]> git.ipfire.org Git - thirdparty/grsecurity-scrape.git/blobdiff - test/changelog-test.txt
Auto commit, 1 new patch{es}.
[thirdparty/grsecurity-scrape.git] / test / changelog-test.txt
index 5b54c43ab83b9cae3eade4687048761a824551f4..7da131b88e927db139e28b830bfcffc7335c56f8 100644 (file)
@@ -1,3 +1,559 @@
+commit d0ed58f929555736ff281f7a79a9667de4c857c6
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Wed Oct 26 19:19:08 2016 -0400
+
+    Update size_overflow hash tables
+
+ .../gcc-plugins/size_overflow_plugin/e_fields.data |  80 +++++++++--
+ .../gcc-plugins/size_overflow_plugin/e_fns.data    | 159 ++++++++++++++++++++-
+ .../gcc-plugins/size_overflow_plugin/e_vars.data   |  15 ++
+ 3 files changed, 239 insertions(+), 15 deletions(-)
+
+commit 6a222637c05d26ac8f80a3912856247cff545b12
+Merge: d07e77f ac51587
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Wed Oct 26 18:51:31 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit ac5158781612eb239cff9767d116971e9b731a00
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Wed Oct 26 18:50:46 2016 -0400
+
+    Update to pax-linux-4.7.10-test9.patch:
+    - fixed a false positive size overflow report in ip6_frag_queue caused by a gcc intentional overflow, reported by DrWhax and deagol (https://forums.grsecurity.net/viewtopic.php?f=3&t=4594 and https://bugs.gentoo.org/show_bug.cgi?id=597792)
+    - Emese updated the size overflow plugin
+    - Emese updated the hash tables from logs submitted by Shawn <citypw@gmail.com>
+    - fixed mm counter accounting in the vma mirroring code
+    - simplified some kernel page table allocation code
+    - simplified SMAP/UDEREF accessors
+
+ arch/x86/include/asm/asm.h                         |    24 -
+ arch/x86/include/asm/fpu/internal.h                |    21 +-
+ arch/x86/include/asm/futex.h                       |    14 +-
+ arch/x86/include/asm/pgtable_types.h               |     9 +-
+ arch/x86/include/asm/smap.h                        |     3 +
+ arch/x86/include/asm/uaccess.h                     |    36 +-
+ arch/x86/include/asm/uaccess_64.h                  |     2 -
+ arch/x86/kernel/alternative.c                      |     5 +-
+ arch/x86/lib/copy_user_64.S                        |    64 +-
+ arch/x86/lib/csum-wrappers_64.c                    |    12 +-
+ arch/x86/lib/getuser.S                             |    37 +-
+ arch/x86/lib/putuser.S                             |    14 +-
+ arch/x86/lib/usercopy_64.c                         |     9 +-
+ drivers/base/regmap/regmap-debugfs.c               |     4 +-
+ mm/memory.c                                        |   106 +-
+ net/ipv6/reassembly.c                              |     4 +-
+ scripts/Makefile.host                              |    22 +-
+ scripts/gcc-plugins/rap_plugin/rap_plugin.c        |     2 +
+ .../gcc-plugins/size_overflow_plugin/disable.data  |     1 -
+ .../gcc-plugins/size_overflow_plugin/e_fields.data | 37890 ++++++++++---------
+ .../gcc-plugins/size_overflow_plugin/e_fns.data    |  7930 ++--
+ .../gcc-plugins/size_overflow_plugin/e_fptrs.data  |   112 +-
+ .../gcc-plugins/size_overflow_plugin/e_vars.data   |   248 +-
+ .../insert_size_overflow_asm.c                     |    13 +-
+ .../size_overflow_plugin/intentional_overflow.c    |    11 +-
+ .../size_overflow_plugin/size_overflow.h           |    12 +-
+ .../size_overflow_plugin/size_overflow_debug.c     |     9 +-
+ .../size_overflow_plugin/size_overflow_ipa.c       |    74 +-
+ .../size_overflow_plugin/size_overflow_plugin.c    |     2 +-
+ .../size_overflow_plugin_hash.c                    |   209 +-
+ .../size_overflow_plugin/size_overflow_transform.c |    19 +-
+ 31 files changed, 22699 insertions(+), 24219 deletions(-)
+
+commit d07e77f258d26721b33ae26dfa5fd8d408aabf57
+Merge: 4630c95 7449af19
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 22 18:32:55 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit 7449af196b6733891d273f46559efdc168dec22a
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 22 18:31:39 2016 -0400
+
+    Update to pax-linux-4.7.10-test8.patch:
+    - Emese removed a potential false positive from the size overflow hash tables
+    - fixed a few incorrect callback types in ACPI/BGRT caught by RAP, reported by foxxx0 (https://forums.grsecurity.net/viewtopic.php?f=3&t=4586)
+    - fixed a few size overflow false positives related to dev_t, reported by fx3 (https://forums.grsecurity.net/viewtopic.php?f=3&t=4583)
+
+ drivers/acpi/bgrt.c                                | 30 +++++++++++-----------
+ include/linux/kobject.h                            |  7 +++++
+ scripts/gcc-plugins/size_overflow_plugin/Makefile  |  2 +-
+ .../gcc-plugins/size_overflow_plugin/disable.data  |  8 +++++-
+ .../gcc-plugins/size_overflow_plugin/e_fields.data | 10 ++------
+ 5 files changed, 32 insertions(+), 25 deletions(-)
+
+commit 4630c95d3d9c20cffe2ba65521217ad537567ac9
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 22 09:19:43 2016 -0400
+
+    compile fix
+
+ fs/utimes.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+commit ee9aeeeb02187281bcc233dd26f6ff4d6814d309
+Merge: 7b8d5c5 309d942
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 22 08:01:34 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit 309d94235d552d65c253027528a9dd46962cf385
+Merge: 013fc76 b3afc45
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 22 07:53:44 2016 -0400
+
+    Merge branch 'linux-4.7.y' into pax-test
+
+commit 7b8d5c5a1477a2b62dc7ad1c28e864d7d250739c
+Merge: ca352cc 013fc76
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Thu Oct 20 07:49:24 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit 013fc7689892902c41d38e31057e4a5686293e40
+Merge: 25eaf06 452063d
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Thu Oct 20 07:48:01 2016 -0400
+
+    Merge branch 'linux-4.7.y' into pax-test
+
+commit ca352cccec60c85fad6dedaf229d51eddfdfea58
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Thu Oct 20 07:06:54 2016 -0400
+
+    compile fix as reported by David Sterba
+
+ include/linux/mm.h | 1 +
+ 1 file changed, 1 insertion(+)
+
+commit 82566bede4206afba0d8b11f58570d588d39586b
+Author: Linus Torvalds <torvalds@linux-foundation.org>
+Date:   Thu Oct 13 13:07:36 2016 -0700
+
+    mm: remove gup_flags FOLL_WRITE games from __get_user_pages()
+    
+    This is an ancient bug that was actually attempted to be fixed once
+    (badly) by me eleven years ago in commit 4ceb5db9757a ("Fix
+    get_user_pages() race for write access") but that was then undone due to
+    problems on s390 by commit f33ea7f404e5 ("fix get_user_pages bug").
+    
+    In the meantime, the s390 situation has long been fixed, and we can now
+    fix it by checking the pte_dirty() bit properly (and do it better).  The
+    s390 dirty bit was implemented in abf09bed3cce ("s390/mm: implement
+    software dirty bits") which made it into v3.9.  Earlier kernels will
+    have to look at the page state itself.
+    
+    Also, the VM has become more scalable, and what used a purely
+    theoretical race back then has become easier to trigger.
+    
+    To fix it, we introduce a new internal FOLL_COW flag to mark the "yes,
+    we already did a COW" rather than play racy games with FOLL_WRITE that
+    is very fundamental, and then use the pte dirty flag to validate that
+    the FOLL_COW flag is still valid.
+    
+    Reported-and-tested-by: Phil "not Paul" Oester <kernel@linuxace.com>
+    Acked-by: Hugh Dickins <hughd@google.com>
+    Reviewed-by: Michal Hocko <mhocko@suse.com>
+    Cc: Andy Lutomirski <luto@kernel.org>
+    Cc: Kees Cook <keescook@chromium.org>
+    Cc: Oleg Nesterov <oleg@redhat.com>
+    Cc: Willy Tarreau <w@1wt.eu>
+    Cc: Nick Piggin <npiggin@gmail.com>
+    Cc: Greg Thelen <gthelen@google.com>
+    Cc: stable@vger.kernel.org
+    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
+
+ include/linux/mm.h |  2 +-
+ mm/gup.c           | 14 ++++++++++++--
+ 2 files changed, 13 insertions(+), 3 deletions(-)
+
+commit d291c94e650da2d8918620e6829e05218755f77b
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Wed Oct 19 17:06:17 2016 -0400
+
+    resync with PaX
+
+ arch/arm/include/asm/atomic.h | 5 -----
+ 1 file changed, 5 deletions(-)
+
+commit 251313cb6e1d5b2ad84c62333ebafa278e861a68
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Wed Oct 19 17:03:14 2016 -0400
+
+    Fix bad ARM REFCOUNT merge with PaX, reported by kdave on the forums:
+    https://forums.grsecurity.net/viewtopic.php?f=3&t=4588
+
+ arch/arm/include/asm/atomic.h | 1 -
+ 1 file changed, 1 deletion(-)
+
+commit b64df18d4160c6d3cd470202bb8d58f38d9acb51
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Mon Oct 17 07:47:53 2016 -0400
+
+    randomize layout of subprocess_info struct
+
+ include/linux/kmod.h | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+commit 5780e7fb9d334bfa5cc8aef32af631e620dede3f
+Merge: 7c69071 25eaf06
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sun Oct 16 15:28:24 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit 25eaf067f993510e5cd6cc0d9da4413cbbc12c6a
+Merge: afa87ca a0cdc25
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sun Oct 16 15:28:15 2016 -0400
+
+    Merge branch 'linux-4.7.y' into pax-test
+
+commit 7c690715adc3d9236b25ce453b387ef9583b8dda
+Merge: 37e00aa afa87ca
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 15 15:25:46 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit afa87cab2bed6b038cd5446a00bf58a71c954b43
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 15 15:18:18 2016 -0400
+
+    Update to pax-linux-4.7.6-test7.patch:
+    - backported upstream commit f5beeb1851ea6f8cfcf2657f26cb24c0582b4945 to speed up kcore handling
+    - fixed a size overflow false positive in raid10, reported by eswierk (https://forums.grsecurity.net/viewtopic.php?f=3&t=4575)
+    - fixed an integer overflow in bio handling caught by the size overflow plugin, reported by jotik (https://forums.grsecurity.net/viewtopic.php?f=3&t=4579)
+    - rate limited the logging of refcount overflows and usercopy violations
+    - changed atomic64's underlying type on i386 to be consistent with other archs
+    - sped up the RIP range check in opportunistic sysret on amd64
+
+ arch/x86/entry/entry_64.S                          | 13 ++-
+ arch/x86/include/asm/atomic64_32.h                 |  4 +-
+ block/bio.c                                        |  2 +-
+ drivers/md/raid10.c                                |  6 +-
+ drivers/usb/usbip/vudc_rx.c                        |  2 +-
+ fs/exec.c                                          | 24 ++++--
+ fs/proc/kcore.c                                    | 40 +++++----
+ include/linux/bio.h                                |  4 +-
+ scripts/gcc-plugins/size_overflow_plugin/Makefile  |  2 +-
+ scripts/gcc-plugins/size_overflow_plugin/aux.data  | 97 ----------------------
+ .../gcc-plugins/size_overflow_plugin/disable.data  | 12 ++-
+ .../gcc-plugins/size_overflow_plugin/e_aux.data    | 97 ++++++++++++++++++++++
+ .../gcc-plugins/size_overflow_plugin/e_fields.data | 14 +---
+ .../size_overflow_plugin_hash.c                    |  2 +-
+ 14 files changed, 169 insertions(+), 150 deletions(-)
+
+commit 37e00aa150c7861f77e69fe361bf19dee467dc0a
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Mon Oct 10 18:27:38 2016 -0400
+
+    RAP compile fix
+
+ drivers/isdn/hisax/config.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+commit 00736455939143023205fdd8957421c73868e975
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Mon Oct 10 18:09:55 2016 -0400
+
+    Mark initify broken for the time being due to some recent changes
+
+ security/Kconfig | 1 +
+ 1 file changed, 1 insertion(+)
+
+commit 64458bae539de9ac5cd2ba7cad0bd0c0510e6f37
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Mon Oct 10 17:11:40 2016 -0400
+
+    compile fix
+
+ scripts/gcc-plugins/size_overflow_plugin/size_overflow_plugin_hash.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+commit 9f5f1d1d7f120c1c85b16412e6b75ab221c2cdba
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Mon Oct 10 17:10:22 2016 -0400
+
+    Fix makefiles and .gitignore for new size_overflow plugin
+
+ Makefile                                           |  7 +-
+ .../gcc-plugins/size_overflow_plugin/.gitignore    |  5 +-
+ scripts/gcc-plugins/size_overflow_plugin/Makefile  | 35 ++++++--
+ scripts/gcc-plugins/size_overflow_plugin/aux.data  | 97 ----------------------
+ .../gcc-plugins/size_overflow_plugin/e_aux.data    | 97 ++++++++++++++++++++++
+ 5 files changed, 128 insertions(+), 113 deletions(-)
+
+commit cb66e251f9c9880a1365c87b4a42d2885a2fb6ef
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sun Oct 9 09:28:14 2016 -0400
+
+    Enable PAX_SIZE_OVERFLOW_EXTRA by default in auto-config
+
+ security/Kconfig | 1 +
+ 1 file changed, 1 insertion(+)
+
+commit cd690739e0fb999002075161a032072cf4e4c458
+Merge: 555de68 0e7a060
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 8 18:29:48 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit 0e7a060de797ec4e837533146d38e8793e30f84f
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sat Oct 8 18:01:07 2016 -0400
+
+    Update to pax-linux-4.7.6-test6.patch:
+    - updated the fields hash table of the size overflow plugin to remove a few false positives
+    - fixed SANITIZE/HIBERNATION incompatibility, by Anisse Astier <anisse@astier.eu>
+    - backported a few fixes and cleanups from grsecurity
+      - fixed compile errors on some arm/arm64/powerpc/sparc configs for REFCOUNT, KERNEXEC and CONSTIFY
+      - worked around a compile regression in crc32-pclmul_asm.S on some toolchains that define __i686
+      - updated the size overflow hash table
+      - added pax_size_overflow_report_only to disable the reaction mechanism on size overflows
+      - added a few preemptive buffer size checks
+    - fixed integer signedness mixup in tun_set_headroom, by Mathias Krause <mathias.krause@secunet.com>
+    - Emese changed the size overflow plugin to enable the more risky instrumentation under its own config option
+    - Emese greatly increased the coverage of the initify plugin
+    - added BROKEN_SECURITY to disable upstream features as necessary
+
+ Documentation/dontdiff                             |     7 +-
+ Documentation/kernel-parameters.txt                |     5 +
+ arch/arm/include/asm/atomic.h                      |    41 +-
+ arch/arm/include/asm/domain.h                      |     1 +
+ arch/arm/include/asm/string.h                      |     6 +-
+ arch/arm/kernel/efi.c                              |     4 +-
+ arch/arm/mach-mvebu/coherency.c                    |     2 +-
+ arch/arm/mm/alignment.c                            |    24 +-
+ arch/arm64/Kconfig                                 |     1 +
+ arch/arm64/include/asm/atomic.h                    |     3 +
+ arch/arm64/include/asm/cache.h                     |     4 +-
+ arch/arm64/include/asm/pgalloc.h                   |     5 +
+ arch/arm64/include/asm/pgtable.h                   |     3 +
+ arch/arm64/include/asm/string.h                    |    10 +-
+ arch/arm64/kernel/process.c                        |     9 +-
+ arch/arm64/kernel/stacktrace.c                     |     4 +-
+ arch/arm64/kernel/traps.c                          |     2 +-
+ arch/ia64/include/asm/uaccess.h                    |    11 +-
+ arch/mips/Kconfig                                  |     2 +-
+ arch/parisc/include/asm/uaccess.h                  |   108 +-
+ arch/powerpc/include/asm/atomic.h                  |    23 +-
+ arch/powerpc/include/asm/cache.h                   |     4 +-
+ arch/powerpc/include/asm/spinlock.h                |     1 +
+ arch/powerpc/include/asm/string.h                  |     4 +-
+ arch/powerpc/include/asm/uaccess.h                 |    15 -
+ arch/powerpc/kernel/traps.c                        |     2 +-
+ arch/sparc/include/asm/cache.h                     |     4 +-
+ arch/sparc/include/asm/pgalloc_64.h                |     1 +
+ arch/sparc/include/asm/uaccess_32.h                |    65 -
+ arch/um/include/asm/cache.h                        |     3 +-
+ arch/x86/Kconfig                                   |     5 +-
+ arch/x86/crypto/crc32-pclmul_asm.S                 |     4 +-
+ arch/x86/include/asm/string_32.h                   |    12 +-
+ arch/x86/include/asm/string_64.h                   |     4 +-
+ arch/x86/include/asm/uaccess.h                     |     2 +-
+ arch/x86/kernel/hpet.c                             |     2 +-
+ arch/x86/kernel/kprobes/opt.c                      |     8 +-
+ arch/x86/kernel/ptrace.c                           |    14 +
+ arch/x86/kernel/signal.c                           |     9 +-
+ arch/x86/lib/Makefile                              |     4 +
+ arch/x86/platform/efi/efi_64.c                     |     2 +-
+ drivers/acpi/acpica/acutils.h                      |     2 +-
+ drivers/acpi/acpica/dbhistry.c                     |     2 +-
+ drivers/acpi/acpica/dbinput.c                      |    10 +-
+ drivers/acpi/acpica/dbstats.c                      |    88 +-
+ drivers/acpi/acpica/utdebug.c                      |     2 +-
+ drivers/cdrom/cdrom.c                              |     2 +-
+ drivers/char/genrtc.c                              |     1 +
+ drivers/char/random.c                              |     2 +-
+ drivers/firmware/efi/libstub/Makefile              |     2 +
+ drivers/gpu/drm/gma500/mdfld_dsi_dpi.c             |     7 +-
+ drivers/hid/hid-wiimote-debug.c                    |     2 +-
+ drivers/iommu/arm-smmu-v3.c                        |    32 +-
+ drivers/isdn/hisax/hisax.h                         |     4 +-
+ drivers/media/radio/radio-cadet.c                  |     5 +-
+ drivers/mmc/host/tmio_mmc_pio.c                    |     4 +-
+ drivers/net/tun.c                                  |     2 +-
+ drivers/net/wireless/zydas/zd1211rw/zd_usb.c       |     2 +-
+ drivers/scsi/esas2r/esas2r_init.c                  |     2 +-
+ drivers/scsi/esas2r/esas2r_ioctl.c                 |     2 +-
+ drivers/scsi/esas2r/esas2r_log.h                   |     4 +-
+ drivers/scsi/esas2r/esas2r_main.c                  |     4 +-
+ drivers/uio/uio.c                                  |     6 +-
+ drivers/video/fbdev/arcfb.c                        |     2 +-
+ fs/char_dev.c                                      |     2 +-
+ fs/exec.c                                          |    16 +-
+ fs/ext4/extents.c                                  |     2 +-
+ fs/nfsd/nfscache.c                                 |     2 +-
+ fs/ntfs/debug.h                                    |     6 +-
+ fs/ocfs2/cluster/masklog.h                         |     2 +-
+ fs/proc/task_mmu.c                                 |     5 +-
+ include/acpi/acpiosxf.h                            |     3 +-
+ include/acpi/acpixf.h                              |     2 +-
+ include/asm-generic/atomic-long.h                  |     4 +
+ include/asm-generic/bug.h                          |     5 +-
+ include/asm-generic/pgtable-nopmd.h                |     1 +
+ include/asm-generic/vmlinux.lds.h                  |     2 +
+ include/drm/drmP.h                                 |     2 +-
+ include/linux/atomic.h                             |    21 +
+ include/linux/audit.h                              |     5 +-
+ include/linux/compiler-gcc.h                       |    15 +
+ include/linux/compiler.h                           |     8 +
+ include/linux/fs.h                                 |     2 +-
+ include/linux/gfp.h                                |     4 +-
+ include/linux/init.h                               |     4 +-
+ include/linux/mm.h                                 |     2 +-
+ include/linux/printk.h                             |     2 +-
+ include/linux/random.h                             |     2 +-
+ include/linux/ratelimit.h                          |     3 +-
+ include/linux/sched.h                              |     6 +-
+ include/linux/slab.h                               |     2 +-
+ include/linux/string.h                             |    34 +-
+ include/uapi/linux/personality.h                   |     1 +
+ init/Kconfig                                       |     3 +
+ init/main.c                                        |    11 +
+ kernel/exit.c                                      |    18 +-
+ kernel/power/hibernate.c                           |    21 +-
+ kernel/power/power.h                               |     2 +
+ kernel/power/snapshot.c                            |    22 +
+ lib/Kconfig.debug                                  |     3 +-
+ lib/vsprintf.c                                     |     6 +-
+ mm/Kconfig.debug                                   |     2 -
+ mm/page_alloc.c                                    |     6 +-
+ mm/util.c                                          |     2 +-
+ net/ipv4/ip_sockglue.c                             |     3 +-
+ net/ipv4/ip_vti.c                                  |     2 +-
+ scripts/Makefile.gcc-plugins                       |    17 +-
+ scripts/gcc-plugins/initify_plugin.c               |  1588 +-
+ scripts/gcc-plugins/size_overflow_plugin/Makefile  |    26 +-
+ scripts/gcc-plugins/size_overflow_plugin/aux.data  |    97 +
+ .../gcc-plugins/size_overflow_plugin/disable.data  | 12453 +++++++++++
+ .../disable_size_overflow_hash.data                | 12445 -----------
+ .../gcc-plugins/size_overflow_plugin/e_fields.data | 18898 ++++++++++++++++
+ .../gcc-plugins/size_overflow_plugin/e_fns.data    |  4833 ++++
+ .../gcc-plugins/size_overflow_plugin/e_fptrs.data  |    56 +
+ .../gcc-plugins/size_overflow_plugin/e_vars.data   |   116 +
+ .../insert_size_overflow_asm.c                     |     2 +-
+ .../size_overflow_plugin/intentional_overflow.c    |     2 +-
+ .../size_overflow_plugin/size_overflow.h           |    14 +-
+ .../size_overflow_plugin/size_overflow_debug.c     |     4 +-
+ .../size_overflow_plugin/size_overflow_hash.data   | 22068 -------------------
+ .../size_overflow_hash_aux.data                    |    97 -
+ .../size_overflow_plugin/size_overflow_ipa.c       |    65 +-
+ .../size_overflow_plugin/size_overflow_plugin.c    |    25 +-
+ .../size_overflow_plugin_hash.c                    |   120 +-
+ .../size_overflow_plugin/size_overflow_transform.c |    30 +-
+ security/Kconfig                                   |    78 +-
+ security/integrity/integrity.h                     |     2 +-
+ security/min_addr.c                                |     2 +
+ 129 files changed, 38670 insertions(+), 35263 deletions(-)
+
+commit 555de68005b90a38a9e5eee6835130d5d4291030
+Merge: b48dade c3695e4
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Fri Oct 7 17:38:00 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit c3695e458f10605aa5d59e5d16a80156c6aca5f1
+Merge: a16b512 fdf81f0
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Fri Oct 7 17:37:31 2016 -0400
+
+    Merge branch 'linux-4.7.y' into pax-test
+
+commit b48dade7b67aa153367dc38d6f3b513b93da2b07
+Merge: 14d3459 a16b512
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Fri Sep 30 07:56:46 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit a16b51212ca70e45554cecf7d3b67335d4c847ff
+Merge: 674c5b2 f849d45
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Fri Sep 30 07:56:04 2016 -0400
+
+    Merge branch 'linux-4.7.y' into pax-test
+
+commit 14d3459a64f15c168c7783d46f690c0ee1283ef2
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Tue Sep 27 17:07:31 2016 -0400
+
+    Fix arm/MULTI_CACHE incompatibility with RANDSTRUCT, reported by radegand:
+    https://forums.grsecurity.net/viewtopic.php?t=4545&p=1659
+
+ arch/arm/include/asm/cacheflush.h | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+commit 39d7aa87f8bd225bc3ac099a2046e334191c90b3
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Mon Sep 26 11:28:09 2016 -0400
+
+    Backport upstream commit which allows PAX_MEMORY_SANITIZE to work
+    with hibernation:
+    https://patchwork.kernel.org/patch/9322709/
+
+ kernel/power/Kconfig     |  1 -
+ kernel/power/hibernate.c |  4 +++-
+ kernel/power/power.h     |  2 ++
+ kernel/power/snapshot.c  | 20 ++++++++++++++++++++
+ 4 files changed, 25 insertions(+), 2 deletions(-)
+
+commit e5944827e8a1cb6938ed75cccf05f354344b3fa9
+Author: Herbert Xu <herbert@gondor.apana.org.au>
+Date:   Tue Sep 20 20:35:55 2016 +0800
+
+    KEYS: Fix skcipher IV clobbering
+    
+    The IV must not be modified by the skcipher operation so we need
+    to duplicate it.
+    
+    Fixes: c3917fd9dfbc ("KEYS: Use skcipher")
+    Cc: stable@vger.kernel.org
+    Reported-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
+    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
+
+ security/keys/encrypted-keys/encrypted.c | 11 +++++++----
+ 1 file changed, 7 insertions(+), 4 deletions(-)
+
+commit 17d91a9781b8c4558433cee3e7de8d44a6c2d89b
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sun Sep 25 18:10:01 2016 -0400
+
+    Make vti_notifier_block read_only
+
+ net/ipv4/ip_vti.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+commit d2eba293dd946c7686080602a2e24ddb5358cfcf
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sun Sep 25 17:30:32 2016 -0400
+
+    compile fix
+
+ net/unix/af_unix.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+commit 47cca6342f665fa1b4b755723b843ac41ebb9178
+Merge: 16919c7 674c5b2
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sun Sep 25 17:25:45 2016 -0400
+
+    Merge branch 'pax-test' into grsec-test
+
+commit 674c5b28e7dfe651caf71d1cdec395205ed9f526
+Merge: 4552781 6c21842
+Author: Brad Spengler <spender@grsecurity.net>
+Date:   Sun Sep 25 17:24:44 2016 -0400
+
+    Merge branch 'linux-4.7.y' into pax-test
+
 commit 16919c7208e7ad9bc5f6df2f151b84cede110c15
 Author: Brad Spengler <spender@grsecurity.net>
 Date:   Wed Sep 21 18:40:32 2016 -0400