1 |
Author: mpagano |
2 |
Date: 2010-02-24 23:41:07 +0000 (Wed, 24 Feb 2010) |
3 |
New Revision: 1685 |
4 |
|
5 |
Removed: |
6 |
genpatches-2.6/trunk/2.6.33/4400_alpha-sysctl-uac.patch |
7 |
Modified: |
8 |
genpatches-2.6/trunk/2.6.33/0000_README |
9 |
Log: |
10 |
Removing alpha uac patch |
11 |
|
12 |
Modified: genpatches-2.6/trunk/2.6.33/0000_README |
13 |
=================================================================== |
14 |
--- genpatches-2.6/trunk/2.6.33/0000_README 2010-02-24 23:24:30 UTC (rev 1684) |
15 |
+++ genpatches-2.6/trunk/2.6.33/0000_README 2010-02-24 23:41:07 UTC (rev 1685) |
16 |
@@ -46,7 +46,3 @@ |
17 |
Patch: 4200_fbcondecor-0.9.6.patch |
18 |
From: http://dev.gentoo.org/~spock |
19 |
Desc: Bootsplash successor by Michal Januszewski |
20 |
- |
21 |
-Patch: 4400_alpha-sysctl-uac.patch |
22 |
-From: Tavis Ormandy <taviso@g.o> and http://bugs.gentoo.org/show_bug.cgi?id=217323 |
23 |
-Desc: Enable control of the unaligned access control policy from sysctl |
24 |
|
25 |
Deleted: genpatches-2.6/trunk/2.6.33/4400_alpha-sysctl-uac.patch |
26 |
=================================================================== |
27 |
--- genpatches-2.6/trunk/2.6.33/4400_alpha-sysctl-uac.patch 2010-02-24 23:24:30 UTC (rev 1684) |
28 |
+++ genpatches-2.6/trunk/2.6.33/4400_alpha-sysctl-uac.patch 2010-02-24 23:41:07 UTC (rev 1685) |
29 |
@@ -1,163 +0,0 @@ |
30 |
-Index: linux-2.6.26-gentoo/arch/alpha/Kconfig |
31 |
-=================================================================== |
32 |
---- linux-2.6.26-gentoo.orig/arch/alpha/Kconfig |
33 |
-+++ linux-2.6.26-gentoo/arch/alpha/Kconfig |
34 |
-@@ -624,6 +624,32 @@ config HZ |
35 |
- default 1200 if ALPHA_RAWHIDE |
36 |
- default 1024 |
37 |
- |
38 |
-+config ALPHA_UAC_SYSCTL |
39 |
-+ bool "Configure UAC policy via sysctl" |
40 |
-+ depends on SYSCTL |
41 |
-+ default y |
42 |
-+ ---help--- |
43 |
-+ Configuring the UAC (unaligned access control) policy on a Linux |
44 |
-+ system usually involves setting a compile time define. If you say |
45 |
-+ Y here, you will be able to modify the UAC policy at runtime using |
46 |
-+ the /proc interface. |
47 |
-+ |
48 |
-+ The UAC policy defines the action Linux should take when an |
49 |
-+ unaligned memory access occurs. The action can include printing a |
50 |
-+ warning message (NOPRINT), sending a signal to the offending |
51 |
-+ program to help developers debug their applications (SIGBUS), or |
52 |
-+ disabling the transparent fixing (NOFIX). |
53 |
-+ |
54 |
-+ The sysctls will be initialized to the compile-time defined UAC |
55 |
-+ policy. You can change these manually, or with the sysctl(8) |
56 |
-+ userspace utility. |
57 |
-+ |
58 |
-+ To disable the warning messages at runtime, you would use |
59 |
-+ |
60 |
-+ echo 1 > /proc/sys/kernel/uac/noprint |
61 |
-+ |
62 |
-+ This is pretty harmless. Say Y if you're not sure. |
63 |
-+ |
64 |
- source "drivers/pci/Kconfig" |
65 |
- source "drivers/eisa/Kconfig" |
66 |
- |
67 |
-Index: linux-2.6.26-gentoo/arch/alpha/kernel/traps.c |
68 |
-=================================================================== |
69 |
---- linux-2.6.26-gentoo.orig/arch/alpha/kernel/traps.c |
70 |
-+++ linux-2.6.26-gentoo/arch/alpha/kernel/traps.c |
71 |
-@@ -103,6 +103,52 @@ static char * ireg_name[] = {"v0", "t0", |
72 |
- "t10", "t11", "ra", "pv", "at", "gp", "sp", "zero"}; |
73 |
- #endif |
74 |
- |
75 |
-+#ifdef CONFIG_ALPHA_UAC_SYSCTL |
76 |
-+ |
77 |
-+#include <linux/sysctl.h> |
78 |
-+ |
79 |
-+static int enabled_noprint = 0; |
80 |
-+static int enabled_sigbus = 0; |
81 |
-+static int enabled_nofix = 0; |
82 |
-+ |
83 |
-+ctl_table uac_table[] = { |
84 |
-+ { |
85 |
-+ .ctl_name = CTL_UNNUMBERED, |
86 |
-+ .procname = "noprint", |
87 |
-+ .data = &enabled_noprint, |
88 |
-+ .maxlen = sizeof (int), |
89 |
-+ .mode = 0644, |
90 |
-+ .proc_handler = &proc_dointvec, |
91 |
-+ }, |
92 |
-+ { |
93 |
-+ .ctl_name = CTL_UNNUMBERED, |
94 |
-+ .procname = "sigbus", |
95 |
-+ .data = &enabled_sigbus, |
96 |
-+ .maxlen = sizeof (int), |
97 |
-+ .mode = 0644, |
98 |
-+ .proc_handler = &proc_dointvec, |
99 |
-+ }, |
100 |
-+ { |
101 |
-+ .ctl_name = CTL_UNNUMBERED, |
102 |
-+ .procname = "nofix", |
103 |
-+ .data = &enabled_nofix, |
104 |
-+ .maxlen = sizeof (int), |
105 |
-+ .mode = 0644, |
106 |
-+ .proc_handler = &proc_dointvec, |
107 |
-+ }, |
108 |
-+ { .ctl_name = 0 } |
109 |
-+}; |
110 |
-+ |
111 |
-+static int __init init_uac_sysctl(void) |
112 |
-+{ |
113 |
-+ /* Initialize sysctls with the #defined UAC policy */ |
114 |
-+ enabled_noprint = (test_thread_flag (TIF_UAC_NOPRINT)) ? 1 : 0; |
115 |
-+ enabled_sigbus = (test_thread_flag (TIF_UAC_SIGBUS)) ? 1 : 0; |
116 |
-+ enabled_nofix = (test_thread_flag (TIF_UAC_NOFIX)) ? 1 : 0; |
117 |
-+ return 0; |
118 |
-+} |
119 |
-+#endif |
120 |
-+ |
121 |
- static void |
122 |
- dik_show_code(unsigned int *pc) |
123 |
- { |
124 |
-@@ -782,7 +828,11 @@ do_entUnaUser(void __user * va, unsigned |
125 |
- /* Check the UAC bits to decide what the user wants us to do |
126 |
- with the unaliged access. */ |
127 |
- |
128 |
-+#ifndef CONFIG_ALPHA_UAC_SYSCTL |
129 |
- if (!test_thread_flag (TIF_UAC_NOPRINT)) { |
130 |
-+#else /* CONFIG_ALPHA_UAC_SYSCTL */ |
131 |
-+ if (!(enabled_noprint)) { |
132 |
-+#endif /* CONFIG_ALPHA_UAC_SYSCTL */ |
133 |
- if (cnt >= 5 && time_after(jiffies, last_time + 5 * HZ)) { |
134 |
- cnt = 0; |
135 |
- } |
136 |
-@@ -793,10 +843,18 @@ do_entUnaUser(void __user * va, unsigned |
137 |
- } |
138 |
- last_time = jiffies; |
139 |
- } |
140 |
-+#ifndef CONFIG_ALPHA_UAC_SYSCTL |
141 |
- if (test_thread_flag (TIF_UAC_SIGBUS)) |
142 |
-+#else /* CONFIG_ALPHA_UAC_SYSCTL */ |
143 |
-+ if (enabled_sigbus) |
144 |
-+#endif /* CONFIG_ALPHA_UAC_SYSCTL */ |
145 |
- goto give_sigbus; |
146 |
- /* Not sure why you'd want to use this, but... */ |
147 |
-+#ifndef CONFIG_ALPHA_UAC_SYSCTL |
148 |
- if (test_thread_flag (TIF_UAC_NOFIX)) |
149 |
-+#else /* CONFIG_ALPHA_UAC_SYSCTL */ |
150 |
-+ if (enabled_nofix) |
151 |
-+#endif /* CONFIG_ALPHA_UAC_SYSCTL */ |
152 |
- return; |
153 |
- |
154 |
- /* Don't bother reading ds in the access check since we already |
155 |
-@@ -1091,3 +1149,7 @@ trap_init(void) |
156 |
- wrent(entSys, 5); |
157 |
- wrent(entDbg, 6); |
158 |
- } |
159 |
-+ |
160 |
-+#ifdef CONFIG_ALPHA_UAC_SYSCTL |
161 |
-+ __initcall(init_uac_sysctl); |
162 |
-+#endif |
163 |
-Index: linux-2.6.33-gentoo/kernel/sysctl.c |
164 |
-=================================================================== |
165 |
---- a/kernel/sysctl.c 2010-02-24 17:52:58.000000000 -0500 |
166 |
-+++ b/kernel/sysctl.c 2010-02-24 17:57:49.000000000 -0500 |
167 |
-@@ -193,6 +193,10 @@ extern struct ctl_table random_table[]; |
168 |
- #ifdef CONFIG_INOTIFY_USER |
169 |
- extern struct ctl_table inotify_table[]; |
170 |
- #endif |
171 |
-+#ifdef CONFIG_ALPHA_UAC_SYSCTL |
172 |
-+extern struct ctl_table uac_table[]; |
173 |
-+#endif |
174 |
-+ |
175 |
- #ifdef CONFIG_EPOLL |
176 |
- extern struct ctl_table epoll_table[]; |
177 |
- #endif |
178 |
-@@ -940,6 +944,14 @@ static struct ctl_table kern_table[] = { |
179 |
- * NOTE: do not add new entries to this table unless you have read |
180 |
- * Documentation/sysctl/ctl_unnumbered.txt |
181 |
- */ |
182 |
-+#ifdef CONFIG_ALPHA_UAC_SYSCTL |
183 |
-+{ |
184 |
-+ .ctl_name = CTL_UNNUMBERED, |
185 |
-+ .procname = "uac", |
186 |
-+ .mode = 0555, |
187 |
-+ .child = uac_table, |
188 |
-+}, |
189 |
-+#endif /* CONFIG_ALPHA_UAC_SYSCTL */ |
190 |
- { } |
191 |
- }; |
192 |
- |