Skip to content
AppUnix

Tag: kernel

Como adicionar uma flag no grub sem problemas no CentOS, Fedora ou RedHat?

18/06/2012 by little_oak

1
grubby --grub --args="pcie_aspm=off" --update-kernel=ALL

1
Use o comando acima para adicionar a flag pcie_aspm=off como instrução no Boot do seu Linux.

1
Depois de adicionar será necessário reiniciar o sistema.

1
Perceba que o ajuste também poderia ter sido feito manualmente, bastando apenas acrescentar

1
2
3
pcie_aspm=off no final da instrução de boot da imagem do kernel.
 
Abraços galera.

1
 

Continue Reading

Kernel 3.0.3 estável e recém lançado :P

18/08/2011 by little_oak

Olha aí, mais uma série 3.x do Kernel LINUX stable! Segue nota oficial (email oficial do release): From: Greg KH <gregkh@suse.de> To: linux-kernel@vger.kernel.org, Andrew Morton <akpm@linux-foundation.org>, torvalds@linux-foundation.org, stable@kernel.org Subject: Linux 3.0.3 Date: Wed, 17 Aug 2011 11:00:27 -0700 Message-ID: <20110817180027.GA16619@kroah.com>  

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
I'm announcing the release of the 3.0.3 kernel.
 
All users of the 3.0 kernel series must upgrade.
 
The updated 3.0.y git tree can be found at:
        git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-3.0.y.git
and can be browsed at the normal kernel.org git web browser:
        <a href="http://git.kernel.org/?p=linux/kernel/git/stable/linux-3.0.y.git;a=summary">http://git.kernel.org/?p=linux/kernel/git/stable/linux-3....</a>
 
thanks,
 
greg k-h
 
------------
 
Documentation/virtual/lguest/lguest.c      |    3 +++
Makefile                                   |    2 +-
drivers/gpu/drm/radeon/atombios_dp.c       |   12 ++++++++++++
drivers/gpu/drm/radeon/radeon_connectors.c |   16 +++++++++-------
drivers/gpu/drm/radeon/radeon_encoders.c   |    3 +++
drivers/gpu/drm/radeon/radeon_mode.h       |    1 +
drivers/hwmon/ibmaem.c                     |   15 ++++++++++-----
drivers/net/wireless/ath/ath5k/base.c      |   23 ++++++++++++++---------
drivers/staging/rtl8192u/r819xU_firmware.c |    9 +++------
drivers/usb/class/usbtmc.c                 |    2 +-
drivers/usb/core/config.c                  |   11 ++++++-----
drivers/usb/host/pci-quirks.c              |    2 +-
drivers/usb/host/xhci.c                    |   19 ++++++++++++++-----
drivers/usb/musb/musb_gadget.c             |    5 +++++
drivers/usb/serial/ftdi_sio.c              |    2 +-
drivers/usb/serial/option.c                |   12 ++++++++++++
drivers/usb/serial/qcserial.c              |    1 +
drivers/usb/storage/unusual_devs.h         |   10 ++++++++++
mm/vmalloc.c                               |    7 ++++---
net/atm/br2684.c                           |    2 --
sound/soc/samsung/jive_wm8750.c            |    2 +-
sound/soc/tegra/tegra_pcm.c                |    9 +++++++--
sound/soc/tegra/tegra_wm8903.c             |   15 +++++++++++----
sound/usb/caiaq/audio.c                    |    6 ++++--
tools/perf/util/config.c                   |    7 -------
25 files changed, 134 insertions(+), 62 deletions(-)
Alex Deucher (3):
      drm/radeon/kms: don't enable connectors that are off in the hotplug handler
      drm/radeon/kms: fix regression is handling &gt;2 heads on cedar/caicos
      drm/radeon/kms: don't try to be smart in the hpd handler
 
Andrew Bird (4):
      USB: option driver: add PID for Vodafone-Huawei K3770
      USB: option driver: add PID for Vodafone-Huawei K3771
      USB: option driver: add PID for Vodafone-Huawei K4510
      USB: option driver: add PID for Vodafone-Huawei K4511
 
Bob Copeland (1):
      ath5k: fix error handling in ath5k_beacon_send
 
Chas Williams (1):
      atm: br2864: sent packets truncated in VC routed mode
 
Clemens Ladisch (1):
      mm: fix wrong vmap address calculations with odd NR_CPUS values
 
Daniel Mack (1):
      ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc
 
Greg Kroah-Hartman (1):
      Linux 3.0.3
 
Ionut Nicu (1):
      USB: ftdi_sio: fix minor typo in get_ftdi_divisor
 
JiSheng Zhang (1):
      USB: xhci: fix OS want to own HC
 
John Stultz (1):
      usb: musb: fix oops on musb_gadget_pullup
 
Jonathan Nieder (1):
      perf tools: do not look at ./config for configuration
 
Julia Lawall (1):
      hwmon: (ibmaem) add missing kfree
 
Mark Brown (1):
      ASoC: Fix binding of WM8750 on Jive
 
Maxim Nikulin (1):
      USB: assign instead of equal in usbtmc.c
 
Nick Bowler (1):
      USB: usb-storage: unusual_devs entry for ARM V2M motherboard.
 
Rusty Russell (1):
      lguest: allow booting guest with CONFIG_RELOCATABLE=y
 
Sarah Sharp (1):
      xhci: Don't submit commands or URBs to halted hosts.
 
Sebastian Andrzej Siewior (1):
      usb/config: use proper endian access for wMaxPacketSize
 
Stefan Lippers-Hollmann (1):
      staging: rtl8192u: declare MODULE_FIRMWARE
 
Stephen Warren (2):
      ASoC: Tegra: tegra_pcm_deallocate_dma_buffer: Don't OOPS
      ASoC: Tegra: wm8903 machine driver: Allow re-insertion of module
 
Vijay Chavan (1):
      USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G

Continue Reading

Microsoft contribuiu com o Kernel 3 (acredito ou não, ela está se envolvendo com Software livre)

18/07/2011 by little_oak

Segundo noticiou o portal Notícias Linux (http://www.noticiaslinux.com.br) A Microsoft está se tornando uma “commiter” do Kernel Linux 3.   A notícia segue abaixo:   Microsoft contribui com diversas alterações para o Linux kernel 3.0 As 343 mudanças feitas pelo desenvolvedor K. Y. Srinivasan, da Microsoft, o colocam no topo da lista, criada pelo LWN.net, de …

Continue Reading

Kernel prepatch 3.0-rc5

28/06/2011 by little_oak

A correria está muito intensa em cima do release do Kernel 3. Muito se fala que será preservado todo o legado e não haverão mudanças tão impactantes, simplesmente muitas melhorias, este é o foco. Mas convenhamos, os caras estão trabalhando demais, basta conferir o changelog e perceber que já temos em testing o release candidate …

Continue Reading

Stable kernel 2.6.34.10

28/06/2011 by little_oak

Lançado kernel 2.6.34.10 estável. Para conferir parte das notas de lançamento:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
commit 0eafe6686c56b91d436265c9098e72a1f8ab4f19
Author: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
Date:   Sun Jun 26 12:47:42 2011 -0400
 
    Linux 2.6.34.10
 
commit 83264a0f19be3fe69f5c9048210bb39402fb57db
Author: Al Viro &lt;viro@ftp.linux.org.uk&gt;
Date:   Tue Sep 28 18:50:27 2010 +0100
 
    MIPS: secure_computing, syscall audit: syscall number should in r2, not r0.
 
    commit e5b377a8fb7b05f27647698ac739a0504cb2bf80 upstream.
 
    As it is, audit_syscall_entry() and secure_computing() get the
    bogus value (0, in fact)
 
    Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
    Cc: linux-kernel@vger.kernel.org
    Cc: linux-arch@vger.kernel.org
    Cc: linux-mips@linux-mips.org
    Patchwork: https://patchwork.linux-mips.org/patch/1697/
    Signed-off-by: Ralf Baechle &lt;ralf@linux-mips.org&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 48adbc4b330cefb3b77111e47c17e833404893ef
Author: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Date:   Thu Oct 28 15:40:55 2010 +0000
 
    net: fix rds_iovec page count overflow
 
    commit 1b1f693d7ad6d193862dcb1118540a030c5e761f upstream.
 
    As reported by Thomas Pollet, the rdma page counting can overflow.  We
    get the rdma sizes in 64-bit unsigned entities, but then limit it to
    UINT_MAX bytes and shift them down to pages (so with a possible "+1" for
    an unaligned address).
 
    So each individual page count fits comfortably in an 'unsigned int' (not
    even close to overflowing into signed), but as they are added up, they
    might end up resulting in a signed return value. Which would be wrong.
 
    Catch the case of tot_pages turning negative, and return the appropriate
    error code.
 
    [PG: In 34, var names are slightly different, 1b1f6's tot_pages is
     34's nr_pages, and 1b1f6's nr_pages is 34's nr; so map accordingly.]
 
    Reported-by: Thomas Pollet &lt;thomas.pollet@gmail.com&gt;
    Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
    Signed-off-by: Andy Grover &lt;andy.grover@oracle.com&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit e0843d17d6d9997f23534f1ffe9dafb0d5912636
Author: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Date:   Thu Mar 17 01:40:10 2011 +0000
 
    econet: 4 byte infoleak to the network
 
    commit 67c5c6cb8129c595f21e88254a3fc6b3b841ae8e upstream.
 
    struct aunhdr has 4 padding bytes between 'pad' and 'handle' fields on
    x86_64.  These bytes are not initialized in the variable 'ah' before
    sending 'ah' to the network.  This leads to 4 bytes kernel stack
    infoleak.
 
    This bug was introduced before the git epoch.
 
    Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
    Acked-by: Phil Blundell &lt;philb@gnu.org&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 3e3b57978a0e1140d91f09d3a4197b6411b18f12
Author: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Date:   Tue Mar 15 13:37:13 2011 +0100
 
    ipv6: netfilter: ip6_tables: fix infoleak to userspace
 
    commit 6a8ab060779779de8aea92ce3337ca348f973f54 upstream.
 
    Structures ip6t_replace, compat_ip6t_replace, and xt_get_revision are
    copied from userspace.  Fields of these structs that are
    zero-terminated strings are not checked.  When they are used as argument
    to a format string containing "%s" in request_module(), some sensitive
    information is leaked to userspace via argument of spawned modprobe
    process.
 
    The first bug was introduced before the git epoch;  the second was
    introduced in 3bc3fe5e (v2.6.25-rc1);  the third is introduced by
    6b7d31fc (v2.6.15-rc1).  To trigger the bug one should have
    CAP_NET_ADMIN.
 
    Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
    Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 1d9064bb2d8f0ea26a67b2ce74c6d1d461dcfe7d
Author: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Date:   Tue Mar 15 13:36:05 2011 +0100
 
    netfilter: ip_tables: fix infoleak to userspace
 
    commit 78b79876761b86653df89c48a7010b5cbd41a84a upstream.
 
    Structures ipt_replace, compat_ipt_replace, and xt_get_revision are
    copied from userspace.  Fields of these structs that are
    zero-terminated strings are not checked.  When they are used as argument
    to a format string containing "%s" in request_module(), some sensitive
    information is leaked to userspace via argument of spawned modprobe
    process.
 
    The first and the third bugs were introduced before the git epoch; the
    second was introduced in 2722971c (v2.6.17-rc1).  To trigger the bug
    one should have CAP_NET_ADMIN.
 
    Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
    Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit f1f486501fa9b401c762b2355a238cf9e7f18385
Author: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Date:   Tue Mar 15 13:35:21 2011 +0100
 
    netfilter: arp_tables: fix infoleak to userspace
 
    commit 42eab94fff18cb1091d3501cd284d6bd6cc9c143 upstream.
 
    Structures ipt_replace, compat_ipt_replace, and xt_get_revision are
    copied from userspace.  Fields of these structs that are
    zero-terminated strings are not checked.  When they are used as argument
    to a format string containing "%s" in request_module(), some sensitive
    information is leaked to userspace via argument of spawned modprobe
    process.
 
    The first bug was introduced before the git epoch;  the second is
    introduced by 6b7d31fc (v2.6.15-rc1);  the third is introduced by
    6b7d31fc (v2.6.15-rc1).  To trigger the bug one should have
    CAP_NET_ADMIN.
 
    Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
    Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 41c6364db6028e2776250be12961b30f4a2ffbf9
Author: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Date:   Mon Feb 14 16:49:23 2011 +0100
 
    bridge: netfilter: fix information leak
 
    commit d846f71195d57b0bbb143382647c2c6638b04c5a upstream.
 
    Struct tmp is copied from userspace.  It is not checked whether the "name"
    field is NULL terminated.  This may lead to buffer overflow and passing
    contents of kernel stack as a module name to try_then_request_module() and,
    consequently, to modprobe commandline.  It would be seen by all userspace
    processes.
 
    Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
    Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 26b6a59e8b70435996c86f705dfb7f66124f5b1e
Author: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Date:   Mon Feb 14 13:54:31 2011 +0300
 
    Bluetooth: bnep: fix buffer overflow
 
    commit 43629f8f5ea32a998d06d1bb41eefa0e821ff573 upstream.
 
    Struct ca is copied from userspace.  It is not checked whether the "device"
    field is NULL terminated.  This potentially leads to BUG() inside of
    alloc_netdev_mqs() and/or information leak by creating a device with a name
    made of contents of kernel stack.
 
    Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
    Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit f8107dd119c9fd62aa0a3d3eb55d67bdd84b8036
Author: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Date:   Mon Feb 14 13:54:26 2011 +0300
 
    Bluetooth: sco: fix information leak to userspace
 
    commit c4c896e1471aec3b004a693c689f60be3b17ac86 upstream.
 
    struct sco_conninfo has one padding byte in the end.  Local variable
    cinfo of type sco_conninfo is copied to userspace with this uninizialized
    one byte, leading to old stack contents leak.
 
    Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
    Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 973800f01aa1ab2bf5b8a412af07fc2cc568c783
Author: Alex Elder &lt;aelder@sgi.com&gt;
Date:   Tue Mar 1 17:50:00 2011 +0000
 
    xfs: zero proper structure size for geometry calls
 
    commit af24ee9ea8d532e16883251a6684dfa1be8eec29 upstream.
 
    Commit 493f3358cb289ccf716c5a14fa5bb52ab75943e5 added this call to
    xfs_fs_geometry() in order to avoid passing kernel stack data back
    to user space:
 
    +       memset(geo, 0, sizeof(*geo));
 
    Unfortunately, one of the callers of that function passes the
    address of a smaller data type, cast to fit the type that
    xfs_fs_geometry() requires.  As a result, this can happen:
 
    Kernel panic - not syncing: stack-protector: Kernel stack is corrupted
    in: f87aca93
 
    Pid: 262, comm: xfs_fsr Not tainted 2.6.38-rc6-493f3358cb2+ #1
    Call Trace:
 
    [&lt;c12991ac&gt;] ? panic+0x50/0x150
    [&lt;c102ed71&gt;] ? __stack_chk_fail+0x10/0x18
    [&lt;f87aca93&gt;] ? xfs_ioc_fsgeometry_v1+0x56/0x5d [xfs]
 
    Fix this by fixing that one caller to pass the right type and then
    copy out the subset it is interested in.
 
    Note: This patch is an alternative to one originally proposed by
    Eric Sandeen.
 
    Reported-by: Jeffrey Hundstad &lt;jeffrey.hundstad@mnsu.edu&gt;
    Signed-off-by: Alex Elder &lt;aelder@sgi.com&gt;
    Reviewed-by: Eric Sandeen &lt;sandeen@redhat.com&gt;
    Tested-by: Jeffrey Hundstad &lt;jeffrey.hundstad@mnsu.edu&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 5658d0e0d4830af95fcde40bc7c6db2dec8ebddf
Author: Dan Rosenberg &lt;drosenberg@vsecurity.com&gt;
Date:   Mon Feb 14 13:45:28 2011 +0000
 
    xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1
 
    commit 3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba upstream.
 
    The FSGEOMETRY_V1 ioctl (and its compat equivalent) calls out to
    xfs_fs_geometry() with a version number of 3.  This code path does not
    fill in the logsunit member of the passed xfs_fsop_geom_t, leading to
    the leaking of four bytes of uninitialized stack data to potentially
    unprivileged callers.
 
    v2 switches to memset() to avoid future issues if structure members
    change, on suggestion of Dave Chinner.
 
    Signed-off-by: Dan Rosenberg &lt;drosenberg@vsecurity.com&gt;
    Reviewed-by: Eugene Teo &lt;eugeneteo@kernel.org&gt;
    Signed-off-by: Alex Elder &lt;aelder@sgi.com&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 11c66be05f49f70a635a6eb63e6cffea520b22c5
Author: Dan Rosenberg &lt;drosenberg@vsecurity.com&gt;
Date:   Sun Dec 26 06:54:53 2010 +0000
 
    CAN: Use inode instead of kernel address for /proc file
 
    commit 9f260e0efa4766e56d0ac14f1aeea6ee5eb8fe83 upstream.
 
    Since the socket address is just being used as a unique identifier, its
    inode number is an alternative that does not leak potentially sensitive
    information.
 
    CC-ing stable because MITRE has assigned CVE-2010-4565 to the issue.
 
    Signed-off-by: Dan Rosenberg &lt;drosenberg@vsecurity.com&gt;
    Acked-by: Oliver Hartkopp &lt;socketcan@hartkopp.net&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 5cf8a08026f539f396a3170d1991d651ee0fb30c
Author: Dan Rosenberg &lt;drosenberg@vsecurity.com&gt;
Date:   Wed Dec 22 13:58:27 2010 +0000
 
    irda: prevent integer underflow in IRLMP_ENUMDEVICES
 
    commit fdac1e0697356ac212259f2147aa60c72e334861 upstream.
 
    If the user-provided len is less than the expected offset, the
    IRLMP_ENUMDEVICES getsockopt will do a copy_to_user() with a very large
    size value.  While this isn't be a security issue on x86 because it will
    get caught by the access_ok() check, it may leak large amounts of kernel
    heap on other architectures.  In any event, this patch fixes it.
 
    Signed-off-by: Dan Rosenberg &lt;drosenberg@vsecurity.com&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 32e92da012e081ce4f741974761e92b215ff58b5
Author: Nelson Elhage &lt;nelhage@ksplice.com&gt;
Date:   Wed Nov 3 16:35:40 2010 +0000
 
    netlink: Make nlmsg_find_attr take a const nlmsghdr*.
 
    commit 6b8c92ba07287578718335ce409de8e8d7217e40 upstream.
 
    This will let us use it on a nlmsghdr stored inside a netlink_callback.
 
    Signed-off-by: Nelson Elhage &lt;nelhage@ksplice.com&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 02e6f1ee075a325dc9079b3dc143d898e924ce64
Author: Nelson Elhage &lt;nelhage@ksplice.com&gt;
Date:   Wed Nov 3 16:35:41 2010 +0000
 
    inet_diag: Make sure we actually run the same bytecode we audited.
 
    commit 22e76c849d505d87c5ecf3d3e6742a65f0ff4860 upstream.
 
    We were using nlmsg_find_attr() to look up the bytecode by attribute when
    auditing, but then just using the first attribute when actually running
    bytecode. So, if we received a message with two attribute elements, where only
    the second had type INET_DIAG_REQ_BYTECODE, we would validate and run different
    bytecode strings.
 
    Fix this by consistently using nlmsg_find_attr everywhere.
 
    Signed-off-by: Nelson Elhage &lt;nelhage@ksplice.com&gt;
    Signed-off-by: Thomas Graf &lt;tgraf@infradead.org&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit ddfd87424bef1dc8b2930acae2311b286ab9de12
Author: Kulikov Vasiliy &lt;segooon@gmail.com&gt;
Date:   Sun Oct 31 07:10:32 2010 +0000
 
    net: tipc: fix information leak to userland
 
    commit 88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52 upstream.
 
    Structure sockaddr_tipc is copied to userland with padding bytes after
    "id" field in union field "name" unitialized.  It leads to leaking of
    contents of kernel stack memory.  We have to initialize them to zero.
 
    Signed-off-by: Vasiliy Kulikov &lt;segooon@gmail.com&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 262b3d2e9f111516bf5cc1211f9128180e0329ef
Author: Vasiliy Kulikov &lt;segooon@gmail.com&gt;
Date:   Wed Nov 10 10:14:33 2010 -0800
 
    net: ax25: fix information leak to userland
 
    commit fe10ae53384e48c51996941b7720ee16995cbcb7 upstream.
 
    Sometimes ax25_getname() doesn't initialize all members of fsa_digipeater
    field of fsa struct, also the struct has padding bytes between
    sax25_call and sax25_ndigis fields.  This structure is then copied to
    userland.  It leads to leaking of contents of kernel stack memory.
 
    Signed-off-by: Vasiliy Kulikov &lt;segooon@gmail.com&gt;
    Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 44a214c1611386aa49ce86c70ebcddcad8a7a3f0
Author: Stuart Hayes &lt;stuart_hayes@yahoo.com&gt;
Date:   Wed Mar 2 13:42:05 2011 +0100
 
    dcdbas: force SMI to happen when expected
 
    commit dd65c736d1b5312c80c88a64bf521db4959eded5 upstream.
 
    The dcdbas driver can do an I/O write to cause a SMI to occur.  The SMI handler
    looks at certain registers and memory locations, so the SMI needs to happen
    immediately.  On some systems I/O writes are posted, though, causing the SMI to
    happen well after the "outb" occurred, which causes random failures.  Following
    the "outb" with an "inb" forces the write to go through even if it is posted.
 
    Signed-off-by: Stuart Hayes &lt;stuart_hayes@yahoo.com&gt;
    Acked-by: Doug Warzecha &lt;douglas_warzecha@dell.com&gt;
    Signed-off-by: Jiri Kosina &lt;jkosina@suse.cz&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit e4b2f0cae9c5cd1d5a0959ee529e6a6fee620c5c
Author: Josef Bacik &lt;josef@redhat.com&gt;
Date:   Thu Nov 18 20:52:55 2010 -0500
 
    fs: call security_d_instantiate in d_obtain_alias V2
 
    commit 24ff6663ccfdaf088dfa7acae489cb11ed4f43c4 upstream
 
    While trying to track down some NFS problems with BTRFS, I kept noticing I was
    getting -EACCESS for no apparent reason.  Eric Paris and printk() helped me
    figure out that it was SELinux that was giving me grief, with the following
    denial
 
    type=AVC msg=audit(1290013638.413:95): avc:  denied  { 0x800000 } for  pid=1772
    comm="nfsd" name="" dev=sda1 ino=256 scontext=system_u:system_r:kernel_t:s0
    tcontext=system_u:object_r:unlabeled_t:s0 tclass=file
 
    Turns out this is because in d_obtain_alias if we can't find an alias we create
    one and do all the normal instantiation stuff, but we don't do the
    security_d_instantiate.
 
    Usually we are protected from getting a hashed dentry that hasn't yet run
    security_d_instantiate() by the parent's i_mutex, but obviously this isn't an
    option there, so in order to deal with the case that a second thread comes in
    and finds our new dentry before we get to run security_d_instantiate(), we go
    ahead and call it if we find a dentry already.  Eric assures me that this is ok
    as the code checks to see if the dentry has been initialized already so calling
    security_d_instantiate() against the same dentry multiple times is ok.  With
    this patch I'm no longer getting errant -EACCESS values.
 
    Signed-off-by: Josef Bacik &lt;josef@redhat.com&gt;
    Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
commit 0ec63bc8c16763ab565ab97d39f10eb9a6ab9125
Author: Robin Holt &lt;holt@sgi.com&gt;
Date:   Wed Jan 12 17:00:01 2011 -0800
 
    epoll: convert max_user_watches to long
 
    commit 52bd19f7691b2ea6433aef0ef94c08c57efd7e79 upstream.
 
    On a 16TB machine, max_user_watches has an integer overflow.  Convert it
    to use a long and handle the associated fallout.
 
    Signed-off-by: Robin Holt &lt;holt@sgi.com&gt;
    Cc: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
    Acked-by: Davide Libenzi &lt;davidel@xmailserver.org&gt;
    Cc: Pekka Enberg &lt;penberg@cs.helsinki.fi&gt;
    Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
    Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
    Signed-off-by: Paul Gortmaker &lt;paul.gortmaker@windriver.com&gt;
 
O resto pode ser visto em: <a href="http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.34/ChangeLog-2.6.34.10">http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.34/ChangeLog-2.6.34.10</a>

Continue Reading

Kernel 2.6.39 é lançado

20/05/2011 by Shell

Linus Torvalds anunciou a disponibilidade do kernel 2.6.39, apesar dele estar em incerto se um outro RC teria sido uma opção melhor. “Entretanto, já que estarei na LinuxCon Japão em duas semanas, a escolha pra mim acabou sendo se eu deveria simplesmente lançar, ou arrastar por mais 3 semanas, ou ter uma janela de merge …

Continue Reading

Stable kernel 2.6.38.3 estável!

15/04/2011 by little_oak

Foi lançado recentemente o stable do kernel 2.6.38.3. Além de uma lista de correções você encontrará no link abaixo as principais novidades do mesmo: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.3

Continue Reading

Pesquisa

Categorias

  • Blog
  • cPanel
  • How Tos
  • Linux
  • Mac Os
  • MySQL
  • Wordpress

#Apoiadores

Patrocinador

Registre-se e ganhe $25



© 2021 AppUnix | Protegido Por MxGuardDoG