[linux] 01/02: Update to 4.2-rc6

debian-kernel at lists.debian.org debian-kernel at lists.debian.org
Wed Aug 12 16:50:00 UTC 2015


This is an automated email from the git hooks/post-receive script.

benh pushed a commit to branch master
in repository linux.

commit 5058702df6b973247922d70b6517a1cf365ecca5
Author: Ben Hutchings <ben at decadent.org.uk>
Date:   Tue Aug 11 20:20:40 2015 +0200

    Update to 4.2-rc6
---
 debian/changelog                                   |  2 +-
 .../md-use-kzalloc-when-bitmap-is-disabled.patch   | 68 ----------------------
 .../patches/debian/yama-disable-by-default.patch   |  4 +-
 .../features/all/aufs4/aufs4-standalone.patch      |  8 +--
 .../all/grsecurity/grkernsec_perf_harden.patch     |  6 +-
 debian/patches/series                              |  2 -
 6 files changed, 10 insertions(+), 80 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index 3311480..87a6523 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,4 +1,4 @@
-linux (4.2~rc5-1~exp1) UNRELEASED; urgency=medium
+linux (4.2~rc6-1~exp1) UNRELEASED; urgency=medium
 
   * New upstream release candidate
 
diff --git a/debian/patches/bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch b/debian/patches/bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch
deleted file mode 100644
index 9fbf18a..0000000
--- a/debian/patches/bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch
+++ /dev/null
@@ -1,68 +0,0 @@
-From: Benjamin Randazzo <benjamin at randazzo.fr>
-Date: Sat, 25 Jul 2015 16:36:50 +0200
-Subject: md: use kzalloc() when bitmap is disabled
-Origin: http://git.neil.brown.name/?p=md.git;a=commit;h=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4
-
-In drivers/md/md.c get_bitmap_file() uses kmalloc() for creating a
-mdu_bitmap_file_t called "file".
-
-5769         file = kmalloc(sizeof(*file), GFP_NOIO);
-5770         if (!file)
-5771                 return -ENOMEM;
-
-This structure is copied to user space at the end of the function.
-
-5786         if (err == 0 &&
-5787             copy_to_user(arg, file, sizeof(*file)))
-5788                 err = -EFAULT
-
-But if bitmap is disabled only the first byte of "file" is initialized
-with zero, so it's possible to read some bytes (up to 4095) of kernel
-space memory from user space. This is an information leak.
-
-5775         /* bitmap disabled, zero the first byte and copy out */
-5776         if (!mddev->bitmap_info.file)
-5777                 file->pathname[0] = '\0';
-
-Signed-off-by: Benjamin Randazzo <benjamin at randazzo.fr>
-Signed-off-by: NeilBrown <neilb at suse.com>
----
- drivers/md/md.c | 22 +++++++++++-----------
- 1 file changed, 11 insertions(+), 11 deletions(-)
-
---- a/drivers/md/md.c
-+++ b/drivers/md/md.c
-@@ -5759,22 +5759,22 @@ static int get_bitmap_file(struct mddev
- 	char *ptr;
- 	int err;
- 
--	file = kmalloc(sizeof(*file), GFP_NOIO);
-+	file = kzalloc(sizeof(*file), GFP_NOIO);
- 	if (!file)
- 		return -ENOMEM;
- 
- 	err = 0;
- 	spin_lock(&mddev->lock);
--	/* bitmap disabled, zero the first byte and copy out */
--	if (!mddev->bitmap_info.file)
--		file->pathname[0] = '\0';
--	else if ((ptr = file_path(mddev->bitmap_info.file,
--			       file->pathname, sizeof(file->pathname))),
--		 IS_ERR(ptr))
--		err = PTR_ERR(ptr);
--	else
--		memmove(file->pathname, ptr,
--			sizeof(file->pathname)-(ptr-file->pathname));
-+	/* bitmap enabled */
-+	if (mddev->bitmap_info.file) {
-+		ptr = file_path(mddev->bitmap_info.file, file->pathname,
-+				sizeof(file->pathname));
-+		if (IS_ERR(ptr))
-+			err = PTR_ERR(ptr);
-+		else
-+			memmove(file->pathname, ptr,
-+				sizeof(file->pathname)-(ptr-file->pathname));
-+	}
- 	spin_unlock(&mddev->lock);
- 
- 	if (err == 0 &&
diff --git a/debian/patches/debian/yama-disable-by-default.patch b/debian/patches/debian/yama-disable-by-default.patch
index 8477b56..cc5392f 100644
--- a/debian/patches/debian/yama-disable-by-default.patch
+++ b/debian/patches/debian/yama-disable-by-default.patch
@@ -15,9 +15,9 @@ Forwarded: not-needed
  
  /* describe a ptrace relationship for potential exception */
  struct ptrace_relation {
-@@ -407,7 +407,7 @@ static __init int yama_init(void)
- 	if (!security_module_enable("yama"))
+@@ -408,7 +408,7 @@ static __init int yama_init(void)
  		return 0;
+ 	yama_add_hooks();
  #endif
 -	pr_info("Yama: becoming mindful.\n");
 +	pr_info("Yama: disabled by default; enable with sysctl kernel.yama.*\n");
diff --git a/debian/patches/features/all/aufs4/aufs4-standalone.patch b/debian/patches/features/all/aufs4/aufs4-standalone.patch
index c69921b..2bdc0a4 100644
--- a/debian/patches/features/all/aufs4/aufs4-standalone.patch
+++ b/debian/patches/features/all/aufs4/aufs4-standalone.patch
@@ -22,7 +22,7 @@ aufs4.x-rcN standalone patch
   * Search for at least 1 mount point in the dentry's subdirs.
 --- a/fs/file_table.c
 +++ b/fs/file_table.c
-@@ -146,6 +146,7 @@ over:
+@@ -147,6 +147,7 @@ over:
  	}
  	return ERR_PTR(-ENFILE);
  }
@@ -30,13 +30,13 @@ aufs4.x-rcN standalone patch
  
  /**
   * alloc_file - allocate and initialize a 'struct file'
-@@ -307,6 +308,7 @@ void put_filp(struct file *file)
+@@ -308,6 +309,7 @@ void put_filp(struct file *file)
  		file_free(file);
  	}
  }
 +EXPORT_SYMBOL_GPL(put_filp);
  
- void __init files_init(unsigned long mempages)
+ void __init files_init(void)
  { 
 --- a/fs/inode.c
 +++ b/fs/inode.c
@@ -126,7 +126,7 @@ aufs4.x-rcN standalone patch
  
  int fsnotify_add_mark(struct fsnotify_mark *mark, struct fsnotify_group *group,
  		      struct inode *inode, struct vfsmount *mnt, int allow_dups)
-@@ -455,6 +458,7 @@ void fsnotify_init_mark(struct fsnotify_
+@@ -475,6 +478,7 @@ void fsnotify_init_mark(struct fsnotify_
  	atomic_set(&mark->refcnt, 1);
  	mark->free_mark = free_mark;
  }
diff --git a/debian/patches/features/all/grsecurity/grkernsec_perf_harden.patch b/debian/patches/features/all/grsecurity/grkernsec_perf_harden.patch
index 6b1622a..d178bcc 100644
--- a/debian/patches/features/all/grsecurity/grkernsec_perf_harden.patch
+++ b/debian/patches/features/all/grsecurity/grkernsec_perf_harden.patch
@@ -10,7 +10,7 @@ This standalone version doesn't include making the variable read-only
 ---
 --- a/include/linux/perf_event.h
 +++ b/include/linux/perf_event.h
-@@ -851,6 +851,11 @@ extern int perf_cpu_time_max_percent_han
+@@ -898,6 +898,11 @@ extern int perf_cpu_time_max_percent_han
  		loff_t *ppos);
  
  
@@ -24,7 +24,7 @@ This standalone version doesn't include making the variable read-only
  	return sysctl_perf_event_paranoid > -1;
 --- a/kernel/events/core.c
 +++ b/kernel/events/core.c
-@@ -172,8 +172,13 @@ static struct srcu_struct pmus_srcu;
+@@ -174,8 +174,13 @@ static struct srcu_struct pmus_srcu;
   *   0 - disallow raw tracepoint access for unpriv
   *   1 - disallow cpu events for unpriv
   *   2 - disallow kernel profiling for unpriv
@@ -38,7 +38,7 @@ This standalone version doesn't include making the variable read-only
  
  /* Minimum for 512 kiB + 1 user control page */
  int sysctl_perf_event_mlock __read_mostly = 512 + (PAGE_SIZE / 1024); /* 'free' kiB per user */
-@@ -7892,6 +7897,11 @@ SYSCALL_DEFINE5(perf_event_open,
+@@ -7904,6 +7909,11 @@ SYSCALL_DEFINE5(perf_event_open,
  	if (flags & ~PERF_FLAG_ALL)
  		return -EINVAL;
  
diff --git a/debian/patches/series b/debian/patches/series
index f76418e..b6c1074 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -79,8 +79,6 @@ bugfix/all/kernel-doc-set-man-page-date.patch
 # Miscellaneous features
 features/all/efi-autoload-efi-pstore.patch
 
-bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch
-
 # Hardening from grsecurity
 features/all/grsecurity/grsecurity-kconfig.patch
 # Disabled until we add code into the grsecurity/ directory

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git



More information about the Kernel-svn-changes mailing list