1. 03 11月, 2020 1 次提交
  2. 14 9月, 2020 2 次提交
  3. 02 9月, 2020 1 次提交
  4. 02 7月, 2020 1 次提交
  5. 11 3月, 2020 1 次提交
  6. 18 2月, 2020 1 次提交
  7. 25 11月, 2019 1 次提交
  8. 04 10月, 2019 1 次提交
  9. 13 9月, 2019 1 次提交
  10. 20 8月, 2019 1 次提交
  11. 30 7月, 2019 1 次提交
  12. 15 6月, 2019 2 次提交
    • M
      kbuild: add CONFIG_HEADERS_INSTALL and loosen the dependency of samples · e949f4c2
      Masahiro Yamada 提交于
      Commit 5318321d ("samples: disable CONFIG_SAMPLES for UML") used
      a big hammer to fix the build errors under the samples/ directory.
      Only some samples actually include uapi headers from usr/include.
      
      Introduce CONFIG_HEADERS_INSTALL since 'depends on HEADERS_INSTALL' is
      clearer than 'depends on !UML'. If this option is enabled, uapi headers
      are installed before starting directory descending.
      
      I added 'depends on HEADERS_INSTALL' to per-sample CONFIG options.
      This allows UML to compile some samples.
      
      $ make ARCH=um allmodconfig samples/
        [ snip ]
        CC [M]  samples/configfs/configfs_sample.o
        CC [M]  samples/kfifo/bytestream-example.o
        CC [M]  samples/kfifo/dma-example.o
        CC [M]  samples/kfifo/inttype-example.o
        CC [M]  samples/kfifo/record-example.o
        CC [M]  samples/kobject/kobject-example.o
        CC [M]  samples/kobject/kset-example.o
        CC [M]  samples/trace_events/trace-events-sample.o
        CC [M]  samples/trace_printk/trace-printk.o
        AR      samples/vfio-mdev/built-in.a
        AR      samples/built-in.a
      Signed-off-by: NMasahiro Yamada <yamada.masahiro@socionext.com>
      e949f4c2
    • M
      39c00378
  13. 29 4月, 2019 1 次提交
  14. 24 1月, 2019 1 次提交
  15. 05 11月, 2018 1 次提交
  16. 04 9月, 2018 1 次提交
  17. 27 4月, 2018 1 次提交
    • S
      s390: update defconfigs · d14be68f
      Sebastian Ott 提交于
      Change the following to y:
      
      arch/s390/configs/performance_defconfig:262:warning: symbol value 'm' invalid for NF_TABLES_IPV4
      arch/s390/configs/performance_defconfig:264:warning: symbol value 'm' invalid for NF_TABLES_ARP
      arch/s390/configs/performance_defconfig:285:warning: symbol value 'm' invalid for NF_TABLES_IPV6
      arch/s390/configs/performance_defconfig:306:warning: symbol value 'm' invalid for NF_TABLES_BRIDGE
      Signed-off-by: NSebastian Ott <sebott@linux.ibm.com>
      Signed-off-by: NMartin Schwidefsky <schwidefsky@de.ibm.com>
      d14be68f
  18. 16 4月, 2018 3 次提交
  19. 16 11月, 2017 1 次提交
    • M
      s390: Remove CONFIG_HARDENED_USERCOPY · 6470c0cc
      Michael Holzheu 提交于
      When running the crash tool on a s390 live system we get a kernel panic
      for reading memory within the kernel image:
      
       # uname -a
         Linux r3545011 4.14.0-rc8-00066-g1c9dbd46 #45 SMP PREEMPT Fri Nov 10 16:16:22 CET 2017 s390x s390x s390x GNU/Linux
       # crash /boot/vmlinux-devel /dev/mem
       # crash> rd 0x100000
      
       usercopy: kernel memory exposure attempt detected from 0000000000100000 (<kernel text>) (8 bytes)
       ------------[ cut here ]------------
       kernel BUG at mm/usercopy.c:72!
       illegal operation: 0001 ilc:1 [#1] PREEMPT SMP.
       Modules linked in:
       CPU: 0 PID: 1461 Comm: crash Not tainted 4.14.0-rc8-00066-g1c9dbd46-dirty #46
       Hardware name: IBM 2827 H66 706 (z/VM 6.3.0)
       task: 000000001ad10100 task.stack: 000000001df78000
       Krnl PSW : 0704d00180000000 000000000038165c (__check_object_size+0x164/0x1d0)
                  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3
       Krnl GPRS: 0000000012440e1d 0000000080000000 0000000000000061 00000000001cabc0
                  00000000001cc6d6 0000000000000000 0000000000cc4ed2 0000000000001000
                  000003ffc22fdd20 0000000000000008 0000000000100008 0000000000000001
                  0000000000000008 0000000000100000 0000000000381658 000000001df7bc90
       Krnl Code: 000000000038164c: c020004a1c4a        larl    %r2,cc4ee0
                  0000000000381652: c0e5fff2581b        brasl   %r14,1cc688
                 #0000000000381658: a7f40001            brc     15,38165a
                 >000000000038165c: eb42000c000c        srlg    %r4,%r2,12
                  0000000000381662: eb32001c000c        srlg    %r3,%r2,28
                  0000000000381668: c0110003ffff        lgfi    %r1,262143
                  000000000038166e: ec31ff752065        clgrj   %r3,%r1,2,381558
                  0000000000381674: a7f4ff67            brc     15,381542
       Call Trace:
       ([<0000000000381658>] __check_object_size+0x160/0x1d0)
        [<000000000082263a>] read_mem+0xaa/0x130.
        [<0000000000386182>] __vfs_read+0x42/0x168.
        [<000000000038632e>] vfs_read+0x86/0x140.
        [<0000000000386a26>] SyS_read+0x66/0xc0.
        [<0000000000ace6a4>] system_call+0xc4/0x2b0.
       INFO: lockdep is turned off.
       Last Breaking-Event-Address:
        [<0000000000381658>] __check_object_size+0x160/0x1d0
      
       Kernel panic - not syncing: Fatal exception: panic_on_oops
      
      With CONFIG_HARDENED_USERCOPY copy_to_user() checks in __check_object_size()
      if the source address is within the kernel image. When the crash tool reads
      from 0x100000, this check leads to the kernel BUG().
      
      So disable the kernel config option until this bug is fixed.
      
      Corresponding bug report on LKML: https://lkml.org/lkml/2017/11/10/341Signed-off-by: NMichael Holzheu <holzheu@linux.vnet.ibm.com>
      Signed-off-by: NMartin Schwidefsky <schwidefsky@de.ibm.com>
      6470c0cc
  20. 16 10月, 2017 1 次提交
  21. 08 6月, 2017 1 次提交
  22. 28 3月, 2017 1 次提交
  23. 01 3月, 2017 1 次提交
  24. 23 2月, 2017 1 次提交
  25. 16 1月, 2017 1 次提交
  26. 23 11月, 2016 1 次提交
  27. 27 9月, 2016 1 次提交
  28. 31 8月, 2016 1 次提交
    • J
      mm/usercopy: get rid of CONFIG_DEBUG_STRICT_USER_COPY_CHECKS · 0d025d27
      Josh Poimboeuf 提交于
      There are three usercopy warnings which are currently being silenced for
      gcc 4.6 and newer:
      
      1) "copy_from_user() buffer size is too small" compile warning/error
      
         This is a static warning which happens when object size and copy size
         are both const, and copy size > object size.  I didn't see any false
         positives for this one.  So the function warning attribute seems to
         be working fine here.
      
         Note this scenario is always a bug and so I think it should be
         changed to *always* be an error, regardless of
         CONFIG_DEBUG_STRICT_USER_COPY_CHECKS.
      
      2) "copy_from_user() buffer size is not provably correct" compile warning
      
         This is another static warning which happens when I enable
         __compiletime_object_size() for new compilers (and
         CONFIG_DEBUG_STRICT_USER_COPY_CHECKS).  It happens when object size
         is const, but copy size is *not*.  In this case there's no way to
         compare the two at build time, so it gives the warning.  (Note the
         warning is a byproduct of the fact that gcc has no way of knowing
         whether the overflow function will be called, so the call isn't dead
         code and the warning attribute is activated.)
      
         So this warning seems to only indicate "this is an unusual pattern,
         maybe you should check it out" rather than "this is a bug".
      
         I get 102(!) of these warnings with allyesconfig and the
         __compiletime_object_size() gcc check removed.  I don't know if there
         are any real bugs hiding in there, but from looking at a small
         sample, I didn't see any.  According to Kees, it does sometimes find
         real bugs.  But the false positive rate seems high.
      
      3) "Buffer overflow detected" runtime warning
      
         This is a runtime warning where object size is const, and copy size >
         object size.
      
      All three warnings (both static and runtime) were completely disabled
      for gcc 4.6 with the following commit:
      
        2fb0815c ("gcc4: disable __compiletime_object_size for GCC 4.6+")
      
      That commit mistakenly assumed that the false positives were caused by a
      gcc bug in __compiletime_object_size().  But in fact,
      __compiletime_object_size() seems to be working fine.  The false
      positives were instead triggered by #2 above.  (Though I don't have an
      explanation for why the warnings supposedly only started showing up in
      gcc 4.6.)
      
      So remove warning #2 to get rid of all the false positives, and re-enable
      warnings #1 and #3 by reverting the above commit.
      
      Furthermore, since #1 is a real bug which is detected at compile time,
      upgrade it to always be an error.
      
      Having done all that, CONFIG_DEBUG_STRICT_USER_COPY_CHECKS is no longer
      needed.
      Signed-off-by: NJosh Poimboeuf <jpoimboe@redhat.com>
      Cc: Kees Cook <keescook@chromium.org>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Ingo Molnar <mingo@kernel.org>
      Cc: "H . Peter Anvin" <hpa@zytor.com>
      Cc: Andy Lutomirski <luto@amacapital.net>
      Cc: Steven Rostedt <rostedt@goodmis.org>
      Cc: Brian Gerst <brgerst@gmail.com>
      Cc: Peter Zijlstra <peterz@infradead.org>
      Cc: Frederic Weisbecker <fweisbec@gmail.com>
      Cc: Byungchul Park <byungchul.park@lge.com>
      Cc: Nilay Vaish <nilayvaish@gmail.com>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      0d025d27
  29. 08 8月, 2016 1 次提交
  30. 15 6月, 2016 1 次提交
  31. 23 5月, 2016 1 次提交
  32. 11 1月, 2016 1 次提交
  33. 01 10月, 2015 1 次提交
  34. 04 8月, 2015 1 次提交
  35. 25 6月, 2015 1 次提交
  36. 22 1月, 2015 1 次提交