~apw/ubuntu/+source/linux/+git/yakkety:master

Last commit made on 2016-10-18
Get this branch:
git clone -b master https://git.launchpad.net/~apw/ubuntu/+source/linux/+git/yakkety
Only Andy Whitcroft can upload to this branch. If you are Andy Whitcroft please log in for upload directions.

Branch merges

Branch information

Recent commits

ab6e4aa... by Stefan Bader

UBUNTU: Ubuntu-4.8.0-26.28

Signed-off-by: Stefan Bader <email address hidden>

3124589... by Linus Torvalds <email address hidden>

UBUNTU: SAUCE: mm: remove gup_flags FOLL_WRITE games from __get_user_pages()

This is an ancient bug that was actually attrempted to be fixed once
(badly) by me eleven years ago in commit 4ceb5db9757a ("Fix
get_user_pages() race for write access") but that was then undone due to
problems on s390 by commit f33ea7f404e5 ("fix get_user_pages bug").

In the meantime, the s390 situation has long been fixed, and we can once
more try to fix it by checking the pte_dirty() bit properly (and do it
better). Also, the VM has become more scalable, and what was a purely
theoretical race back then has become easier to trigger.

To fix it, we introduce a new internal FOLL_COW flag to mark the "yes,
we already did a COW" rather than play racy games with FOLL_WRITE that
is very fundamental, and then use the pte dirty flag to validate that
the FOLL_COW flag is still valid.

Reported-and-tested-by: Phil "not Paul" Oester <email address hidden>
Cc: Michal Hocko <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Kees Cook <email address hidden>
Cc: Oleg Nesterov <email address hidden>
Cc: Willy Tarreau <w@1wt.eu>
Acked-by: Hugh Dickins <email address hidden>
Cc: Nick Piggin <email address hidden>
Cc: Greg Thelen <email address hidden>
Cc: <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>

CVE-2016-5195

Signed-off-by: Seth Forshee <email address hidden>
Acked-by: Andy Whitcroft <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

6be75df... by Stefan Bader

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Stefan Bader <email address hidden>

8689648... by Andy Whitcroft

UBUNTU: Ubuntu-4.8.0-22.24

Signed-off-by: Andy Whitcroft <email address hidden>

95a9b04... by Sabrina Dubroca <email address hidden>

UBUNTU: SAUCE: net: add recursion limit to GRO

Currently, GRO can do unlimited recursion through the gro_receive
handlers. This was fixed for tunneling protocols by limiting tunnel GRO
to one level with encap_mark, but both VLAN and TEB still have this
problem. Thus, the kernel is vulnerable to a stack overflow, if we
receive a packet composed entirely of VLAN headers.

This patch adds a recursion counter to the GRO layer to prevent stack
overflow. When a gro_receive function hits the recursion limit, GRO is
aborted for this skb and it is processed normally.

Fixes: 9b174d88c257 ("net: Add Transparent Ethernet Bridging GRO support.")
Fixes: 66e5133f19e9 ("vlan: Add GRO support for non hardware accelerated vlan")
Signed-off-by: Sabrina Dubroca <email address hidden>
Reviewed-by: Jiri Benc <email address hidden>
Acked-by: Hannes Frederic Sowa <email address hidden>
BugLink: http://bugs.launchpad.net/bugs/1631287
Signed-off-by: Andy Whitcroft <email address hidden>

ad37107... by Tim Gardner

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Tim Gardner <email address hidden>

e0a673c... by Tim Gardner

UBUNTU: Ubuntu-4.8.0-21.23

Signed-off-by: Tim Gardner <email address hidden>

4ed02f6... by Tim Gardner

Revert "Revert "powerpc: Simplify module TOC handling""

BugLink: http://bugs.launchpad.net/bugs/1628968

This reverts commit c3e101c66fcea73fce1e18a61b58129c24da127f.

This patch fixes a failure to load modules on powerpc-generic.

Signed-off-by: Tim Gardner <email address hidden>
Acked-by: Andy Whitcroft <email address hidden>

f8f23df... by John Johansen

UBUNTU: SAUCE: apparmor: add flag to detect semantic change, to binfmt_elf mmap

commit 9f834ec18defc369d73ccf9e87a2790bfa05bf46 changed when the creds
are installed by the binfmt_elf handler. This affects which creds
are used to mmap the executable into the address space. Which can have
an affect on apparmor policy.

Add a flag to apparmor at
/sys/kernel/security/apparmor/features/domain/fix_binfmt_elf_mmap

to make it possible to detect this semantic change so that the userspace
tools and the regression test suite can correctly deal with the change.

Note: since 9f834ec1 is a potential information leak fix for prof
events and tracing, it is expected that it could be picked up by
kernels earlier kernels than 4.8 so that detecting the kernel version
is not sufficient.

BugLink: http://bugs.launchpad.net/bugs/1630069
Signed-off-by: John Johansen <email address hidden>
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

e93ebf8... by Seth Forshee

UBUNTU: SAUCE: (namespace) autofs4: Use real_cred for requestor's ids

BugLink: http://bugs.launchpad.net/bugs/1629204

autofs passes the uid and gid of the user requesting a mount to
userspace, taking them from current->cred. ca6fe3344554 "fs: Call
d_automount with the filesystems creds" causes a regression as
current->cred is now the credentials of real root during automount
and not the credentials of the user. Fix this by taking the ids
from current->real_cred instead.

Signed-off-by: Seth Forshee <email address hidden>
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>