diff options
author | jose1711 | 2016-02-13 09:36:14 +0100 |
---|---|---|
committer | jose1711 | 2016-02-13 09:36:14 +0100 |
commit | 520305b93ad8153291146c2b699addd01a8a97f4 (patch) | |
tree | 133bcae4a9a55727cf4801eebee7fc78951cdfd1 | |
parent | 64d5689b8de384d92f97aa27fee2af40aaa85c6f (diff) | |
download | aur-520305b93ad8153291146c2b699addd01a8a97f4.tar.gz |
updated to 4.4.1
-rw-r--r-- | .SRCINFO | 18 | ||||
-rw-r--r-- | 0001-4.4-revert-btrfs.patch | 78 | ||||
-rw-r--r-- | 0001-4.4-revert-xfs.patch | 39 | ||||
-rw-r--r-- | CVE-2016-0728.patch | 78 | ||||
-rw-r--r-- | PKGBUILD | 29 | ||||
-rw-r--r-- | config | 4 | ||||
-rw-r--r-- | linux.install.pkg | 37 |
7 files changed, 185 insertions, 98 deletions
@@ -1,8 +1,8 @@ # Generated by mksrcinfo v8 -# Fri Jan 22 22:18:34 UTC 2016 +# Sat Feb 13 08:35:39 UTC 2016 pkgbase = linux-pae - pkgver = 4.4 - pkgrel = 1 + pkgver = 4.4.1 + pkgrel = 2 url = http://www.kernel.org/ arch = i686 license = GPL2 @@ -14,20 +14,26 @@ pkgbase = linux-pae options = !strip source = https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.4.tar.xz source = https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.4.tar.sign + source = https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.4.1.xz + source = https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.4.1.sign source = config source = linux.preset source = change-default-console-loglevel.patch source = 0001-sdhci-revert.patch source = tpmdd-devel-v3-base-platform-fix-binding-for-drivers-without-probe-callback.patch - source = CVE-2016-0728.patch + source = 0001-4.4-revert-btrfs.patch + source = 0001-4.4-revert-xfs.patch sha256sums = 401d7c8fef594999a460d10c72c5a94e9c2e1022f16795ec51746b0d165418b2 sha256sums = SKIP - sha256sums = 3f60174e468afd833c57ed5968f80aa7bb60e54f452a6366410be4304dd38deb + sha256sums = c0218043e61da3921cd14579ae4a8774a6fdad91667a9fdb851d0a35f62edb48 + sha256sums = SKIP + sha256sums = 168e599d2326d45bddc749b71578508b452dc864809fc43642927c03902648d5 sha256sums = f0d90e756f14533ee67afda280500511a62465b4f76adcc5effa95a40045179c sha256sums = 1256b241cd477b265a3c2d64bdc19ffe3c9bbcee82ea3994c590c2c76e767d99 sha256sums = 5313df7cb5b4d005422bd4cd0dae956b2dadba8f3db904275aaf99ac53894375 sha256sums = ab57037ecee0a425c612babdff47c831378bca0bff063a1308599989a350226d - sha256sums = 03bed5b1c6ef34a917e218a46d38cd1347c5ab5693131996113c6cad275dc4e9 + sha256sums = 51586b733e9f178bebe577258b6057b035eded516ffe8bf8bbb26cb0b26c4958 + sha256sums = ffbfaa192d17bfc7c6293aa9a07efe57f65177051ae3d8033d5e45a7bca2e0ad pkgname = linux-pae pkgdesc = The Linux-pae kernel and modules with PAE support (HIGHMEM64G) diff --git a/0001-4.4-revert-btrfs.patch b/0001-4.4-revert-btrfs.patch new file mode 100644 index 000000000000..4b56e242ec2d --- /dev/null +++ b/0001-4.4-revert-btrfs.patch @@ -0,0 +1,78 @@ +From 80ad623edd2d0ccb47d85357ee31c97e6c684e82 Mon Sep 17 00:00:00 2001 +From: David Sterba <dsterba@suse.com> +Date: Mon, 25 Jan 2016 11:02:06 +0100 +Subject: Revert "btrfs: clear PF_NOFREEZE in cleaner_kthread()" + +This reverts commit 696249132158014d594896df3a81390616069c5c. The +cleaner thread can block freezing when there's a snapshot cleaning in +progress and the other threads get suspended first. From the logs +provided by Martin we're waiting for reading extent pages: + +kernel: PM: Syncing filesystems ... done. +kernel: Freezing user space processes ... (elapsed 0.015 seconds) done. +kernel: Freezing remaining freezable tasks ... +kernel: Freezing of tasks failed after 20.003 seconds (1 tasks refusing to freeze, wq_busy=0): +kernel: btrfs-cleaner D ffff88033dd13bc0 0 152 2 0x00000000 +kernel: ffff88032ebc2e00 ffff88032e750000 ffff88032e74fa50 7fffffffffffffff +kernel: ffffffff814a58df 0000000000000002 ffffea000934d580 ffffffff814a5451 +kernel: 7fffffffffffffff ffffffff814a6e8f 0000000000000000 0000000000000020 +kernel: Call Trace: +kernel: [<ffffffff814a58df>] ? bit_wait+0x2c/0x2c +kernel: [<ffffffff814a5451>] ? schedule+0x6f/0x7c +kernel: [<ffffffff814a6e8f>] ? schedule_timeout+0x2f/0xd8 +kernel: [<ffffffff81076f94>] ? timekeeping_get_ns+0xa/0x2e +kernel: [<ffffffff81077603>] ? ktime_get+0x36/0x44 +kernel: [<ffffffff814a4f6c>] ? io_schedule_timeout+0x94/0xf2 +kernel: [<ffffffff814a4f6c>] ? io_schedule_timeout+0x94/0xf2 +kernel: [<ffffffff814a590b>] ? bit_wait_io+0x2c/0x30 +kernel: [<ffffffff814a5694>] ? __wait_on_bit+0x41/0x73 +kernel: [<ffffffff8109eba8>] ? wait_on_page_bit+0x6d/0x72 +kernel: [<ffffffff8105d718>] ? autoremove_wake_function+0x2a/0x2a +kernel: [<ffffffff811a02d7>] ? read_extent_buffer_pages+0x1bd/0x203 +kernel: [<ffffffff8117d9e9>] ? free_root_pointers+0x4c/0x4c +kernel: [<ffffffff8117e831>] ? btree_read_extent_buffer_pages.constprop.57+0x5a/0xe9 +kernel: [<ffffffff8117f4f3>] ? read_tree_block+0x2d/0x45 +kernel: [<ffffffff8116782a>] ? read_block_for_search.isra.34+0x22a/0x26b +kernel: [<ffffffff811656c3>] ? btrfs_set_path_blocking+0x1e/0x4a +kernel: [<ffffffff8116919b>] ? btrfs_search_slot+0x648/0x736 +kernel: [<ffffffff81170559>] ? btrfs_lookup_extent_info+0xb7/0x2c7 +kernel: [<ffffffff81170ee5>] ? walk_down_proc+0x9c/0x1ae +kernel: [<ffffffff81171c9d>] ? walk_down_tree+0x40/0xa4 +kernel: [<ffffffff8117375f>] ? btrfs_drop_snapshot+0x2da/0x664 +kernel: [<ffffffff8104ff21>] ? finish_task_switch+0x126/0x167 +kernel: [<ffffffff811850f8>] ? btrfs_clean_one_deleted_snapshot+0xa6/0xb0 +kernel: [<ffffffff8117eaba>] ? cleaner_kthread+0x13e/0x17b +kernel: [<ffffffff8117e97c>] ? btrfs_item_end+0x33/0x33 +kernel: [<ffffffff8104d256>] ? kthread+0x95/0x9d +kernel: [<ffffffff8104d1c1>] ? kthread_parkme+0x16/0x16 +kernel: [<ffffffff814a7b5f>] ? ret_from_fork+0x3f/0x70 +kernel: [<ffffffff8104d1c1>] ? kthread_parkme+0x16/0x16 + +As this affects a released kernel (4.4) we need a minimal fix for +stable kernels. + +Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=108361 +Reported-by: Martin Ziegler <ziegler@uni-freiburg.de> +CC: stable@vger.kernel.org # 4.4 +CC: Jiri Kosina <jkosina@suse.cz> +Signed-off-by: David Sterba <dsterba@suse.com> +Signed-off-by: Chris Mason <clm@fb.com> +--- + fs/btrfs/disk-io.c | 1 - + 1 file changed, 1 deletion(-) + +diff --git a/fs/btrfs/disk-io.c b/fs/btrfs/disk-io.c +index 26ef141..404e894 100644 +--- a/fs/btrfs/disk-io.c ++++ b/fs/btrfs/disk-io.c +@@ -1787,7 +1787,6 @@ static int cleaner_kthread(void *arg) + int again; + struct btrfs_trans_handle *trans; + +- set_freezable(); + do { + again = 0; + +-- +cgit v0.12 + diff --git a/0001-4.4-revert-xfs.patch b/0001-4.4-revert-xfs.patch new file mode 100644 index 000000000000..93eb1929ff32 --- /dev/null +++ b/0001-4.4-revert-xfs.patch @@ -0,0 +1,39 @@ +From 3e85286e75224fa3f08bdad20e78c8327742634e Mon Sep 17 00:00:00 2001 +From: Dave Chinner <david@fromorbit.com> +Date: Tue, 19 Jan 2016 08:21:46 +1100 +Subject: Revert "xfs: clear PF_NOFREEZE for xfsaild kthread" + +This reverts commit 24ba16bb3d499c49974669cd8429c3e4138ab102 as it +prevents machines from suspending. This regression occurs when the +xfsaild is idle on entry to suspend, and so there s no activity to +wake it from it's idle sleep and hence see that it is supposed to +freeze. Hence the freezer times out waiting for it and suspend is +cancelled. + +There is no obvious fix for this short of freezing the filesystem +properly, so revert this change for now. + +cc: <stable@vger.kernel.org> # 4.4 +Signed-off-by: Dave Chinner <david@fromorbit.com> +Acked-by: Jiri Kosina <jkosina@suse.cz> +Reviewed-by: Brian Foster <bfoster@redhat.com> +Signed-off-by: Dave Chinner <david@fromorbit.com> +--- + fs/xfs/xfs_trans_ail.c | 1 - + 1 file changed, 1 deletion(-) + +diff --git a/fs/xfs/xfs_trans_ail.c b/fs/xfs/xfs_trans_ail.c +index aa67339..4f18fd9 100644 +--- a/fs/xfs/xfs_trans_ail.c ++++ b/fs/xfs/xfs_trans_ail.c +@@ -497,7 +497,6 @@ xfsaild( + long tout = 0; /* milliseconds */ + + current->flags |= PF_MEMALLOC; +- set_freezable(); + + while (!kthread_should_stop()) { + if (tout && tout <= 20) +-- +cgit v0.12 + diff --git a/CVE-2016-0728.patch b/CVE-2016-0728.patch deleted file mode 100644 index e915d8219e1a..000000000000 --- a/CVE-2016-0728.patch +++ /dev/null @@ -1,78 +0,0 @@ -From 23567fd052a9abb6d67fe8e7a9ccdd9800a540f2 Mon Sep 17 00:00:00 2001 -From: Yevgeny Pats <yevgeny@perception-point.io> -Date: Tue, 19 Jan 2016 22:09:04 +0000 -Subject: [PATCH] KEYS: Fix keyring ref leak in join_session_keyring() - -This fixes CVE-2016-0728. - -If a thread is asked to join as a session keyring the keyring that's already -set as its session, we leak a keyring reference. - -This can be tested with the following program: - - #include <stddef.h> - #include <stdio.h> - #include <sys/types.h> - #include <keyutils.h> - - int main(int argc, const char *argv[]) - { - int i = 0; - key_serial_t serial; - - serial = keyctl(KEYCTL_JOIN_SESSION_KEYRING, - "leaked-keyring"); - if (serial < 0) { - perror("keyctl"); - return -1; - } - - if (keyctl(KEYCTL_SETPERM, serial, - KEY_POS_ALL | KEY_USR_ALL) < 0) { - perror("keyctl"); - return -1; - } - - for (i = 0; i < 100; i++) { - serial = keyctl(KEYCTL_JOIN_SESSION_KEYRING, - "leaked-keyring"); - if (serial < 0) { - perror("keyctl"); - return -1; - } - } - - return 0; - } - -If, after the program has run, there something like the following line in -/proc/keys: - -3f3d898f I--Q--- 100 perm 3f3f0000 0 0 keyring leaked-keyring: empty - -with a usage count of 100 * the number of times the program has been run, -then the kernel is malfunctioning. If leaked-keyring has zero usages or -has been garbage collected, then the problem is fixed. - -Reported-by: Yevgeny Pats <yevgeny@perception-point.io> -Signed-off-by: David Howells <dhowells@redhat.com> -Acked-by: Don Zickus <dzickus@redhat.com> -Acked-by: Prarit Bhargava <prarit@redhat.com> -Acked-by: Jarod Wilson <jarod@redhat.com> -Signed-off-by: James Morris <james.l.morris@oracle.com> ---- - security/keys/process_keys.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/security/keys/process_keys.c b/security/keys/process_keys.c -index a3f85d2a..e6d50172 100644 ---- a/security/keys/process_keys.c -+++ b/security/keys/process_keys.c -@@ -794,6 +794,7 @@ long join_session_keyring(const char *name) - ret = PTR_ERR(keyring); - goto error2; - } else if (keyring == new->session_keyring) { -+ key_put(keyring); - ret = 0; - goto error2; - } @@ -1,13 +1,13 @@ -# Maintainer: Jose Riha <jose1711 gmail com> -# $Id$ +# Maintainer: Jose Riha +# $Id: PKGBUILD 258839 2016-02-03 14:33:04Z foutrelis $ # Contributor: Tobias Powalowski <tpowa@archlinux.org> # Contributor: Thomas Baechler <thomas@archlinux.org> pkgbase=linux-pae #pkgbase=linux-pae _srcname=linux-4.4 -pkgver=4.4 -pkgrel=1 +pkgver=4.4.1 +pkgrel=2 arch=(i686) url="http://www.kernel.org/" license=('GPL2') @@ -15,8 +15,8 @@ makedepends=('xmlto' 'docbook-xsl' 'kmod' 'inetutils' 'bc') options=('!strip') source=("https://www.kernel.org/pub/linux/kernel/v4.x/${_srcname}.tar.xz" "https://www.kernel.org/pub/linux/kernel/v4.x/${_srcname}.tar.sign" - #"https://www.kernel.org/pub/linux/kernel/v4.x/patch-${pkgver}.xz" - #"https://www.kernel.org/pub/linux/kernel/v4.x/patch-${pkgver}.sign" + "https://www.kernel.org/pub/linux/kernel/v4.x/patch-${pkgver}.xz" + "https://www.kernel.org/pub/linux/kernel/v4.x/patch-${pkgver}.sign" # the main kernel config files 'config' # standard config files for mkinitcpio ramdisk @@ -24,16 +24,20 @@ source=("https://www.kernel.org/pub/linux/kernel/v4.x/${_srcname}.tar.xz" 'change-default-console-loglevel.patch' '0001-sdhci-revert.patch' 'tpmdd-devel-v3-base-platform-fix-binding-for-drivers-without-probe-callback.patch' - 'CVE-2016-0728.patch') + '0001-4.4-revert-btrfs.patch' + '0001-4.4-revert-xfs.patch') sha256sums=('401d7c8fef594999a460d10c72c5a94e9c2e1022f16795ec51746b0d165418b2' 'SKIP' - '3f60174e468afd833c57ed5968f80aa7bb60e54f452a6366410be4304dd38deb' + 'c0218043e61da3921cd14579ae4a8774a6fdad91667a9fdb851d0a35f62edb48' + 'SKIP' + '168e599d2326d45bddc749b71578508b452dc864809fc43642927c03902648d5' 'f0d90e756f14533ee67afda280500511a62465b4f76adcc5effa95a40045179c' '1256b241cd477b265a3c2d64bdc19ffe3c9bbcee82ea3994c590c2c76e767d99' '5313df7cb5b4d005422bd4cd0dae956b2dadba8f3db904275aaf99ac53894375' 'ab57037ecee0a425c612babdff47c831378bca0bff063a1308599989a350226d' - '03bed5b1c6ef34a917e218a46d38cd1347c5ab5693131996113c6cad275dc4e9') + '51586b733e9f178bebe577258b6057b035eded516ffe8bf8bbb26cb0b26c4958' + 'ffbfaa192d17bfc7c6293aa9a07efe57f65177051ae3d8033d5e45a7bca2e0ad') validpgpkeys=( 'ABAF11C65A2970B130ABE3C479BE3E4300411886' # Linus Torvalds '647F28654894E3BD457199BE38DBBDC86092693E' # Greg Kroah-Hartman @@ -45,7 +49,7 @@ prepare() { cd "${srcdir}/${_srcname}" # add upstream patch - #patch -p1 -i "${srcdir}/patch-${pkgver}" + patch -p1 -i "${srcdir}/patch-${pkgver}" # add latest fixes from stable queue, if needed # http://git.kernel.org/?p=linux/kernel/git/stable/stable-queue.git @@ -59,8 +63,9 @@ prepare() { # https://bugzilla.kernel.org/show_bug.cgi?id=110751 patch -Np1 -i "${srcdir}/tpmdd-devel-v3-base-platform-fix-binding-for-drivers-without-probe-callback.patch" - # fixes #47820 CVE-2016-0728.patch - patch -Np1 -i "${srcdir}/CVE-2016-0728.patch" + # #47757 fix broken suspend from btrfs and xfs + patch -Np1 -i "${srcdir}/0001-4.4-revert-xfs.patch" + patch -Np1 -i "${srcdir}/0001-4.4-revert-btrfs.patch" # set DEFAULT_CONSOLE_LOGLEVEL to 4 (same value as the 'quiet' kernel param) # remove this when a Kconfig knob is made available by upstream @@ -7544,12 +7544,12 @@ CONFIG_STRICT_DEVMEM=y CONFIG_EARLY_PRINTK=y # CONFIG_EARLY_PRINTK_DBGP is not set CONFIG_EARLY_PRINTK_EFI=y -CONFIG_X86_PTDUMP_CORE=y +# CONFIG_X86_PTDUMP_CORE is not set # CONFIG_X86_PTDUMP is not set # CONFIG_EFI_PGT_DUMP is not set CONFIG_DEBUG_RODATA=y # CONFIG_DEBUG_RODATA_TEST is not set -CONFIG_DEBUG_WX=y +# CONFIG_DEBUG_WX is not set CONFIG_DEBUG_SET_MODULE_RONX=y # CONFIG_DEBUG_NX_TEST is not set CONFIG_DOUBLEFAULT=y diff --git a/linux.install.pkg b/linux.install.pkg new file mode 100644 index 000000000000..175f2ebc53be --- /dev/null +++ b/linux.install.pkg @@ -0,0 +1,37 @@ +# arg 1: the new package version +# arg 2: the old package version + +KERNEL_NAME=-pae +KERNEL_VERSION=4.4.1-2-pae + +post_install () { + # updating module dependencies + echo ">>> Updating module dependencies. Please wait ..." + depmod ${KERNEL_VERSION} + echo ">>> Generating initial ramdisk, using mkinitcpio. Please wait..." + mkinitcpio -p linux${KERNEL_NAME} +} + +post_upgrade() { + if findmnt --fstab -uno SOURCE /boot &>/dev/null && ! mountpoint -q /boot; then + echo "WARNING: /boot appears to be a separate partition but is not mounted." + fi + + # updating module dependencies + echo ">>> Updating module dependencies. Please wait ..." + depmod ${KERNEL_VERSION} + echo ">>> Generating initial ramdisk, using mkinitcpio. Please wait..." + mkinitcpio -p linux${KERNEL_NAME} + + if [ $(vercmp $2 3.13) -lt 0 ]; then + echo ">>> WARNING: AT keyboard support is no longer built into the kernel." + echo ">>> In order to use your keyboard during early init, you MUST" + echo ">>> include the 'keyboard' hook in your mkinitcpio.conf." + fi +} + +post_remove() { + # also remove the compat symlinks + rm -f boot/initramfs-linux${KERNEL_NAME}.img + rm -f boot/initramfs-linux${KERNEL_NAME}-fallback.img +} |