I've released the 026 version of udev. It can be found at:
kernel.org/pub/linux/utils/kernel/hotplug/udev-026.tar.gz
(yes, there was a 025 release, I just forgot to announce it, full
changelog is below)
udev allows users to have a dynamic /dev and provides the ability to
have persistent device names. It uses sysfs and /sbin/hotplug and runs
entirely in userspace. It requires a 2.6 kernel with CONFIG_HOTPLUG
enabled to run. Please see the udev FAQ for any questions about it:
kernel.org/pub/linux/utils/kernel/hotplug/udev-FAQ
For any udev vs devfs questions anyone might have, please see:
kernel.org/pub/linux/utils/kernel/hotplug/udev_vs_devfs
Major changes since 024:
- lots of minor bugfixes
- added udev_volume_id from Kay Sievers which is an excellent
way to read block volume ids to create udev rules.
- deleted the dbus and selinux programs as they were not the way
to integrate udev with those packages. DBUS integration
with udev is now handled by the HAL project using the
/etc/dev.d/ notifiers.
- update documentation. Thanks to Daniel Drake for this.
Thanks to everyone who has send me patches for this release, a full list
of everyone, and their changes is below.
udev development is done in a BitKeeper repository located at:
bk://linuxusb.bkbits.net/udev
Daily snapshots of udev from the BitKeeper tree can be found at:
http://www.codemonkey.org.uk/projects/bitkeeper/udev/
If anyone ever wants a tarball of the current bk tree, just email me.
thanks,
greg k-h
Summary of changes from v025 to v026
============================================
Arnd Bergmann:
o udev rpm fix
Greg Kroah-Hartman:
o add test for ! in partition name
o 025_bk mark
o Update to version 117 of klibc (from version 108)
o add volume_id ignore rule for bk
o add volume_id support to the udev.spec file
o remove dbus and selinux stuff from the udev.spec file
o delete udev_selinux as it doesn't work properly and is the wrong way to do it
o Deleted the udev_dbus extra as it didn't really work properly and HAL has a real solution now
o add udev.permissions.slackware file
o udevstart: close open directories
Kay Sievers:
o fix udevd zombies
o catchup with recent klibc
o Re: udevsend fallback
o udev_volume_id update
o udev callout for reading filesystem labels
o udev callout for reading filesystem labels
o udev default config layout changes
Leann Ogasawara:
o evaluate getenv() return value for udev_config.c
Summary of changes from v024 to v025
============================================
<md:linux.it>:
o devfs.sh-ide-floppy
<sjoerd:spring.luon.net>:
o DEVNODE -> DEVNAME transition fixes
Daniel Drake:
o Update writing udev rules docs
Greg Kroah-Hartman:
o make dev.d call each directory in the directory chain of the device name, instead of just the whole name
o add devd_test script
o add more permissions based on SuSE's recommendations
o added rules for tun and raw devices
o add udev conf.d file
o Switch the default config to point to a directory for the rules and permission files
o update the Red Hat .dev files to work on other distros
o add dbus.dev, pam_console.dev and selinux.dev files for /etc/dev.d/default/ usage
o add hints for red hat users from Leann Ogasawara <[email protected]>
o add scripts to run gcov for udev from Leann Ogasawara <[email protected]>
o change permissions on udevd test scripts
o Fix build process for users who have LC_ALL set to a non-english language
o Added expanded tests to the test framework from Leann Ogasawara <[email protected]>
o added execelent "writing udev rules" document from Daniel Drake <[email protected]>
o added rule to put USB printers in their proper places
o added rules for CAPI devices
o added a dev.d alsa script to help people out
o v024 release TAG: v024
Kay Sievers:
o fix test regressions
o udev_selinux changes
o udevd test script
o udev_dbus changes
o fix devpath for netdev
Leann Ogasawara:
o gcov for udev
There is a handle leak in failure path in file_map, and the result of
file_map (or the result of the caller of the file_map) is not always
checked.
--- udev_lib.c 2004-06-08 11:08:35.812419586 +0200
+++ udev_lib.c 2004-06-08 11:10:53.203654065 +0200
@@ -124,11 +124,13 @@ int file_map(const char *filename, char
}
if (fstat(fd, &stats) < 0) {
+ close(fd);
return -1;
}
*buf = mmap(NULL, stats.st_size, PROT_READ, MAP_SHARED, fd, 0);
if (*buf == MAP_FAILED) {
+ close(fd);
return -1;
}
*bufsize = stats.st_size;
On Tue, Jun 08, 2004 at 11:21:54AM +0200, Alex Riesen wrote:
> There is a handle leak in failure path in file_map, and the result of
> file_map (or the result of the caller of the file_map) is not always
> checked.
Thanks for the patch, applied.
greg k-h