Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1030321AbVIVUKi (ORCPT ); Thu, 22 Sep 2005 16:10:38 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1030325AbVIVUKi (ORCPT ); Thu, 22 Sep 2005 16:10:38 -0400 Received: from hera.kernel.org ([140.211.167.34]:60043 "EHLO hera.kernel.org") by vger.kernel.org with ESMTP id S1030321AbVIVUKh (ORCPT ); Thu, 22 Sep 2005 16:10:37 -0400 Date: Thu, 22 Sep 2005 17:04:46 -0300 From: Marcelo Tosatti To: Horms , suresh.b.siddha@intel.com Cc: Nikos Ntarmos , 329354@bugs.debian.org, Frederik Schueler , Linux Kernel Mailing List Subject: Re: CAN-2005-0204 and 2.4 Message-ID: <20050922200446.GB9472@dmt.cnet> References: <20050922023025.GA20981@verge.net.au> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20050922023025.GA20981@verge.net.au> User-Agent: Mutt/1.4.1i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2304 Lines: 56 On Thu, Sep 22, 2005 at 11:30:25AM +0900, Horms wrote: > On Wed, Sep 21, 2005 at 01:31:37PM +0300, Nikos Ntarmos wrote: > > Package: kernel-source-2.4.27 > > Version: 2.4.27-11.hls.2005082200 > > Severity: important > > Justification: fails to build from source > > > > Patch 143_outs.diff.bz2 breaks the kernel compilation on x86_64. The > > problem is that it uses the IO_BITMAP_BYTES macro which is defined for > > i386 (in linux/include/asm-i386/processor.h) but not for x86_64. > > Reverting the patch lets the kernel build again, although I guess the > > correct solution would be to add an appropriate IO_BITMAP_BYTES to > > linux/include/asm-x86_64/processor.h as well. > > Hi Nikos, > > First up, thanks for testing out my prebuild kernels. For the > uninitiated they are snapshots of what is in the deabian kernel-team's > SVN and live in http://packages.vergenet.net/testing/ > > The problem that you see is a patch that was included in > 2.4.27-11 (the current version in sid), though it isn't built > for amd64. > > Could you see if the following patch works for you. I've CCed lkml and > Marcelo for their consideration. It seems to me that 2.4 is indeed > vulnerable to CAN-2005-0204, perhaps someone can shed some light on > this. > > -- > Horms > > Description: [CAN-2005-0204]: AMD64, allows local users to write to privileged IO ports via OUTS instruction > Patch author: Suresh Siddha (suresh.b.siddha@intel.com) > Upstream status: not applied > URL: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=146244 > Patch source: Micah Anderson (debian-kernel) > > Added definition of IO_BITMAP_BYTES for Debian's 2.4.27 and > submitted upstream for consideration for inclusion in 2.4 -- Horms And v2.6 does not seem to have been updated either, or a different form of the fix has been deployed? 130 static inline void set_tss_desc(unsigned cpu, void *addr) 131 { 132 set_tssldt_descriptor(&cpu_gdt_table[cpu][GDT_ENTRY_TSS], (unsigned long)addr, 133 DESC_TSS, 134 sizeof(struct tss_struct) - 1); 135 } - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/