: Remove the now superfluous sentinel element from ctl_table array" (Eric Chanudet) [RHEL-62925 RHEL-50129]
|
||||
- smb: client: fix hang in wait_for_response() for negproto (Jay Shin) [RHEL-61607 RHEL-57983]
|
||||
Resolves: RHEL-55080, RHEL-60681, RHEL-61607, RHEL-61870, RHEL-62925
|
||||
|
||||
* Mon Sep 30 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.11.1.el9_5]
|
||||
- memcg: protect concurrent access to mem_cgroup_idr (Rafael Aquini) [RHEL-56254] {CVE-2024-43892}
|
||||
- bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (Michal Schmidt) [RHEL-57259] {CVE-2024-44984}
|
||||
|
24
SOURCES/olkmod_signing_key.pem
Normal file
24
SOURCES/olkmod_signing_key.pem
Normal file
@ -0,0 +1,24 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEETCCAvmgAwIBAgIJANw8y5k9b7SaMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
|
||||
VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEXMBUGA1UEBwwOUmVkd29vZCBT
|
||||
aG9yZXMxGzAZBgNVBAoMEk9yYWNsZSBDb3Jwb3JhdGlvbjEVMBMGA1UECwwMT3Jh
|
||||
Y2xlIExpbnV4MS0wKwYDVQQDDCRPcmFjbGUgTGludXggUkhDSyBNb2R1bGUgU2ln
|
||||
bmluZyBLZXkwHhcNMTYwNTA5MjMzNjA4WhcNMjYwNTA3MjMzNjA4WjCBnjELMAkG
|
||||
A1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFzAVBgNVBAcMDlJlZHdvb2Qg
|
||||
U2hvcmVzMRswGQYDVQQKDBJPcmFjbGUgQ29ycG9yYXRpb24xFTATBgNVBAsMDE9y
|
||||
YWNsZSBMaW51eDEtMCsGA1UEAwwkT3JhY2xlIExpbnV4IFJIQ0sgTW9kdWxlIFNp
|
||||
Z25pbmcgS2V5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAl6bUDNNZ
|
||||
jIqgsqgspwBIQ18keDxQeGnWgubZZhHrQU3GpeSRPM4lNTHc+UjMjNXrv/CENZdv
|
||||
4cETRsxT1VFhGG3CvkbQdzc8v4JOQvWSSJqmViPa1eC+yGaMRnGcFXzKsHiTLA4y
|
||||
WMjpJnVowFkwTzscRBlN0AysUg/hT/74DE0oqVnlCJNynqccNWpx8MtNRD55ay9A
|
||||
73yJinYES14rXcU3QbJoO0ZxtRz83ZACDUGX0GORT3+NbB0RK0sttogzA3eLvxKw
|
||||
umWsWZAHmTuHdWgUjSqqZr34VNLPVcsTHAW8X4bq6rRVcB2lMJ3kJfDP8BJyTn99
|
||||
37UmA+/ld47cnwIDAQABo1AwTjAdBgNVHQ4EFgQU3ZlbFVwZs6fD73cHuWniX5Y5
|
||||
Zm4wHwYDVR0jBBgwFoAU3ZlbFVwZs6fD73cHuWniX5Y5Zm4wDAYDVR0TBAUwAwEB
|
||||
/zANBgkqhkiG9w0BAQsFAAOCAQEAF7nfhWfsk4uEDquLj7nJE0wPlVvllVDugzOk
|
||||
R15pnQ7P+HTyz3sLaLJE4N5oWt6pFzDGDYEtPeoMCn1l447tX179Nf5SMZba9ut8
|
||||
3Vxbe7jAn9sQO7ArQR1swf1r101Me4+1oHq7rxPRizOOXrKeEvf5NSAUbSzzXfz6
|
||||
TEp21KTIQO7MjqpsKshRQbpPeiReaYy3A6gJftun5xekP04QTLZVBR4dL7tvZf0S
|
||||
y9SjVg158lONXHfjBekyYTzSFBn/7v+AS8S+cAGRfYteE0Syxl7zJt3GUoEWau/e
|
||||
kXHT+hd/hkdSQKZZWZo1380M1pVZZAvntLRBU6IN9SswafhiVg==
|
||||
-----END CERTIFICATE-----
|
@ -1,11 +1,11 @@
|
||||
{
|
||||
"virt": {
|
||||
"common": {
|
||||
"fips-enable.addon": [
|
||||
"fips=1\n"
|
||||
],
|
||||
"fips-disable.addon": [
|
||||
"fips=0\n"
|
||||
],
|
||||
"fips-enable.addon": [
|
||||
"fips=1\n"
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -5,9 +5,9 @@ prompt = no
|
||||
x509_extensions = myexts
|
||||
|
||||
[ req_distinguished_name ]
|
||||
O = Red Hat
|
||||
CN = Red Hat Enterprise Linux kernel signing key
|
||||
emailAddress = secalert@redhat.com
|
||||
O = Oracle America, Inc.,c=US
|
||||
CN = Oracle CA Server
|
||||
emailAddress = support@oracle.com
|
||||
|
||||
[ myexts ]
|
||||
basicConstraints=critical,CA:FALSE
|
||||
|
121
SPECS/kernel.spec
Normal file → Executable file
121
SPECS/kernel.spec
Normal file → Executable file
@ -104,7 +104,7 @@ Summary: The Linux kernel
|
||||
%if 0%{?fedora}
|
||||
%define secure_boot_arch x86_64
|
||||
%else
|
||||
%define secure_boot_arch x86_64 aarch64 s390x ppc64le
|
||||
%define secure_boot_arch x86_64 s390x ppc64le
|
||||
%endif
|
||||
|
||||
# Signing for secure boot authentication
|
||||
@ -165,15 +165,15 @@ Summary: The Linux kernel
|
||||
# define buildid .local
|
||||
%define specversion 5.14.0
|
||||
%define patchversion 5.14
|
||||
%define pkgrelease 503.11.1
|
||||
%define pkgrelease 503.14.1
|
||||
%define kversion 5
|
||||
%define tarfile_release 5.14.0-503.11.1.el9_5
|
||||
%define tarfile_release 5.14.0-503.14.1.el9_5
|
||||
# This is needed to do merge window version magic
|
||||
%define patchlevel 14
|
||||
# This allows pkg_release to have configurable %%{?dist} tag
|
||||
%define specrelease 503.11.1%{?buildid}%{?dist}
|
||||
%define specrelease 503.14.1%{?buildid}%{?dist}
|
||||
# This defines the kabi tarball version
|
||||
%define kabiversion 5.14.0-503.11.1.el9_5
|
||||
%define kabiversion 5.14.0-503.14.1.el9_5
|
||||
|
||||
#
|
||||
# End of genspec.sh variables
|
||||
@ -185,6 +185,7 @@ Summary: The Linux kernel
|
||||
# should not be exported to RPM provides
|
||||
%global __provides_exclude_from ^%{_libexecdir}/kselftests
|
||||
|
||||
%define _with_kabidupchk 1
|
||||
%define _with_kabidupchk 1
|
||||
# The following build options are enabled by default, but may become disabled
|
||||
# by later architecture-specific checks. These can also be disabled by using
|
||||
@ -645,6 +646,9 @@ Requires: kernel-modules-core-uname-r = %{KVERREL}
|
||||
Provides: installonlypkg(kernel)
|
||||
%endif
|
||||
|
||||
Provides: oracle(kernel-sig-key) == 202204
|
||||
Conflicts: shim-ia32 <= 15.3-1.0.5.el9
|
||||
Conflicts: shim-x64 <= 15.3-1.0.5.el9
|
||||
|
||||
#
|
||||
# List the packages used during the kernel build
|
||||
@ -793,8 +797,6 @@ BuildRequires: WALinuxAgent-cvm
|
||||
# For UKI sb cert
|
||||
%if 0%{?centos}
|
||||
BuildRequires: centos-sb-certs >= 9.0-23
|
||||
%else
|
||||
BuildRequires: redhat-sb-certs >= 9.4-0.1
|
||||
%endif
|
||||
%endif
|
||||
|
||||
@ -811,30 +813,10 @@ Source2: kernel.changelog
|
||||
|
||||
%if %{signkernel}
|
||||
|
||||
# Name of the packaged file containing signing key
|
||||
%ifarch ppc64le
|
||||
%define signing_key_filename kernel-signing-ppc.cer
|
||||
%endif
|
||||
%ifarch s390x
|
||||
%define signing_key_filename kernel-signing-s390.cer
|
||||
%endif
|
||||
|
||||
%define secureboot_ca_0 %{_datadir}/pki/sb-certs/secureboot-ca-%{_arch}.cer
|
||||
%define secureboot_key_0 %{_datadir}/pki/sb-certs/secureboot-kernel-%{_arch}.cer
|
||||
|
||||
%if 0%{?centos}
|
||||
%define pesign_name_0 centossecureboot201
|
||||
%else
|
||||
%ifarch x86_64 aarch64
|
||||
%define pesign_name_0 redhatsecureboot501
|
||||
%endif
|
||||
%ifarch s390x
|
||||
%define pesign_name_0 redhatsecureboot302
|
||||
%endif
|
||||
%ifarch ppc64le
|
||||
%define pesign_name_0 redhatsecureboot701
|
||||
%endif
|
||||
%endif
|
||||
%define pesign_name_0 OracleSecureBootkernelsigningkey2
|
||||
|
||||
# signkernel
|
||||
%endif
|
||||
@ -919,14 +901,20 @@ Source102: rhelimaca1.x509
|
||||
Source103: rhelima.x509
|
||||
Source104: rhelima_centos.x509
|
||||
Source105: nvidiagpuoot001.x509
|
||||
# Oracle Linux IMA CA certificate
|
||||
Source106: olimaca1.x509
|
||||
# Oracle Linux IMA signing certificate
|
||||
Source107: olima1.x509
|
||||
|
||||
%if 0%{?centos}
|
||||
%define ima_signing_cert %{SOURCE104}
|
||||
%else
|
||||
%define ima_signing_cert %{SOURCE103}
|
||||
%define ima_signing_cert_ol %{SOURCE107}
|
||||
%endif
|
||||
|
||||
%define ima_cert_name ima.cer
|
||||
%define ima_cert_name_ol ima_ol.cer
|
||||
|
||||
Source150: dracut-virt.conf
|
||||
|
||||
@ -966,6 +954,9 @@ Source4000: README.rst
|
||||
Source4001: rpminspect.yaml
|
||||
Source4002: gating.yaml
|
||||
|
||||
# Oracle Linux RHCK Module Signing Key
|
||||
Source5001: olkmod_signing_key.pem
|
||||
|
||||
## Patches needed for building this package
|
||||
|
||||
%if !%{nopatches}
|
||||
@ -973,8 +964,12 @@ Source4002: gating.yaml
|
||||
Patch1: patch-%{patchversion}-redhat.patch
|
||||
%endif
|
||||
|
||||
# Oracle patches
|
||||
Patch1000: bug34729535-change-certified-hw-message.patch
|
||||
|
||||
# empty final patch to facilitate testing of kernel patches
|
||||
Patch999999: linux-kernel-test.patch
|
||||
Patch1000000: 1000-debrand-some-messages.patch
|
||||
|
||||
# END OF PATCH DEFINITIONS
|
||||
|
||||
@ -1713,6 +1708,7 @@ cp -a %{SOURCE1} .
|
||||
ApplyOptionalPatch patch-%{patchversion}-redhat.patch
|
||||
%endif
|
||||
|
||||
ApplyPatch bug34729535-change-certified-hw-message.patch
|
||||
ApplyOptionalPatch linux-kernel-test.patch
|
||||
|
||||
# END OF PATCH APPLICATIONS
|
||||
@ -1792,6 +1788,11 @@ openssl x509 -inform der -in %{SOURCE101} -out rhelkpatch1.pem
|
||||
openssl x509 -inform der -in %{SOURCE102} -out rhelimaca1.pem
|
||||
openssl x509 -inform der -in %{SOURCE105} -out nvidiagpuoot001.pem
|
||||
cat rheldup3.pem rhelkpatch1.pem rhelimaca1.pem nvidiagpuoot001.pem > ../certs/rhel.pem
|
||||
# Add Oracle Linux IMA CA certificate to the kernel trusted certificates list
|
||||
openssl x509 -inform der -in %{SOURCE106} -out olimaca1.pem
|
||||
cat olimaca1.pem >> ../certs/rhel.pem
|
||||
# Add olkmod_signing_key.pem to the kernel trusted certificates list
|
||||
cat %{SOURCE5001} >> ../certs/rhel.pem
|
||||
%if %{signkernel}
|
||||
%ifarch s390x ppc64le
|
||||
openssl x509 -inform der -in %{secureboot_ca_0} -out secureboot.pem
|
||||
@ -2459,8 +2460,11 @@ BuildKernel() {
|
||||
%endif
|
||||
SBAT=$(cat <<- EOF
|
||||
linux,1,Red Hat,linux,$KernelVer,mailto:secalert@redhat.com
|
||||
linux,1,Oracle Linux,linux,$KernelVer,mailto:secalert_us@oracle.com
|
||||
linux.$SBATsuffix,1,Red Hat,linux,$KernelVer,mailto:secalert@redhat.com
|
||||
linux.ol,1,Oracle Linux,linux,$KernelVer,mailto:secalert_us@oracle.com
|
||||
kernel-uki-virt.$SBATsuffix,1,Red Hat,kernel-uki-virt,$KernelVer,mailto:secalert@redhat.com
|
||||
kernel-uki-virt.ol,1,Oracle Linux,kernel-uki-virt,$KernelVer,mailto:secalert_us@oracle.com
|
||||
EOF
|
||||
)
|
||||
|
||||
@ -2486,7 +2490,7 @@ BuildKernel() {
|
||||
python3 %{SOURCE151} %{SOURCE152} $KernelAddonsDirOut virt %{primary_target} %{_target_cpu}
|
||||
|
||||
%if %{signkernel}
|
||||
|
||||
%if ! %{?oraclelinux}
|
||||
%if 0%{?centos}
|
||||
UKI_secureboot_name=centossecureboot204
|
||||
%else
|
||||
@ -2508,6 +2512,7 @@ BuildKernel() {
|
||||
done
|
||||
|
||||
# signkernel
|
||||
%endif
|
||||
%endif
|
||||
|
||||
pushd $RPM_BUILD_ROOT
|
||||
@ -2585,7 +2590,7 @@ BuildKernel() {
|
||||
# prune junk from kernel-devel
|
||||
find $RPM_BUILD_ROOT/usr/src/kernels -name ".*.cmd" -delete
|
||||
|
||||
# Red Hat UEFI Secure Boot CA cert, which can be used to authenticate the kernel
|
||||
# UEFI Secure Boot CA cert, which can be used to authenticate the kernel
|
||||
mkdir -p $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer
|
||||
%if %{signkernel}
|
||||
install -m 0644 %{secureboot_ca_0} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca.cer
|
||||
@ -2599,6 +2604,8 @@ BuildKernel() {
|
||||
%if 0%{?rhel}
|
||||
# Red Hat IMA code-signing cert, which is used to authenticate package files
|
||||
install -m 0644 %{ima_signing_cert} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/%{ima_cert_name}
|
||||
# Oracle Linux IMA signing cert
|
||||
install -m 0644 %{ima_signing_cert_ol} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/%{ima_cert_name_ol}
|
||||
%endif
|
||||
|
||||
%if %{signmodules}
|
||||
@ -3791,20 +3798,46 @@ fi
|
||||
#
|
||||
#
|
||||
%changelog
|
||||
* Tue Nov 12 2024 Andrew Lukoshko <alukoshko@almalinux.org> [5.14.0-503.11.1.el9_5]
|
||||
- Import sources from CS9 (Andrew Lukoshko)
|
||||
- Merge: Add symbols to stablelist and enable check-kabi (Lucas Zampieri) [RHEL-56065]
|
||||
- Merge tag 'kernel-5.14.0-503.11.1.el9_5' into merge-up-9.5- (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.10.1.el9_5' into merge-up-9.5- (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.9.1.el9_5' into merge-up-9.5- (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.8.1.el9_5' into merge-up-9.5 (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.7.1.el9_5' into merge-up-9.5 (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.6.1.el9_5' into merge-up-9.5 (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.5.1.el9_5' into merge-up-9.5 (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.4.1.el9_5' into merge-up-9.5 (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.3.1.el9_5' into merge-up-kernel-5.14.0-503.3.1.el9_5 (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.2.1.el9_5' into merge-up-kernel-5.14.0-503.2.1.el9_5 (Lucas Zampieri)
|
||||
- Merge tag 'kernel-5.14.0-503.1.1.el9_5' from 9.5 (Lucas Zampieri)
|
||||
* Mon Nov 18 2024 Craig Guiller <craig.guiller@oracle.com> - [5.14.0-503.14.1.el9_5.OL9]
|
||||
- Disable UKI signing [Orabug: 36571828]
|
||||
- Update Oracle Linux certificates (Kevin Lyons)
|
||||
- Disable signing for aarch64 (Ilya Okomin)
|
||||
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
|
||||
- Update x509.genkey [Orabug: 24817676]
|
||||
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5.el9
|
||||
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
|
||||
- Add Oracle Linux IMA certificates
|
||||
|
||||
* Thu Nov 07 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.14.1.el9_5]
|
||||
- ext4: fix off by one issue in alloc_flex_gd() (Pavel Reichl) [RHEL-65318]
|
||||
- ping: fix address binding wrt vrf (Antoine Tenart) [RHEL-57564 RHEL-50920]
|
||||
- smb: client: stop flooding dmesg in smb2_calc_signature() (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: print failed session logoffs with FYI (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: propagate error from cifs_construct_tcon() (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: fix DFS failover in multiuser mounts (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: fix DFS interlink failover (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: improve purging of cached referrals (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: avoid unnecessary reconnects when refreshing referrals (Paulo Alcantara) [RHEL-36346 RHEL-61193]
|
||||
- smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (Paulo Alcantara) [RHEL-36346 RHEL-57983]
|
||||
- smb: client: fix deadlock in smb2_find_smb_tcon() (Paulo Alcantara) [RHEL-36346 RHEL-57983]
|
||||
- cifs: Fix reacquisition of volume cookie on still-live connection (Paulo Alcantara) [RHEL-36346 RHEL-57983]
|
||||
|
||||
* Fri Nov 01 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.13.1.el9_5]
|
||||
- efi: libstub: Move screen_info handling to common code (Maxim Levitsky) [RHEL-65344]
|
||||
- mpls: Reduce skb re-allocations due to skb_cow() (Guillaume Nault) [RHEL-61697]
|
||||
- mptcp: pm: Fix uaf in __timer_delete_sync (CKI Backport Bot) [RHEL-64678 RHEL-60737] {CVE-2024-46858}
|
||||
- ceph: fix cap ref leak via netfs init_request (Patrick Donnelly) [RHEL-62667 RHEL-61459]
|
||||
- gitlab-ci: provide consistent kcidb_tree_name (Michael Hofmann)
|
||||
|
||||
* Thu Oct 24 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.12.1.el9_5]
|
||||
- net: nexthop: Initialize all fields in dumped nexthops (Antoine Tenart) [RHEL-55080] {CVE-2024-42283}
|
||||
- tracing/osnoise: Fix build when timerlat is not enabled (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- tracing/timerlat: Only clear timer if a kthread exists (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- tracing/osnoise: Use a cpumask to know what threads are kthreads (Tomas Glozar) [RHEL-61870 RHEL-39968]
|
||||
- iommufd: Require drivers to supply the cache_invalidate_user ops (CKI Backport Bot) [RHEL-60681 RHEL-60761] {CVE-2024-46824}
|
||||
- Revert "fw loader: Remove the now superfluous sentinel element from ctl_table array" (Eric Chanudet) [RHEL-62925 RHEL-50129]
|
||||
- smb: client: fix hang in wait_for_response() for negproto (Jay Shin) [RHEL-61607 RHEL-57983]
|
||||
|
||||
* Mon Sep 30 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.11.1.el9_5]
|
||||
- memcg: protect concurrent access to mem_cgroup_idr (Rafael Aquini) [RHEL-56254] {CVE-2024-43892}
|
||||
|
Loading…
Reference in New Issue
Block a user