1. 21 5月, 2020 10 次提交
    • K
      selftests/exec: Add binfmt_script regression test · b081320f
      Kees Cook 提交于
      While working on commit b5372fe5 ("exec: load_script: Do not exec
      truncated interpreter path"), I wrote a series of test scripts to verify
      corner cases. However, soon after, commit 6eb3c3d0 ("exec: increase
      BINPRM_BUF_SIZE to 256") landed, resulting in the tests needing to be
      refactored for the larger BINPRM_BUF_SIZE, which got lost on my TODO
      list. During the recent exec refactoring work[1], the need for these tests
      resurfaced, so I've finished them up for addition to the kernel selftests.
      
      [1] https://lore.kernel.org/lkml/202005191144.E3112135@keescook/
      
      Link: https://lkml.kernel.org/r/202005200204.D07DF079@keescookSigned-off-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: NEric W. Biederman <ebiederm@xmission.com>
      b081320f
    • E
      exec: Control flow simplifications · 9d9488d4
      Eric W. Biederman 提交于
      It is hard to follow the control flow in exec.c as the code has evolved over
      time and something that used to work one way now works another.  This set of
      changes attempts to address the worst of that, to remove unnecessary work
      and to make the code a little easier to follow.
      
      The churn is a bit higher than the last version of this patchset, with
      renaming and cleaning up of comments.  I have split security_bprm_set_creds
      into security_bprm_creds_for_exec and security_bprm_repopulate_creds.  My
      goal was to make it clear that one hook completes its work while the other
      recaculates it's work each time a new interpreter is selected.
      
      I have added a new change at the beginning to make it clear that neither
      security_bprm_creds_for_exec nor security_bprm_repopulate_creds needs to be
      implemented as prepare_exec_creds properly does the work of setting up
      credentials unless something special is going on.
      
      I have made the execfd support generic and moved out of binfmt_misc so that
      I can remove the recursion.
      
      I have moved reassigning bprm->file into the loop that replaces the
      recursion.  In doing so I discovered that binfmt_misc was naughty and
      was returning -ENOEXEC in such a way that the search_binary_handler loop
      could not continue.  So I added a change to remove that naughtiness.
      
      Eric W. Biederman (8):
            exec: Teach prepare_exec_creds how exec treats uids & gids
            exec: Factor security_bprm_creds_for_exec out of security_bprm_set_creds
            exec: Convert security_bprm_set_creds into security_bprm_repopulate_creds
            exec: Allow load_misc_binary to call prepare_binfmt unconditionally
            exec: Move the call of prepare_binprm into search_binary_handler
            exec/binfmt_script: Don't modify bprm->buf and then return -ENOEXEC
            exec: Generic execfd support
            exec: Remove recursion from search_binary_handler
      
       arch/alpha/kernel/binfmt_loader.c  | 11 +----
       fs/binfmt_elf.c                    |  4 +-
       fs/binfmt_elf_fdpic.c              |  4 +-
       fs/binfmt_em86.c                   | 13 +----
       fs/binfmt_misc.c                   | 69 ++++-----------------------
       fs/binfmt_script.c                 | 82 ++++++++++++++------------------
       fs/exec.c                          | 97 ++++++++++++++++++++++++++------------
       include/linux/binfmts.h            | 36 ++++++--------
       include/linux/lsm_hook_defs.h      |  3 +-
       include/linux/lsm_hooks.h          | 52 +++++++++++---------
       include/linux/security.h           | 14 ++++--
       kernel/cred.c                      |  3 ++
       security/apparmor/domain.c         |  7 +--
       security/apparmor/include/domain.h |  2 +-
       security/apparmor/lsm.c            |  2 +-
       security/commoncap.c               |  9 ++--
       security/security.c                |  9 +++-
       security/selinux/hooks.c           |  8 ++--
       security/smack/smack_lsm.c         |  9 ++--
       security/tomoyo/tomoyo.c           | 12 ++---
       20 files changed, 202 insertions(+), 244 deletions(-)
      
      Link: https://lkml.kernel.org/r/877dx822er.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      9d9488d4
    • E
      exec: Remove recursion from search_binary_handler · bc2bf338
      Eric W. Biederman 提交于
      Recursion in kernel code is generally a bad idea as it can overflow
      the kernel stack.  Recursion in exec also hides that the code is
      looping and that the loop changes bprm->file.
      
      Instead of recursing in search_binary_handler have the methods that
      would recurse set bprm->interpreter and return 0.  Modify exec_binprm
      to loop when bprm->interpreter is set.  Consolidate all of the
      reassignments of bprm->file in that loop to make it clear what is
      going on.
      
      The structure of the new loop in exec_binprm is that all errors return
      immediately, while successful completion (ret == 0 &&
      !bprm->interpreter) just breaks out of the loop and runs what
      exec_bprm has always run upon successful completion.
      
      Fail if the an interpreter is being call after execfd has been set.
      The code has never properly handled an interpreter being called with
      execfd being set and with reassignments of bprm->file and the
      assignment of bprm->executable in generic code it has finally become
      possible to test and fail when if this problematic condition happens.
      
      With the reassignments of bprm->file and the assignment of
      bprm->executable moved into the generic code add a test to see if
      bprm->executable is being reassigned.
      
      In search_binary_handler remove the test for !bprm->file.  With all
      reassignments of bprm->file moved to exec_binprm bprm->file can never
      be NULL in search_binary_handler.
      
      Link: https://lkml.kernel.org/r/87sgfwyd84.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      bc2bf338
    • E
      exec: Generic execfd support · b8a61c9e
      Eric W. Biederman 提交于
      Most of the support for passing the file descriptor of an executable
      to an interpreter already lives in the generic code and in binfmt_elf.
      Rework the fields in binfmt_elf that deal with executable file
      descriptor passing to make executable file descriptor passing a first
      class concept.
      
      Move the fd_install from binfmt_misc into begin_new_exec after the new
      creds have been installed.  This means that accessing the file through
      /proc/<pid>/fd/N is able to see the creds for the new executable
      before allowing access to the new executables files.
      
      Performing the install of the executables file descriptor after
      the point of no return also means that nothing special needs to
      be done on error.  The exiting of the process will close all
      of it's open files.
      
      Move the would_dump from binfmt_misc into begin_new_exec right
      after would_dump is called on the bprm->file.  This makes it
      obvious this case exists and that no nesting of bprm->file is
      currently supported.
      
      In binfmt_misc the movement of fd_install into generic code means
      that it's special error exit path is no longer needed.
      
      Link: https://lkml.kernel.org/r/87y2poyd91.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      b8a61c9e
    • E
      exec/binfmt_script: Don't modify bprm->buf and then return -ENOEXEC · ccbb18b6
      Eric W. Biederman 提交于
      The return code -ENOEXEC serves to tell search_binary_handler that it
      should continue searching for the binfmt to handle a given file.  This
      makes return -ENOEXEC with a bprm->buf that is needed to continue the
      search problematic.
      
      The current binfmt_script manages to escape problems as it closes and
      clears bprm->file before return -ENOEXEC with bprm->buf modified.
      This prevents search_binary_handler from looping as it explicitly
      handles a NULL bprm->file.
      
      I plan on moving all of the bprm->file managment into fs/exec.c and out
      of the binary handlers so this will become a problem.
      
      Move closing bprm->file and the test for BINPRM_PATH_INACCESSIBLE
      down below the last return of -ENOEXEC.
      
      Introduce i_sep and i_end to track the end of the first argument and
      the end of the parameters respectively.  Using those, constification
      of all char * pointers, and the helpers next_terminator and
      next_non_spacetab guarantee the parameter parsing will not modify
      bprm->buf.
      
      Only modify bprm->buf to terminate the strings i_arg and i_name with
      '\0' for passing to copy_strings_kernel.
      
      When replacing loops with next_non_spacetab and next_terminator care
      has been take that the logic of the parsing code (short of replacing
      characters by '\0') remains the same.
      
      Link: https://lkml.kernel.org/r/874ksczru6.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      ccbb18b6
    • E
      exec: Move the call of prepare_binprm into search_binary_handler · 8b72ca90
      Eric W. Biederman 提交于
      The code in prepare_binary_handler needs to be run every time
      search_binary_handler is called so move the call into search_binary_handler
      itself to make the code simpler and easier to understand.
      
      Link: https://lkml.kernel.org/r/87d070zrvx.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Reviewed-by: NJames Morris <jamorris@linux.microsoft.com>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      8b72ca90
    • E
      exec: Allow load_misc_binary to call prepare_binprm unconditionally · a16b3357
      Eric W. Biederman 提交于
      Add a flag preserve_creds that binfmt_misc can set to prevent
      credentials from being updated.  This allows binfmt_misc to always
      call prepare_binprm.  Allowing the credential computation logic to be
      consolidated.
      
      Not replacing the credentials with the interpreters credentials is
      safe because because an open file descriptor to the executable is
      passed to the interpreter.   As the interpreter does not need to
      reopen the executable it is guaranteed to see the same file that
      exec sees.
      
      Ref: c407c033de84 ("[PATCH] binfmt_misc: improve calculation of interpreter's credentials")
      Link: https://lkml.kernel.org/r/87imgszrwo.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      a16b3357
    • E
      exec: Convert security_bprm_set_creds into security_bprm_repopulate_creds · 112b7147
      Eric W. Biederman 提交于
      Rename bprm->cap_elevated to bprm->active_secureexec and initialize it
      in prepare_binprm instead of in cap_bprm_set_creds.  Initializing
      bprm->active_secureexec in prepare_binprm allows multiple
      implementations of security_bprm_repopulate_creds to play nicely with
      each other.
      
      Rename security_bprm_set_creds to security_bprm_reopulate_creds to
      emphasize that this path recomputes part of bprm->cred.  This
      recomputation avoids the time of check vs time of use problems that
      are inherent in unix #! interpreters.
      
      In short two renames and a move in the location of initializing
      bprm->active_secureexec.
      
      Link: https://lkml.kernel.org/r/87o8qkzrxp.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      112b7147
    • E
      exec: Factor security_bprm_creds_for_exec out of security_bprm_set_creds · b8bff599
      Eric W. Biederman 提交于
      Today security_bprm_set_creds has several implementations:
      apparmor_bprm_set_creds, cap_bprm_set_creds, selinux_bprm_set_creds,
      smack_bprm_set_creds, and tomoyo_bprm_set_creds.
      
      Except for cap_bprm_set_creds they all test bprm->called_set_creds and
      return immediately if it is true.  The function cap_bprm_set_creds
      ignores bprm->calld_sed_creds entirely.
      
      Create a new LSM hook security_bprm_creds_for_exec that is called just
      before prepare_binprm in __do_execve_file, resulting in a LSM hook
      that is called exactly once for the entire of exec.  Modify the bits
      of security_bprm_set_creds that only want to be called once per exec
      into security_bprm_creds_for_exec, leaving only cap_bprm_set_creds
      behind.
      
      Remove bprm->called_set_creds all of it's former users have been moved
      to security_bprm_creds_for_exec.
      
      Add or upate comments a appropriate to bring them up to date and
      to reflect this change.
      
      Link: https://lkml.kernel.org/r/87v9kszrzh.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Acked-by: Casey Schaufler <casey@schaufler-ca.com> # For the LSM and Smack bits
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      b8bff599
    • E
      exec: Teach prepare_exec_creds how exec treats uids & gids · 87b047d2
      Eric W. Biederman 提交于
      It is almost possible to use the result of prepare_exec_creds with no
      modifications during exec.  Update prepare_exec_creds to initialize
      the suid and the fsuid to the euid, and the sgid and the fsgid to the
      egid.  This is all that is needed to handle the common case of exec
      when nothing special like a setuid exec is happening.
      
      That this preserves the existing behavior of exec can be verified
      by examing bprm_fill_uid and cap_bprm_set_creds.
      
      This change makes it clear that the later parts of exec that
      update bprm->cred are just need to handle special cases such
      as setuid exec and change of domains.
      
      Link: https://lkml.kernel.org/r/871rng22dm.fsf_-_@x220.int.ebiederm.orgAcked-by: NLinus Torvalds <torvalds@linux-foundation.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      87b047d2
  2. 18 5月, 2020 1 次提交
  3. 17 5月, 2020 1 次提交
    • E
      exec: Move would_dump into flush_old_exec · f87d1c95
      Eric W. Biederman 提交于
      I goofed when I added mm->user_ns support to would_dump.  I missed the
      fact that in the case of binfmt_loader, binfmt_em86, binfmt_misc, and
      binfmt_script bprm->file is reassigned.  Which made the move of
      would_dump from setup_new_exec to __do_execve_file before exec_binprm
      incorrect as it can result in would_dump running on the script instead
      of the interpreter of the script.
      
      The net result is that the code stopped making unreadable interpreters
      undumpable.  Which allows them to be ptraced and written to disk
      without special permissions.  Oops.
      
      The move was necessary because the call in set_new_exec was after
      bprm->mm was no longer valid.
      
      To correct this mistake move the misplaced would_dump from
      __do_execve_file into flos_old_exec, before exec_mmap is called.
      
      I tested and confirmed that without this fix I can attach with gdb to
      a script with an unreadable interpreter, and with this fix I can not.
      
      Cc: stable@vger.kernel.org
      Fixes: f84df2a6 ("exec: Ensure mm->user_ns contains the execed files")
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      f87d1c95
  4. 12 5月, 2020 4 次提交
  5. 09 5月, 2020 3 次提交
  6. 08 5月, 2020 7 次提交
  7. 27 4月, 2020 10 次提交
    • L
      Linux 5.7-rc3 · 6a8b55ed
      Linus Torvalds 提交于
      6a8b55ed
    • L
      Merge tag '5.7-rc2-smb3-fixes' of git://git.samba.org/sfrench/cifs-2.6 · d4fb4bfb
      Linus Torvalds 提交于
      Pull cifs fixes from Steve French:
       "Five cifs/smb3 fixes:two for DFS reconnect failover, one lease fix for
        stable and the others to fix a missing spinlock during reconnect"
      
      * tag '5.7-rc2-smb3-fixes' of git://git.samba.org/sfrench/cifs-2.6:
        cifs: fix uninitialised lease_key in open_shroot()
        cifs: ensure correct super block for DFS reconnect
        cifs: do not share tcons with DFS
        cifs: minor update to comments around the cifs_tcp_ses_lock mutex
        cifs: protect updating server->dstaddr with a spinlock
      d4fb4bfb
    • L
      Merge tag 'usb-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb · e9a61afb
      Linus Torvalds 提交于
      Pull USB fixes from Greg KH:
       "Here are a number of USB driver fixes for 5.7-rc3.
      
        Nothing huge, just the usual collection of:
      
         - xhci fixes
      
         - gadget driver fixes
      
         - syzkaller fuzzing fixes
      
         - new device ids and DT bindings
      
         - new quirks added for broken devices
      
        A few of the gadget driver fixes show up twice here as they were
        applied to my branch, and also by Felipe to his branch which I then
        pulled in as we got out of sync a bit.
      
        All of these have been in linux-next with no reported issues"
      
      * tag 'usb-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb: (33 commits)
        USB: sisusbvga: Change port variable from signed to unsigned
        usb-storage: Add unusual_devs entry for JMicron JMS566
        USB: hub: Revert commit bd0e6c96 ("usb: hub: try old enumeration scheme first for high speed devices")
        USB: hub: Fix handling of connect changes during sleep
        usb: typec: altmode: Fix typec_altmode_get_partner sometimes returning an invalid pointer
        xhci: Don't clear hub TT buffer on ep0 protocol stall
        xhci: prevent bus suspend if a roothub port detected a over-current condition
        xhci: Fix handling halted endpoint even if endpoint ring appears empty
        usb: raw-gadget: Fix copy_to/from_user() checks
        usb: raw-gadget: fix raw_event_queue_fetch locking
        usb: gadget: udc: atmel: Fix vbus disconnect handling
        usb: dwc3: gadget: Fix request completion check
        USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE
        phy: tegra: Select USB_COMMON for usb_get_maximum_speed()
        usb: typec: tcpm: Ignore CC and vbus changes in PORT_RESET change
        usb: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset()
        cdc-acm: introduce a cool down
        cdc-acm: close race betrween suspend() and acm_softint
        UAS: fix deadlock in error handling and PM flushing work
        UAS: no use logging any details in case of ENODEV
        ...
      e9a61afb
    • L
      Merge tag 'tty-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty · c5f33785
      Linus Torvalds 提交于
      Pull tty/serial fixes from Greg KH:
       "Here are some tty and serial driver fixes for 5.7-rc3.
      
        The "largest" in here are a number of reverts for previous changes to
        the uartps serial driver that turned out to not be a good idea at all.
      
        The others are just small fixes found by people and tools. Included in
        here is a much-reported symbol export needed by previous changes that
        happened in 5.7-rc1. All of these have been in linux-next for a while
        with no reported issues"
      
      * tag 'tty-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty:
        tty: hvc: fix buffer overflow during hvc_alloc().
        tty: rocket, avoid OOB access
        tty: serial: bcm63xx: fix missing clk_put() in bcm63xx_uart
        vt: don't hardcode the mem allocation upper bound
        tty: serial: owl: add "much needed" clk_prepare_enable()
        vt: don't use kmalloc() for the unicode screen buffer
        tty/sysrq: Export sysrq_mask(), sysrq_toggle_support()
        serial: sh-sci: Make sure status register SCxSR is read in correct sequence
        serial: sunhv: Initialize lock for non-registered console
        Revert "serial: uartps: Register own uart console and driver structures"
        Revert "serial: uartps: Move Port ID to device data structure"
        Revert "serial: uartps: Change uart ID port allocation"
        Revert "serial: uartps: Do not allow use aliases >= MAX_UART_INSTANCES"
        Revert "serial: uartps: Fix error path when alloc failed"
        Revert "serial: uartps: Use the same dynamic major number for all ports"
        Revert "serial: uartps: Fix uartps_major handling"
      c5f33785
    • L
      Merge tag 'char-misc-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc · f6da8bd1
      Linus Torvalds 提交于
      Pull char/misc driver fixes from Greg KH:
       "Here are 4 small misc driver fixes for 5.7-rc3:
      
         - mei driver fix
      
         - interconnect driver fix
      
         - two fpga driver fixes
      
        All have been in linux-next with no reported issues"
      
      * tag 'char-misc-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc:
        interconnect: qcom: Fix uninitialized tcs_cmd::wait
        mei: me: fix irq number stored in hw struct
        fpga: dfl: pci: fix return value of cci_pci_sriov_configure
        fpga: zynq: Remove clk_get error message for probe defer
      f6da8bd1
    • L
      Merge tag 'staging-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging · edf17b28
      Linus Torvalds 提交于
      Pull staging/IIO driver fixes from Greg KH:
       "Here are some small staging and IIO driver fixes for 5.7-rc3
      
        Lots of tiny things for reported issues in staging and IIO drivers,
        including a counter driver fix as well (the iio drivers seem to be
        tied to those). Full details of the fixes are in the shortlog.
      
        All of these have been in linux-next for a while with no reported
        issues"
      
      * tag 'staging-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging: (27 commits)
        staging: vt6656: Fix calling conditions of vnt_set_bss_mode
        staging: comedi: Fix comedi_device refcnt leak in comedi_open
        staging: vt6656: Fix pairwise key entry save.
        staging: vt6656: Fix drivers TBTT timing counter.
        staging: vt6656: Don't set RCR_MULTICAST or RCR_BROADCAST by default.
        MAINTAINERS: remove Stefan Popa's email
        iio: adc: ad7192: fix null pointer de-reference crash during probe
        iio: core: remove extra semi-colon from devm_iio_device_register() macro
        iio: adc: ti-ads8344: properly byte swap value
        iio: imu: inv_mpu6050: fix suspend/resume with runtime power
        iio: st_sensors: rely on odr mask to know if odr can be set
        iio: xilinx-xadc: Make sure not exceed maximum samplerate
        iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode
        iio: xilinx-xadc: Fix clearing interrupt when enabling trigger
        iio: xilinx-xadc: Fix ADC-B powerdown
        iio: dac: ad5770r: fix off-by-one check on maximum number of channels
        iio: imu: st_lsm6dsx: flush hw FIFO before resetting the device
        iio: core: Fix handling of 'dB'
        dt-bindings: iio: adc: stm32-adc: fix id relative path
        counter: 104-quad-8: Add lock guards - generic interface
        ...
      edf17b28
    • L
      Merge tag 'driver-core-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/driver-core · a8a0e2a9
      Linus Torvalds 提交于
      Pull driver core fixes from Greg KH:
       "Here are some small firmware/driver core/debugfs fixes for 5.7-rc3.
      
        The debugfs change is now possible as now the last users of
        debugfs_create_u32() have been fixed up in the different trees that
        got merged into 5.7-rc1, and I don't want it creeping back in.
      
        The firmware changes did cause a regression in linux-next, so the
        final patch here reverts part of that, re-exporting the symbol to
        resolve that issue. All of these patches, with the exception of the
        final one, have been in linux-next with only that one reported issue"
      
      * tag 'driver-core-5.7-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/driver-core:
        firmware_loader: revert removal of the fw_fallback_config export
        debugfs: remove return value of debugfs_create_u32()
        firmware_loader: remove unused exports
        firmware: imx: fix compile-testing
      a8a0e2a9
    • L
      Merge tag 's390-5.7-3' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux · 749f0461
      Linus Torvalds 提交于
      Pull s390 fixes from Vasily Gorbik:
      
       - Add a few notrace annotations to avoid potential crashes when
         switching ftrace tracers.
      
       - Avoid setting affinity for floating irqs in pci code.
      
       - Fix build issue found by kbuild test robot.
      
      * tag 's390-5.7-3' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux:
        s390/protvirt: fix compilation issue
        s390/pci: do not set affinity for floating irqs
        s390/ftrace: fix potential crashes when switching tracers
      749f0461
    • L
      Merge tag 'powerpc-5.7-3' of git://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux · 670bcd79
      Linus Torvalds 提交于
      Pull powerpc fixes from Michael Ellerman:
      
       - One important fix for a bug in the way we find the cache-line size
         from the device tree, which was leading to the wrong size being
         reported to userspace on some platforms.
      
       - A fix for 8xx STRICT_KERNEL_RWX which was leaving TLB entries around
         leading to a window at boot when the strict mapping wasn't enforced.
      
       - A fix to enable our KUAP (kernel user access prevention) debugging on
         PPC32.
      
       - A build fix for clang in lib/mpi.
      
      Thanks to: Chris Packham, Christophe Leroy, Nathan Chancellor, Qian Cai.
      
      * tag 'powerpc-5.7-3' of git://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux:
        lib/mpi: Fix building for powerpc with clang
        powerpc/mm: Fix CONFIG_PPC_KUAP_DEBUG on PPC32
        powerpc/8xx: Fix STRICT_KERNEL_RWX startup test failure
        powerpc/setup_64: Set cache-line-size based on cache-block-size
      670bcd79
    • L
      Merge tag 'devicetree-fixes-for-5.7-2' of git://git.kernel.org/pub/scm/linux/kernel/git/robh/linux · 58792882
      Linus Torvalds 提交于
      Pull more Devicetree fixes from Rob Herring:
       "A couple of schema and kbuild fixes"
      
      * tag 'devicetree-fixes-for-5.7-2' of git://git.kernel.org/pub/scm/linux/kernel/git/robh/linux:
        dt-bindings: phy: qcom-qusb2: Fix defaults
        dt-bindings: Fix erroneous 'additionalProperties'
        dt-bindings: Fix command line length limit calling dt-mk-schema
        dt-bindings: Re-enable core schemas for dtbs_check
      58792882
  8. 26 4月, 2020 4 次提交