Release linux (4.17.8-1).

-----BEGIN PGP SIGNATURE-----
 
 iQKmBAABCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAltSYytfFIAAAAAALgAo
 aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
 ZWJpYW4ub3JnAAoJEAVMuPMTQ89EGAMP/0Ui8xfqRCRFnKAnz1+7iYh8QR+sXB4X
 qblWW74zsQqAn/xQXUpa4J+SXNc4qcqsi5EcmSJu5uS2Iv8eRK4W+FL4AgfEMPuU
 zj//d7QTrlvoRTOofPdv1Otj70oIwMMLipYSApZUbq79WYO24EIqZHruogXlbGpS
 fpGXJ9TYi9ARmV1tAKwJZeFDLqxeR3cRuB0z+lB2ENDwqEWueUtCVxFRaq99H844
 5PZOW6Ke/M5mBkClo/7yGBUUrBFTmZ8O58sKhQ9FU/nopobcigyLCPI7ZiZCvnwB
 I34MxXfjrldkgPoqmJNI9Xxk5I03flg5Z/vwdrrJIXOXrvNnlfbU0NAq6xykFtWL
 K0J1a80DKJtd2yyazHjrGKTFLoZlUdOWmOJAQMZpRZE1PraNgXuqmHeMOl7LcNnL
 ljUBRE2yhVZX2PSgs6Y64qmBjC/AgTOyPH5B/kjvWpHBJtZlQ/2pYu0c8eonY0Cl
 TGk5EgQWHib3BapEWVhMWaWVlCoW63s7kpgp1/CWPFmNua+IhrbBZIfQpWlW4Mk6
 cFbcUp5JEcFZC5uKp8InAcW/7pLteTNQvEXGTOilTpqAOtrWobqLXdpTorYwbY5g
 uyZVhWX58aoJNtTBW84oe+p3En6AcgulSLmq9fODtS3VvM1HHUBd6tFqjbZPRAeh
 e7XP4dnRdNwJ
 =bju1
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.17.8-1'

Release linux (4.17.8-1).
This commit is contained in:
Ben Hutchings 2018-07-21 03:02:42 +01:00
commit e5beaefd01
6 changed files with 242 additions and 0 deletions

88
debian/changelog vendored
View File

@ -50,6 +50,94 @@ linux (4.18~rc3-1~exp1) experimental; urgency=medium
-- Ben Hutchings <ben@decadent.org.uk> Tue, 03 Jul 2018 17:26:05 +0100
linux (4.17.8-1) unstable; urgency=medium
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.7
- bpf: reject passing modified ctx to helper functions
- [mips*] Call dump_stack() from show_regs()
- [mips*] Use async IPIs for arch_trigger_cpumask_backtrace()
- [mips*] Fix ioremap() RAM check
- [armhf] drm/etnaviv: Check for platform_device_register_simple() failure
- [armhf] drm/etnaviv: Fix driver unregistering
- [armhf] drm/etnaviv: bring back progress check in job timeout handler
- ACPICA: Clear status of all events when entering S5
- [armhf] mmc: sdhci-esdhc-imx: allow 1.8V modes without 100/200MHz
pinctrl states
- [armhf] mmc: dw_mmc: fix card threshold control configuration
- [x86] ibmasm: don't write out of bounds in read handler
- [arm64,x86] staging: rtl8723bs: Prevent an underflow in
rtw_check_beacon_data().
- ata: Fix ZBC_OUT command block check
- ata: Fix ZBC_OUT all bit handling
- [x86] mei: discard messages from not connected client during power down.
- mtd: spi-nor: cadence-quadspi: Fix direct mode write timeouts
- tracing/kprobe: Release kprobe print_fmt properly
- vmw_balloon: fix inflation with batching
- ahci: Add Intel Ice Lake LP PCI ID
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS
- [x86] thunderbolt: Notify userspace when boot_acl is changed
- USB: serial: ch341: fix type promotion bug in ch341_control_in()
- USB: serial: cp210x: add another USB ID for Qivicon ZigBee stick
- USB: serial: keyspan_pda: fix modem-status error handling
- USB: yurex: fix out-of-bounds uaccess in read handler
- USB: serial: mos7840: fix status-register error handling
- usb: quirks: add delay quirks for Corsair Strafe
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring()
- mm: zero unavailable pages before memmap init
- ALSA: hda/realtek - two more lenovo models need fixup of
MIC_LOCATION
- ALSA: hda - Handle pm failure during hotplug
- mm: do not drop unused pages when userfaultd is running
- fs/proc/task_mmu.c: fix Locked field in /proc/pid/smaps*
- x86/purgatory: add missing FORCE to Makefile target
- fs, elf: make sure to page align bss in load_elf_library
- mm: do not bug_on on incorrect length in __mm_populate()
- tracing: Reorder display of TGID to be after PID
- kbuild: delete INSTALL_FW_PATH from kbuild documentation
- acpi, nfit: Fix scrub idle detection
- [arm64] neon: Fix function may_use_simd() return error status
- tools build: fix # escaping in .cmd files for future Make
- IB/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values
- [arm64,armhf] i2c: tegra: Fix NACK error handling
- i2c: recovery: if possible send STOP with recovery pulses
- iw_cxgb4: correctly enforce the max reg_mr depth
- [x86] xen: remove global bit from __default_kernel_pte_mask for pv
guests
- [x86] xen: setup pv irq ops vector earlier
- bsg: fix bogus EINVAL on non-data commands
- [x86] uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn()
- netfilter: nf_queue: augment nfqa_cfg_policy
- crypto: don't optimize keccakf()
- netfilter: x_tables: initialise match/target check parameter
struct
- loop: add recursion validation to LOOP_CHANGE_FD
- xfs: fix inobt magic number check
- PM / hibernate: Fix oops at snapshot_write()
- RDMA/ucm: Mark UCM interface as BROKEN
- loop: remember whether sysfs_create_group() was done
- [x86] kvm: vmx: Nested VM-entry prereqs for event inj.
- f2fs: give message and set need_fsck given broken node id
- f2fs: avoid bug_on on corrupted inode
- f2fs: sanity check on sit entry
- f2fs: sanity check for total valid node blocks
- [armhf] dts: armada-38x: use the new thermal binding
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.8
- mm: don't do zero_resv_unavail if memmap is not allocated
[ Ben Hutchings ]
* ext4: fix false negatives *and* false positives in ext4_check_descriptors()
(Closes: #903838)
* Fix remaining build failures with gcc 8 (Closes: #897802):
- tools/lib/api/fs/fs.c: Fix misuse of strncpy()
- usbip: Fix misuse of strncpy()
[ Salvatore Bonaccorso ]
* Ignore ABI changes for acpi_nfit_desc_init and acpi_nfit_init
* Ignore ABI changes for loop_register_transfer
-- Salvatore Bonaccorso <carnil@debian.org> Fri, 20 Jul 2018 23:08:27 +0200
linux (4.17.6-2) unstable; urgency=medium
[ Ben Hutchings ]

View File

@ -68,6 +68,11 @@ ignore-changes:
# ignore changes to inv_mpu6050/*
module:drivers/iio/imu/inv_mpu6050/*
drm_crtc_accurate_vblank_count
# ignore acpi_nfit_init, acpi_nfit_desc_init
acpi_nfit_desc_init
acpi_nfit_init
# ignore loop_register_transfer (used by cryptoloop, nothing OOT)
loop_register_transfer
[base]
arches:

View File

@ -0,0 +1,52 @@
From: Theodore Ts'o <tytso@mit.edu>
Date: Sun, 8 Jul 2018 19:35:02 -0400
Subject: ext4: fix false negatives *and* false positives in
ext4_check_descriptors()
Origin: https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit?id=44de022c4382541cebdd6de4465d1f4f465ff1dd
Bug-Debian: https://bugs.debian.org/903838
Ext4_check_descriptors() was getting called before s_gdb_count was
initialized. So for file systems w/o the meta_bg feature, allocation
bitmaps could overlap the block group descriptors and ext4 wouldn't
notice.
For file systems with the meta_bg feature enabled, there was a
fencepost error which would cause the ext4_check_descriptors() to
incorrectly believe that the block allocation bitmap overlaps with the
block group descriptor blocks, and it would reject the mount.
Fix both of these problems.
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Cc: stable@vger.kernel.org
---
fs/ext4/super.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
--- a/fs/ext4/super.c
+++ b/fs/ext4/super.c
@@ -2307,7 +2307,7 @@ static int ext4_check_descriptors(struct
struct ext4_sb_info *sbi = EXT4_SB(sb);
ext4_fsblk_t first_block = le32_to_cpu(sbi->s_es->s_first_data_block);
ext4_fsblk_t last_block;
- ext4_fsblk_t last_bg_block = sb_block + ext4_bg_num_gdb(sb, 0) + 1;
+ ext4_fsblk_t last_bg_block = sb_block + ext4_bg_num_gdb(sb, 0);
ext4_fsblk_t block_bitmap;
ext4_fsblk_t inode_bitmap;
ext4_fsblk_t inode_table;
@@ -4050,14 +4050,13 @@ static int ext4_fill_super(struct super_
goto failed_mount2;
}
}
+ sbi->s_gdb_count = db_count;
if (!ext4_check_descriptors(sb, logical_sb_block, &first_not_zeroed)) {
ext4_msg(sb, KERN_ERR, "group descriptors corrupted!");
ret = -EFSCORRUPTED;
goto failed_mount2;
}
- sbi->s_gdb_count = db_count;
-
timer_setup(&sbi->s_err_report, print_daily_error_info, 0);
/* Register extent status tree shrinker */

View File

@ -0,0 +1,38 @@
From: Ben Hutchings <ben@decadent.org.uk>
Date: Thu, 19 Jul 2018 23:36:52 +0100
Subject: tools/lib/api/fs/fs.c: Fix misuse of strncpy()
Bug-Debian: https://bugs.debian.org/897802
gcc 8 reports:
In function 'fs__env_override',
inlined from 'fs__get_mountpoint' at fs/fs.c:228:6:
fs/fs.c:222:2: error: 'strncpy' specified bound 4096 equals destination size [-Werror=stringop-truncation]
strncpy(fs->path, override_path, sizeof(fs->path));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I'm not convinced it makes sense to truncate the copied string here,
but since we're already doing so let's ensure it's still null-
terminated. Use strlcpy() instead.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
---
--- a/tools/lib/api/fs/fs.c
+++ b/tools/lib/api/fs/fs.c
@@ -12,6 +12,7 @@
#include <fcntl.h>
#include <unistd.h>
#include <sys/mount.h>
+#include <linux/string.h>
#include "fs.h"
#include "debug-internal.h"
@@ -219,7 +220,7 @@ static bool fs__env_override(struct fs *
return false;
fs->found = true;
- strncpy(fs->path, override_path, sizeof(fs->path));
+ strlcpy(fs->path, override_path, sizeof(fs->path));
return true;
}

View File

@ -0,0 +1,56 @@
From: Ben Hutchings <ben@decadent.org.uk>
Date: Fri, 20 Jul 2018 01:30:24 +0100
Subject: usbip: Fix misuse of strncpy()
Bug-Debian: https://bugs.debian.org/897802
gcc 8 reports:
usbip_device_driver.c: In function read_usb_vudc_device:
usbip_device_driver.c:106:2: error: strncpy specified bound 256 equals destination size [-Werror=stringop-truncation]
strncpy(dev->path, path, SYSFS_PATH_MAX);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
usbip_device_driver.c:125:2: error: strncpy specified bound 32 equals destination size [-Werror=stringop-truncation]
strncpy(dev->busid, name, SYSFS_BUS_ID_SIZE);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I'm not convinced it makes sense to truncate the copied strings here,
but since we're already doing so let's ensure they're still null-
terminated. We can't easily use strlcpy() here, so use snprintf().
usbip_common.c has the same problem.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
---
--- a/tools/usb/usbip/libsrc/usbip_common.c
+++ b/tools/usb/usbip/libsrc/usbip_common.c
@@ -226,8 +226,8 @@ int read_usb_device(struct udev_device *
path = udev_device_get_syspath(sdev);
name = udev_device_get_sysname(sdev);
- strncpy(udev->path, path, SYSFS_PATH_MAX);
- strncpy(udev->busid, name, SYSFS_BUS_ID_SIZE);
+ snprintf(udev->path, SYSFS_PATH_MAX, "%s", path);
+ snprintf(udev->busid, SYSFS_BUS_ID_SIZE, "%s", name);
sscanf(name, "%u-%u", &busnum, &devnum);
udev->busnum = busnum;
--- a/tools/usb/usbip/libsrc/usbip_device_driver.c
+++ b/tools/usb/usbip/libsrc/usbip_device_driver.c
@@ -103,7 +103,7 @@ int read_usb_vudc_device(struct udev_dev
copy_descr_attr16(dev, &descr, idProduct);
copy_descr_attr16(dev, &descr, bcdDevice);
- strncpy(dev->path, path, SYSFS_PATH_MAX);
+ snprintf(dev->path, SYSFS_PATH_MAX, "%s", path);
dev->speed = USB_SPEED_UNKNOWN;
speed = udev_device_get_sysattr_value(sdev, "current_speed");
@@ -122,7 +122,7 @@ int read_usb_vudc_device(struct udev_dev
dev->busnum = 0;
name = udev_device_get_sysname(plat);
- strncpy(dev->busid, name, SYSFS_BUS_ID_SIZE);
+ snprintf(dev->busid, SYSFS_BUS_ID_SIZE, "%s", name);
return 0;
err:
fclose(fd);

View File

@ -134,6 +134,7 @@ features/all/lockdown/arm64-add-kernel-config-option-to-lock-down-when.patch
# Security fixes
debian/i386-686-pae-pci-set-pci-nobios-by-default.patch
bugfix/all/ext4-fix-false-negatives-and-false-positives-in-ext4.patch
# Fix exported symbol versions
bugfix/all/module-disable-matching-missing-version-crc.patch
@ -151,6 +152,8 @@ bugfix/all/cpupower-bump-soname-version.patch
bugfix/all/cpupower-fix-checks-for-cpu-existence.patch
bugfix/all/lockdep-stub-nmi-watchdog-reset.patch
bugfix/all/lockdep-stub-task_struct-state.patch
bugfix/all/tools-lib-api-fs-fs.c-fix-misuse-of-strncpy.patch
bugfix/all/usbip-fix-misuse-of-strncpy.patch
# wireless: Disable regulatory.db direct loading (until we sort out signing)
debian/wireless-disable-regulatory.db-direct-loading.patch