~lavanyahm/ubuntu/+source/linux/+git/bionic:master-prep

Last commit made on 2023-01-20
Get this branch:
git clone -b master-prep https://git.launchpad.net/~lavanyahm/ubuntu/+source/linux/+git/bionic
Only Lavanya H M can upload to this branch. If you are Lavanya H M please log in for upload directions.

Branch merges

Branch information

Name:
master-prep
Repository:
lp:~lavanyahm/ubuntu/+source/linux/+git/bionic

Recent commits

a3eb066... by Stefan Bader

UBUNTU: Ubuntu-4.15.0-204.215

Signed-off-by: Stefan Bader <email address hidden>

13ff22d... by Stefan Bader

UBUNTU: link-to-tracker: update tracking bug

BugLink: https://bugs.launchpad.net/bugs/2003522
Properties: no-test-build
Signed-off-by: Stefan Bader <email address hidden>

c82a140... by Dimitri John Ledkov

UBUNTU: [Packaging] Revoke and rotate to new signing key

BugLink: https://bugs.launchpad.net/bugs/2002812

Update revocations, which match the next Ubuntu shim v15.7
revocations. Specifically - revoke certs that were previously
protected with by-hash revocations, revoke lost/unused certificates.

Kernels with this patch applied should be signed using ubuntu/4 pro/3
core/2 signing streams.

TPM PCR values and measurements will change when changing the signing
key.

Signed-off-by: Dimitri John Ledkov <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Luke Nowakowski-Krijger <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

d7db721... by Stefan Bader

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Stefan Bader <email address hidden>

69f3d12... by Luke Nowakowski-Krijger

UBUNTU: Ubuntu-4.15.0-203.214

Signed-off-by: Luke Nowakowski-Krijger <email address hidden>

b4dbafc... by Luke Nowakowski-Krijger

UBUNTU: link-to-tracker: update tracking bug

BugLink: https://bugs.launchpad.net/bugs/2001876
Properties: no-test-build
Signed-off-by: Luke Nowakowski-Krijger <email address hidden>

841734a... by Luke Nowakowski-Krijger

UBUNTU: [Packaging] update helper scripts

BugLink: https://bugs.launchpad.net/bugs/1786013
Signed-off-by: Luke Nowakowski-Krijger <email address hidden>

dadc94c... by Kamal Mostafa

UBUNTU: Upstream stable to v4.14.298, v4.19.264

BugLink: https://bugs.launchpad.net/bugs/1998542

Ignore: yes
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

4c4bfd0... by Sylwester Dziedziuch <email address hidden>

i40e: Fix VF hang when reset is triggered on another VF

BugLink: https://bugs.launchpad.net/bugs/1998542

[ Upstream commit 52424f974bc53c26ba3f00300a00e9de9afcd972 ]

When a reset was triggered on one VF with i40e_reset_vf
global PF state __I40E_VF_DISABLE was set on a PF until
the reset finished. If immediately after triggering reset
on one VF there is a request to reset on another
it will cause a hang on VF side because VF will be notified
of incoming reset but the reset will never happen because
of this global state, we will get such error message:

[ +4.890195] iavf 0000:86:02.1: Never saw reset

and VF will hang waiting for the reset to be triggered.

Fix this by introducing new VF state I40E_VF_STATE_RESETTING
that will be set on a VF if it is currently resetting instead of
the global __I40E_VF_DISABLE PF state.

Fixes: 3ba9bcb4b68f ("i40e: add locking around VF reset")
Signed-off-by: Sylwester Dziedziuch <email address hidden>
Signed-off-by: Mateusz Palczewski <email address hidden>
Tested-by: Konrad Jankowski <email address hidden>
Signed-off-by: Jacob Keller <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Jakub Kicinski <email address hidden>
Signed-off-by: Sasha Levin <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

c3f4f1e... by Zhengchao Shao <email address hidden>

net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed

BugLink: https://bugs.launchpad.net/bugs/1998542

[ Upstream commit d266935ac43d57586e311a087510fe6a084af742 ]

When the ops_init() interface is invoked to initialize the net, but
ops->init() fails, data is released. However, the ptr pointer in
net->gen is invalid. In this case, when nfqnl_nf_hook_drop() is invoked
to release the net, invalid address access occurs.

The process is as follows:
setup_net()
 ops_init()
  data = kzalloc(...) ---> alloc "data"
  net_assign_generic() ---> assign "date" to ptr in net->gen
  ...
  ops->init() ---> failed
  ...
  kfree(data); ---> ptr in net->gen is invalid
 ...
 ops_exit_list()
  ...
  nfqnl_nf_hook_drop()
   *q = nfnl_queue_pernet(net) ---> q is invalid

The following is the Call Trace information:
BUG: KASAN: use-after-free in nfqnl_nf_hook_drop+0x264/0x280
Read of size 8 at addr ffff88810396b240 by task ip/15855
Call Trace:
<TASK>
dump_stack_lvl+0x8e/0xd1
print_report+0x155/0x454
kasan_report+0xba/0x1f0
nfqnl_nf_hook_drop+0x264/0x280
nf_queue_nf_hook_drop+0x8b/0x1b0
__nf_unregister_net_hook+0x1ae/0x5a0
nf_unregister_net_hooks+0xde/0x130
ops_exit_list+0xb0/0x170
setup_net+0x7ac/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
</TASK>

Allocated by task 15855:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
__kasan_kmalloc+0xa1/0xb0
__kmalloc+0x49/0xb0
ops_init+0xe7/0x410
setup_net+0x5aa/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0

Freed by task 15855:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
kasan_save_free_info+0x2a/0x40
____kasan_slab_free+0x155/0x1b0
slab_free_freelist_hook+0x11b/0x220
__kmem_cache_free+0xa4/0x360
ops_init+0xb9/0x410
setup_net+0x5aa/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0

Fixes: f875bae06533 ("net: Automatically allocate per namespace data.")
Signed-off-by: Zhengchao Shao <email address hidden>
Signed-off-by: David S. Miller <email address hidden>
Signed-off-by: Sasha Levin <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>