Linux Kernel Module (KMOD) update notification Jan 4th 2023
search cancel

Linux Kernel Module (KMOD) update notification Jan 4th 2023

book

Article ID: 257152

calendar_today

Updated On:

Products

Data Center Security Server Advanced

Issue/Introduction

Linux Kernel Module (KMOD) update notification Jan 4th 2023

Resolution

The Symantec engineering team has qualified Data Center Security (DCS) on the following versions of DCS and Linux kernel module (KMOD). 

New kernel support is added to the following Linux platforms for DCS 6.9.2 with KMOD 10.0.4.1613

 

RHEL 8 (UEK R7)

      • 5.15.0-0.30.19.el8uek
      • 5.15.0-1.43.4.1.el8uek
      • 5.15.0-2.52.3.el8uek
      • 5.15.0-3.60.5.1.el8uek
      • 5.15.0-4.70.5.2.el8uek
      • 5.15.0-5.76.5.1.el8uek

 

RHEL 8 (UEK R6)

      • 5.4.17-2136.312.3.4.el8uek

New kernel support is added to the following Linux platforms for DCS 6.9.2 with KMOD 10.0.4.1616:

 

RHEL 7 (UEK R6)

    • 5.4.17-2136.312.3.4.el7uek

 

Rocky Linux 9.1

    • 5.14.0-162.6.1.el9_1.0.1

 

For a full listing of all Linux distributions certified* by Symantec engineering, please access the List of kernels supported in DCS 6.9.2 
Visit our Symantec Data Center Security on-line help for more assistance.

 

 

New kernel support is added to the following Linux platforms for DCS 6.9.1 with KMOD 10.0.4.1613

RHEL 8 (UEK R7)

      • 5.15.0-0.30.19.el8uek
      • 5.15.0-1.43.4.1.el8uek
      • 5.15.0-2.52.3.el8uek
      • 5.15.0-3.60.5.1.el8uek
      • 5.15.0-4.70.5.2.el8uek
      • 5.15.0-5.76.5.1.el8uek

 

RHEL 8 (UEK R6)

      • 5.4.17-2136.312.3.4.el8uek

New kernel support is added to the following Linux platforms for DCS 6.9.1 with KMOD 10.0.4.1616:

 

RHEL 7 (UEK R6)

    • 5.4.17-2136.312.3.4.el7uek


For a full listing of all Linux distributions certified* by Symantec engineering, please access the List of kernels supported in DCS 6.9.1.
Visit our Symantec Data Center Security on-line help for more assistance.

 

 

New kernel support is added to the following Linux platforms for DCS 6.9.0 with KMOD 10.0.4.1613

RHEL 8 (UEK R7)

      • 5.15.0-0.30.19.el8uek
      • 5.15.0-1.43.4.1.el8uek
      • 5.15.0-2.52.3.el8uek
      • 5.15.0-3.60.5.1.el8uek
      • 5.15.0-4.70.5.2.el8uek
      • 5.15.0-5.76.5.1.el8uek

 

RHEL 8 (UEK R6)

      • 5.4.17-2136.312.3.4.el8uek

New kernel support is added to the following Linux platforms for DCS 6.9.0 with KMOD 10.0.1.1625:

 

RHEL 7 (UEK R6)

    • 5.4.17-2136.312.3.4.el7uek


For a full listing of all Linux distributions certified* by Symantec engineering, please access the List of kernels supported in DCS 6.9.0. 
Visit our Symantec Data Center Security on-line help for more assistance.

 

New kernel support is added to the following Linux platforms for DCS 6.8.2 with KMOD 10.0.0.1626:                                                                                                 

RHEL 8 (UEK R6)

    • 5.4.17-2136.312.3.4.el8uek

RHEL 7 (UEK R6)

    • 5.4.17-2136.312.3.4.el7uek

 

 

 

For a full listing of all Linux distributions certified* by Symantec engineering, please access the List of kernels supported in DCS 6.8.2.

 

Visit our Symantec Data Center Security on-line help for more assistance. 

 

Additional Information

NOTE:

For SLES-15 SP4 kernels: Fixed kernel crash and memory leaks observed in the ‘sisips’ driver in KMOD version 10.0.4.1608 onward. This impacts SLES 15 SP4 kernels.

Below is the sample stack trace seen in the crash:

PID: 3784 TASK: ffff910204622880 CPU: 1 COMMAND: "touch"
#0 [ffffa6aac22f36b8] machine_kexec at ffffffff8ae7b043
#1 [ffffa6aac22f3710] __crash_kexec at ffffffff8af7417d
#2 [ffffa6aac22f37d8] crash_kexec at ffffffff8af75050
#3 [ffffa6aac22f37e8] oops_end at ffffffff8ae3c244
#4 [ffffa6aac22f3808] page_fault_oops at ffffffff8ae8bd61
#5 [ffffa6aac22f3888] exc_page_fault at ffffffff8b7fcadc
#6 [ffffa6aac22f38b0] asm_exc_page_fault at ffffffff8ba00ace
[exception RIP: strlen]
RIP: ffffffff8b3747b0 RSP: ffffa6aac22f3968 RFLAGS: 00010282
RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: 0000000000000000
RDX: 0000000000000000 RSI: 00000000ffffffdc RDI: fffffffffffffffb
RBP: ffffa6aac22f3b60 R8: 0000000000000000 R9: ffffa6aac22f35f0
R10: ffffa6aac22f3838 R11: 0000000000000003 R12: 00000000ffffffff
R13: ffff91025b145000 R14: ffff9102150a0f00 R15: fffffffffffffffb
ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018
#7 [ffffa6aac22f3968] ReadSymLink at ffffffffc0961ef0 [sisips]
#8 [ffffa6aac22f3b68] _Z12UnixRealPathPKcS0_PcPFiS0_S1_Eb at ffffffffc0994010 [sisips]
#9 [ffffa6aac22f3bc0] _ZL14GetFullPathCwdPKcS0_b at ffffffffc097fc97 [sisips]
#10 [ffffa6aac22f3bf8] _Z11GetFullPathiPKcS0_b at ffffffffc098068c [sisips]
#11 [ffffa6aac22f3c40] _ZL11GetFilePathiR10PathStringPKcP7Processb at ffffffffc096a931 [sisips]
#12 [ffffa6aac22f3c80] sisips_hook_sys_openat at ffffffffc096c60f [sisips]
#13 [ffffa6aac22f3d90] sisevt_hook_sys_openat at ffffffffc09ec869 [sisevt]

#14 [ffffa6aac22f3e50] do_syscall_64 at ffffffff8b7f913b
#15 [ffffa6aac22f3ea0] handle_mm_fault at ffffffff8b0aa897
#16 [ffffa6aac22f3ed8] do_user_addr_fault at ffffffff8ae8c75f
#17 [ffffa6aac22f3f28] exc_page_fault at ffffffff8b7fca97
#18 [ffffa6aac22f3f50] entry_SYSCALL_64_after_hwframe at ffffffff8ba0007c
RIP: 00007fca354d377d RSP: 00007ffff8b72340 RFLAGS: 00000246
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fca354d377d
RDX: 0000000000000941 RSI: 00007ffff8b73793 RDI: 00000000ffffff9c
RBP: 0000000000000000 R8: 0000000000000000 R9: 0000000000000001
R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000002
R13: 00007ffff8b73793 R14: 0000000000000000 R15: 0000000000000001
ORIG_RAX: 0000000000000101 CS: 0033 SS: 002b


 * On average, Symantec engineering certifies new Linux kernel modules every two weeks. In some cases, certifying certain Linux kernel modules may take longer.