diff options
| author | Alexandre Oliva <lxoliva@fsfla.org> | 2017-07-01 19:25:35 +0000 |
|---|---|---|
| committer | Alexandre Oliva <lxoliva@fsfla.org> | 2017-07-01 19:25:35 +0000 |
| commit | 2b0e3e1cfe772e52d297cd2772d977e29c3f128c (patch) | |
| tree | f4c7018038ee03760a72c0b1cee943b5eb3ebf03 | |
| parent | 341c23d8bfe0a6746043f6aabb1c16f699bc0013 (diff) | |
| download | linux-libre-raptor-2b0e3e1cfe772e52d297cd2772d977e29c3f128c.tar.gz linux-libre-raptor-2b0e3e1cfe772e52d297cd2772d977e29c3f128c.zip | |
4.11.7-100.fc24.gnu
29 files changed, 253 insertions, 976 deletions
diff --git a/freed-ora/current/f24/0001-netfilter-xtables-zero-padding-in-data_to_user.patch b/freed-ora/current/f24/0001-netfilter-xtables-zero-padding-in-data_to_user.patch new file mode 100644 index 000000000..b23e387a6 --- /dev/null +++ b/freed-ora/current/f24/0001-netfilter-xtables-zero-padding-in-data_to_user.patch @@ -0,0 +1,116 @@ +From b1a27013a72d5744be6510c05b86e1b9dd605012 Mon Sep 17 00:00:00 2001 +From: Willem de Bruijn <willemb@google.com> +Date: Tue, 9 May 2017 16:17:37 -0400 +Subject: [PATCH 1/2] netfilter: xtables: zero padding in data_to_user + +When looking up an iptables rule, the iptables binary compares the +aligned match and target data (XT_ALIGN). In some cases this can +exceed the actual data size to include padding bytes. + +Before commit f77bc5b23fb1 ("iptables: use match, target and data +copy_to_user helpers") the malloc()ed bytes were overwritten by the +kernel with kzalloced contents, zeroing the padding and making the +comparison succeed. After this patch, the kernel copies and clears +only data, leaving the padding bytes undefined. + +Extend the clear operation from data size to aligned data size to +include the padding bytes, if any. + +Padding bytes can be observed in both match and target, and the bug +triggered, by issuing a rule with match icmp and target ACCEPT: + + iptables -t mangle -A INPUT -i lo -p icmp --icmp-type 1 -j ACCEPT + iptables -t mangle -D INPUT -i lo -p icmp --icmp-type 1 -j ACCEPT + +Fixes: f77bc5b23fb1 ("iptables: use match, target and data copy_to_user helpers") +Reported-by: Paul Moore <pmoore@redhat.com> +Reported-by: Richard Guy Briggs <rgb@redhat.com> +Signed-off-by: Willem de Bruijn <willemb@google.com> +Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> +--- + include/linux/netfilter/x_tables.h | 2 +- + net/bridge/netfilter/ebtables.c | 9 ++++++--- + net/netfilter/x_tables.c | 9 ++++++--- + 3 files changed, 13 insertions(+), 7 deletions(-) + +diff --git a/include/linux/netfilter/x_tables.h b/include/linux/netfilter/x_tables.h +index be378cf..b3044c2c 100644 +--- a/include/linux/netfilter/x_tables.h ++++ b/include/linux/netfilter/x_tables.h +@@ -294,7 +294,7 @@ int xt_match_to_user(const struct xt_entry_match *m, + int xt_target_to_user(const struct xt_entry_target *t, + struct xt_entry_target __user *u); + int xt_data_to_user(void __user *dst, const void *src, +- int usersize, int size); ++ int usersize, int size, int aligned_size); + + void *xt_copy_counters_from_user(const void __user *user, unsigned int len, + struct xt_counters_info *info, bool compat); +diff --git a/net/bridge/netfilter/ebtables.c b/net/bridge/netfilter/ebtables.c +index 79b6991..656c259 100644 +--- a/net/bridge/netfilter/ebtables.c ++++ b/net/bridge/netfilter/ebtables.c +@@ -1358,7 +1358,8 @@ static inline int ebt_obj_to_user(char __user *um, const char *_name, + strlcpy(name, _name, sizeof(name)); + if (copy_to_user(um, name, EBT_FUNCTION_MAXNAMELEN) || + put_user(datasize, (int __user *)(um + EBT_FUNCTION_MAXNAMELEN)) || +- xt_data_to_user(um + entrysize, data, usersize, datasize)) ++ xt_data_to_user(um + entrysize, data, usersize, datasize, ++ XT_ALIGN(datasize))) + return -EFAULT; + + return 0; +@@ -1643,7 +1644,8 @@ static int compat_match_to_user(struct ebt_entry_match *m, void __user **dstptr, + if (match->compat_to_user(cm->data, m->data)) + return -EFAULT; + } else { +- if (xt_data_to_user(cm->data, m->data, match->usersize, msize)) ++ if (xt_data_to_user(cm->data, m->data, match->usersize, msize, ++ COMPAT_XT_ALIGN(msize))) + return -EFAULT; + } + +@@ -1672,7 +1674,8 @@ static int compat_target_to_user(struct ebt_entry_target *t, + if (target->compat_to_user(cm->data, t->data)) + return -EFAULT; + } else { +- if (xt_data_to_user(cm->data, t->data, target->usersize, tsize)) ++ if (xt_data_to_user(cm->data, t->data, target->usersize, tsize, ++ COMPAT_XT_ALIGN(tsize))) + return -EFAULT; + } + +diff --git a/net/netfilter/x_tables.c b/net/netfilter/x_tables.c +index 14857af..afb02fd 100644 +--- a/net/netfilter/x_tables.c ++++ b/net/netfilter/x_tables.c +@@ -283,12 +283,13 @@ static int xt_obj_to_user(u16 __user *psize, u16 size, + &U->u.user.revision, K->u.kernel.TYPE->revision) + + int xt_data_to_user(void __user *dst, const void *src, +- int usersize, int size) ++ int usersize, int size, int aligned_size) + { + usersize = usersize ? : size; + if (copy_to_user(dst, src, usersize)) + return -EFAULT; +- if (usersize != size && clear_user(dst + usersize, size - usersize)) ++ if (usersize != aligned_size && ++ clear_user(dst + usersize, aligned_size - usersize)) + return -EFAULT; + + return 0; +@@ -298,7 +299,9 @@ EXPORT_SYMBOL_GPL(xt_data_to_user); + #define XT_DATA_TO_USER(U, K, TYPE, C_SIZE) \ + xt_data_to_user(U->data, K->data, \ + K->u.kernel.TYPE->usersize, \ +- C_SIZE ? : K->u.kernel.TYPE->TYPE##size) ++ C_SIZE ? : K->u.kernel.TYPE->TYPE##size, \ ++ C_SIZE ? COMPAT_XT_ALIGN(C_SIZE) : \ ++ XT_ALIGN(K->u.kernel.TYPE->TYPE##size)) + + int xt_match_to_user(const struct xt_entry_match *m, + struct xt_entry_match __user *u) +-- +2.7.5 + diff --git a/freed-ora/current/f24/0002-netfilter-xtables-fix-build-failure-from-COMPAT_XT_A.patch b/freed-ora/current/f24/0002-netfilter-xtables-fix-build-failure-from-COMPAT_XT_A.patch new file mode 100644 index 000000000..7786bf9d8 --- /dev/null +++ b/freed-ora/current/f24/0002-netfilter-xtables-fix-build-failure-from-COMPAT_XT_A.patch @@ -0,0 +1,92 @@ +From d6b664f7f350dafd604fd014de20ea8e0f25b3b3 Mon Sep 17 00:00:00 2001 +From: Willem de Bruijn <willemb@google.com> +Date: Wed, 17 May 2017 11:24:47 -0400 +Subject: [PATCH 2/2] netfilter: xtables: fix build failure from + COMPAT_XT_ALIGN outside CONFIG_COMPAT + +The patch in the Fixes references COMPAT_XT_ALIGN in the definition +of XT_DATA_TO_USER, outside an #ifdef CONFIG_COMPAT block. + +Split XT_DATA_TO_USER into separate compat and non compat variants and +define the first inside an CONFIG_COMPAT block. + +This simplifies both variants by removing branches inside the macro. + +Fixes: 324318f0248c ("netfilter: xtables: zero padding in data_to_user") +Reported-by: Stephen Rothwell <sfr@canb.auug.org.au> +Signed-off-by: Willem de Bruijn <willemb@google.com> +Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> +--- + net/netfilter/x_tables.c | 21 +++++++++++++-------- + 1 file changed, 13 insertions(+), 8 deletions(-) + +diff --git a/net/netfilter/x_tables.c b/net/netfilter/x_tables.c +index afb02fd..32488c0 100644 +--- a/net/netfilter/x_tables.c ++++ b/net/netfilter/x_tables.c +@@ -296,18 +296,17 @@ int xt_data_to_user(void __user *dst, const void *src, + } + EXPORT_SYMBOL_GPL(xt_data_to_user); + +-#define XT_DATA_TO_USER(U, K, TYPE, C_SIZE) \ ++#define XT_DATA_TO_USER(U, K, TYPE) \ + xt_data_to_user(U->data, K->data, \ + K->u.kernel.TYPE->usersize, \ +- C_SIZE ? : K->u.kernel.TYPE->TYPE##size, \ +- C_SIZE ? COMPAT_XT_ALIGN(C_SIZE) : \ +- XT_ALIGN(K->u.kernel.TYPE->TYPE##size)) ++ K->u.kernel.TYPE->TYPE##size, \ ++ XT_ALIGN(K->u.kernel.TYPE->TYPE##size)) + + int xt_match_to_user(const struct xt_entry_match *m, + struct xt_entry_match __user *u) + { + return XT_OBJ_TO_USER(u, m, match, 0) || +- XT_DATA_TO_USER(u, m, match, 0); ++ XT_DATA_TO_USER(u, m, match); + } + EXPORT_SYMBOL_GPL(xt_match_to_user); + +@@ -315,7 +314,7 @@ int xt_target_to_user(const struct xt_entry_target *t, + struct xt_entry_target __user *u) + { + return XT_OBJ_TO_USER(u, t, target, 0) || +- XT_DATA_TO_USER(u, t, target, 0); ++ XT_DATA_TO_USER(u, t, target); + } + EXPORT_SYMBOL_GPL(xt_target_to_user); + +@@ -614,6 +613,12 @@ void xt_compat_match_from_user(struct xt_entry_match *m, void **dstptr, + } + EXPORT_SYMBOL_GPL(xt_compat_match_from_user); + ++#define COMPAT_XT_DATA_TO_USER(U, K, TYPE, C_SIZE) \ ++ xt_data_to_user(U->data, K->data, \ ++ K->u.kernel.TYPE->usersize, \ ++ C_SIZE, \ ++ COMPAT_XT_ALIGN(C_SIZE)) ++ + int xt_compat_match_to_user(const struct xt_entry_match *m, + void __user **dstptr, unsigned int *size) + { +@@ -629,7 +634,7 @@ int xt_compat_match_to_user(const struct xt_entry_match *m, + if (match->compat_to_user((void __user *)cm->data, m->data)) + return -EFAULT; + } else { +- if (XT_DATA_TO_USER(cm, m, match, msize - sizeof(*cm))) ++ if (COMPAT_XT_DATA_TO_USER(cm, m, match, msize - sizeof(*cm))) + return -EFAULT; + } + +@@ -984,7 +989,7 @@ int xt_compat_target_to_user(const struct xt_entry_target *t, + if (target->compat_to_user((void __user *)ct->data, t->data)) + return -EFAULT; + } else { +- if (XT_DATA_TO_USER(ct, t, target, tsize - sizeof(*ct))) ++ if (COMPAT_XT_DATA_TO_USER(ct, t, target, tsize - sizeof(*ct))) + return -EFAULT; + } + +-- +2.7.5 + diff --git a/freed-ora/current/f24/baseconfig/CONFIG_SERIAL_8250_PCI b/freed-ora/current/f24/baseconfig/CONFIG_SERIAL_8250_PCI index d48086e3e..c0ac5637f 100644 --- a/freed-ora/current/f24/baseconfig/CONFIG_SERIAL_8250_PCI +++ b/freed-ora/current/f24/baseconfig/CONFIG_SERIAL_8250_PCI @@ -1 +1 @@ -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y diff --git a/freed-ora/current/f24/kernel-aarch64-debug.config b/freed-ora/current/f24/kernel-aarch64-debug.config index 37567937c..6472aa5e1 100644 --- a/freed-ora/current/f24/kernel-aarch64-debug.config +++ b/freed-ora/current/f24/kernel-aarch64-debug.config @@ -4757,7 +4757,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-aarch64.config b/freed-ora/current/f24/kernel-aarch64.config index 803da6a85..52a6855f8 100644 --- a/freed-ora/current/f24/kernel-aarch64.config +++ b/freed-ora/current/f24/kernel-aarch64.config @@ -4735,7 +4735,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-armv7hl-debug.config b/freed-ora/current/f24/kernel-armv7hl-debug.config index dcfed3e28..7962c73e8 100644 --- a/freed-ora/current/f24/kernel-armv7hl-debug.config +++ b/freed-ora/current/f24/kernel-armv7hl-debug.config @@ -5143,7 +5143,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 CONFIG_SERIAL_8250_OMAP=m -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-armv7hl-lpae-debug.config b/freed-ora/current/f24/kernel-armv7hl-lpae-debug.config index 065347a10..788237d5a 100644 --- a/freed-ora/current/f24/kernel-armv7hl-lpae-debug.config +++ b/freed-ora/current/f24/kernel-armv7hl-lpae-debug.config @@ -4855,7 +4855,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-armv7hl-lpae.config b/freed-ora/current/f24/kernel-armv7hl-lpae.config index 4a73fbc42..643d9e163 100644 --- a/freed-ora/current/f24/kernel-armv7hl-lpae.config +++ b/freed-ora/current/f24/kernel-armv7hl-lpae.config @@ -4833,7 +4833,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-armv7hl.config b/freed-ora/current/f24/kernel-armv7hl.config index 9ef845ee9..13c5049f6 100644 --- a/freed-ora/current/f24/kernel-armv7hl.config +++ b/freed-ora/current/f24/kernel-armv7hl.config @@ -5121,7 +5121,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 CONFIG_SERIAL_8250_OMAP=m -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-i686-PAE.config b/freed-ora/current/f24/kernel-i686-PAE.config index 777ce698e..d27c7b859 100644 --- a/freed-ora/current/f24/kernel-i686-PAE.config +++ b/freed-ora/current/f24/kernel-i686-PAE.config @@ -4530,7 +4530,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MID=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-i686-PAEdebug.config b/freed-ora/current/f24/kernel-i686-PAEdebug.config index 25544ae63..5e6b8e548 100644 --- a/freed-ora/current/f24/kernel-i686-PAEdebug.config +++ b/freed-ora/current/f24/kernel-i686-PAEdebug.config @@ -4551,7 +4551,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MID=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-i686-debug.config b/freed-ora/current/f24/kernel-i686-debug.config index 2f7cad3b5..6b89835d6 100644 --- a/freed-ora/current/f24/kernel-i686-debug.config +++ b/freed-ora/current/f24/kernel-i686-debug.config @@ -4551,7 +4551,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MID=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-i686.config b/freed-ora/current/f24/kernel-i686.config index 8bf296b0f..0ab66895c 100644 --- a/freed-ora/current/f24/kernel-i686.config +++ b/freed-ora/current/f24/kernel-i686.config @@ -4530,7 +4530,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MID=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-ppc64-debug.config b/freed-ora/current/f24/kernel-ppc64-debug.config index 17669ffaa..dedc75d9e 100644 --- a/freed-ora/current/f24/kernel-ppc64-debug.config +++ b/freed-ora/current/f24/kernel-ppc64-debug.config @@ -4365,7 +4365,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-ppc64.config b/freed-ora/current/f24/kernel-ppc64.config index 1a0551305..1a73d2228 100644 --- a/freed-ora/current/f24/kernel-ppc64.config +++ b/freed-ora/current/f24/kernel-ppc64.config @@ -4342,7 +4342,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-ppc64le-debug.config b/freed-ora/current/f24/kernel-ppc64le-debug.config index e4c622a35..8135615c9 100644 --- a/freed-ora/current/f24/kernel-ppc64le-debug.config +++ b/freed-ora/current/f24/kernel-ppc64le-debug.config @@ -4305,7 +4305,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-ppc64le.config b/freed-ora/current/f24/kernel-ppc64le.config index 88b8e6958..7fde295a6 100644 --- a/freed-ora/current/f24/kernel-ppc64le.config +++ b/freed-ora/current/f24/kernel-ppc64le.config @@ -4282,7 +4282,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-ppc64p7-debug.config b/freed-ora/current/f24/kernel-ppc64p7-debug.config index 29ba051e5..b856fdb7e 100644 --- a/freed-ora/current/f24/kernel-ppc64p7-debug.config +++ b/freed-ora/current/f24/kernel-ppc64p7-debug.config @@ -4304,7 +4304,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-ppc64p7.config b/freed-ora/current/f24/kernel-ppc64p7.config index a5396af24..c4d058416 100644 --- a/freed-ora/current/f24/kernel-ppc64p7.config +++ b/freed-ora/current/f24/kernel-ppc64p7.config @@ -4281,7 +4281,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-s390x-debug.config b/freed-ora/current/f24/kernel-s390x-debug.config index 5ed081e6c..507f09167 100644 --- a/freed-ora/current/f24/kernel-s390x-debug.config +++ b/freed-ora/current/f24/kernel-s390x-debug.config @@ -4204,7 +4204,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-s390x.config b/freed-ora/current/f24/kernel-s390x.config index 297aed4de..d236d5b35 100644 --- a/freed-ora/current/f24/kernel-s390x.config +++ b/freed-ora/current/f24/kernel-s390x.config @@ -4181,7 +4181,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-x86_64-debug.config b/freed-ora/current/f24/kernel-x86_64-debug.config index adba02612..fdfd05d2e 100644 --- a/freed-ora/current/f24/kernel-x86_64-debug.config +++ b/freed-ora/current/f24/kernel-x86_64-debug.config @@ -4576,7 +4576,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MID=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel-x86_64.config b/freed-ora/current/f24/kernel-x86_64.config index 54a7abd90..467577edd 100644 --- a/freed-ora/current/f24/kernel-x86_64.config +++ b/freed-ora/current/f24/kernel-x86_64.config @@ -4555,7 +4555,7 @@ CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_MID=y CONFIG_SERIAL_8250_MOXA=m CONFIG_SERIAL_8250_NR_UARTS=32 -CONFIG_SERIAL_8250_PCI=m +CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_RSA=y CONFIG_SERIAL_8250_RT288X=y CONFIG_SERIAL_8250_RUNTIME_UARTS=32 diff --git a/freed-ora/current/f24/kernel.spec b/freed-ora/current/f24/kernel.spec index dffb987a1..f1eb320b6 100644 --- a/freed-ora/current/f24/kernel.spec +++ b/freed-ora/current/f24/kernel.spec @@ -42,7 +42,7 @@ Summary: The Linux kernel # For non-released -rc kernels, this will be appended after the rcX and # gitX tags, so a 3 here would become part of release "0.rcX.gitX.3" # -%global baserelease 101 +%global baserelease 100 %global fedora_build %{baserelease} # base_sublevel is the kernel version we're starting with and patching @@ -92,7 +92,7 @@ Summary: The Linux kernel %if 0%{?released_kernel} # Do we have a -stable update to apply? -%define stable_update 6 +%define stable_update 7 # Set rpm version accordingly %if 0%{?stable_update} %define stablerev %{stable_update} @@ -683,9 +683,10 @@ Patch681: 0002-platform-x86-thinkpad_acpi-add-mapping-for-new-hotke.patch # rhbz 1459326 Patch683: RFC-audit-fix-a-race-condition-with-the-auditd-tracking-code.patch -# CVE-2017-1000364 rhbz 1462819 1461333 -Patch684: mm-larger-stack-guard-gap-between-vmas.patch -Patch685: mm-fix-new-crash-in-unmapped_area_topdown.patch +# rhbz 1459676 +Patch686: 0001-netfilter-xtables-zero-padding-in-data_to_user.patch +Patch687: 0002-netfilter-xtables-fix-build-failure-from-COMPAT_XT_A.patch + # END OF PATCH DEFINITIONS @@ -2347,6 +2348,16 @@ fi # # %changelog +* Wed Jun 28 2017 Alexandre Oliva <lxoliva@fsfla.org> -libre +- GNU Linux-libre 4.11.7-gnu. + +* Mon Jun 26 2017 Laura Abbott <labbott@fedoraproject.org> - 4.11.7-100 +- Linux v4.11.7 +- Make CONFIG_SERIAL_8250_PCI builtin (rhbz 1464709) + +* Tue Jun 20 2017 Laura Abbott <labbott@fedoraproject.org> +- Add fix for iptables (rhbz 1459676) + * Tue Jun 20 2017 Laura Abbott <labbott@fedoraproject.org> - 4.11.6-101 - bump and build diff --git a/freed-ora/current/f24/mm-fix-new-crash-in-unmapped_area_topdown.patch b/freed-ora/current/f24/mm-fix-new-crash-in-unmapped_area_topdown.patch deleted file mode 100644 index 20da9556f..000000000 --- a/freed-ora/current/f24/mm-fix-new-crash-in-unmapped_area_topdown.patch +++ /dev/null @@ -1,53 +0,0 @@ -From patchwork Tue Jun 20 09:10:44 2017 -Content-Type: text/plain; charset="utf-8" -MIME-Version: 1.0 -Content-Transfer-Encoding: 7bit -Subject: mm: fix new crash in unmapped_area_topdown() -From: Hugh Dickins <hughd@google.com> -X-Patchwork-Id: 9798991 -Message-Id: <alpine.LSU.2.11.1706200206210.10925@eggly.anvils> -To: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Dave Jones <davej@codemonkey.org.uk>, Oleg Nesterov <oleg@redhat.com>, - Michal Hocko <mhocko@suse.com>, linux-kernel@vger.kernel.org, - linux-mm@kvack.org -Date: Tue, 20 Jun 2017 02:10:44 -0700 (PDT) - -Trinity gets kernel BUG at mm/mmap.c:1963! in about 3 minutes of -mmap testing. That's the VM_BUG_ON(gap_end < gap_start) at the -end of unmapped_area_topdown(). Linus points out how MAP_FIXED -(which does not have to respect our stack guard gap intentions) -could result in gap_end below gap_start there. Fix that, and -the similar case in its alternative, unmapped_area(). - -Cc: stable@vger.kernel.org -Fixes: 1be7107fbe18 ("mm: larger stack guard gap, between vmas") -Reported-by: Dave Jones <davej@codemonkey.org.uk> -Debugged-by: Linus Torvalds <torvalds@linux-foundation.org> -Signed-off-by: Hugh Dickins <hughd@google.com> ---- - - mm/mmap.c | 6 ++++-- - 1 file changed, 4 insertions(+), 2 deletions(-) - ---- 4.12-rc6/mm/mmap.c 2017-06-19 09:06:10.035407505 -0700 -+++ linux/mm/mmap.c 2017-06-19 21:09:28.616707311 -0700 -@@ -1817,7 +1817,8 @@ unsigned long unmapped_area(struct vm_un - /* Check if current node has a suitable gap */ - if (gap_start > high_limit) - return -ENOMEM; -- if (gap_end >= low_limit && gap_end - gap_start >= length) -+ if (gap_end >= low_limit && -+ gap_end > gap_start && gap_end - gap_start >= length) - goto found; - - /* Visit right subtree if it looks promising */ -@@ -1920,7 +1921,8 @@ unsigned long unmapped_area_topdown(stru - gap_end = vm_start_gap(vma); - if (gap_end < low_limit) - return -ENOMEM; -- if (gap_start <= high_limit && gap_end - gap_start >= length) -+ if (gap_start <= high_limit && -+ gap_end > gap_start && gap_end - gap_start >= length) - goto found; - - /* Visit left subtree if it looks promising */ diff --git a/freed-ora/current/f24/mm-larger-stack-guard-gap-between-vmas.patch b/freed-ora/current/f24/mm-larger-stack-guard-gap-between-vmas.patch deleted file mode 100644 index 45d7987cc..000000000 --- a/freed-ora/current/f24/mm-larger-stack-guard-gap-between-vmas.patch +++ /dev/null @@ -1,889 +0,0 @@ -From 1be7107fbe18eed3e319a6c3e83c78254b693acb Mon Sep 17 00:00:00 2001 -From: Hugh Dickins <hughd@google.com> -Date: Mon, 19 Jun 2017 04:03:24 -0700 -Subject: mm: larger stack guard gap, between vmas - -From: Hugh Dickins <hughd@google.com> - -commit 1be7107fbe18eed3e319a6c3e83c78254b693acb upstream. - -Stack guard page is a useful feature to reduce a risk of stack smashing -into a different mapping. We have been using a single page gap which -is sufficient to prevent having stack adjacent to a different mapping. -But this seems to be insufficient in the light of the stack usage in -userspace. E.g. glibc uses as large as 64kB alloca() in many commonly -used functions. Others use constructs liks gid_t buffer[NGROUPS_MAX] -which is 256kB or stack strings with MAX_ARG_STRLEN. - -This will become especially dangerous for suid binaries and the default -no limit for the stack size limit because those applications can be -tricked to consume a large portion of the stack and a single glibc call -could jump over the guard page. These attacks are not theoretical, -unfortunatelly. - -Make those attacks less probable by increasing the stack guard gap -to 1MB (on systems with 4k pages; but make it depend on the page size -because systems with larger base pages might cap stack allocations in -the PAGE_SIZE units) which should cover larger alloca() and VLA stack -allocations. It is obviously not a full fix because the problem is -somehow inherent, but it should reduce attack space a lot. - -One could argue that the gap size should be configurable from userspace, -but that can be done later when somebody finds that the new 1MB is wrong -for some special case applications. For now, add a kernel command line -option (stack_guard_gap) to specify the stack gap size (in page units). - -Implementation wise, first delete all the old code for stack guard page: -because although we could get away with accounting one extra page in a -stack vma, accounting a larger gap can break userspace - case in point, -a program run with "ulimit -S -v 20000" failed when the 1MB gap was -counted for RLIMIT_AS; similar problems could come with RLIMIT_MLOCK -and strict non-overcommit mode. - -Instead of keeping gap inside the stack vma, maintain the stack guard -gap as a gap between vmas: using vm_start_gap() in place of vm_start -(or vm_end_gap() in place of vm_end if VM_GROWSUP) in just those few -places which need to respect the gap - mainly arch_get_unmapped_area(), -and and the vma tree's subtree_gap support for that. - -Original-patch-by: Oleg Nesterov <oleg@redhat.com> -Original-patch-by: Michal Hocko <mhocko@suse.com> -Signed-off-by: Hugh Dickins <hughd@google.com> -Acked-by: Michal Hocko <mhocko@suse.com> -Tested-by: Helge Deller <deller@gmx.de> # parisc -Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> -[wt: backport to 4.11: adjust context] -Signed-off-by: Willy Tarreau <w@1wt.eu> -Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> ---- - Documentation/admin-guide/kernel-parameters.txt | 7 + - arch/arc/mm/mmap.c | 2 - arch/arm/mm/mmap.c | 4 - arch/frv/mm/elf-fdpic.c | 2 - arch/mips/mm/mmap.c | 2 - arch/parisc/kernel/sys_parisc.c | 15 +- - arch/powerpc/mm/hugetlbpage-radix.c | 2 - arch/powerpc/mm/mmap.c | 4 - arch/powerpc/mm/slice.c | 2 - arch/s390/mm/mmap.c | 4 - arch/sh/mm/mmap.c | 4 - arch/sparc/kernel/sys_sparc_64.c | 4 - arch/sparc/mm/hugetlbpage.c | 2 - arch/tile/mm/hugetlbpage.c | 2 - arch/x86/kernel/sys_x86_64.c | 4 - arch/x86/mm/hugetlbpage.c | 2 - arch/xtensa/kernel/syscall.c | 2 - fs/hugetlbfs/inode.c | 2 - fs/proc/task_mmu.c | 4 - include/linux/mm.h | 53 ++++---- - mm/gup.c | 5 - mm/memory.c | 38 ------ - mm/mmap.c | 149 ++++++++++++++---------- - 23 files changed, 152 insertions(+), 163 deletions(-) - ---- a/Documentation/admin-guide/kernel-parameters.txt -+++ b/Documentation/admin-guide/kernel-parameters.txt -@@ -3779,6 +3779,13 @@ - spia_pedr= - spia_peddr= - -+ stack_guard_gap= [MM] -+ override the default stack gap protection. The value -+ is in page units and it defines how many pages prior -+ to (for stacks growing down) resp. after (for stacks -+ growing up) the main stack are reserved for no other -+ mapping. Default value is 256 pages. -+ - stacktrace [FTRACE] - Enabled the stack tracer on boot up. - ---- a/arch/arc/mm/mmap.c -+++ b/arch/arc/mm/mmap.c -@@ -65,7 +65,7 @@ arch_get_unmapped_area(struct file *filp - - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/arm/mm/mmap.c -+++ b/arch/arm/mm/mmap.c -@@ -90,7 +90,7 @@ arch_get_unmapped_area(struct file *filp - - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - -@@ -141,7 +141,7 @@ arch_get_unmapped_area_topdown(struct fi - addr = PAGE_ALIGN(addr); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/frv/mm/elf-fdpic.c -+++ b/arch/frv/mm/elf-fdpic.c -@@ -75,7 +75,7 @@ unsigned long arch_get_unmapped_area(str - addr = PAGE_ALIGN(addr); - vma = find_vma(current->mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - goto success; - } - ---- a/arch/mips/mm/mmap.c -+++ b/arch/mips/mm/mmap.c -@@ -93,7 +93,7 @@ static unsigned long arch_get_unmapped_a - - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/parisc/kernel/sys_parisc.c -+++ b/arch/parisc/kernel/sys_parisc.c -@@ -90,7 +90,7 @@ unsigned long arch_get_unmapped_area(str - unsigned long len, unsigned long pgoff, unsigned long flags) - { - struct mm_struct *mm = current->mm; -- struct vm_area_struct *vma; -+ struct vm_area_struct *vma, *prev; - unsigned long task_size = TASK_SIZE; - int do_color_align, last_mmap; - struct vm_unmapped_area_info info; -@@ -117,9 +117,10 @@ unsigned long arch_get_unmapped_area(str - else - addr = PAGE_ALIGN(addr); - -- vma = find_vma(mm, addr); -+ vma = find_vma_prev(mm, addr, &prev); - if (task_size - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma)) && -+ (!prev || addr >= vm_end_gap(prev))) - goto found_addr; - } - -@@ -143,7 +144,7 @@ arch_get_unmapped_area_topdown(struct fi - const unsigned long len, const unsigned long pgoff, - const unsigned long flags) - { -- struct vm_area_struct *vma; -+ struct vm_area_struct *vma, *prev; - struct mm_struct *mm = current->mm; - unsigned long addr = addr0; - int do_color_align, last_mmap; -@@ -177,9 +178,11 @@ arch_get_unmapped_area_topdown(struct fi - addr = COLOR_ALIGN(addr, last_mmap, pgoff); - else - addr = PAGE_ALIGN(addr); -- vma = find_vma(mm, addr); -+ -+ vma = find_vma_prev(mm, addr, &prev); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma)) && -+ (!prev || addr >= vm_end_gap(prev))) - goto found_addr; - } - ---- a/arch/powerpc/mm/hugetlbpage-radix.c -+++ b/arch/powerpc/mm/hugetlbpage-radix.c -@@ -65,7 +65,7 @@ radix__hugetlb_get_unmapped_area(struct - addr = ALIGN(addr, huge_page_size(h)); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - /* ---- a/arch/powerpc/mm/mmap.c -+++ b/arch/powerpc/mm/mmap.c -@@ -107,7 +107,7 @@ radix__arch_get_unmapped_area(struct fil - addr = PAGE_ALIGN(addr); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && addr >= mmap_min_addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - -@@ -143,7 +143,7 @@ radix__arch_get_unmapped_area_topdown(st - addr = PAGE_ALIGN(addr); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && addr >= mmap_min_addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/powerpc/mm/slice.c -+++ b/arch/powerpc/mm/slice.c -@@ -105,7 +105,7 @@ static int slice_area_is_free(struct mm_ - if ((mm->task_size - len) < addr) - return 0; - vma = find_vma(mm, addr); -- return (!vma || (addr + len) <= vma->vm_start); -+ return (!vma || (addr + len) <= vm_start_gap(vma)); - } - - static int slice_low_has_vma(struct mm_struct *mm, unsigned long slice) ---- a/arch/s390/mm/mmap.c -+++ b/arch/s390/mm/mmap.c -@@ -100,7 +100,7 @@ arch_get_unmapped_area(struct file *filp - addr = PAGE_ALIGN(addr); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && addr >= mmap_min_addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - -@@ -138,7 +138,7 @@ arch_get_unmapped_area_topdown(struct fi - addr = PAGE_ALIGN(addr); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && addr >= mmap_min_addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/sh/mm/mmap.c -+++ b/arch/sh/mm/mmap.c -@@ -64,7 +64,7 @@ unsigned long arch_get_unmapped_area(str - - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - -@@ -114,7 +114,7 @@ arch_get_unmapped_area_topdown(struct fi - - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/sparc/kernel/sys_sparc_64.c -+++ b/arch/sparc/kernel/sys_sparc_64.c -@@ -120,7 +120,7 @@ unsigned long arch_get_unmapped_area(str - - vma = find_vma(mm, addr); - if (task_size - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - -@@ -183,7 +183,7 @@ arch_get_unmapped_area_topdown(struct fi - - vma = find_vma(mm, addr); - if (task_size - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/sparc/mm/hugetlbpage.c -+++ b/arch/sparc/mm/hugetlbpage.c -@@ -120,7 +120,7 @@ hugetlb_get_unmapped_area(struct file *f - addr = ALIGN(addr, huge_page_size(h)); - vma = find_vma(mm, addr); - if (task_size - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - if (mm->get_unmapped_area == arch_get_unmapped_area) ---- a/arch/tile/mm/hugetlbpage.c -+++ b/arch/tile/mm/hugetlbpage.c -@@ -233,7 +233,7 @@ unsigned long hugetlb_get_unmapped_area( - addr = ALIGN(addr, huge_page_size(h)); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - if (current->mm->get_unmapped_area == arch_get_unmapped_area) ---- a/arch/x86/kernel/sys_x86_64.c -+++ b/arch/x86/kernel/sys_x86_64.c -@@ -141,7 +141,7 @@ arch_get_unmapped_area(struct file *filp - addr = PAGE_ALIGN(addr); - vma = find_vma(mm, addr); - if (end - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - -@@ -184,7 +184,7 @@ arch_get_unmapped_area_topdown(struct fi - addr = PAGE_ALIGN(addr); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/arch/x86/mm/hugetlbpage.c -+++ b/arch/x86/mm/hugetlbpage.c -@@ -145,7 +145,7 @@ hugetlb_get_unmapped_area(struct file *f - addr = ALIGN(addr, huge_page_size(h)); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - if (mm->get_unmapped_area == arch_get_unmapped_area) ---- a/arch/xtensa/kernel/syscall.c -+++ b/arch/xtensa/kernel/syscall.c -@@ -88,7 +88,7 @@ unsigned long arch_get_unmapped_area(str - /* At this point: (!vmm || addr < vmm->vm_end). */ - if (TASK_SIZE - len < addr) - return -ENOMEM; -- if (!vmm || addr + len <= vmm->vm_start) -+ if (!vmm || addr + len <= vm_start_gap(vmm)) - return addr; - addr = vmm->vm_end; - if (flags & MAP_SHARED) ---- a/fs/hugetlbfs/inode.c -+++ b/fs/hugetlbfs/inode.c -@@ -200,7 +200,7 @@ hugetlb_get_unmapped_area(struct file *f - addr = ALIGN(addr, huge_page_size(h)); - vma = find_vma(mm, addr); - if (TASK_SIZE - len >= addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma))) - return addr; - } - ---- a/fs/proc/task_mmu.c -+++ b/fs/proc/task_mmu.c -@@ -300,11 +300,7 @@ show_map_vma(struct seq_file *m, struct - - /* We don't show the stack guard page in /proc/maps */ - start = vma->vm_start; -- if (stack_guard_page_start(vma, start)) -- start += PAGE_SIZE; - end = vma->vm_end; -- if (stack_guard_page_end(vma, end)) -- end -= PAGE_SIZE; - - seq_setwidth(m, 25 + sizeof(void *) * 6 - 1); - seq_printf(m, "%08lx-%08lx %c%c%c%c %08llx %02x:%02x %lu ", ---- a/include/linux/mm.h -+++ b/include/linux/mm.h -@@ -1381,12 +1381,6 @@ int clear_page_dirty_for_io(struct page - - int get_cmdline(struct task_struct *task, char *buffer, int buflen); - --/* Is the vma a continuation of the stack vma above it? */ --static inline int vma_growsdown(struct vm_area_struct *vma, unsigned long addr) --{ -- return vma && (vma->vm_end == addr) && (vma->vm_flags & VM_GROWSDOWN); --} -- - static inline bool vma_is_anonymous(struct vm_area_struct *vma) - { - return !vma->vm_ops; -@@ -1402,28 +1396,6 @@ bool vma_is_shmem(struct vm_area_struct - static inline bool vma_is_shmem(struct vm_area_struct *vma) { return false; } - #endif - --static inline int stack_guard_page_start(struct vm_area_struct *vma, -- unsigned long addr) --{ -- return (vma->vm_flags & VM_GROWSDOWN) && -- (vma->vm_start == addr) && -- !vma_growsdown(vma->vm_prev, addr); --} -- --/* Is the vma a continuation of the stack vma below it? */ --static inline int vma_growsup(struct vm_area_struct *vma, unsigned long addr) --{ -- return vma && (vma->vm_start == addr) && (vma->vm_flags & VM_GROWSUP); --} -- --static inline int stack_guard_page_end(struct vm_area_struct *vma, -- unsigned long addr) --{ -- return (vma->vm_flags & VM_GROWSUP) && -- (vma->vm_end == addr) && -- !vma_growsup(vma->vm_next, addr); --} -- - int vma_is_stack_for_current(struct vm_area_struct *vma); - - extern unsigned long move_page_tables(struct vm_area_struct *vma, -@@ -2210,6 +2182,7 @@ void page_cache_async_readahead(struct a - pgoff_t offset, - unsigned long size); - -+extern unsigned long stack_guard_gap; - /* Generic expand stack which grows the stack according to GROWS{UP,DOWN} */ - extern int expand_stack(struct vm_area_struct *vma, unsigned long address); - -@@ -2238,6 +2211,30 @@ static inline struct vm_area_struct * fi - return vma; - } - -+static inline unsigned long vm_start_gap(struct vm_area_struct *vma) -+{ -+ unsigned long vm_start = vma->vm_start; -+ -+ if (vma->vm_flags & VM_GROWSDOWN) { -+ vm_start -= stack_guard_gap; -+ if (vm_start > vma->vm_start) -+ vm_start = 0; -+ } -+ return vm_start; -+} -+ -+static inline unsigned long vm_end_gap(struct vm_area_struct *vma) -+{ -+ unsigned long vm_end = vma->vm_end; -+ -+ if (vma->vm_flags & VM_GROWSUP) { -+ vm_end += stack_guard_gap; -+ if (vm_end < vma->vm_end) -+ vm_end = -PAGE_SIZE; -+ } -+ return vm_end; -+} -+ - static inline unsigned long vma_pages(struct vm_area_struct *vma) - { - return (vma->vm_end - vma->vm_start) >> PAGE_SHIFT; ---- a/mm/gup.c -+++ b/mm/gup.c -@@ -387,11 +387,6 @@ static int faultin_page(struct task_stru - /* mlock all present pages, but do not fault in new pages */ - if ((*flags & (FOLL_POPULATE | FOLL_MLOCK)) == FOLL_MLOCK) - return -ENOENT; -- /* For mm_populate(), just skip the stack guard page. */ -- if ((*flags & FOLL_POPULATE) && -- (stack_guard_page_start(vma, address) || -- stack_guard_page_end(vma, address + PAGE_SIZE))) -- return -ENOENT; - if (*flags & FOLL_WRITE) - fault_flags |= FAULT_FLAG_WRITE; - if (*flags & FOLL_REMOTE) ---- a/mm/memory.c -+++ b/mm/memory.c -@@ -2855,40 +2855,6 @@ out_release: - } - - /* -- * This is like a special single-page "expand_{down|up}wards()", -- * except we must first make sure that 'address{-|+}PAGE_SIZE' -- * doesn't hit another vma. -- */ --static inline int check_stack_guard_page(struct vm_area_struct *vma, unsigned long address) --{ -- address &= PAGE_MASK; -- if ((vma->vm_flags & VM_GROWSDOWN) && address == vma->vm_start) { -- struct vm_area_struct *prev = vma->vm_prev; -- -- /* -- * Is there a mapping abutting this one below? -- * -- * That's only ok if it's the same stack mapping -- * that has gotten split.. -- */ -- if (prev && prev->vm_end == address) -- return prev->vm_flags & VM_GROWSDOWN ? 0 : -ENOMEM; -- -- return expand_downwards(vma, address - PAGE_SIZE); -- } -- if ((vma->vm_flags & VM_GROWSUP) && address + PAGE_SIZE == vma->vm_end) { -- struct vm_area_struct *next = vma->vm_next; -- -- /* As VM_GROWSDOWN but s/below/above/ */ -- if (next && next->vm_start == address + PAGE_SIZE) -- return next->vm_flags & VM_GROWSUP ? 0 : -ENOMEM; -- -- return expand_upwards(vma, address + PAGE_SIZE); -- } -- return 0; --} -- --/* - * We enter with non-exclusive mmap_sem (to exclude vma changes, - * but allow concurrent faults), and pte mapped but not yet locked. - * We return with mmap_sem still held, but pte unmapped and unlocked. -@@ -2904,10 +2870,6 @@ static int do_anonymous_page(struct vm_f - if (vma->vm_flags & VM_SHARED) - return VM_FAULT_SIGBUS; - -- /* Check if we need to add a guard page to the stack */ -- if (check_stack_guard_page(vma, vmf->address) < 0) -- return VM_FAULT_SIGSEGV; -- - /* - * Use pte_alloc() instead of pte_alloc_map(). We can't run - * pte_offset_map() on pmds where a huge pmd might be created ---- a/mm/mmap.c -+++ b/mm/mmap.c -@@ -183,6 +183,7 @@ SYSCALL_DEFINE1(brk, unsigned long, brk) - unsigned long retval; - unsigned long newbrk, oldbrk; - struct mm_struct *mm = current->mm; -+ struct vm_area_struct *next; - unsigned long min_brk; - bool populate; - LIST_HEAD(uf); -@@ -229,7 +230,8 @@ SYSCALL_DEFINE1(brk, unsigned long, brk) - } - - /* Check against existing mmap mappings. */ -- if (find_vma_intersection(mm, oldbrk, newbrk+PAGE_SIZE)) -+ next = find_vma(mm, oldbrk); -+ if (next && newbrk + PAGE_SIZE > vm_start_gap(next)) - goto out; - - /* Ok, looks good - let it rip. */ -@@ -253,10 +255,22 @@ out: - - static long vma_compute_subtree_gap(struct vm_area_struct *vma) - { -- unsigned long max, subtree_gap; -- max = vma->vm_start; -- if (vma->vm_prev) -- max -= vma->vm_prev->vm_end; -+ unsigned long max, prev_end, subtree_gap; -+ -+ /* -+ * Note: in the rare case of a VM_GROWSDOWN above a VM_GROWSUP, we -+ * allow two stack_guard_gaps between them here, and when choosing -+ * an unmapped area; whereas when expanding we only require one. -+ * That's a little inconsistent, but keeps the code here simpler. -+ */ -+ max = vm_start_gap(vma); -+ if (vma->vm_prev) { -+ prev_end = vm_end_gap(vma->vm_prev); -+ if (max > prev_end) -+ max -= prev_end; -+ else -+ max = 0; -+ } - if (vma->vm_rb.rb_left) { - subtree_gap = rb_entry(vma->vm_rb.rb_left, - struct vm_area_struct, vm_rb)->rb_subtree_gap; -@@ -352,7 +366,7 @@ static void validate_mm(struct mm_struct - anon_vma_unlock_read(anon_vma); - } - -- highest_address = vma->vm_end; -+ highest_address = vm_end_gap(vma); - vma = vma->vm_next; - i++; - } -@@ -541,7 +555,7 @@ void __vma_link_rb(struct mm_struct *mm, - if (vma->vm_next) - vma_gap_update(vma->vm_next); - else -- mm->highest_vm_end = vma->vm_end; -+ mm->highest_vm_end = vm_end_gap(vma); - - /* - * vma->vm_prev wasn't known when we followed the rbtree to find the -@@ -856,7 +870,7 @@ again: - vma_gap_update(vma); - if (end_changed) { - if (!next) -- mm->highest_vm_end = end; -+ mm->highest_vm_end = vm_end_gap(vma); - else if (!adjust_next) - vma_gap_update(next); - } -@@ -941,7 +955,7 @@ again: - * mm->highest_vm_end doesn't need any update - * in remove_next == 1 case. - */ -- VM_WARN_ON(mm->highest_vm_end != end); -+ VM_WARN_ON(mm->highest_vm_end != vm_end_gap(vma)); - } - } - if (insert && file) -@@ -1787,7 +1801,7 @@ unsigned long unmapped_area(struct vm_un - - while (true) { - /* Visit left subtree if it looks promising */ -- gap_end = vma->vm_start; -+ gap_end = vm_start_gap(vma); - if (gap_end >= low_limit && vma->vm_rb.rb_left) { - struct vm_area_struct *left = - rb_entry(vma->vm_rb.rb_left, -@@ -1798,7 +1812,7 @@ unsigned long unmapped_area(struct vm_un - } - } - -- gap_start = vma->vm_prev ? vma->vm_prev->vm_end : 0; -+ gap_start = vma->vm_prev ? vm_end_gap(vma->vm_prev) : 0; - check_current: - /* Check if current node has a suitable gap */ - if (gap_start > high_limit) -@@ -1825,8 +1839,8 @@ check_current: - vma = rb_entry(rb_parent(prev), - struct vm_area_struct, vm_rb); - if (prev == vma->vm_rb.rb_left) { -- gap_start = vma->vm_prev->vm_end; -- gap_end = vma->vm_start; -+ gap_start = vm_end_gap(vma->vm_prev); -+ gap_end = vm_start_gap(vma); - goto check_current; - } - } -@@ -1890,7 +1904,7 @@ unsigned long unmapped_area_topdown(stru - - while (true) { - /* Visit right subtree if it looks promising */ -- gap_start = vma->vm_prev ? vma->vm_prev->vm_end : 0; -+ gap_start = vma->vm_prev ? vm_end_gap(vma->vm_prev) : 0; - if (gap_start <= high_limit && vma->vm_rb.rb_right) { - struct vm_area_struct *right = - rb_entry(vma->vm_rb.rb_right, -@@ -1903,7 +1917,7 @@ unsigned long unmapped_area_topdown(stru - - check_current: - /* Check if current node has a suitable gap */ -- gap_end = vma->vm_start; -+ gap_end = vm_start_gap(vma); - if (gap_end < low_limit) - return -ENOMEM; - if (gap_start <= high_limit && gap_end - gap_start >= length) -@@ -1929,7 +1943,7 @@ check_current: - struct vm_area_struct, vm_rb); - if (prev == vma->vm_rb.rb_right) { - gap_start = vma->vm_prev ? -- vma->vm_prev->vm_end : 0; -+ vm_end_gap(vma->vm_prev) : 0; - goto check_current; - } - } -@@ -1967,7 +1981,7 @@ arch_get_unmapped_area(struct file *filp - unsigned long len, unsigned long pgoff, unsigned long flags) - { - struct mm_struct *mm = current->mm; -- struct vm_area_struct *vma; -+ struct vm_area_struct *vma, *prev; - struct vm_unmapped_area_info info; - - if (len > TASK_SIZE - mmap_min_addr) -@@ -1978,9 +1992,10 @@ arch_get_unmapped_area(struct file *filp - - if (addr) { - addr = PAGE_ALIGN(addr); -- vma = find_vma(mm, addr); -+ vma = find_vma_prev(mm, addr, &prev); - if (TASK_SIZE - len >= addr && addr >= mmap_min_addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma)) && -+ (!prev || addr >= vm_end_gap(prev))) - return addr; - } - -@@ -2003,7 +2018,7 @@ arch_get_unmapped_area_topdown(struct fi - const unsigned long len, const unsigned long pgoff, - const unsigned long flags) - { -- struct vm_area_struct *vma; -+ struct vm_area_struct *vma, *prev; - struct mm_struct *mm = current->mm; - unsigned long addr = addr0; - struct vm_unmapped_area_info info; -@@ -2018,9 +2033,10 @@ arch_get_unmapped_area_topdown(struct fi - /* requesting a specific address */ - if (addr) { - addr = PAGE_ALIGN(addr); -- vma = find_vma(mm, addr); -+ vma = find_vma_prev(mm, addr, &prev); - if (TASK_SIZE - len >= addr && addr >= mmap_min_addr && -- (!vma || addr + len <= vma->vm_start)) -+ (!vma || addr + len <= vm_start_gap(vma)) && -+ (!prev || addr >= vm_end_gap(prev))) - return addr; - } - -@@ -2155,21 +2171,19 @@ find_vma_prev(struct mm_struct *mm, unsi - * update accounting. This is shared with both the - * grow-up and grow-down cases. - */ --static int acct_stack_growth(struct vm_area_struct *vma, unsigned long size, unsigned long grow) -+static int acct_stack_growth(struct vm_area_struct *vma, -+ unsigned long size, unsigned long grow) - { - struct mm_struct *mm = vma->vm_mm; - struct rlimit *rlim = current->signal->rlim; -- unsigned long new_start, actual_size; -+ unsigned long new_start; - - /* address space limit tests */ - if (!may_expand_vm(mm, vma->vm_flags, grow)) - return -ENOMEM; - - /* Stack limit test */ -- actual_size = size; -- if (size && (vma->vm_flags & (VM_GROWSUP | VM_GROWSDOWN))) -- actual_size -= PAGE_SIZE; -- if (actual_size > READ_ONCE(rlim[RLIMIT_STACK].rlim_cur)) -+ if (size > READ_ONCE(rlim[RLIMIT_STACK].rlim_cur)) - return -ENOMEM; - - /* mlock limit tests */ -@@ -2207,17 +2221,30 @@ static int acct_stack_growth(struct vm_a - int expand_upwards(struct vm_area_struct *vma, unsigned long address) - { - struct mm_struct *mm = vma->vm_mm; -+ struct vm_area_struct *next; -+ unsigned long gap_addr; - int error = 0; - - if (!(vma->vm_flags & VM_GROWSUP)) - return -EFAULT; - - /* Guard against wrapping around to address 0. */ -- if (address < PAGE_ALIGN(address+4)) -- address = PAGE_ALIGN(address+4); -- else -+ address &= PAGE_MASK; -+ address += PAGE_SIZE; -+ if (!address) - return -ENOMEM; - -+ /* Enforce stack_guard_gap */ -+ gap_addr = address + stack_guard_gap; -+ if (gap_addr < address) -+ return -ENOMEM; -+ next = vma->vm_next; -+ if (next && next->vm_start < gap_addr) { -+ if (!(next->vm_flags & VM_GROWSUP)) -+ return -ENOMEM; -+ /* Check that both stack segments have the same anon_vma? */ -+ } -+ - /* We must make sure the anon_vma is allocated. */ - if (unlikely(anon_vma_prepare(vma))) - return -ENOMEM; -@@ -2261,7 +2288,7 @@ int expand_upwards(struct vm_area_struct - if (vma->vm_next) - vma_gap_update(vma->vm_next); - else -- mm->highest_vm_end = address; -+ mm->highest_vm_end = vm_end_gap(vma); - spin_unlock(&mm->page_table_lock); - - perf_event_mmap(vma); -@@ -2282,6 +2309,8 @@ int expand_downwards(struct vm_area_stru - unsigned long address) - { - struct mm_struct *mm = vma->vm_mm; -+ struct vm_area_struct *prev; -+ unsigned long gap_addr; - int error; - - address &= PAGE_MASK; -@@ -2289,6 +2318,17 @@ int expand_downwards(struct vm_area_stru - if (error) - return error; - -+ /* Enforce stack_guard_gap */ -+ gap_addr = address - stack_guard_gap; -+ if (gap_addr > address) -+ return -ENOMEM; -+ prev = vma->vm_prev; -+ if (prev && prev->vm_end > gap_addr) { -+ if (!(prev->vm_flags & VM_GROWSDOWN)) -+ return -ENOMEM; -+ /* Check that both stack segments have the same anon_vma? */ -+ } -+ - /* We must make sure the anon_vma is allocated. */ - if (unlikely(anon_vma_prepare(vma))) - return -ENOMEM; -@@ -2343,28 +2383,25 @@ int expand_downwards(struct vm_area_stru - return error; - } - --/* -- * Note how expand_stack() refuses to expand the stack all the way to -- * abut the next virtual mapping, *unless* that mapping itself is also -- * a stack mapping. We want to leave room for a guard page, after all -- * (the guard page itself is not added here, that is done by the -- * actual page faulting logic) -- * -- * This matches the behavior of the guard page logic (see mm/memory.c: -- * check_stack_guard_page()), which only allows the guard page to be -- * removed under these circumstances. -- */ -+/* enforced gap between the expanding stack and other mappings. */ -+unsigned long stack_guard_gap = 256UL<<PAGE_SHIFT; -+ -+static int __init cmdline_parse_stack_guard_gap(char *p) -+{ -+ unsigned long val; -+ char *endptr; -+ -+ val = simple_strtoul(p, &endptr, 10); -+ if (!*endptr) -+ stack_guard_gap = val << PAGE_SHIFT; -+ -+ return 0; -+} -+__setup("stack_guard_gap=", cmdline_parse_stack_guard_gap); -+ - #ifdef CONFIG_STACK_GROWSUP - int expand_stack(struct vm_area_struct *vma, unsigned long address) - { -- struct vm_area_struct *next; -- -- address &= PAGE_MASK; -- next = vma->vm_next; -- if (next && next->vm_start == address + PAGE_SIZE) { -- if (!(next->vm_flags & VM_GROWSUP)) -- return -ENOMEM; -- } - return expand_upwards(vma, address); - } - -@@ -2386,14 +2423,6 @@ find_extend_vma(struct mm_struct *mm, un - #else - int expand_stack(struct vm_area_struct *vma, unsigned long address) - { -- struct vm_area_struct *prev; -- -- address &= PAGE_MASK; -- prev = vma->vm_prev; -- if (prev && prev->vm_end == address) { -- if (!(prev->vm_flags & VM_GROWSDOWN)) -- return -ENOMEM; -- } - return expand_downwards(vma, address); - } - -@@ -2491,7 +2520,7 @@ detach_vmas_to_be_unmapped(struct mm_str - vma->vm_prev = prev; - vma_gap_update(vma); - } else -- mm->highest_vm_end = prev ? prev->vm_end : 0; -+ mm->highest_vm_end = prev ? vm_end_gap(prev) : 0; - tail_vma->vm_next = NULL; - - /* Kill the cache */ diff --git a/freed-ora/current/f24/patch-4.11-gnu-4.11.6-gnu.xz.sign b/freed-ora/current/f24/patch-4.11-gnu-4.11.6-gnu.xz.sign deleted file mode 100644 index c2fe1b13d..000000000 --- a/freed-ora/current/f24/patch-4.11-gnu-4.11.6-gnu.xz.sign +++ /dev/null @@ -1,7 +0,0 @@ ------BEGIN PGP SIGNATURE----- -Version: GnuPG v2 - -iEYEABECAAYFAllFpt8ACgkQvLfPh359R6etJgCdEAwVl0KPMgmrq0LyPYhYYzqe -zjkAnRL0TjHWcdJZ1lNf3PeAggfxw8rP -=zyB6 ------END PGP SIGNATURE----- diff --git a/freed-ora/current/f24/patch-4.11-gnu-4.11.7-gnu.xz.sign b/freed-ora/current/f24/patch-4.11-gnu-4.11.7-gnu.xz.sign new file mode 100644 index 000000000..c8830f308 --- /dev/null +++ b/freed-ora/current/f24/patch-4.11-gnu-4.11.7-gnu.xz.sign @@ -0,0 +1,7 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2 + +iEYEABECAAYFAllOopYACgkQvLfPh359R6fmiQCfZJKdEdYNhsqESjVF1NwbUT9e +/GMAni39vTXc69+U+Ew6Uh3GHIZJlir4 +=oTLR +-----END PGP SIGNATURE----- diff --git a/freed-ora/current/f24/sources b/freed-ora/current/f24/sources index 49a46ef9d..a2ddf16a8 100644 --- a/freed-ora/current/f24/sources +++ b/freed-ora/current/f24/sources @@ -1,3 +1,3 @@ SHA512 (linux-libre-4.11-gnu.tar.xz) = f1d9138024b127385248de5c8eb72123b717bbbaba3e80bded20f073acac816a7ea979c4677ddc72252a8ec77c6a6c1d1738b1c20106f7d53ef39c9cf64c1853 SHA512 (perf-man-4.11.tar.gz) = 0b070d2f10a743329de2f532e2d7e19ef385a3e6ef3c700b591ae2697604dbe542b36e31121b3e37517ee8071ab800386fa8663c24a5b36520a18e096c6eefc8 -SHA512 (patch-4.11-gnu-4.11.6-gnu.xz) = c59f1282a69dba9ef02327555eeaca2952ccf433d80275af03ca7b1311ea57753fa33077afa094e4dfd2c463a86a6a721f86fd157764df928943ccf11f7c15bb +SHA512 (patch-4.11-gnu-4.11.7-gnu.xz) = df6eb2c3f90f2967abeb545bd3a90aefb5db682447fb182decf3004db4a595634316192e8e506ba259776627d90447d14b64f7e8df2af8d05051c5cb48be7452 |

