- 03 Apr, 2018 40 commits
-
-
Oliver O'Halloran authored
BugLink: http://bugs.launchpad.net/bugs/1756121 commit 8f5f525d upstream. When the kernel is compiled to use 64bit ABIv2 the _GLOBAL() macro does not include a global entry point. A function's global entry point is used when the function is called from a different TOC context and in the kernel this typically means a call from a module into the vmlinux (or vice-versa). There are a few exported asm functions declared with _GLOBAL() and calling them from a module will likely crash the kernel since any TOC relative load will yield garbage. flush_icache_range() and flush_dcache_range() are both exported to modules, and use the TOC, so must use _GLOBAL_TOC(). Fixes: 721aeaa9 ("powerpc: Build little endian ppc64 kernel with ABIv2") Signed-off-by: Oliver O'Halloran <oohall@gmail.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Naveen N. Rao authored
BugLink: http://bugs.launchpad.net/bugs/1756121 commit 844e3be4 upstream. Classic BPF JIT was never ported completely to work on little endian powerpc. However, it can be enabled and will crash the system when used. As such, disable use of BPF JIT on ppc64le. Fixes: 7c105b63 ("powerpc: Add CONFIG_CPU_LITTLE_ENDIAN kernel config option.") Reported-by: Thadeu Lima de Souza Cascardo <cascardo@redhat.com> Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com> Acked-by: Thadeu Lima de Souza Cascardo <cascardo@redhat.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 76b01258. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 8319f6cd. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 03529808. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 341c0f15. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit dad6dc82. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit b9bc93cd. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 2d94edf3. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 0929d8b8. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit e1f3564b. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 00d9e152. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 313e806c. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 5dcadca3. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit d585250a. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit is provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 323c02b0. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
Revert "UBUNTU: SAUCE: Remove setup.h include file otherwise compilation complains about missing header file." This reverts commit 4fc2e0b5. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit cab09201. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit ee71154e. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 88424261. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit c049d338. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 1a65b15b. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit e82cad5f. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit d275a2d6. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 2d8d8a24. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 9fb6d750. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit b6a090d6. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 68ee8a04. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 2a12cf77. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121 The functionality of this commit will be provided by the following upstream patch series: * powerpc/64s: Allow control of RFI flush via debugfs * powerpc/64s: Wire up cpu_show_meltdown() * powerpc/powernv: Check device-tree for RFI flush settings * powerpc/pseries: Query hypervisor for RFI flush settings * powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti * powerpc/64s: Add support for RFI flush of L1-D cache * powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL * powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL * powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL * powerpc/64s: Simple RFI macro conversions * powerpc/64: Add macros for annotating the destination of rfid/hrfid * powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Juerg Haefliger authored
This reverts commit 1a7bb619. CVE-2017-5754 BugLink: http://bugs.launchpad.net/bugs/1756121Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Alexander Duyck authored
BugLink: http://bugs.launchpad.net/bugs/1723127 From what I can tell the practical limitation on the size of the Tx data buffer is the fact that the Tx descriptor is limited to 14 bits. As such we cannot use 16K as is typically used on the other Intel drivers. However artificially limiting ourselves to 8K can be expensive as this means that we will consume up to 10 descriptors (1 context, 1 for header, and 9 for payload, non-8K aligned) in a single send. I propose that we can reduce this by increasing the maximum data for a 4K aligned block to 12K. We can reduce the descriptors used for a 32K aligned block by 1 by increasing the size like this. In addition we still have the 4K - 1 of space that is still unused. We can use this as a bit of extra padding when dealing with data that is not aligned to 4K. By aligning the descriptors after the first to 4K we can improve the efficiency of PCIe accesses as we can avoid using byte enables and can fetch full TLP transactions after the first fetch of the buffer. This helps to improve PCIe efficiency. Below is the results of testing before and after with this patch: Recv Send Send Utilization Service Demand Socket Socket Message Elapsed Send Recv Send Recv Size Size Size Time Throughput local remote local remote bytes bytes bytes secs. 10^6bits/s % S % U us/KB us/KB Before: 87380 16384 16384 10.00 33682.24 20.27 -1.00 0.592 -1.00 After: 87380 16384 16384 10.00 34204.08 20.54 -1.00 0.590 -1.00 So the net result of this patch is that we have a small gain in throughput due to a reduction in overhead for putting together the frame. Signed-off-by: Alexander Duyck <aduyck@mirantis.com> Tested-by: Andrew Bowers <andrewx.bowers@intel.com> Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com> (cherry-picked from 5c4654da) Signed-off-by: Dan Streetman <ddstreet@canonical.com> Acked-by: Stefan Bader <stefan.bader@canonical.com> Acked-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com> Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
-
Alexander Duyck authored
BugLink: http://bugs.launchpad.net/bugs/1723127 The original code for __i40e_chk_linearize didn't take into account the fact that if a fragment is 16K in size or larger it has to be split over 2 descriptors and the smaller of those 2 descriptors will be on the trailing edge of the transmit. As a result we can get into situations where we didn't catch requests that could result in a Tx hang. This patch takes care of that by subtracting the length of all but the trailing edge of the stale fragment before we test for sum. By doing this we can guarantee that we have all cases covered, including the case of a fragment that spans multiple descriptors. We don't need to worry about checking the inner portions of this since 12K is the maximum aligned DMA size and that is larger than any MSS will ever be since the MTU limit for jumbos is something on the order of 9K. Signed-off-by: Alexander Duyck <alexander.h.duyck@intel.com> Tested-by: Andrew Bowers <andrewx.bowers@intel.com> Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com> (cherry-picked from 248de22e) Signed-off-by: Dan Streetman <ddstreet@canonical.com> Acked-by: Stefan Bader <stefan.bader@canonical.com> Acked-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com> Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
-
Greg Kroah-Hartman authored
BugLink: http://bugs.launchpad.net/bugs/1755509Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Stefan Agner authored
BugLink: http://bugs.launchpad.net/bugs/1755509 commit d593574a upstream. Since clocks are disabled except during message transfer clocks are also disabled when spi_imx_remove gets called. Accessing registers leads to a freeeze at least on a i.MX 6ULL. Enable clocks before disabling accessing the MXC_CSPICTRL register. Fixes: 9e556dcc ("spi: spi-imx: only enable the clocks when we start to transfer a message") Signed-off-by: Stefan Agner <stefan@agner.ch> Signed-off-by: Mark Brown <broonie@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Fabio Estevam authored
BugLink: http://bugs.launchpad.net/bugs/1755509 commit 38b1f0fb upstream. The wakeup mechanism via RTSDEN bit relies on the system using the RTS/CTS lines, so only allow such wakeup method when the system actually has RTS/CTS support. Fixes: bc85734b ("serial: imx: allow waking up on RTSD") Signed-off-by: Fabio Estevam <fabio.estevam@nxp.com> Reviewed-by: Martin Kaiser <martin@kaiser.cx> Acked-by: Fugang Duan <fugang.duan@nxp.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Mark Salyzyn authored
BugLink: http://bugs.launchpad.net/bugs/1755509 In the absence of commit a4298e45 ("net: add SOCK_RCU_FREE socket flag") and all the associated infrastructure changes to take advantage of a RCU grace period before freeing, there is a heightened possibility that a security check is performed while an ill-timed setsockopt call races in from user space. It then is prudent to null check sk_security, and if the case, reject the permissions. Because of the nature of this problem, hard to duplicate, no clear path, this patch is a simplified band-aid for stable trees lacking the infrastructure for the series of commits leading up to providing a suitable RCU grace period. This adjustment is orthogonal to infrastructure improvements that may nullify the needed check, but could be added as good code hygiene in all trees. general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 14233 Comm: syz-executor2 Not tainted 4.4.112-g5f6325b #28 task: ffff8801d1095f00 task.stack: ffff8800b5950000 RIP: 0010:[<ffffffff81b69b7e>] [<ffffffff81b69b7e>] sock_has_perm+0x1fe/0x3e0 security/selinux/hooks.c:4069 RSP: 0018:ffff8800b5957ce0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 1ffff10016b2af9f RCX: ffffffff81b69b51 RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000010 RBP: ffff8800b5957de0 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 1ffff10016b2af68 R12: ffff8800b5957db8 R13: 0000000000000000 R14: ffff8800b7259f40 R15: 00000000000000d7 FS: 00007f72f5ae2700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000a2fa38 CR3: 00000001d7980000 CR4: 0000000000160670 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff81b69a1f ffff8800b5957d58 00008000b5957d30 0000000041b58ab3 ffffffff83fc82f2 ffffffff81b69980 0000000000000246 ffff8801d1096770 ffff8801d3165668 ffffffff8157844b ffff8801d1095f00 ffff880000000001 Call Trace: [<ffffffff81b6a19d>] selinux_socket_setsockopt+0x4d/0x80 security/selinux/hooks.c:4338 [<ffffffff81b4873d>] security_socket_setsockopt+0x7d/0xb0 security/security.c:1257 [<ffffffff82df1ac8>] SYSC_setsockopt net/socket.c:1757 [inline] [<ffffffff82df1ac8>] SyS_setsockopt+0xe8/0x250 net/socket.c:1746 [<ffffffff83776499>] entry_SYSCALL_64_fastpath+0x16/0x92 Code: c2 42 9b b6 81 be 01 00 00 00 48 c7 c7 a0 cb 2b 84 e8 f7 2f 6d ff 49 8d 7d 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 83 01 00 00 41 8b 75 10 31 RIP [<ffffffff81b69b7e>] sock_has_perm+0x1fe/0x3e0 security/selinux/hooks.c:4069 RSP <ffff8800b5957ce0> ---[ end trace 7b5aaf788fef6174 ]--- Signed-off-by: Mark Salyzyn <salyzyn@android.com> Acked-by: Paul Moore <paul@paul-moore.com> Cc: Eric Dumazet <edumazet@google.com> Cc: Stephen Smalley <sds@tycho.nsa.gov> Cc: selinux@tycho.nsa.gov Cc: linux-security-module@vger.kernel.org Cc: Eric Paris <eparis@parisplace.org> Cc: Serge E. Hallyn <serge@hallyn.com> Cc: linux-kernel@vger.kernel.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Oliver Neukum authored
BugLink: http://bugs.launchpad.net/bugs/1755509 commit cbeef22f upstream. Quoting Hans: If we return 1 from our post_reset handler, then our disconnect handler will be called immediately afterwards. Since pre_reset blocks all scsi requests our disconnect handler will then hang in the scsi_remove_host call. This is esp. bad because our disconnect handler hanging for ever also stops the USB subsys from enumerating any new USB devices, causes commands like lsusb to hang, etc. In practice this happens when unplugging some uas devices because the hub code may see the device as needing a warm-reset and calls usb_reset_device before seeing the disconnect. In this case uas_configure_endpoints fails with -ENODEV. We do not want to print an error for this, so this commit also silences the shost_printk for -ENODEV. ENDQUOTE However, if we do that we better drop any unconditional execution and report to the SCSI subsystem that we have undergone a reset but we are not operational now. Signed-off-by: Oliver Neukum <oneukum@suse.com> Reported-by: Hans de Goede <hdegoede@redhat.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Hemant Kumar authored
BugLink: http://bugs.launchpad.net/bugs/1755509 commit ce5bf9a5 upstream. Upon usb composition switch there is possibility of ep0 file release happening after gadget driver bind. In case of composition switch from adb to a non-adb composition gadget will never gets bound again resulting into failure of usb device enumeration. Fix this issue by checking FFS_FL_BOUND flag and avoid extra gadget driver unbind if it is already done as part of composition switch. This fixes adb reconnection error reported on Android running v4.4 and above kernel versions. Verified on Hikey running vanilla v4.15-rc7 + few out of tree Mali patches. Reviewed-at: https://android-review.googlesource.com/#/c/582632/ Cc: Felipe Balbi <balbi@kernel.org> Cc: Greg KH <gregkh@linux-foundation.org> Cc: Michal Nazarewicz <mina86@mina86.com> Cc: John Stultz <john.stultz@linaro.org> Cc: Dmitry Shmidt <dimitrysh@google.com> Cc: Badhri <badhri@google.com> Cc: Android Kernel Team <kernel-team@android.com> Signed-off-by: Hemant Kumar <hemantk@codeaurora.org> [AmitP: Cherry-picked it from android-4.14 and updated the commit log] Signed-off-by: Amit Pundir <amit.pundir@linaro.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Johan Hovold authored
BugLink: http://bugs.launchpad.net/bugs/1755509 commit 46fe895e upstream. Add new Motorola Tetra (simple) driver for Motorola Solutions TETRA PEI devices. D: Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1 P: Vendor=0cad ProdID=9011 Rev=24.16 S: Manufacturer=Motorola Solutions Inc. S: Product=Motorola Solutions TETRA PEI interface C: #Ifs= 2 Cfg#= 1 Atr=80 MxPwr=500mA I: If#= 0 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=00 Prot=00 Driver=(none) I: If#= 1 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=00 Prot=00 Driver=(none) Note that these devices do not support the CDC SET_CONTROL_LINE_STATE request (for any interface). Reported-by: Max Schulze <max.schulze@posteo.de> Tested-by: Max Schulze <max.schulze@posteo.de> Signed-off-by: Johan Hovold <johan@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-
Shuah Khan authored
BugLink: http://bugs.launchpad.net/bugs/1755509 commit ef824501 upstream. usbip host lists devices attached to vhci_hcd on the same server when user does attach over localhost or specifies the server as the remote. usbip attach -r localhost -b busid or usbip attach -r servername (or server IP) Fix it to check and not list devices that are attached to vhci_hcd. Signed-off-by: Shuah Khan <shuahkh@osg.samsung.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Juerg Haefliger <juergh@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
-