~dannf/ubuntu/+source/linux/+git/yakkety:lp1633629

Last commit made on 2016-10-20
Get this branch:
git clone -b lp1633629 https://git.launchpad.net/~dannf/ubuntu/+source/linux/+git/yakkety
Only dann frazier can upload to this branch. If you are dann frazier please log in for upload directions.

Branch merges

Branch information

Name:
lp1633629
Repository:
lp:~dannf/ubuntu/+source/linux/+git/yakkety

Recent commits

6a25e2d... by Ard Biesheuvel

arm64: kaslr: fix breakage with CONFIG_MODVERSIONS=y

BugLink: http://bugs.launchpad.net/bugs/1633629

As it turns out, the KASLR code breaks CONFIG_MODVERSIONS, since the
kcrctab has an absolute address field that is relocated at runtime
when the kernel offset is randomized.

This has been fixed already for PowerPC in the past, so simply wire up
the existing code dealing with this issue.

Cc: <email address hidden>
Fixes: f80fb3a3d508 ("arm64: add support for kernel ASLR")
Tested-by: Timur Tabi <email address hidden>
Signed-off-by: Ard Biesheuvel <email address hidden>
Signed-off-by: Will Deacon <email address hidden>
(cherry picked from commit 9c0e83c371cf4696926c95f9c8c77cd6ea803426)
Signed-off-by: dann frazier <email address hidden>

ab6e4aa... by Stefan Bader

UBUNTU: Ubuntu-4.8.0-26.28

Signed-off-by: Stefan Bader <email address hidden>

3124589... by Linus Torvalds <email address hidden>

UBUNTU: SAUCE: mm: remove gup_flags FOLL_WRITE games from __get_user_pages()

This is an ancient bug that was actually attrempted to be fixed once
(badly) by me eleven years ago in commit 4ceb5db9757a ("Fix
get_user_pages() race for write access") but that was then undone due to
problems on s390 by commit f33ea7f404e5 ("fix get_user_pages bug").

In the meantime, the s390 situation has long been fixed, and we can once
more try to fix it by checking the pte_dirty() bit properly (and do it
better). Also, the VM has become more scalable, and what was a purely
theoretical race back then has become easier to trigger.

To fix it, we introduce a new internal FOLL_COW flag to mark the "yes,
we already did a COW" rather than play racy games with FOLL_WRITE that
is very fundamental, and then use the pte dirty flag to validate that
the FOLL_COW flag is still valid.

Reported-and-tested-by: Phil "not Paul" Oester <email address hidden>
Cc: Michal Hocko <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Kees Cook <email address hidden>
Cc: Oleg Nesterov <email address hidden>
Cc: Willy Tarreau <w@1wt.eu>
Acked-by: Hugh Dickins <email address hidden>
Cc: Nick Piggin <email address hidden>
Cc: Greg Thelen <email address hidden>
Cc: <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>

CVE-2016-5195

Signed-off-by: Seth Forshee <email address hidden>
Acked-by: Andy Whitcroft <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

6be75df... by Stefan Bader

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Stefan Bader <email address hidden>

8689648... by Andy Whitcroft

UBUNTU: Ubuntu-4.8.0-22.24

Signed-off-by: Andy Whitcroft <email address hidden>

95a9b04... by Sabrina Dubroca <email address hidden>

UBUNTU: SAUCE: net: add recursion limit to GRO

Currently, GRO can do unlimited recursion through the gro_receive
handlers. This was fixed for tunneling protocols by limiting tunnel GRO
to one level with encap_mark, but both VLAN and TEB still have this
problem. Thus, the kernel is vulnerable to a stack overflow, if we
receive a packet composed entirely of VLAN headers.

This patch adds a recursion counter to the GRO layer to prevent stack
overflow. When a gro_receive function hits the recursion limit, GRO is
aborted for this skb and it is processed normally.

Fixes: 9b174d88c257 ("net: Add Transparent Ethernet Bridging GRO support.")
Fixes: 66e5133f19e9 ("vlan: Add GRO support for non hardware accelerated vlan")
Signed-off-by: Sabrina Dubroca <email address hidden>
Reviewed-by: Jiri Benc <email address hidden>
Acked-by: Hannes Frederic Sowa <email address hidden>
BugLink: http://bugs.launchpad.net/bugs/1631287
Signed-off-by: Andy Whitcroft <email address hidden>

ad37107... by Tim Gardner

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Tim Gardner <email address hidden>

e0a673c... by Tim Gardner

UBUNTU: Ubuntu-4.8.0-21.23

Signed-off-by: Tim Gardner <email address hidden>

4ed02f6... by Tim Gardner

Revert "Revert "powerpc: Simplify module TOC handling""

BugLink: http://bugs.launchpad.net/bugs/1628968

This reverts commit c3e101c66fcea73fce1e18a61b58129c24da127f.

This patch fixes a failure to load modules on powerpc-generic.

Signed-off-by: Tim Gardner <email address hidden>
Acked-by: Andy Whitcroft <email address hidden>

f8f23df... by John Johansen

UBUNTU: SAUCE: apparmor: add flag to detect semantic change, to binfmt_elf mmap

commit 9f834ec18defc369d73ccf9e87a2790bfa05bf46 changed when the creds
are installed by the binfmt_elf handler. This affects which creds
are used to mmap the executable into the address space. Which can have
an affect on apparmor policy.

Add a flag to apparmor at
/sys/kernel/security/apparmor/features/domain/fix_binfmt_elf_mmap

to make it possible to detect this semantic change so that the userspace
tools and the regression test suite can correctly deal with the change.

Note: since 9f834ec1 is a potential information leak fix for prof
events and tracing, it is expected that it could be picked up by
kernels earlier kernels than 4.8 so that detecting the kernel version
is not sufficient.

BugLink: http://bugs.launchpad.net/bugs/1630069
Signed-off-by: John Johansen <email address hidden>
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>