[kernel] r12590 - in dists/sid/linux-2.6/debian: . patches/bugfix/all/CVE-2009-0029 patches/features/all/openvz patches/features/all/vserver patches/features/all/xen patches/series

Dann Frazier dannf at alioth.debian.org
Wed Jan 21 21:27:49 UTC 2009


Author: dannf
Date: Wed Jan 21 21:27:47 2009
New Revision: 12590

Log:
merge in CVE-2009-0029 patches

Added:
   dists/sid/linux-2.6/debian/patches/bugfix/all/CVE-2009-0029/
      - copied from r12589, /people/dannf/sid+CVE-2009-0029/debian/patches/bugfix/all/CVE-2009-0029/
Modified:
   dists/sid/linux-2.6/debian/changelog
   dists/sid/linux-2.6/debian/patches/features/all/openvz/openvz.patch
   dists/sid/linux-2.6/debian/patches/features/all/vserver/vs2.3.0.35.patch
   dists/sid/linux-2.6/debian/patches/features/all/xen/suse-20080808143035.patch
   dists/sid/linux-2.6/debian/patches/series/14

Modified: dists/sid/linux-2.6/debian/changelog
==============================================================================
--- dists/sid/linux-2.6/debian/changelog	(original)
+++ dists/sid/linux-2.6/debian/changelog	Wed Jan 21 21:27:47 2009
@@ -5,8 +5,10 @@
 
   [ dann frazier ]
   * sctp: fix memory overflow (CVE-2009-0065)
+  * Fix sign-extend ABI issue w/ system calls on various 64-bit architectures
+    (CVE-2009-0029)
 
- -- dann frazier <dannf at debian.org>  Sat, 10 Jan 2009 16:06:04 -0700
+ -- dann frazier <dannf at debian.org>  Mon, 19 Jan 2009 13:11:06 -0700
 
 linux-2.6 (2.6.26-13) unstable; urgency=high
 

Modified: dists/sid/linux-2.6/debian/patches/features/all/openvz/openvz.patch
==============================================================================
--- dists/sid/linux-2.6/debian/patches/features/all/openvz/openvz.patch	(original)
+++ dists/sid/linux-2.6/debian/patches/features/all/openvz/openvz.patch	Wed Jan 21 21:27:47 2009
@@ -8027,7 +8027,7 @@
  }
 +EXPORT_SYMBOL_GPL(sys_dup2);
  
- asmlinkage long sys_dup(unsigned int fildes)
+ SYSCALL_DEFINE1(dup, unsigned int, fildes)
  {
 @@ -199,6 +200,9 @@ static int setfl(int fd, struct file * filp, unsigned long arg)
  	struct inode * inode = filp->f_path.dentry->d_inode;
@@ -9024,8 +9024,8 @@
  }
 +EXPORT_SYMBOL(sys_inotify_init);
  
- asmlinkage long sys_inotify_add_watch(int fd, const char __user *path, u32 mask)
- {
+ SYSCALL_DEFINE3(inotify_add_watch, int, fd, const char __user *, path,
+ 		u32, mask)
 @@ -673,7 +635,7 @@ asmlinkage long sys_inotify_add_watch(int fd, const char __user *path, u32 mask)
  	mutex_lock(&dev->up_mutex);
  	ret = inotify_find_update_watch(dev->ih, inode, mask);
@@ -9967,14 +9967,14 @@
  	if (!error && copy_to_user(buf, &tmp, sizeof(tmp)))
  		error = -EFAULT;
  	fput(file);
-@@ -701,6 +725,7 @@ out_release:
+@@ -719,6 +743,7 @@ out_release:
  out:
  	return error;
  }
 +EXPORT_SYMBOL_GPL(sys_chown);
  
- asmlinkage long sys_fchownat(int dfd, const char __user *filename, uid_t user,
- 			     gid_t group, int flag)
+ SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user,
+ 		gid_t, group, int, flag)
 @@ -939,6 +964,7 @@ struct file *nameidata_to_filp(struct nameidata *nd, int flags)
  	return filp;
  }
@@ -9993,14 +9993,14 @@
  	error = -ENFILE;
  	f = get_empty_filp();
  	if (f == NULL) {
-@@ -1115,6 +1144,7 @@ asmlinkage long sys_open(const char __user *filename, int flags, int mode)
+@@ -1132,6 +1161,7 @@ SYSCALL_DEFINE3(open, const char __user 
  	asmlinkage_protect(3, ret, filename, flags, mode);
  	return ret;
  }
 +EXPORT_SYMBOL_GPL(sys_open);
  
- asmlinkage long sys_openat(int dfd, const char __user *filename, int flags,
- 			   int mode)
+ SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags,
+ 		int, mode)
 diff --git a/fs/partitions/check.c b/fs/partitions/check.c
 index 6149e4b..c904faa 100644
 --- a/fs/partitions/check.c
@@ -11579,7 +11579,7 @@
  const struct file_operations generic_ro_fops = {
  	.llseek		= generic_file_llseek,
  	.read		= do_sync_read,
-@@ -350,6 +352,29 @@ static inline void file_pos_write(struct file *file, loff_t pos)
+@@ -350,6 +352,29 @@ static inline void file_pos_write(struct
  	file->f_pos = pos;
  }
  
@@ -11606,7 +11606,7 @@
 +}
 +
 +
- asmlinkage ssize_t sys_read(unsigned int fd, char __user * buf, size_t count)
+ SYSCALL_DEFINE3(read, unsigned int, fd, char __user *, buf, size_t, count)
  {
  	struct file *file;
 @@ -362,6 +387,8 @@ asmlinkage ssize_t sys_read(unsigned int fd, char __user * buf, size_t count)
@@ -11744,14 +11744,14 @@
  {
  	struct pollfd __user *ufds = (struct pollfd __user*)restart_block->arg0;
  	int nfds = restart_block->arg1;
-@@ -726,6 +729,7 @@ static long do_restart_poll(struct restart_block *restart_block)
+@@ -727,6 +730,7 @@ static long do_restart_poll(struct resta
  	}
  	return ret;
  }
 +EXPORT_SYMBOL_GPL(do_restart_poll);
  
- asmlinkage long sys_poll(struct pollfd __user *ufds, unsigned int nfds,
- 			long timeout_msecs)
+ SYSCALL_DEFINE3(poll, struct pollfd __user *, ufds, unsigned int, nfds,
+ 		long, timeout_msecs)
 diff --git a/fs/seq_file.c b/fs/seq_file.c
 index 3f54dbd..4d8b86a 100644
 --- a/fs/seq_file.c
@@ -12255,7 +12255,7 @@
  }
 +EXPORT_SYMBOL(user_get_super);
  
- asmlinkage long sys_ustat(unsigned dev, struct ustat __user * ubuf)
+ SYSCALL_DEFINE2(ustat, unsigned, dev, struct ustat __user *, ubuf)
  {
 +	dev_t kdev;
          struct super_block *s;
@@ -12336,7 +12336,7 @@
  
 @@ -38,7 +40,14 @@ static void do_sync(unsigned long wait)
  
- asmlinkage long sys_sync(void)
+ SYSCALL_DEFINE0(sync)
  {
 +	struct user_beancounter *ub;
 +
@@ -62468,7 +62468,7 @@
  {
  	struct user_struct *new_user;
  
-@@ -868,8 +985,27 @@ asmlinkage long sys_setfsgid(gid_t gid)
+@@ -869,8 +986,27 @@ SYSCALL_DEFINE1(setfsgid, gid_t, gid)
  	return old_fsgid;
  }
  
@@ -62487,7 +62487,7 @@
 +}
 +#endif
 +
- asmlinkage long sys_times(struct tms __user * tbuf)
+ SYSCALL_DEFINE1(times, struct tms __user *, tbuf)
  {
 +#ifdef CONFIG_VE
 +	struct timespec now;
@@ -67379,13 +67379,13 @@
  }
  
  static int do_mlock(unsigned long start, size_t len, int on)
-@@ -157,6 +173,7 @@ asmlinkage long sys_mlock(unsigned long start, size_t len)
+@@ -155,6 +171,7 @@ SYSCALL_DEFINE2(mlock, unsigned long, st
  	up_write(&current->mm->mmap_sem);
  	return error;
  }
 +EXPORT_SYMBOL_GPL(sys_mlock);
  
- asmlinkage long sys_munlock(unsigned long start, size_t len)
+ SYSCALL_DEFINE2(munlock, unsigned long, start, size_t, len)
  {
 @@ -169,6 +186,7 @@ asmlinkage long sys_munlock(unsigned long start, size_t len)
  	up_write(&current->mm->mmap_sem);

Modified: dists/sid/linux-2.6/debian/patches/features/all/vserver/vs2.3.0.35.patch
==============================================================================
--- dists/sid/linux-2.6/debian/patches/features/all/vserver/vs2.3.0.35.patch	(original)
+++ dists/sid/linux-2.6/debian/patches/features/all/vserver/vs2.3.0.35.patch	Wed Jan 21 21:27:47 2009
@@ -756,7 +756,7 @@
  SYSCALL(sys_clock_nanosleep,sys_clock_nanosleep,sys32_clock_nanosleep_wrapper)
 -NI_SYSCALL							/* reserved for vserver */
 +SYSCALL(sys_vserver,sys_vserver,sys32_vserver)
- SYSCALL(s390_fadvise64_64,sys_ni_syscall,sys32_fadvise64_64_wrapper)
+ SYSCALL(sys_s390_fadvise64_64,sys_ni_syscall,sys32_fadvise64_64_wrapper)
  SYSCALL(sys_statfs64,sys_statfs64,compat_sys_statfs64_wrapper)
  SYSCALL(sys_fstatfs64,sys_fstatfs64,compat_sys_fstatfs64_wrapper)
 --- a/arch/s390/mm/fault.c	2008-07-14 17:22:29.000000000 -0400
@@ -16984,16 +16984,16 @@
  
  /**
   * sys_getpid - return the thread group id of the current process
-@@ -1123,10 +1121,23 @@ asmlinkage long sys_getppid(void)
+@@ -1123,10 +1121,23 @@ SYSCALL_DEFINE0(getppid)
  	rcu_read_lock();
  	pid = task_tgid_vnr(current->real_parent);
  	rcu_read_unlock();
 +	return vx_map_pid(pid);
 +}
++
++#ifdef __alpha__
  
 -	return pid;
-+#ifdef __alpha__
-+
 +/*
 + * The Alpha uses getxpid, getxuid, and getxgid instead.
 + */
@@ -17006,7 +17006,7 @@
  
 +#else /* _alpha_ */
 +
- asmlinkage long sys_getuid(void)
+ SYSCALL_DEFINE0(getuid)
  {
  	/* Only we change this so SMP safe */
 @@ -1297,6 +1308,8 @@ int do_sysinfo(struct sysinfo *info)
@@ -25825,9 +25825,9 @@
  out:
  	return ret;
  }
-@@ -134,7 +135,7 @@ static int do_mlock(unsigned long start,
+@@ -132,7 +133,7 @@ static int do_mlock(unsigned long start,
  
- asmlinkage long sys_mlock(unsigned long start, size_t len)
+ SYSCALL_DEFINE2(mlock, unsigned long, start, size_t, len)
  {
 -	unsigned long locked;
 +	unsigned long locked, grow;

Modified: dists/sid/linux-2.6/debian/patches/features/all/xen/suse-20080808143035.patch
==============================================================================
--- dists/sid/linux-2.6/debian/patches/features/all/xen/suse-20080808143035.patch	(original)
+++ dists/sid/linux-2.6/debian/patches/features/all/xen/suse-20080808143035.patch	Wed Jan 21 21:27:47 2009
@@ -96759,7 +96759,7 @@
  /* sys_io_setup:
   *	Create an aio_context capable of receiving at least nr_events.
   *	ctxp must not point to an aio_context that already exists, and
-@@ -1259,18 +1348,30 @@ static void io_destroy(struct kioctx *ioctx)
+@@ -1259,18 +1348,30 @@ static void io_destroy(struct kioctx *io
   *	resources are available.  May fail with -EFAULT if an invalid
   *	pointer is passed for ctxp.  Will fail with -ENOSYS if not
   *	implemented.
@@ -96769,7 +96769,7 @@
 + *	This keeps the system call compatible, since a non-zero value
 + *	was not allowed so far.
   */
- asmlinkage long sys_io_setup(unsigned nr_events, aio_context_t __user *ctxp)
+ SYSCALL_DEFINE2(io_setup, unsigned, nr_events, aio_context_t __user *, ctxp)
  {
  	struct kioctx *ioctx = NULL;
  	unsigned long ctx;

Modified: dists/sid/linux-2.6/debian/patches/series/14
==============================================================================
--- dists/sid/linux-2.6/debian/patches/series/14	(original)
+++ dists/sid/linux-2.6/debian/patches/series/14	Wed Jan 21 21:27:47 2009
@@ -1,2 +1,48 @@
 + features/all/alsa-hda-support-acer-aspire-one.patch
 + bugfix/all/sctp-avoid-memory-overflow.patch
++ bugfix/all/CVE-2009-0029/0001-Move-compat-system-call-declarations.patch
++ bugfix/all/CVE-2009-0029/0002-Convert-all-system-calls-to-return-a.patch
++ bugfix/all/CVE-2009-0029/0003-Rename-old_readdir-to-sys_old_readdi.patch
++ bugfix/all/CVE-2009-0029/0004pre1-ia64-kill-sys32_pipe.patch
++ bugfix/all/CVE-2009-0029/0004-Remove-__attribute__-weak-from-sy.patch
++ bugfix/all/CVE-2009-0029/0005-Make-sys_pselect7-static.patch
++ bugfix/all/CVE-2009-0029/0006-Make-sys_syslog-a-conditional-system.patch
++ bugfix/all/CVE-2009-0029/0007-System-call-wrapper-infrastructure.patch
++ bugfix/all/CVE-2009-0029/0008-powerpc-Enable-syscall-wrappers-for.patch
++ bugfix/all/CVE-2009-0029/0009-s390-enable-system-call-wrappers.patch
++ bugfix/all/CVE-2009-0029/0010-System-call-wrapper-special-cases.patch
++ bugfix/all/CVE-2009-0029/0011-System-call-wrappers-part-01.patch
++ bugfix/all/CVE-2009-0029/0012-System-call-wrappers-part-02.patch
++ bugfix/all/CVE-2009-0029/0013-System-call-wrappers-part-03.patch
++ bugfix/all/CVE-2009-0029/0014-System-call-wrappers-part-04.patch
++ bugfix/all/CVE-2009-0029/0015-System-call-wrappers-part-05.patch
++ bugfix/all/CVE-2009-0029/0016-System-call-wrappers-part-06.patch
++ bugfix/all/CVE-2009-0029/0017-System-call-wrappers-part-07.patch
++ bugfix/all/CVE-2009-0029/0018-System-call-wrappers-part-08.patch
++ bugfix/all/CVE-2009-0029/0019-System-call-wrappers-part-09.patch
++ bugfix/all/CVE-2009-0029/0020-System-call-wrappers-part-10.patch
++ bugfix/all/CVE-2009-0029/0021-System-call-wrappers-part-11.patch
++ bugfix/all/CVE-2009-0029/0022-System-call-wrappers-part-12.patch
++ bugfix/all/CVE-2009-0029/0023-System-call-wrappers-part-13.patch
++ bugfix/all/CVE-2009-0029/0024-System-call-wrappers-part-14.patch
++ bugfix/all/CVE-2009-0029/0025-System-call-wrappers-part-15.patch
++ bugfix/all/CVE-2009-0029/0026-System-call-wrappers-part-16.patch
++ bugfix/all/CVE-2009-0029/0027-System-call-wrappers-part-17.patch
++ bugfix/all/CVE-2009-0029/0028-System-call-wrappers-part-18.patch
++ bugfix/all/CVE-2009-0029/0029-System-call-wrappers-part-19.patch
++ bugfix/all/CVE-2009-0029/0030-System-call-wrappers-part-20.patch
++ bugfix/all/CVE-2009-0029/0031-System-call-wrappers-part-21.patch
++ bugfix/all/CVE-2009-0029/0032-System-call-wrappers-part-22.patch
++ bugfix/all/CVE-2009-0029/0033-System-call-wrappers-part-23.patch
++ bugfix/all/CVE-2009-0029/0034-System-call-wrappers-part-24.patch
++ bugfix/all/CVE-2009-0029/0035-System-call-wrappers-part-25.patch
++ bugfix/all/CVE-2009-0029/0036-System-call-wrappers-part-26.patch
++ bugfix/all/CVE-2009-0029/0037-System-call-wrappers-part-27.patch
++ bugfix/all/CVE-2009-0029/0038pre1-missing-include.patch
++ bugfix/all/CVE-2009-0029/0038-System-call-wrappers-part-28.patch
++ bugfix/all/CVE-2009-0029/0039-System-call-wrappers-part-29.patch
++ bugfix/all/CVE-2009-0029/0040-System-call-wrappers-part-30.patch
++ bugfix/all/CVE-2009-0029/0041-System-call-wrappers-part-31.patch
++ bugfix/all/CVE-2009-0029/0042-System-call-wrappers-part-32.patch
++ bugfix/all/CVE-2009-0029/0043-System-call-wrappers-part-33.patch
++ bugfix/all/CVE-2009-0029/0044-s390-specific-system-call-wrappers.patch



More information about the Kernel-svn-changes mailing list