packages (LINUX_3_0): kernel/kernel-grsec_full.patch, kernel/kernel.spec -=?UTF-8?Q?=20?=...
baggins
baggins at pld-linux.org
Fri Apr 27 20:48:41 CEST 2012
Author: baggins Date: Fri Apr 27 18:48:41 2012 GMT
Module: packages Tag: LINUX_3_0
---- Log message:
- updated to 3.0.30
---- Files affected:
packages/kernel:
kernel-grsec_full.patch (1.85.2.11 -> 1.85.2.12) , kernel.spec (1.987.2.48 -> 1.987.2.49)
---- Diffs:
================================================================
Index: packages/kernel/kernel-grsec_full.patch
diff -u packages/kernel/kernel-grsec_full.patch:1.85.2.11 packages/kernel/kernel-grsec_full.patch:1.85.2.12
--- packages/kernel/kernel-grsec_full.patch:1.85.2.11 Fri Apr 13 20:51:39 2012
+++ packages/kernel/kernel-grsec_full.patch Fri Apr 27 20:48:32 2012
@@ -63352,14 +63352,6 @@
diff -urNp linux-3.0.9/kernel/futex.c linux-3.0.9/kernel/futex.c
--- linux-3.0.9/kernel/futex.c 2011-11-11 13:12:24.000000000 -0500
+++ linux-3.0.9/kernel/futex.c 2011-11-15 20:03:00.000000000 -0500
-@@ -54,6 +54,7 @@
- #include <linux/mount.h>
- #include <linux/pagemap.h>
- #include <linux/syscalls.h>
-+#include <linux/ptrace.h>
- #include <linux/signal.h>
- #include <linux/module.h>
- #include <linux/magic.h>
@@ -238,6 +239,11 @@ get_futex_key(u32 __user *uaddr, int fsh
struct page *page, *page_head;
int err, ro = 0;
@@ -63390,35 +63382,6 @@
if (!bitset)
return -EINVAL;
-@@ -2431,7 +2441,9 @@ SYSCALL_DEFINE3(get_robust_list, int, pi
- {
- struct robust_list_head __user *head;
- unsigned long ret;
-+#ifndef CONFIG_GRKERNSEC_PROC_MEMMAP
- const struct cred *cred = current_cred(), *pcred;
-+#endif
-
- if (!futex_cmpxchg_enabled)
- return -ENOSYS;
-@@ -2447,6 +2459,10 @@ SYSCALL_DEFINE3(get_robust_list, int, pi
- if (!p)
- goto err_unlock;
- ret = -EPERM;
-+#ifdef CONFIG_GRKERNSEC_PROC_MEMMAP
-+ if (!ptrace_may_access(p, PTRACE_MODE_READ))
-+ goto err_unlock;
-+#else
- pcred = __task_cred(p);
- /* If victim is in different user_ns, then uids are not
- comparable, so we must have CAP_SYS_PTRACE */
-@@ -2461,6 +2477,7 @@ SYSCALL_DEFINE3(get_robust_list, int, pi
- !ns_capable(pcred->user->user_ns, CAP_SYS_PTRACE))
- goto err_unlock;
- ok:
-+#endif
- head = p->robust_list;
- rcu_read_unlock();
- }
@@ -2712,6 +2729,7 @@ static int __init futex_init(void)
{
u32 curval;
@@ -63439,48 +63402,6 @@
for (i = 0; i < ARRAY_SIZE(futex_queues); i++) {
plist_head_init(&futex_queues[i].chain, &futex_queues[i].lock);
-diff -urNp linux-3.0.9/kernel/futex_compat.c linux-3.0.9/kernel/futex_compat.c
---- linux-3.0.9/kernel/futex_compat.c 2011-11-11 13:12:24.000000000 -0500
-+++ linux-3.0.9/kernel/futex_compat.c 2011-11-15 20:03:00.000000000 -0500
-@@ -10,6 +10,7 @@
- #include <linux/compat.h>
- #include <linux/nsproxy.h>
- #include <linux/futex.h>
-+#include <linux/ptrace.h>
-
- #include <asm/uaccess.h>
-
-@@ -136,7 +137,10 @@ compat_sys_get_robust_list(int pid, comp
- {
- struct compat_robust_list_head __user *head;
- unsigned long ret;
-- const struct cred *cred = current_cred(), *pcred;
-+#ifndef CONFIG_GRKERNSEC_PROC_MEMMAP
-+ const struct cred *cred = current_cred();
-+ const struct cred *pcred;
-+#endif
-
- if (!futex_cmpxchg_enabled)
- return -ENOSYS;
-@@ -152,6 +156,10 @@ compat_sys_get_robust_list(int pid, comp
- if (!p)
- goto err_unlock;
- ret = -EPERM;
-+#ifdef CONFIG_GRKERNSEC_PROC_MEMMAP
-+ if (!ptrace_may_access(p, PTRACE_MODE_READ))
-+ goto err_unlock;
-+#else
- pcred = __task_cred(p);
- /* If victim is in different user_ns, then uids are not
- comparable, so we must have CAP_SYS_PTRACE */
-@@ -166,6 +174,7 @@ compat_sys_get_robust_list(int pid, comp
- !ns_capable(pcred->user->user_ns, CAP_SYS_PTRACE))
- goto err_unlock;
- ok:
-+#endif
- head = p->compat_robust_list;
- rcu_read_unlock();
- }
diff -urNp linux-3.0.9/kernel/gcov/base.c linux-3.0.9/kernel/gcov/base.c
--- linux-3.0.9/kernel/gcov/base.c 2011-11-11 13:12:24.000000000 -0500
+++ linux-3.0.9/kernel/gcov/base.c 2011-11-15 20:03:00.000000000 -0500
@@ -75809,9 +75730,9 @@
--- linux-3.0.9/security/commoncap.c 2011-11-11 13:12:24.000000000 -0500
+++ linux-3.0.9/security/commoncap.c 2011-11-15 20:03:00.000000000 -0500
@@ -28,6 +28,7 @@
- #include <linux/prctl.h>
#include <linux/securebits.h>
#include <linux/user_namespace.h>
+ #include <linux/personality.h>
+#include <net/sock.h>
/*
================================================================
Index: packages/kernel/kernel.spec
diff -u packages/kernel/kernel.spec:1.987.2.48 packages/kernel/kernel.spec:1.987.2.49
--- packages/kernel/kernel.spec:1.987.2.48 Sat Apr 14 17:04:08 2012
+++ packages/kernel/kernel.spec Fri Apr 27 20:48:34 2012
@@ -94,7 +94,7 @@
%endif
%define basever 3.0
-%define postver .28
+%define postver .30
%define rel 1
%define _enable_debug_packages 0
@@ -141,7 +141,7 @@
# Source0-md5: ecf932280e2441bdd992423ef3d55f8f
%if "%{postver}" != ".0"
Patch0: http://www.kernel.org/pub/linux/kernel/v3.x/patch-%{version}.bz2
-# Patch0-md5: 7b16d3f5d2d57d23a42bb4f1f52bb9ac
+# Patch0-md5: e4ace768af0b736c3a9540b006ba67f9
%endif
Source3: kernel-autoconf.h
@@ -1556,6 +1556,9 @@
All persons listed below can be reached at <cvs_login>@pld-linux.org
$Log$
+Revision 1.987.2.49 2012/04/27 18:48:34 baggins
+- updated to 3.0.30
+
Revision 1.987.2.48 2012/04/14 15:04:08 baggins
- suggest dracut and build initramfs with it when present
================================================================
---- CVS-web:
http://cvs.pld-linux.org/packages/kernel/kernel-grsec_full.patch?r1=1.85.2.11&r2=1.85.2.12
http://cvs.pld-linux.org/packages/kernel/kernel.spec?r1=1.987.2.48&r2=1.987.2.49
More information about the pld-cvs-commit
mailing list