Commit Graph

3082 Commits

Author SHA1 Message Date
Ben Hutchings 64e3d0683d [riscv64] tools/include/.../bitsperlong.h: Add support for riscv 2018-12-25 23:02:20 +00:00
Salvatore Bonaccorso 6886800dea iomap: Revert "fs/iomap.c: get/put the page in iomap_page_create/release()" 2018-12-21 23:14:53 +01:00
Salvatore Bonaccorso 6d099e7212 Update to 4.19.11
Drop ARM-dts-bcm2837-Fix-polarity-of-wifi-reset-GPIOs.patch

Cleanup debian/changelog file
2018-12-20 08:51:48 +01:00
Bastian Blank a484545688 Merge branch 'noahm/linux-4.19.5+ena202' into sid
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

See merge request kernel-team/linux!77
2018-12-18 21:14:09 +01:00
Uwe Kleine-König 12e23cb061 [arm] Fix reset polarity of the wifi device on Raspberry Pi 3 2018-12-18 20:32:51 +01:00
Noah Meyerhans 3024a2d70d drivers/net/ethernet/amazon: Backport v2.0.2 from Linux 4.20
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

This mostly ammounts to cherry-picking the commits in the range described by
git log v4.19.5..v4.20-rc7 drivers/net/ethernet/amazon

Change e641e99f261f5203a911a9e0db54a214460d2cc4 introduced changes outside the
ena directory, but only removed a redundant #include and was trivial to scope
down.

Upstream dealt with merge conflicts in
d864991b220b7c62e81d21209e1fd978fd67352c; the resolution here was identical to
upstream.
2018-12-17 23:47:08 -08:00
Uwe Kleine-König a48b719088 [arm] Fix probing of 3rd gpio device on Armada 370. 2018-12-17 11:30:59 +01:00
Hans van Kranenburg 4d63e6ccbb [x86] Support booting a Xen PVH guest via Grub2
tl;dr: Xen PVH is the perfect upgrade path from PV and in combination
with grub2 support, it's the Xen "killer feature" we really should have
in Buster.

    Background info about Xen PVH:
https://wiki.xen.org/wiki/Virtualization_Spectrum#Almost_fully_PV:_PVH_mode

PVH mode in Xen, a.k.a. "HVM without having to run qemu" is a Xen guest
type best supported since Xen 4.11 and Linux kernel 4.17. Just like when
using PV mode, the guest does not have an emulated BIOS and the guest
kernel is directly started by the dom0. Buster will ship with Xen 4.11.

   Why is PVH interesting?

1. When the whole Meltdown/Spectre story started, it quickly became
apparent that 64-bit PV is the most problematic virtualization mode to
protect and to protect from, since address space from the hypervisor and
other guests (including dom0) is reachable from a 64-bit PV domU. To
mitigate this, XPTI (the Xen variant of PTI) has been implemented in the
hypervisor, but with a performance hit. HVM (so, also PVH) guests are
better isolated from the hypervisor and other guests. Inside the guest a
choice can be made about which mitigations to enable or not.  Also see
https://xenbits.xen.org/xsa/advisory-254.html

2. Unlike HVM, it's not needed to have a boot loader/sector, partitions,
and a qemu process in the dom0 (using cpu and memory and having an
attack surface).  Also, when running a largeish amount of domUs on a
physical server, not having all the qemu processes is an advantage.

3. Unlike PV, PVH makes use of all hardware features that accelerate
virtualization.

   The upgrade path from PV to PVH is super optimal. It's just setting
type='pvh' in the guest file and doing a full restart of the domU!

Unless... (insert Monty Python's Dramatic Chord!)

Unless... grub2 was used to boot the PV guests.

   Why is it interesting to be able to use grub?

Without using grub in between, the guest kernel and initrd have to be
copied out of the guest onto the dom0 filesystem, because the guest has
to be booted with them directly.  Currently, we already have the
grub-xen packages in Debian, which provide grub images which can be used
as kernel for a PV guest, after which it can load the actual linux
kernel that is symlinked from /vmlinuz on the guest filesystem at that
moment.

The final changes to the Linux kernel for grub+PVH are in Linux 4.20.
This request, to carry a few patches from Linux 4.20, provides one half
of the dots that need to be connected to make the full thing happen for
Buster.

Since we'll have Xen 4.11 in Buster, PVH is supported. The related grub2
patchset was committed to the grub master branch on Dec 12 2018 (yup,
today). So, I'll also start contacting the debian grub team soon to ask
(and help) to get the current grub-xen functionality in Debian to be
extended with PVH capabilities as well.

Test reports:
https://lists.xenproject.org/archives/html/xen-devel/2018-10/msg01913.html
https://lists.xenproject.org/archives/html/xen-devel/2018-11/msg03312.html
2018-12-14 16:55:04 +01:00
Salvatore Bonaccorso dfa9b24000 Update to 4.19.9
Drop vhost-vsock-fix-use-after-free-in-network-stack-call.patch

Cleanup debian/changelog file
2018-12-13 09:42:28 +01:00
Hans van Kranenburg edc7c6ee64 [x86] Fix booting as Xen dom0
This patch is from the tip repo, and will show up in 4.19 later.
2018-12-12 15:57:21 +01:00
Ben Hutchings 17d52832bc Merge branch 'libbpf-pr' into 'master'
Add libbpf0, libbpf-dev packages (#914428)

See merge request kernel-team/linux!74
2018-12-09 21:40:33 +00:00
Ben Hutchings a5cdd1f2cb Merge branch 'master' of salsa.debian.org:nsc-guest/linux 2018-12-08 18:58:30 +00:00
Salvatore Bonaccorso d7534bd9b6 vhost/vsock: fix use-after-free in network stack callers (CVE-2018-14625) 2018-12-08 15:40:45 +01:00
Hilko Bengen 4f1f7c5735 Add patches to build libbpf.so with SONAME, link against libelf 2018-12-08 15:02:05 +01:00
Nicolas Schier 3436e1c735
ovl: permit overlayfs mounts in user namespaces (Closes: #913880)
Permit overlayfs mounts within user namespaces to allow utilisation of e.g.
unprivileged LXC overlay snapshots.

Except by the Ubuntu community [1], overlayfs mounts in user namespaces are
expected to be a security risk [2] and thus are not enabled on upstream
Linux kernels.  For the non-Ubuntu users that have to stick to unprivileged
overlay-based LXCs, this meant to patch and compile the kernel manually.
Instead, adding the kernel tainting 'permit_mounts_in_userns' module
parameter allows a kind of a user-friendly way to enable the feature.

Testable with:

    sudo modprobe overlay permit_mounts_in_userns=1
    sudo sysctl -w kernel.unprivileged_userns_clone=1
    mkdir -p lower upper work mnt
    unshare --map-root-user --mount \
        mount -t overlay none mnt \
              -o lowerdir=lower,upperdir=upper,workdir=work

[1]: Ubuntu allows unprivileged mounting of overlay filesystem
https://lists.ubuntu.com/archives/kernel-team/2014-February/038091.html

[2]: User namespaces + overlayfs = root privileges
https://lwn.net/Articles/671641/

Signed-off-by: Nicolas Schier <nicolas@fjasle.eu>
2018-12-08 12:34:31 +00:00
Salvatore Bonaccorso 014c728272 Update to 4.19.8
Drop patches applied upstream in 4.19.8

Cleanup debian/changelog file

Add CVE id for CVE-2018-18397
2018-12-08 13:27:04 +01:00
Salvatore Bonaccorso 4237db03be blk-mq: punt failed direct issue to dispatch list 2018-12-08 11:28:12 +01:00
Salvatore Bonaccorso 771f295a0f blk-mq: fix corruption with direct issue
Closes: #915666
2018-12-06 17:39:15 +01:00
Romain Perier 5222653db6 Update to 4.19.7 2018-12-05 19:59:32 +01:00
Salvatore Bonaccorso 37094dbb55 [x86] KVM: LAPIC: Fix pv ipis use-before-initialization (CVE-2018-19406) 2018-12-03 21:11:24 +01:00
Ben Hutchings 64dab5b29a libcpupower: Hide private function and drop it from .symbols file
This avoids an FTBFS after this function was renamed in 4.19.6.
2018-12-02 19:23:13 +00:00
Ben Hutchings e6434a5655 Documentation/media: uapi: Explicitly say there are no Invariant Sections
Closes: #698668

This clarification has now been signed-off by the upstream authors.
2018-11-23 19:31:06 +00:00
Romain Perier 8008ae41de Update to 4.19.2 2018-11-16 21:22:52 +01:00
Ben Hutchings 79ecbb0832 Release linux (4.18.10-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAluyLtYACgkQ57/I7JWG
 EQkvcBAAl2AxUxQKDRyS4mgohOa881NpHGdwfcxIXyEVIsPVVtUE+Dg5dzGku/J2
 C1iA6R8tbOZuxOWQbNkGTFZml3JjfcikH21EGD1aqq5z1PmRudA/XBXdl2aItMUi
 lV6HMQcG4GWTjMC/cwrxW5D7rrIqGfp+CCAiACheGbK7mrwAwpioCP3u4JUQm0+F
 kGU4znfQbCScXtoegAwRBHB5nUWRbKZMHMe4vNgVl4Na5wTy4dL4Eh3qWulwOzGx
 94OiJPsV9thctA6vusqrub5DpABjQveDPJyHt2EgvAt2W8MrE/NUiU+4ol2tTNcT
 Ev4P66Jz2bmr3pisx5Cz+3fUXcesrllvWJx5RxPV8f4gCj4/A3zNNz0UdcqcIR/h
 ptTMM9fDC8srz6bnKSYWSii3cmnxMVx5OjNztaoeJMFY6M7rn58rW9e53pkVWeJf
 eKZ27T7RvNMoGDr99u10ca+zb8qBygxQBQea1rKL49T2Jl/5ROkkPvoQ0SNT5kIe
 DL9Z7MDwBI5H5kQW7e9jCiOH65PG/DeVwddko3FeHQy9INxgd6toKiiU0HM4U+8Y
 lsUbuAHRHeVsuLQ1U5YTFHrG56CjqYeU10A7UnxRbqvIOd2MTfp/4fAcM4X+15yZ
 2Q1MRd/fCXIlRBMGfGRnNMX9327/I+XQ8kamktE5H55JWF+KyeI=
 =eMi7
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.10-1'

Release linux (4.18.10-1).

- Drop new patches that are already included upstream
- Keep ABI number set to "trunk"
- Refresh arm64 APEI workaround patch for 4.19
2018-10-01 15:37:28 +01:00
Romain Perier 14d9845760 Update to 4.18.10
This updates the debian changelog for listing changes of this stable
update. It also removes patches applied upstream and refreshes a patch
that is part of 4.18.7-rt5.
2018-09-30 16:01:44 +02:00
Salvatore Bonaccorso 7b1a277680 scsi: target: iscsi: Use bin2hex instead of a re-implementation 2018-09-27 21:20:47 +02:00
Salvatore Bonaccorso 7ceb71a555 scsi: target: iscsi: Use hex2bin instead of a re-implementation (CVE-2018-14633) 2018-09-27 21:19:15 +02:00
Romain Perier 1353758acf Update to 4.19-rc5
This updates the changelogs and removes patches that have been applied
upstream.
2018-09-26 12:17:37 +02:00
Ben Hutchings f81ec680a5 Bump ABI to 2
- Drop ABI reference files and ABI maintenance patch
- Delete claim that ignoring ABI changes is a build fix
2018-09-25 22:22:56 +01:00
Ben Hutchings 5a77952e41 [i386/686] Enable MGEODE_LX instead of M686 (regression in 4.16)
- x86-32: Disable 3D-Now in generic config
2018-09-25 21:55:43 +01:00
Romain Perier 5ea1715db4 Update to 4.18.9
This updates the debian changelog for listing changes of this stable
update. It also removes patches applied upstream and refreshes a patch
that is part of 4.18.7-rt5.
2018-09-23 20:00:57 +02:00
Salvatore Bonaccorso d112adae70 f2fs: fix to do sanity check with secs_per_zone (CVE-2018-13100) 2018-09-22 17:31:48 +02:00
Salvatore Bonaccorso 310f694a6b f2fs: fix to do sanity check with reserved blkaddr of inline inode (CVE-2018-13099) 2018-09-22 17:28:29 +02:00
Salvatore Bonaccorso f46ed6ff17 floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (CVE-2018-7755) 2018-09-22 17:11:42 +02:00
Geoff Levand bf27abcb1c Add fixup for HPE m400 APEI firmware problems
Signed-off-by: Geoff Levand <geoff@infradead.org>

[bwh: Add Forwarded field and note the patch in debian/changelog]
2018-09-21 18:34:18 +01:00
Ben Hutchings 337682dc35 Release linux (4.18.8-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAluhDZUACgkQ57/I7JWG
 EQkLvQ//QqqAfJXjwZt3Iy+dcYieLqmhy4/KtjVvFP8EKSyfdeWl0awb3szbmMs5
 cy2p5q17mafVZTx9MCppp4y1modMBZrMC6hmB9UAoU0j1GnKHNbtddzA3+uo1dmw
 i2LudGseb8LSL5z6g95P4SozSNNeFPIOLSYxkGVnlG3sUdlhlRYCvYf9k8BKUEbx
 sU0yDXQOhf0kBLsRXW8QfJEBHv5ivr9/Q+s9e71NUpVWaEOZwgfJacM/QWcY8+J4
 2o0XlHtS9+r0Ik0RK5Zyt8eun1sH1cb4Lta9LZjvRLWpCqXNpPSus6V8qENngcyw
 X9ZGWi3nMiR4OOuEMGMxbzXXzWreg9MNPyM5/kVfJKlsLi1xP7ufhnstR+j2/tTJ
 guVLDw73B4RyOwH2p4Kh1Pk0hACagI9AeKfjSBTMMlv2rD6FDfuJlSgEYUIK/NLl
 lsefkkKu2EZVdhIBEGDnu80+V2AuoTYXpEknvbnvlYZ1wLNXb73GIFptWu18dfOy
 fZ4cEWDxuKd52nbsjKlQmaxlFGSfjmmWliorhrU84FZsRjvFARGWWPwnjk8fwcpD
 +D0GASqx37iw1gQK8yNQER3dxHzVh1blIKhADgEWJXsaeHcfyDHziShX7FZ8n6G5
 HQBaynaG0Qc9fWd8O6xmX6wsP/vGRFJchbWwa5Gd7L2cCmur1Vk=
 =lopf
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.8-1'

Release linux (4.18.8-1).

- Drop ABI reference files and ABI maintenance patch
- Replace ccp driver patch with upstream version that applies to 4.19
2018-09-18 15:49:53 +01:00
Ben Hutchings ee7d2e20ff Update to 4.18.8
- Drop security fixes included in it
- mm: Avoid ABI change in 4.18.7
2018-09-17 01:13:52 +01:00
Ben Hutchings 70cbc7d0ea Update to 4.19-rc4
Drop lockdep build fixes that were applied or obsoleted upstream.
2018-09-16 23:17:20 +01:00
Ben Hutchings 841b031a9f Revert "Revert "net: increase fragment memory usage limits""
4.19 includes a better fix for CVE-2018-5391.
2018-09-16 16:20:13 +01:00
Ben Hutchings d7423140dd Revert "i40e: Add kconfig dependency to ensure cmpxchg64() is available"
The bug that prompted this was fixed upstream in 4.17 by commit
8f769dd14a43 "i40e: re-number feature flags to remove gaps".
2018-09-16 16:13:00 +01:00
Romain Perier 2943a959c9 [x86] crypto: ccp: add timeout support in the SEV command (Closes: #908248) 2018-09-16 01:58:12 +01:00
Romain Perier 21f4f386c3 Update to 4.18.7
This updates the debian changelog for listing changes of this stable
update. It also removes patches that have been applied upstream.
2018-09-15 20:27:11 +01:00
Salvatore Bonaccorso f21b10d326 hfsplus: fix NULL dereference in hfsplus_lookup() (CVE-2018-14617) 2018-09-15 11:27:16 +02:00
Salvatore Bonaccorso f84af2d0a0 btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (CVE-2018-14609) 2018-09-15 11:19:09 +02:00
Ben Hutchings 07b57afec5 Move all patch generation scripts to debian/bin
Rename them to genpatch-{aufs,lockdown,rt}

Fixes lintian warning patch-file-present-but-not-mentioned-in-series.

Also preparation for using dgit, which will remove everything except
the main patch series under debian/patches.
2018-09-13 01:52:36 +01:00
Salvatore Bonaccorso e3cee898ab mac80211: don't update the PM state of a peer upon a multicast frame
Closes: #887045
Closes: #886292
2018-09-12 22:31:37 +02:00
Ben Hutchings 824debfd2e tools: turbostat: Add checks for failure of fgets() and fscanf() 2018-09-11 04:17:46 +01:00
Ben Hutchings 605745f58f tools: x86_energy_perf_policy: Fix "uninitialized variable" warnings at -O2 2018-09-11 04:17:45 +01:00
Ben Hutchings 70e8277e19 aufs: Update support patchset to aufs4.x-rcN 20180910 2018-09-10 20:13:33 +01:00
Romain Perier 428a3d136e Update to 4.18.6 2018-09-06 08:07:27 +02:00