~ubuntu-kernel/ubuntu/+source/linux/+git/wily:mako

Last commit made on 2015-11-06
Get this branch:
git clone -b mako https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/wily
Members of Ubuntu Kernel Repositories can upload to this branch. Log in for directions.

Branch merges

Branch information

Recent commits

e44a34c... by Tim Gardner

UBUNTU: Ubuntu-mako-3.4.0-7.41

Signed-off-by: Tim Gardner <email address hidden>

2c505b7... by Kyle Fazzari

Subject: UBUNTU: [Config] Replace EXT{2,3} with EXT4_USE_FOR_EXT23.

BugLink: https://bugs.launchpad.net/bugs/1513463

The kernel has grown too large to fit on the Mako boot
partition. This config change makes it smaller without
losing any functionality due to making use of EXT4's
backward-compatibility.

Signed-off-by: Kyle Fazzari <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

630c6c0... by Kyle Fazzari

Subject: UBUNTU: [Config] Enable squashfs for mako.

BugLink: https://bugs.launchpad.net/bugs/1513207

These config changes were copied from the trusty kernel, though
BCJ filter decoding was only enabled for ARM.

Signed-off-by: Kyle Fazzari <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

1eecd60... by Tim Gardner

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Tim Gardner <email address hidden>

7dd2f9a... by Tim Gardner

UBUNTU: Ubuntu-mako-3.4.0-7.40

Signed-off-by: Tim Gardner <email address hidden>

1eb1e5d... by Kyle Fazzari

UBUNTU: SAUCE: Add seccomp selftests.

BugLink: http://bugs.launchpad.net/bugs/1509489

Taken from the history of https://github.com/redpig/seccomp. This
has been deprecated in favor of the tests in mainline (which are
based on this repository), but the mainline tests include tests
for the seccomp syscall and tsync, neither of which are included
in this backport.

Signed-off-by: Kyle Fazzari <email address hidden>
Acked-by: Kamal Mostafa <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

2d53c75... by Will Drewry <email address hidden>

ARM: 7580/1: arch/select HAVE_ARCH_SECCOMP_FILTER

BugLink: http://bugs.launchpad.net/bugs/1509489

Reflect architectural support for seccomp filter.

Signed-off-by: Will Drewry <email address hidden>
Signed-off-by: Kees Cook <email address hidden>
Reviewed-by: Will Deacon <email address hidden>
Signed-off-by: Russell King <email address hidden>
(backported from commit 4095ccc39ed91714d3b5172f16a9aebf30bbbea9)
Signed-off-by: Kyle Fazzari <email address hidden>
Acked-by: Kamal Mostafa <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

cd16780... by Kees Cook

ARM: 7579/1: arch/allow a scno of -1 to not cause a SIGILL

BugLink: http://bugs.launchpad.net/bugs/1509489

On tracehook-friendly platforms, a system call number of -1 falls
through without running much code or taking much action.

ARM is different. This adds a short-circuit check in the trace path to
avoid any additional work, as suggested by Russell King, to make sure
that ARM behaves the same way as other platforms.

Signed-off-by: Kees Cook <email address hidden>
Acked-by: Will Drewry <email address hidden>
Reviewed-by: Will Deacon <email address hidden>
Signed-off-by: Russell King <email address hidden>
(backported from commit ad75b51459ae076a0d406391496f81b897bf6992)
Signed-off-by: Kyle Fazzari <email address hidden>
Acked-by: Kamal Mostafa <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

ab42504... by Kees Cook

ARM: 7578/1: arch/move secure_computing into trace

BugLink: http://bugs.launchpad.net/bugs/1509489

There is very little difference in the TIF_SECCOMP and TIF_SYSCALL_WORK
path in entry-common.S, so merge TIF_SECCOMP into TIF_SYSCALL_WORK and
move seccomp into the syscall_trace_enter() handler.

Expanded some of the tracehook logic into the callers to make this code
more readable. Since tracehook needs to do register changing, this portion
is best left in its own function instead of copy/pasting into the callers.

Additionally, the return value for secure_computing() is now checked
and a -1 value will result in the system call being skipped.

Signed-off-by: Kees Cook <email address hidden>
Acked-by: Will Drewry <email address hidden>
Reviewed-by: Will Deacon <email address hidden>
Signed-off-by: Russell King <email address hidden>
(backported from commit 9b790d71d58be65f9508ab60920eb978af828412)
[ kyle: backport to Ubuntu-mako-3.4: Applied patch without
  _TIF_SYSCALL_TRACEPOINT support. ]
Signed-off-by: Kyle Fazzari <email address hidden>
Acked-by: Kamal Mostafa <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

46587e9... by Will Drewry <email address hidden>

ARM: 7577/1: arch/add syscall_get_arch

BugLink: http://bugs.launchpad.net/bugs/1509489

Provide an ARM implementation of syscall_get_arch. This is a pre-requisite
for CONFIG_HAVE_ARCH_SECCOMP_FILTER.

Signed-off-by: Will Drewry <email address hidden>
Signed-off-by: Kees Cook <email address hidden>
Reviewed-by: Will Deacon <email address hidden>
Signed-off-by: Russell King <email address hidden>
(backported from commit 1f59d13bee172945ccdfbc5018477ba94a0ac28e)
Signed-off-by: Kyle Fazzari <email address hidden>
Acked-by: Kamal Mostafa <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>