]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
Drop prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
authorSasha Levin <sashal@kernel.org>
Mon, 15 Mar 2021 14:46:38 +0000 (10:46 -0400)
committerSasha Levin <sashal@kernel.org>
Mon, 15 Mar 2021 14:46:38 +0000 (10:46 -0400)
Signed-off-by: Sasha Levin <sashal@kernel.org>
14 files changed:
queue-4.14/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch [deleted file]
queue-4.14/series
queue-4.19/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch [deleted file]
queue-4.19/series
queue-4.4/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch [deleted file]
queue-4.4/series
queue-4.9/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch [deleted file]
queue-4.9/series
queue-5.10/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch [deleted file]
queue-5.10/series
queue-5.11/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch [deleted file]
queue-5.11/series
queue-5.4/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch [deleted file]
queue-5.4/series

diff --git a/queue-4.14/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch b/queue-4.14/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
deleted file mode 100644 (file)
index d203041..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-From 47b47fc59d25cad965dabdcc10a9261e63d168cf Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Sun, 14 Mar 2021 23:51:14 +0300
-Subject: prctl: fix PR_SET_MM_AUXV kernel stack leak
-
-From: Alexey Dobriyan <adobriyan@gmail.com>
-
-[ Upstream commit c995f12ad8842dbf5cfed113fb52cdd083f5afd1 ]
-
-Doing a
-
-       prctl(PR_SET_MM, PR_SET_MM_AUXV, addr, 1);
-
-will copy 1 byte from userspace to (quite big) on-stack array
-and then stash everything to mm->saved_auxv.
-AT_NULL terminator will be inserted at the very end.
-
-/proc/*/auxv handler will find that AT_NULL terminator
-and copy original stack contents to userspace.
-
-This devious scheme requires CAP_SYS_RESOURCE.
-
-Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- kernel/sys.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/kernel/sys.c b/kernel/sys.c
-index 2e4f017f7c5a..03fc0152cc54 100644
---- a/kernel/sys.c
-+++ b/kernel/sys.c
-@@ -2005,7 +2005,7 @@ static int prctl_set_auxv(struct mm_struct *mm, unsigned long addr,
-        * up to the caller to provide sane values here, otherwise userspace
-        * tools which use this vector might be unhappy.
-        */
--      unsigned long user_auxv[AT_VECTOR_SIZE];
-+      unsigned long user_auxv[AT_VECTOR_SIZE] = {};
-       if (len > sizeof(user_auxv))
-               return -EINVAL;
--- 
-2.30.1
-
index 1003a174f9b750c4b3bd14b668308b3c7721e814..fed63a7bd30bd6b5de2e48ef5251eaac72305c3d 100644 (file)
@@ -84,7 +84,6 @@ block-rsxx-fix-error-return-code-of-rsxx_pci_probe.patch
 configfs-fix-a-use-after-free-in-__configfs_open_fil.patch
 stop_machine-mark-helpers-__always_inline.patch
 include-linux-sched-mm.h-use-rcu_dereference-in-in_v.patch
-prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
 powerpc-64s-fix-instruction-encoding-for-lis-in-ppc_function_entry.patch
 binfmt_misc-fix-possible-deadlock-in-bm_register_write.patch
 hwmon-lm90-fix-max6658-sporadic-wrong-temperature-reading.patch
diff --git a/queue-4.19/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch b/queue-4.19/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
deleted file mode 100644 (file)
index c673dc3..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-From a1fd7d2e22b7f94b9bc2e83180d2880a0974b89a Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Sun, 14 Mar 2021 23:51:14 +0300
-Subject: prctl: fix PR_SET_MM_AUXV kernel stack leak
-
-From: Alexey Dobriyan <adobriyan@gmail.com>
-
-[ Upstream commit c995f12ad8842dbf5cfed113fb52cdd083f5afd1 ]
-
-Doing a
-
-       prctl(PR_SET_MM, PR_SET_MM_AUXV, addr, 1);
-
-will copy 1 byte from userspace to (quite big) on-stack array
-and then stash everything to mm->saved_auxv.
-AT_NULL terminator will be inserted at the very end.
-
-/proc/*/auxv handler will find that AT_NULL terminator
-and copy original stack contents to userspace.
-
-This devious scheme requires CAP_SYS_RESOURCE.
-
-Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- kernel/sys.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/kernel/sys.c b/kernel/sys.c
-index baf60a3aa34b..81ed6023d01b 100644
---- a/kernel/sys.c
-+++ b/kernel/sys.c
-@@ -2069,7 +2069,7 @@ static int prctl_set_auxv(struct mm_struct *mm, unsigned long addr,
-        * up to the caller to provide sane values here, otherwise userspace
-        * tools which use this vector might be unhappy.
-        */
--      unsigned long user_auxv[AT_VECTOR_SIZE];
-+      unsigned long user_auxv[AT_VECTOR_SIZE] = {};
-       if (len > sizeof(user_auxv))
-               return -EINVAL;
--- 
-2.30.1
-
index c53099f999f05a8361db66599d42400f861de6f6..dc5c46b0272767bf9b537833e0318776702b95a2 100644 (file)
@@ -109,7 +109,6 @@ configfs-fix-a-use-after-free-in-__configfs_open_fil.patch
 hrtimer-update-softirq_expires_next-correctly-after-.patch
 stop_machine-mark-helpers-__always_inline.patch
 include-linux-sched-mm.h-use-rcu_dereference-in-in_v.patch
-prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
 powerpc-64s-fix-instruction-encoding-for-lis-in-ppc_function_entry.patch
 binfmt_misc-fix-possible-deadlock-in-bm_register_write.patch
 x86-unwind-orc-disable-kasan-checking-in-the-orc-unwinder-part-2.patch
diff --git a/queue-4.4/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch b/queue-4.4/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
deleted file mode 100644 (file)
index ce8a790..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-From 6c68e2f8d2f09af655f81c176bf6e5100a34a8da Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Sun, 14 Mar 2021 23:51:14 +0300
-Subject: prctl: fix PR_SET_MM_AUXV kernel stack leak
-
-From: Alexey Dobriyan <adobriyan@gmail.com>
-
-[ Upstream commit c995f12ad8842dbf5cfed113fb52cdd083f5afd1 ]
-
-Doing a
-
-       prctl(PR_SET_MM, PR_SET_MM_AUXV, addr, 1);
-
-will copy 1 byte from userspace to (quite big) on-stack array
-and then stash everything to mm->saved_auxv.
-AT_NULL terminator will be inserted at the very end.
-
-/proc/*/auxv handler will find that AT_NULL terminator
-and copy original stack contents to userspace.
-
-This devious scheme requires CAP_SYS_RESOURCE.
-
-Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- kernel/sys.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/kernel/sys.c b/kernel/sys.c
-index e98664039cb2..8ac977df4dd4 100644
---- a/kernel/sys.c
-+++ b/kernel/sys.c
-@@ -1910,7 +1910,7 @@ static int prctl_set_auxv(struct mm_struct *mm, unsigned long addr,
-        * up to the caller to provide sane values here, otherwise userspace
-        * tools which use this vector might be unhappy.
-        */
--      unsigned long user_auxv[AT_VECTOR_SIZE];
-+      unsigned long user_auxv[AT_VECTOR_SIZE] = {};
-       if (len > sizeof(user_auxv))
-               return -EINVAL;
--- 
-2.30.1
-
index 3f9b961dd84f8d515ce8b8e544605a7b56f3bc00..25e4798dfe3a6050b374893f5f26d90f6a93151d 100644 (file)
@@ -57,7 +57,6 @@ staging-comedi-pcl711-fix-endian-problem-for-ai-command-data.patch
 staging-comedi-pcl818-fix-endian-problem-for-ai-command-data.patch
 nfsv4.2-fix-return-value-of-_nfs4_get_security_label.patch
 block-rsxx-fix-error-return-code-of-rsxx_pci_probe.patch
-prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
 alpha-add-src-rather-than-obj-to-make-source-file-path.patch
 alpha-merge-build-rules-of-division-routines.patch
 alpha-make-short-build-log-available-for-division-routines.patch
diff --git a/queue-4.9/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch b/queue-4.9/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
deleted file mode 100644 (file)
index 7521a17..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-From 941b8d3cf860169527e80a665fb4320460bec106 Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Sun, 14 Mar 2021 23:51:14 +0300
-Subject: prctl: fix PR_SET_MM_AUXV kernel stack leak
-
-From: Alexey Dobriyan <adobriyan@gmail.com>
-
-[ Upstream commit c995f12ad8842dbf5cfed113fb52cdd083f5afd1 ]
-
-Doing a
-
-       prctl(PR_SET_MM, PR_SET_MM_AUXV, addr, 1);
-
-will copy 1 byte from userspace to (quite big) on-stack array
-and then stash everything to mm->saved_auxv.
-AT_NULL terminator will be inserted at the very end.
-
-/proc/*/auxv handler will find that AT_NULL terminator
-and copy original stack contents to userspace.
-
-This devious scheme requires CAP_SYS_RESOURCE.
-
-Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- kernel/sys.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/kernel/sys.c b/kernel/sys.c
-index 546cdc911dad..76b3d9262644 100644
---- a/kernel/sys.c
-+++ b/kernel/sys.c
-@@ -1910,7 +1910,7 @@ static int prctl_set_auxv(struct mm_struct *mm, unsigned long addr,
-        * up to the caller to provide sane values here, otherwise userspace
-        * tools which use this vector might be unhappy.
-        */
--      unsigned long user_auxv[AT_VECTOR_SIZE];
-+      unsigned long user_auxv[AT_VECTOR_SIZE] = {};
-       if (len > sizeof(user_auxv))
-               return -EINVAL;
--- 
-2.30.1
-
index b290806f724a2c7432ee992bf88de5b1ab8cdd79..2e20370c1f0f929220ede496bc56e71eb2e821ec 100644 (file)
@@ -61,7 +61,6 @@ sh_eth-fix-trscer-mask-for-r7s72100.patch
 nfsv4.2-fix-return-value-of-_nfs4_get_security_label.patch
 block-rsxx-fix-error-return-code-of-rsxx_pci_probe.patch
 configfs-fix-a-use-after-free-in-__configfs_open_fil.patch
-prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
 alpha-add-src-rather-than-obj-to-make-source-file-path.patch
 alpha-merge-build-rules-of-division-routines.patch
 alpha-make-short-build-log-available-for-division-routines.patch
diff --git a/queue-5.10/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch b/queue-5.10/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
deleted file mode 100644 (file)
index 1f0fbac..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-From c82294f7036c82b48b3fe96460ae73a437474eb2 Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Sun, 14 Mar 2021 23:51:14 +0300
-Subject: prctl: fix PR_SET_MM_AUXV kernel stack leak
-
-From: Alexey Dobriyan <adobriyan@gmail.com>
-
-[ Upstream commit c995f12ad8842dbf5cfed113fb52cdd083f5afd1 ]
-
-Doing a
-
-       prctl(PR_SET_MM, PR_SET_MM_AUXV, addr, 1);
-
-will copy 1 byte from userspace to (quite big) on-stack array
-and then stash everything to mm->saved_auxv.
-AT_NULL terminator will be inserted at the very end.
-
-/proc/*/auxv handler will find that AT_NULL terminator
-and copy original stack contents to userspace.
-
-This devious scheme requires CAP_SYS_RESOURCE.
-
-Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- kernel/sys.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/kernel/sys.c b/kernel/sys.c
-index a730c03ee607..2603280b97be 100644
---- a/kernel/sys.c
-+++ b/kernel/sys.c
-@@ -2079,7 +2079,7 @@ static int prctl_set_auxv(struct mm_struct *mm, unsigned long addr,
-        * up to the caller to provide sane values here, otherwise userspace
-        * tools which use this vector might be unhappy.
-        */
--      unsigned long user_auxv[AT_VECTOR_SIZE];
-+      unsigned long user_auxv[AT_VECTOR_SIZE] = {};
-       if (len > sizeof(user_auxv))
-               return -EINVAL;
--- 
-2.30.1
-
index 7b8a6e84e8e38222cb8f43e688671ec02b0d0e68..eabd67a4827b6baa41500d114cd26e31018f2e3e 100644 (file)
@@ -257,7 +257,6 @@ powerpc-64s-exception-clean-up-a-missed-srr-specifie.patch
 seqlock-lockdep-fix-seqcount_latch_init.patch
 stop_machine-mark-helpers-__always_inline.patch
 include-linux-sched-mm.h-use-rcu_dereference-in-in_v.patch
-prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
 zram-fix-return-value-on-writeback_store.patch
 linux-compiler-clang.h-define-have_builtin_bswap.patch
 sched-membarrier-fix-missing-local-execution-of-ipi_sync_rq_state.patch
diff --git a/queue-5.11/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch b/queue-5.11/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
deleted file mode 100644 (file)
index 0328e0a..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-From 4c2dea371361044b4b321e251f65fbaa9bda03ff Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Sun, 14 Mar 2021 23:51:14 +0300
-Subject: prctl: fix PR_SET_MM_AUXV kernel stack leak
-
-From: Alexey Dobriyan <adobriyan@gmail.com>
-
-[ Upstream commit c995f12ad8842dbf5cfed113fb52cdd083f5afd1 ]
-
-Doing a
-
-       prctl(PR_SET_MM, PR_SET_MM_AUXV, addr, 1);
-
-will copy 1 byte from userspace to (quite big) on-stack array
-and then stash everything to mm->saved_auxv.
-AT_NULL terminator will be inserted at the very end.
-
-/proc/*/auxv handler will find that AT_NULL terminator
-and copy original stack contents to userspace.
-
-This devious scheme requires CAP_SYS_RESOURCE.
-
-Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- kernel/sys.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/kernel/sys.c b/kernel/sys.c
-index 51f00fe20e4d..7cf21c947649 100644
---- a/kernel/sys.c
-+++ b/kernel/sys.c
-@@ -2080,7 +2080,7 @@ static int prctl_set_auxv(struct mm_struct *mm, unsigned long addr,
-        * up to the caller to provide sane values here, otherwise userspace
-        * tools which use this vector might be unhappy.
-        */
--      unsigned long user_auxv[AT_VECTOR_SIZE];
-+      unsigned long user_auxv[AT_VECTOR_SIZE] = {};
-       if (len > sizeof(user_auxv))
-               return -EINVAL;
--- 
-2.30.1
-
index fdc962fecc458d620f6a8afab02c61ba1901425e..b62895770c4e7059d37494c0541f2a93fd954bc0 100644 (file)
@@ -265,7 +265,6 @@ seqlock-lockdep-fix-seqcount_latch_init.patch
 memblock-fix-section-mismatch-warning.patch
 stop_machine-mark-helpers-__always_inline.patch
 include-linux-sched-mm.h-use-rcu_dereference-in-in_v.patch
-prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
 zram-fix-return-value-on-writeback_store.patch
 zram-fix-broken-page-writeback.patch
 linux-compiler-clang.h-define-have_builtin_bswap.patch
diff --git a/queue-5.4/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch b/queue-5.4/prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
deleted file mode 100644 (file)
index d59bef1..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-From 00ed686852c3c89957a82274bd1cae70422dc256 Mon Sep 17 00:00:00 2001
-From: Sasha Levin <sashal@kernel.org>
-Date: Sun, 14 Mar 2021 23:51:14 +0300
-Subject: prctl: fix PR_SET_MM_AUXV kernel stack leak
-
-From: Alexey Dobriyan <adobriyan@gmail.com>
-
-[ Upstream commit c995f12ad8842dbf5cfed113fb52cdd083f5afd1 ]
-
-Doing a
-
-       prctl(PR_SET_MM, PR_SET_MM_AUXV, addr, 1);
-
-will copy 1 byte from userspace to (quite big) on-stack array
-and then stash everything to mm->saved_auxv.
-AT_NULL terminator will be inserted at the very end.
-
-/proc/*/auxv handler will find that AT_NULL terminator
-and copy original stack contents to userspace.
-
-This devious scheme requires CAP_SYS_RESOURCE.
-
-Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Signed-off-by: Sasha Levin <sashal@kernel.org>
----
- kernel/sys.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/kernel/sys.c b/kernel/sys.c
-index 3459a5ce0da0..867ec3e003fd 100644
---- a/kernel/sys.c
-+++ b/kernel/sys.c
-@@ -2062,7 +2062,7 @@ static int prctl_set_auxv(struct mm_struct *mm, unsigned long addr,
-        * up to the caller to provide sane values here, otherwise userspace
-        * tools which use this vector might be unhappy.
-        */
--      unsigned long user_auxv[AT_VECTOR_SIZE];
-+      unsigned long user_auxv[AT_VECTOR_SIZE] = {};
-       if (len > sizeof(user_auxv))
-               return -EINVAL;
--- 
-2.30.1
-
index 9f547b6f5ef5984e59051708346371a3e80f4401..b4277a5b8ae12c9b89807fba5c298ae35218c4f6 100644 (file)
@@ -152,7 +152,6 @@ arm64-mm-use-a-48-bit-id-map-when-possible-on-52-bit.patch
 hrtimer-update-softirq_expires_next-correctly-after-.patch
 stop_machine-mark-helpers-__always_inline.patch
 include-linux-sched-mm.h-use-rcu_dereference-in-in_v.patch
-prctl-fix-pr_set_mm_auxv-kernel-stack-leak.patch
 zram-fix-return-value-on-writeback_store.patch
 sched-membarrier-fix-missing-local-execution-of-ipi_sync_rq_state.patch
 powerpc-64s-fix-instruction-encoding-for-lis-in-ppc_function_entry.patch