summaryrefslogtreecommitdiffstats
path: root/freed-ora/current/f18
diff options
context:
space:
mode:
authorAlexandre Oliva <lxoliva@fsfla.org>2013-05-03 12:40:40 +0000
committerAlexandre Oliva <lxoliva@fsfla.org>2013-05-03 12:40:40 +0000
commit825d0ffc8b43a078a2a6be179566eb42dda489fb (patch)
tree6bbf2ad2e09e5baff470cff1624b69a45eaf667f /freed-ora/current/f18
parentf78dae5365d16d60080073c03c4e88af65691840 (diff)
downloadlinux-libre-raptor-825d0ffc8b43a078a2a6be179566eb42dda489fb.tar.gz
linux-libre-raptor-825d0ffc8b43a078a2a6be179566eb42dda489fb.zip
3.8.11-200.fc18.gnu1
Diffstat (limited to 'freed-ora/current/f18')
-rw-r--r--freed-ora/current/f18/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch37
-rw-r--r--freed-ora/current/f18/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch47
-rw-r--r--freed-ora/current/f18/NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch61
-rw-r--r--freed-ora/current/f18/atm-update-msg_namelen-in-vcc_recvmsg.patch35
-rw-r--r--freed-ora/current/f18/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch38
-rwxr-xr-xfreed-ora/current/f18/deblob-3.813
-rwxr-xr-xfreed-ora/current/f18/deblob-check177
-rw-r--r--freed-ora/current/f18/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch37
-rw-r--r--freed-ora/current/f18/kernel.spec76
-rw-r--r--freed-ora/current/f18/l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch32
-rw-r--r--freed-ora/current/f18/linux-libre-3.8-gnu.tar.xz.sign7
-rw-r--r--freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xzbin98440 -> 0 bytes
-rw-r--r--freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz.sign7
-rw-r--r--freed-ora/current/f18/linux-libre-3.8-gnu1.tar.xz.sign7
-rw-r--r--freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xzbin0 -> 81744 bytes
-rw-r--r--freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz.sign7
-rw-r--r--freed-ora/current/f18/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch37
-rw-r--r--freed-ora/current/f18/net-fix-incorrect-credentials-passing.patch45
-rw-r--r--freed-ora/current/f18/netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch35
-rw-r--r--freed-ora/current/f18/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch36
-rw-r--r--freed-ora/current/f18/sources4
21 files changed, 193 insertions, 545 deletions
diff --git a/freed-ora/current/f18/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch b/freed-ora/current/f18/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch
deleted file mode 100644
index a4db050a6..000000000
--- a/freed-ora/current/f18/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-From e11e0455c0d7d3d62276a0c55d9dfbc16779d691 Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:50 +0000
-Subject: [PATCH] Bluetooth: RFCOMM - Fix missing msg_namelen update in
- rfcomm_sock_recvmsg()
-
-If RFCOMM_DEFER_SETUP is set in the flags, rfcomm_sock_recvmsg() returns
-early with 0 without updating the possibly set msg_namelen member. This,
-in turn, leads to a 128 byte kernel stack leak in net/socket.c.
-
-Fix this by updating msg_namelen in this case. For all other cases it
-will be handled in bt_sock_stream_recvmsg().
-
-Cc: Marcel Holtmann <marcel@holtmann.org>
-Cc: Gustavo Padovan <gustavo@padovan.org>
-Cc: Johan Hedberg <johan.hedberg@gmail.com>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/bluetooth/rfcomm/sock.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/net/bluetooth/rfcomm/sock.c b/net/bluetooth/rfcomm/sock.c
-index c23bae8..7c9224b 100644
---- a/net/bluetooth/rfcomm/sock.c
-+++ b/net/bluetooth/rfcomm/sock.c
-@@ -608,6 +608,7 @@ static int rfcomm_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
-
- if (test_and_clear_bit(RFCOMM_DEFER_SETUP, &d->flags)) {
- rfcomm_dlc_accept(d);
-+ msg->msg_namelen = 0;
- return 0;
- }
-
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch b/freed-ora/current/f18/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch
deleted file mode 100644
index e68092ddd..000000000
--- a/freed-ora/current/f18/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch
+++ /dev/null
@@ -1,47 +0,0 @@
-From 4683f42fde3977bdb4e8a09622788cc8b5313778 Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:49 +0000
-Subject: [PATCH] Bluetooth: fix possible info leak in bt_sock_recvmsg()
-
-In case the socket is already shutting down, bt_sock_recvmsg() returns
-with 0 without updating msg_namelen leading to net/socket.c leaking the
-local, uninitialized sockaddr_storage variable to userland -- 128 bytes
-of kernel stack memory.
-
-Fix this by moving the msg_namelen assignment in front of the shutdown
-test.
-
-Cc: Marcel Holtmann <marcel@holtmann.org>
-Cc: Gustavo Padovan <gustavo@padovan.org>
-Cc: Johan Hedberg <johan.hedberg@gmail.com>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/bluetooth/af_bluetooth.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/net/bluetooth/af_bluetooth.c b/net/bluetooth/af_bluetooth.c
-index d3ee69b..0d1b08c 100644
---- a/net/bluetooth/af_bluetooth.c
-+++ b/net/bluetooth/af_bluetooth.c
-@@ -230,6 +230,8 @@ int bt_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
- if (flags & (MSG_OOB))
- return -EOPNOTSUPP;
-
-+ msg->msg_namelen = 0;
-+
- skb = skb_recv_datagram(sk, flags, noblock, &err);
- if (!skb) {
- if (sk->sk_shutdown & RCV_SHUTDOWN)
-@@ -237,8 +239,6 @@ int bt_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
- return err;
- }
-
-- msg->msg_namelen = 0;
--
- copied = skb->len;
- if (len < copied) {
- msg->msg_flags |= MSG_TRUNC;
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch b/freed-ora/current/f18/NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch
deleted file mode 100644
index e518cca51..000000000
--- a/freed-ora/current/f18/NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch
+++ /dev/null
@@ -1,61 +0,0 @@
-From 4a3ad999af6c1b9a872fb70f19842784779383ee Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:58 +0000
-Subject: [PATCH] NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
-
-Upstream d26d6504f23e803824e8ebd14e52d4fc0a0b09cb
-
-The code in llcp_sock_recvmsg() does not initialize all the members of
-struct sockaddr_nfc_llcp when filling the sockaddr info. Nor does it
-initialize the padding bytes of the structure inserted by the compiler
-for alignment.
-
-Also, if the socket is in state LLCP_CLOSED or is shutting down during
-receive the msg_namelen member is not updated to 0 while otherwise
-returning with 0, i.e. "success". The msg_namelen update is also
-missing for stream and seqpacket sockets which don't fill the sockaddr
-info.
-
-Both issues lead to the fact that the code will leak uninitialized
-kernel stack bytes in net/socket.c.
-
-Fix the first issue by initializing the memory used for sockaddr info
-with memset(0). Fix the second one by setting msg_namelen to 0 early.
-It will be updated later if we're going to fill the msg_name member.
-
-Cc: Lauro Ramos Venancio <lauro.venancio@openbossa.org>
-Cc: Aloisio Almeida Jr <aloisio.almeida@openbossa.org>
-Cc: Samuel Ortiz <sameo@linux.intel.com>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-
-Conflicts:
- net/nfc/llcp/sock.c
----
- net/nfc/llcp/sock.c | 3 +++
- 1 file changed, 3 insertions(+)
-
-diff --git a/net/nfc/llcp/sock.c b/net/nfc/llcp/sock.c
-index fea22eb..48fb1de 100644
---- a/net/nfc/llcp/sock.c
-+++ b/net/nfc/llcp/sock.c
-@@ -644,6 +644,8 @@ static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
-
- pr_debug("%p %zu\n", sk, len);
-
-+ msg->msg_namelen = 0;
-+
- lock_sock(sk);
-
- if (sk->sk_state == LLCP_CLOSED &&
-@@ -684,6 +686,7 @@ static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
-
- pr_debug("Datagram socket %d %d\n", ui_cb->dsap, ui_cb->ssap);
-
-+ memset(&sockaddr, 0, sizeof(sockaddr));
- sockaddr.sa_family = AF_NFC;
- sockaddr.nfc_protocol = NFC_PROTO_NFC_DEP;
- sockaddr.dsap = ui_cb->dsap;
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/atm-update-msg_namelen-in-vcc_recvmsg.patch b/freed-ora/current/f18/atm-update-msg_namelen-in-vcc_recvmsg.patch
deleted file mode 100644
index a22ef9c73..000000000
--- a/freed-ora/current/f18/atm-update-msg_namelen-in-vcc_recvmsg.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-From 9b3e617f3df53822345a8573b6d358f6b9e5ed87 Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:47 +0000
-Subject: [PATCH] atm: update msg_namelen in vcc_recvmsg()
-
-The current code does not fill the msg_name member in case it is set.
-It also does not set the msg_namelen member to 0 and therefore makes
-net/socket.c leak the local, uninitialized sockaddr_storage variable
-to userland -- 128 bytes of kernel stack memory.
-
-Fix that by simply setting msg_namelen to 0 as obviously nobody cared
-about vcc_recvmsg() not filling the msg_name in case it was set.
-
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/atm/common.c | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/net/atm/common.c b/net/atm/common.c
-index 7b49100..737bef5 100644
---- a/net/atm/common.c
-+++ b/net/atm/common.c
-@@ -531,6 +531,8 @@ int vcc_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg,
- struct sk_buff *skb;
- int copied, error = -EINVAL;
-
-+ msg->msg_namelen = 0;
-+
- if (sock->state != SS_CONNECTED)
- return -ENOTCONN;
-
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch b/freed-ora/current/f18/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch
deleted file mode 100644
index 818e2d9c4..000000000
--- a/freed-ora/current/f18/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-From ef3313e84acbf349caecae942ab3ab731471f1a1 Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:48 +0000
-Subject: [PATCH] ax25: fix info leak via msg_name in ax25_recvmsg()
-
-When msg_namelen is non-zero the sockaddr info gets filled out, as
-requested, but the code fails to initialize the padding bytes of struct
-sockaddr_ax25 inserted by the compiler for alignment. Additionally the
-msg_namelen value is updated to sizeof(struct full_sockaddr_ax25) but is
-not always filled up to this size.
-
-Both issues lead to the fact that the code will leak uninitialized
-kernel stack bytes in net/socket.c.
-
-Fix both issues by initializing the memory with memset(0).
-
-Cc: Ralf Baechle <ralf@linux-mips.org>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/ax25/af_ax25.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/net/ax25/af_ax25.c b/net/ax25/af_ax25.c
-index 7b11f8b..e277e38 100644
---- a/net/ax25/af_ax25.c
-+++ b/net/ax25/af_ax25.c
-@@ -1642,6 +1642,7 @@ static int ax25_recvmsg(struct kiocb *iocb, struct socket *sock,
- ax25_address src;
- const unsigned char *mac = skb_mac_header(skb);
-
-+ memset(sax, 0, sizeof(struct full_sockaddr_ax25));
- ax25_addr_parse(mac + 1, skb->data - mac - 1, &src, NULL,
- &digi, NULL, NULL);
- sax->sax25_family = AF_AX25;
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/deblob-3.8 b/freed-ora/current/f18/deblob-3.8
index 31417db08..48488c3a7 100755
--- a/freed-ora/current/f18/deblob-3.8
+++ b/freed-ora/current/f18/deblob-3.8
@@ -48,7 +48,7 @@
# For each kver release, start extra with an empty string, then count
# from 1 if changes are needed that require rebuilding the tarball.
-kver=3.8 extra=
+kver=3.8 extra=1
case $1 in
--force)
@@ -1665,17 +1665,6 @@ clean_blob drivers/net/wireless/ath/ath6kl/usb.c
clean_kconfig drivers/net/wireless/ath/ath6kl/Kconfig 'ATH6KL_USB'
clean_mk CONFIG_ATH6KL_USB drivers/net/wireless/ath/ath6kl/Makefile
-announce ATH9K - "Atheros 802.11n wireless cards support"
-reject_firmware drivers/net/wireless/ath/ath9k/init.c
-clean_kconfig drivers/net/wireless/ath/ath9k/Kconfig 'ATH9K'
-clean_mk CONFIG_ATH9K drivers/net/wireless/ath/ath9k/Makefile
-
-announce ATH9K_HTC - "Atheros HTC based wireless cards support"
-reject_firmware drivers/net/wireless/ath/ath9k/hif_usb.c
-clean_blob drivers/net/wireless/ath/ath9k/hif_usb.c
-clean_kconfig drivers/net/wireless/ath/ath9k/Kconfig 'ATH9K_HTC'
-clean_mk CONFIG_ATH9K_HTC drivers/net/wireless/ath/ath9k/Makefile
-
announce PRISM2_USB - "Prism2.5/3 USB driver"
reject_firmware drivers/staging/wlan-ng/prism2fw.c
clean_blob drivers/staging/wlan-ng/prism2fw.c
diff --git a/freed-ora/current/f18/deblob-check b/freed-ora/current/f18/deblob-check
index 4d9a7e90d..ce469b9cb 100755
--- a/freed-ora/current/f18/deblob-check
+++ b/freed-ora/current/f18/deblob-check
@@ -1,6 +1,6 @@
#! /bin/sh
-# deblob-check version 2013-04-18
+# deblob-check version 2013-04-28
# Inspired in gNewSense's find-firmware script.
# Written by Alexandre Oliva <lxoliva@fsfla.org>
@@ -1878,7 +1878,7 @@ set_except () {
initnc '[ ][ ]static[ ]unsigned[ ]char[ ]const[ ]data_bit\[64\][ ]='
initnc '[ ][ ]static[ ]const[ ]u8[ ]data_sbit\[32\][ ]='
initnc '[ ]\.RightCoefs[ ]='
- initnc '[ ]#define[ ]WakeupSeq[ ][ ][ ][ ][{]'
+ defsnc '[ ]#define[ ]WakeupSeq[ ][ ][ ][ ][{]' drivers/net/ethernet/i825xx/eepro.c
initnc '[ ]SetRate44100\[\][ ]='
initnc '[ ]const[ ]short[ ]period\[32\][ ]='
defsnc '[ ]\(const[ ]static\|static[ ]const\)[ ]int[ ]desc_idx_table\[\][ ]=' 'arch/arm/include/asm/hardware/iop3xx-adma.h|include/asm-arm/hardware/iop3xx-adma.h'
@@ -1901,7 +1901,7 @@ set_except () {
defsnc '[ ]static[ ]u16[ ]tables\[\][ ]=' drivers/media/pci/meye/meye.c
initnc '[ ]static[ ]u32[ ]logMagTable\[128\][ ]='
defsnc '[ ]static[ ]u8[ ]init_bufs\[13\]\[5\][ ]=' drivers/media/pci/cx88/cx88-cards.c
- initnc '[ ]static[ ]u_short[ ]geometry_table\[\]\[[45]\][ ]='
+ defsnc '[ ]static[ ]u_short[ ]geometry_table\[\]\[[45]\][ ]=' drivers/block/xd.c
initnc '[ ]static[ ]unsigned[ ]char[ ]CRCTable1\[\][ ]='
initnc '[ ]static[ ]unsigned[ ]char[ ]CRCTable2\[\][ ]='
initnc '[ ]static[ ]unsigned[ ]char[ ]default_colors\[\][ ]='
@@ -2491,7 +2491,6 @@ set_except () {
defsnc 'static[ ]struct[ ]v_table[ ]v_table\[\][ ]=' drivers/gpu/drm/i915/i915_dma.c
blobname 'orinoco_ezusb_fw' drivers/net/wireless/orinoco/orinoco_usb.c
defsc 'static[ ]const[ ]struct[ ]ar9300_eeprom[ ]ar9300_default[ ]=' drivers/net/wireless/ath/ath9k/ar9003_eeprom.c
- blobname 'ar9271[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c
accept '[ ]hif_dev->firmware[ ]=[ ]NULL[;]' drivers/net/wireless/ath/ath9k/hif_usb.c
defsnc 'static[ ]const[ ]u32[ ]ar9300_2p[02]_\(radio\|mac\|baseband\)_postamble\[\]\[5\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h'
defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(\(low\(est\)\?\|high\)_ob_db\|high_power\)_tx_gain_table_2p[02]\[\]\[5\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h'
@@ -2555,7 +2554,6 @@ set_except () {
blobname 'lgs8g75\.fw' drivers/media/dvb/frontends/lgs8gxx.c
defsnc 'static[ ]const[ ]struct[ ]ucbus_write_cmd[ ]\(icx098bq\|lz24bp\)_start_[012]\[\][ ]=' drivers/media/video/gspca/sq930x.c
defsnc '[}][ ]capconfig\[4\]\[2\][ ]=' drivers/media/video/gspca/sq930x.c
- blobname 'ar7010\(_1_1\)\?[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c
defsnc 'static[ ]u8[ ]sa2400_rf_rssi_map\[\][ ]=' drivers/net/wireless/rtl818x/rtl8180_sa2400.c
defsnc 'static[ ]const[ ]unsigned[ ]char[ ]pwm_lookup_table\[256\][ ]=' drivers/platform/x86/compal-laptop.c
defsnc 'static[ ]int[ ]tps6586x_\(ldo4\|sm2\|dvm\)_voltages\[\][ ]=' drivers/regulator/tps6586x-regulator.c
@@ -2845,7 +2843,6 @@ set_except () {
defsnc 'static[ ]struct[ ]pll_limit[ ]\(cle266\|k800\|cx700\|vx855\)_pll_limits\[\][ ]=' drivers/video/via/hw.c
accept '[ ][ ]-e[ ]["][$]tmp_dir[/]lib[/]modules[/][$]KERNELRELEASE[/]modules\.dep\.bin["]' scripts/depmod.sh
blobname 'wm8958_\(enh_eq\|mbc\(_vss\)\?\)\.wfw' sound/soc/codecs/wm8958-dsp2.c
- blobname 'htc_\(7010\|9271\)\.fw' drivers/net/wireless/ath/ath9k/hif_usb.c
blobname 'rtl_nic[/]rtl8168e-[12]\.fw' drivers/net/r8169.c
defsnc '[ ]static[ ]const[ ]struct[ ]ephy_info[ ]e_info_8168e\[\][ ]=' drivers/net/r8169.c
blobname 'ti-connectivity[/]wl128x-fw\(-ap\)\?\.bin' drivers/net/wireless/wl12xx/wl12xx.h
@@ -3256,6 +3253,68 @@ set_except () {
blobname '%s-dsp%d\.\(wmfw\|bin\)' sound/soc/codecs/wm_adsp.c
blobname 'fw-4\.bin' drivers/net/wireless/ath/ath6kl/core.h
accept '[ ]hdsp->firmware[ ]=[ ]fw' sound/pci/rme9652/hdsp.c
+
+ # ath9k firmware is now Free Software.
+ accept '[ ]err[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]1[,][ ]name[,][ ]sc->dev[,][ ]GFP_KERNEL[,][\n][ ]*[&]ec[,][ ]ath9k_eeprom_request_cb[)][;]' drivers/net/wireless/ath/ath9k/init.c
+ accept '[#]define[ ]FIRMWARE_AR7010_1_1[ ]*["]htc_7010\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[#]define[ ]FIRMWARE_AR9271[ ]*["]htc_9271\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept 'MODULE_FIRMWARE[(]FIRMWARE_AR7010_1_1[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept 'MODULE_FIRMWARE[(]FIRMWARE_AR9271[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[ ]ret[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]true[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[,][ ]GFP_KERNEL[,][\n][ ]*hif_dev[,][ ]ath9k_hif_usb_firmware_cb[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[ ]ret[ ]=[ ]request_firmware[(][&]hif_dev->firmware[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[ ][ ]ret[ ]=[ ]request_firmware[(][&]fw[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+
+ # New in 3.9
+ blobname 'imx[/]sdma[/]sdma-imx6q\.bin' arch/arm/boot/dts/imx6qdl.dtsi
+ accept '[ ]*nvidia,emc-registers[ ]=[ ]*<\(0x[0-9a-f]*[ \n]*\)*>[;]' arch/arm/boot/dts/tegra20-colibri-512.dtsi
+ blobname 'kernel[/]x86[/]microcode[/]GenuineIntel\.bin' arch/x86/kernel/microcode_intel_early.c
+ accept '[0-9][0-9]*[ ][0-3][ ][0-3][ ]0\([\n][0-9][0-9]*[ ][0-3][ ][0-3][ ]0\)*' Documentation/thermal/intel_powerclamp.txt
+ accept '[ ]return[ ]_request_firmware_load[(]fw_priv[,]' drivers/base/firmware_class.c
+ accept 'static[ ]int[\n]_request_firmware_prepare[(]struct[ ]firmware[ ][*][*]\?firmware_p' drivers/base/firmware_class.c
+ accept '[/][*][ ]called[ ]from[ ]request_firmware[(][)][ ]and[ ]request_firmware_work_func[(][)][ ][*][/]' drivers/base/firmware_class.c
+ accept '[ ]_request_firmware[(][&]fw[,][ ]fw_work->name' drivers/base/firmware_class.c
+ accept '[ ]put_device[(]fw_work->device[)][;][ ][/][*][ ]taken[ ]in[ ]request_firmware_nowait[(][)][ ][*][/]' drivers/base/firmware_class.c
+ defsnc 'static[ ]const[ ]u16[ ]x[48]_vectors\[\][ ]=' drivers/edac/amd64_edac.c
+ defsnc 'static[ ]const[ ]struct[ ]hdmiphy_config[ ]hdmiphy_v14_configs\[\][ ]=' drivers/gpu/drm/exynos/exynos_hdmi.c
+ defsnc 'static[ ]const[ ]u32[ ]oland_io_mc_regs\[TAHITI_IO_MC_REGS_SIZE\]\[2\][ ]=' drivers/gpu/drm/radeon/si.c
+ defsnc 'static[ ]const[ ]u8[ ]sixaxis_rdesc_fixup2\?\[\][ ]=' drivers/hid/hid-sony.c
+ defsnc 'static[ ]const[ ]struct[ ]reg_val[ ]tuner_init_fc0012\[\][ ]=' drivers/media/dvb-frontends/af9033_priv.h
+ defsnc '\(static[ ]\)\?struct[ ]linear_segments[ ]cnr_\(to_db\|\(64\|16\)qam\|qpsk\)_table\[\][ ]=' drivers/media/dvb-frontends/mb86a20s.c
+ blobname 'SlimISP_\(%\.2s\|..\)\.bin' drivers/media/i2c/s5c73m3/s5c73m3-core.c
+ defsc 'static[ ]const[ ]struct[ ]i2c_rv[ ]ov965x_init_regs\[\][ ]=' drivers/media/i2c/ov9650.c
+ accept 'static[ ]struct[ ]dvb_usb_device_properties[ ]vp7049_properties[ ]=[ ][{][\n]\([ ]\.\(caps\|usb_ctrl\)[ ]*=[ ][^",]*,[\n]*\)*[ ]\.firmware[ ]*=[ ]' drivers/media/dvb/dvb-usb/m920x.c
+ blobname 'dvb-usb-vp7049-0\.95\.fw' drivers/media/dvb/dvb-usb/m920x.c
+ # The blob name is just the chip name, so no point in deblobbing;
+ # more so considering the number of false positives this would
+ # bring about.
+ # blobname 'lp5521' drivers/leds/leds-lp5521.c
+ # blobname 'lp55231\?' drivers/leds/leds-lp5523.c
+ blobname 'lattice-ecp3\.bit' drivers/misc/lattice-ecp3-config.c
+ defsnc '[ ]*static[ ]const[ ]uint8_t[ ]rss_key\[UPT1_RSS_MAX_KEY_SIZE\][ ]=' drivers/net/vmxnet3/vmxnet3_drv.c
+ defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(mixed_ob_db\|type5\)_tx_gain_table_2p2\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9003_2p2_initvals.h
+ defsnc 'static[ ]const[ ]u32[ ]ar9340Modes_low_ob_db_and_spur_tx_gain_table_1p0\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9340_initvals.h
+ defsnc 'static[ ]const[ ]u32[ ]ar9485Modes_green_spur_ob_db_tx_gain_1_1\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9485_initvals.h
+ defsnc 'static[ ]const[ ]u32[ ]ar9580_1p0_type6_tx_gain_table\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9580_1p0_initvals.h
+ blobname 'iwlwifi-\(7260\|3160\)-' drivers/net/wireless/iwlwifi/pcie/7000.c
+ blobname 'mrvl[/]pcie8897_uapsta\.bin' drivers/net/wireless/mwifiex/pcie.h
+ accept 'static[ ]const[ ]struct[ ]mwifiex_pcie_device[ ]mwifiex_pcie\(8766\|8897\)[ ]=[ ][{][\n][ ]\.firmware[ ]*=' drivers/net/wireless/mwifiex/pcie.h
+ accept '[ ][ ]card->pcie\.firmware[ ]=' drivers/net/wireless/mwifiex/pcie.c
+ accept '[ ][ ]\.per_chan_pwr_limit_arr_11abg[ ]*=[ ][{][ 0xf,\n]*' drivers/net/wireless/ti/wl18xx/main.c
+ blobname 'ti-connectivity[/]wl18xx-fw-2\.bin' drivers/net/wireless/ti/wl18xx/main.c
+ blobname '%s-dsp%d-%s\.\(wmfw\|bin\)' sound/soc/codecs/wm_adsp.c
+ defsnc 'static[ ]const[ ]struct[ ]reg_addr[ ]\(idle_\)\?reg_addrs\[\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h
+ blobname '83xx_fw\.bin' drivers/net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c
+ defsnc 'static[ ]const[ ]unsigned[ ]int[ ]dump_num_registers\[NUM_CHIPS\]\[NUM_PRESETS\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h
+ defsnc 'static[ ]int[ ]pm2xxx_charger_voltage_map\[\][ ]=' drivers/power/pm2301_charger.c
+ accept '[ ][*][ ]comedi[ ]drivers\.[ ]The[ ]request_firmware[(][)][ ]hotplug' drivers/staging/comedi/comedi.h
+ blobname 'rp2\.fw' drivers/tty/serial/rp2.c
+ defsnc 'static[ ]const[ ]unsigned[ ]char[ ]seq_\(w\|rgb\)_gamma\[\][ ]=' drivers/video/backlight/lms501kf03.c
+ defsnc '[#]include[ ]<video[/]mmp_disp\.h>[\n]*static[ ]u16[ ]init\[\][ ]=' drivers/video/mmp/panel/tpo_tj032md01bw.c
+ defsnc 'static[ ]struct[ ]tegra_clk_pll_freq_table[ ]pll_[mpadcu]_freq_table\[\][ ]=' 'drivers/clk/tegra/clk-tegra[23]0\.c'
+ blobname 'ctefx\.bin' sound/pci/hda/patch_ca0132.c
+ defsnc 'static[ ]unsigned[ ]int[ ]\(voice_focus\|mic_svm\|equalizer\)_vals_lookup\[\][ ]=' sound/pci/hda/patch_ca0132.c
+ defsnc 'static[ ]struct[ ]hda_verb[ ]ca0132_init_verbs0\[\][ ]=' sound/pci/hda/patch_ca0132.c
+ defsnc 'static[ ]const[ ]int[ ]dmic_comp\[6\]\[6\][ ]=' sound/soc/codecs/max98090.c
;;
*/*freedo*.patch | */*logo*.patch)
@@ -3265,7 +3324,109 @@ set_except () {
*/patch-3.8*)
# Present in 3.8 but patched in stable releases.
defsnc '\(static[ ]\)\?const[ ]u16[ ]dot11lcn_sw_ctrl_tbl_\(4313_\)\?\(bt_\)\?\(epa_\)\?\(p250_\)\?rev0\(_combo\)\?\[\][ ]=' 'drivers/\(staging\|net/wireless\)/brcm80211/\(phy/wlc_phy_lcn\.c\|brcmsmac/phy/phytbl_lcn\.c\)'
- ;;
+ # ath9k firmware is now Free Software.
+ accept '[ ]err[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]1[,][ ]name[,][ ]sc->dev[,][ ]GFP_KERNEL[,][\n][ ]*[&]ec[,][ ]ath9k_eeprom_request_cb[)][;]' drivers/net/wireless/ath/ath9k/init.c
+ accept '[#]define[ ]FIRMWARE_AR7010_1_1[ ]*["]htc_7010\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[#]define[ ]FIRMWARE_AR9271[ ]*["]htc_9271\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept 'MODULE_FIRMWARE[(]FIRMWARE_AR7010_1_1[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept 'MODULE_FIRMWARE[(]FIRMWARE_AR9271[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[ ]ret[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]true[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[,][ ]GFP_KERNEL[,][\n][ ]*hif_dev[,][ ]ath9k_hif_usb_firmware_cb[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[ ]ret[ ]=[ ]request_firmware[(][&]hif_dev->firmware[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ accept '[ ][ ]ret[ ]=[ ]request_firmware[(][&]fw[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c
+ # Present in 3.8
+ accept '[ ]-[ ]request_firmware[(][)][ ]hotplug[ ]interface[ ]info.' Documentation/00-INDEX
+ defsnc 'static[ ]struct[ ]nand_ecclayout[ ]qi_lb60_ecclayout_[12]gb[ ]=' arch/mips/jz4740/board-qi_lb60.c
+ defsnc 'static[ ]struct[ ]comp_testvec[ ]\(deflate\|lzo\)_\(de\)\?comp_tv_template\[\][ ]=' 'crypto/\(tcrypt\|testmgr\).h'
+ defsc 'static[ ]const[ ]struct[ ]minimode[ ]est3_modes\[\][ ]=' drivers/gpu/drm/drm_edid_modes.h
+ defsnc 'static[ ]const[ ]u32[ ]ar955x_1p0_\(radio\|baseband\|mac\)_postamble\[\]\[5\][ ]' drivers/net/wireless/ath/ath9k/ar955x_1p0_initvals.h
+ defsnc 'static[ ]const[ ]u32[ ]ar955x_1p0_modes_\(no_\)\?xpa_tx_gain_table\[\]\[9\][ ]=' drivers/net/wireless/ath/ath9k/955x_1p0_initvals.h
+ defsnc 'static[ ]struct[ ]pinmux_cfg_reg[ ]pinmux_config_regs\[\][ ]=' 'arch/sh/kernel/cpu/sh2a/pinmux-sh7203\.c\|arch/arm/mach-shmobile/pfc-sh73[67]7\.c'
+ accept '#define[ ]CONFIG_PATH[ ]*["][/]etc[/]vntconfiguration[.]dat["]' drivers/staging/vt6655/device_cfg.h
+ # For 3.8-to-3.9 patch:
+ accept '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?\(static[ ]\(void\|int\)[ ]\)\?_\?request_firmware\(_load\|_work_func\)\?[(]' drivers/base/firmware_class.c
+ accept '[ ]ret[ ]=[ ]_request_firmware_prepare[(]' drivers/base/firmware_class.c
+ accept '[ ]*return[ ]_request_firmware[(]firmware_p,' drivers/base/firmware_class.c
+ initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]const[ ]struct[ ]reg_val[ ]tuner_init_f\(c0011\[\][ ]=\)\?\(\([ ][{]\)\?[*][/][;]\)\?' drivers/media/dvb/frontends/af9033_priv.h
+ initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]struct[ ]regdata[ ]mb86a20s_init\[\][ ]=\([ ]\?[{]\?[*][/][;]\)\?' drivers/media/dvb/frontends/mb86a20s.c
+ accept '[ ]\.firmware[ ]=[ ]\(DW210[24]\|DW3101\|S630\)_FIRMWARE' drivers/media/usb/dvb-usb/dw2102.c
+ accept '[ ]\(p1100\|s660\|p7500\)->firmware[ ]=[ ]\(P1100\|S660\|P7500\)_FIRMWARE' drivers/media/usb/dvb-usb/dw2102.c
+ defsnc 'static[ ]const[ ]u32[ ]ar9485Modes_green_ob_db_tx_gain_1_1\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9485_initvals.h
+ initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]const[ ]u32[ ]ar955x_1p0_\(radio\|baseband\|mac\)_pos\(tamble\[\]\[5\][ ]=\)\?\([ ]\?[{]\?[*][/][;]\)\?' drivers/net/wireless/ath/ath9k/ar955x_1p0_initvals.h
+ defsnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]const[ ]u32[ ]ar955x_1p0_modes_\(no_\)\?xpa_tx\(_gain_table\[\]\[9\][ ]=\)\?\([ ]\?[{]\?[*][/][;]\)\?' drivers/net/wireless/ath/ath9k/955x_1p0_initvals.h
+ initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?u16[ ]MCS_DATA_RATE\[2\]\[2\]\[77\][ ]=\([*][/][;]\)\?' 'drivers/staging/\(rtl8192su/ieee80211/rtl819x_HTProc\.c\|rtl8192u/r819xU_firmware\.c\)'
+ accept '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]int[ ]do_mod_firmware_load[(]' sound/sound_firmware.c
+ # New in 3.9
+ blobname 'imx[/]sdma[/]sdma-imx6q\.bin' arch/arm/boot/dts/imx6qdl.dtsi
+ accept '[ ]*nvidia,emc-registers[ ]=[ ]*<\(0x[0-9a-f]*[ \n]*\)*>[;]' arch/arm/boot/dts/tegra20-colibri-512.dtsi
+ blobname 'kernel[/]x86[/]microcode[/]GenuineIntel\.bin' arch/x86/kernel/microcode_intel_early.c
+ accept '[0-9][0-9]*[ ][0-3][ ][0-3][ ]0\([\n][0-9][0-9]*[ ][0-3][ ][0-3][ ]0\)*' Documentation/thermal/intel_powerclamp.txt
+ accept '[ ]return[ ]_request_firmware_load[(]fw_priv[,]' drivers/base/firmware_class.c
+ accept 'static[ ]int[\n]_request_firmware_prepare[(]struct[ ]firmware[ ][*][*]\?firmware_p' drivers/base/firmware_class.c
+ accept '[/][*][ ]called[ ]from[ ]request_firmware[(][)][ ]and[ ]request_firmware_work_func[(][)][ ][*][/]' drivers/base/firmware_class.c
+ accept '[ ]_request_firmware[(][&]fw[,][ ]fw_work->name' drivers/base/firmware_class.c
+ accept '[ ]put_device[(]fw_work->device[)][;][ ][/][*][ ]taken[ ]in[ ]request_firmware_nowait[(][)][ ][*][/]' drivers/base/firmware_class.c
+ defsnc 'static[ ]const[ ]u16[ ]x[48]_vectors\[\][ ]=' drivers/edac/amd64_edac.c
+ defsnc 'static[ ]const[ ]struct[ ]hdmiphy_config[ ]hdmiphy_v14_configs\[\][ ]=' drivers/gpu/drm/exynos/exynos_hdmi.c
+ defsnc 'static[ ]const[ ]u32[ ]oland_io_mc_regs\[TAHITI_IO_MC_REGS_SIZE\]\[2\][ ]=' drivers/gpu/drm/radeon/si.c
+ defsnc 'static[ ]const[ ]u8[ ]sixaxis_rdesc_fixup2\?\[\][ ]=' drivers/hid/hid-sony.c
+ defsnc 'static[ ]const[ ]struct[ ]reg_val[ ]tuner_init_fc0012\[\][ ]=' drivers/media/dvb-frontends/af9033_priv.h
+ defsnc '\(static[ ]\)\?struct[ ]linear_segments[ ]cnr_\(to_db\|\(64\|16\)qam\|qpsk\)_table\[\][ ]=' drivers/media/dvb-frontends/mb86a20s.c
+ blobname 'SlimISP_\(%\.2s\|..\)\.bin' drivers/media/i2c/s5c73m3/s5c73m3-core.c
+ defsc 'static[ ]const[ ]struct[ ]i2c_rv[ ]ov965x_init_regs\[\][ ]=' drivers/media/i2c/ov9650.c
+ accept 'static[ ]struct[ ]dvb_usb_device_properties[ ]vp7049_properties[ ]=[ ][{][\n]\([ ]\.\(caps\|usb_ctrl\)[ ]*=[ ][^",]*,[\n]*\)*[ ]\.firmware[ ]*=[ ]' drivers/media/dvb/dvb-usb/m920x.c
+ blobname 'dvb-usb-vp7049-0\.95\.fw' drivers/media/dvb/dvb-usb/m920x.c
+ # The blob name is just the chip name, so no point in deblobbing;
+ # more so considering the number of false positives this would
+ # bring about.
+ # blobname 'lp5521' drivers/leds/leds-lp5521.c
+ # blobname 'lp55231\?' drivers/leds/leds-lp5523.c
+ blobname 'lattice-ecp3\.bit' drivers/misc/lattice-ecp3-config.c
+ defsnc '[ ]*static[ ]const[ ]uint8_t[ ]rss_key\[UPT1_RSS_MAX_KEY_SIZE\][ ]=' drivers/net/vmxnet3/vmxnet3_drv.c
+ defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(mixed_ob_db\|type5\)_tx_gain_table_2p2\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9003_2p2_initvals.h
+ defsnc 'static[ ]const[ ]u32[ ]ar9340Modes_low_ob_db_and_spur_tx_gain_table_1p0\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9340_initvals.h
+ defsnc 'static[ ]const[ ]u32[ ]ar9485Modes_green_spur_ob_db_tx_gain_1_1\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9485_initvals.h
+ defsnc 'static[ ]const[ ]u32[ ]ar9580_1p0_type6_tx_gain_table\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9580_1p0_initvals.h
+ blobname 'iwlwifi-\(7260\|3160\)-' drivers/net/wireless/iwlwifi/pcie/7000.c
+ blobname 'mrvl[/]pcie8897_uapsta\.bin' drivers/net/wireless/mwifiex/pcie.h
+ accept 'static[ ]const[ ]struct[ ]mwifiex_pcie_device[ ]mwifiex_pcie\(8766\|8897\)[ ]=[ ][{][\n][ ]\.firmware[ ]*=' drivers/net/wireless/mwifiex/pcie.h
+ accept '[ ][ ]card->pcie\.firmware[ ]=' drivers/net/wireless/mwifiex/pcie.c
+ accept '[ ][ ]\.per_chan_pwr_limit_arr_11abg[ ]*=[ ][{][ 0xf,\n]*' drivers/net/wireless/ti/wl18xx/main.c
+ blobname 'ti-connectivity[/]wl18xx-fw-2\.bin' drivers/net/wireless/ti/wl18xx/main.c
+ blobname '%s-dsp%d-%s\.\(wmfw\|bin\)' sound/soc/codecs/wm_adsp.c
+ defsnc 'static[ ]const[ ]struct[ ]reg_addr[ ]\(idle_\)\?reg_addrs\[\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h
+ blobname '83xx_fw\.bin' drivers/net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c
+ defsnc 'static[ ]const[ ]unsigned[ ]int[ ]dump_num_registers\[NUM_CHIPS\]\[NUM_PRESETS\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h
+ defsnc 'static[ ]int[ ]pm2xxx_charger_voltage_map\[\][ ]=' drivers/power/pm2301_charger.c
+ accept '[ ][*][ ]comedi[ ]drivers\.[ ]The[ ]request_firmware[(][)][ ]hotplug' drivers/staging/comedi/comedi.h
+ blobname 'rp2\.fw' drivers/tty/serial/rp2.c
+ defsnc 'static[ ]const[ ]unsigned[ ]char[ ]seq_\(w\|rgb\)_gamma\[\][ ]=' drivers/video/backlight/lms501kf03.c
+ defsnc '[#]include[ ]<video[/]mmp_disp\.h>[\n]*static[ ]u16[ ]init\[\][ ]=' drivers/video/mmp/panel/tpo_tj032md01bw.c
+ defsnc 'static[ ]struct[ ]tegra_clk_pll_freq_table[ ]pll_[mpadcu]_freq_table\[\][ ]=' 'drivers/clk/tegra/clk-tegra[23]0\.c'
+ blobname 'ctefx\.bin' sound/pci/hda/patch_ca0132.c
+ defsnc 'static[ ]unsigned[ ]int[ ]\(voice_focus\|mic_svm\|equalizer\)_vals_lookup\[\][ ]=' sound/pci/hda/patch_ca0132.c
+ defsnc 'static[ ]struct[ ]hda_verb[ ]ca0132_init_verbs0\[\][ ]=' sound/pci/hda/patch_ca0132.c
+ defsnc 'static[ ]const[ ]int[ ]dmic_comp\[6\]\[6\][ ]=' sound/soc/codecs/max98090.c
+ # Reverse 3.8-to-3.9 patch:
+ accept '0x102c[ ][ ][ ][ ][ ]0x6151[\n]'"$blobpat*" Documentation/video4linux/et61x251.txt
+ accept '0x041e[ ][ ][ ][ ][ ]0x4017[\n]'"$blobpat*" Documentation/video4linux/zc0301.txt
+ defsnc 'static[ ]struct[ ]clk_pll_\(freq_\)\?table[ ]tegra_pll_[adpxm]_\(freq_\)\?table\[\][ ]=' arch/arm/mach-tegra/tegra2_clocks.c
+ defsnc 'static[ ]struct[ ]clk_pll_freq_table[ ]tegra_pll_[cu]_freq_table\[\][ ]=' arch/arm/mach-tegra/tegra30_clocks.c
+ accept '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?\(static[ ]\(void\|int\)[ ]\)\?_\?request_firmware\(_cleanup\|_prepare\)\?[(]' drivers/base/firmware_class.c
+ accept '[ ]*\(\(fw_priv\|ret\)[ ]=[ ]\)\?_\?request_firmware_\(load\|prepare\|cleanup\)' drivers/base/firmware_class.c
+ defsnc '[ ]static[ ]u_short[ ]geometry_table\[\]\[[45]\][ ]=' drivers/block/xd.c
+ defsnc 'static[ ]const[ ]u8[ ]hdmiphy_conf\(27\(_027\)\?\|74\(_175\|_25\)\|148_5\)\[32\][ ]=' drivers/media/video/s5p-tv/hdmiphy_drv.c
+ defsnc 'static[ ]const[ ]u8[ ]hdmiphy_conf74_176\[32\][ ]=' drivers/gpu/drm/exynos/exynos_hdmi.c
+ accept '[ ]\.firmware[ ]=[ ]["][/][*][(]DEBLOBBED[)][*][/]["]' drivers/media/usb/dvb-usb/dw2102.c
+ accept '[ ]\(p1100\|s660\)->firmware[ ]=' drivers/media/dvb/dvb-usb/dw2102.c
+ accept '[ ]p7500->firmware[ ]=' drivers/media/dvb/dvb-usb/dw2102.c
+ defsnc '[ ]#define[ ]WakeupSeq[ ][ ][ ][ ][{]' drivers/net/ethernet/i825xx/eepro.c
+ defsnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?\(static[ ]\)\?\(const[ ]\)\?\(struct[ ]\)\?\(SiS\|XGI\)_[ME]CLKData\(Struct\)\?[ ]XGI\(340\|27\)\(\(New\)\?_[ME]CLKData\[\][ ]*=\|N\)\?\([ ]\?[{]\?[*][/][;]\)\?' drivers/staging/xgifb/vb_table.h
+ defsnc '\(static[ ]\)\?\(const[ ]\)\?\(UCHAR\|unsigned[ ]char\)[ ]XGI340_CR6[BE]\[8\]\[4\][ ]*=' drivers/staging/xgifb/vb_table.h
+ ;;
+
+ */drm-qxl-driver.patch)
+ defsnc '[ ][}][ ]common_modes\[\][ ]=' drivers/gpu/drm/qxl/qxl_display.c
+ ;;
*/patch-3.7*)
# Removed chunks matched by entries that don't appear in the patch context.
@@ -4712,7 +4873,6 @@ set_except () {
defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(\(low\(est\)\?\|high\)_ob_db\|high_power\)_tx_gain_table_2p[02]\[\]\[5\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h'
defsnc 'static[ ]const[ ]u32[ ]ar9\(300\|200_merlin\)_2p[02]_\(radio\|mac\|baseband\)_core\[\]\[2\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h'
defsnc 'static[ ]const[ ]u32[ ]ar9300Common_\(wo_xlna_\)\?rx_gain_table_\(merlin_\)\?2p[02]\[\]\[2\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h'
- blobname 'ar9271[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c
accept 'static[ ]int[ ]ipw2100_mod_firmware_load[(]' 'drivers/net/wireless/\(ipw2x00/\)\?ipw2100\.c'
accept '[ ]*card->firmware[ ]=[ ]\(if_sdio\|lbs_fw\|fw_name\)' drivers/net/wireless/libertas/if_sdio.c
blobname 'rt\(28[67]0\|30[79][01]\)\.bin' drivers/staging/rt2860/common/rtmp_mcu.c
@@ -4753,7 +4913,6 @@ set_except () {
blobname 'lgs8g75\.fw' drivers/media/dvb/frontends/lgs8gxx.c
defsnc 'static[ ]const[ ]struct[ ]ucbus_write_cmd[ ]\(icx098bq\|lz24bp\)_start_[012]\[\][ ]=' drivers/media/video/gspca/sq930x.c
defsnc '[}][ ]capconfig\[4\]\[2\][ ]=' drivers/media/video/gspca/sq930x.c
- blobname 'ar7010\(_1_1\)\?[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c
defsnc 'static[ ]u8[ ]sa2400_rf_rssi_map\[\][ ]=' drivers/net/wireless/rtl818x/rtl8180_sa2400.c
defsnc 'static[ ]const[ ]unsigned[ ]char[ ]pwm_lookup_table\[256\][ ]=' drivers/platform/x86/compal-laptop.c
defsnc 'static[ ]int[ ]tps6586x_\(ldo4\|sm2\|dvm\)_voltages\[\][ ]=' drivers/regulator/tps6586x-regulator.c
diff --git a/freed-ora/current/f18/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch b/freed-ora/current/f18/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch
deleted file mode 100644
index 074d2b48a..000000000
--- a/freed-ora/current/f18/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-From 5ae94c0d2f0bed41d6718be743985d61b7f5c47d Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:53 +0000
-Subject: [PATCH] irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
-
-The current code does not fill the msg_name member in case it is set.
-It also does not set the msg_namelen member to 0 and therefore makes
-net/socket.c leak the local, uninitialized sockaddr_storage variable
-to userland -- 128 bytes of kernel stack memory.
-
-Fix that by simply setting msg_namelen to 0 as obviously nobody cared
-about irda_recvmsg_dgram() not filling the msg_name in case it was
-set.
-
-Cc: Samuel Ortiz <samuel@sortiz.org>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/irda/af_irda.c | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/net/irda/af_irda.c b/net/irda/af_irda.c
-index d28e7f0..e493b33 100644
---- a/net/irda/af_irda.c
-+++ b/net/irda/af_irda.c
-@@ -1386,6 +1386,8 @@ static int irda_recvmsg_dgram(struct kiocb *iocb, struct socket *sock,
-
- IRDA_DEBUG(4, "%s()\n", __func__);
-
-+ msg->msg_namelen = 0;
-+
- skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT,
- flags & MSG_DONTWAIT, &err);
- if (!skb)
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/kernel.spec b/freed-ora/current/f18/kernel.spec
index b2cfdc5c9..672cbf24b 100644
--- a/freed-ora/current/f18/kernel.spec
+++ b/freed-ora/current/f18/kernel.spec
@@ -72,7 +72,7 @@ Summary: The Linux kernel
# librev starts empty, then 1, etc, as the linux-libre tarball
# changes. This is only used to determine which tarball to use.
-#define librev
+%define librev 1
%define baselibre -libre
%define basegnu -gnu%{?librev}
@@ -112,7 +112,7 @@ Summary: The Linux kernel
%if 0%{?released_kernel}
# Do we have a -stable update to apply?
-%define stable_update 10
+%define stable_update 11
# Is it a -stable RC?
%define stable_rc 0
# Set rpm version accordingly
@@ -847,39 +847,6 @@ Patch25010: wireless-regulatory-fix-channel-disabling-race-condition.patch
#rhbz 951241
Patch25011: iwlwifi-fix-freeing-uninitialized-pointer.patch
-#CVE-2013-3222 rhbz 955216 955228
-Patch25014: atm-update-msg_namelen-in-vcc_recvmsg.patch
-
-#CVE-2013-3224 rhbz 955599 955607
-Patch25015: Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch
-
-#CVE-2013-1979 rhbz 955629 955647
-Patch25016: net-fix-incorrect-credentials-passing.patch
-
-#CVE-2013-3225 rhbz 955649 955658
-Patch25017: Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch
-
-#CVE-2013-3223 rhbz 955662 955666
-Patch25018: ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch
-
-#CVE-2013-3234 956135 956139
-Patch25020: rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch
-
-#CVE-2013-3233 956125 956129
-Patch25021: NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch
-
-#CVE-2013-3232 956110 956113
-Patch25022: netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch
-
-#CVE-2013-3231 956094 956104
-Patch25023: llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch
-
-#CVE-2013-3230 956088 956089
-Patch25024: l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch
-
-#CVE-2013-3228 956069 956071
-Patch25025: irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch
-
# END OF PATCH DEFINITIONS
%endif
@@ -1681,39 +1648,6 @@ ApplyPatch wireless-regulatory-fix-channel-disabling-race-condition.patch
#rhbz 951241
ApplyPatch iwlwifi-fix-freeing-uninitialized-pointer.patch
-#CVE-2013-3222 rhbz 955216 955228
-ApplyPatch atm-update-msg_namelen-in-vcc_recvmsg.patch
-
-#CVE-2013-3224 rhbz 955599 955607
-ApplyPatch Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch
-
-#CVE-2013-1979 rhbz 955629 955647
-ApplyPatch net-fix-incorrect-credentials-passing.patch
-
-#CVE-2013-3225 rhbz 955649 955658
-ApplyPatch Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch
-
-#CVE-2013-3223 rhbz 955662 955666
-ApplyPatch ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch
-
-#CVE-2013-3234 956135 956139
-ApplyPatch rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch
-
-#CVE-2013-3233 956125 956129
-ApplyPatch NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch
-
-#CVE-2013-3232 956110 956113
-ApplyPatch netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch
-
-#CVE-2013-3231 956094 956104
-ApplyPatch llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch
-
-#CVE-2013-3230 956088 956089
-ApplyPatch l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch
-
-#CVE-2013-3228 956069 956071
-ApplyPatch irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch
-
# END OF PATCH APPLICATIONS
%endif
@@ -2582,6 +2516,12 @@ fi
# ||----w |
# || ||
%changelog
+* Thu May 2 2013 Alexandre Oliva <lxoliva@fsfla.org> -libre
+- GNU Linux-libre 3.8.11-gnu1.
+
+* Wed May 01 2013 Justin M. Forbes <jforbes@redhat.com> - 3.8.11-200
+- Linux v3.8.11
+
* Mon Apr 29 2013 Alexandre Oliva <lxoliva@fsfla.org> -libre
- GNU Linux-libre 3.8.10-gnu.
diff --git a/freed-ora/current/f18/l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch b/freed-ora/current/f18/l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch
deleted file mode 100644
index 5ea7a7da6..000000000
--- a/freed-ora/current/f18/l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-From b860d3cc62877fad02863e2a08efff69a19382d2 Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:55 +0000
-Subject: [PATCH] l2tp: fix info leak in l2tp_ip6_recvmsg()
-
-The L2TP code for IPv6 fails to initialize the l2tp_conn_id member of
-struct sockaddr_l2tpip6 and therefore leaks four bytes kernel stack
-in l2tp_ip6_recvmsg() in case msg_name is set.
-
-Initialize l2tp_conn_id with 0 to avoid the info leak.
-
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/l2tp/l2tp_ip6.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/net/l2tp/l2tp_ip6.c b/net/l2tp/l2tp_ip6.c
-index c74f5a9..b8a6039 100644
---- a/net/l2tp/l2tp_ip6.c
-+++ b/net/l2tp/l2tp_ip6.c
-@@ -690,6 +690,7 @@ static int l2tp_ip6_recvmsg(struct kiocb *iocb, struct sock *sk,
- lsa->l2tp_addr = ipv6_hdr(skb)->saddr;
- lsa->l2tp_flowinfo = 0;
- lsa->l2tp_scope_id = 0;
-+ lsa->l2tp_conn_id = 0;
- if (ipv6_addr_type(&lsa->l2tp_addr) & IPV6_ADDR_LINKLOCAL)
- lsa->l2tp_scope_id = IP6CB(skb)->iif;
- }
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu.tar.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu.tar.xz.sign
deleted file mode 100644
index 753ef9cf1..000000000
--- a/freed-ora/current/f18/linux-libre-3.8-gnu.tar.xz.sign
+++ /dev/null
@@ -1,7 +0,0 @@
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.19 (GNU/Linux)
-
-iEYEABECAAYFAlEjLMYACgkQvLfPh359R6ffmgCcDZpvPTimpapmVA+xdWhvxMK5
-voMAoKEyhPHcSLaQ4i9EkBCFP7Sx4bbG
-=DHJB
------END PGP SIGNATURE-----
diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz b/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz
deleted file mode 100644
index aeef10085..000000000
--- a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz
+++ /dev/null
Binary files differ
diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz.sign
deleted file mode 100644
index 31a3959c5..000000000
--- a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz.sign
+++ /dev/null
@@ -1,7 +0,0 @@
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.19 (GNU/Linux)
-
-iEYEABECAAYFAlEjLMgACgkQvLfPh359R6eF0gCfco+hIPIuv0P6gUm6GyIYWCHe
-IzQAnjz7Wk0CjItrSdKNHok5oy6WgII6
-=AjHg
------END PGP SIGNATURE-----
diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu1.tar.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu1.tar.xz.sign
new file mode 100644
index 000000000..78fc2939b
--- /dev/null
+++ b/freed-ora/current/f18/linux-libre-3.8-gnu1.tar.xz.sign
@@ -0,0 +1,7 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.19 (GNU/Linux)
+
+iEYEABECAAYFAlGBhsoACgkQvLfPh359R6eEoQCdGD58ILSEuCPNVj8UnUkDgrjJ
+EzQAoKY9K35Kke3Qi90aWzdIeyBz2VlR
+=cmUV
+-----END PGP SIGNATURE-----
diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz
new file mode 100644
index 000000000..3c8e85025
--- /dev/null
+++ b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz
Binary files differ
diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz.sign
new file mode 100644
index 000000000..8bdd5d7eb
--- /dev/null
+++ b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz.sign
@@ -0,0 +1,7 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.19 (GNU/Linux)
+
+iEYEABECAAYFAlGBhtgACgkQvLfPh359R6fMIACdGdfCWIRWbQ2PsNRUyL56gh9m
+NfsAnRmK9mXPq2Djm7iFmsvZ5rA67y2x
+=Ppri
+-----END PGP SIGNATURE-----
diff --git a/freed-ora/current/f18/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch b/freed-ora/current/f18/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch
deleted file mode 100644
index ef123b0f1..000000000
--- a/freed-ora/current/f18/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-From c77a4b9cffb6215a15196ec499490d116dfad181 Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:56 +0000
-Subject: [PATCH] llc: Fix missing msg_namelen update in llc_ui_recvmsg()
-
-For stream sockets the code misses to update the msg_namelen member
-to 0 and therefore makes net/socket.c leak the local, uninitialized
-sockaddr_storage variable to userland -- 128 bytes of kernel stack
-memory. The msg_namelen update is also missing for datagram sockets
-in case the socket is shutting down during receive.
-
-Fix both issues by setting msg_namelen to 0 early. It will be
-updated later if we're going to fill the msg_name member.
-
-Cc: Arnaldo Carvalho de Melo <acme@ghostprotocols.net>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/llc/af_llc.c | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c
-index 8870988..48aaa89 100644
---- a/net/llc/af_llc.c
-+++ b/net/llc/af_llc.c
-@@ -720,6 +720,8 @@ static int llc_ui_recvmsg(struct kiocb *iocb, struct socket *sock,
- int target; /* Read at least this many bytes */
- long timeo;
-
-+ msg->msg_namelen = 0;
-+
- lock_sock(sk);
- copied = -ENOTCONN;
- if (unlikely(sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN))
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/net-fix-incorrect-credentials-passing.patch b/freed-ora/current/f18/net-fix-incorrect-credentials-passing.patch
deleted file mode 100644
index 639faba6e..000000000
--- a/freed-ora/current/f18/net-fix-incorrect-credentials-passing.patch
+++ /dev/null
@@ -1,45 +0,0 @@
-From 83f1b4ba917db5dc5a061a44b3403ddb6e783494 Mon Sep 17 00:00:00 2001
-From: Linus Torvalds <torvalds@linux-foundation.org>
-Date: Fri, 19 Apr 2013 15:32:32 +0000
-Subject: [PATCH] net: fix incorrect credentials passing
-
-Commit 257b5358b32f ("scm: Capture the full credentials of the scm
-sender") changed the credentials passing code to pass in the effective
-uid/gid instead of the real uid/gid.
-
-Obviously this doesn't matter most of the time (since normally they are
-the same), but it results in differences for suid binaries when the wrong
-uid/gid ends up being used.
-
-This just undoes that (presumably unintentional) part of the commit.
-
-Reported-by: Andy Lutomirski <luto@amacapital.net>
-Cc: Eric W. Biederman <ebiederm@xmission.com>
-Cc: Serge E. Hallyn <serge@hallyn.com>
-Cc: David S. Miller <davem@davemloft.net>
-Cc: stable@vger.kernel.org
-Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-Acked-by: "Eric W. Biederman" <ebiederm@xmission.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- include/net/scm.h | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/include/net/scm.h b/include/net/scm.h
-index 975cca0..b117081 100644
---- a/include/net/scm.h
-+++ b/include/net/scm.h
-@@ -56,8 +56,8 @@ static __inline__ void scm_set_cred(struct scm_cookie *scm,
- scm->pid = get_pid(pid);
- scm->cred = cred ? get_cred(cred) : NULL;
- scm->creds.pid = pid_vnr(pid);
-- scm->creds.uid = cred ? cred->euid : INVALID_UID;
-- scm->creds.gid = cred ? cred->egid : INVALID_GID;
-+ scm->creds.uid = cred ? cred->uid : INVALID_UID;
-+ scm->creds.gid = cred ? cred->gid : INVALID_GID;
- }
-
- static __inline__ void scm_destroy_cred(struct scm_cookie *scm)
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch b/freed-ora/current/f18/netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch
deleted file mode 100644
index 3881896f5..000000000
--- a/freed-ora/current/f18/netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-From fdbf33caa22d6648227c39c48ae395fb36e4bd7f Mon Sep 17 00:00:00 2001
-From: Wei Yongjun <yongjun_wei@trendmicro.com.cn>
-Date: Tue, 9 Apr 2013 10:07:19 +0800
-Subject: [PATCH] netrom: fix invalid use of sizeof in nr_recvmsg()
-
-Upstream c802d759623acbd6e1ee9fbdabae89159a513913
-
-sizeof() when applied to a pointer typed expression gives the size of the
-pointer, not that of the pointed data.
-Introduced by commit 3ce5ef(netrom: fix info leak via msg_name in nr_recvmsg)
-
-Signed-off-by: Wei Yongjun <yongjun_wei@trendmicro.com.cn>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-
-Conflicts:
- net/netrom/af_netrom.c
----
- net/netrom/af_netrom.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/net/netrom/af_netrom.c b/net/netrom/af_netrom.c
-index 7261eb8..f334fbd 100644
---- a/net/netrom/af_netrom.c
-+++ b/net/netrom/af_netrom.c
-@@ -1177,6 +1177,7 @@ static int nr_recvmsg(struct kiocb *iocb, struct socket *sock,
- }
-
- if (sax != NULL) {
-+ memset(sax, 0, sizeof(*sax));
- sax->sax25_family = AF_NETROM;
- skb_copy_from_linear_data_offset(skb, 7, sax->sax25_call.ax25_call,
- AX25_ADDR_LEN);
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch b/freed-ora/current/f18/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch
deleted file mode 100644
index 81f423f65..000000000
--- a/freed-ora/current/f18/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-From 4a184233f21645cf0b719366210ed445d1024d72 Mon Sep 17 00:00:00 2001
-From: Mathias Krause <minipli@googlemail.com>
-Date: Sun, 7 Apr 2013 01:51:59 +0000
-Subject: [PATCH] rose: fix info leak via msg_name in rose_recvmsg()
-
-The code in rose_recvmsg() does not initialize all of the members of
-struct sockaddr_rose/full_sockaddr_rose when filling the sockaddr info.
-Nor does it initialize the padding bytes of the structure inserted by
-the compiler for alignment. This will lead to leaking uninitialized
-kernel stack bytes in net/socket.c.
-
-Fix the issue by initializing the memory used for sockaddr info with
-memset(0).
-
-Cc: Ralf Baechle <ralf@linux-mips.org>
-Signed-off-by: Mathias Krause <minipli@googlemail.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
----
- net/rose/af_rose.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/net/rose/af_rose.c b/net/rose/af_rose.c
-index cf68e6e..9c83474 100644
---- a/net/rose/af_rose.c
-+++ b/net/rose/af_rose.c
-@@ -1253,6 +1253,7 @@ static int rose_recvmsg(struct kiocb *iocb, struct socket *sock,
- skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
-
- if (srose != NULL) {
-+ memset(srose, 0, msg->msg_namelen);
- srose->srose_family = AF_ROSE;
- srose->srose_addr = rose->dest_addr;
- srose->srose_call = rose->dest_call;
---
-1.8.1.4
-
diff --git a/freed-ora/current/f18/sources b/freed-ora/current/f18/sources
index 74462d497..08ff4e562 100644
--- a/freed-ora/current/f18/sources
+++ b/freed-ora/current/f18/sources
@@ -1,2 +1,2 @@
-84c2a77910932ffc7d958744ac9cf2f5 linux-libre-3.8-gnu.tar.xz
-973bc1c68bb5f082a66d20c94193d4ee patch-3.8.10.xz
+5c7787be882c343e41fb49136ff60aec linux-libre-3.8-gnu1.tar.xz
+76ec67882ad94b8ab43c70a46befca13 patch-3.8.11.xz
OpenPOWER on IntegriCloud