Вилли Торрэу (Willy Tarreau) объявил сегодня в LKML о создании новой ветки патчей для ядер Linux 2.4.x. Как отмечает создатель ветки, между релизами новых стабильных версий ядра Linux 2.4 проходит несколько месяцев, в то время как некоторые исправления востребованы многими пользователями.
Помогать Вилли в поддержаннии ветки -hf будет Марсело Тосатти, который сейчас поддерживает основную ветку 2.4. Включаемые в ветку патчи, а они будут браться из основного BitKeeper репозитория, делятся на шесть категорий - исправления в безопасности, исправления критических ошибок, исправления серьезных ошибок, исправления мелких ошибок, исправления процесса сборки и исправления в документации. Вилли отметил, что он будет избегать включения в ветку изменений в драйверах.
Судя по тому, что он также упомянул, что diff между этой веткой и следующей версии официальной ветки будет меньше, чем между двумя версиями официальной ветки, будет выпускаться и такой финальный патч для -hf конкретной версии ядра.
Сами патчи доступны в двух версиях - с изменениями в Makefile (для тех, кому действительно необходимо видеть точную версию ядра) и без них (для тех, кто будет применять еще какие-либо внешние патчи и не хочет получать лишних отказов в этом процессе. Также можно скачать тарбол со всеми включенными патчами в раздельном виде.
Версия 2.4.29-hf2 вышла уже несколько дней назад, Вилли улаживал проблемы с переносом сайта к своему работодателю, и теперь он, вместе с патчами во всех видах доступен здесь: http://linux.exosec.net/kernel/2.4-hf/
Далее идет подробное содержимое патча 2.4.29-hf2:
1) Security fixes ================= + flash_erase-checks-cap_sys_admin-1 (James Nelson)
This patch adds CAP_SYS_ADMIN checks to the potentially dangerous ioctls FLASH_Erase and FLASH_Burn in the Cobalt LCD interface driver.
+ rw_verify_area-against-file-offset-overflow-2 (Linus Torvalds)
backport 2.6 rw_verify_area() to check against file offset overflows - Make generic rw_verify_area check against file offset overflows. - Add 'f_maxcount' to allow filesystems to set a per-file maximum IO size. - Rename "locks_verify_area()" to "rw_verify_area()" and clean up the arguments.
+ rw_verify_area-missing-f_maxcount-1 (Solar Designer)
+ wireless-data-leak-1 (Chris Wright)
There is a potential leak of kernel data to user space in private handler handling. Few drivers use that feature, there is no risk of crash or direct attack, so I would not worry about it.
2) Critical fixes ================= + panic-when-backing-up-lvm-snapshots-1 (Heinz J. Mauelshagen)
This patch fixes lvm-snap.c in order to avoid a list update on the snapshot exception hash happening while only holding a read lock as documented in Red Hat bugzilla #135266.
3) Major bug fixes ================== + oops-ata_to_sense_error-1 (Jeff Garzik)
Fix an oops in ata_to_sense_error
+ lcd_ioctl-memory-leak-1 (James Nelson)
This patch fixes a memory leak in the FLASH_Burn ioctl for the Cobalt LCD interface driver.
+ pkt_sched-netem-leaks-memory-1 (Stephen Hemminger)
Good catch.. netem needs to free skb's that are dropped due to loss simulation.
+ netlink-fix-nlmsg_goodsize-calculation-1 (Thomas Graf)
NLMSG_GOODSIZE specifies a good default size for the skb tailroom used in netlink messages when the size is unknown at the time of the allocation. The current value doesn't make much sense anymore because skb_shared_info isn't taken into account which means that depending on the architecture NLMSG_GOOSIZE can exceed PAGE_SIZE resulting in a waste of almost a complete page. Using SKB_MAXORDER solves this potential leak at the cost of slightly smaller but safer sizes for some architectures. + proc-kcore-memory-corruption-1 (Ernie Petrides)
A fairly nasty memory corruption potential exists when /proc/kcore is accessed and there are at least 62 vmalloc'd areas. (...) The fix is already in 2.6.
4) Minor bug fixes ================== + ppc32-tlb-miss-handler-1 (Tom Rini / Joakim Tjernlund)
There is a problem in the TLB Miss (and Error, as they jump to the Miss handler) handlers. The problem is that when an app spans more than one L1 entry, we don't have all of the correct information, and do_page_fault() things a protection fault happened, when it didn't really. The fix for this is to modify the handlers slightly to force a TLB Error in this case.
+ rtnetlink-set-multi-flags-1 (Thomas Graf)
Set NLM_F_MULTI for neighbour rtnetlink messages to userspace.
+ hiddev-busy-loop-1 (David Micon)
In the loop, schedule() returns with the current state TASK_RUNNING, so at the next revolution it returns immediately, and the task sits there burning CPU.
+ msf-overflow-multisession-dvd-1 (Luca Tettamanti)
This a backport of my patch that went into 2.6.10. cdrom_read_toc (ide-cd.c) always reads the TOC using MSF format. If the last session of the disk starts beyond block 1152000 (LBA) there's an overflow in the MSF format and kernel complains:
Unable to identify CD-ROM format.
So read the multi-session TOC in LBA format in order to avoid an overflow in MSF format with multisession DVDs.
+ sparc64-signed-atomic-values-1 (David S. Miller / Hugh Daniels)
Even though we declare these functions as returning a 32-bit signed integer, the sparc64 ABI states that such functions must properly sign-extend the return value to the full 64-bits.
+ kfree_skb-missing-memory-barrier-1 (Herbert Xu)
The bug is that in the case where we do the atomic_read() optimization, we need to make sure that reads of skb state later in __kfree_skb() processing (particularly the skb->list BUG check) are not reordered to occur before the counter read by the cpu.
+ net-put-barriers-around-dst-refcnt-1 (Herbert Xu)
In light of the recent discussion about sk_buff, I think we need the following patch for dst_entry. This adds a memory barrier before dst_release drops the refcnt, and a read memory barrier before dst_destroy starts destroying the entry.
+ sparc64-atomic-and-bitops-fixes-1 (David S. Miller)
1) Correct memory barriers. Routines not returning a value need no memory barriers, however routines returning values do need them. 2) Actually implement non-atomic ext2 bitops.
+ sparc64-xchg-use-membars-1 (David S. Miller)
[SPARC64]: Add missing membars for xchg() and cmpxchg().
+ sparc64-locks-use-membars-1 (David S. Miller)
[SPARC64]: Add missing membars for xchg() and cmpxchg(). read_unlock should order all previous memory operations before the atomic counter update to drop the lock. The debugging version of write_unlock had a similar error.
+ ipconfig-use-memmove-not-strcpy-1 (Matthew Wilcox)
strcpy is undefined if src and dest overlap. That's clearly possible here with a sufficiently deep path on the server. Use memmove instead.
+ sparc64-mask-32bits-stack-ptr-1 (David S. Miller)
[SPARC64]: Mask off stack ptr in alloc_user_space() for 32-bit.
+ i386-pci-irq-displays-wrong-pin-1 (Mark Haigh)
[PATCH] arch/i386/kernel/pci-irq.c: Wrong message output I'd submitted a patch earlier for this file, fixing a warning. When I looked at it further, I noticed it can output an incorrect warning message under certain circumstances. I've confirmed that this can and does happen in the wild: (...) This patch also fixes the original warning:
+ lp_write-race-can-corrupt-data-1 (Kenneth Sumrall)
In lp_write(), copy_from_user() is called to copy data into a statically allocated kernel buffer before down_interruptible() is called. If a second thread of execution comes in between the copy_from_user() and the down_interruptible() calls, silent data corruption could result.
5) Build fixes ============== + configure-mangles-hex-values-1 (Nick Pollitt)
When doing a make oldconfig, the hex function strips the leading '0x' from hex values. The '0x' is needed in the final autoconf.h, and its absence causes the following problem.
+ sparc-membar-extra-semi-colons-1 (Willy Tarreau) + sparc64-membar-extra-semi-colons-1 (Willy Tarreau)
Recent addition of smp_rmb() in kfree_skb() broke sparc{,64} build.
6) Documentation fixes ====================== none yet.
|