285 Commits

Author SHA1 Message Date
Wilson Sung
67711e47f3 Merge android-4.9-q (4.9.292) into android-msm-pixel-4.9-sc-lts
Merge 4.9.292 into android-4.9-q
Linux 4.9.292
  * serial: core: fix transmit-buffer reset and memleak
      drivers/tty/serial/serial_core.c
  * serial: pl011: Add ACPI SBSA UART match id
      drivers/tty/serial/amba-pl011.c
  * tty: serial: msm_serial: Deactivate RX DMA for polling support
      drivers/tty/serial/msm_serial.c
  * vgacon: Propagate console boot parameters before calling `vc_resize'
      drivers/video/console/vgacon.c
  * parisc: Fix "make install" on newer debian releases
      arch/parisc/install.sh
  * net/rds: correct socket tunable error in rds_tcp_tune()
      net/rds/tcp.c
  * siphash: use _unaligned version by default
      include/linux/siphash.h
      lib/siphash.c
  * net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
      drivers/net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c
  * natsemi: xtensa: fix section mismatch warnings
      drivers/net/ethernet/natsemi/xtsonic.c
  * fget: check that the fd still exists after getting a ref to it
      fs/file.c
  * fs: add fget_many() and fput_many()
      fs/file.c
      fs/file_table.c
      include/linux/file.h
      include/linux/fs.h
  * sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl
      drivers/ata/sata_fsl.c
  * sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
      drivers/ata/sata_fsl.c
  * kprobes: Limit max data_size of the kretprobe instances
      include/linux/kprobes.h
      kernel/kprobes.c
  * vrf: Reset IPCB/IP6CB when processing outbound pkts in vrf dev xmit
      drivers/net/vrf.c
  * net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
      drivers/net/ethernet/dec/tulip/de4x5.c
  * net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
      drivers/net/ethernet/dec/tulip/de4x5.c
  * ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
      drivers/net/ethernet/hisilicon/hns/hns_dsaf_misc.c
  * scsi: iscsi: Unblock session then wake up error handler
      drivers/scsi/scsi_transport_iscsi.c
  * thermal: core: Reset previous low and high trip during thermal zone init
      drivers/thermal/thermal_core.c
  * s390/setup: avoid using memblock_enforce_memory_limit
      arch/s390/kernel/setup.c
  * platform/x86: thinkpad_acpi: Fix WWAN device disabled issue after S3 deep
      drivers/platform/x86/thinkpad_acpi.c
  * net: return correct error code
      net/ipv4/devinet.c
  * hugetlb: take PMD sharing into account when flushing tlb/caches
      mm/hugetlb.c
  * NFSv42: Fix pagecache invalidation after COPY/CLONE
      fs/nfs/nfs42proc.c
  * shm: extend forced shm destroy to support objects from several IPC nses
      include/linux/ipc_namespace.h
      include/linux/sched.h
      include/linux/shm.h
      ipc/shm.c
  * tty: hvc: replace BUG_ON() with negative return value
      drivers/tty/hvc/hvc_xen.c
  * xen/netfront: don't trust the backend response data blindly
      drivers/net/xen-netfront.c
  * xen/netfront: disentangle tx_skb_freelist
      drivers/net/xen-netfront.c
  * xen/netfront: don't read data from request on the ring page
      drivers/net/xen-netfront.c
  * xen/netfront: read response from backend only once
      drivers/net/xen-netfront.c
  * xen/blkfront: don't trust the backend response data blindly
      drivers/block/xen-blkfront.c
  * xen/blkfront: don't take local copy of a request from the ring page
      drivers/block/xen-blkfront.c
  * xen/blkfront: read response from backend only once
      drivers/block/xen-blkfront.c
  * xen: sync include/xen/interface/io/ring.h with Xen's newest version
      include/xen/interface/io/ring.h
  * fuse: release pipe buf after last use
      fs/fuse/dev.c
  * NFC: add NCI_UNREG flag to eliminate the race
      include/net/nfc/nci_core.h
      net/nfc/nci/core.c
  * proc/vmcore: fix clearing user buffer by properly using clear_user()
      fs/proc/vmcore.c
  * vhost/vsock: fix incorrect used length reported to the guest
      drivers/vhost/vsock.c
  * hugetlbfs: flush TLBs correctly after huge_pmd_unshare
      arch/arm/include/asm/tlb.h
      arch/ia64/include/asm/tlb.h
      arch/s390/include/asm/tlb.h
      arch/sh/include/asm/tlb.h
      arch/um/include/asm/tlb.h
      include/asm-generic/tlb.h
      mm/hugetlb.c
      mm/memory.c
  * tracing: Check pid filtering when creating events
      kernel/trace/trace_events.c
  * tcp_cubic: fix spurious Hystart ACK train detections for not-cwnd-limited flows
      net/ipv4/tcp_cubic.c
  * PM: hibernate: use correct mode for swsusp_close()
      kernel/power/hibernate.c
  * drm/vc4: fix error code in vc4_create_object()
      drivers/gpu/drm/vc4/vc4_bo.c
  * scsi: mpt3sas: Fix kernel panic during drive powercycle test
      drivers/scsi/mpt3sas/mpt3sas_scsih.c
  * ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
      arch/arm/mach-socfpga/core.h
      arch/arm/mach-socfpga/platsmp.c
  * NFSv42: Don't fail clone() unless the OP_CLONE operation failed
      fs/nfs/nfs42xdr.c
  * net: ieee802154: handle iftypes as u32
      include/net/nl802154.h
  * ASoC: topology: Add missing rwsem around snd_ctl_remove() calls
      sound/soc/soc-topology.c
  * ARM: dts: BCM5301X: Add interrupt properties to GPIO node
      arch/arm/boot/dts/bcm5301x.dtsi
  * tracing: Fix pid filtering when triggers are attached
      kernel/trace/trace.h
  * xen: detect uninitialized xenbus in xenbus_init
      drivers/xen/xenbus/xenbus_probe.c
  * xen: don't continue xenstore initialization in case of errors
      drivers/xen/xenbus/xenbus_probe.c
  * fuse: fix page stealing
      fs/fuse/dev.c
  * staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
      drivers/staging/rtl8192e/rtl8192e/rtl_core.c
  * ALSA: ctxfi: Fix out-of-range access
      sound/pci/ctxfi/ctamixer.c
      sound/pci/ctxfi/ctdaio.c
      sound/pci/ctxfi/ctresource.c
      sound/pci/ctxfi/ctresource.h
      sound/pci/ctxfi/ctsrc.c
  * binder: fix test regression due to sender_euid change
      drivers/android/binder.c
  * usb: hub: Fix locking issues with address0_mutex
      drivers/usb/core/hub.c
  * usb: hub: Fix usb enumeration issue due to address0 race
      drivers/usb/core/hub.c
  * USB: serial: option: add Fibocom FM101-GL variants
      drivers/usb/serial/option.c
  * USB: serial: option: add Telit LE910S1 0x9200 composition
      drivers/usb/serial/option.c
  * staging: ion: Prevent incorrect reference counting behavour
      drivers/staging/android/ion/ion.c
    Merge 4.9.291 into android-4.9-q
Linux 4.9.291
  * soc/tegra: pmc: Fix imbalanced clock disabling in error code path
      drivers/soc/tegra/pmc.c
  * usb: max-3421: Use driver data instead of maintaining a list of bound devices
      drivers/usb/host/max3421-hcd.c
  * ASoC: DAPM: Cover regression by kctl change notification fix
      sound/soc/soc-dapm.c
  * batman-adv: Don't always reallocate the fragmentation skb head
      net/batman-adv/fragmentation.c
  * batman-adv: Reserve needed_*room for fragments
      net/batman-adv/fragmentation.c
  * batman-adv: Consider fragmentation for needed_headroom
      net/batman-adv/hard-interface.c
  * batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh
      net/batman-adv/bridge_loop_avoidance.c
  * batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN
      net/batman-adv/multicast.c
      net/batman-adv/multicast.h
      net/batman-adv/soft-interface.c
  * batman-adv: Fix own OGM check in aggregated OGMs
      net/batman-adv/bat_v_ogm.c
  * batman-adv: Keep fragments equally sized
      net/batman-adv/fragmentation.c
  * drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors
      drivers/gpu/drm/amd/amdgpu/amdgpu_connectors.c
  * drm/udl: fix control-message timeout
      drivers/gpu/drm/udl/udl_connector.c
  * cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
      net/wireless/util.c
  * parisc/sticon: fix reverse colors
      drivers/video/console/sticon.c
  * btrfs: fix memory ordering between normal and ordered work functions
      fs/btrfs/async-thread.c
  * mm: kmemleak: slob: respect SLAB_NOLEAKTRACE flag
      mm/slab.h
  * hexagon: export raw I/O routines for modules
      arch/hexagon/lib/io.c
  * tun: fix bonding active backup with arp monitoring
      drivers/net/tun.c
  * perf/x86/intel/uncore: Fix IIO event constraints for Skylake Server
      arch/x86/events/intel/uncore_snbep.c
  * perf/x86/intel/uncore: Fix filter_tid mask for CHA events on Skylake Server
      arch/x86/events/intel/uncore_snbep.c
  * NFC: reorder the logic in nfc_{un,}register_device
      net/nfc/core.c
  * NFC: reorganize the functions in nci_request
      net/nfc/nci/core.c
  * platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()'
      drivers/platform/x86/hp_accel.c
  * mips: bcm63xx: add support for clk_get_parent()
      arch/mips/bcm63xx/clk.c
  * iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset
      drivers/net/ethernet/intel/i40evf/i40evf_main.c
  * net: bnx2x: fix variable dereferenced before check
      drivers/net/ethernet/broadcom/bnx2x/bnx2x_init_ops.h
  * sched/core: Mitigate race cpus_share_cache()/update_top_cache_domain()
      kernel/sched/core.c
  * mips: BCM63XX: ensure that CPU_SUPPORTS_32BIT_KERNEL is set
      arch/mips/Kconfig
  * sh: define __BIG_ENDIAN for math-emu
      arch/sh/include/asm/sfp-machine.h
  * sh: fix kconfig unmet dependency warning for FRAME_POINTER
      arch/sh/Kconfig.debug
  * maple: fix wrong return value of maple_bus_init().
      drivers/sh/maple/maple.c
  * sh: check return code of request_irq
      arch/sh/kernel/cpu/sh4a/smp-shx3.c
  * powerpc/dcr: Use cmplwi instead of 3-argument cmpli
      arch/powerpc/sysdev/dcr-low.S
  * ALSA: gus: fix null pointer dereference on pointer block
      sound/isa/gus/gus_dma.c
  * powerpc/5200: dts: fix memory node unit name
      arch/powerpc/boot/dts/charon.dts
      arch/powerpc/boot/dts/digsy_mtc.dts
      arch/powerpc/boot/dts/lite5200.dts
      arch/powerpc/boot/dts/lite5200b.dts
      arch/powerpc/boot/dts/media5200.dts
      arch/powerpc/boot/dts/mpc5200b.dtsi
      arch/powerpc/boot/dts/o2d.dts
      arch/powerpc/boot/dts/o2d.dtsi
      arch/powerpc/boot/dts/o2dnt2.dts
      arch/powerpc/boot/dts/o3dnt.dts
      arch/powerpc/boot/dts/pcm032.dts
      arch/powerpc/boot/dts/tqm5200.dts
  * scsi: target: Fix alua_tg_pt_gps_count tracking
      drivers/target/target_core_alua.c
  * scsi: target: Fix ordered tag handling
      drivers/target/target_core_device.c
      drivers/target/target_core_internal.h
      drivers/target/target_core_transport.c
      include/target/target_core_base.h
  * MIPS: sni: Fix the build
      arch/mips/sni/time.c
  * tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
      drivers/tty/tty_buffer.c
  * usb: host: ohci-tmio: check return value after calling platform_get_resource()
      drivers/usb/host/ohci-tmio.c
  * ARM: dts: omap: fix gpmc,mux-add-data type
      arch/arm/boot/dts/omap-gpmc-smsc9221.dtsi
      arch/arm/boot/dts/omap3-overo-tobiduo-common.dtsi
  * scsi: advansys: Fix kernel pointer leak
      drivers/scsi/advansys.c
  * usb: musb: tusb6010: check return value after calling platform_get_resource()
      drivers/usb/musb/tusb6010.c
  * scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
      drivers/scsi/lpfc/lpfc_sli.c
  * PCI/MSI: Destroy sysfs before freeing entries
      drivers/pci/msi.c
  * parisc/entry: fix trace test in syscall exit path
      arch/parisc/kernel/entry.S
  * net: mdio-mux: fix unbalanced put_device
      drivers/net/phy/mdio-mux.c
  * PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros
      include/uapi/linux/pci_regs.h
  * mm, oom: do not trigger out_of_memory from the #PF
      mm/oom_kill.c
  * mm, oom: pagefault_out_of_memory: don't force global OOM for dying tasks
      mm/oom_kill.c
  * powerpc/bpf: Fix BPF_SUB when imm == 0x80000000
      arch/powerpc/net/bpf_jit_comp64.c
  * powerpc/bpf: Validate branch ranges
      arch/powerpc/net/bpf_jit.h
      arch/powerpc/net/bpf_jit_comp64.c
  * ARM: 9156/1: drop cc-option fallbacks for architecture selection
      arch/arm/Makefile
  * USB: chipidea: fix interrupt deadlock
      drivers/usb/chipidea/core.c
  * vsock: prevent unnecessary refcnt inc for nonblocking connect
      net/vmw_vsock/af_vsock.c
  * nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails
      drivers/nfc/pn533/pn533.c
  * llc: fix out-of-bound array index in llc_sk_dev_hash()
      include/net/llc.h
  * mm/zsmalloc.c: close race window between zs_pool_dec_isolated() and zs_unregister_migration()
      mm/zsmalloc.c
  * bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed
      drivers/net/bonding/bond_sysfs_slave.c
  * ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses
      drivers/acpi/pmic/intel_pmic.c
  * net: davinci_emac: Fix interrupt pacing disable
      drivers/net/ethernet/ti/davinci_emac.c
  * xen-pciback: Fix return in pm_ctrl_init()
      drivers/xen/xen-pciback/conf_space_capability.c
  * i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()'
      drivers/i2c/busses/i2c-xlr.c
  * scsi: qla2xxx: Turn off target reset during issue_lip
      drivers/scsi/qla2xxx/qla_gbl.h
      drivers/scsi/qla2xxx/qla_mr.c
      drivers/scsi/qla2xxx/qla_os.c
  * watchdog: f71808e_wdt: fix inaccurate report in WDIOC_GETTIMEOUT
      drivers/watchdog/f71808e_wdt.c
  * m68k: set a default value for MEMORY_RESERVE
      arch/m68k/Kconfig.machine
  * dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result`
      drivers/dma/dmaengine.h
  * netfilter: nfnetlink_queue: fix OOB when mac header was cleared
      net/netfilter/nfnetlink_queue.c
  * auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string
      drivers/auxdisplay/img-ascii-lcd.c
  * dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro
      drivers/dma/at_xdmac.c
  * mtd: spi-nor: hisi-sfc: Remove excessive clk_disable_unprepare()
      drivers/mtd/spi-nor/hisi-sfc.c
  * fs: orangefs: fix error return code of orangefs_revalidate_lookup()
      fs/orangefs/dcache.c
  * PCI: aardvark: Don't spam about PIO Response Status
      drivers/pci/host/pci-aardvark.c
  * drm/plane-helper: fix uninitialized variable reference
      drivers/gpu/drm/drm_plane_helper.c
  * pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds
      fs/nfs/flexfilelayout/flexfilelayoutdev.c
      fs/nfs/pnfs_nfs.c
  * power: supply: bq27xxx: Fix kernel crash on IRQ handler register error
      drivers/power/supply/bq27xxx_battery_i2c.c
  * serial: xilinx_uartps: Fix race condition causing stuck TX
      drivers/tty/serial/xilinx_uartps.c
  * RDMA/mlx4: Return missed an error if device doesn't support steering
      drivers/infiniband/hw/mlx4/qp.c
  * scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn()
      drivers/scsi/csiostor/csio_lnode.c
  * power: supply: rt5033_battery: Change voltage values to µV
      drivers/power/supply/rt5033_battery.c
  * usb: gadget: hid: fix error code in do_config()
      drivers/usb/gadget/legacy/hid.c
  * serial: 8250_dw: Drop wrong use of ACPI_PTR()
      drivers/tty/serial/8250/8250_dw.c
  * video: fbdev: chipsfb: use memset_io() instead of memset()
      drivers/video/fbdev/chipsfb.c
  * memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe
      drivers/memory/fsl_ifc.c
  * soc/tegra: Fix an error handling path in tegra_powergate_power_up()
      drivers/soc/tegra/pmc.c
  * arm: dts: omap3-gta04a4: accelerometer irq fix
      arch/arm/boot/dts/omap3-gta04.dtsi
  * JFS: fix memleak in jfs_mount
      fs/jfs/jfs_mount.c
  * MIPS: loongson64: make CPU_LOONGSON64 depends on MIPS_FP_SUPPORT
      arch/mips/Kconfig
  * scsi: dc395: Fix error case unwinding
      drivers/scsi/dc395x.c
  * ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc()
      drivers/irqchip/irq-s3c24xx.c
  * RDMA/rxe: Fix wrong port_cap_flags
      drivers/infiniband/sw/rxe/rxe_param.h
  * crypto: pcrypt - Delay write to padata->info
      crypto/pcrypt.c
  * libertas: Fix possible memory leak in probe and disconnect
      drivers/net/wireless/marvell/libertas/if_usb.c
  * libertas_tf: Fix possible memory leak in probe and disconnect
      drivers/net/wireless/marvell/libertas_tf/if_usb.c
  * samples/kretprobes: Fix return value if register_kretprobe() failed
      samples/kprobes/kretprobe_example.c
  * irq: mips: avoid nested irq_enter()
      drivers/irqchip/irq-bcm6345-l1.c
  * s390/gmap: don't unconditionally call pte_unmap_unlock() in __gmap_zap()
      arch/s390/mm/gmap.c
  * smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
      security/smack/smackfs.c
  * phy: micrel: ksz8041nl: do not use power down mode
      drivers/net/phy/micrel.c
  * mwifiex: Send DELBA requests according to spec
      drivers/net/wireless/marvell/mwifiex/11n.c
  * platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning
      drivers/platform/x86/thinkpad_acpi.c
  * mmc: mxs-mmc: disable regulator on error and in the remove function
      drivers/mmc/host/mxs-mmc.c
  * net: stream: don't purge sk_error_queue in sk_stream_kill_queues()
      net/core/stream.c
  * drm/msm: uninitialized variable in msm_gem_import()
      drivers/gpu/drm/msm/msm_gem.c
  * ath10k: fix max antenna gain unit
      drivers/net/wireless/ath/ath10k/mac.c
      drivers/net/wireless/ath/ath10k/wmi.h
  * hwmon: Fix possible memleak in __hwmon_device_register()
      drivers/hwmon/hwmon.c
  * memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host()
      drivers/memstick/host/jmb38x_ms.c
  * memstick: avoid out-of-range warning
      drivers/memstick/core/ms_block.c
  * b43: fix a lower bounds test
      drivers/net/wireless/broadcom/b43/phy_g.c
  * b43legacy: fix a lower bounds test
      drivers/net/wireless/broadcom/b43legacy/radio.c
  * crypto: qat - disregard spurious PFVF interrupts
      drivers/crypto/qat/qat_common/adf_pf2vf_msg.c
      drivers/crypto/qat/qat_common/adf_vf_isr.c
  * crypto: qat - detect PFVF collision after ACK
      drivers/crypto/qat/qat_common/adf_pf2vf_msg.c
  * ath9k: Fix potential interrupt storm on queue reset
      drivers/net/wireless/ath/ath9k/main.c
  * cpuidle: Fix kobject memory leaks in error paths
      drivers/cpuidle/sysfs.c
  * media: si470x: Avoid card name truncation
      drivers/media/radio/si470x/radio-si470x-i2c.c
      drivers/media/radio/si470x/radio-si470x-usb.c
  * media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()'
      drivers/media/platform/mtk-vpu/mtk_vpu.c
  * media: dvb-usb: fix ununit-value in az6027_rc_query
      drivers/media/usb/dvb-usb/az6027.c
  * cgroup: Make rebind_subsystems() disable v2 controllers all at once
      kernel/cgroup.c
  * parisc/kgdb: add kgdb_roundup() to make kgdb work with idle polling
      arch/parisc/kernel/smp.c
  * parisc: fix warning in flush_tlb_all
      arch/parisc/mm/init.c
  * spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe()
      drivers/spi/spi-bcm-qspi.c
  * ARM: 9136/1: ARMv7-M uses BE-8, not BE-32
      arch/arm/mm/Kconfig
  * ARM: clang: Do not rely on lr register for stacktrace
      arch/arm/kernel/stacktrace.c
  * smackfs: use __GFP_NOFAIL for smk_cipso_doi()
      security/smack/smackfs.c
  * iwlwifi: mvm: disable RX-diversity in powersave
      drivers/net/wireless/intel/iwlwifi/mvm/utils.c
  * PM: hibernate: Get block device exclusively in swsusp_check()
      kernel/power/swap.c
  * mwl8k: Fix use-after-free in mwl8k_fw_state_machine()
      drivers/net/wireless/marvell/mwl8k.c
  * tracing/cfi: Fix cmp_entries_* functions signature mismatch
      kernel/trace/tracing_map.c
  * lib/xz: Validate the value before assigning it to an enum variable
      lib/xz/xz_dec_stream.c
  * lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression
      lib/decompress_unxz.c
      lib/xz/xz_dec_lzma2.c
  * memstick: r592: Fix a UAF bug when removing the driver
      drivers/memstick/host/r592.c
  * ACPI: battery: Accept charges over the design capacity as full
      drivers/acpi/battery.c
  * ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create()
      drivers/net/wireless/ath/dfs_pattern_detector.c
  * tracefs: Have tracefs directories not set OTH permission bits by default
      fs/tracefs/inode.c
  * media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte()
      drivers/media/usb/dvb-usb/dibusb-common.c
  * ACPICA: Avoid evaluating methods too early during system resume
      drivers/acpi/acpica/acglobal.h
      drivers/acpi/acpica/hwesleep.c
      drivers/acpi/acpica/hwsleep.c
      drivers/acpi/acpica/hwxfsleep.c
  * ia64: don't do IA64_CMPXCHG_DEBUG without CONFIG_PRINTK
      arch/ia64/Kconfig.debug
  * media: mceusb: return without resubmitting URB in case of -EPROTO error.
      drivers/media/rc/mceusb.c
  * media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe()
      drivers/media/platform/s5p-mfc/s5p_mfc.c
  * media: uvcvideo: Set capability in s_param
      drivers/media/usb/uvc/uvc_v4l2.c
  * media: netup_unidvb: handle interrupt properly according to the firmware
      drivers/media/pci/netup_unidvb/netup_unidvb_core.c
  * media: mt9p031: Fix corrupted frame after restarting stream
      drivers/media/i2c/mt9p031.c
  * x86: Increase exception stack sizes
      arch/x86/include/asm/page_64_types.h
  * smackfs: Fix use-after-free in netlbl_catmap_walk()
      security/smack/smackfs.c
  * locking/lockdep: Avoid RCU-induced noinstr fail
      kernel/locking/lockdep.c
  * MIPS: lantiq: dma: reset correct number of channel
      arch/mips/lantiq/xway/dma.c
  * MIPS: lantiq: dma: add small delay after reset
      arch/mips/lantiq/xway/dma.c
  * platform/x86: wmi: do not fail if disabling fails
      drivers/platform/x86/wmi.c
  * Bluetooth: fix use-after-free error in lock_sock_nested()
      net/bluetooth/l2cap_sock.c
  * Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
      net/bluetooth/sco.c
  * USB: iowarrior: fix control-message timeouts
      drivers/usb/misc/iowarrior.c
  * USB: serial: keyspan: fix memleak on probe errors
      drivers/usb/serial/keyspan.c
  * iio: dac: ad5446: Fix ad5622_write() return value
      drivers/iio/dac/ad5446.c
  * quota: correct error number in free_dqentry()
      fs/quota/quota_tree.c
  * quota: check block number when reading the block in quota file
      fs/quota/quota_tree.c
  * PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG
      drivers/pci/host/pci-aardvark.c
  * ALSA: mixer: fix deadlock in snd_mixer_oss_set_volume
      sound/core/oss/mixer_oss.c
  * ALSA: mixer: oss: Fix racy access to slots
      sound/core/oss/mixer_oss.c
  * serial: core: Fix initializing and restoring termios speed
      drivers/tty/serial/serial_core.c
      include/linux/console.h
  * powerpc/85xx: Fix oops when mpc85xx_smp_guts_ids node cannot be found
      arch/powerpc/platforms/85xx/mpc85xx_pm_ops.c
  * power: supply: max17042_battery: use VFSOC for capacity when no rsns
      drivers/power/supply/max17042_battery.c
  * power: supply: max17042_battery: Prevent int underflow in set_soc_threshold
      drivers/power/supply/max17042_battery.c
  * signal/mips: Update (_save|_restore)_fp_context to fail with -EFAULT
      arch/mips/kernel/r2300_fpu.S
      arch/mips/kernel/syscall.c
  * signal: Remove the bogus sigkill_pending in ptrace_stop
      kernel/signal.c
  * RDMA/qedr: Fix NULL deref for query_qp on the GSI QP
      drivers/infiniband/hw/qedr/verbs.c
  * wcn36xx: handle connection loss indication
      drivers/net/wireless/ath/wcn36xx/smd.c
  * mwifiex: Read a PCI register after writing the TX ring write pointer
      drivers/net/wireless/marvell/mwifiex/pcie.c
  * wcn36xx: Fix HT40 capability for 2Ghz band
      drivers/net/wireless/ath/wcn36xx/main.c
  * evm: mark evm_fixmode as __ro_after_init
      security/integrity/evm/evm_main.c
  * rtl8187: fix control-message timeouts
      drivers/net/wireless/realtek/rtl818x/rtl8187/rtl8225.c
  * PCI: Mark Atheros QCA6174 to avoid bus reset
      drivers/pci/quirks.c
  * ath6kl: fix control-message timeout
      drivers/net/wireless/ath/ath6kl/usb.c
  * ath6kl: fix division by zero in send path
      drivers/net/wireless/ath/ath6kl/usb.c
  * mwifiex: fix division by zero in fw download path
      drivers/net/wireless/marvell/mwifiex/usb.c
  * EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell
      drivers/edac/sb_edac.c
  * regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property
      Documentation/devicetree/bindings/regulator/samsung,s5m8767.txt
  * regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled
      Documentation/devicetree/bindings/regulator/samsung,s5m8767.txt
      drivers/regulator/s5m8767.c
  * hwmon: (pmbus/lm25066) Add offset coefficients
      drivers/hwmon/pmbus/lm25066.c
  * btrfs: fix lost error handling when replaying directory deletes
      fs/btrfs/tree-log.c
  * vmxnet3: do not stop tx queues after netif_device_detach()
      drivers/net/vmxnet3/vmxnet3_drv.c
  * watchdog: Fix OMAP watchdog early handling
      drivers/watchdog/omap_wdt.c
  * spi: spl022: fix Microwire full duplex mode
      drivers/spi/spi-pl022.c
  * xen/netfront: stop tx queues during live migration
      drivers/net/xen-netfront.c
  * bpf: Prevent increasing bpf_jit_limit above max
      include/linux/filter.h
      kernel/bpf/core.c
      net/core/sysctl_net_core.c
  * mmc: winbond: don't build on M68K
      drivers/mmc/host/Kconfig
  * hyperv/vmbus: include linux/bitops.h
      drivers/hv/hyperv_vmbus.h
  * sfc: Don't use netif_info before net_device setup
      drivers/net/ethernet/sfc/ptp.c
      drivers/net/ethernet/sfc/siena_sriov.c
  * x86/irq: Ensure PI wakeup handler is unregistered before module unload
      arch/x86/kernel/irq.c
  * ALSA: timer: Unconditionally unlink slave instances, too
      sound/core/timer.c
  * ALSA: timer: Fix use-after-free problem
      sound/core/timer.c
  * ALSA: synth: missing check for possible NULL after the call to kstrdup
      sound/synth/emux/emux.c
  * ALSA: line6: fix control and interrupt message timeouts
      sound/usb/line6/driver.c
      sound/usb/line6/driver.h
      sound/usb/line6/podhd.c
      sound/usb/line6/toneport.c
  * ALSA: 6fire: fix control and bulk message timeouts
      sound/usb/6fire/comm.c
      sound/usb/6fire/firmware.c
  * ALSA: ua101: fix division by zero at probe
      sound/usb/misc/ua101.c
  * media: ite-cir: IR receiver stop working after receive overflow
      drivers/media/rc/ite-cir.c
  * parisc: Fix ptrace check on syscall return
      arch/parisc/kernel/entry.S
  * mmc: dw_mmc: Dont wait for DRTO on Write RSP error
      drivers/mmc/host/dw_mmc.c
  * ocfs2: fix data corruption on truncate
      fs/ocfs2/file.c
  * libata: fix read log timeout value
      drivers/ata/libata-eh.c
      include/linux/libata.h
  * Input: i8042 - Add quirk for Fujitsu Lifebook T725
      drivers/input/serio/i8042-x86ia64io.h
  * Input: elantench - fix misreporting trackpoint coordinates
      drivers/input/mouse/elantech.c
  * xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay
      drivers/usb/host/xhci-hub.c
  * binder: use cred instead of task for selinux checks
      drivers/android/binder.c
      include/linux/lsm_hooks.h
      include/linux/security.h
      security/security.c
      security/selinux/hooks.c
  * binder: use euid from cred instead of using task
      drivers/android/binder.c
  * ANDROID: arm64: process: Match upstream formatting when dumping memory areas
      arch/arm64/kernel/process.c
  * FROMGIT: binder: fix test regression due to sender_euid change
      drivers/android/binder.c
  * BACKPORT: binder: use cred instead of task for selinux checks
      drivers/android/binder.c
      include/linux/lsm_hooks.h
      include/linux/security.h
      security/security.c
      security/selinux/hooks.c
  * UPSTREAM: binder: use euid from cred instead of using task
      drivers/android/binder.c
    Merge 4.9.290 into android-4.9-q
Linux 4.9.290
  * rsi: fix control-message timeout
      drivers/net/wireless/rsi/rsi_91x_usb.c
  * staging: rtl8192u: fix control-message timeouts
      drivers/staging/rtl8192u/r8192U_core.c
  * staging: r8712u: fix control-message timeout
      drivers/staging/rtl8712/usb_ops_linux.c
  * comedi: vmk80xx: fix bulk and interrupt message timeouts
      drivers/staging/comedi/drivers/vmk80xx.c
  * comedi: vmk80xx: fix bulk-buffer overflow
      drivers/staging/comedi/drivers/vmk80xx.c
  * comedi: vmk80xx: fix transfer-buffer overflows
      drivers/staging/comedi/drivers/vmk80xx.c
  * comedi: ni_usb6501: fix NULL-deref in command paths
      drivers/staging/comedi/drivers/ni_usb6501.c
  * comedi: dt9812: fix DMA buffers on stack
      drivers/staging/comedi/drivers/dt9812.c
  * isofs: Fix out of bound access for corrupted isofs image
      fs/isofs/inode.c
  * printk/console: Allow to disable console output by using console="" or console=null
      kernel/printk/printk.c
  * usb-storage: Add compatibility quirk flags for iODD 2531/2541
      drivers/usb/storage/unusual_devs.h
  * usb: musb: Balance list entry in musb_gadget_queue
      drivers/usb/musb/musb_gadget.c
  * usb: gadget: Mark USB_FSL_QE broken on 64-bit
      drivers/usb/gadget/udc/Kconfig
  * IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
      drivers/infiniband/hw/qib/qib_user_sdma.c
  * IB/qib: Use struct_size() helper
      drivers/infiniband/hw/qib/qib_user_sdma.c
  * Revert "x86/kvm: fix vcpu-id indexed array sizes"
      arch/x86/kvm/ioapic.c
      arch/x86/kvm/ioapic.h
  * usb: hso: fix error handling code of hso_create_net_device
      drivers/net/usb/hso.c
  * net: hso: register netdev later to avoid a race condition
      drivers/net/usb/hso.c
  * ARM: 9120/1: Revert "amba: make use of -1 IRQs warn"
      drivers/amba/bus.c
  * arch: pgtable: define MAX_POSSIBLE_PHYSMEM_BITS where needed
      arch/arc/include/asm/pgtable.h
      arch/arm/include/asm/pgtable-2level.h
      arch/arm/include/asm/pgtable-3level.h
      arch/mips/include/asm/pgtable-32.h
      arch/powerpc/include/asm/pte-common.h
      include/asm-generic/pgtable.h
  * mm/zsmalloc: Prepare to variable MAX_PHYSMEM_BITS
      arch/x86/include/asm/pgtable-3level_types.h
      mm/zsmalloc.c
  * scsi: core: Put LLD module refcnt after SCSI device is released
      drivers/scsi/scsi.c
      drivers/scsi/scsi_sysfs.c
  * UPSTREAM: security: selinux: allow per-file labeling for bpffs
      security/selinux/hooks.c

Bug: 210364486
Change-Id: Ia31d19943f4638a9b2ac8122a4c8728a56e8aa0a
Signed-off-by: JohnnLee <johnnlee@google.com>
2021-12-29 06:56:04 +00:00
Todd Kjos
a69d9cd3d4 BACKPORT: binder: use cred instead of task for selinux checks
commit 52f88693378a58094c538662ba652aff0253c4fe upstream.

Since binder was integrated with selinux, it has passed
'struct task_struct' associated with the binder_proc
to represent the source and target of transactions.
The conversion of task to SID was then done in the hook
implementations. It turns out that there are race conditions
which can result in an incorrect security context being used.

Fix by using the 'struct cred' saved during binder_open and pass
it to the selinux subsystem.

Cc: stable@vger.kernel.org # 5.14 (need backport for earlier stables)
Fixes: 79af73079d ("Add security hooks to binder and implement the hooks for SELinux.")
Suggested-by: Jann Horn <jannh@google.com>
Signed-off-by: Todd Kjos <tkjos@google.com>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Change-Id: Id7157515d2b08f11683aeb8ad9b8f1da075d34e7
[ tkjos@ fixed minor conflicts ]
Bug: 200688826
Signed-off-by: Todd Kjos <tkjos@google.com>
2021-11-22 09:56:35 -08:00
Stephen Smalley
67e6b9b013 UPSTREAM: security,selinux,smack: kill security_task_wait hook
As reported by yangshukui, a permission denial from security_task_wait()
can lead to a soft lockup in zap_pid_ns_processes() since it only expects
sys_wait4() to return 0 or -ECHILD. Further, security_task_wait() can
in general lead to zombies; in the absence of some way to automatically
reparent a child process upon a denial, the hook is not useful.  Remove
the security hook and its implementations in SELinux and Smack.  Smack
already removed its check from its hook.

Reported-by: yangshukui <yangshukui@huawei.com>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
Acked-by: Oleg Nesterov <oleg@redhat.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>

(cherry picked from commit 3a2f5a59a695a73e0cde9a61e0feae5fa730e936)
Change-Id: Ie52e96a1158fcb5769a8bdca16fb4d316d4b20dc
Bug: 140252993
Signed-off-by: Jeff Vander Stoep <jeffv@google.com>
2020-01-28 15:35:25 +00:00
Joel Fernandes (Google)
11fffd01ea BACKPORT: perf_event: Add support for LSM and SELinux checks
In current mainline, the degree of access to perf_event_open(2) system
call depends on the perf_event_paranoid sysctl.  This has a number of
limitations:

1. The sysctl is only a single value. Many types of accesses are controlled
   based on the single value thus making the control very limited and
   coarse grained.
2. The sysctl is global, so if the sysctl is changed, then that means
   all processes get access to perf_event_open(2) opening the door to
   security issues.

This patch adds LSM and SELinux access checking which will be used in
Android to access perf_event_open(2) for the purposes of attaching BPF
programs to tracepoints, perf profiling and other operations from
userspace. These operations are intended for production systems.

5 new LSM hooks are added:
1. perf_event_open: This controls access during the perf_event_open(2)
   syscall itself. The hook is called from all the places that the
   perf_event_paranoid sysctl is checked to keep it consistent with the
   systctl. The hook gets passed a 'type' argument which controls CPU,
   kernel and tracepoint accesses (in this context, CPU, kernel and
   tracepoint have the same semantics as the perf_event_paranoid sysctl).
   Additionally, I added an 'open' type which is similar to
   perf_event_paranoid sysctl == 3 patch carried in Android and several other
   distros but was rejected in mainline [1] in 2016.

2. perf_event_alloc: This allocates a new security object for the event
   which stores the current SID within the event. It will be useful when
   the perf event's FD is passed through IPC to another process which may
   try to read the FD. Appropriate security checks will limit access.

3. perf_event_free: Called when the event is closed.

4. perf_event_read: Called from the read(2) and mmap(2) syscalls for the event.

5. perf_event_write: Called from the ioctl(2) syscalls for the event.

[1] https://lwn.net/Articles/696240/

Since Peter had suggest LSM hooks in 2016 [1], I am adding his
Suggested-by tag below.

To use this patch, we set the perf_event_paranoid sysctl to -1 and then
apply selinux checking as appropriate (default deny everything, and then
add policy rules to give access to domains that need it). In the future
we can remove the perf_event_paranoid sysctl altogether.

Suggested-by: Peter Zijlstra <peterz@infradead.org>
Co-developed-by: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Acked-by: James Morris <jmorris@namei.org>
Cc: Arnaldo Carvalho de Melo <acme@kernel.org>
Cc: rostedt@goodmis.org
Cc: Yonghong Song <yhs@fb.com>
Cc: Kees Cook <keescook@chromium.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: jeffv@google.com
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: primiano@google.com
Cc: Song Liu <songliubraving@fb.com>
Cc: rsavitski@google.com
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Matthew Garrett <matthewgarrett@google.com>
Link: https://lkml.kernel.org/r/20191014170308.70668-1-joel@joelfernandes.org

(cherry picked from commit da97e18458fb42d7c00fac5fd1c56a3896ec666e)
[ Ryan Savitski: adapted for older codebase, and folded in upstream
  ae79d5588a04 (perf/core: Fix !CONFIG_PERF_EVENTS build warnings and
  failures). ]
Bug: 137092007
Change-Id: I68ee3dba85c8d64e24f28a0fbc8db2aed3b6f77b
Signed-off-by: Ryan Savitski <rsavitski@google.com>
2020-01-22 20:06:47 +00:00
Neeraj Soni
c692cb9609 Resolve merge conflict and enable HW FBE for ext4 fs
HW File Based Encryption (FBE) uses Crypto Engine to
encrypt the user data with unique key for each file.
File name and data both are encrypted with this feature.
 - security/pfk: New module to support per file
   encryption using CE.
 - fs/ext4: changes made to support using crypto engine
   to encyrpt the data.
Other changes made to provide support framework for per
file encryption.

Change-Id: I82b05a73b10ad8c26b0e400cdf246c67a8060f0e
Signed-off-by: Neeraj Soni <neersoni@codeaurora.org>
2018-05-22 12:58:05 +05:30
Jakub Kicinski
4ca16e6643 UPSTREAM: security: bpf: replace include of linux/bpf.h with forward declarations
Touching linux/bpf.h makes us rebuild a surprisingly large
portion of the kernel.  Remove the unnecessary dependency
from security.h, it only needs forward declarations.

Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Reviewed-by: Quentin Monnet <quentin.monnet@netronome.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>

(cherry picked from net-next: 1495dc9f0a711a54f8fec849ce7f3a8f585a11e5)
Bug: 30950746

Change-Id: I93d4210845e7e2c748f13e260010b71d91864093
2017-11-07 13:01:06 -08:00
Chenbo Feng
f3ad3766a9 BACKPORT: security: bpf: Add LSM hooks for bpf object related syscall
Introduce several LSM hooks for the syscalls that will allow the
userspace to access to eBPF object such as eBPF programs and eBPF maps.
The security check is aimed to enforce a per object security protection
for eBPF object so only processes with the right priviliges can
read/write to a specific map or use a specific eBPF program. Besides
that, a general security hook is added before the multiplexer of bpf
syscall to check the cmd and the attribute used for the command. The
actual security module can decide which command need to be checked and
how the cmd should be checked.

Signed-off-by: Chenbo Feng <fengc@google.com>
Acked-by: James Morris <james.l.morris@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>

Added the LIST_HEAD_INIT call for security hooks, it nolonger exist in
uptream code.
(cherry-pick from net-next: afdb09c720b62b8090584c11151d856df330e57d)
Bug: 30950746

Change-Id: Ieb3ac74392f531735fc7c949b83346a5f587a77b
2017-11-07 12:59:20 -08:00
James Morris
de2f4b3453 Merge branch 'stable-4.9' of git://git.infradead.org/users/pcmoore/selinux into next 2016-09-19 12:27:10 +10:00
Mickaël Salaün
a4f4528a31 module: Fully remove the kernel_module_from_file hook
Remove remaining kernel_module_from_file hook left by commit
a1db742094 ("module: replace copy_module_from_fd with kernel version")

Signed-off-by: Mickaël Salaün <mic@digikod.net>
Cc: Rusty Russell <rusty@rustcorp.com.au>
Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
2016-08-09 10:58:57 +10:00
Vivek Goyal
2602625b7e security, overlayfs: Provide hook to correctly label newly created files
During a new file creation we need to make sure new file is created with the
right label. New file is created in upper/ so effectively file should get
label as if task had created file in upper/.

We switched to mounter's creds for actual file creation. Also if there is a
whiteout present, then file will be created in work/ dir first and then
renamed in upper. In none of the cases file will be labeled as we want it to
be.

This patch introduces a new hook dentry_create_files_as(), which determines
the label/context dentry will get if it had been created by task in upper
and modify passed set of creds appropriately. Caller makes use of these new
creds for file creation.

Signed-off-by: Vivek Goyal <vgoyal@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
[PM: fix whitespace issues found with checkpatch.pl]
[PM: changes to use stat->mode in ovl_create_or_link()]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2016-08-08 20:46:46 -04:00
Vivek Goyal
121ab822ef security,overlayfs: Provide security hook for copy up of xattrs for overlay file
Provide a security hook which is called when xattrs of a file are being
copied up. This hook is called once for each xattr and LSM can return
0 if the security module wants the xattr to be copied up, 1 if the
security module wants the xattr to be discarded on the copy, -EOPNOTSUPP
if the security module does not handle/manage the xattr, or a -errno
upon an error.

Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Vivek Goyal <vgoyal@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
[PM: whitespace cleanup for checkpatch.pl]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2016-08-08 20:42:13 -04:00
Vivek Goyal
d8ad8b4961 security, overlayfs: provide copy up security hook for unioned files
Provide a security hook to label new file correctly when a file is copied
up from lower layer to upper layer of a overlay/union mount.

This hook can prepare a new set of creds which are suitable for new file
creation during copy up. Caller will use new creds to create file and then
revert back to old creds and release new creds.

Signed-off-by: Vivek Goyal <vgoyal@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
[PM: whitespace cleanup to appease checkpatch.pl]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2016-08-08 20:06:53 -04:00
Al Viro
4f3ccd7657 qstr: constify dentry_init_security
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-07-20 23:30:06 -04:00
Linus Torvalds
c52b76185b Merge branch 'work.const-path' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs
Pull 'struct path' constification update from Al Viro:
 "'struct path' is passed by reference to a bunch of Linux security
  methods; in theory, there's nothing to stop them from modifying the
  damn thing and LSM community being what it is, sooner or later some
  enterprising soul is going to decide that it's a good idea.

  Let's remove the temptation and constify all of those..."

* 'work.const-path' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs:
  constify ima_d_path()
  constify security_sb_pivotroot()
  constify security_path_chroot()
  constify security_path_{link,rename}
  apparmor: remove useless checks for NULL ->mnt
  constify security_path_{mkdir,mknod,symlink}
  constify security_path_{unlink,rmdir}
  apparmor: constify common_perm_...()
  apparmor: constify aa_path_link()
  apparmor: new helper - common_path_perm()
  constify chmod_common/security_path_chmod
  constify security_sb_mount()
  constify chown_common/security_path_chown
  tomoyo: constify assorted struct path *
  apparmor_path_truncate(): path->mnt is never NULL
  constify vfs_truncate()
  constify security_path_truncate()
  [apparmor] constify struct path * in a bunch of helpers
2016-05-17 14:41:03 -07:00
Baolin Wang
457db29bfc security: Introduce security_settime64()
security_settime() uses a timespec, which is not year 2038 safe
on 32bit systems. Thus this patch introduces the security_settime64()
function with timespec64 type. We also convert the cap_settime() helper
function to use the 64bit types.

This patch then moves security_settime() to the header file as an
inline helper function so that existing users can be iteratively
converted.

None of the existing hooks is using the timespec argument and therefor
the patch is not making any functional changes.

Cc: Serge Hallyn <serge.hallyn@canonical.com>,
Cc: James Morris <james.l.morris@oracle.com>,
Cc: "Serge E. Hallyn" <serge@hallyn.com>,
Cc: Paul Moore <pmoore@redhat.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Cc: Kees Cook <keescook@chromium.org>
Cc: Prarit Bhargava <prarit@redhat.com>
Cc: Richard Cochran <richardcochran@gmail.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@kernel.org>
Reviewed-by: James Morris <james.l.morris@oracle.com>
Signed-off-by: Baolin Wang <baolin.wang@linaro.org>
[jstultz: Reworded commit message]
Signed-off-by: John Stultz <john.stultz@linaro.org>
2016-04-22 11:48:30 -07:00
Al Viro
3b73b68c05 constify security_sb_pivotroot()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:52 -04:00
Al Viro
77b286c0d2 constify security_path_chroot()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:51 -04:00
Al Viro
3ccee46ab4 constify security_path_{link,rename}
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:36 -04:00
Al Viro
d360775217 constify security_path_{mkdir,mknod,symlink}
... as well as unix_mknod() and may_o_create()

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:27 -04:00
Al Viro
989f74e050 constify security_path_{unlink,rmdir}
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:27 -04:00
Al Viro
be01f9f28e constify chmod_common/security_path_chmod
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:25 -04:00
Al Viro
8a04c43b87 constify security_sb_mount()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:24 -04:00
Al Viro
7fd25dac9a constify chown_common/security_path_chown
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:47:24 -04:00
Al Viro
81f4c50607 constify security_path_truncate()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2016-03-28 00:46:54 -04:00
Mimi Zohar
a1db742094 module: replace copy_module_from_fd with kernel version
Replace copy_module_from_fd() with kernel_read_file_from_fd().

Although none of the upstreamed LSMs define a kernel_module_from_file
hook, IMA is called, based on policy, to prevent unsigned kernel modules
from being loaded by the original kernel module syscall and to
measure/appraise signed kernel modules.

The security function security_kernel_module_from_file() was called prior
to reading a kernel module.  Preventing unsigned kernel modules from being
loaded by the original kernel module syscall remains on the pre-read
kernel_read_file() security hook.  Instead of reading the kernel module
twice, once for measuring/appraising and again for loading the kernel
module, the signature validation is moved to the kernel_post_read_file()
security hook.

This patch removes the security_kernel_module_from_file() hook and security
call.

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Luis R. Rodriguez <mcgrof@kernel.org>
Cc: Rusty Russell <rusty@rustcorp.com.au>
2016-02-21 09:06:12 -05:00
Mimi Zohar
39eeb4fb97 security: define kernel_read_file hook
The kernel_read_file security hook is called prior to reading the file
into memory.

Changelog v4+:
- export security_kernel_read_file()

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Luis R. Rodriguez <mcgrof@kernel.org>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
2016-02-21 09:06:09 -05:00
Mimi Zohar
e40ba6d56b firmware: replace call to fw_read_file_contents() with kernel version
Replace the fw_read_file_contents with kernel_file_read_from_path().

Although none of the upstreamed LSMs define a kernel_fw_from_file hook,
IMA is called by the security function to prevent unsigned firmware from
being loaded and to measure/appraise signed firmware, based on policy.

Instead of reading the firmware twice, once for measuring/appraising the
firmware and again for reading the firmware contents into memory, the
kernel_post_read_file() security hook calculates the file hash based on
the in memory file buffer.  The firmware is read once.

This patch removes the LSM kernel_fw_from_file() hook and security call.

Changelog v4+:
- revert dropped buf->size assignment - reported by Sergey Senozhatsky
v3:
- remove kernel_fw_from_file hook
- use kernel_file_read_from_path() - requested by Luis
v2:
- reordered and squashed firmware patches
- fix MAX firmware size (Kees Cook)

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Luis R. Rodriguez <mcgrof@kernel.org>
2016-02-21 09:03:44 -05:00
Mimi Zohar
cf22221786 ima: define a new hook to measure and appraise a file already in memory
This patch defines a new IMA hook ima_post_read_file() for measuring
and appraising files read by the kernel. The caller loads the file into
memory before calling this function, which calculates the hash followed by
the normal IMA policy based processing.

Changelog v5:
- fail ima_post_read_file() if either file or buf is NULL
v3:
- rename ima_hash_and_process_file() to ima_post_read_file()

v1:
- split patch

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Acked-by: Dmitry Kasatkin <dmitry.kasatkin@huawei.com>
2016-02-20 22:35:08 -05:00
Mimi Zohar
bc8ca5b92d vfs: define kernel_read_file_id enumeration
To differentiate between the kernel_read_file() callers, this patch
defines a new enumeration named kernel_read_file_id and includes the
caller identifier as an argument.

Subsequent patches define READING_KEXEC_IMAGE, READING_KEXEC_INITRAMFS,
READING_FIRMWARE, READING_MODULE, and READING_POLICY.

Changelog v3:
- Replace the IMA specific enumeration with a generic one.

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Luis R. Rodriguez <mcgrof@kernel.org>
Cc: Al Viro <viro@zeniv.linux.org.uk>
2016-02-18 17:14:04 -05:00
Mimi Zohar
b44a7dfc6f vfs: define a generic function to read a file from the kernel
For a while it was looked down upon to directly read files from Linux.
These days there exists a few mechanisms in the kernel that do just
this though to load a file into a local buffer.  There are minor but
important checks differences on each.  This patch set is the first
attempt at resolving some of these differences.

This patch introduces a common function for reading files from the kernel
with the corresponding security post-read hook and function.

Changelog v4+:
- export security_kernel_post_read_file() - Fengguang Wu
v3:
- additional bounds checking - Luis
v2:
- To simplify patch review, re-ordered patches

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Reviewed-by: Luis R. Rodriguez <mcgrof@suse.com>
Acked-by: Kees Cook <keescook@chromium.org>
Cc: Al Viro <viro@zeniv.linux.org.uk>
2016-02-18 17:14:03 -05:00
Andreas Gruenbacher
6f3be9f562 security: Add hook to invalidate inode security labels
Add a hook to invalidate an inode's security label when the cached
information becomes invalid.

Add the new hook in selinux: set a flag when a security label becomes
invalid.

Signed-off-by: Andreas Gruenbacher <agruenba@redhat.com>
Reviewed-by: James Morris <james.l.morris@oracle.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Paul Moore <pmoore@redhat.com>
2015-12-24 11:09:40 -05:00
Andreas Gruenbacher
d6335d77a7 security: Make inode argument of inode_getsecid non-const
Make the inode argument of the inode_getsecid hook non-const so that we
can use it to revalidate invalid security labels.

Signed-off-by: Andreas Gruenbacher <agruenba@redhat.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Paul Moore <pmoore@redhat.com>
2015-12-24 11:09:39 -05:00
Andreas Gruenbacher
ea861dfd9e security: Make inode argument of inode_getsecurity non-const
Make the inode argument of the inode_getsecurity hook non-const so that
we can use it to revalidate invalid security labels.

Signed-off-by: Andreas Gruenbacher <agruenba@redhat.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Paul Moore <pmoore@redhat.com>
2015-12-24 11:09:39 -05:00
Jann Horn
b7f76ea2ef security: fix typo in security_task_prctl
Signed-off-by: Jann Horn <jann@thejh.net>
Reviewed-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-09-20 17:00:26 -07:00
Linus Torvalds
e22619a29f Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull security subsystem updates from James Morris:
 "The main change in this kernel is Casey's generalized LSM stacking
  work, which removes the hard-coding of Capabilities and Yama stacking,
  allowing multiple arbitrary "small" LSMs to be stacked with a default
  monolithic module (e.g.  SELinux, Smack, AppArmor).

  See
        https://lwn.net/Articles/636056/

  This will allow smaller, simpler LSMs to be incorporated into the
  mainline kernel and arbitrarily stacked by users.  Also, this is a
  useful cleanup of the LSM code in its own right"

* 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (38 commits)
  tpm, tpm_crb: fix le64_to_cpu conversions in crb_acpi_add()
  vTPM: set virtual device before passing to ibmvtpm_reset_crq
  tpm_ibmvtpm: remove unneccessary message level.
  ima: update builtin policies
  ima: extend "mask" policy matching support
  ima: add support for new "euid" policy condition
  ima: fix ima_show_template_data_ascii()
  Smack: freeing an error pointer in smk_write_revoke_subj()
  selinux: fix setting of security labels on NFS
  selinux: Remove unused permission definitions
  selinux: enable genfscon labeling for sysfs and pstore files
  selinux: enable per-file labeling for debugfs files.
  selinux: update netlink socket classes
  signals: don't abuse __flush_signals() in selinux_bprm_committed_creds()
  selinux: Print 'sclass' as string when unrecognized netlink message occurs
  Smack: allow multiple labels in onlycap
  Smack: fix seq operations in smackfs
  ima: pass iint to ima_add_violation()
  ima: wrap event related data to the new ima_event_data structure
  integrity: add validity checks for 'path' parameter
  ...
2015-06-27 13:26:03 -07:00
Casey Schaufler
b1d9e6b064 LSM: Switch to lists of hooks
Instead of using a vector of security operations
with explicit, special case stacking of the capability
and yama hooks use lists of hooks with capability and
yama hooks included as appropriate.

The security_operations structure is no longer required.
Instead, there is a union of the function pointers that
allows all the hooks lists to use a common mechanism for
list management while retaining typing. Each module
supplies an array describing the hooks it provides instead
of a sparsely populated security_operations structure.
The description includes the element that gets put on
the hook list, avoiding the issues surrounding individual
element allocation.

The method for registering security modules is changed to
reflect the information available. The method for removing
a module, currently only used by SELinux, has also changed.
It should be generic now, however if there are potential
race conditions based on ordering of hook removal that needs
to be addressed by the calling module.

The security hooks are called from the lists and the first
failure is returned.

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Acked-by: John Johansen <john.johansen@canonical.com>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Paul Moore <paul@paul-moore.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <james.l.morris@oracle.com>
2015-05-12 15:00:41 +10:00
Casey Schaufler
346033a28f LSM: Remove a comment from security.h
Remove the large comment describing the content of the
security_operations structure from security.h. This
wasn't done in the previous (2/7) patch because it
would have exceeded the mail list size limits.

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Acked-by: John Johansen <john.johansen@canonical.com>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Paul Moore <paul@paul-moore.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <james.l.morris@oracle.com>
2015-05-12 15:00:25 +10:00
Casey Schaufler
3c4ed7bdf5 LSM: Split security.h
The security.h header file serves two purposes,
interfaces for users of the security modules and
interfaces for security modules. Users of the
security modules don't need to know about what's
in the security_operations structure, so pull it
out into it's own header, lsm_hooks.h

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Acked-by: John Johansen <john.johansen@canonical.com>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Paul Moore <paul@paul-moore.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <james.l.morris@oracle.com>
2015-05-12 15:00:16 +10:00
NeilBrown
bda0be7ad9 security: make inode_follow_link RCU-walk aware
inode_follow_link now takes an inode and rcu flag as well as the
dentry.

inode is used in preference to d_backing_inode(dentry), particularly
in RCU-walk mode.

selinux_inode_follow_link() gets dentry_has_perm() and
inode_has_perm() open-coded into it so that it can call
avc_has_perm_flags() in way that is safe if LOOKUP_RCU is set.

Calling avc_has_perm_flags() with rcu_read_lock() held means
that when avc_has_perm_noaudit calls avc_compute_av(), the attempt
to rcu_read_unlock() before calling security_compute_av() will not
actually drop the RCU read-lock.

However as security_compute_av() is completely in a read_lock()ed
region, it should be safe with the RCU read-lock held.

Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2015-05-11 08:13:11 -04:00
NeilBrown
37882db054 SECURITY: remove nameidata arg from inode_follow_link.
No ->inode_follow_link() methods use the nameidata arg, and
it is about to become private to namei.c.
So remove from all inode_follow_link() functions.

Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2015-05-10 22:18:29 -04:00
Linus Torvalds
6c373ca893 Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next
Pull networking updates from David Miller:

 1) Add BQL support to via-rhine, from Tino Reichardt.

 2) Integrate SWITCHDEV layer support into the DSA layer, so DSA drivers
    can support hw switch offloading.  From Floria Fainelli.

 3) Allow 'ip address' commands to initiate multicast group join/leave,
    from Madhu Challa.

 4) Many ipv4 FIB lookup optimizations from Alexander Duyck.

 5) Support EBPF in cls_bpf classifier and act_bpf action, from Daniel
    Borkmann.

 6) Remove the ugly compat support in ARP for ugly layers like ax25,
    rose, etc.  And use this to clean up the neigh layer, then use it to
    implement MPLS support.  All from Eric Biederman.

 7) Support L3 forwarding offloading in switches, from Scott Feldman.

 8) Collapse the LOCAL and MAIN ipv4 FIB tables when possible, to speed
    up route lookups even further.  From Alexander Duyck.

 9) Many improvements and bug fixes to the rhashtable implementation,
    from Herbert Xu and Thomas Graf.  In particular, in the case where
    an rhashtable user bulk adds a large number of items into an empty
    table, we expand the table much more sanely.

10) Don't make the tcp_metrics hash table per-namespace, from Eric
    Biederman.

11) Extend EBPF to access SKB fields, from Alexei Starovoitov.

12) Split out new connection request sockets so that they can be
    established in the main hash table.  Much less false sharing since
    hash lookups go direct to the request sockets instead of having to
    go first to the listener then to the request socks hashed
    underneath.  From Eric Dumazet.

13) Add async I/O support for crytpo AF_ALG sockets, from Tadeusz Struk.

14) Support stable privacy address generation for RFC7217 in IPV6.  From
    Hannes Frederic Sowa.

15) Hash network namespace into IP frag IDs, also from Hannes Frederic
    Sowa.

16) Convert PTP get/set methods to use 64-bit time, from Richard
    Cochran.

* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next: (1816 commits)
  fm10k: Bump driver version to 0.15.2
  fm10k: corrected VF multicast update
  fm10k: mbx_update_max_size does not drop all oversized messages
  fm10k: reset head instead of calling update_max_size
  fm10k: renamed mbx_tx_dropped to mbx_tx_oversized
  fm10k: update xcast mode before synchronizing multicast addresses
  fm10k: start service timer on probe
  fm10k: fix function header comment
  fm10k: comment next_vf_mbx flow
  fm10k: don't handle mailbox events in iov_event path and always process mailbox
  fm10k: use separate workqueue for fm10k driver
  fm10k: Set PF queues to unlimited bandwidth during virtualization
  fm10k: expose tx_timeout_count as an ethtool stat
  fm10k: only increment tx_timeout_count in Tx hang path
  fm10k: remove extraneous "Reset interface" message
  fm10k: separate PF only stats so that VF does not display them
  fm10k: use hw->mac.max_queues for stats
  fm10k: only show actual queues, not the maximum in hardware
  fm10k: allow creation of VLAN on default vid
  fm10k: fix unused warnings
  ...
2015-04-15 09:00:47 -07:00
Al Viro
3f7036a071 switch security_inode_getattr() to struct path *
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2015-04-11 22:24:32 -04:00
Eric Dumazet
d3593b5cef Revert "selinux: add a skb_owned_by() hook"
This reverts commit ca10b9e9a8.

No longer needed after commit eb8895debe
("tcp: tcp_make_synack() should use sock_wmalloc")

When under SYNFLOOD, we build lot of SYNACK and hit false sharing
because of multiple modifications done on sk_listener->sk_wmem_alloc

Since tcp_make_synack() uses sock_wmalloc(), there is no need
to call skb_set_owner_w() again, as this adds two atomic operations.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-20 21:36:53 -04:00
Stephen Smalley
79af73079d Add security hooks to binder and implement the hooks for SELinux.
Add security hooks to the binder and implement the hooks for SELinux.
The security hooks enable security modules such as SELinux to implement
controls over binder IPC.  The security hooks include support for
controlling what process can become the binder context manager
(binder_set_context_mgr), controlling the ability of a process
to invoke a binder transaction/IPC to another process (binder_transaction),
controlling the ability of a process to transfer a binder reference to
another process (binder_transfer_binder), and controlling the ability
of a process to transfer an open file to another process (binder_transfer_file).

These hooks have been included in the Android kernel trees since Android 4.3.

(Updated to reflect upstream relocation and changes to the binder driver,
changes to the LSM audit data structures, coding style cleanups, and
to add inline documentation for the hooks).

Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Nick Kralevich <nnk@google.com>
Acked-by: Jeffrey Vander Stoep <jeffv@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2015-01-25 09:17:57 -08:00
Linus Torvalds
5e40d331bd Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull security subsystem updates from James Morris.

Mostly ima, selinux, smack and key handling updates.

* 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (65 commits)
  integrity: do zero padding of the key id
  KEYS: output last portion of fingerprint in /proc/keys
  KEYS: strip 'id:' from ca_keyid
  KEYS: use swapped SKID for performing partial matching
  KEYS: Restore partial ID matching functionality for asymmetric keys
  X.509: If available, use the raw subjKeyId to form the key description
  KEYS: handle error code encoded in pointer
  selinux: normalize audit log formatting
  selinux: cleanup error reporting in selinux_nlmsg_perm()
  KEYS: Check hex2bin()'s return when generating an asymmetric key ID
  ima: detect violations for mmaped files
  ima: fix race condition on ima_rdwr_violation_check and process_measurement
  ima: added ima_policy_flag variable
  ima: return an error code from ima_add_boot_aggregate()
  ima: provide 'ima_appraise=log' kernel option
  ima: move keyring initialization to ima_init()
  PKCS#7: Handle PKCS#7 messages that contain no X.509 certs
  PKCS#7: Better handling of unsupported crypto
  KEYS: Overhaul key identification when searching for asymmetric keys
  KEYS: Implement binary asymmetric key ID handling
  ...
2014-10-12 10:13:55 -04:00
Jeff Layton
e0b93eddfe security: make security_file_set_fowner, f_setown and __f_setown void return
security_file_set_fowner always returns 0, so make it f_setown and
__f_setown void return functions and fix up the error handling in the
callers.

Cc: linux-security-module@vger.kernel.org
Signed-off-by: Jeff Layton <jlayton@primarydata.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
2014-09-09 16:01:36 -04:00
Mark Rustad
fbff661083 security: Silence shadow warning
Renaming an unused formal parameter in the static inline function
security_inode_init_security eliminates many W=2 warnings.

Signed-off-by: Mark Rustad <mark.d.rustad@intel.com>
Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
2014-09-02 23:07:55 +10:00
James Morris
167225b775 Merge branch 'stable-3.16' of git://git.infradead.org/users/pcmoore/selinux into next 2014-07-30 01:31:46 +10:00
Paul Moore
2873ead7e4 Revert "selinux: fix the default socket labeling in sock_graft()"
This reverts commit 4da6daf4d3.

Unfortunately, the commit in question caused problems with Bluetooth
devices, specifically it caused them to get caught in the newly
created BUG_ON() check.  The AF_ALG problem still exists, but will be
addressed in a future patch.

Cc: stable@vger.kernel.org
Signed-off-by: Paul Moore <pmoore@redhat.com>
2014-07-28 10:46:07 -04:00
Kees Cook
13752fe2d7 security: introduce kernel_fw_from_file hook
In order to validate the contents of firmware being loaded, there must be
a hook to evaluate any loaded firmware that wasn't built into the kernel
itself. Without this, there is a risk that a root user could load malicious
firmware designed to mount an attack against kernel memory (e.g. via DMA).

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Takashi Iwai <tiwai@suse.de>
2014-07-25 11:47:45 -07:00