Commit Graph

230 Commits

Author SHA1 Message Date
Daniel McIlvaney 7d582bd35d Add verity-read-only-root package 2021-01-28 14:07:48 -08:00
Christopher Co b32a70d67c
Update kernel sources to 5.4.91 (#563)
* kernel: update to 5.4.91

* kernel: Add nopatch files

* kernel: Remove hyperv GUI patch

* kernel: update config file and hashes

* kernel-hyperv: Update config file and hash

* kernel: Remove framebuffer patch file

* kernel: Remove PGTABLE_MAPPING

CONFIG_PGTABLE_MAPPING not supported in new 5.4.91 kernel
2021-01-23 17:04:37 -08:00
rlmenge 655e53b59a
Add i.MX8mq-evk board support (#472)
* Add i.MX8mq-evk board support

Modify the kernel configs to include the needed drivers as well as voltage regulators.
Add the dtb to the kernel spec as a subpackage by arch type
Update the kernel files to match spec version number
2021-01-13 12:15:59 -05:00
Andrew Phelps d1309e5a21
Add kernel patch to fix GUI installer crash due to mmap issue (#526)
* add kernel patch to fix gui installer crash

* update kernel-hyperv release

* revert hyperv-daemons and kernel-hyperv releasenum per feedback
2021-01-12 12:04:01 -08:00
Nicolas Ontiveros dde135df99
No patch kernel CVE-2020-27777 (#499)
* No patch kernel CVE-2020-27777

* Add upstream/stable commit info for CVE-2020-27777.nopatch

Co-authored-by: Thomas Crain <thcrain@microsoft.com>
2021-01-07 14:53:02 -08:00
Pawel Winogrodzki 852bc1e87a
Updating signed specs to be aligned with their unsigned counterparts. (#496) 2020-12-23 14:17:41 -08:00
Henry Beberman 30ca334c63
Update kernel to 4.5.83, Address 7 kernel CVEs (#470)
- Update kernel-headers, kernel, kernel-hyperv, and hyperv-daemons specs to use 5.4.83
- Refresh version numbers for kernel-signed- specs
- Update toolchain to use 5.4.83 source when building kernel headers
- Address CVE-2020-14351, CVE-2020-14381, CVE-2020-25656, CVE-2020-25704,
  CVE-2020-29534, CVE-2020-29660, CVE-2020-29661
- Update cgmanifest's download URLs to point to 5.4.83 source location
2020-12-16 14:59:31 -08:00
Christopher Co 28451002d5
Update kernel to 5.4.81, Address 16 kernel CVEs (#434)
* Initial update to 5.4.81 using autoupdater script

* kernel: Address 16 CVEs

Address CVE-2020-25705, CVE-2020-15436, CVE-2020-28974, CVE-2020-29368,
CVE-2020-29369, CVE-2020-29370, CVE-2020-29374, CVE-2020-29373, CVE-2020-28915,
CVE-2020-28941, CVE-2020-27675, CVE-2020-15437, CVE-2020-29371, CVE-2020-29372,
CVE-2020-27194, CVE-2020-27152

* kernel: Remove patch for kexec in HyperV

Remove patch for kexec in HyperV. Integrated in 5.4.81.

* kernel: Update kernel configs for 5.4.81

* kernel: Add missing aarch64 configs

* kernel-hyperv: fix up configs
2020-12-07 15:47:17 -08:00
Christopher Co aac1f33546
kernel: Add tpm eventlog patch for arm (#426) 2020-12-03 11:28:37 -08:00
Christopher Co c51c6d44f9
Fix kexec() flow in HyperV (#415)
When invoking kexec() on a Linux guest running on a Hyper-V host, the kernel panics. Created and applied kernel patch that fixes this issue.
2020-11-30 16:14:43 -08:00
chalamalasetty 8b3b80703b
Disable kernel config SLUB_DEBUG_ON due to tcp throughput perf impact (#387) 2020-11-18 17:21:20 -08:00
chalamalasetty d42ad2134f
Enable arm64 hyperv and SoCs support for CBL-Mariner (#366)
* Enable arm64 hyperv and SoCs support for CBL-Mariner

* Update kernel config for Arm64 arch

* Update kernel configs for arm64 arch

* Enable arm64 hyperv and SoCs support for CBL-Mariner

Co-authored-by: schalam <schalam@microsoft.com>
2020-11-12 00:00:27 -08:00
Christopher Co 157fad7d83
Update kernel to 5.4.72, Address 54 kernel CVEs, Add license file (#273)
Update kernel source to 5.4.72. New kernel source contains fixes for many kernel CVEs flagged by our tooling so address the CVEs. As part of this update, also add the kernel COPYING file to the packages missing the license file.
2020-11-04 10:57:49 -08:00
Pawel Winogrodzki 22ee531895
Fixing CVE-2020-15705 in `grub2`. (#319)
* Applying spec linter's suggestions.

* Adding a patch for CVE-2020-15705.
2020-11-04 10:29:29 -08:00
chalamalasetty b54a5a8a61
Merge branch '1.0-dev' into schalam/qatengine 2020-10-19 20:50:14 -07:00
Christopher Co b354cbf3da
Nopatch kernel CVE-2020-10757, CVE-2020-12653, CVE-2020-12657, CVE-2010-3865, CVE-2020-11668, CVE-2020-12654, CVE-2020-24394, CVE-2020-8428 (#193)
* Address CVE-2020-10757, CVE-2020-12653, CVE-2020-12657, CVE-2010-3865, CVE-2020-11668, CVE-2020-12654, CVE-2020-24394, CVE-2020-8428
2020-10-19 10:06:38 -07:00
chalamalasetty c5ecb62a31 Enable QAT kernel configs in CBL-Mariner 2020-10-18 17:35:18 -07:00
Christopher Co c6ccffa563
Fix kernel aarch64 package build break due to missing CONFIG_IMA_KEXEC (#171) 2020-10-02 17:19:24 -07:00
Emre Girgin f86fe912bd
Fix kernel specs' %postun scripts (#164)
* Fix `kernel.spec`'s `%postun` script

* Fix `kernel-signed-aarch64`'s `%postun` script

* Fix kernel-signed-x64.spec's %postun script

* Fix kernel-hyperv.spec's %postun script
2020-10-01 21:32:16 -07:00
chalamalasetty 4c83bb02b6 Enable Mellanox kernel configs 2020-09-25 22:17:53 -07:00
Daniel McIlvaney 6068d8b5b4
Add IMA feature to the kernel, add config for it (#135)
* Add  IMA feature to the kernel, add config for it

- Add IMA measurement configs to the x86_64, and aarch64 kernel configs (IMA_APPRAISE currently disabled).
- Add KernelCommandLine config field to control IMA, and allow additional configs to be passed.

Signed-off-by: Daniel McIlvaney <damcilva@microsoft.com>
Co-authored-by: Christopher Co <christopher.co@microsoft.com>
2020-09-25 16:07:17 -07:00
Daniel McIlvaney 013ed241df Add kernel config check logic to the build (#29)
* Add kernel config checks
Automatically check if the kernel configs have any inconsistencies
during the SPEC build for both kernel and kernel-hyperv

* Address feedback
2020-09-03 19:16:38 -07:00
Christopher Co e0f1243efe kernel: apply additional kernel hardening configs (#84)
* kernel: apply more kernel hardening configs

* kernel-signed-x64: Bump release number

* kernel-signed-aarch64: Bump release number
2020-09-03 15:19:21 -07:00
Christopher Co fada873708 Add kernel requires to kernel-signed requires (#90)
* kernel-signed-x64: Add missing requires

The %post step fails because /sbin/depmod is not present. depmod
is supplied by the kmod package.

This error manifested as a hyper-v boot hang where the image is
stuck infinitely waiting for the rootfs to mount. Since depmod was
never run during kernel installation, the module database is stale. Then when the initramfs regeneration occurs, certain modules (i.e. hv_storvsc)
are not available for dracut to include into the initrd.

Bump release number

* kernel-signed-aarch64: Add missing requires

The %post step fails because /sbin/depmod is not present. depmod
is supplied by the kmod package.

This error manifested as a hyper-v boot hang where the image is
stuck infinitely waiting for the rootfs to mount. Since depmod was
never run during kernel installation, the module database is stale. Then when the initramfs regeneration occurs, certain modules (i.e. hv_storvsc)
are not available for dracut to include into the initrd.

Bump release number

* kernel: Bump release

* kernel: clean up lingering invalid aarch64 configs

* kernel: Fix bogus date rpmlint message
2020-09-03 14:58:03 -07:00
Christopher Co c8bdc7356d Update kernel hashes to latest 5.4.51 (#85)
* hyperv-daemons: Update source hash

* kernel: Update source hash

* kernel-hyperv: Update source hash

* kernel-headers: Update source hash

* Update manifests

* Update toolchain remote md5sum

* kernel-signed-aarch64: Bump release number

* kernel-signed-x64: Bump release number

* kernel: update config

* kernel-hyperv: Update config
2020-09-03 09:20:22 -07:00
Christopher Co 17b2b03820
Update kernel source to stable 5.4.51 (#59)
* kernel-headers: Update source to 5.4.51

* hyperv-daemons: Update source to 5.4.51

* kernel: Update to 5.4.51

* kernel-hyperv: Update to 5.4.51

* kernel: Add nopatch for fixed CVEs

Address CVE-2020-11494, CVE-2020-11565, CVE-2020-12655, CVE-2020-12771,
CVE-2020-13974, CVE-2020-15393, CVE-2020-8647, CVE-2020-8648, CVE-2020-8649,
CVE-2020-9383, CVE-2020-11725

* cgmanifest: Update kernel urls to 5.4.51
2020-08-26 15:25:40 -07:00
Pawel 92a60e14fa Adding missing license and spec origin info. 2020-08-25 11:36:03 -07:00
Chris Co d0e924ae02 kernel: Update Requires for kernel subpackages 2020-08-19 19:55:22 +00:00
Chris Co cb944fb8e6 Introduce kernel-signed-<arch> package
As part of enabling the UEFI Secure Boot chain, the kernel binary must
be signed with our distro key.

At the moment, the signing infrastructure isn't quite ready to perform
inline signing during package build. So to work around this, we
introduced the kernel-signed-<arch> packages. The purpose of these
packages is to supply a way for signed versions of the kernel binary
and the associated kernel modules to land on the end-user's
filesystem.
2020-08-19 01:48:59 +00:00
Chris Co 89382c8efc Introduce grub2-efi-binary-signed-<arch> package
As part of enabling UEFI Secure Boot, the grub2 EFI binary must be
signed with our distro key.

At the moment, the signing infrastructure isn't quite ready to perform
inline signing during package build. So to work around this, we
introduced the grub2-efi-binary-signed-<arch> packages. The purpose
of these packages is to supply a way for signed versions of the
grub efi binary to land on the end-user's filesystem.
2020-08-19 01:48:50 +00:00