Commit Graph

8292 Commits

Author SHA1 Message Date
Ben Hutchings 562a1601c8 [powerpc,powerpcspe,ppc64] linux-config: Eliminate config.*_bootwrapper.gz files
On powerpc architectures that may use a bootwrapper, we create a
temporary build_<arch>_<featureset>_<flavour>_bootwrapper directory
for each kernel configuration to hold the related tools which we won't
install for real (because they are always native).

This directory is then matched by the wildcard used in building
linux-config, causing linux-config packages to contain spurious
(empty) kconfig files based on these directories in addition to the
real kconfig files.

Rename the temporary directory to avoid matching that wildcard.
2018-12-25 23:20:03 +00:00
Ben Hutchings 64e3d0683d [riscv64] tools/include/.../bitsperlong.h: Add support for riscv 2018-12-25 23:02:20 +00:00
Ben Hutchings 01f97819f6 [ia64,m68k] libbpf: Don't build on architectures without performance events 2018-12-25 23:01:57 +00:00
Ben Hutchings 248736d493 linux-image-*-unsigned: Remove Provides field (Closes: #916927)
In unstable, linux-image-*-unsigned packages and any corresponding
metapackage updates tend to be available a few hours before the
corresponding signed packages.  An automatic upgrade with aptitude (at
least) may then install the unsigned kernel where a signed kernel
was previously used, resulting in boot failure.

I gave the linux-image-*-unsigned packages a Provides relation to the
unsuffixed (i.e. signed) package name because I thought packages built
by module-assistant generally depended on the corresponding kernel
package.  That may have been true once but doesn't appear to be so
now.

So the Provides field can be harmful and doesn't appear to be useful,
and should be removed.
2018-12-25 20:00:34 +00:00
Uwe Kleine-König 96ff8f1ba0 [armhf] enable some kconfig items for Allwinner SoCs 2018-12-23 17:31:16 +01:00
Salvatore Bonaccorso 4097f88361 Prepare to release linux (4.19.12-1). 2018-12-22 09:06:46 +01:00
Salvatore Bonaccorso 6886800dea iomap: Revert "fs/iomap.c: get/put the page in iomap_page_create/release()" 2018-12-21 23:14:53 +01:00
Salvatore Bonaccorso be9c4f49fd debian/changelog: Add back one relevant entry ("fs/iomap.c: get/put the page in iomap_page_create/release()")
This patch needs to be reverted for now as per upstream in
https://git.kernel.org/linus/a837eca2412051628c0529768c9bc4f3580b040e

Gbp-Dch: Ignore
2018-12-21 23:06:36 +01:00
Salvatore Bonaccorso 3c623d29c0 Update to 4.19.12
Cleanup debian/changelog file
2018-12-21 21:37:20 +01:00
Romain Perier 9237824a62 Remove not-enabled features from changelog 2018-12-20 12:22:49 +01:00
Salvatore Bonaccorso 6d099e7212 Update to 4.19.11
Drop ARM-dts-bcm2837-Fix-polarity-of-wifi-reset-GPIOs.patch

Cleanup debian/changelog file
2018-12-20 08:51:48 +01:00
Bastian Blank 27af619b3a Ignore various ABI changes 2018-12-18 21:40:24 +01:00
Bastian Blank a484545688 Merge branch 'noahm/linux-4.19.5+ena202' into sid
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

See merge request kernel-team/linux!77
2018-12-18 21:14:09 +01:00
Bastian Blank 68fcddf0f3 Merge branch 'master' into sid 2018-12-18 20:36:28 +01:00
Uwe Kleine-König 12e23cb061 [arm] Fix reset polarity of the wifi device on Raspberry Pi 3 2018-12-18 20:32:51 +01:00
Ben Hutchings d19f7ed1a4 linux-perf: Fix installation directories for BPF headers and examples
Closes: #916774
2018-12-18 17:20:51 +00:00
Ben Hutchings aaa2152dc5 linux-perf: Fix build-time check for unversioned files
The current check has never worked because the find -path predicate
matches against the whole path, including the given root.  In this
case that is $DESTDIR which always includes the version string.
Change to use cd before find.

Also, check all non-directories rather than all entries with "perf" in
the name.
2018-12-18 17:04:08 +00:00
Romain Perier 718d2285c2 Update to 4.19.10 2018-12-18 10:45:45 +01:00
Noah Meyerhans 3024a2d70d drivers/net/ethernet/amazon: Backport v2.0.2 from Linux 4.20
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

This mostly ammounts to cherry-picking the commits in the range described by
git log v4.19.5..v4.20-rc7 drivers/net/ethernet/amazon

Change e641e99f261f5203a911a9e0db54a214460d2cc4 introduced changes outside the
ena directory, but only removed a redundant #include and was trivial to scope
down.

Upstream dealt with merge conflicts in
d864991b220b7c62e81d21209e1fd978fd67352c; the resolution here was identical to
upstream.
2018-12-17 23:47:08 -08:00
Uwe Kleine-König a48b719088 [arm] Fix probing of 3rd gpio device on Armada 370. 2018-12-17 11:30:59 +01:00
Bastian Blank 9b22ee4b80 Prepare to release linux (4.19.9-1) 2018-12-16 19:46:40 +01:00
Bastian Blank ddc3772e93 Enable EFI_BOOTLOADER_CONTROL, EFI_CAPSULE_LOADER 2018-12-16 18:38:21 +01:00
Bastian Blank f027037f86 [x86] Enable DRM_XEN_FRONTEND 2018-12-16 18:23:38 +01:00
Bastian Blank 443f43fdf3 Enable netfilter flow table support 2018-12-16 18:21:04 +01:00
Bastian Blank b997f7d5e5 Enable IP_VS_MH 2018-12-16 18:15:09 +01:00
Bastian Blank 6069ca359b Enable NFT_CONNLIMIT, NFT_TUNNEL, NFT_SOCKET, NFT_OSF, NFT_TPROXY 2018-12-16 18:13:08 +01:00
Salvatore Bonaccorso 24537c953a Add changelog entry for CVE-2018-19824 2018-12-16 16:04:04 +01:00
Hans van Kranenburg 4d63e6ccbb [x86] Support booting a Xen PVH guest via Grub2
tl;dr: Xen PVH is the perfect upgrade path from PV and in combination
with grub2 support, it's the Xen "killer feature" we really should have
in Buster.

    Background info about Xen PVH:
https://wiki.xen.org/wiki/Virtualization_Spectrum#Almost_fully_PV:_PVH_mode

PVH mode in Xen, a.k.a. "HVM without having to run qemu" is a Xen guest
type best supported since Xen 4.11 and Linux kernel 4.17. Just like when
using PV mode, the guest does not have an emulated BIOS and the guest
kernel is directly started by the dom0. Buster will ship with Xen 4.11.

   Why is PVH interesting?

1. When the whole Meltdown/Spectre story started, it quickly became
apparent that 64-bit PV is the most problematic virtualization mode to
protect and to protect from, since address space from the hypervisor and
other guests (including dom0) is reachable from a 64-bit PV domU. To
mitigate this, XPTI (the Xen variant of PTI) has been implemented in the
hypervisor, but with a performance hit. HVM (so, also PVH) guests are
better isolated from the hypervisor and other guests. Inside the guest a
choice can be made about which mitigations to enable or not.  Also see
https://xenbits.xen.org/xsa/advisory-254.html

2. Unlike HVM, it's not needed to have a boot loader/sector, partitions,
and a qemu process in the dom0 (using cpu and memory and having an
attack surface).  Also, when running a largeish amount of domUs on a
physical server, not having all the qemu processes is an advantage.

3. Unlike PV, PVH makes use of all hardware features that accelerate
virtualization.

   The upgrade path from PV to PVH is super optimal. It's just setting
type='pvh' in the guest file and doing a full restart of the domU!

Unless... (insert Monty Python's Dramatic Chord!)

Unless... grub2 was used to boot the PV guests.

   Why is it interesting to be able to use grub?

Without using grub in between, the guest kernel and initrd have to be
copied out of the guest onto the dom0 filesystem, because the guest has
to be booted with them directly.  Currently, we already have the
grub-xen packages in Debian, which provide grub images which can be used
as kernel for a PV guest, after which it can load the actual linux
kernel that is symlinked from /vmlinuz on the guest filesystem at that
moment.

The final changes to the Linux kernel for grub+PVH are in Linux 4.20.
This request, to carry a few patches from Linux 4.20, provides one half
of the dots that need to be connected to make the full thing happen for
Buster.

Since we'll have Xen 4.11 in Buster, PVH is supported. The related grub2
patchset was committed to the grub master branch on Dec 12 2018 (yup,
today). So, I'll also start contacting the debian grub team soon to ask
(and help) to get the current grub-xen functionality in Debian to be
extended with PVH capabilities as well.

Test reports:
https://lists.xenproject.org/archives/html/xen-devel/2018-10/msg01913.html
https://lists.xenproject.org/archives/html/xen-devel/2018-11/msg03312.html
2018-12-14 16:55:04 +01:00
Romain Perier 79a9cada15 [rt] Update to 4.19.8-rt6 2018-12-14 10:56:14 +01:00
Ben Hutchings eea45f09a7 Merge branch 'enable-morus-and-aegis' into 'master'
Enable MORUS and AEGIS AEAD ciphers

See merge request kernel-team/linux!83
2018-12-14 05:52:27 +00:00
Salvatore Bonaccorso dfa9b24000 Update to 4.19.9
Drop vhost-vsock-fix-use-after-free-in-network-stack-call.patch

Cleanup debian/changelog file
2018-12-13 09:42:28 +01:00
Christoph Anton Mitterer 52a8f5d992 Enable MORUS and AEGIS AEAD ciphers
Signed-off-by: Christoph Anton Mitterer <mail@christoph.anton.mitterer.name>
2018-12-13 05:43:02 +01:00
Hans van Kranenburg edc7c6ee64 [x86] Fix booting as Xen dom0
This patch is from the tip repo, and will show up in 4.19 later.
2018-12-12 15:57:21 +01:00
Ben Hutchings 17d52832bc Merge branch 'libbpf-pr' into 'master'
Add libbpf0, libbpf-dev packages (#914428)

See merge request kernel-team/linux!74
2018-12-09 21:40:33 +00:00
Hilko Bengen 9eeeda7c0d Add versioned libbpf, libbpf-dev package (Closes: #914428) 2018-12-09 22:11:42 +01:00
Ben Hutchings 1240fb3ac3 integrity: Disable INTEGRITY_TRUSTED_KEYRING (Closes: #865277) 2018-12-08 21:34:33 +00:00
Ben Hutchings a5cdd1f2cb Merge branch 'master' of salsa.debian.org:nsc-guest/linux 2018-12-08 18:58:30 +00:00
Salvatore Bonaccorso d7534bd9b6 vhost/vsock: fix use-after-free in network stack callers (CVE-2018-14625) 2018-12-08 15:40:45 +01:00
Salvatore Bonaccorso a69098a3f1 Prepare to upload to unstable
Drop the ~exp1 from the version.

Set ABI to 1.
2018-12-08 15:05:46 +01:00
Hilko Bengen 4f1f7c5735 Add patches to build libbpf.so with SONAME, link against libelf 2018-12-08 15:02:05 +01:00
Salvatore Bonaccorso fae4befcc9 Merge branch 'sid' 2018-12-08 15:02:01 +01:00
Nicolas Schier 3436e1c735
ovl: permit overlayfs mounts in user namespaces (Closes: #913880)
Permit overlayfs mounts within user namespaces to allow utilisation of e.g.
unprivileged LXC overlay snapshots.

Except by the Ubuntu community [1], overlayfs mounts in user namespaces are
expected to be a security risk [2] and thus are not enabled on upstream
Linux kernels.  For the non-Ubuntu users that have to stick to unprivileged
overlay-based LXCs, this meant to patch and compile the kernel manually.
Instead, adding the kernel tainting 'permit_mounts_in_userns' module
parameter allows a kind of a user-friendly way to enable the feature.

Testable with:

    sudo modprobe overlay permit_mounts_in_userns=1
    sudo sysctl -w kernel.unprivileged_userns_clone=1
    mkdir -p lower upper work mnt
    unshare --map-root-user --mount \
        mount -t overlay none mnt \
              -o lowerdir=lower,upperdir=upper,workdir=work

[1]: Ubuntu allows unprivileged mounting of overlay filesystem
https://lists.ubuntu.com/archives/kernel-team/2014-February/038091.html

[2]: User namespaces + overlayfs = root privileges
https://lwn.net/Articles/671641/

Signed-off-by: Nicolas Schier <nicolas@fjasle.eu>
2018-12-08 12:34:31 +00:00
Salvatore Bonaccorso 014c728272 Update to 4.19.8
Drop patches applied upstream in 4.19.8

Cleanup debian/changelog file

Add CVE id for CVE-2018-18397
2018-12-08 13:27:04 +01:00
Salvatore Bonaccorso 4237db03be blk-mq: punt failed direct issue to dispatch list 2018-12-08 11:28:12 +01:00
Salvatore Bonaccorso 771f295a0f blk-mq: fix corruption with direct issue
Closes: #915666
2018-12-06 17:39:15 +01:00
Salvatore Bonaccorso 1966fd8d99 Add CVE id information for CVE-2018-16862
Gbp-Dch: Ignore
2018-12-05 22:16:56 +01:00
Salvatore Bonaccorso 72b28400e1 Move debian/changelog entry to upstream entry for CVE-2018-19406
Gbp-Dch: Ignore
2018-12-05 20:44:39 +01:00
Romain Perier 5222653db6 Update to 4.19.7 2018-12-05 19:59:32 +01:00
Romain Perier 36bf3a2656 Update to 4.19.5-rt4 2018-12-04 21:08:34 +01:00
Salvatore Bonaccorso 37094dbb55 [x86] KVM: LAPIC: Fix pv ipis use-before-initialization (CVE-2018-19406) 2018-12-03 21:11:24 +01:00