- 29 Feb, 2016 40 commits
-
-
Guilherme G. Piccoli authored
BugLink: http://bugs.launchpad.net/bugs/1486180 Commit 89a51df5 ("powerpc/eeh: Fix crash in eeh_add_device_early() on Cell") added a check on function eeh_add_device_early(): since in Cell arch eeh_ops is NULL, that code used to crash on Cell. The commit's approach was validate if EEH was available by checking the result of function eeh_enabled(). Since the function eeh_add_device_early() is used to perform EEH initialization in devices added later on the system, like in hotplug/DLPAR scenarios, we might reach a case in which no PCI devices are present on boot and so EEH is not initialized. Then, if a device is added via DLPAR for example, eeh_add_device_early() fails because eeh_enabled() is false. We can hit a kernel oops on pSeries arch if eeh_add_device_early() fails: if we have no PCI devices on machine at boot time, and then we add a PCI device via DLPAR operation, the function query_ddw() triggers the oops on NULL pointer dereference in the line "cfg_addr = edev->config_addr;". It happens because config_addr in edev is NULL, since the function eeh_add_device_early() was not completed successfully. This patch just changes the way the arch checking is done in function eeh_add_device_early(): we use no more eeh_enabled(), but instead we check the running architecture by using the macro machine_is(). If we are running on pSeries or PowerNV, the EEH mechanism can be enabled; otherwise, we bail out the function. This way, we don't enable EEH on Cell and we don't hit the oops on DLPAR either. Fixes: 89a51df5 ("powerpc/eeh: Fix crash in eeh_add_device_early() on Cell") Signed-off-by: Guilherme G. Piccoli <gpiccoli@linux.vnet.ibm.com> Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Ignore: yes Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Ignore: yes Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
CC [M] drivers/dma/ioat/prep.o drivers/dma/ioat/prep.c: In function 'ioat_prep_pqxor': drivers/dma/ioat/prep.c:682:1: warning: the frame size of 1048 bytes is larger than 1024 bytes [-Wframe-larger-than=] } ^ drivers/dma/ioat/prep.c: In function 'ioat_prep_pqxor_val': drivers/dma/ioat/prep.c:714:1: warning: the frame size of 1048 bytes is larger than 1024 bytes [-Wframe-larger-than=] } gcc version 5.3.1 20151219 (Ubuntu 5.3.1-4ubuntu1) Cc: Vinod Koul <vinod.koul@intel.com> Cc: Dan Williams <dan.j.williams@intel.com> Cc: Dave Jiang <dave.jiang@intel.com> Cc: Prarit Bhargava <prarit@redhat.com> Cc: Nicholas Mc Guire <der.herr@hofr.at> Cc: Jarkko Nikula <jarkko.nikula@linux.intel.com> Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
CC [M] drivers/gpu/drm/radeon/r100.o In file included from drivers/gpu/drm/radeon/radeon_mode.h:37:0, from drivers/gpu/drm/radeon/radeon.h:80, from drivers/gpu/drm/radeon/r100.c:33: drivers/gpu/drm/radeon/r100.c: In function 'r100_bandwidth_update': include/drm/drm_fixed.h:64:13: warning: 'crit_point_ff.full' may be used uninitialized in this function [-Wmaybe-uninitialized] u64 tmp = ((u64)A.full << 13); ^ drivers/gpu/drm/radeon/r100.c:3153:63: note: 'crit_point_ff.full' was declared here fixed20_12 peak_disp_bw, mem_bw, pix_clk, pix_clk2, temp_ff, crit_point_ff; ^ drivers/gpu/drm/radeon/r100.c:3583:42: warning: 'disp_drain_rate.full' may be used uninitialized in this function [-Wmaybe-uninitialized] temp_ff.full = read_return_rate.full - disp_drain_rate.full; gcc version 5.3.1 20151219 (Ubuntu 5.3.1-4ubuntu1) Cc: Alex Deucher <alexander.deucher@amd.com> Cc: "Christian König" <christian.koenig@amd.com> Cc: David Airlie <airlied@linux.ie> Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
CC security/apparmor/af_unix.o In file included from ./arch/x86/include/asm/bug.h:35:0, from include/linux/bug.h:4, from include/linux/cpumask.h:12, from ./arch/x86/include/asm/cpumask.h:4, from ./arch/x86/include/asm/msr.h:10, from ./arch/x86/include/asm/processor.h:20, from ./arch/x86/include/asm/atomic.h:6, from include/linux/atomic.h:4, from include/linux/mutex.h:18, from include/net/af_unix.h:6, from security/apparmor/include/af_unix.h:15, from security/apparmor/af_unix.c:16: security/apparmor/af_unix.c: In function 'unix_fs_perm': security/apparmor/af_unix.c:29:18: warning: passing argument 1 of 'unix_sk' from incompatible pointer type [-Wincompatible-pointer-types] AA_BUG(!UNIX_FS(u)); ^ include/asm-generic/bug.h:95:25: note: in definition of macro 'WARN' int __ret_warn_on = !!(condition); \ ^ security/apparmor/include/apparmor.h:75:28: note: in expansion of macro 'AA_BUG_FMT' #define AA_BUG(X, args...) AA_BUG_FMT((X), "" args ) ^ security/apparmor/af_unix.c:29:2: note: in expansion of macro 'AA_BUG' AA_BUG(!UNIX_FS(u)); ^ security/apparmor/include/af_unix.h:36:22: note: in expansion of macro 'UNIX_ANONYMOUS' #define UNIX_FS(U) (!UNIX_ANONYMOUS(U) && unix_sk(U)->addr->name->sun_path[0]) ^ security/apparmor/af_unix.c:29:10: note: in expansion of macro 'UNIX_FS' AA_BUG(!UNIX_FS(u)); ^ In file included from security/apparmor/include/af_unix.h:15:0, from security/apparmor/af_unix.c:16: include/net/af_unix.h:68:33: note: expected 'const struct sock *' but argument is of type 'struct unix_sock *' static inline struct unix_sock *unix_sk(const struct sock *sk) ^ In file included from ./arch/x86/include/asm/bug.h:35:0, from include/linux/bug.h:4, from include/linux/cpumask.h:12, from ./arch/x86/include/asm/cpumask.h:4, from ./arch/x86/include/asm/msr.h:10, from ./arch/x86/include/asm/processor.h:20, from ./arch/x86/include/asm/atomic.h:6, from include/linux/atomic.h:4, from include/linux/mutex.h:18, from include/net/af_unix.h:6, from security/apparmor/include/af_unix.h:15, from security/apparmor/af_unix.c:16: security/apparmor/af_unix.c:29:18: warning: passing argument 1 of 'unix_sk' from incompatible pointer type [-Wincompatible-pointer-types] AA_BUG(!UNIX_FS(u)); ^ include/asm-generic/bug.h:95:25: note: in definition of macro 'WARN' int __ret_warn_on = !!(condition); \ ^ security/apparmor/include/apparmor.h:75:28: note: in expansion of macro 'AA_BUG_FMT' #define AA_BUG(X, args...) AA_BUG_FMT((X), "" args ) ^ security/apparmor/af_unix.c:29:2: note: in expansion of macro 'AA_BUG' AA_BUG(!UNIX_FS(u)); ^ security/apparmor/af_unix.c:29:10: note: in expansion of macro 'UNIX_FS' AA_BUG(!UNIX_FS(u)); ^ In file included from security/apparmor/include/af_unix.h:15:0, from security/apparmor/af_unix.c:16: include/net/af_unix.h:68:33: note: expected 'const struct sock *' but argument is of type 'struct unix_sock *' static inline struct unix_sock *unix_sk(const struct sock *sk) ^ In file included from security/apparmor/af_unix.c:16:0: security/apparmor/af_unix.c: In function 'aa_unix_peer_perm': security/apparmor/af_unix.c:529:14: warning: passing argument 1 of 'unix_sk' from incompatible pointer type [-Wincompatible-pointer-types] if (UNIX_FS(peeru)) ^ security/apparmor/include/af_unix.h:32:37: note: in definition of macro 'UNIX_ANONYMOUS' #define UNIX_ANONYMOUS(U) (!unix_sk(U)->addr) ^ security/apparmor/af_unix.c:529:6: note: in expansion of macro 'UNIX_FS' if (UNIX_FS(peeru)) ^ In file included from security/apparmor/include/af_unix.h:15:0, from security/apparmor/af_unix.c:16: include/net/af_unix.h:68:33: note: expected 'const struct sock *' but argument is of type 'struct unix_sock *' static inline struct unix_sock *unix_sk(const struct sock *sk) ^ In file included from security/apparmor/af_unix.c:16:0: security/apparmor/af_unix.c:529:14: warning: passing argument 1 of 'unix_sk' from incompatible pointer type [-Wincompatible-pointer-types] if (UNIX_FS(peeru)) ^ security/apparmor/include/af_unix.h:36:51: note: in definition of macro 'UNIX_FS' #define UNIX_FS(U) (!UNIX_ANONYMOUS(U) && unix_sk(U)->addr->name->sun_path[0]) ^ In file included from security/apparmor/include/af_unix.h:15:0, from security/apparmor/af_unix.c:16: include/net/af_unix.h:68:33: note: expected 'const struct sock *' but argument is of type 'struct unix_sock *' static inline struct unix_sock *unix_sk(const struct sock *sk) ^ In file included from security/apparmor/af_unix.c:16:0: security/apparmor/af_unix.c:531:19: warning: passing argument 1 of 'unix_sk' from incompatible pointer type [-Wincompatible-pointer-types] else if (UNIX_FS(u)) ^ security/apparmor/include/af_unix.h:32:37: note: in definition of macro 'UNIX_ANONYMOUS' #define UNIX_ANONYMOUS(U) (!unix_sk(U)->addr) ^ security/apparmor/af_unix.c:531:11: note: in expansion of macro 'UNIX_FS' else if (UNIX_FS(u)) ^ In file included from security/apparmor/include/af_unix.h:15:0, from security/apparmor/af_unix.c:16: include/net/af_unix.h:68:33: note: expected 'const struct sock *' but argument is of type 'struct unix_sock *' static inline struct unix_sock *unix_sk(const struct sock *sk) ^ In file included from security/apparmor/af_unix.c:16:0: security/apparmor/af_unix.c:531:19: warning: passing argument 1 of 'unix_sk' from incompatible pointer type [-Wincompatible-pointer-types] else if (UNIX_FS(u)) ^ security/apparmor/include/af_unix.h:36:51: note: in definition of macro 'UNIX_FS' #define UNIX_FS(U) (!UNIX_ANONYMOUS(U) && unix_sk(U)->addr->name->sun_path[0]) ^ In file included from security/apparmor/include/af_unix.h:15:0, from security/apparmor/af_unix.c:16: include/net/af_unix.h:68:33: note: expected 'const struct sock *' but argument is of type 'struct unix_sock *' static inline struct unix_sock *unix_sk(const struct sock *sk) ^ Cc: John Johansen <john.johansen@canonical.com> Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Serge Hallyn authored
It is turned on by default, but can be turned off if admins prefer or, more importantly, if a security vulnerability is found. The intent is to use this as mitigation so long as Ubuntu is on the cutting edge of enablement for things like unprivileged filesystem mounting. (This patch is tweaked from the one currently still in Debian sid, which in turn came from the patch we had in saucy) Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> [bwh: Remove unneeded binary sysctl bits] Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
BugLink: http://bugs.launchpad.net/bugs/1526869Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Haren Myneni authored
BugLink: http://bugs.launchpad.net/bugs/1529666 NX842 coprocessor sets 3rd bit in CR register with XER[S0] which is nothing to do with NX request. Since this bit can be set with other valuable return status, mast this bit. One of other bits (INITIATED, BUSY or REJECTED) will be returned for any given NX request. Signed-off-by: Haren Myneni <haren@us.ibm.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> (cherry picked from linux-next commit 6333ed8f) Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Ignore: yes Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Ignore: yes Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Ignore: yes Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Jann Horn authored
BugLink: http://bugs.launchpad.net/bugs/1527374 ptrace_has_cap() checks whether the current process should be treated as having a certain capability for ptrace checks against another process. Until now, this was equivalent to has_ns_capability(current, target_ns, CAP_SYS_PTRACE). However, if a root-owned process wants to enter a user namespace for some reason without knowing who owns it and therefore can't change to the namespace owner's uid and gid before entering, as soon as it has entered the namespace, the namespace owner can attach to it via ptrace and thereby gain access to its uid and gid. While it is possible for the entering process to switch to the uid of a claimed namespace owner before entering, causing the attempt to enter to fail if the claimed uid is wrong, this doesn't solve the problem of determining an appropriate gid. With this change, the entering process can first enter the namespace and then safely inspect the namespace's properties, e.g. through /proc/self/{uid_map,gid_map}, assuming that the namespace owner doesn't have access to uid 0. Signed-off-by: Jann Horn <jann@thejh.net> Reference: https://lkml.org/lkml/2015/12/12/259Acked-by: Andy Whitcroft <andy.whitcroft@canonical.com> Acked-by: Brad Figg <brad.figg@canonical.com> Signed-off-by: Kamal Mostafa <kamal@canonical.com>
-
Hui Wang authored
BugLink: http://bugs.launchpad.net/bugs/1527096 This commit wants to enable the Intel Baytrail I2C semaphore, this driver was added into the kernel from v4.0. The driver implements a hardware semphore to protect the I2C bus to be shared among several users safely. We have met a problem on a Cherry Trail platform, when we insert the SD storage card into the SD slot, the system will hang, after enable this driver in the kernel, the problem disappers. This driver depends on the "CONFIG_IOSF_MBI=y", so we change this config item from m to y. Signed-off-by: Hui Wang <hui.wang@canonical.com> Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Ignore: yes Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Andy Whitcroft authored
UBUNTU: [Config] disable CONFIG_CRYPTO_AES_ARM64_CE* to avoid issues with ARMv8.1 support in latest compilers Signed-off-by: Andy Whitcroft <apw@canonical.com>
-
Andy Whitcroft authored
UBUNTU: [Config] disable CONFIG_ARM64_LSE_ATOMICS to avoid issues with ARMv8.1 support in latest compilers Signed-off-by: Andy Whitcroft <apw@canonical.com>
-
Tim Gardner authored
Ignore: yes Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Andy Whitcroft authored
Signed-off-by: Andy Whitcroft <apw@canonical.com>
-
Andy Whitcroft authored
Signed-off-by: Andy Whitcroft <apw@canonical.com> Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Andy Whitcroft authored
Signed-off-by: Andy Whitcroft <apw@canonical.com>
-
Andy Whitcroft authored
We are not yet making tools packages for s390x. Enable the basic tools to fill out this package. BugLink: http://bugs.launchpad.net/bugs/1524319Signed-off-by: Andy Whitcroft <apw@canonical.com>
-
Tim Gardner authored
BugLink: http://bugs.launchpad.net/bugs/1525297Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
-
Tim Gardner authored
Annotations are unique to the derivative. Therefore, use annotations found in the derivative config directory. Signed-off-by: Tim Gardner <tim.gardner@canonical.com> (cherry picked from commit 4f92f80963c358c9716e70d912449a7c2a5808aa) Signed-off-by: Paolo Pisati <paolo.pisati@canonical.com>
-