summaryrefslogtreecommitdiffstats
path: root/freed-ora/current
diff options
context:
space:
mode:
authorAlexandre Oliva <lxoliva@fsfla.org>2018-02-07 02:28:05 +0000
committerAlexandre Oliva <lxoliva@fsfla.org>2018-02-07 02:28:05 +0000
commitfb1bddf666feb7abfcc7f6c65c2cca0ff1df5a5f (patch)
treefe43f63fa93502755ed0fcf0d64102b441cdd232 /freed-ora/current
parent9e211864448dfd5c6d9e3a67b5f3fa5339c555a0 (diff)
downloadlinux-libre-raptor-fb1bddf666feb7abfcc7f6c65c2cca0ff1df5a5f.tar.gz
linux-libre-raptor-fb1bddf666feb7abfcc7f6c65c2cca0ff1df5a5f.zip
4.14.17-300.fc27.gnu
Diffstat (limited to 'freed-ora/current')
-rw-r--r--freed-ora/current/f27/kernel.spec13
-rw-r--r--freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch55
-rw-r--r--freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign6
-rw-r--r--freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign6
-rw-r--r--freed-ora/current/f27/sources2
5 files changed, 14 insertions, 68 deletions
diff --git a/freed-ora/current/f27/kernel.spec b/freed-ora/current/f27/kernel.spec
index c8b100af8..68394e202 100644
--- a/freed-ora/current/f27/kernel.spec
+++ b/freed-ora/current/f27/kernel.spec
@@ -92,7 +92,7 @@ Summary: The Linux kernel
%if 0%{?released_kernel}
# Do we have a -stable update to apply?
-%define stable_update 16
+%define stable_update 17
# Set rpm version accordingly
%if 0%{?stable_update}
%define stablerev %{stable_update}
@@ -659,8 +659,6 @@ Patch321: bcm283x-dma-mapping-skip-USB-devices-when-configuring-DMA-during-probe
# bcm2837 bluetooth support
Patch323: bcm2837-bluetooth-support.patch
-Patch324: rpi-graphics-fix.patch
-
# Generic fixes and enablement for Socionext SoC and 96board
# https://patchwork.kernel.org/patch/9980861/
Patch331: PCI-aspm-deal-with-missing-root-ports-in-link-state-handling.patch
@@ -677,9 +675,6 @@ Patch335: arm-exynos-fix-usb3.patch
# rbhz 1519591 1520764
Patch500: dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch
-# CVE-2018-5344 rhbz 1533909 1533911
-Patch507: loop-fix-concurrent-lo_open-lo_release.patch
-
# 550-600 Meltdown and Spectre Fixes
Patch550: prevent-bounds-check-bypass-via-speculative-execution.patch
@@ -2348,6 +2343,12 @@ fi
#
#
%changelog
+* Mon Feb 5 2018 Alexandre Oliva <lxoliva@fsfla.org> -libre
+- GNU Linux-libre 4.14.17-gnu.
+
+* Mon Feb 05 2018 Justin M. Forbes <jforbes@fedoraproject.org> - 4.14.17-300
+- Linux v4.14.17
+
* Wed Jan 31 2018 Alexandre Oliva <lxoliva@fsfla.org> -libre
- GNU Linux-libre 4.14.16-gnu.
diff --git a/freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch b/freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch
deleted file mode 100644
index 37131a702..000000000
--- a/freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch
+++ /dev/null
@@ -1,55 +0,0 @@
-From ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5 Mon Sep 17 00:00:00 2001
-From: Linus Torvalds <torvalds@linux-foundation.org>
-Date: Fri, 5 Jan 2018 16:26:00 -0800
-Subject: [PATCH] loop: fix concurrent lo_open/lo_release
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-范龙飞 reports that KASAN can report a use-after-free in __lock_acquire.
-The reason is due to insufficient serialization in lo_release(), which
-will continue to use the loop device even after it has decremented the
-lo_refcnt to zero.
-
-In the meantime, another process can come in, open the loop device
-again as it is being shut down. Confusion ensues.
-
-Reported-by: 范龙飞 <long7573@126.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Jens Axboe <axboe@kernel.dk>
----
- drivers/block/loop.c | 10 ++++++++--
- 1 file changed, 8 insertions(+), 2 deletions(-)
-
-diff --git a/drivers/block/loop.c b/drivers/block/loop.c
-index bc8e61506968..d5fe720cf149 100644
---- a/drivers/block/loop.c
-+++ b/drivers/block/loop.c
-@@ -1581,9 +1581,8 @@ static int lo_open(struct block_device *bdev, fmode_t mode)
- return err;
- }
-
--static void lo_release(struct gendisk *disk, fmode_t mode)
-+static void __lo_release(struct loop_device *lo)
- {
-- struct loop_device *lo = disk->private_data;
- int err;
-
- if (atomic_dec_return(&lo->lo_refcnt))
-@@ -1610,6 +1609,13 @@ static void lo_release(struct gendisk *disk, fmode_t mode)
- mutex_unlock(&lo->lo_ctl_mutex);
- }
-
-+static void lo_release(struct gendisk *disk, fmode_t mode)
-+{
-+ mutex_lock(&loop_index_mutex);
-+ __lo_release(disk->private_data);
-+ mutex_unlock(&loop_index_mutex);
-+}
-+
- static const struct block_device_operations lo_fops = {
- .owner = THIS_MODULE,
- .open = lo_open,
---
-2.15.1
-
diff --git a/freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign b/freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign
deleted file mode 100644
index edabf60f0..000000000
--- a/freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign
+++ /dev/null
@@ -1,6 +0,0 @@
------BEGIN PGP SIGNATURE-----
-
-iF0EABECAB0WIQRHRALIxYLa++OJxCe8t8+Hfn1HpwUCWnJOBAAKCRC8t8+Hfn1H
-p5C2AKCmF/umUWUGzB9TxbfKyflVdX2fLwCcDfg7U4Int2j5pQEsjznh+67maLM=
-=jOWi
------END PGP SIGNATURE-----
diff --git a/freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign b/freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign
new file mode 100644
index 000000000..2d6c1d48c
--- /dev/null
+++ b/freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign
@@ -0,0 +1,6 @@
+-----BEGIN PGP SIGNATURE-----
+
+iF0EABECAB0WIQRHRALIxYLa++OJxCe8t8+Hfn1HpwUCWnaGzAAKCRC8t8+Hfn1H
+pyjwAKCi0AKJIN6M2iKQkPKXKHEomuvYbwCfeDCITV6u4IaKwAROD3PsWzCc06w=
+=Lort
+-----END PGP SIGNATURE-----
diff --git a/freed-ora/current/f27/sources b/freed-ora/current/f27/sources
index 7690f2579..b24724f30 100644
--- a/freed-ora/current/f27/sources
+++ b/freed-ora/current/f27/sources
@@ -1,3 +1,3 @@
SHA512 (linux-libre-4.14-gnu.tar.xz) = 0d4b0b8ec1ffc39c59295adf56f6a2cccf77cad56d8a8bf8072624bbb52ba3e684147ebed91d1528d2685423dd784c5fca0f3650f874f2b93cfc6b7689b9a87f
SHA512 (perf-man-4.14.tar.gz) = 76a9d8adc284cdffd4b3fbb060e7f9a14109267707ce1d03f4c3239cd70d8d164f697da3a0f90a363fbcac42a61d3c378afbcc2a86f112c501b9cb5ce74ef9f8
-SHA512 (patch-4.14-gnu-4.14.16-gnu.xz) = 288b896baf9ae4d7cdf800696cceb81af1e722bde9fc20d21540def6e2df596da8c630daccdffe9fedbeee6feb42e1626f2aac172ca75bcb108c29ffc26f0b24
+SHA512 (patch-4.14-gnu-4.14.17-gnu.xz) = dea8872935dbd895a8ae5016f6972507e21f10f075fe32cb8921ac6422c0ac43700e5f317597c688bb8fcb3f3455b2e5cbd6c69a2aceae12d794fde5b7f77f4a
OpenPOWER on IntegriCloud