Commit Graph

4159 Commits

Author SHA1 Message Date
Salvatore Bonaccorso 1c972fdf40 Update patch headers with git-format-patch-for-debian
Gbp-Dch: Ignore
2018-12-27 09:12:24 +01:00
Salvatore Bonaccorso 7fb96c41ce USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data (CVE-2018-19985) 2018-12-27 09:00:59 +01:00
Ben Hutchings 217f4b61cc Add Forwarded field to powerpcspe build fix 2018-12-26 15:36:48 +00:00
Ben Hutchings 130a6a563b [riscv64] tools uapi: fix RISC-V 64-bit support
Apply Aurelien's patch instead of mine.
2018-12-26 01:44:33 +00:00
Ben Hutchings 6a75ed21c7 [powerpcspe] Fix -mcpu= options for SPE-only compiler 2018-12-26 00:06:02 +00:00
Ben Hutchings 64e3d0683d [riscv64] tools/include/.../bitsperlong.h: Add support for riscv 2018-12-25 23:02:20 +00:00
Ben Hutchings b051222e6d Change Origin fields for ena patches from bare commit hashes to URLs 2018-12-25 19:51:45 +00:00
Salvatore Bonaccorso 6886800dea iomap: Revert "fs/iomap.c: get/put the page in iomap_page_create/release()" 2018-12-21 23:14:53 +01:00
Salvatore Bonaccorso 6d099e7212 Update to 4.19.11
Drop ARM-dts-bcm2837-Fix-polarity-of-wifi-reset-GPIOs.patch

Cleanup debian/changelog file
2018-12-20 08:51:48 +01:00
Bastian Blank a484545688 Merge branch 'noahm/linux-4.19.5+ena202' into sid
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

See merge request kernel-team/linux!77
2018-12-18 21:14:09 +01:00
Uwe Kleine-König 12e23cb061 [arm] Fix reset polarity of the wifi device on Raspberry Pi 3 2018-12-18 20:32:51 +01:00
Noah Meyerhans 3024a2d70d drivers/net/ethernet/amazon: Backport v2.0.2 from Linux 4.20
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

This mostly ammounts to cherry-picking the commits in the range described by
git log v4.19.5..v4.20-rc7 drivers/net/ethernet/amazon

Change e641e99f261f5203a911a9e0db54a214460d2cc4 introduced changes outside the
ena directory, but only removed a redundant #include and was trivial to scope
down.

Upstream dealt with merge conflicts in
d864991b220b7c62e81d21209e1fd978fd67352c; the resolution here was identical to
upstream.
2018-12-17 23:47:08 -08:00
Uwe Kleine-König a48b719088 [arm] Fix probing of 3rd gpio device on Armada 370. 2018-12-17 11:30:59 +01:00
Hans van Kranenburg 4d63e6ccbb [x86] Support booting a Xen PVH guest via Grub2
tl;dr: Xen PVH is the perfect upgrade path from PV and in combination
with grub2 support, it's the Xen "killer feature" we really should have
in Buster.

    Background info about Xen PVH:
https://wiki.xen.org/wiki/Virtualization_Spectrum#Almost_fully_PV:_PVH_mode

PVH mode in Xen, a.k.a. "HVM without having to run qemu" is a Xen guest
type best supported since Xen 4.11 and Linux kernel 4.17. Just like when
using PV mode, the guest does not have an emulated BIOS and the guest
kernel is directly started by the dom0. Buster will ship with Xen 4.11.

   Why is PVH interesting?

1. When the whole Meltdown/Spectre story started, it quickly became
apparent that 64-bit PV is the most problematic virtualization mode to
protect and to protect from, since address space from the hypervisor and
other guests (including dom0) is reachable from a 64-bit PV domU. To
mitigate this, XPTI (the Xen variant of PTI) has been implemented in the
hypervisor, but with a performance hit. HVM (so, also PVH) guests are
better isolated from the hypervisor and other guests. Inside the guest a
choice can be made about which mitigations to enable or not.  Also see
https://xenbits.xen.org/xsa/advisory-254.html

2. Unlike HVM, it's not needed to have a boot loader/sector, partitions,
and a qemu process in the dom0 (using cpu and memory and having an
attack surface).  Also, when running a largeish amount of domUs on a
physical server, not having all the qemu processes is an advantage.

3. Unlike PV, PVH makes use of all hardware features that accelerate
virtualization.

   The upgrade path from PV to PVH is super optimal. It's just setting
type='pvh' in the guest file and doing a full restart of the domU!

Unless... (insert Monty Python's Dramatic Chord!)

Unless... grub2 was used to boot the PV guests.

   Why is it interesting to be able to use grub?

Without using grub in between, the guest kernel and initrd have to be
copied out of the guest onto the dom0 filesystem, because the guest has
to be booted with them directly.  Currently, we already have the
grub-xen packages in Debian, which provide grub images which can be used
as kernel for a PV guest, after which it can load the actual linux
kernel that is symlinked from /vmlinuz on the guest filesystem at that
moment.

The final changes to the Linux kernel for grub+PVH are in Linux 4.20.
This request, to carry a few patches from Linux 4.20, provides one half
of the dots that need to be connected to make the full thing happen for
Buster.

Since we'll have Xen 4.11 in Buster, PVH is supported. The related grub2
patchset was committed to the grub master branch on Dec 12 2018 (yup,
today). So, I'll also start contacting the debian grub team soon to ask
(and help) to get the current grub-xen functionality in Debian to be
extended with PVH capabilities as well.

Test reports:
https://lists.xenproject.org/archives/html/xen-devel/2018-10/msg01913.html
https://lists.xenproject.org/archives/html/xen-devel/2018-11/msg03312.html
2018-12-14 16:55:04 +01:00
Salvatore Bonaccorso dfa9b24000 Update to 4.19.9
Drop vhost-vsock-fix-use-after-free-in-network-stack-call.patch

Cleanup debian/changelog file
2018-12-13 09:42:28 +01:00
Hans van Kranenburg edc7c6ee64 [x86] Fix booting as Xen dom0
This patch is from the tip repo, and will show up in 4.19 later.
2018-12-12 15:57:21 +01:00
Ben Hutchings 17d52832bc Merge branch 'libbpf-pr' into 'master'
Add libbpf0, libbpf-dev packages (#914428)

See merge request kernel-team/linux!74
2018-12-09 21:40:33 +00:00
Ben Hutchings a5cdd1f2cb Merge branch 'master' of salsa.debian.org:nsc-guest/linux 2018-12-08 18:58:30 +00:00
Salvatore Bonaccorso d7534bd9b6 vhost/vsock: fix use-after-free in network stack callers (CVE-2018-14625) 2018-12-08 15:40:45 +01:00
Hilko Bengen 4f1f7c5735 Add patches to build libbpf.so with SONAME, link against libelf 2018-12-08 15:02:05 +01:00
Nicolas Schier 3436e1c735
ovl: permit overlayfs mounts in user namespaces (Closes: #913880)
Permit overlayfs mounts within user namespaces to allow utilisation of e.g.
unprivileged LXC overlay snapshots.

Except by the Ubuntu community [1], overlayfs mounts in user namespaces are
expected to be a security risk [2] and thus are not enabled on upstream
Linux kernels.  For the non-Ubuntu users that have to stick to unprivileged
overlay-based LXCs, this meant to patch and compile the kernel manually.
Instead, adding the kernel tainting 'permit_mounts_in_userns' module
parameter allows a kind of a user-friendly way to enable the feature.

Testable with:

    sudo modprobe overlay permit_mounts_in_userns=1
    sudo sysctl -w kernel.unprivileged_userns_clone=1
    mkdir -p lower upper work mnt
    unshare --map-root-user --mount \
        mount -t overlay none mnt \
              -o lowerdir=lower,upperdir=upper,workdir=work

[1]: Ubuntu allows unprivileged mounting of overlay filesystem
https://lists.ubuntu.com/archives/kernel-team/2014-February/038091.html

[2]: User namespaces + overlayfs = root privileges
https://lwn.net/Articles/671641/

Signed-off-by: Nicolas Schier <nicolas@fjasle.eu>
2018-12-08 12:34:31 +00:00
Salvatore Bonaccorso 014c728272 Update to 4.19.8
Drop patches applied upstream in 4.19.8

Cleanup debian/changelog file

Add CVE id for CVE-2018-18397
2018-12-08 13:27:04 +01:00
Salvatore Bonaccorso 4237db03be blk-mq: punt failed direct issue to dispatch list 2018-12-08 11:28:12 +01:00
Salvatore Bonaccorso 771f295a0f blk-mq: fix corruption with direct issue
Closes: #915666
2018-12-06 17:39:15 +01:00
Romain Perier 5222653db6 Update to 4.19.7 2018-12-05 19:59:32 +01:00
Salvatore Bonaccorso 37094dbb55 [x86] KVM: LAPIC: Fix pv ipis use-before-initialization (CVE-2018-19406) 2018-12-03 21:11:24 +01:00
Ben Hutchings 64dab5b29a libcpupower: Hide private function and drop it from .symbols file
This avoids an FTBFS after this function was renamed in 4.19.6.
2018-12-02 19:23:13 +00:00
Ben Hutchings e6434a5655 Documentation/media: uapi: Explicitly say there are no Invariant Sections
Closes: #698668

This clarification has now been signed-off by the upstream authors.
2018-11-23 19:31:06 +00:00
Ben Hutchings c20b784198 Release linux (4.18.20-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAlv18cwACgkQ57/I7JWG
 EQnmrBAA0cIq67bC0g/calV1FyAnByc88h15W2BCN8+dD25PKRlsRsbSvQLx/E6J
 mEwPMu6bw/yJuIA8ADTFpjh4CmulBhQMC/cpQHy82F5umt/wNAPlhryDc0n96eRX
 bJfh3dzboyFEWBOSUgb6EWEdWZX1tMblf4ZpX1LfP5L/pJyq/Jz1xrpz31nGcz9E
 2m4mpovTAT2N34I9FF9PSuaYlPxljU/eZe7wyDmM+leMnmV4MGEOpV+CMNEohLsp
 8APxTJim6ZJXJ4ppl/Qk7yW1glTL3q5OqI+s5YB4RBKI4KBN/N3FF0PwWQ+L76bj
 B6b3nKT4PZA4V6Y6OEY8Q53NxjHmRJo5opG9Xp3Kr4HO0PZHH9Ih/YApaZipSDLg
 t3i/C05I/Jss2e6FZ5Ocx9L/nhzoEv9Lt0K2P6nxMJgc5U7lcTaiehcrVqQ2oBhO
 QZoEwUh9G8p5dnll/MTf3nj4UzZOimr2RSpktNT8w4kBEVAFFfZL5hGdk1UmBQTu
 peAPksjndtfjWvvzlhnWu3JoFMZ+J5yA8l7t8HwKI5yIlfJaM4QbjOb8YqsZQRNR
 qUxXxgn85o7QdSlCX/JFSK5fBxRphZHDtyWt9wTp1Ko0PjNtHLGv2oWj+SdvrJWu
 X0otIjqlEMMVCcZDlrzXboU6Cxae9FGXk6yzM5QfE1/D7F4tEuI=
 =E5AV
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.20-1'

Release linux (4.18.20-1).

* [rt] Drop all changes from 4.18-rt
* Drop added patches which are already in 4.19
* Drop ABI bump
2018-11-22 00:28:54 +00:00
Ben Hutchings 397f2ab6e1 Update to 4.19.3 2018-11-22 00:15:29 +00:00
Ben Hutchings 561dac67f3 Update to 4.18.20
* Drop patches applied upstream
* Refresh "arm64: add kernel config option to lock down when in Secure
  Boot mode"
2018-11-21 20:41:44 +00:00
Romain Perier 8008ae41de Update to 4.19.2 2018-11-16 21:22:52 +01:00
Salvatore Bonaccorso 7fb2e63e99 cdrom: fix improper type cast, which can leat to information leak (CVE-2018-18710) 2018-10-29 22:04:01 +01:00
Salvatore Bonaccorso 5f66f9439a mremap: properly flush TLB before releasing the page (CVE-2018-18281) 2018-10-29 22:01:56 +01:00
Romain Perier 540db7a99c Update to 4.18.14
This updates the debian changelog for listing changes of this stable
update, including removal of cherry picked commits applied on upstream.
2018-10-21 21:04:32 +02:00
Romain Perier 63b0a73429 Update to 4.18.13 2018-10-21 09:31:01 +02:00
Salvatore Bonaccorso 3448bce542 bpf: 32-bit RSH verification must truncate input before the ALU op (CVE-2018-18445) 2018-10-20 22:45:49 +02:00
Salvatore Bonaccorso b2e84defa2 [x86] swiotlb: Enable swiotlb for > 4GiG RAM on 32-bit kernels
Closes: #908924
2018-10-20 21:27:48 +02:00
Vagrant Cascadian 07cd30904b [arm64] Update pinebook/teres-i device-tree patches to 4.19.x:
- Enables the lid to wakeup from suspend.
2018-10-18 19:59:22 -07:00
Romain Perier 2c351aeb14 Update to 4.18.12
This updates to 4.18.12, including removal of applied upstream patches.
This also disables rt until 4.18.12-rt7 is integrated to this package
2018-10-15 20:14:39 +02:00
Romain Perier eba87a92ee Update to 4.18.11 2018-10-15 19:23:03 +02:00
Ben Hutchings 88995ec002 linux-perf: Fix BPF feature detection 2018-10-08 19:06:09 +01:00
Ben Hutchings a2764e86a2 Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
Closes: #909813
2018-10-07 21:56:58 +01:00
Ben Hutchings 272a938bb7 xen-netback: fix input validation in xenvif_set_hash_mapping() (CVE-2018-15471) 2018-10-07 21:29:25 +01:00
Salvatore Bonaccorso 2db297e8f5 [arm64] KVM: Sanitize PSTATE.M when being set from userspace (CVE-2018-18021) 2018-10-07 08:37:42 +02:00
Salvatore Bonaccorso 20bad055e2 [arm64] KVM: Tighten guest core register access from userspace (CVE-2018-18021) 2018-10-07 08:30:32 +02:00
Ben Hutchings 79ecbb0832 Release linux (4.18.10-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAluyLtYACgkQ57/I7JWG
 EQkvcBAAl2AxUxQKDRyS4mgohOa881NpHGdwfcxIXyEVIsPVVtUE+Dg5dzGku/J2
 C1iA6R8tbOZuxOWQbNkGTFZml3JjfcikH21EGD1aqq5z1PmRudA/XBXdl2aItMUi
 lV6HMQcG4GWTjMC/cwrxW5D7rrIqGfp+CCAiACheGbK7mrwAwpioCP3u4JUQm0+F
 kGU4znfQbCScXtoegAwRBHB5nUWRbKZMHMe4vNgVl4Na5wTy4dL4Eh3qWulwOzGx
 94OiJPsV9thctA6vusqrub5DpABjQveDPJyHt2EgvAt2W8MrE/NUiU+4ol2tTNcT
 Ev4P66Jz2bmr3pisx5Cz+3fUXcesrllvWJx5RxPV8f4gCj4/A3zNNz0UdcqcIR/h
 ptTMM9fDC8srz6bnKSYWSii3cmnxMVx5OjNztaoeJMFY6M7rn58rW9e53pkVWeJf
 eKZ27T7RvNMoGDr99u10ca+zb8qBygxQBQea1rKL49T2Jl/5ROkkPvoQ0SNT5kIe
 DL9Z7MDwBI5H5kQW7e9jCiOH65PG/DeVwddko3FeHQy9INxgd6toKiiU0HM4U+8Y
 lsUbuAHRHeVsuLQ1U5YTFHrG56CjqYeU10A7UnxRbqvIOd2MTfp/4fAcM4X+15yZ
 2Q1MRd/fCXIlRBMGfGRnNMX9327/I+XQ8kamktE5H55JWF+KyeI=
 =eMi7
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.10-1'

Release linux (4.18.10-1).

- Drop new patches that are already included upstream
- Keep ABI number set to "trunk"
- Refresh arm64 APEI workaround patch for 4.19
2018-10-01 15:37:28 +01:00
Romain Perier 14d9845760 Update to 4.18.10
This updates the debian changelog for listing changes of this stable
update. It also removes patches applied upstream and refreshes a patch
that is part of 4.18.7-rt5.
2018-09-30 16:01:44 +02:00
Salvatore Bonaccorso 7b1a277680 scsi: target: iscsi: Use bin2hex instead of a re-implementation 2018-09-27 21:20:47 +02:00
Salvatore Bonaccorso 7ceb71a555 scsi: target: iscsi: Use hex2bin instead of a re-implementation (CVE-2018-14633) 2018-09-27 21:19:15 +02:00