diff options
| author | Alexandre Oliva <lxoliva@fsfla.org> | 2013-05-03 12:40:40 +0000 |
|---|---|---|
| committer | Alexandre Oliva <lxoliva@fsfla.org> | 2013-05-03 12:40:40 +0000 |
| commit | 825d0ffc8b43a078a2a6be179566eb42dda489fb (patch) | |
| tree | 6bbf2ad2e09e5baff470cff1624b69a45eaf667f /freed-ora/current/f18 | |
| parent | f78dae5365d16d60080073c03c4e88af65691840 (diff) | |
| download | linux-libre-raptor-825d0ffc8b43a078a2a6be179566eb42dda489fb.tar.gz linux-libre-raptor-825d0ffc8b43a078a2a6be179566eb42dda489fb.zip | |
3.8.11-200.fc18.gnu1
Diffstat (limited to 'freed-ora/current/f18')
21 files changed, 193 insertions, 545 deletions
diff --git a/freed-ora/current/f18/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch b/freed-ora/current/f18/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch deleted file mode 100644 index a4db050a6..000000000 --- a/freed-ora/current/f18/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch +++ /dev/null @@ -1,37 +0,0 @@ -From e11e0455c0d7d3d62276a0c55d9dfbc16779d691 Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:50 +0000 -Subject: [PATCH] Bluetooth: RFCOMM - Fix missing msg_namelen update in - rfcomm_sock_recvmsg() - -If RFCOMM_DEFER_SETUP is set in the flags, rfcomm_sock_recvmsg() returns -early with 0 without updating the possibly set msg_namelen member. This, -in turn, leads to a 128 byte kernel stack leak in net/socket.c. - -Fix this by updating msg_namelen in this case. For all other cases it -will be handled in bt_sock_stream_recvmsg(). - -Cc: Marcel Holtmann <marcel@holtmann.org> -Cc: Gustavo Padovan <gustavo@padovan.org> -Cc: Johan Hedberg <johan.hedberg@gmail.com> -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/bluetooth/rfcomm/sock.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/net/bluetooth/rfcomm/sock.c b/net/bluetooth/rfcomm/sock.c -index c23bae8..7c9224b 100644 ---- a/net/bluetooth/rfcomm/sock.c -+++ b/net/bluetooth/rfcomm/sock.c -@@ -608,6 +608,7 @@ static int rfcomm_sock_recvmsg(struct kiocb *iocb, struct socket *sock, - - if (test_and_clear_bit(RFCOMM_DEFER_SETUP, &d->flags)) { - rfcomm_dlc_accept(d); -+ msg->msg_namelen = 0; - return 0; - } - --- -1.8.1.4 - diff --git a/freed-ora/current/f18/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch b/freed-ora/current/f18/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch deleted file mode 100644 index e68092ddd..000000000 --- a/freed-ora/current/f18/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch +++ /dev/null @@ -1,47 +0,0 @@ -From 4683f42fde3977bdb4e8a09622788cc8b5313778 Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:49 +0000 -Subject: [PATCH] Bluetooth: fix possible info leak in bt_sock_recvmsg() - -In case the socket is already shutting down, bt_sock_recvmsg() returns -with 0 without updating msg_namelen leading to net/socket.c leaking the -local, uninitialized sockaddr_storage variable to userland -- 128 bytes -of kernel stack memory. - -Fix this by moving the msg_namelen assignment in front of the shutdown -test. - -Cc: Marcel Holtmann <marcel@holtmann.org> -Cc: Gustavo Padovan <gustavo@padovan.org> -Cc: Johan Hedberg <johan.hedberg@gmail.com> -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/bluetooth/af_bluetooth.c | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/net/bluetooth/af_bluetooth.c b/net/bluetooth/af_bluetooth.c -index d3ee69b..0d1b08c 100644 ---- a/net/bluetooth/af_bluetooth.c -+++ b/net/bluetooth/af_bluetooth.c -@@ -230,6 +230,8 @@ int bt_sock_recvmsg(struct kiocb *iocb, struct socket *sock, - if (flags & (MSG_OOB)) - return -EOPNOTSUPP; - -+ msg->msg_namelen = 0; -+ - skb = skb_recv_datagram(sk, flags, noblock, &err); - if (!skb) { - if (sk->sk_shutdown & RCV_SHUTDOWN) -@@ -237,8 +239,6 @@ int bt_sock_recvmsg(struct kiocb *iocb, struct socket *sock, - return err; - } - -- msg->msg_namelen = 0; -- - copied = skb->len; - if (len < copied) { - msg->msg_flags |= MSG_TRUNC; --- -1.8.1.4 - diff --git a/freed-ora/current/f18/NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch b/freed-ora/current/f18/NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch deleted file mode 100644 index e518cca51..000000000 --- a/freed-ora/current/f18/NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch +++ /dev/null @@ -1,61 +0,0 @@ -From 4a3ad999af6c1b9a872fb70f19842784779383ee Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:58 +0000 -Subject: [PATCH] NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg() - -Upstream d26d6504f23e803824e8ebd14e52d4fc0a0b09cb - -The code in llcp_sock_recvmsg() does not initialize all the members of -struct sockaddr_nfc_llcp when filling the sockaddr info. Nor does it -initialize the padding bytes of the structure inserted by the compiler -for alignment. - -Also, if the socket is in state LLCP_CLOSED or is shutting down during -receive the msg_namelen member is not updated to 0 while otherwise -returning with 0, i.e. "success". The msg_namelen update is also -missing for stream and seqpacket sockets which don't fill the sockaddr -info. - -Both issues lead to the fact that the code will leak uninitialized -kernel stack bytes in net/socket.c. - -Fix the first issue by initializing the memory used for sockaddr info -with memset(0). Fix the second one by setting msg_namelen to 0 early. -It will be updated later if we're going to fill the msg_name member. - -Cc: Lauro Ramos Venancio <lauro.venancio@openbossa.org> -Cc: Aloisio Almeida Jr <aloisio.almeida@openbossa.org> -Cc: Samuel Ortiz <sameo@linux.intel.com> -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> - -Conflicts: - net/nfc/llcp/sock.c ---- - net/nfc/llcp/sock.c | 3 +++ - 1 file changed, 3 insertions(+) - -diff --git a/net/nfc/llcp/sock.c b/net/nfc/llcp/sock.c -index fea22eb..48fb1de 100644 ---- a/net/nfc/llcp/sock.c -+++ b/net/nfc/llcp/sock.c -@@ -644,6 +644,8 @@ static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock, - - pr_debug("%p %zu\n", sk, len); - -+ msg->msg_namelen = 0; -+ - lock_sock(sk); - - if (sk->sk_state == LLCP_CLOSED && -@@ -684,6 +686,7 @@ static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock, - - pr_debug("Datagram socket %d %d\n", ui_cb->dsap, ui_cb->ssap); - -+ memset(&sockaddr, 0, sizeof(sockaddr)); - sockaddr.sa_family = AF_NFC; - sockaddr.nfc_protocol = NFC_PROTO_NFC_DEP; - sockaddr.dsap = ui_cb->dsap; --- -1.8.1.4 - diff --git a/freed-ora/current/f18/atm-update-msg_namelen-in-vcc_recvmsg.patch b/freed-ora/current/f18/atm-update-msg_namelen-in-vcc_recvmsg.patch deleted file mode 100644 index a22ef9c73..000000000 --- a/freed-ora/current/f18/atm-update-msg_namelen-in-vcc_recvmsg.patch +++ /dev/null @@ -1,35 +0,0 @@ -From 9b3e617f3df53822345a8573b6d358f6b9e5ed87 Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:47 +0000 -Subject: [PATCH] atm: update msg_namelen in vcc_recvmsg() - -The current code does not fill the msg_name member in case it is set. -It also does not set the msg_namelen member to 0 and therefore makes -net/socket.c leak the local, uninitialized sockaddr_storage variable -to userland -- 128 bytes of kernel stack memory. - -Fix that by simply setting msg_namelen to 0 as obviously nobody cared -about vcc_recvmsg() not filling the msg_name in case it was set. - -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/atm/common.c | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/net/atm/common.c b/net/atm/common.c -index 7b49100..737bef5 100644 ---- a/net/atm/common.c -+++ b/net/atm/common.c -@@ -531,6 +531,8 @@ int vcc_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, - struct sk_buff *skb; - int copied, error = -EINVAL; - -+ msg->msg_namelen = 0; -+ - if (sock->state != SS_CONNECTED) - return -ENOTCONN; - --- -1.8.1.4 - diff --git a/freed-ora/current/f18/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch b/freed-ora/current/f18/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch deleted file mode 100644 index 818e2d9c4..000000000 --- a/freed-ora/current/f18/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch +++ /dev/null @@ -1,38 +0,0 @@ -From ef3313e84acbf349caecae942ab3ab731471f1a1 Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:48 +0000 -Subject: [PATCH] ax25: fix info leak via msg_name in ax25_recvmsg() - -When msg_namelen is non-zero the sockaddr info gets filled out, as -requested, but the code fails to initialize the padding bytes of struct -sockaddr_ax25 inserted by the compiler for alignment. Additionally the -msg_namelen value is updated to sizeof(struct full_sockaddr_ax25) but is -not always filled up to this size. - -Both issues lead to the fact that the code will leak uninitialized -kernel stack bytes in net/socket.c. - -Fix both issues by initializing the memory with memset(0). - -Cc: Ralf Baechle <ralf@linux-mips.org> -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/ax25/af_ax25.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/net/ax25/af_ax25.c b/net/ax25/af_ax25.c -index 7b11f8b..e277e38 100644 ---- a/net/ax25/af_ax25.c -+++ b/net/ax25/af_ax25.c -@@ -1642,6 +1642,7 @@ static int ax25_recvmsg(struct kiocb *iocb, struct socket *sock, - ax25_address src; - const unsigned char *mac = skb_mac_header(skb); - -+ memset(sax, 0, sizeof(struct full_sockaddr_ax25)); - ax25_addr_parse(mac + 1, skb->data - mac - 1, &src, NULL, - &digi, NULL, NULL); - sax->sax25_family = AF_AX25; --- -1.8.1.4 - diff --git a/freed-ora/current/f18/deblob-3.8 b/freed-ora/current/f18/deblob-3.8 index 31417db08..48488c3a7 100755 --- a/freed-ora/current/f18/deblob-3.8 +++ b/freed-ora/current/f18/deblob-3.8 @@ -48,7 +48,7 @@ # For each kver release, start extra with an empty string, then count # from 1 if changes are needed that require rebuilding the tarball. -kver=3.8 extra= +kver=3.8 extra=1 case $1 in --force) @@ -1665,17 +1665,6 @@ clean_blob drivers/net/wireless/ath/ath6kl/usb.c clean_kconfig drivers/net/wireless/ath/ath6kl/Kconfig 'ATH6KL_USB' clean_mk CONFIG_ATH6KL_USB drivers/net/wireless/ath/ath6kl/Makefile -announce ATH9K - "Atheros 802.11n wireless cards support" -reject_firmware drivers/net/wireless/ath/ath9k/init.c -clean_kconfig drivers/net/wireless/ath/ath9k/Kconfig 'ATH9K' -clean_mk CONFIG_ATH9K drivers/net/wireless/ath/ath9k/Makefile - -announce ATH9K_HTC - "Atheros HTC based wireless cards support" -reject_firmware drivers/net/wireless/ath/ath9k/hif_usb.c -clean_blob drivers/net/wireless/ath/ath9k/hif_usb.c -clean_kconfig drivers/net/wireless/ath/ath9k/Kconfig 'ATH9K_HTC' -clean_mk CONFIG_ATH9K_HTC drivers/net/wireless/ath/ath9k/Makefile - announce PRISM2_USB - "Prism2.5/3 USB driver" reject_firmware drivers/staging/wlan-ng/prism2fw.c clean_blob drivers/staging/wlan-ng/prism2fw.c diff --git a/freed-ora/current/f18/deblob-check b/freed-ora/current/f18/deblob-check index 4d9a7e90d..ce469b9cb 100755 --- a/freed-ora/current/f18/deblob-check +++ b/freed-ora/current/f18/deblob-check @@ -1,6 +1,6 @@ #! /bin/sh -# deblob-check version 2013-04-18 +# deblob-check version 2013-04-28 # Inspired in gNewSense's find-firmware script. # Written by Alexandre Oliva <lxoliva@fsfla.org> @@ -1878,7 +1878,7 @@ set_except () { initnc '[ ][ ]static[ ]unsigned[ ]char[ ]const[ ]data_bit\[64\][ ]=' initnc '[ ][ ]static[ ]const[ ]u8[ ]data_sbit\[32\][ ]=' initnc '[ ]\.RightCoefs[ ]=' - initnc '[ ]#define[ ]WakeupSeq[ ][ ][ ][ ][{]' + defsnc '[ ]#define[ ]WakeupSeq[ ][ ][ ][ ][{]' drivers/net/ethernet/i825xx/eepro.c initnc '[ ]SetRate44100\[\][ ]=' initnc '[ ]const[ ]short[ ]period\[32\][ ]=' defsnc '[ ]\(const[ ]static\|static[ ]const\)[ ]int[ ]desc_idx_table\[\][ ]=' 'arch/arm/include/asm/hardware/iop3xx-adma.h|include/asm-arm/hardware/iop3xx-adma.h' @@ -1901,7 +1901,7 @@ set_except () { defsnc '[ ]static[ ]u16[ ]tables\[\][ ]=' drivers/media/pci/meye/meye.c initnc '[ ]static[ ]u32[ ]logMagTable\[128\][ ]=' defsnc '[ ]static[ ]u8[ ]init_bufs\[13\]\[5\][ ]=' drivers/media/pci/cx88/cx88-cards.c - initnc '[ ]static[ ]u_short[ ]geometry_table\[\]\[[45]\][ ]=' + defsnc '[ ]static[ ]u_short[ ]geometry_table\[\]\[[45]\][ ]=' drivers/block/xd.c initnc '[ ]static[ ]unsigned[ ]char[ ]CRCTable1\[\][ ]=' initnc '[ ]static[ ]unsigned[ ]char[ ]CRCTable2\[\][ ]=' initnc '[ ]static[ ]unsigned[ ]char[ ]default_colors\[\][ ]=' @@ -2491,7 +2491,6 @@ set_except () { defsnc 'static[ ]struct[ ]v_table[ ]v_table\[\][ ]=' drivers/gpu/drm/i915/i915_dma.c blobname 'orinoco_ezusb_fw' drivers/net/wireless/orinoco/orinoco_usb.c defsc 'static[ ]const[ ]struct[ ]ar9300_eeprom[ ]ar9300_default[ ]=' drivers/net/wireless/ath/ath9k/ar9003_eeprom.c - blobname 'ar9271[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c accept '[ ]hif_dev->firmware[ ]=[ ]NULL[;]' drivers/net/wireless/ath/ath9k/hif_usb.c defsnc 'static[ ]const[ ]u32[ ]ar9300_2p[02]_\(radio\|mac\|baseband\)_postamble\[\]\[5\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h' defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(\(low\(est\)\?\|high\)_ob_db\|high_power\)_tx_gain_table_2p[02]\[\]\[5\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h' @@ -2555,7 +2554,6 @@ set_except () { blobname 'lgs8g75\.fw' drivers/media/dvb/frontends/lgs8gxx.c defsnc 'static[ ]const[ ]struct[ ]ucbus_write_cmd[ ]\(icx098bq\|lz24bp\)_start_[012]\[\][ ]=' drivers/media/video/gspca/sq930x.c defsnc '[}][ ]capconfig\[4\]\[2\][ ]=' drivers/media/video/gspca/sq930x.c - blobname 'ar7010\(_1_1\)\?[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c defsnc 'static[ ]u8[ ]sa2400_rf_rssi_map\[\][ ]=' drivers/net/wireless/rtl818x/rtl8180_sa2400.c defsnc 'static[ ]const[ ]unsigned[ ]char[ ]pwm_lookup_table\[256\][ ]=' drivers/platform/x86/compal-laptop.c defsnc 'static[ ]int[ ]tps6586x_\(ldo4\|sm2\|dvm\)_voltages\[\][ ]=' drivers/regulator/tps6586x-regulator.c @@ -2845,7 +2843,6 @@ set_except () { defsnc 'static[ ]struct[ ]pll_limit[ ]\(cle266\|k800\|cx700\|vx855\)_pll_limits\[\][ ]=' drivers/video/via/hw.c accept '[ ][ ]-e[ ]["][$]tmp_dir[/]lib[/]modules[/][$]KERNELRELEASE[/]modules\.dep\.bin["]' scripts/depmod.sh blobname 'wm8958_\(enh_eq\|mbc\(_vss\)\?\)\.wfw' sound/soc/codecs/wm8958-dsp2.c - blobname 'htc_\(7010\|9271\)\.fw' drivers/net/wireless/ath/ath9k/hif_usb.c blobname 'rtl_nic[/]rtl8168e-[12]\.fw' drivers/net/r8169.c defsnc '[ ]static[ ]const[ ]struct[ ]ephy_info[ ]e_info_8168e\[\][ ]=' drivers/net/r8169.c blobname 'ti-connectivity[/]wl128x-fw\(-ap\)\?\.bin' drivers/net/wireless/wl12xx/wl12xx.h @@ -3256,6 +3253,68 @@ set_except () { blobname '%s-dsp%d\.\(wmfw\|bin\)' sound/soc/codecs/wm_adsp.c blobname 'fw-4\.bin' drivers/net/wireless/ath/ath6kl/core.h accept '[ ]hdsp->firmware[ ]=[ ]fw' sound/pci/rme9652/hdsp.c + + # ath9k firmware is now Free Software. + accept '[ ]err[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]1[,][ ]name[,][ ]sc->dev[,][ ]GFP_KERNEL[,][\n][ ]*[&]ec[,][ ]ath9k_eeprom_request_cb[)][;]' drivers/net/wireless/ath/ath9k/init.c + accept '[#]define[ ]FIRMWARE_AR7010_1_1[ ]*["]htc_7010\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[#]define[ ]FIRMWARE_AR9271[ ]*["]htc_9271\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept 'MODULE_FIRMWARE[(]FIRMWARE_AR7010_1_1[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept 'MODULE_FIRMWARE[(]FIRMWARE_AR9271[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[ ]ret[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]true[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[,][ ]GFP_KERNEL[,][\n][ ]*hif_dev[,][ ]ath9k_hif_usb_firmware_cb[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[ ]ret[ ]=[ ]request_firmware[(][&]hif_dev->firmware[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[ ][ ]ret[ ]=[ ]request_firmware[(][&]fw[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + + # New in 3.9 + blobname 'imx[/]sdma[/]sdma-imx6q\.bin' arch/arm/boot/dts/imx6qdl.dtsi + accept '[ ]*nvidia,emc-registers[ ]=[ ]*<\(0x[0-9a-f]*[ \n]*\)*>[;]' arch/arm/boot/dts/tegra20-colibri-512.dtsi + blobname 'kernel[/]x86[/]microcode[/]GenuineIntel\.bin' arch/x86/kernel/microcode_intel_early.c + accept '[0-9][0-9]*[ ][0-3][ ][0-3][ ]0\([\n][0-9][0-9]*[ ][0-3][ ][0-3][ ]0\)*' Documentation/thermal/intel_powerclamp.txt + accept '[ ]return[ ]_request_firmware_load[(]fw_priv[,]' drivers/base/firmware_class.c + accept 'static[ ]int[\n]_request_firmware_prepare[(]struct[ ]firmware[ ][*][*]\?firmware_p' drivers/base/firmware_class.c + accept '[/][*][ ]called[ ]from[ ]request_firmware[(][)][ ]and[ ]request_firmware_work_func[(][)][ ][*][/]' drivers/base/firmware_class.c + accept '[ ]_request_firmware[(][&]fw[,][ ]fw_work->name' drivers/base/firmware_class.c + accept '[ ]put_device[(]fw_work->device[)][;][ ][/][*][ ]taken[ ]in[ ]request_firmware_nowait[(][)][ ][*][/]' drivers/base/firmware_class.c + defsnc 'static[ ]const[ ]u16[ ]x[48]_vectors\[\][ ]=' drivers/edac/amd64_edac.c + defsnc 'static[ ]const[ ]struct[ ]hdmiphy_config[ ]hdmiphy_v14_configs\[\][ ]=' drivers/gpu/drm/exynos/exynos_hdmi.c + defsnc 'static[ ]const[ ]u32[ ]oland_io_mc_regs\[TAHITI_IO_MC_REGS_SIZE\]\[2\][ ]=' drivers/gpu/drm/radeon/si.c + defsnc 'static[ ]const[ ]u8[ ]sixaxis_rdesc_fixup2\?\[\][ ]=' drivers/hid/hid-sony.c + defsnc 'static[ ]const[ ]struct[ ]reg_val[ ]tuner_init_fc0012\[\][ ]=' drivers/media/dvb-frontends/af9033_priv.h + defsnc '\(static[ ]\)\?struct[ ]linear_segments[ ]cnr_\(to_db\|\(64\|16\)qam\|qpsk\)_table\[\][ ]=' drivers/media/dvb-frontends/mb86a20s.c + blobname 'SlimISP_\(%\.2s\|..\)\.bin' drivers/media/i2c/s5c73m3/s5c73m3-core.c + defsc 'static[ ]const[ ]struct[ ]i2c_rv[ ]ov965x_init_regs\[\][ ]=' drivers/media/i2c/ov9650.c + accept 'static[ ]struct[ ]dvb_usb_device_properties[ ]vp7049_properties[ ]=[ ][{][\n]\([ ]\.\(caps\|usb_ctrl\)[ ]*=[ ][^",]*,[\n]*\)*[ ]\.firmware[ ]*=[ ]' drivers/media/dvb/dvb-usb/m920x.c + blobname 'dvb-usb-vp7049-0\.95\.fw' drivers/media/dvb/dvb-usb/m920x.c + # The blob name is just the chip name, so no point in deblobbing; + # more so considering the number of false positives this would + # bring about. + # blobname 'lp5521' drivers/leds/leds-lp5521.c + # blobname 'lp55231\?' drivers/leds/leds-lp5523.c + blobname 'lattice-ecp3\.bit' drivers/misc/lattice-ecp3-config.c + defsnc '[ ]*static[ ]const[ ]uint8_t[ ]rss_key\[UPT1_RSS_MAX_KEY_SIZE\][ ]=' drivers/net/vmxnet3/vmxnet3_drv.c + defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(mixed_ob_db\|type5\)_tx_gain_table_2p2\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9003_2p2_initvals.h + defsnc 'static[ ]const[ ]u32[ ]ar9340Modes_low_ob_db_and_spur_tx_gain_table_1p0\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9340_initvals.h + defsnc 'static[ ]const[ ]u32[ ]ar9485Modes_green_spur_ob_db_tx_gain_1_1\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9485_initvals.h + defsnc 'static[ ]const[ ]u32[ ]ar9580_1p0_type6_tx_gain_table\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9580_1p0_initvals.h + blobname 'iwlwifi-\(7260\|3160\)-' drivers/net/wireless/iwlwifi/pcie/7000.c + blobname 'mrvl[/]pcie8897_uapsta\.bin' drivers/net/wireless/mwifiex/pcie.h + accept 'static[ ]const[ ]struct[ ]mwifiex_pcie_device[ ]mwifiex_pcie\(8766\|8897\)[ ]=[ ][{][\n][ ]\.firmware[ ]*=' drivers/net/wireless/mwifiex/pcie.h + accept '[ ][ ]card->pcie\.firmware[ ]=' drivers/net/wireless/mwifiex/pcie.c + accept '[ ][ ]\.per_chan_pwr_limit_arr_11abg[ ]*=[ ][{][ 0xf,\n]*' drivers/net/wireless/ti/wl18xx/main.c + blobname 'ti-connectivity[/]wl18xx-fw-2\.bin' drivers/net/wireless/ti/wl18xx/main.c + blobname '%s-dsp%d-%s\.\(wmfw\|bin\)' sound/soc/codecs/wm_adsp.c + defsnc 'static[ ]const[ ]struct[ ]reg_addr[ ]\(idle_\)\?reg_addrs\[\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h + blobname '83xx_fw\.bin' drivers/net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c + defsnc 'static[ ]const[ ]unsigned[ ]int[ ]dump_num_registers\[NUM_CHIPS\]\[NUM_PRESETS\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h + defsnc 'static[ ]int[ ]pm2xxx_charger_voltage_map\[\][ ]=' drivers/power/pm2301_charger.c + accept '[ ][*][ ]comedi[ ]drivers\.[ ]The[ ]request_firmware[(][)][ ]hotplug' drivers/staging/comedi/comedi.h + blobname 'rp2\.fw' drivers/tty/serial/rp2.c + defsnc 'static[ ]const[ ]unsigned[ ]char[ ]seq_\(w\|rgb\)_gamma\[\][ ]=' drivers/video/backlight/lms501kf03.c + defsnc '[#]include[ ]<video[/]mmp_disp\.h>[\n]*static[ ]u16[ ]init\[\][ ]=' drivers/video/mmp/panel/tpo_tj032md01bw.c + defsnc 'static[ ]struct[ ]tegra_clk_pll_freq_table[ ]pll_[mpadcu]_freq_table\[\][ ]=' 'drivers/clk/tegra/clk-tegra[23]0\.c' + blobname 'ctefx\.bin' sound/pci/hda/patch_ca0132.c + defsnc 'static[ ]unsigned[ ]int[ ]\(voice_focus\|mic_svm\|equalizer\)_vals_lookup\[\][ ]=' sound/pci/hda/patch_ca0132.c + defsnc 'static[ ]struct[ ]hda_verb[ ]ca0132_init_verbs0\[\][ ]=' sound/pci/hda/patch_ca0132.c + defsnc 'static[ ]const[ ]int[ ]dmic_comp\[6\]\[6\][ ]=' sound/soc/codecs/max98090.c ;; */*freedo*.patch | */*logo*.patch) @@ -3265,7 +3324,109 @@ set_except () { */patch-3.8*) # Present in 3.8 but patched in stable releases. defsnc '\(static[ ]\)\?const[ ]u16[ ]dot11lcn_sw_ctrl_tbl_\(4313_\)\?\(bt_\)\?\(epa_\)\?\(p250_\)\?rev0\(_combo\)\?\[\][ ]=' 'drivers/\(staging\|net/wireless\)/brcm80211/\(phy/wlc_phy_lcn\.c\|brcmsmac/phy/phytbl_lcn\.c\)' - ;; + # ath9k firmware is now Free Software. + accept '[ ]err[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]1[,][ ]name[,][ ]sc->dev[,][ ]GFP_KERNEL[,][\n][ ]*[&]ec[,][ ]ath9k_eeprom_request_cb[)][;]' drivers/net/wireless/ath/ath9k/init.c + accept '[#]define[ ]FIRMWARE_AR7010_1_1[ ]*["]htc_7010\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[#]define[ ]FIRMWARE_AR9271[ ]*["]htc_9271\.fw["]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept 'MODULE_FIRMWARE[(]FIRMWARE_AR7010_1_1[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept 'MODULE_FIRMWARE[(]FIRMWARE_AR9271[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[ ]ret[ ]=[ ]request_firmware_nowait[(]THIS_MODULE[,][ ]true[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[,][ ]GFP_KERNEL[,][\n][ ]*hif_dev[,][ ]ath9k_hif_usb_firmware_cb[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[ ]ret[ ]=[ ]request_firmware[(][&]hif_dev->firmware[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + accept '[ ][ ]ret[ ]=[ ]request_firmware[(][&]fw[,][ ]hif_dev->fw_name[,][\n][ ]*[&]hif_dev->udev->dev[)][;]' drivers/net/wireless/ath/ath9k/hif_usb.c + # Present in 3.8 + accept '[ ]-[ ]request_firmware[(][)][ ]hotplug[ ]interface[ ]info.' Documentation/00-INDEX + defsnc 'static[ ]struct[ ]nand_ecclayout[ ]qi_lb60_ecclayout_[12]gb[ ]=' arch/mips/jz4740/board-qi_lb60.c + defsnc 'static[ ]struct[ ]comp_testvec[ ]\(deflate\|lzo\)_\(de\)\?comp_tv_template\[\][ ]=' 'crypto/\(tcrypt\|testmgr\).h' + defsc 'static[ ]const[ ]struct[ ]minimode[ ]est3_modes\[\][ ]=' drivers/gpu/drm/drm_edid_modes.h + defsnc 'static[ ]const[ ]u32[ ]ar955x_1p0_\(radio\|baseband\|mac\)_postamble\[\]\[5\][ ]' drivers/net/wireless/ath/ath9k/ar955x_1p0_initvals.h + defsnc 'static[ ]const[ ]u32[ ]ar955x_1p0_modes_\(no_\)\?xpa_tx_gain_table\[\]\[9\][ ]=' drivers/net/wireless/ath/ath9k/955x_1p0_initvals.h + defsnc 'static[ ]struct[ ]pinmux_cfg_reg[ ]pinmux_config_regs\[\][ ]=' 'arch/sh/kernel/cpu/sh2a/pinmux-sh7203\.c\|arch/arm/mach-shmobile/pfc-sh73[67]7\.c' + accept '#define[ ]CONFIG_PATH[ ]*["][/]etc[/]vntconfiguration[.]dat["]' drivers/staging/vt6655/device_cfg.h + # For 3.8-to-3.9 patch: + accept '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?\(static[ ]\(void\|int\)[ ]\)\?_\?request_firmware\(_load\|_work_func\)\?[(]' drivers/base/firmware_class.c + accept '[ ]ret[ ]=[ ]_request_firmware_prepare[(]' drivers/base/firmware_class.c + accept '[ ]*return[ ]_request_firmware[(]firmware_p,' drivers/base/firmware_class.c + initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]const[ ]struct[ ]reg_val[ ]tuner_init_f\(c0011\[\][ ]=\)\?\(\([ ][{]\)\?[*][/][;]\)\?' drivers/media/dvb/frontends/af9033_priv.h + initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]struct[ ]regdata[ ]mb86a20s_init\[\][ ]=\([ ]\?[{]\?[*][/][;]\)\?' drivers/media/dvb/frontends/mb86a20s.c + accept '[ ]\.firmware[ ]=[ ]\(DW210[24]\|DW3101\|S630\)_FIRMWARE' drivers/media/usb/dvb-usb/dw2102.c + accept '[ ]\(p1100\|s660\|p7500\)->firmware[ ]=[ ]\(P1100\|S660\|P7500\)_FIRMWARE' drivers/media/usb/dvb-usb/dw2102.c + defsnc 'static[ ]const[ ]u32[ ]ar9485Modes_green_ob_db_tx_gain_1_1\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9485_initvals.h + initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]const[ ]u32[ ]ar955x_1p0_\(radio\|baseband\|mac\)_pos\(tamble\[\]\[5\][ ]=\)\?\([ ]\?[{]\?[*][/][;]\)\?' drivers/net/wireless/ath/ath9k/ar955x_1p0_initvals.h + defsnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]const[ ]u32[ ]ar955x_1p0_modes_\(no_\)\?xpa_tx\(_gain_table\[\]\[9\][ ]=\)\?\([ ]\?[{]\?[*][/][;]\)\?' drivers/net/wireless/ath/ath9k/955x_1p0_initvals.h + initnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?u16[ ]MCS_DATA_RATE\[2\]\[2\]\[77\][ ]=\([*][/][;]\)\?' 'drivers/staging/\(rtl8192su/ieee80211/rtl819x_HTProc\.c\|rtl8192u/r819xU_firmware\.c\)' + accept '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?static[ ]int[ ]do_mod_firmware_load[(]' sound/sound_firmware.c + # New in 3.9 + blobname 'imx[/]sdma[/]sdma-imx6q\.bin' arch/arm/boot/dts/imx6qdl.dtsi + accept '[ ]*nvidia,emc-registers[ ]=[ ]*<\(0x[0-9a-f]*[ \n]*\)*>[;]' arch/arm/boot/dts/tegra20-colibri-512.dtsi + blobname 'kernel[/]x86[/]microcode[/]GenuineIntel\.bin' arch/x86/kernel/microcode_intel_early.c + accept '[0-9][0-9]*[ ][0-3][ ][0-3][ ]0\([\n][0-9][0-9]*[ ][0-3][ ][0-3][ ]0\)*' Documentation/thermal/intel_powerclamp.txt + accept '[ ]return[ ]_request_firmware_load[(]fw_priv[,]' drivers/base/firmware_class.c + accept 'static[ ]int[\n]_request_firmware_prepare[(]struct[ ]firmware[ ][*][*]\?firmware_p' drivers/base/firmware_class.c + accept '[/][*][ ]called[ ]from[ ]request_firmware[(][)][ ]and[ ]request_firmware_work_func[(][)][ ][*][/]' drivers/base/firmware_class.c + accept '[ ]_request_firmware[(][&]fw[,][ ]fw_work->name' drivers/base/firmware_class.c + accept '[ ]put_device[(]fw_work->device[)][;][ ][/][*][ ]taken[ ]in[ ]request_firmware_nowait[(][)][ ][*][/]' drivers/base/firmware_class.c + defsnc 'static[ ]const[ ]u16[ ]x[48]_vectors\[\][ ]=' drivers/edac/amd64_edac.c + defsnc 'static[ ]const[ ]struct[ ]hdmiphy_config[ ]hdmiphy_v14_configs\[\][ ]=' drivers/gpu/drm/exynos/exynos_hdmi.c + defsnc 'static[ ]const[ ]u32[ ]oland_io_mc_regs\[TAHITI_IO_MC_REGS_SIZE\]\[2\][ ]=' drivers/gpu/drm/radeon/si.c + defsnc 'static[ ]const[ ]u8[ ]sixaxis_rdesc_fixup2\?\[\][ ]=' drivers/hid/hid-sony.c + defsnc 'static[ ]const[ ]struct[ ]reg_val[ ]tuner_init_fc0012\[\][ ]=' drivers/media/dvb-frontends/af9033_priv.h + defsnc '\(static[ ]\)\?struct[ ]linear_segments[ ]cnr_\(to_db\|\(64\|16\)qam\|qpsk\)_table\[\][ ]=' drivers/media/dvb-frontends/mb86a20s.c + blobname 'SlimISP_\(%\.2s\|..\)\.bin' drivers/media/i2c/s5c73m3/s5c73m3-core.c + defsc 'static[ ]const[ ]struct[ ]i2c_rv[ ]ov965x_init_regs\[\][ ]=' drivers/media/i2c/ov9650.c + accept 'static[ ]struct[ ]dvb_usb_device_properties[ ]vp7049_properties[ ]=[ ][{][\n]\([ ]\.\(caps\|usb_ctrl\)[ ]*=[ ][^",]*,[\n]*\)*[ ]\.firmware[ ]*=[ ]' drivers/media/dvb/dvb-usb/m920x.c + blobname 'dvb-usb-vp7049-0\.95\.fw' drivers/media/dvb/dvb-usb/m920x.c + # The blob name is just the chip name, so no point in deblobbing; + # more so considering the number of false positives this would + # bring about. + # blobname 'lp5521' drivers/leds/leds-lp5521.c + # blobname 'lp55231\?' drivers/leds/leds-lp5523.c + blobname 'lattice-ecp3\.bit' drivers/misc/lattice-ecp3-config.c + defsnc '[ ]*static[ ]const[ ]uint8_t[ ]rss_key\[UPT1_RSS_MAX_KEY_SIZE\][ ]=' drivers/net/vmxnet3/vmxnet3_drv.c + defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(mixed_ob_db\|type5\)_tx_gain_table_2p2\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9003_2p2_initvals.h + defsnc 'static[ ]const[ ]u32[ ]ar9340Modes_low_ob_db_and_spur_tx_gain_table_1p0\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9340_initvals.h + defsnc 'static[ ]const[ ]u32[ ]ar9485Modes_green_spur_ob_db_tx_gain_1_1\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9485_initvals.h + defsnc 'static[ ]const[ ]u32[ ]ar9580_1p0_type6_tx_gain_table\[\]\[5\][ ]=' drivers/net/wireless/ath/ath9k/ar9580_1p0_initvals.h + blobname 'iwlwifi-\(7260\|3160\)-' drivers/net/wireless/iwlwifi/pcie/7000.c + blobname 'mrvl[/]pcie8897_uapsta\.bin' drivers/net/wireless/mwifiex/pcie.h + accept 'static[ ]const[ ]struct[ ]mwifiex_pcie_device[ ]mwifiex_pcie\(8766\|8897\)[ ]=[ ][{][\n][ ]\.firmware[ ]*=' drivers/net/wireless/mwifiex/pcie.h + accept '[ ][ ]card->pcie\.firmware[ ]=' drivers/net/wireless/mwifiex/pcie.c + accept '[ ][ ]\.per_chan_pwr_limit_arr_11abg[ ]*=[ ][{][ 0xf,\n]*' drivers/net/wireless/ti/wl18xx/main.c + blobname 'ti-connectivity[/]wl18xx-fw-2\.bin' drivers/net/wireless/ti/wl18xx/main.c + blobname '%s-dsp%d-%s\.\(wmfw\|bin\)' sound/soc/codecs/wm_adsp.c + defsnc 'static[ ]const[ ]struct[ ]reg_addr[ ]\(idle_\)\?reg_addrs\[\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h + blobname '83xx_fw\.bin' drivers/net/ethernet/qlogic/qlcnic/qlcnic_83xx_hw.c + defsnc 'static[ ]const[ ]unsigned[ ]int[ ]dump_num_registers\[NUM_CHIPS\]\[NUM_PRESETS\][ ]=' drivers/net/ethernet/broadcom/bnx2x/bnx2x_dump.h + defsnc 'static[ ]int[ ]pm2xxx_charger_voltage_map\[\][ ]=' drivers/power/pm2301_charger.c + accept '[ ][*][ ]comedi[ ]drivers\.[ ]The[ ]request_firmware[(][)][ ]hotplug' drivers/staging/comedi/comedi.h + blobname 'rp2\.fw' drivers/tty/serial/rp2.c + defsnc 'static[ ]const[ ]unsigned[ ]char[ ]seq_\(w\|rgb\)_gamma\[\][ ]=' drivers/video/backlight/lms501kf03.c + defsnc '[#]include[ ]<video[/]mmp_disp\.h>[\n]*static[ ]u16[ ]init\[\][ ]=' drivers/video/mmp/panel/tpo_tj032md01bw.c + defsnc 'static[ ]struct[ ]tegra_clk_pll_freq_table[ ]pll_[mpadcu]_freq_table\[\][ ]=' 'drivers/clk/tegra/clk-tegra[23]0\.c' + blobname 'ctefx\.bin' sound/pci/hda/patch_ca0132.c + defsnc 'static[ ]unsigned[ ]int[ ]\(voice_focus\|mic_svm\|equalizer\)_vals_lookup\[\][ ]=' sound/pci/hda/patch_ca0132.c + defsnc 'static[ ]struct[ ]hda_verb[ ]ca0132_init_verbs0\[\][ ]=' sound/pci/hda/patch_ca0132.c + defsnc 'static[ ]const[ ]int[ ]dmic_comp\[6\]\[6\][ ]=' sound/soc/codecs/max98090.c + # Reverse 3.8-to-3.9 patch: + accept '0x102c[ ][ ][ ][ ][ ]0x6151[\n]'"$blobpat*" Documentation/video4linux/et61x251.txt + accept '0x041e[ ][ ][ ][ ][ ]0x4017[\n]'"$blobpat*" Documentation/video4linux/zc0301.txt + defsnc 'static[ ]struct[ ]clk_pll_\(freq_\)\?table[ ]tegra_pll_[adpxm]_\(freq_\)\?table\[\][ ]=' arch/arm/mach-tegra/tegra2_clocks.c + defsnc 'static[ ]struct[ ]clk_pll_freq_table[ ]tegra_pll_[cu]_freq_table\[\][ ]=' arch/arm/mach-tegra/tegra30_clocks.c + accept '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?\(static[ ]\(void\|int\)[ ]\)\?_\?request_firmware\(_cleanup\|_prepare\)\?[(]' drivers/base/firmware_class.c + accept '[ ]*\(\(fw_priv\|ret\)[ ]=[ ]\)\?_\?request_firmware_\(load\|prepare\|cleanup\)' drivers/base/firmware_class.c + defsnc '[ ]static[ ]u_short[ ]geometry_table\[\]\[[45]\][ ]=' drivers/block/xd.c + defsnc 'static[ ]const[ ]u8[ ]hdmiphy_conf\(27\(_027\)\?\|74\(_175\|_25\)\|148_5\)\[32\][ ]=' drivers/media/video/s5p-tv/hdmiphy_drv.c + defsnc 'static[ ]const[ ]u8[ ]hdmiphy_conf74_176\[32\][ ]=' drivers/gpu/drm/exynos/exynos_hdmi.c + accept '[ ]\.firmware[ ]=[ ]["][/][*][(]DEBLOBBED[)][*][/]["]' drivers/media/usb/dvb-usb/dw2102.c + accept '[ ]\(p1100\|s660\)->firmware[ ]=' drivers/media/dvb/dvb-usb/dw2102.c + accept '[ ]p7500->firmware[ ]=' drivers/media/dvb/dvb-usb/dw2102.c + defsnc '[ ]#define[ ]WakeupSeq[ ][ ][ ][ ][{]' drivers/net/ethernet/i825xx/eepro.c + defsnc '\([;][/][*]@@[ ]-[0-9]*,[0-9]*[ ][+][0-9]*,[0-9]*[ ]@@[ ]\)\?\(static[ ]\)\?\(const[ ]\)\?\(struct[ ]\)\?\(SiS\|XGI\)_[ME]CLKData\(Struct\)\?[ ]XGI\(340\|27\)\(\(New\)\?_[ME]CLKData\[\][ ]*=\|N\)\?\([ ]\?[{]\?[*][/][;]\)\?' drivers/staging/xgifb/vb_table.h + defsnc '\(static[ ]\)\?\(const[ ]\)\?\(UCHAR\|unsigned[ ]char\)[ ]XGI340_CR6[BE]\[8\]\[4\][ ]*=' drivers/staging/xgifb/vb_table.h + ;; + + */drm-qxl-driver.patch) + defsnc '[ ][}][ ]common_modes\[\][ ]=' drivers/gpu/drm/qxl/qxl_display.c + ;; */patch-3.7*) # Removed chunks matched by entries that don't appear in the patch context. @@ -4712,7 +4873,6 @@ set_except () { defsnc 'static[ ]const[ ]u32[ ]ar9300Modes_\(\(low\(est\)\?\|high\)_ob_db\|high_power\)_tx_gain_table_2p[02]\[\]\[5\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h' defsnc 'static[ ]const[ ]u32[ ]ar9\(300\|200_merlin\)_2p[02]_\(radio\|mac\|baseband\)_core\[\]\[2\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h' defsnc 'static[ ]const[ ]u32[ ]ar9300Common_\(wo_xlna_\)\?rx_gain_table_\(merlin_\)\?2p[02]\[\]\[2\][ ]=' 'drivers/net/wireless/ath/ath9k/ar9003_\(2p[02]_\)\?initvals\.h' - blobname 'ar9271[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c accept 'static[ ]int[ ]ipw2100_mod_firmware_load[(]' 'drivers/net/wireless/\(ipw2x00/\)\?ipw2100\.c' accept '[ ]*card->firmware[ ]=[ ]\(if_sdio\|lbs_fw\|fw_name\)' drivers/net/wireless/libertas/if_sdio.c blobname 'rt\(28[67]0\|30[79][01]\)\.bin' drivers/staging/rt2860/common/rtmp_mcu.c @@ -4753,7 +4913,6 @@ set_except () { blobname 'lgs8g75\.fw' drivers/media/dvb/frontends/lgs8gxx.c defsnc 'static[ ]const[ ]struct[ ]ucbus_write_cmd[ ]\(icx098bq\|lz24bp\)_start_[012]\[\][ ]=' drivers/media/video/gspca/sq930x.c defsnc '[}][ ]capconfig\[4\]\[2\][ ]=' drivers/media/video/gspca/sq930x.c - blobname 'ar7010\(_1_1\)\?[.]fw' drivers/net/wireless/ath/ath9k/hif_usb.c defsnc 'static[ ]u8[ ]sa2400_rf_rssi_map\[\][ ]=' drivers/net/wireless/rtl818x/rtl8180_sa2400.c defsnc 'static[ ]const[ ]unsigned[ ]char[ ]pwm_lookup_table\[256\][ ]=' drivers/platform/x86/compal-laptop.c defsnc 'static[ ]int[ ]tps6586x_\(ldo4\|sm2\|dvm\)_voltages\[\][ ]=' drivers/regulator/tps6586x-regulator.c diff --git a/freed-ora/current/f18/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch b/freed-ora/current/f18/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch deleted file mode 100644 index 074d2b48a..000000000 --- a/freed-ora/current/f18/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch +++ /dev/null @@ -1,37 +0,0 @@ -From 5ae94c0d2f0bed41d6718be743985d61b7f5c47d Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:53 +0000 -Subject: [PATCH] irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - -The current code does not fill the msg_name member in case it is set. -It also does not set the msg_namelen member to 0 and therefore makes -net/socket.c leak the local, uninitialized sockaddr_storage variable -to userland -- 128 bytes of kernel stack memory. - -Fix that by simply setting msg_namelen to 0 as obviously nobody cared -about irda_recvmsg_dgram() not filling the msg_name in case it was -set. - -Cc: Samuel Ortiz <samuel@sortiz.org> -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/irda/af_irda.c | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/net/irda/af_irda.c b/net/irda/af_irda.c -index d28e7f0..e493b33 100644 ---- a/net/irda/af_irda.c -+++ b/net/irda/af_irda.c -@@ -1386,6 +1386,8 @@ static int irda_recvmsg_dgram(struct kiocb *iocb, struct socket *sock, - - IRDA_DEBUG(4, "%s()\n", __func__); - -+ msg->msg_namelen = 0; -+ - skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT, - flags & MSG_DONTWAIT, &err); - if (!skb) --- -1.8.1.4 - diff --git a/freed-ora/current/f18/kernel.spec b/freed-ora/current/f18/kernel.spec index b2cfdc5c9..672cbf24b 100644 --- a/freed-ora/current/f18/kernel.spec +++ b/freed-ora/current/f18/kernel.spec @@ -72,7 +72,7 @@ Summary: The Linux kernel # librev starts empty, then 1, etc, as the linux-libre tarball # changes. This is only used to determine which tarball to use. -#define librev +%define librev 1 %define baselibre -libre %define basegnu -gnu%{?librev} @@ -112,7 +112,7 @@ Summary: The Linux kernel %if 0%{?released_kernel} # Do we have a -stable update to apply? -%define stable_update 10 +%define stable_update 11 # Is it a -stable RC? %define stable_rc 0 # Set rpm version accordingly @@ -847,39 +847,6 @@ Patch25010: wireless-regulatory-fix-channel-disabling-race-condition.patch #rhbz 951241 Patch25011: iwlwifi-fix-freeing-uninitialized-pointer.patch -#CVE-2013-3222 rhbz 955216 955228 -Patch25014: atm-update-msg_namelen-in-vcc_recvmsg.patch - -#CVE-2013-3224 rhbz 955599 955607 -Patch25015: Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch - -#CVE-2013-1979 rhbz 955629 955647 -Patch25016: net-fix-incorrect-credentials-passing.patch - -#CVE-2013-3225 rhbz 955649 955658 -Patch25017: Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch - -#CVE-2013-3223 rhbz 955662 955666 -Patch25018: ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch - -#CVE-2013-3234 956135 956139 -Patch25020: rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch - -#CVE-2013-3233 956125 956129 -Patch25021: NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch - -#CVE-2013-3232 956110 956113 -Patch25022: netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch - -#CVE-2013-3231 956094 956104 -Patch25023: llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch - -#CVE-2013-3230 956088 956089 -Patch25024: l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch - -#CVE-2013-3228 956069 956071 -Patch25025: irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch - # END OF PATCH DEFINITIONS %endif @@ -1681,39 +1648,6 @@ ApplyPatch wireless-regulatory-fix-channel-disabling-race-condition.patch #rhbz 951241 ApplyPatch iwlwifi-fix-freeing-uninitialized-pointer.patch -#CVE-2013-3222 rhbz 955216 955228 -ApplyPatch atm-update-msg_namelen-in-vcc_recvmsg.patch - -#CVE-2013-3224 rhbz 955599 955607 -ApplyPatch Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch - -#CVE-2013-1979 rhbz 955629 955647 -ApplyPatch net-fix-incorrect-credentials-passing.patch - -#CVE-2013-3225 rhbz 955649 955658 -ApplyPatch Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch - -#CVE-2013-3223 rhbz 955662 955666 -ApplyPatch ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch - -#CVE-2013-3234 956135 956139 -ApplyPatch rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch - -#CVE-2013-3233 956125 956129 -ApplyPatch NFC-llcp-fix-info-leaks-via-msg_name-in-llcp_sock_re.patch - -#CVE-2013-3232 956110 956113 -ApplyPatch netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch - -#CVE-2013-3231 956094 956104 -ApplyPatch llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch - -#CVE-2013-3230 956088 956089 -ApplyPatch l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch - -#CVE-2013-3228 956069 956071 -ApplyPatch irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch - # END OF PATCH APPLICATIONS %endif @@ -2582,6 +2516,12 @@ fi # ||----w | # || || %changelog +* Thu May 2 2013 Alexandre Oliva <lxoliva@fsfla.org> -libre +- GNU Linux-libre 3.8.11-gnu1. + +* Wed May 01 2013 Justin M. Forbes <jforbes@redhat.com> - 3.8.11-200 +- Linux v3.8.11 + * Mon Apr 29 2013 Alexandre Oliva <lxoliva@fsfla.org> -libre - GNU Linux-libre 3.8.10-gnu. diff --git a/freed-ora/current/f18/l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch b/freed-ora/current/f18/l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch deleted file mode 100644 index 5ea7a7da6..000000000 --- a/freed-ora/current/f18/l2tp-fix-info-leak-in-l2tp_ip6_recvmsg.patch +++ /dev/null @@ -1,32 +0,0 @@ -From b860d3cc62877fad02863e2a08efff69a19382d2 Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:55 +0000 -Subject: [PATCH] l2tp: fix info leak in l2tp_ip6_recvmsg() - -The L2TP code for IPv6 fails to initialize the l2tp_conn_id member of -struct sockaddr_l2tpip6 and therefore leaks four bytes kernel stack -in l2tp_ip6_recvmsg() in case msg_name is set. - -Initialize l2tp_conn_id with 0 to avoid the info leak. - -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/l2tp/l2tp_ip6.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/net/l2tp/l2tp_ip6.c b/net/l2tp/l2tp_ip6.c -index c74f5a9..b8a6039 100644 ---- a/net/l2tp/l2tp_ip6.c -+++ b/net/l2tp/l2tp_ip6.c -@@ -690,6 +690,7 @@ static int l2tp_ip6_recvmsg(struct kiocb *iocb, struct sock *sk, - lsa->l2tp_addr = ipv6_hdr(skb)->saddr; - lsa->l2tp_flowinfo = 0; - lsa->l2tp_scope_id = 0; -+ lsa->l2tp_conn_id = 0; - if (ipv6_addr_type(&lsa->l2tp_addr) & IPV6_ADDR_LINKLOCAL) - lsa->l2tp_scope_id = IP6CB(skb)->iif; - } --- -1.8.1.4 - diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu.tar.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu.tar.xz.sign deleted file mode 100644 index 753ef9cf1..000000000 --- a/freed-ora/current/f18/linux-libre-3.8-gnu.tar.xz.sign +++ /dev/null @@ -1,7 +0,0 @@ ------BEGIN PGP SIGNATURE----- -Version: GnuPG v2.0.19 (GNU/Linux) - -iEYEABECAAYFAlEjLMYACgkQvLfPh359R6ffmgCcDZpvPTimpapmVA+xdWhvxMK5 -voMAoKEyhPHcSLaQ4i9EkBCFP7Sx4bbG -=DHJB ------END PGP SIGNATURE----- diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz b/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz Binary files differdeleted file mode 100644 index aeef10085..000000000 --- a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz +++ /dev/null diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz.sign deleted file mode 100644 index 31a3959c5..000000000 --- a/freed-ora/current/f18/linux-libre-3.8-gnu.xdelta.xz.sign +++ /dev/null @@ -1,7 +0,0 @@ ------BEGIN PGP SIGNATURE----- -Version: GnuPG v2.0.19 (GNU/Linux) - -iEYEABECAAYFAlEjLMgACgkQvLfPh359R6eF0gCfco+hIPIuv0P6gUm6GyIYWCHe -IzQAnjz7Wk0CjItrSdKNHok5oy6WgII6 -=AjHg ------END PGP SIGNATURE----- diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu1.tar.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu1.tar.xz.sign new file mode 100644 index 000000000..78fc2939b --- /dev/null +++ b/freed-ora/current/f18/linux-libre-3.8-gnu1.tar.xz.sign @@ -0,0 +1,7 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0.19 (GNU/Linux) + +iEYEABECAAYFAlGBhsoACgkQvLfPh359R6eEoQCdGD58ILSEuCPNVj8UnUkDgrjJ +EzQAoKY9K35Kke3Qi90aWzdIeyBz2VlR +=cmUV +-----END PGP SIGNATURE----- diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz Binary files differnew file mode 100644 index 000000000..3c8e85025 --- /dev/null +++ b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz diff --git a/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz.sign b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz.sign new file mode 100644 index 000000000..8bdd5d7eb --- /dev/null +++ b/freed-ora/current/f18/linux-libre-3.8-gnu1.xdelta.xz.sign @@ -0,0 +1,7 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0.19 (GNU/Linux) + +iEYEABECAAYFAlGBhtgACgkQvLfPh359R6fMIACdGdfCWIRWbQ2PsNRUyL56gh9m +NfsAnRmK9mXPq2Djm7iFmsvZ5rA67y2x +=Ppri +-----END PGP SIGNATURE----- diff --git a/freed-ora/current/f18/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch b/freed-ora/current/f18/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch deleted file mode 100644 index ef123b0f1..000000000 --- a/freed-ora/current/f18/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch +++ /dev/null @@ -1,37 +0,0 @@ -From c77a4b9cffb6215a15196ec499490d116dfad181 Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:56 +0000 -Subject: [PATCH] llc: Fix missing msg_namelen update in llc_ui_recvmsg() - -For stream sockets the code misses to update the msg_namelen member -to 0 and therefore makes net/socket.c leak the local, uninitialized -sockaddr_storage variable to userland -- 128 bytes of kernel stack -memory. The msg_namelen update is also missing for datagram sockets -in case the socket is shutting down during receive. - -Fix both issues by setting msg_namelen to 0 early. It will be -updated later if we're going to fill the msg_name member. - -Cc: Arnaldo Carvalho de Melo <acme@ghostprotocols.net> -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/llc/af_llc.c | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c -index 8870988..48aaa89 100644 ---- a/net/llc/af_llc.c -+++ b/net/llc/af_llc.c -@@ -720,6 +720,8 @@ static int llc_ui_recvmsg(struct kiocb *iocb, struct socket *sock, - int target; /* Read at least this many bytes */ - long timeo; - -+ msg->msg_namelen = 0; -+ - lock_sock(sk); - copied = -ENOTCONN; - if (unlikely(sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN)) --- -1.8.1.4 - diff --git a/freed-ora/current/f18/net-fix-incorrect-credentials-passing.patch b/freed-ora/current/f18/net-fix-incorrect-credentials-passing.patch deleted file mode 100644 index 639faba6e..000000000 --- a/freed-ora/current/f18/net-fix-incorrect-credentials-passing.patch +++ /dev/null @@ -1,45 +0,0 @@ -From 83f1b4ba917db5dc5a061a44b3403ddb6e783494 Mon Sep 17 00:00:00 2001 -From: Linus Torvalds <torvalds@linux-foundation.org> -Date: Fri, 19 Apr 2013 15:32:32 +0000 -Subject: [PATCH] net: fix incorrect credentials passing - -Commit 257b5358b32f ("scm: Capture the full credentials of the scm -sender") changed the credentials passing code to pass in the effective -uid/gid instead of the real uid/gid. - -Obviously this doesn't matter most of the time (since normally they are -the same), but it results in differences for suid binaries when the wrong -uid/gid ends up being used. - -This just undoes that (presumably unintentional) part of the commit. - -Reported-by: Andy Lutomirski <luto@amacapital.net> -Cc: Eric W. Biederman <ebiederm@xmission.com> -Cc: Serge E. Hallyn <serge@hallyn.com> -Cc: David S. Miller <davem@davemloft.net> -Cc: stable@vger.kernel.org -Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> -Acked-by: "Eric W. Biederman" <ebiederm@xmission.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - include/net/scm.h | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/include/net/scm.h b/include/net/scm.h -index 975cca0..b117081 100644 ---- a/include/net/scm.h -+++ b/include/net/scm.h -@@ -56,8 +56,8 @@ static __inline__ void scm_set_cred(struct scm_cookie *scm, - scm->pid = get_pid(pid); - scm->cred = cred ? get_cred(cred) : NULL; - scm->creds.pid = pid_vnr(pid); -- scm->creds.uid = cred ? cred->euid : INVALID_UID; -- scm->creds.gid = cred ? cred->egid : INVALID_GID; -+ scm->creds.uid = cred ? cred->uid : INVALID_UID; -+ scm->creds.gid = cred ? cred->gid : INVALID_GID; - } - - static __inline__ void scm_destroy_cred(struct scm_cookie *scm) --- -1.8.1.4 - diff --git a/freed-ora/current/f18/netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch b/freed-ora/current/f18/netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch deleted file mode 100644 index 3881896f5..000000000 --- a/freed-ora/current/f18/netrom-fix-invalid-use-of-sizeof-in-nr_recvmsg.patch +++ /dev/null @@ -1,35 +0,0 @@ -From fdbf33caa22d6648227c39c48ae395fb36e4bd7f Mon Sep 17 00:00:00 2001 -From: Wei Yongjun <yongjun_wei@trendmicro.com.cn> -Date: Tue, 9 Apr 2013 10:07:19 +0800 -Subject: [PATCH] netrom: fix invalid use of sizeof in nr_recvmsg() - -Upstream c802d759623acbd6e1ee9fbdabae89159a513913 - -sizeof() when applied to a pointer typed expression gives the size of the -pointer, not that of the pointed data. -Introduced by commit 3ce5ef(netrom: fix info leak via msg_name in nr_recvmsg) - -Signed-off-by: Wei Yongjun <yongjun_wei@trendmicro.com.cn> -Signed-off-by: David S. Miller <davem@davemloft.net> - -Conflicts: - net/netrom/af_netrom.c ---- - net/netrom/af_netrom.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/net/netrom/af_netrom.c b/net/netrom/af_netrom.c -index 7261eb8..f334fbd 100644 ---- a/net/netrom/af_netrom.c -+++ b/net/netrom/af_netrom.c -@@ -1177,6 +1177,7 @@ static int nr_recvmsg(struct kiocb *iocb, struct socket *sock, - } - - if (sax != NULL) { -+ memset(sax, 0, sizeof(*sax)); - sax->sax25_family = AF_NETROM; - skb_copy_from_linear_data_offset(skb, 7, sax->sax25_call.ax25_call, - AX25_ADDR_LEN); --- -1.8.1.4 - diff --git a/freed-ora/current/f18/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch b/freed-ora/current/f18/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch deleted file mode 100644 index 81f423f65..000000000 --- a/freed-ora/current/f18/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch +++ /dev/null @@ -1,36 +0,0 @@ -From 4a184233f21645cf0b719366210ed445d1024d72 Mon Sep 17 00:00:00 2001 -From: Mathias Krause <minipli@googlemail.com> -Date: Sun, 7 Apr 2013 01:51:59 +0000 -Subject: [PATCH] rose: fix info leak via msg_name in rose_recvmsg() - -The code in rose_recvmsg() does not initialize all of the members of -struct sockaddr_rose/full_sockaddr_rose when filling the sockaddr info. -Nor does it initialize the padding bytes of the structure inserted by -the compiler for alignment. This will lead to leaking uninitialized -kernel stack bytes in net/socket.c. - -Fix the issue by initializing the memory used for sockaddr info with -memset(0). - -Cc: Ralf Baechle <ralf@linux-mips.org> -Signed-off-by: Mathias Krause <minipli@googlemail.com> -Signed-off-by: David S. Miller <davem@davemloft.net> ---- - net/rose/af_rose.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/net/rose/af_rose.c b/net/rose/af_rose.c -index cf68e6e..9c83474 100644 ---- a/net/rose/af_rose.c -+++ b/net/rose/af_rose.c -@@ -1253,6 +1253,7 @@ static int rose_recvmsg(struct kiocb *iocb, struct socket *sock, - skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied); - - if (srose != NULL) { -+ memset(srose, 0, msg->msg_namelen); - srose->srose_family = AF_ROSE; - srose->srose_addr = rose->dest_addr; - srose->srose_call = rose->dest_call; --- -1.8.1.4 - diff --git a/freed-ora/current/f18/sources b/freed-ora/current/f18/sources index 74462d497..08ff4e562 100644 --- a/freed-ora/current/f18/sources +++ b/freed-ora/current/f18/sources @@ -1,2 +1,2 @@ -84c2a77910932ffc7d958744ac9cf2f5 linux-libre-3.8-gnu.tar.xz -973bc1c68bb5f082a66d20c94193d4ee patch-3.8.10.xz +5c7787be882c343e41fb49136ff60aec linux-libre-3.8-gnu1.tar.xz +76ec67882ad94b8ab43c70a46befca13 patch-3.8.11.xz |

