lp:~kmously/ubuntu/+source/linux/+git/xenial

Owned by Khaled El Mously
Get this repository:
git clone https://git.launchpad.net/~kmously/ubuntu/+source/linux/+git/xenial
Only Khaled El Mously can upload to this repository. If you are Khaled El Mously please log in for upload directions.

Branches

Name Last Modified Last Commit
update-to-4.4.185 2019-07-17 04:31:39 UTC 2019-07-17
Linux 4.4.185

Author: Greg Kroah-Hartman
Author Date: 2019-07-10 07:56:45 UTC

Linux 4.4.185

BugLink: https://bugs.launchpad.net/bugs/1836668

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

update-to-4.4.184 2019-07-17 04:30:04 UTC 2019-07-17
Linux 4.4.184

Author: Greg Kroah-Hartman
Author Date: 2019-06-27 00:13:33 UTC

Linux 4.4.184

BugLink: https://bugs.launchpad.net/bugs/1836667

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

update-to-4.4.183 2019-07-17 04:26:44 UTC 2019-07-17
Linux 4.4.183

Author: Greg Kroah-Hartman
Author Date: 2019-06-22 06:18:27 UTC

Linux 4.4.183

BugLink: https://bugs.launchpad.net/bugs/1836666

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

update-to-4.4.182 2019-07-16 00:50:08 UTC 2019-07-16
Linux 4.4.182

Author: Greg Kroah-Hartman
Author Date: 2019-06-17 17:54:23 UTC

Linux 4.4.182

BugLink: https://bugs.launchpad.net/bugs/1836665

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

update-to-4.4.181 2019-06-18 04:04:10 UTC 2019-06-18
Linux 4.4.181

Author: Greg Kroah-Hartman
Author Date: 2019-06-11 10:24:13 UTC

Linux 4.4.181

BugLink: https://bugs.launchpad.net/bugs/1832661

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

temp-raspi2 2019-01-17 23:51:11 UTC 2019-01-17
UBUNTU: [CONFIG]: remove BCH_CONST_PARAMS=y

Author: Khaled El Mously
Author Date: 2019-01-16 06:42:21 UTC

UBUNTU: [CONFIG]: remove BCH_CONST_PARAMS=y

BugLink: https://bugs.launchpad.net/bugs/1810947

This option changed due to a change in xenial-master.

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

temp1 2019-01-13 23:11:50 UTC 2019-01-13
netfilter: nf_conncount: don't skip eviction when age is negative

Author: Florian Westphal
Author Date: 2019-01-10 03:32:00 UTC

netfilter: nf_conncount: don't skip eviction when age is negative

BugLink: https://bugs.launchpad.net/bugs/1811094

age is signed integer, so result can be negative when the timestamps
have a large delta. In this case we want to discard the entry.

Instead of using age >= 2 || age < 0, just make it unsigned.

Fixes: b36e4523d4d56 ("netfilter: nf_conncount: fix garbage collection confirm race")
Reviewed-by: Shawn Bohrer <sbohrer@cloudflare.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
(backported from commit 4cd273bb91b3001f623f516ec726c49754571b1a)
[mfo: backport: use older file name, nf_conncount.c -> xt_connlimit.c]
Signed-off-by: Mauricio Faria de Oliveira <mfo@canonical.com>
Acked-by: Khalid Elmously <khalid.elmously@canonical.com>
Acked-by: Stefan Bader <stefan.bader@canonical.com>
Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>

temp-aws 2018-10-26 01:20:58 UTC 2018-10-26
UBUNTU: Start new release

Author: Khaled El Mously
Author Date: 2018-10-25 23:28:10 UTC

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

xenial-gcp-khaled 2018-08-30 14:19:56 UTC 2018-08-30
UBUNTU: Ubuntu-gcp-4.15.0-1019.20~16.04.1

Author: Khaled El Mously
Author Date: 2018-08-30 14:19:56 UTC

UBUNTU: Ubuntu-gcp-4.15.0-1019.20~16.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

xenial-gcp-kleber 2018-08-30 09:44:12 UTC 2018-08-30
UBUNTU: Ubuntu-gcp-4.15.0-1019.20~16.04.1

Author: Kleber Sacilotto de Souza
Author Date: 2018-08-30 09:44:12 UTC

UBUNTU: Ubuntu-gcp-4.15.0-1019.20~16.04.1

Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>

update-to-141 2018-07-31 05:46:43 UTC 2018-07-31
UBUNTU: FIXME

Author: Khaled El Mously
Author Date: 2018-07-31 05:16:39 UTC

UBUNTU: FIXME

BugLink: https://bugs.launchpad.net/bugs/1784543

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

ml-patches 2018-07-24 00:43:18 UTC 2018-07-24
xfs: don't call xfs_da_shrink_inode with NULL bp

Author: Eric Sandeen
Author Date: 2018-07-16 04:44:49 UTC

xfs: don't call xfs_da_shrink_inode with NULL bp

CVE-2018-13094

xfs_attr3_leaf_create may have errored out before instantiating a buffer,
for example if the blkno is out of range. In that case there is no work
to do to remove it, and in fact xfs_da_shrink_inode will lead to an oops
if we try.

This also seems to fix a flaw where the original error from
xfs_attr3_leaf_create gets overwritten in the cleanup case, and it
removes a pointless assignment to bp which isn't used after this.

Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=199969
Reported-by: Xu, Wen <wen.xu@gatech.edu>
Tested-by: Xu, Wen <wen.xu@gatech.edu>
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Reviewed-by: Darrick J. Wong <darrick.wong@oracle.com>
Signed-off-by: Darrick J. Wong <darrick.wong@oracle.com>
(cherry picked from commit bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a)
Signed-off-by: Po-Hsu Lin <po-hsu.lin@canonical.com>
Acked-by: Colin Ian King <colin.king@canonical.com>
Acked-by: Aaron Ma <aaron.ma@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

update-to-133 2018-06-07 23:21:39 UTC 2018-06-07
Linux 4.4.133

Author: Greg Kroah-Hartman
Author Date: 2018-05-26 06:49:01 UTC

Linux 4.4.133

BugLink: https://bugs.launchpad.net/bugs/1775477

Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
Acked-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

snapdragon-review 2018-04-27 05:25:30 UTC 2018-04-27
UBUNTU: Ubuntu-snapdragon-4.4.0-1091.96

Author: Khaled El Mously
Author Date: 2018-04-27 05:25:30 UTC

UBUNTU: Ubuntu-snapdragon-4.4.0-1091.96

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

aws-review 2018-04-27 02:48:45 UTC 2018-04-27
UBUNTU: Ubuntu-aws-4.4.0-1056.65

Author: Khaled El Mously
Author Date: 2018-04-27 02:48:45 UTC

UBUNTU: Ubuntu-aws-4.4.0-1056.65

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

kvm-review 2018-04-26 04:53:11 UTC 2018-04-26
UBUNTU: Ubuntu-kvm-4.4.0-1022.27

Author: Khaled El Mously
Author Date: 2018-04-26 04:49:14 UTC

UBUNTU: Ubuntu-kvm-4.4.0-1022.27

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

master-next-backlog 2018-02-28 17:46:25 UTC 2018-02-28
netfilter: nfnetlink_cthelper: Add missing permission checks

Author: Kevin Cernekee
Author Date: 2018-02-01 10:29:26 UTC

netfilter: nfnetlink_cthelper: Add missing permission checks

The capability check in nfnetlink_rcv() verifies that the caller
has CAP_NET_ADMIN in the namespace that "owns" the netlink socket.
However, nfnl_cthelper_list is shared by all net namespaces on the
system. An unprivileged user can create user and net namespaces
in which he holds CAP_NET_ADMIN to bypass the netlink_net_capable()
check:

    $ nfct helper list
    nfct v1.4.4: netlink error: Operation not permitted
    $ vpnns -- nfct helper list
    {
            .name = ftp,
            .queuenum = 0,
            .l3protonum = 2,
            .l4protonum = 6,
            .priv_data_len = 24,
            .status = enabled,
    };

Add capable() checks in nfnetlink_cthelper, as this is cleaner than
trying to generalize the solution.

Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>

CVE-2017-17448
(backported from commit 4b380c42f7d00a395feede754f0bc2292eebe6e5)
Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
Acked-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>
Acked-by: Seth Forshee <seth.forshee@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

master-next 2017-11-13 17:27:54 UTC 2017-11-13
UBUNTU: Ubuntu-4.4.0-101.124

Author: Khaled El Mously
Author Date: 2017-11-13 17:27:54 UTC

UBUNTU: Ubuntu-4.4.0-101.124

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

118 of 18 results
This repository contains Public information 
Everyone can see this information.

Subscribers