Update kernel to 5.4.72, Address 54 kernel CVEs, Add license file (#273)

Update kernel source to 5.4.72. New kernel source contains fixes for many kernel CVEs flagged by our tooling so address the CVEs. As part of this update, also add the kernel COPYING file to the packages missing the license file.
This commit is contained in:
Christopher Co 2020-11-04 10:57:49 -08:00 committed by GitHub
parent 22ee531895
commit 157fad7d83
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
77 changed files with 1929 additions and 1263 deletions

View File

@ -1,14 +1,14 @@
%global debug_package %{nil}
%define uname_r %{version}-%{release}
Summary: Signed Linux Kernel for aarch64 systems
Name: kernel-signed-aarch64
Version: 5.4.51
Release: 11%{?dist}
Version: 5.4.72
Release: 1%{?dist}
License: GPLv2
URL: https://github.com/microsoft/WSL2-Linux-Kernel
Group: System Environment/Kernel
Vendor: Microsoft Corporation
Distribution: Mariner
Group: System Environment/Kernel
URL: https://github.com/microsoft/WSL2-Linux-Kernel
# This package's "version" and "release" must reflect the unsigned version that
# was signed.
# An important consequence is that when making a change to this package, the
@ -23,18 +23,13 @@ Distribution: Mariner
# 4. Build this spec
Source0: kernel-%{version}-%{release}.aarch64.rpm
Source1: vmlinuz-%{version}-%{release}
ExclusiveArch: aarch64
BuildRequires: cpio
Requires: filesystem
Requires: kmod
Requires(post): coreutils
Requires(postun): coreutils
Conflicts: kernel
%define uname_r %{version}-%{release}
ExclusiveArch: aarch64
%description
This package contains the Linux kernel package with kernel signed with the production key
@ -85,29 +80,45 @@ ln -sf linux-%{uname_r}.cfg /boot/mariner.cfg
%config %{_localstatedir}/lib/initramfs/kernel/%{uname_r}
%changelog
* Fri Oct 16 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> 5.4.51-11
- Update release number
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> 5.4.51-10
- Update release number to match kernel spec
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> 5.4.51-9
- Update release number
* Wed Sep 30 2020 Emre Girgin <mrgirgin@microsoft.com> 5.4.51-8
- Update postun script to deal with removal in case of another installed kernel.
* Fri Sep 25 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> 5.4.51-7
- Update release number
* Wed Sep 23 2020 Daniel McIlvaney <damcilva@microsoft.com> 5.4.51-6
- Update release number
* Thu Sep 03 2020 Daniel McIlvaney <damcilva@microsoft.com> 5.4.51-5
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> 5.4.51-4
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> 5.4.51-3
- Add missing requires
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> 5.4.51-2
- Update release number
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> 5.4.51-1
- Update source to 5.4.51
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> 5.4.42-12
- Update release number
* Tue Aug 18 2020 Chris Co <chrco@microsoft.com> 5.4.42-11
- Original version for CBL-Mariner.
* Mon Oct 26 2020 Chris Co <chrco@microsoft.com> - 5.4.72-1
- Update source to 5.4.72
- Lint spec
* Fri Oct 16 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> - 5.4.51-11
- Update release number
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> - 5.4.51-10
- Update release number to match kernel spec
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> - 5.4.51-9
- Update release number
* Wed Sep 30 2020 Emre Girgin <mrgirgin@microsoft.com> - 5.4.51-8
- Update postun script to deal with removal in case of another installed kernel.
* Fri Sep 25 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> - 5.4.51-7
- Update release number
* Wed Sep 23 2020 Daniel McIlvaney <damcilva@microsoft.com> - 5.4.51-6
- Update release number
* Thu Sep 03 2020 Daniel McIlvaney <damcilva@microsoft.com> - 5.4.51-5
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> - 5.4.51-4
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> - 5.4.51-3
- Add missing requires
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> - 5.4.51-2
- Update release number
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> - 5.4.51-1
- Update source to 5.4.51
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> - 5.4.42-12
- Update release number
* Tue Aug 18 2020 Chris Co <chrco@microsoft.com> - 5.4.42-11
- Original version for CBL-Mariner.

View File

@ -1,14 +1,14 @@
%global debug_package %{nil}
%define uname_r %{version}-%{release}
Summary: Signed Linux Kernel for x86_64 systems
Name: kernel-signed-x64
Version: 5.4.51
Release: 11%{?dist}
Version: 5.4.72
Release: 1%{?dist}
License: GPLv2
URL: https://github.com/microsoft/WSL2-Linux-Kernel
Group: System Environment/Kernel
Vendor: Microsoft Corporation
Distribution: Mariner
Group: System Environment/Kernel
URL: https://github.com/microsoft/WSL2-Linux-Kernel
# This package's "version" and "release" must reflect the unsigned version that
# was signed.
# An important consequence is that when making a change to this package, the
@ -23,18 +23,13 @@ Distribution: Mariner
# 4. Build this spec
Source0: kernel-%{version}-%{release}.x86_64.rpm
Source1: vmlinuz-%{version}-%{release}
ExclusiveArch: x86_64
BuildRequires: cpio
Requires: filesystem
Requires: kmod
Requires(post): coreutils
Requires(postun): coreutils
Conflicts: kernel
%define uname_r %{version}-%{release}
ExclusiveArch: x86_64
%description
This package contains the Linux kernel package with kernel signed with the production key
@ -85,29 +80,45 @@ ln -sf linux-%{uname_r}.cfg /boot/mariner.cfg
%config %{_localstatedir}/lib/initramfs/kernel/%{uname_r}
%changelog
* Fri Oct 16 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> 5.4.51-11
- Update release number
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> 5.4.51-10
- Update release number to match kernel spec
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> 5.4.51-9
- Update release number
* Wed Sep 30 2020 Emre Girgin <mrgirgin@microsoft.com> 5.4.51-8
- Update postun script to deal with removal in case of another installed kernel.
* Fri Sep 25 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> 5.4.51-7
- Update release number
* Wed Sep 23 2020 Daniel McIlvaney <damcilva@microsoft.com> 5.4.51-6
- Update release number
* Thu Sep 03 2020 Daniel McIlvaney <damcilva@microsoft.com> 5.4.51-5
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> 5.4.51-4
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> 5.4.51-3
- Add missing requires
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> 5.4.51-2
- Update release number
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> 5.4.51-1
- Update source to 5.4.51
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> 5.4.42-12
- Update release number
* Tue Aug 18 2020 Chris Co <chrco@microsoft.com> 5.4.42-11
- Original version for CBL-Mariner.
* Mon Oct 26 2020 Chris Co <chrco@microsoft.com> - 5.4.72-1
- Update source to 5.4.72
- Lint spec
* Fri Oct 16 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> - 5.4.51-11
- Update release number
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> - 5.4.51-10
- Update release number to match kernel spec
* Fri Oct 02 2020 Chris Co <chrco@microsoft.com> - 5.4.51-9
- Update release number
* Wed Sep 30 2020 Emre Girgin <mrgirgin@microsoft.com> - 5.4.51-8
- Update postun script to deal with removal in case of another installed kernel.
* Fri Sep 25 2020 Suresh Babu Chalamalasetty <schalam@microsoft.com> - 5.4.51-7
- Update release number
* Wed Sep 23 2020 Daniel McIlvaney <damcilva@microsoft.com> - 5.4.51-6
- Update release number
* Thu Sep 03 2020 Daniel McIlvaney <damcilva@microsoft.com> - 5.4.51-5
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> - 5.4.51-4
- Update release number
* Thu Sep 03 2020 Chris Co <chrco@microsoft.com> - 5.4.51-3
- Add missing requires
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> - 5.4.51-2
- Update release number
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> - 5.4.51-1
- Update source to 5.4.51
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> - 5.4.42-12
- Update release number
* Tue Aug 18 2020 Chris Co <chrco@microsoft.com> - 5.4.42-11
- Original version for CBL-Mariner.

View File

@ -6,6 +6,6 @@
"hypervkvpd.service": "25339871302f7a47e1aecfa9fc2586c78bc37edb98773752f0a5dec30f0ed3a1",
"hypervvss.rules": "94cead44245ef6553ab79c0bbac8419e3ff4b241f01bcec66e6f508098cbedd1",
"hypervvssd.service": "22270d9f0f23af4ea7905f19c1d5d5495e40c1f782cbb87a99f8aec5a011078d",
"linux-msft-5.4.51.tar.gz": "3bcd6b09e952fac4f708614658b508ce80c8e25c04780b6b44a481b1479a08e7"
"linux-msft-5.4.72.tar.gz": "3407ccf8505595ae3e7a7b30c206190a0762f3e202f21f9de88a8d59e182ddef"
}
}

View File

@ -6,52 +6,46 @@
%global hv_fcopy_daemon hypervfcopyd
# udev rules prefix
%global udev_prefix 70
Summary: Hyper-V daemons suite
Name: hyperv-daemons
Version: 5.4.51
Release: 2%{?dist}
Version: 5.4.72
Release: 1%{?dist}
License: GPLv2+
URL: https://github.com/microsoft/WSL2-Linux-Kernel
Group: System/Kernel
Vendor: Microsoft Corporation
Distribution: Mariner
Group: System/Kernel
URL: https://github.com/microsoft/WSL2-Linux-Kernel
Source0: https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-%{version}.tar.gz
# HYPERV KVP DAEMON
Source1: hypervkvpd.service
Source2: hypervkvp.rules
Source1: hypervkvpd.service
Source2: hypervkvp.rules
# HYPERV VSS DAEMON
Source101: hypervvssd.service
Source102: hypervvss.rules
Source101: hypervvssd.service
Source102: hypervvss.rules
# HYPERV FCOPY DAEMON
Source201: hypervfcopyd.service
Source202: hypervfcopy.rules
Source201: hypervfcopyd.service
Source202: hypervfcopy.rules
BuildRequires: gcc
Requires: hypervfcopyd = %{version}-%{release}
Requires: hypervkvpd = %{version}-%{release}
Requires: hypervvssd = %{version}-%{release}
# Hyper-V is available only on x86 architectures
# The base empty (a.k.a. virtual) package can not be noarch
# due to http://www.rpm.org/ticket/78
ExclusiveArch: x86_64
Requires: hypervkvpd = %{version}-%{release}
Requires: hypervvssd = %{version}-%{release}
Requires: hypervfcopyd = %{version}-%{release}
BuildRequires: gcc
%description
Suite of daemons that are needed when Linux guest
is running on Windows Host with Hyper-V.
%package -n hypervkvpd
Summary: Hyper-V key value pair (KVP) daemon
Requires: %{name}-license = %{version}-%{release}
BuildRequires: systemd, kernel-headers
Requires(post): systemd
Requires(preun): systemd
Summary: Hyper-V key value pair (KVP) daemon
BuildRequires: kernel-headers
BuildRequires: systemd
Requires: %{name}-license = %{version}-%{release}
Requires(post): systemd
Requires(postun): systemd
Requires(preun): systemd
%description -n hypervkvpd
Hypervkvpd is an implementation of Hyper-V key value pair (KVP)
@ -60,14 +54,14 @@ kernel driver. After this is done it collects information
requested by Windows Host about the Linux Guest. It also supports
IP injection functionality on the Guest.
%package -n hypervvssd
Summary: Hyper-V VSS daemon
Requires: %{name}-license = %{version}-%{release}
BuildRequires: systemd, kernel-headers
Requires(post): systemd
Requires(preun): systemd
Summary: Hyper-V VSS daemon
BuildRequires: kernel-headers
BuildRequires: systemd
Requires: %{name}-license = %{version}-%{release}
Requires(post): systemd
Requires(postun): systemd
Requires(preun): systemd
%description -n hypervvssd
Hypervvssd is an implementation of Hyper-V VSS functionality
@ -77,14 +71,14 @@ kernel driver. After this is done it waits for instructions
from Windows Host if to "freeze" or "thaw" the filesystem
on the Linux Guest.
%package -n hypervfcopyd
Summary: Hyper-V FCOPY daemon
Requires: %{name}-license = %{version}-%{release}
BuildRequires: systemd, kernel-headers
Requires(post): systemd
Requires(preun): systemd
Summary: Hyper-V FCOPY daemon
BuildRequires: kernel-headers
BuildRequires: systemd
Requires: %{name}-license = %{version}-%{release}
Requires(post): systemd
Requires(postun): systemd
Requires(preun): systemd
%description -n hypervfcopyd
Hypervfcopyd is an implementation of file copy service functionality
@ -93,17 +87,16 @@ a file (over VMBUS) into the Linux Guest. The daemon first registers
with the kernel driver. After this is done it waits for instructions
from Windows Host.
%package license
Summary: License of the Hyper-V daemons suite
BuildArch: noarch
Summary: License of the Hyper-V daemons suite
BuildArch: noarch
%description license
Contains license of the Hyper-V daemons suite.
%package -n hyperv-tools
Summary: Tools for Hyper-V guests
BuildArch: noarch
Summary: Tools for Hyper-V guests
BuildArch: noarch
%description -n hyperv-tools
Contains tools and scripts useful for Hyper-V guests.
@ -115,21 +108,20 @@ Contains tools and scripts useful for Hyper-V guests.
pushd tools/hv
# HYPERV KVP DAEMON
%{__cc} $RPM_OPT_FLAGS -c hv_kvp_daemon.c
%{__cc} %{optflags} -c hv_kvp_daemon.c
%{__cc} $RPM_LD_FLAGS hv_kvp_daemon.o -o %{hv_kvp_daemon}
# HYPERV VSS DAEMON
%{__cc} $RPM_OPT_FLAGS -c hv_vss_daemon.c
%{__cc} %{optflags} -c hv_vss_daemon.c
%{__cc} $RPM_LD_FLAGS hv_vss_daemon.o -o %{hv_vss_daemon}
# HYPERV FCOPY DAEMON
%{__cc} $RPM_OPT_FLAGS -c hv_fcopy_daemon.c
%{__cc} %{optflags} -c hv_fcopy_daemon.c
%{__cc} $RPM_LD_FLAGS hv_fcopy_daemon.o -o %{hv_fcopy_daemon}
popd
%install
rm -rf %{buildroot}
mkdir -p %{buildroot}%{_sbindir}
install -p -m 0755 tools/hv/%{hv_kvp_daemon} %{buildroot}%{_sbindir}
@ -174,7 +166,6 @@ if [ "$1" -eq "0" ] ; then
rm -rf %{_sharedstatedir}/hyperv || :
fi
%post -n hypervvssd
if [ $1 -gt 1 ] ; then
# Upgrade
@ -187,7 +178,6 @@ fi
%preun -n hypervvssd
%systemd_preun hypervvssd.service
%post -n hypervfcopyd
if [ $1 -gt 1 ] ; then
# Upgrade
@ -200,7 +190,6 @@ fi
%preun -n hypervfcopyd
%systemd_preun hypervfcopyd.service
%files
# the base package does not contain any files.
@ -228,15 +217,18 @@ fi
%files -n hyperv-tools
%{_sbindir}/lsvmbus
%changelog
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> 5.4.51-2
* Mon Oct 26 2020 Chris Co <chrco@microsoft.com> - 5.4.72-1
- Update source to 5.4.72
- Lint spec
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> - 5.4.51-2
- Update source hash
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> 5.4.51-1
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> - 5.4.51-1
- Update source to 5.4.51
* Tue Jun 16 2020 Paul Monson <paulmon@microsoft.com> 5.4.42-1
* Tue Jun 16 2020 Paul Monson <paulmon@microsoft.com> - 5.4.42-1
- Initial CBL-Mariner import from Fedora 32 (license: MIT)
- Update to match version 5.4.42 of the kernel.

View File

@ -1,5 +1,5 @@
{
"Signatures": {
"linux-msft-5.4.51.tar.gz": "3bcd6b09e952fac4f708614658b508ce80c8e25c04780b6b44a481b1479a08e7"
"linux-msft-5.4.72.tar.gz": "3407ccf8505595ae3e7a7b30c206190a0762f3e202f21f9de88a8d59e182ddef"
}
}

View File

@ -1,21 +1,25 @@
Summary: Linux API header files
Name: kernel-headers
Version: 5.4.51
Release: 2%{?dist}
Version: 5.4.72
Release: 1%{?dist}
License: GPLv2
URL: https://github.com/microsoft/WSL2-Linux-Kernel
Group: System Environment/Kernel
Vendor: Microsoft Corporation
Distribution: Mariner
Group: System Environment/Kernel
URL: https://github.com/microsoft/WSL2-Linux-Kernel
Source0: https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-%{version}.tar.gz
BuildArch: noarch
%description
The Linux API Headers expose the kernel's API for use by Glibc.
%prep
%setup -q -n WSL2-Linux-Kernel-linux-msft-%{version}
%build
make mrproper
make headers_check
%install
cd %{_builddir}/WSL2-Linux-Kernel-linux-msft-%{version}
make headers
@ -23,94 +27,144 @@ find usr/include -name '.*' -delete
rm usr/include/Makefile
mkdir -p /%{buildroot}%{_includedir}
cp -rv usr/include/* /%{buildroot}%{_includedir}
%files
%defattr(-,root,root)
%license COPYING
%{_includedir}/*
%changelog
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> 5.4.51-2
- Update source hash
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> 5.4.51-1
- Update source to 5.4.51
* Fri Jun 12 2020 Chris Co <chrco@microsoft.com> 5.4.42-1
- Update source to 5.4.42
* Thu Apr 30 2020 Emre Girgin <mrgirgin@microsoft.com> 5.4.23-2
- Renaming linux-api-headers to kernel-headers
* Tue Dec 10 2019 Chris Co <chrco@microsoft.com> 5.4.23-1
- Update to Microsoft Linux Kernel 5.4.23.
- Use make headers since with 5.4, headers_install now requires rsync.
* Tue Sep 03 2019 Mateusz Malisz <mamalisz@microsoft.com> 4.19.52-2
- Initial CBL-Mariner import from Photon (license: Apache2).
* Mon Jun 17 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.52-1
- Update to version 4.19.52
* Tue May 07 2019 Ajay Kaher <akaher@vmware.com> 4.19.40-1
- Update to version 4.19.40
* Wed Mar 27 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.32-1
- Update to version 4.19.32
* Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.29-1
- Update to version 4.19.29
* Tue Mar 05 2019 Ajay Kaher <akaher@vmware.com> 4.19.26-1
- Update to version 4.19.26
* Tue Jan 15 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.15-1
- Update to version 4.19.15
* Mon Dec 10 2018 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.6-1
- Update to version 4.19.6
* Mon Nov 05 2018 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.1-1
- Update to version 4.19.1
* Thu Sep 20 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.18.9-1
- Update to version 4.18.9
* Wed Sep 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.14.67-1
- Update to version 4.14.67
* Mon Jul 09 2018 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.14.54-1
- Update to version 4.14.54
* Fri Dec 22 2017 Alexey Makhalov <amakhalov@vmware.com> 4.14.8-1
- Version update
* Mon Dec 04 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.66-1
- Version update
* Tue Nov 21 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.64-1
- Version update
* Mon Nov 06 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.60-1
- Version update
* Thu Oct 05 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.53-1
- Version update
* Mon Oct 02 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.52-1
- Version update
* Mon Sep 04 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.47-1
- Version update
* Mon Aug 14 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.43-1
- Version update
* Wed Jun 28 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.34-1
- Version update
* Fri May 26 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.30-1
- Version update
* Tue May 16 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.28-1
- Version update
* Wed May 10 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.27-1
- Update to linux-4.9.27
* Sun May 7 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.26-1
- Update to linux-4.9.26
* Tue Apr 25 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.24-1
- Update to linux-4.9.24
* Tue Feb 28 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.13-1
- Update to linux-4.9.13
* Thu Feb 09 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.9-1
- Update to linux-4.9.9
* Tue Jan 10 2017 Alexey Makhalov <amakhalov@vmware.com> 4.9.2-1
- Update to linux-4.9.2
* Mon Dec 12 2016 Alexey Makhalov <amakhalov@vmware.com> 4.9.0-1
- Update to linux-4.9.0
* Mon Nov 28 2016 Alexey Makhalov <amakhalov@vmware.com> 4.4.35-1
- Update to linux-4.4.35
* Thu Nov 10 2016 Alexey Makhalov <amakhalov@vmware.com> 4.4.31-1
- Update to linux-4.4.31
* Wed Sep 7 2016 Alexey Makhalov <amakhalov@vmware.com> 4.4.20-1
- Update kernel version to 4.4.20
* Tue May 24 2016 Priyesh Padmavilasom <ppadmavilasom@vmware.com> 4.4.8-2
- GA - Bump release of all rpms
* Thu Apr 28 2016 Alexey Makhalov <amakhalov@vmware.com> 4.4.8-1
- Update to linux-4.4.8
* Wed Dec 16 2015 Harish Udaiya Kumar <hudaiyakumar@vmware.com> 4.2.0-1
- Upgrading kernel version to 4.2.0.
* Wed Aug 12 2015 Sharath George <sharathg@vmware.com> 4.0.9-1
- Upgrading kernel version.
* Wed Nov 5 2014 Divya Thaluru <dthaluru@vmware.com> 3.13.3-1
- Initial build. First version
* Mon Oct 26 2020 Chris Co <chrco@microsoft.com> - 5.4.72-1
- Update source to 5.4.72
- Add license file
- Lint spec
* Tue Sep 01 2020 Chris Co <chrco@microsoft.com> - 5.4.51-2
- Update source hash
* Wed Aug 19 2020 Chris Co <chrco@microsoft.com> - 5.4.51-1
- Update source to 5.4.51
* Fri Jun 12 2020 Chris Co <chrco@microsoft.com> - 5.4.42-1
- Update source to 5.4.42
* Thu Apr 30 2020 Emre Girgin <mrgirgin@microsoft.com> - 5.4.23-2
- Renaming linux-api-headers to kernel-headers
* Tue Dec 10 2019 Chris Co <chrco@microsoft.com> - 5.4.23-1
- Update to Microsoft Linux Kernel 5.4.23.
- Use make headers since with 5.4, headers_install now requires rsync.
* Tue Sep 03 2019 Mateusz Malisz <mamalisz@microsoft.com> - 4.19.52-2
- Initial CBL-Mariner import from Photon (license: Apache2).
* Mon Jun 17 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.52-1
- Update to version 4.19.52
* Tue May 07 2019 Ajay Kaher <akaher@vmware.com> - 4.19.40-1
- Update to version 4.19.40
* Wed Mar 27 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.32-1
- Update to version 4.19.32
* Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.29-1
- Update to version 4.19.29
* Tue Mar 05 2019 Ajay Kaher <akaher@vmware.com> - 4.19.26-1
- Update to version 4.19.26
* Tue Jan 15 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.15-1
- Update to version 4.19.15
* Mon Dec 10 2018 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.6-1
- Update to version 4.19.6
* Mon Nov 05 2018 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.1-1
- Update to version 4.19.1
* Thu Sep 20 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.18.9-1
- Update to version 4.18.9
* Wed Sep 19 2018 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.14.67-1
- Update to version 4.14.67
* Mon Jul 09 2018 Him Kalyan Bordoloi <bordoloih@vmware.com> - 4.14.54-1
- Update to version 4.14.54
* Fri Dec 22 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.14.8-1
- Version update
* Mon Dec 04 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.66-1
- Version update
* Tue Nov 21 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.64-1
- Version update
* Mon Nov 06 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.60-1
- Version update
* Thu Oct 05 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.53-1
- Version update
* Mon Oct 02 2017 Srivatsa S. Bhat <srivatsa@csail.mit.edu> 4.9.52-1
- Version update
* Mon Sep 04 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.47-1
- Version update
* Mon Aug 14 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.43-1
- Version update
* Wed Jun 28 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.34-1
- Version update
* Fri May 26 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.30-1
- Version update
* Tue May 16 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.28-1
- Version update
* Wed May 10 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.27-1
- Update to linux-4.9.27
* Sun May 7 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.26-1
- Update to linux-4.9.26
* Tue Apr 25 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.24-1
- Update to linux-4.9.24
* Tue Feb 28 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.13-1
- Update to linux-4.9.13
* Thu Feb 09 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.9-1
- Update to linux-4.9.9
* Tue Jan 10 2017 Alexey Makhalov <amakhalov@vmware.com> - 4.9.2-1
- Update to linux-4.9.2
* Mon Dec 12 2016 Alexey Makhalov <amakhalov@vmware.com> - 4.9.0-1
- Update to linux-4.9.0
* Mon Nov 28 2016 Alexey Makhalov <amakhalov@vmware.com> - 4.4.35-1
- Update to linux-4.4.35
* Thu Nov 10 2016 Alexey Makhalov <amakhalov@vmware.com> - 4.4.31-1
- Update to linux-4.4.31
* Wed Sep 7 2016 Alexey Makhalov <amakhalov@vmware.com> - 4.4.20-1
- Update kernel version to 4.4.20
* Tue May 24 2016 Priyesh Padmavilasom <ppadmavilasom@vmware.com> - 4.4.8-2
- GA - Bump release of all rpms
* Thu Apr 28 2016 Alexey Makhalov <amakhalov@vmware.com> - 4.4.8-1
- Update to linux-4.4.8
* Wed Dec 16 2015 Harish Udaiya Kumar <hudaiyakumar@vmware.com> - 4.2.0-1
- Upgrading kernel version to 4.2.0.
* Wed Aug 12 2015 Sharath George <sharathg@vmware.com> - 4.0.9-1
- Upgrading kernel version.
* Wed Nov 5 2014 Divya Thaluru <dthaluru@vmware.com> - 3.13.3-1
- Initial build. First version

View File

@ -1,6 +1,6 @@
#
# Automatically generated file; DO NOT EDIT.
# Linux/x86_64 5.4.51 Kernel Configuration
# Linux/x86_64 5.4.72 Kernel Configuration
#
#
@ -1761,7 +1761,6 @@ CONFIG_SCSI_NETLINK=y
CONFIG_BLK_DEV_SD=y
# CONFIG_CHR_DEV_ST is not set
CONFIG_BLK_DEV_SR=y
# CONFIG_BLK_DEV_SR_VENDOR is not set
CONFIG_CHR_DEV_SG=y
# CONFIG_CHR_DEV_SCH is not set
# CONFIG_SCSI_CONSTANTS is not set
@ -1982,6 +1981,7 @@ CONFIG_NETDEVICES=y
CONFIG_NET_CORE=y
# CONFIG_BONDING is not set
CONFIG_DUMMY=m
# CONFIG_WIREGUARD is not set
# CONFIG_EQUALIZER is not set
# CONFIG_NET_FC is not set
# CONFIG_IFB is not set
@ -2954,9 +2954,6 @@ CONFIG_HDMI=y
# Console display driver support
#
CONFIG_VGA_CONSOLE=y
CONFIG_VGACON_SOFT_SCROLLBACK=y
CONFIG_VGACON_SOFT_SCROLLBACK_SIZE=64
# CONFIG_VGACON_SOFT_SCROLLBACK_PERSISTENT_ENABLE_BY_DEFAULT is not set
CONFIG_DUMMY_CONSOLE=y
CONFIG_DUMMY_CONSOLE_COLUMNS=80
CONFIG_DUMMY_CONSOLE_ROWS=25
@ -3883,6 +3880,8 @@ CONFIG_CRYPTO_RSA=y
CONFIG_CRYPTO_ECC=m
CONFIG_CRYPTO_ECDH=m
# CONFIG_CRYPTO_ECRDSA is not set
# CONFIG_CRYPTO_CURVE25519 is not set
# CONFIG_CRYPTO_CURVE25519_X86 is not set
#
# Authenticated Encryption with Associated Data
@ -3929,6 +3928,8 @@ CONFIG_CRYPTO_CRC32C_INTEL=m
# CONFIG_CRYPTO_CRC32 is not set
# CONFIG_CRYPTO_CRC32_PCLMUL is not set
# CONFIG_CRYPTO_XXHASH is not set
# CONFIG_CRYPTO_BLAKE2S is not set
# CONFIG_CRYPTO_BLAKE2S_X86 is not set
CONFIG_CRYPTO_CRCT10DIF=y
# CONFIG_CRYPTO_CRCT10DIF_PCLMUL is not set
CONFIG_CRYPTO_GHASH=m
@ -3945,7 +3946,6 @@ CONFIG_CRYPTO_SHA1=y
# CONFIG_CRYPTO_SHA1_SSSE3 is not set
# CONFIG_CRYPTO_SHA256_SSSE3 is not set
# CONFIG_CRYPTO_SHA512_SSSE3 is not set
CONFIG_CRYPTO_LIB_SHA256=y
CONFIG_CRYPTO_SHA256=y
CONFIG_CRYPTO_SHA512=y
# CONFIG_CRYPTO_SHA3 is not set
@ -3958,12 +3958,10 @@ CONFIG_CRYPTO_SHA512=y
#
# Ciphers
#
CONFIG_CRYPTO_LIB_AES=y
CONFIG_CRYPTO_AES=y
# CONFIG_CRYPTO_AES_TI is not set
CONFIG_CRYPTO_AES_NI_INTEL=m
# CONFIG_CRYPTO_ANUBIS is not set
CONFIG_CRYPTO_LIB_ARC4=m
CONFIG_CRYPTO_ARC4=m
# CONFIG_CRYPTO_BLOWFISH is not set
# CONFIG_CRYPTO_BLOWFISH_X86_64 is not set
@ -3975,7 +3973,6 @@ CONFIG_CRYPTO_ARC4=m
# CONFIG_CRYPTO_CAST5_AVX_X86_64 is not set
# CONFIG_CRYPTO_CAST6 is not set
# CONFIG_CRYPTO_CAST6_AVX_X86_64 is not set
CONFIG_CRYPTO_LIB_DES=m
CONFIG_CRYPTO_DES=m
# CONFIG_CRYPTO_DES3_EDE_X86_64 is not set
# CONFIG_CRYPTO_FCRYPT is not set
@ -4021,6 +4018,20 @@ CONFIG_CRYPTO_USER_API_SKCIPHER=m
# CONFIG_CRYPTO_USER_API_RNG is not set
# CONFIG_CRYPTO_USER_API_AEAD is not set
CONFIG_CRYPTO_HASH_INFO=y
#
# Crypto library routines
#
CONFIG_CRYPTO_LIB_AES=y
CONFIG_CRYPTO_LIB_ARC4=m
# CONFIG_CRYPTO_LIB_BLAKE2S is not set
# CONFIG_CRYPTO_LIB_CHACHA is not set
# CONFIG_CRYPTO_LIB_CURVE25519 is not set
CONFIG_CRYPTO_LIB_DES=m
CONFIG_CRYPTO_LIB_POLY1305_RSIZE=11
# CONFIG_CRYPTO_LIB_POLY1305 is not set
# CONFIG_CRYPTO_LIB_CHACHA20POLY1305 is not set
CONFIG_CRYPTO_LIB_SHA256=y
CONFIG_CRYPTO_HW=y
# CONFIG_CRYPTO_DEV_PADLOCK is not set
# CONFIG_CRYPTO_DEV_ATMEL_ECC is not set

View File

@ -1,6 +1,6 @@
{
"Signatures": {
"config": "d71a61261f1ef2b2f72d78066d9be7c8b08fac607fe79c40032e0566c02053cd",
"linux-msft-5.4.51.tar.gz": "3bcd6b09e952fac4f708614658b508ce80c8e25c04780b6b44a481b1479a08e7"
"config": "6e5719a3e1a9e0c15507acabfae4116298aaf45cc1764b8a9087b4e83339061e",
"linux-msft-5.4.72.tar.gz": "3407ccf8505595ae3e7a7b30c206190a0762f3e202f21f9de88a8d59e182ddef"
}
}

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,3 @@
CVE-1999-0524 - No upstream fix. Vulnerability is low severity.
Users can mitigate the vulnerability by configuring their system firewall to
not respond to certain ICMP requests.

View File

@ -0,0 +1,2 @@
CVE-1999-0656 - Not a kernel vulnerability. It is a vulnerability in the
rpc.ugidd daemon, which is not provided by the kernel package.

View File

@ -0,0 +1,2 @@
CVE-2007-4998 - Not a kernel vulnerability. It is a vulnerability in the cp binary
which can be supplied from multiple packages (coreutils, busybox, etc.)

View File

@ -0,0 +1,2 @@
CVE-2008-4609 - No upstream fix. Vulnerability exploits design limitations in TCP protocol.
Recommend using iptables mitigation - https://bugzilla.redhat.com/show_bug.cgi?id=465932

View File

@ -0,0 +1,2 @@
CVE-2009-4484 - Not a kernel vulnerability. It is a vulnerability in mysql when
using the specific yaSSL implementation. We use openssl.

View File

@ -0,0 +1,3 @@
CVE-2010-0298 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 1871c6020d7308afb99127bba51f04548e7ca84e
Stable commit - 1871c6020d7308afb99127bba51f04548e7ca84e

View File

@ -0,0 +1,3 @@
CVE-2010-0309 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - ee73f656a604d5aa9df86a97102e4e462dd79924
Stable commit - ee73f656a604d5aa9df86a97102e4e462dd79924

View File

@ -0,0 +1 @@
CVE-2010-4563 - No upstream fix. Low security impact. No plans to fix.

View File

@ -0,0 +1,4 @@
CVE-2011-0640 - Vulnerability disputed. No fix upstream.
Vulnerability concerns arbitrary code execution when a malicious USB device is
plugged in. The malicious USB device poses as a HID device and sends keystrokes
to control the host system.

View File

@ -0,0 +1,2 @@
CVE-2011-2519 - Not a kernel vulnerability. It is a vulnerability in the Xen
hypervisor project when the guest executes the SAHF instruction.

View File

@ -0,0 +1,2 @@
CVE-2015-5738 - Not a kernel vulnerability. It is a vulnerability in the RSA-CRT
implementation within the Cavium SDK.

View File

@ -0,0 +1,2 @@
CVE-2017-8244 - Only applicable to Android kernel tree.
Not a vulnerability in our kernel source as our tree does not host the affected component (drivers/media/platform/msm)

View File

@ -0,0 +1,2 @@
CVE-2017-8245 - Only applicable to Android kernel tree.
Not a vulnerability in our kernel source as our tree does not host the affected component (drivers/soc/qcom/qdsp6v2)

View File

@ -0,0 +1,2 @@
CVE-2017-8246 - Only applicable to Android kernel tree.
Not a vulnerability in our kernel source as our tree does not host the affected component (sound/soc/msm/qdsp6v2)

View File

@ -0,0 +1,3 @@
CVE-2018-1000026 - Already patched in 5.4.51 stable kernel
Upstream commit - 8914a595110a6eca69a5e275b323f5d09e18f4f9
Stable tree commit id same as upstream commit id.

View File

@ -0,0 +1,3 @@
CVE-2018-16880 - Already patched in 5.4.51 stable kernel
Upstream commit - b46a0bf78ad7b150ef5910da83859f7f5a514ffd
Stable tree commit id same as upstream commit id.

View File

@ -0,0 +1,10 @@
CVE-2019-19338 - already patched in linux-msft-5.4.72 stable kernel
Patch 1
Upstream commit - cbbaa2727aa3ae9e0a844803da7cef7fd3b94f2b
Stable commit - cbbaa2727aa3ae9e0a844803da7cef7fd3b94f2b
Patch 2
Upstream commit - c11f83e0626bdc2b6c550fc8b9b6eeefbd8cefaa
Stable commit - c11f83e0626bdc2b6c550fc8b9b6eeefbd8cefaa
Patch 3
Upstream commit - b07a5c53d42a8c87b208614129e947dd2338ff9c
Stable commit - b07a5c53d42a8c87b208614129e947dd2338ff9c

View File

@ -0,0 +1,4 @@
CVE-2019-20794 - No upstream fix. Mitigation available.
Mitigated by clearing the tasks stuck in Uninterruptible sleep state after the
user namespace is gone and inflight operations are still in progress:
# echo 1 > /sys/fs/fuse/connections/$NUM/abort

View File

@ -0,0 +1,3 @@
CVE-2019-20810 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 9453264ef58638ce8976121ac44c07a3ef375983
Stable commit - 47f7b553434000750f9f918df8ca8c137b7fc50b

View File

@ -0,0 +1,16 @@
CVE-2019-3016 - already patched in linux-msft-5.4.72 stable kernel
Patch 1
Upstream commit - 1eff70a9abd46f175defafd29bc17ad456f398a7
Stable commit - a3db2949904b81ae53a840d99f71021f02a01fd3
Patch 2
Upstream commit - 8c6de56a42e0c657955e12b882a81ef07d1d073e
Stable commit - 68460ceba319a46ea14b36129bfd0a152e0f00c3
Patch 3
Upstream commit - 917248144db5d7320655dbb41d3af0b8a0f3d589
Stable commit - f7c1a6c67ff36532f1b0b339e3aae7701a2c0b1e
Patch 4
Upstream commit - a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
Stable commit - 2aebc6ed84efeb1e255fd6417f9230388f2206cd
Patch 5
Upstream commit - b043138246a41064527cf019a3d51d9f015e9796
Stable commit - d71eef9fcc0b81fd56e59afd305a215d81239894

View File

@ -0,0 +1,3 @@
CVE-2019-3819 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 13054abbaa4f1fd4e6f3b4b63439ec033b4c8035
Stable commit - 13054abbaa4f1fd4e6f3b4b63439ec033b4c8035

View File

@ -0,0 +1,7 @@
CVE-2019-3887 - already patched in linux-msft-5.4.72 stable kernel
Patch 1
Upstream commit - acff78477b9b4f26ecdf65733a4ed77fe837e9dc
Stable commit - acff78477b9b4f26ecdf65733a4ed77fe837e9dc
Patch 2
Upstream commit - c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
Stable commit - c73f4c998e1fd4249b9edfa39e23f4fda2b9b041

View File

@ -0,0 +1,3 @@
CVE-2020-10690 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - a33121e5487b424339636b25c35d3a180eaa5f5e
Stable commit - bfa2e0cd3dfda64fde43c3dca3aeba298d2fe7ad

View File

@ -0,0 +1,3 @@
CVE-2020-10711 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - eead1c2ea2509fd754c6da893a94f0e69e83ebe4
Stable commit - 1c9dfc2d05d5edde2f8617e3087d9c7dfd55f3c7

View File

@ -0,0 +1,3 @@
CVE-2020-10766 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - dbbe2ad02e9df26e372f38cc3e70dab9222c832e
Stable commit - 209a76a5d46438011eab2eee2a17c8a93b6df8a5

View File

@ -0,0 +1,3 @@
CVE-2020-10767 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 21998a351512eba4ed5969006f0c55882d995ada
Stable commit - 3e49da23913dc18ee4193dd6cdfd27efa1e58563

View File

@ -0,0 +1,3 @@
CVE-2020-10768 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf
Stable commit - 3027b9fecd11a63ed51804f982978c41c556537a

View File

@ -0,0 +1,3 @@
CVE-2020-10781 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 853eab68afc80f59f36bbdeb715e5c88c501e680
Stable commit - edda9fd73f6269354ed945ed67e75eca0d116672

View File

@ -0,0 +1,3 @@
CVE-2020-10942 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 42d84c8490f9f0931786f1623191fcab397c3d64
Stable commit - f09fbb1175cffdbbb36b28e2ff7db96dcc90de08

View File

@ -0,0 +1,3 @@
CVE-2020-11608 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 998912346c0da53a6dbb71fab3a138586b596b30
Stable commit - 0e01661c14e1e9b254aa550eb08adf582cb3b81f

View File

@ -0,0 +1,3 @@
CVE-2020-11609 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 485b06aadb933190f4bc44e006076bc27a23f205
Stable commit - c06050a34b9c09fe3a367409892b31f77fc64168

View File

@ -0,0 +1,3 @@
CVE-2020-12464 - Already fixed in 5.4.51 stable kernel
Upstream commit - 056ad39ee9253873522f6469c3364964a322912b
Stable commit - 4ea6153fc7f4deeb4b26b66f42c4d050b33df7f9

View File

@ -0,0 +1,3 @@
CVE-2020-12465 - Already fixed in 5.4.51 stable kernel
Upstream commit - b102f0c522cf668c8382c56a4f771b37d011cda2
Stable commit - 9980ae64ee8954e191a9f58663481dd584c2dc8a

View File

@ -0,0 +1,2 @@
CVE-2020-12656 - Disputed. Memory leak vulnerability occurs on module unload,
which is already considered a privileged operation.

View File

@ -0,0 +1,3 @@
CVE-2020-12659 - Already patched in 5.4.51 stable kernel
Upstream commit - 99e3a236dd43d06c65af0a2ef9cb44306aef6e02
Stable commit - 25de13b0ad039f81f5f1fe3f7f439ac8c489c96f

View File

@ -0,0 +1,3 @@
CVE-2020-12768 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - d80b64ff297e40c2b6f7d7abc1b3eba70d22a068
Stable commit - 6c4587c0d1d9d5a182ce5cf72dff52b7b00c73b7

View File

@ -0,0 +1,3 @@
CVE-2020-12826 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - d1e7fd6462ca9fc76650fbe6ca800e35b24267da
Stable commit - 5a4734362d07ea0ae10dc738f9f03f87f4f09e2d

View File

@ -0,0 +1,3 @@
CVE-2020-12888 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - abafbc551fddede3e0a08dee1dcde08fc0eb8476
Stable commit - baa21d56a0aa3d29a9354c0dca3179713c1f3e82

View File

@ -0,0 +1,3 @@
CVE-2020-14314 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 5872331b3d91820e14716632ebb56b1399b34fe1
Stable commit - 96a56b5433b3e633c02eea283a4433d623b40d33

View File

@ -0,0 +1,3 @@
CVE-2020-14331 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - ebfdfeeae8c01fcb2b3b74ffaf03876e20835d2d
Stable commit - 76b10c757e8554060f27f820f8f0079b9177fcea

View File

@ -0,0 +1,3 @@
CVE-2020-14356 - Already patched in 5.4.72 stable kernel
Upstream commit - ad0f75e5f57ccbceec13274e1e242f2b5a6397ed
Stable commit - 4eaeb927a3230427c5b414030f4b838616d65b29

View File

@ -0,0 +1,3 @@
CVE-2020-14385 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - f4020438fab05364018c91f7e02ebdd192085933
Stable commit - 23f6872d1a9c3bf544cfa43cba1302e20de640bc

View File

@ -0,0 +1,3 @@
CVE-2020-14386 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - acf69c946233259ab4d64f8869d4037a198c7f06
Stable commit - 65f546d6c6586d0cc3dfc9ca65c9eee80c1abb80

View File

@ -0,0 +1,3 @@
CVE-2020-14390 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 50145474f6ef4a9c19205b173da6264a644c7489
Stable commit - f80b9009eee1e33de597245d9e09e27e76709673

View File

@ -0,0 +1,3 @@
CVE-2020-15780 - Already fixed in 5.4.51 stable kernel
Upstream commit - 75b0cea7bf307f362057cc778efe89af4c615354
Stable commit - 67fb5a8aedd12e8adb1dddd324e90f904a4e1e00

View File

@ -0,0 +1,3 @@
CVE-2020-16166 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - f227e3ec3b5cad859ad15666874405e8c1bbc1d4
Stable commit - 2b9faf229ed2741644e418cf81697cd3aa81ceb7

View File

@ -0,0 +1,3 @@
CVE-2020-25211 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6
Stable commit - 8d479c9e2a1c8fdd1b18a2f657ec917c79b9f430

View File

@ -0,0 +1,3 @@
CVE-2020-25212 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - b4487b93545214a9db8cbf32e86411677b0cca21
Stable commit - 4052ab9094b6efecb6dc7ed854b3579148ad4a09

View File

@ -0,0 +1,3 @@
CVE-2020-25284 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - f44d04e696feaf13d192d942c4f14ad2e117065a
Stable commit - ac9737182fff4387cc133369767e9e68772fc3cd

View File

@ -0,0 +1,3 @@
CVE-2020-25285 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 17743798d81238ab13050e8e2833699b54e15467
Stable commit - 5fc45104613466d95955a9aedef83d36e58fd276

View File

@ -0,0 +1,3 @@
CVE-2020-25641 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 7e24969022cbd61ddc586f14824fc205661bb124
Stable commit - adc61d4e217f0ad6d75a1aaed80f3259ec2cd7c2

View File

@ -0,0 +1,3 @@
CVE-2020-25643 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 66d42ed8b25b64eb63111a2b8582c5afc8bf1105
Stable commit - 4215ee9dcf0a05080206c392a14d624a09171db3

View File

@ -0,0 +1,3 @@
CVE-2020-25645 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 34beb21594519ce64a55a498c2fe7d567bc1ca20
Stable commit - 700cfadb04a4f26008f882a2e945aa5a6884530f

View File

@ -0,0 +1,3 @@
CVE-2020-26088 - already patched in linux-msft-5.4.72 stable kernel
Upstream commit - 26896f01467a28651f7a536143fe5ac8449d4041
Stable commit - 04d588bb1dcda5418cbe3a903b97eea43f0865b0

View File

@ -1,6 +1,6 @@
#
# Automatically generated file; DO NOT EDIT.
# Linux/x86_64 5.4.51 Kernel Configuration
# Linux/x86_64 5.4.72 Kernel Configuration
#
#
@ -1992,7 +1992,6 @@ CONFIG_SCSI_PROC_FS=y
CONFIG_BLK_DEV_SD=y
# CONFIG_CHR_DEV_ST is not set
CONFIG_BLK_DEV_SR=y
# CONFIG_BLK_DEV_SR_VENDOR is not set
CONFIG_CHR_DEV_SG=y
# CONFIG_CHR_DEV_SCH is not set
# CONFIG_SCSI_CONSTANTS is not set
@ -2276,6 +2275,7 @@ CONFIG_MII=m
CONFIG_NET_CORE=y
CONFIG_BONDING=m
CONFIG_DUMMY=m
# CONFIG_WIREGUARD is not set
# CONFIG_EQUALIZER is not set
# CONFIG_NET_FC is not set
# CONFIG_IFB is not set
@ -4065,9 +4065,6 @@ CONFIG_HDMI=y
# Console display driver support
#
CONFIG_VGA_CONSOLE=y
CONFIG_VGACON_SOFT_SCROLLBACK=y
CONFIG_VGACON_SOFT_SCROLLBACK_SIZE=64
# CONFIG_VGACON_SOFT_SCROLLBACK_PERSISTENT_ENABLE_BY_DEFAULT is not set
CONFIG_DUMMY_CONSOLE=y
CONFIG_DUMMY_CONSOLE_COLUMNS=80
CONFIG_DUMMY_CONSOLE_ROWS=25
@ -6143,6 +6140,8 @@ CONFIG_CRYPTO_DH=m
CONFIG_CRYPTO_ECC=m
CONFIG_CRYPTO_ECDH=m
# CONFIG_CRYPTO_ECRDSA is not set
# CONFIG_CRYPTO_CURVE25519 is not set
# CONFIG_CRYPTO_CURVE25519_X86 is not set
#
# Authenticated Encryption with Associated Data
@ -6189,6 +6188,8 @@ CONFIG_CRYPTO_CRC32C_INTEL=m
# CONFIG_CRYPTO_CRC32 is not set
# CONFIG_CRYPTO_CRC32_PCLMUL is not set
# CONFIG_CRYPTO_XXHASH is not set
# CONFIG_CRYPTO_BLAKE2S is not set
# CONFIG_CRYPTO_BLAKE2S_X86 is not set
CONFIG_CRYPTO_CRCT10DIF=y
# CONFIG_CRYPTO_CRCT10DIF_PCLMUL is not set
CONFIG_CRYPTO_GHASH=m
@ -6205,7 +6206,6 @@ CONFIG_CRYPTO_SHA1=y
# CONFIG_CRYPTO_SHA1_SSSE3 is not set
# CONFIG_CRYPTO_SHA256_SSSE3 is not set
# CONFIG_CRYPTO_SHA512_SSSE3 is not set
CONFIG_CRYPTO_LIB_SHA256=y
CONFIG_CRYPTO_SHA256=y
CONFIG_CRYPTO_SHA512=y
# CONFIG_CRYPTO_SHA3 is not set
@ -6218,12 +6218,10 @@ CONFIG_CRYPTO_SHA512=y
#
# Ciphers
#
CONFIG_CRYPTO_LIB_AES=y
CONFIG_CRYPTO_AES=y
# CONFIG_CRYPTO_AES_TI is not set
CONFIG_CRYPTO_AES_NI_INTEL=m
# CONFIG_CRYPTO_ANUBIS is not set
CONFIG_CRYPTO_LIB_ARC4=m
CONFIG_CRYPTO_ARC4=m
# CONFIG_CRYPTO_BLOWFISH is not set
# CONFIG_CRYPTO_BLOWFISH_X86_64 is not set
@ -6235,7 +6233,6 @@ CONFIG_CRYPTO_ARC4=m
# CONFIG_CRYPTO_CAST5_AVX_X86_64 is not set
# CONFIG_CRYPTO_CAST6 is not set
# CONFIG_CRYPTO_CAST6_AVX_X86_64 is not set
CONFIG_CRYPTO_LIB_DES=m
CONFIG_CRYPTO_DES=m
# CONFIG_CRYPTO_DES3_EDE_X86_64 is not set
# CONFIG_CRYPTO_FCRYPT is not set
@ -6281,6 +6278,20 @@ CONFIG_CRYPTO_USER_API_SKCIPHER=m
# CONFIG_CRYPTO_USER_API_RNG is not set
# CONFIG_CRYPTO_USER_API_AEAD is not set
CONFIG_CRYPTO_HASH_INFO=y
#
# Crypto library routines
#
CONFIG_CRYPTO_LIB_AES=y
CONFIG_CRYPTO_LIB_ARC4=m
# CONFIG_CRYPTO_LIB_BLAKE2S is not set
# CONFIG_CRYPTO_LIB_CHACHA is not set
# CONFIG_CRYPTO_LIB_CURVE25519 is not set
CONFIG_CRYPTO_LIB_DES=m
CONFIG_CRYPTO_LIB_POLY1305_RSIZE=11
# CONFIG_CRYPTO_LIB_POLY1305 is not set
# CONFIG_CRYPTO_LIB_CHACHA20POLY1305 is not set
CONFIG_CRYPTO_LIB_SHA256=y
CONFIG_CRYPTO_HW=y
# CONFIG_CRYPTO_DEV_PADLOCK is not set
# CONFIG_CRYPTO_DEV_ATMEL_ECC is not set

View File

@ -1,6 +1,6 @@
#
# Automatically generated file; DO NOT EDIT.
# Linux/arm64 5.4.51 Kernel Configuration
# Linux/arm64 5.4.72 Kernel Configuration
#
#
@ -1895,7 +1895,6 @@ CONFIG_SCSI_PROC_FS=y
CONFIG_BLK_DEV_SD=y
# CONFIG_CHR_DEV_ST is not set
CONFIG_BLK_DEV_SR=y
# CONFIG_BLK_DEV_SR_VENDOR is not set
CONFIG_CHR_DEV_SG=y
# CONFIG_CHR_DEV_SCH is not set
# CONFIG_SCSI_CONSTANTS is not set
@ -2183,6 +2182,7 @@ CONFIG_MII=m
CONFIG_NET_CORE=y
CONFIG_BONDING=m
CONFIG_DUMMY=m
# CONFIG_WIREGUARD is not set
# CONFIG_EQUALIZER is not set
# CONFIG_NET_FC is not set
# CONFIG_IFB is not set
@ -3082,6 +3082,7 @@ CONFIG_SPI_SPIDEV=m
# CONFIG_SPI_LOOPBACK_TEST is not set
# CONFIG_SPI_TLE62X0 is not set
# CONFIG_SPI_SLAVE is not set
CONFIG_SPI_DYNAMIC=y
# CONFIG_SPMI is not set
# CONFIG_HSI is not set
CONFIG_PPS=y
@ -6384,6 +6385,7 @@ CONFIG_CRYPTO_RSA=y
# CONFIG_CRYPTO_DH is not set
# CONFIG_CRYPTO_ECDH is not set
# CONFIG_CRYPTO_ECRDSA is not set
# CONFIG_CRYPTO_CURVE25519 is not set
#
# Authenticated Encryption with Associated Data
@ -6425,6 +6427,7 @@ CONFIG_CRYPTO_HMAC=y
CONFIG_CRYPTO_CRC32C=y
# CONFIG_CRYPTO_CRC32 is not set
# CONFIG_CRYPTO_XXHASH is not set
# CONFIG_CRYPTO_BLAKE2S is not set
CONFIG_CRYPTO_CRCT10DIF=y
CONFIG_CRYPTO_GHASH=m
# CONFIG_CRYPTO_POLY1305 is not set
@ -6436,7 +6439,6 @@ CONFIG_CRYPTO_MD5=y
# CONFIG_CRYPTO_RMD256 is not set
# CONFIG_CRYPTO_RMD320 is not set
CONFIG_CRYPTO_SHA1=y
CONFIG_CRYPTO_LIB_SHA256=y
CONFIG_CRYPTO_SHA256=y
CONFIG_CRYPTO_SHA512=y
# CONFIG_CRYPTO_SHA3 is not set
@ -6448,17 +6450,14 @@ CONFIG_CRYPTO_SHA512=y
#
# Ciphers
#
CONFIG_CRYPTO_LIB_AES=y
CONFIG_CRYPTO_AES=y
# CONFIG_CRYPTO_AES_TI is not set
# CONFIG_CRYPTO_ANUBIS is not set
CONFIG_CRYPTO_LIB_ARC4=m
CONFIG_CRYPTO_ARC4=m
# CONFIG_CRYPTO_BLOWFISH is not set
# CONFIG_CRYPTO_CAMELLIA is not set
# CONFIG_CRYPTO_CAST5 is not set
# CONFIG_CRYPTO_CAST6 is not set
CONFIG_CRYPTO_LIB_DES=m
CONFIG_CRYPTO_DES=m
# CONFIG_CRYPTO_FCRYPT is not set
# CONFIG_CRYPTO_KHAZAD is not set
@ -6496,6 +6495,20 @@ CONFIG_CRYPTO_USER_API_SKCIPHER=m
# CONFIG_CRYPTO_USER_API_RNG is not set
# CONFIG_CRYPTO_USER_API_AEAD is not set
CONFIG_CRYPTO_HASH_INFO=y
#
# Crypto library routines
#
CONFIG_CRYPTO_LIB_AES=y
CONFIG_CRYPTO_LIB_ARC4=m
# CONFIG_CRYPTO_LIB_BLAKE2S is not set
# CONFIG_CRYPTO_LIB_CHACHA is not set
# CONFIG_CRYPTO_LIB_CURVE25519 is not set
CONFIG_CRYPTO_LIB_DES=m
CONFIG_CRYPTO_LIB_POLY1305_RSIZE=9
# CONFIG_CRYPTO_LIB_POLY1305 is not set
# CONFIG_CRYPTO_LIB_CHACHA20POLY1305 is not set
CONFIG_CRYPTO_LIB_SHA256=y
CONFIG_CRYPTO_HW=y
# CONFIG_CRYPTO_DEV_MARVELL_CESA is not set
CONFIG_CRYPTO_DEV_FSL_CAAM_COMMON=m

View File

@ -1,51 +0,0 @@
From 914ee9c436cbe90c8ca8a46ec8433cb614a2ada5 Mon Sep 17 00:00:00 2001
From: Sasha Neftin <sasha.neftin@intel.com>
Date: Thu, 10 Oct 2019 13:15:39 +0300
Subject: [PATCH] e1000e: Add support for Comet Lake
Add devices ID's for the next LOM generations that will be
available on the next Intel Client platform (Comet Lake)
This patch provides the initial support for these devices
Signed-off-by: Sasha Neftin <sasha.neftin@intel.com>
Tested-by: Aaron Brown <aaron.f.brown@intel.com>
Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
---
drivers/net/ethernet/intel/e1000e/hw.h | 6 ++++++
drivers/net/ethernet/intel/e1000e/netdev.c | 6 ++++++
2 files changed, 12 insertions(+)
diff --git a/drivers/net/ethernet/intel/e1000e/hw.h b/drivers/net/ethernet/intel/e1000e/hw.h
index eff75bd8a8f0b9..11fdc27faa82b8 100644
--- a/drivers/net/ethernet/intel/e1000e/hw.h
+++ b/drivers/net/ethernet/intel/e1000e/hw.h
@@ -86,6 +86,12 @@ struct e1000_hw;
#define E1000_DEV_ID_PCH_ICP_I219_V8 0x15E0
#define E1000_DEV_ID_PCH_ICP_I219_LM9 0x15E1
#define E1000_DEV_ID_PCH_ICP_I219_V9 0x15E2
+#define E1000_DEV_ID_PCH_CMP_I219_LM10 0x0D4E
+#define E1000_DEV_ID_PCH_CMP_I219_V10 0x0D4F
+#define E1000_DEV_ID_PCH_CMP_I219_LM11 0x0D4C
+#define E1000_DEV_ID_PCH_CMP_I219_V11 0x0D4D
+#define E1000_DEV_ID_PCH_CMP_I219_LM12 0x0D53
+#define E1000_DEV_ID_PCH_CMP_I219_V12 0x0D55
#define E1000_REVISION_4 4
diff --git a/drivers/net/ethernet/intel/e1000e/netdev.c b/drivers/net/ethernet/intel/e1000e/netdev.c
index 42f57ab8fb8eb9..731e1b3e103a15 100644
--- a/drivers/net/ethernet/intel/e1000e/netdev.c
+++ b/drivers/net/ethernet/intel/e1000e/netdev.c
@@ -7749,6 +7749,12 @@ static const struct pci_device_id e1000_pci_tbl[] = {
{ PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_ICP_I219_V8), board_pch_cnp },
{ PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_ICP_I219_LM9), board_pch_cnp },
{ PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_ICP_I219_V9), board_pch_cnp },
+ { PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_CMP_I219_LM10), board_pch_cnp },
+ { PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_CMP_I219_V10), board_pch_cnp },
+ { PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_CMP_I219_LM11), board_pch_cnp },
+ { PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_CMP_I219_V11), board_pch_cnp },
+ { PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_CMP_I219_LM12), board_pch_spt },
+ { PCI_VDEVICE(INTEL, E1000_DEV_ID_PCH_CMP_I219_V12), board_pch_spt },
{ 0, 0, 0, 0, 0, 0, 0 } /* terminate list */
};

View File

@ -1,7 +1,7 @@
{
"Signatures": {
"config": "b8c9e2a875e4e6655fdbeb626088529fd1cef401b8f67a481fc301d2a3a026c5",
"config_aarch64": "3057cf5c5f04b57c4d69f9783d4809de217fb46a4278694c19f6c3ffd81249c5",
"linux-msft-5.4.51.tar.gz": "3bcd6b09e952fac4f708614658b508ce80c8e25c04780b6b44a481b1479a08e7"
"config": "681e8ff274fc3fc79eaf38d5152e99702e22346bd2aaff06925715dcf1a00fc3",
"config_aarch64": "e5e5d73cb64189a18c4129d466545f81b8cb8fe8ceeacddeb39b6e73e1822fc1",
"linux-msft-5.4.72.tar.gz": "3407ccf8505595ae3e7a7b30c206190a0762f3e202f21f9de88a8d59e182ddef"
}
}

File diff suppressed because it is too large Load Diff

View File

@ -1576,8 +1576,8 @@
"type": "other",
"other": {
"name": "hyperv-daemons",
"version": "5.4.51",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.51.tar.gz"
"version": "5.4.72",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.72.tar.gz"
}
}
},
@ -1866,8 +1866,8 @@
"type": "other",
"other": {
"name": "kernel-headers",
"version": "5.4.51",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.51.tar.gz"
"version": "5.4.72",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.72.tar.gz"
}
}
},
@ -1876,8 +1876,8 @@
"type": "other",
"other": {
"name": "kernel-hyperv",
"version": "5.4.51",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.51.tar.gz"
"version": "5.4.72",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.72.tar.gz"
}
}
},
@ -1886,8 +1886,8 @@
"type": "other",
"other": {
"name": "kernel",
"version": "5.4.51",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.51.tar.gz"
"version": "5.4.72",
"downloadUrl": "https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.72.tar.gz"
}
}
},

View File

@ -1,5 +1,5 @@
filesystem-1.1-7.cm1.aarch64.rpm
kernel-headers-5.4.51-2.cm1.noarch.rpm
kernel-headers-5.4.72-1.cm1.noarch.rpm
glibc-2.28-13.cm1.aarch64.rpm
glibc-devel-2.28-13.cm1.aarch64.rpm
glibc-i18n-2.28-13.cm1.aarch64.rpm

View File

@ -1,5 +1,5 @@
filesystem-1.1-7.cm1.x86_64.rpm
kernel-headers-5.4.51-2.cm1.noarch.rpm
kernel-headers-5.4.72-1.cm1.noarch.rpm
glibc-2.28-13.cm1.x86_64.rpm
glibc-devel-2.28-13.cm1.x86_64.rpm
glibc-i18n-2.28-13.cm1.x86_64.rpm

View File

@ -145,7 +145,7 @@ json-c-debuginfo-0.14-2.cm1.aarch64.rpm
json-c-devel-0.14-2.cm1.aarch64.rpm
kbd-2.0.4-5.cm1.aarch64.rpm
kbd-debuginfo-2.0.4-5.cm1.aarch64.rpm
kernel-headers-5.4.51-2.cm1.noarch.rpm
kernel-headers-5.4.72-1.cm1.noarch.rpm
kmod-25-4.cm1.aarch64.rpm
kmod-debuginfo-25-4.cm1.aarch64.rpm
kmod-devel-25-4.cm1.aarch64.rpm

View File

@ -145,7 +145,7 @@ json-c-debuginfo-0.14-2.cm1.x86_64.rpm
json-c-devel-0.14-2.cm1.x86_64.rpm
kbd-2.0.4-5.cm1.x86_64.rpm
kbd-debuginfo-2.0.4-5.cm1.x86_64.rpm
kernel-headers-5.4.51-2.cm1.noarch.rpm
kernel-headers-5.4.72-1.cm1.noarch.rpm
kmod-25-4.cm1.x86_64.rpm
kmod-debuginfo-25-4.cm1.x86_64.rpm
kmod-devel-25-4.cm1.x86_64.rpm

View File

@ -98,7 +98,7 @@ ef8c2c1d16a00bd95b9fdcef63b8a2ca libXtst-1.2.3.tar.bz2
4cbe1c1def7a5e1b0ed5fce8e512f4c6 libXvMC-1.0.10.tar.bz2
d7dd9b9df336b7dd4028b6b56542ff2c libXxf86dga-1.1.4.tar.bz2
298b8fff82df17304dfdb5fe4066fe3a libXxf86vm-1.1.4.tar.bz2
a144b639702d36f8fc2b59bf8f5690a7 linux-msft-5.4.51.tar.gz
c7d15cd5b39d88dfb32fcc9cd3441ebd linux-msft-5.4.72.tar.gz
63ecacd3ff6552537a73f8c30c396caf lua-5.3.5-shared_library-1.patch
4f4b4f323fd3514a68e0ab3da8ce3455 lua-5.3.5.tar.gz
730bb15d96fffe47e148d1e09235af82 m4-1.4.18.tar.xz

View File

@ -39,7 +39,7 @@ http://ftp.gnu.org/gnu/readline/readline-7.0.tar.gz
http://ftp.gnu.org/gnu/tar/tar-1.30.tar.xz
http://ftp.gnu.org/gnu/texinfo/texinfo-6.5.tar.xz
https://www.cpan.org/src/5.0/perl-5.30.3.tar.gz
https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.51.tar.gz
https://github.com/microsoft/WSL2-Linux-Kernel/archive/linux-msft-5.4.72.tar.gz
http://ftp.gnu.org/gnu/bash/bash-4.4.18.tar.gz
https://ftp.gnu.org/gnu/bison/bison-3.1.tar.xz
https://sourceware.org/pub/bzip2/bzip2-1.0.6.tar.gz

View File

@ -57,14 +57,14 @@ set -e
#
cd /sources
echo Linux-5.4.51 API Headers
tar xf linux-msft-5.4.51.tar.gz
pushd WSL2-Linux-Kernel-linux-msft-5.4.51
echo Linux-5.4.72 API Headers
tar xf linux-msft-5.4.72.tar.gz
pushd WSL2-Linux-Kernel-linux-msft-5.4.72
make mrproper
make headers
cp -rv usr/include/* /usr/include
popd
rm -rf WSL2-Linux-Kernel-linux-msft-5.4.51
rm -rf WSL2-Linux-Kernel-linux-msft-5.4.72
touch /logs/status_kernel_headers_complete
echo 6.8. Man-pages-5.02

View File

@ -113,14 +113,14 @@ rm -rf gcc-9.1.0
touch $LFS/logs/temptoolchain/status_gcc_pass1_complete
echo Linux-5.4.51 API Headers
tar xf linux-msft-5.4.51.tar.gz
pushd WSL2-Linux-Kernel-linux-msft-5.4.51
echo Linux-5.4.72 API Headers
tar xf linux-msft-5.4.72.tar.gz
pushd WSL2-Linux-Kernel-linux-msft-5.4.72
make mrproper
make headers
cp -rv usr/include/* /tools/include
popd
rm -rf WSL2-Linux-Kernel-linux-msft-5.4.51
rm -rf WSL2-Linux-Kernel-linux-msft-5.4.72
touch $LFS/logs/temptoolchain/status_kernel_headers_complete