[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] Upgrade to linux patch 2.6.11.12
ChangeSet 1.1901, 2005/06/13 14:17:02+01:00, iap10@xxxxxxxxxxxxxxxxxxxxx Upgrade to linux patch 2.6.11.12 Signed-off-by: ian@xxxxxxxxxxxxx b/patches/linux-2.6.11/linux-2.6.11.12.patch | 1979 +++++++++++++++++++++++++++ patches/linux-2.6.11/linux-2.6.11.11.patch | 1944 -------------------------- 2 files changed, 1979 insertions(+), 1944 deletions(-) diff -Nru a/patches/linux-2.6.11/linux-2.6.11.11.patch b/patches/linux-2.6.11/linux-2.6.11.11.patch --- a/patches/linux-2.6.11/linux-2.6.11.11.patch 2005-06-17 21:05:02 -04:00 +++ /dev/null Wed Dec 31 16:00:00 196900 @@ -1,2304 +0,0 @@ -diff --git a/Documentation/SecurityBugs b/Documentation/SecurityBugs -new file mode 100644 ---- /dev/null -+++ b/Documentation/SecurityBugs -@@ -0,0 +1,38 @@ -+Linux kernel developers take security very seriously. As such, we'd -+like to know when a security bug is found so that it can be fixed and -+disclosed as quickly as possible. Please report security bugs to the -+Linux kernel security team. -+ -+1) Contact -+ -+The Linux kernel security team can be contacted by email at -+<security@xxxxxxxxxx>. This is a private list of security officers -+who will help verify the bug report and develop and release a fix. -+It is possible that the security team will bring in extra help from -+area maintainers to understand and fix the security vulnerability. -+ -+As it is with any bug, the more information provided the easier it -+will be to diagnose and fix. Please review the procedure outlined in -+REPORTING-BUGS if you are unclear about what information is helpful. -+Any exploit code is very helpful and will not be released without -+consent from the reporter unless it has already been made public. -+ -+2) Disclosure -+ -+The goal of the Linux kernel security team is to work with the -+bug submitter to bug resolution as well as disclosure. We prefer -+to fully disclose the bug as soon as possible. It is reasonable to -+delay disclosure when the bug or the fix is not yet fully understood, -+the solution is not well-tested or for vendor coordination. However, we -+expect these delays to be short, measurable in days, not weeks or months. -+A disclosure date is negotiated by the security team working with the -+bug submitter as well as vendors. However, the kernel security team -+holds the final say when setting a disclosure date. The timeframe for -+disclosure is from immediate (esp. if it's already publically known) -+to a few weeks. As a basic default policy, we expect report date to -+disclosure date to be on the order of 7 days. -+ -+3) Non-disclosure agreements -+ -+The Linux kernel security team is not a formal body and therefore unable -+to enter any non-disclosure agreements. -diff --git a/MAINTAINERS b/MAINTAINERS ---- a/MAINTAINERS -+++ b/MAINTAINERS -@@ -1966,6 +1966,11 @@ M: christer@xxxxxxxxxxx - W: http://www.weinigel.se - S: Supported - -+SECURITY CONTACT -+P: Security Officers -+M: security@xxxxxxxxxx -+S: Supported -+ - SELINUX SECURITY MODULE - P: Stephen Smalley - M: sds@xxxxxxxxxxxxxx -diff --git a/Makefile b/Makefile ---- a/Makefile -+++ b/Makefile -@@ -1,8 +1,8 @@ - VERSION = 2 - PATCHLEVEL = 6 - SUBLEVEL = 11 --EXTRAVERSION = --NAME=Woozy Numbat -+EXTRAVERSION = .11 -+NAME=Woozy Beaver - - # *DOCUMENTATION* - # To see a list of typical targets execute "make help" -diff --git a/REPORTING-BUGS b/REPORTING-BUGS ---- a/REPORTING-BUGS -+++ b/REPORTING-BUGS -@@ -16,6 +16,10 @@ code relevant to what you were doing. If - describe how to recreate it. That is worth even more than the oops itself. - The list of maintainers is in the MAINTAINERS file in this directory. - -+ If it is a security bug, please copy the Security Contact listed -+in the MAINTAINERS file. They can help coordinate bugfix and disclosure. -+See Documentation/SecurityBugs for more infomation. -+ - If you are totally stumped as to whom to send the report, send it to - linux-kernel@xxxxxxxxxxxxxxxx (For more information on the linux-kernel - mailing list see http://www.tux.org/lkml/). -diff --git a/arch/ia64/kernel/fsys.S b/arch/ia64/kernel/fsys.S ---- a/arch/ia64/kernel/fsys.S -+++ b/arch/ia64/kernel/fsys.S -@@ -611,8 +611,10 @@ GLOBAL_ENTRY(fsys_bubble_down) - movl r2=ia64_ret_from_syscall - ;; - mov rp=r2 // set the real return addr -- tbit.z p8,p0=r3,TIF_SYSCALL_TRACE -+ and r3=_TIF_SYSCALL_TRACEAUDIT,r3 - ;; -+ cmp.eq p8,p0=r3,r0 -+ - (p10) br.cond.spnt.many ia64_ret_from_syscall // p10==true means out registers are more than 8 - (p8) br.call.sptk.many b6=b6 // ignore this return addr - br.cond.sptk ia64_trace_syscall -diff --git a/arch/ia64/kernel/signal.c b/arch/ia64/kernel/signal.c ---- a/arch/ia64/kernel/signal.c -+++ b/arch/ia64/kernel/signal.c -@@ -224,7 +224,8 @@ ia64_rt_sigreturn (struct sigscratch *sc - * could be corrupted. - */ - retval = (long) &ia64_leave_kernel; -- if (test_thread_flag(TIF_SYSCALL_TRACE)) -+ if (test_thread_flag(TIF_SYSCALL_TRACE) -+ || test_thread_flag(TIF_SYSCALL_AUDIT)) - /* - * strace expects to be notified after sigreturn returns even though the - * context to which we return may not be in the middle of a syscall. -diff --git a/arch/ppc/oprofile/op_model_fsl_booke.c b/arch/ppc/oprofile/op_model_fsl_booke.c ---- a/arch/ppc/oprofile/op_model_fsl_booke.c -+++ b/arch/ppc/oprofile/op_model_fsl_booke.c -@@ -150,7 +150,6 @@ static void fsl_booke_handle_interrupt(s - int is_kernel; - int val; - int i; -- unsigned int cpu = smp_processor_id(); - - /* set the PMM bit (see comment below) */ - mtmsr(mfmsr() | MSR_PMM); -@@ -162,7 +161,7 @@ static void fsl_booke_handle_interrupt(s - val = ctr_read(i); - if (val < 0) { - if (oprofile_running && ctr[i].enabled) { -- oprofile_add_sample(pc, is_kernel, i, cpu); -+ oprofile_add_pc(pc, is_kernel, i); - ctr_write(i, reset_value[i]); - } else { - ctr_write(i, 0); -diff --git a/arch/ppc/platforms/4xx/ebony.h b/arch/ppc/platforms/4xx/ebony.h ---- a/arch/ppc/platforms/4xx/ebony.h -+++ b/arch/ppc/platforms/4xx/ebony.h -@@ -61,8 +61,8 @@ - */ - - /* OpenBIOS defined UART mappings, used before early_serial_setup */ --#define UART0_IO_BASE (u8 *) 0xE0000200 --#define UART1_IO_BASE (u8 *) 0xE0000300 -+#define UART0_IO_BASE 0xE0000200 -+#define UART1_IO_BASE 0xE0000300 - - /* external Epson SG-615P */ - #define BASE_BAUD 691200 -diff --git a/arch/ppc/platforms/4xx/luan.h b/arch/ppc/platforms/4xx/luan.h ---- a/arch/ppc/platforms/4xx/luan.h -+++ b/arch/ppc/platforms/4xx/luan.h -@@ -47,9 +47,9 @@ - #define RS_TABLE_SIZE 3 - - /* PIBS defined UART mappings, used before early_serial_setup */ --#define UART0_IO_BASE (u8 *) 0xa0000200 --#define UART1_IO_BASE (u8 *) 0xa0000300 --#define UART2_IO_BASE (u8 *) 0xa0000600 -+#define UART0_IO_BASE 0xa0000200 -+#define UART1_IO_BASE 0xa0000300 -+#define UART2_IO_BASE 0xa0000600 - - #define BASE_BAUD 11059200 - #define STD_UART_OP(num) \ -diff --git a/arch/ppc/platforms/4xx/ocotea.h b/arch/ppc/platforms/4xx/ocotea.h ---- a/arch/ppc/platforms/4xx/ocotea.h -+++ b/arch/ppc/platforms/4xx/ocotea.h -@@ -56,8 +56,8 @@ - #define RS_TABLE_SIZE 2 - - /* OpenBIOS defined UART mappings, used before early_serial_setup */ --#define UART0_IO_BASE (u8 *) 0xE0000200 --#define UART1_IO_BASE (u8 *) 0xE0000300 -+#define UART0_IO_BASE 0xE0000200 -+#define UART1_IO_BASE 0xE0000300 - - #define BASE_BAUD 11059200/16 - #define STD_UART_OP(num) \ -diff --git a/arch/ppc64/kernel/pSeries_iommu.c b/arch/ppc64/kernel/pSeries_iommu.c ---- a/arch/ppc64/kernel/pSeries_iommu.c -+++ b/arch/ppc64/kernel/pSeries_iommu.c -@@ -401,6 +401,8 @@ static void iommu_bus_setup_pSeriesLP(st - struct device_node *dn, *pdn; - unsigned int *dma_window = NULL; - -+ DBG("iommu_bus_setup_pSeriesLP, bus %p, bus->self %p\n", bus, bus->self); -+ - dn = pci_bus_to_OF_node(bus); - - /* Find nearest ibm,dma-window, walking up the device tree */ -@@ -455,6 +457,56 @@ static void iommu_dev_setup_pSeries(stru - } - } - -+static void iommu_dev_setup_pSeriesLP(struct pci_dev *dev) -+{ -+ struct device_node *pdn, *dn; -+ struct iommu_table *tbl; -+ int *dma_window = NULL; -+ -+ DBG("iommu_dev_setup_pSeriesLP, dev %p (%s)\n", dev, dev->pretty_name); -+ -+ /* dev setup for LPAR is a little tricky, since the device tree might -+ * contain the dma-window properties per-device and not neccesarily -+ * for the bus. So we need to search upwards in the tree until we -+ * either hit a dma-window property, OR find a parent with a table -+ * already allocated. -+ */ -+ dn = pci_device_to_OF_node(dev); -+ -+ for (pdn = dn; pdn && !pdn->iommu_table; pdn = pdn->parent) { -+ dma_window = (unsigned int *)get_property(pdn, "ibm,dma-window", NULL); -+ if (dma_window) -+ break; -+ } -+ -+ /* Check for parent == NULL so we don't try to setup the empty EADS -+ * slots on POWER4 machines. -+ */ -+ if (dma_window == NULL || pdn->parent == NULL) { -+ /* Fall back to regular (non-LPAR) dev setup */ -+ DBG("No dma window for device, falling back to regular setup\n"); -+ iommu_dev_setup_pSeries(dev); -+ return; -+ } else { -+ DBG("Found DMA window, allocating table\n"); -+ } -+ -+ if (!pdn->iommu_table) { -+ /* iommu_table_setparms_lpar needs bussubno. */ -+ pdn->bussubno = pdn->phb->bus->number; -+ -+ tbl = (struct iommu_table *)kmalloc(sizeof(struct iommu_table), -+ GFP_KERNEL); -+ -+ iommu_table_setparms_lpar(pdn->phb, pdn, tbl, dma_window); -+ -+ pdn->iommu_table = iommu_init_table(tbl); -+ } -+ -+ if (pdn != dn) -+ dn->iommu_table = pdn->iommu_table; -+} -+ - static void iommu_bus_setup_null(struct pci_bus *b) { } - static void iommu_dev_setup_null(struct pci_dev *d) { } _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |