diff options
Diffstat (limited to 'meta/recipes-devtools')
-rw-r--r-- | meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4024.patch | 72 | ||||
-rw-r--r-- | meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4025.patch | 190 | ||||
-rw-r--r-- | meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-add-a-commment-and-fix-some-other-comments.patch | 38 | ||||
-rw-r--r-- | meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-fix-open-file-limit.patch | 215 | ||||
-rw-r--r-- | meta/recipes-devtools/squashfs-tools/squashfs-tools_4.3.bb (renamed from meta/recipes-devtools/squashfs-tools/squashfs-tools_4.2.bb) | 14 |
5 files changed, 5 insertions, 524 deletions
diff --git a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4024.patch b/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4024.patch deleted file mode 100644 index 8b9904fd56..0000000000 --- a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4024.patch +++ /dev/null | |||
@@ -1,72 +0,0 @@ | |||
1 | Upstream-Status: Backport | ||
2 | |||
3 | Reference:http://squashfs.git.sourceforge.net/git/gitweb.cgi?p= | ||
4 | squashfs/squashfs;a=commit;h=19c38fba0be1ce949ab44310d7f49887576cc123 | ||
5 | |||
6 | Fix potential stack overflow in get_component() where an individual | ||
7 | pathname component in an extract file (specified on the command line | ||
8 | or in an extract file) could exceed the 1024 byte sized targname | ||
9 | allocated on the stack. | ||
10 | |||
11 | Fix by dynamically allocating targname rather than storing it as | ||
12 | a fixed size on the stack. | ||
13 | |||
14 | Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com> | ||
15 | diff -urpN a/unsquashfs.c b/unsquashfs.c | ||
16 | --- a/unsquashfs.c 2012-11-29 17:04:08.000000000 +0800 | ||
17 | +++ b/unsquashfs.c 2012-11-29 17:04:25.000000000 +0800 | ||
18 | @@ -1034,15 +1034,18 @@ void squashfs_closedir(struct dir *dir) | ||
19 | } | ||
20 | |||
21 | |||
22 | -char *get_component(char *target, char *targname) | ||
23 | +char *get_component(char *target, char **targname) | ||
24 | { | ||
25 | + char *start; | ||
26 | + | ||
27 | while(*target == '/') | ||
28 | target ++; | ||
29 | |||
30 | + start = target; | ||
31 | while(*target != '/' && *target!= '\0') | ||
32 | - *targname ++ = *target ++; | ||
33 | + target ++; | ||
34 | |||
35 | - *targname = '\0'; | ||
36 | + *targname = strndup(start, target - start); | ||
37 | |||
38 | return target; | ||
39 | } | ||
40 | @@ -1068,12 +1071,12 @@ void free_path(struct pathname *paths) | ||
41 | |||
42 | struct pathname *add_path(struct pathname *paths, char *target, char *alltarget) | ||
43 | { | ||
44 | - char targname[1024]; | ||
45 | + char *targname; | ||
46 | int i, error; | ||
47 | |||
48 | TRACE("add_path: adding \"%s\" extract file\n", target); | ||
49 | |||
50 | - target = get_component(target, targname); | ||
51 | + target = get_component(target, &targname); | ||
52 | |||
53 | if(paths == NULL) { | ||
54 | paths = malloc(sizeof(struct pathname)); | ||
55 | @@ -1097,7 +1100,7 @@ struct pathname *add_path(struct pathnam | ||
56 | sizeof(struct path_entry)); | ||
57 | if(paths->name == NULL) | ||
58 | EXIT_UNSQUASH("Out of memory in add_path\n"); | ||
59 | - paths->name[i].name = strdup(targname); | ||
60 | + paths->name[i].name = targname; | ||
61 | paths->name[i].paths = NULL; | ||
62 | if(use_regex) { | ||
63 | paths->name[i].preg = malloc(sizeof(regex_t)); | ||
64 | @@ -1130,6 +1133,8 @@ struct pathname *add_path(struct pathnam | ||
65 | /* | ||
66 | * existing matching entry | ||
67 | */ | ||
68 | + free(targname); | ||
69 | + | ||
70 | if(paths->name[i].paths == NULL) { | ||
71 | /* | ||
72 | * No sub-directory which means this is the leaf | ||
diff --git a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4025.patch b/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4025.patch deleted file mode 100644 index 0dabfba663..0000000000 --- a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-4.2-fix-CVE-2012-4025.patch +++ /dev/null | |||
@@ -1,190 +0,0 @@ | |||
1 | Upstream-Status: Backport | ||
2 | |||
3 | Reference: http://squashfs.git.sourceforge.net/git/gitweb.cgi? | ||
4 | p=squashfs/squashfs;a=patch;h=8515b3d420f502c5c0236b86e2d6d7e3b23c190e | ||
5 | |||
6 | Integer overflow in the queue_init function in unsquashfs.c in | ||
7 | unsquashfs in Squashfs 4.2 and earlier allows remote attackers | ||
8 | to execute arbitrary code via a crafted block_log field in the | ||
9 | superblock of a .sqsh file, leading to a heap-based buffer overflow. | ||
10 | |||
11 | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4025 | ||
12 | |||
13 | Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com> | ||
14 | |||
15 | --- a/unsquashfs.c 2012-11-30 17:57:57.000000000 +0800 | ||
16 | +++ b/unsquashfs.c 2012-11-30 17:58:09.000000000 +0800 | ||
17 | @@ -33,6 +33,7 @@ | ||
18 | #include <sys/types.h> | ||
19 | #include <sys/time.h> | ||
20 | #include <sys/resource.h> | ||
21 | +#include <limits.h> | ||
22 | |||
23 | struct cache *fragment_cache, *data_cache; | ||
24 | struct queue *to_reader, *to_deflate, *to_writer, *from_writer; | ||
25 | @@ -138,6 +139,24 @@ void sigalrm_handler() | ||
26 | } | ||
27 | |||
28 | |||
29 | +int add_overflow(int a, int b) | ||
30 | +{ | ||
31 | + return (INT_MAX - a) < b; | ||
32 | +} | ||
33 | + | ||
34 | + | ||
35 | +int shift_overflow(int a, int shift) | ||
36 | +{ | ||
37 | + return (INT_MAX >> shift) < a; | ||
38 | +} | ||
39 | + | ||
40 | + | ||
41 | +int multiply_overflow(int a, int multiplier) | ||
42 | +{ | ||
43 | + return (INT_MAX / multiplier) < a; | ||
44 | +} | ||
45 | + | ||
46 | + | ||
47 | struct queue *queue_init(int size) | ||
48 | { | ||
49 | struct queue *queue = malloc(sizeof(struct queue)); | ||
50 | @@ -145,6 +164,10 @@ struct queue *queue_init(int size) | ||
51 | if(queue == NULL) | ||
52 | EXIT_UNSQUASH("Out of memory in queue_init\n"); | ||
53 | |||
54 | + if(add_overflow(size, 1) || | ||
55 | + multiply_overflow(size + 1, sizeof(void *))) | ||
56 | + EXIT_UNSQUASH("Size too large in queue_init\n"); | ||
57 | + | ||
58 | queue->data = malloc(sizeof(void *) * (size + 1)); | ||
59 | if(queue->data == NULL) | ||
60 | EXIT_UNSQUASH("Out of memory in queue_init\n"); | ||
61 | @@ -1948,13 +1971,30 @@ void initialise_threads(int fragment_buf | ||
62 | * allocate to_reader, to_deflate and to_writer queues. Set based on | ||
63 | * open file limit and cache size, unless open file limit is unlimited, | ||
64 | * in which case set purely based on cache limits | ||
65 | + * | ||
66 | + * In doing so, check that the user supplied values do not overflow | ||
67 | + * a signed int | ||
68 | */ | ||
69 | if (max_files != -1) { | ||
70 | + if(add_overflow(data_buffer_size, max_files) || | ||
71 | + add_overflow(data_buffer_size, max_files * 2)) | ||
72 | + EXIT_UNSQUASH("Data queue size is too large\n"); | ||
73 | + | ||
74 | to_reader = queue_init(max_files + data_buffer_size); | ||
75 | to_deflate = queue_init(max_files + data_buffer_size); | ||
76 | to_writer = queue_init(max_files * 2 + data_buffer_size); | ||
77 | } else { | ||
78 | - int all_buffers_size = fragment_buffer_size + data_buffer_size; | ||
79 | + int all_buffers_size; | ||
80 | + | ||
81 | + if(add_overflow(fragment_buffer_size, data_buffer_size)) | ||
82 | + EXIT_UNSQUASH("Data and fragment queues combined are" | ||
83 | + " too large\n"); | ||
84 | + | ||
85 | + all_buffers_size = fragment_buffer_size + data_buffer_size; | ||
86 | + | ||
87 | + if(add_overflow(all_buffers_size, all_buffers_size)) | ||
88 | + EXIT_UNSQUASH("Data and fragment queues combined are" | ||
89 | + " too large\n"); | ||
90 | |||
91 | to_reader = queue_init(all_buffers_size); | ||
92 | to_deflate = queue_init(all_buffers_size); | ||
93 | @@ -2059,6 +2099,32 @@ void progress_bar(long long current, lon | ||
94 | } | ||
95 | |||
96 | |||
97 | +int parse_number(char *arg, int *res) | ||
98 | +{ | ||
99 | + char *b; | ||
100 | + long number = strtol(arg, &b, 10); | ||
101 | + | ||
102 | + /* check for trailing junk after number */ | ||
103 | + if(*b != '\0') | ||
104 | + return 0; | ||
105 | + | ||
106 | + /* check for strtol underflow or overflow in conversion */ | ||
107 | + if(number == LONG_MIN || number == LONG_MAX) | ||
108 | + return 0; | ||
109 | + | ||
110 | + /* reject negative numbers as invalid */ | ||
111 | + if(number < 0) | ||
112 | + return 0; | ||
113 | + | ||
114 | + /* check if long result will overflow signed int */ | ||
115 | + if(number > INT_MAX) | ||
116 | + return 0; | ||
117 | + | ||
118 | + *res = number; | ||
119 | + return 1; | ||
120 | +} | ||
121 | + | ||
122 | + | ||
123 | #define VERSION() \ | ||
124 | printf("unsquashfs version 4.2 (2011/02/28)\n");\ | ||
125 | printf("copyright (C) 2011 Phillip Lougher "\ | ||
126 | @@ -2140,8 +2206,8 @@ int main(int argc, char *argv[]) | ||
127 | } else if(strcmp(argv[i], "-data-queue") == 0 || | ||
128 | strcmp(argv[i], "-da") == 0) { | ||
129 | if((++i == argc) || | ||
130 | - (data_buffer_size = strtol(argv[i], &b, | ||
131 | - 10), *b != '\0')) { | ||
132 | + !parse_number(argv[i], | ||
133 | + &data_buffer_size)) { | ||
134 | ERROR("%s: -data-queue missing or invalid " | ||
135 | "queue size\n", argv[0]); | ||
136 | exit(1); | ||
137 | @@ -2154,8 +2220,8 @@ int main(int argc, char *argv[]) | ||
138 | } else if(strcmp(argv[i], "-frag-queue") == 0 || | ||
139 | strcmp(argv[i], "-fr") == 0) { | ||
140 | if((++i == argc) || | ||
141 | - (fragment_buffer_size = strtol(argv[i], | ||
142 | - &b, 10), *b != '\0')) { | ||
143 | + !parse_number(argv[i], | ||
144 | + &fragment_buffer_size)) { | ||
145 | ERROR("%s: -frag-queue missing or invalid " | ||
146 | "queue size\n", argv[0]); | ||
147 | exit(1); | ||
148 | @@ -2280,11 +2346,39 @@ options: | ||
149 | block_log = sBlk.s.block_log; | ||
150 | |||
151 | /* | ||
152 | + * Sanity check block size and block log. | ||
153 | + * | ||
154 | + * Check they're within correct limits | ||
155 | + */ | ||
156 | + if(block_size > SQUASHFS_FILE_MAX_SIZE || | ||
157 | + block_log > SQUASHFS_FILE_MAX_LOG) | ||
158 | + EXIT_UNSQUASH("Block size or block_log too large." | ||
159 | + " File system is corrupt.\n"); | ||
160 | + | ||
161 | + /* | ||
162 | + * Check block_size and block_log match | ||
163 | + */ | ||
164 | + if(block_size != (1 << block_log)) | ||
165 | + EXIT_UNSQUASH("Block size and block_log do not match." | ||
166 | + " File system is corrupt.\n"); | ||
167 | + | ||
168 | + /* | ||
169 | * convert from queue size in Mbytes to queue size in | ||
170 | - * blocks | ||
171 | + * blocks. | ||
172 | + * | ||
173 | + * In doing so, check that the user supplied values do not | ||
174 | + * overflow a signed int | ||
175 | */ | ||
176 | - fragment_buffer_size <<= 20 - block_log; | ||
177 | - data_buffer_size <<= 20 - block_log; | ||
178 | + if(shift_overflow(fragment_buffer_size, 20 - block_log)) | ||
179 | + EXIT_UNSQUASH("Fragment queue size is too large\n"); | ||
180 | + else | ||
181 | + fragment_buffer_size <<= 20 - block_log; | ||
182 | + | ||
183 | + if(shift_overflow(data_buffer_size, 20 - block_log)) | ||
184 | + EXIT_UNSQUASH("Data queue size is too large\n"); | ||
185 | + else | ||
186 | + data_buffer_size <<= 20 - block_log; | ||
187 | + | ||
188 | initialise_threads(fragment_buffer_size, data_buffer_size); | ||
189 | |||
190 | fragment_data = malloc(block_size); | ||
diff --git a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-add-a-commment-and-fix-some-other-comments.patch b/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-add-a-commment-and-fix-some-other-comments.patch deleted file mode 100644 index fa075f9e7d..0000000000 --- a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-add-a-commment-and-fix-some-other-comments.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | Upstream-Status: Backport | ||
2 | |||
3 | unsquashfs: add a commment and fix some other comments | ||
4 | |||
5 | Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com> | ||
6 | |||
7 | diff -urpN a/unsquashfs.c b/unsquashfs.c | ||
8 | --- a/unsquashfs.c 2012-11-30 15:27:14.000000000 +0800 | ||
9 | +++ b/unsquashfs.c 2012-11-30 15:27:56.000000000 +0800 | ||
10 | @@ -814,7 +814,7 @@ int write_file(struct inode *inode, char | ||
11 | |||
12 | /* | ||
13 | * the writer thread is queued a squashfs_file structure describing the | ||
14 | - * file. If the file has one or more blocks or a fragments they are | ||
15 | + * file. If the file has one or more blocks or a fragment they are | ||
16 | * queued separately (references to blocks in the cache). | ||
17 | */ | ||
18 | file->fd = file_fd; | ||
19 | @@ -838,7 +838,7 @@ int write_file(struct inode *inode, char | ||
20 | block->offset = 0; | ||
21 | block->size = i == file_end ? inode->data & (block_size - 1) : | ||
22 | block_size; | ||
23 | - if(block_list[i] == 0) /* sparse file */ | ||
24 | + if(block_list[i] == 0) /* sparse block */ | ||
25 | block->buffer = NULL; | ||
26 | else { | ||
27 | block->buffer = cache_get(data_cache, start, | ||
28 | @@ -2161,6 +2161,10 @@ options: | ||
29 | block_size = sBlk.s.block_size; | ||
30 | block_log = sBlk.s.block_log; | ||
31 | |||
32 | + /* | ||
33 | + * convert from queue size in Mbytes to queue size in | ||
34 | + * blocks | ||
35 | + */ | ||
36 | fragment_buffer_size <<= 20 - block_log; | ||
37 | data_buffer_size <<= 20 - block_log; | ||
38 | initialise_threads(fragment_buffer_size, data_buffer_size); | ||
diff --git a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-fix-open-file-limit.patch b/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-fix-open-file-limit.patch deleted file mode 100644 index c60f7b42af..0000000000 --- a/meta/recipes-devtools/squashfs-tools/squashfs-tools/squashfs-fix-open-file-limit.patch +++ /dev/null | |||
@@ -1,215 +0,0 @@ | |||
1 | Upstream-Status: Backport | ||
2 | |||
3 | unsquashfs: fix open file limit | ||
4 | |||
5 | Previously Unsquashfs relied on the to_writer queue being | ||
6 | set to 1000 to limit the amount of open file read-ahead to a | ||
7 | maximum of 500. For the default process limit of 1024 open files | ||
8 | this was perhaps acceptable, but it obviously breaks if ulimit has | ||
9 | been used to set the open file limit to below 504 (this includes | ||
10 | stdin, stdout, stderr and the Squashfs filesystem being unsquashed). | ||
11 | |||
12 | More importantly setting the to_writer queue to 1000 to limit | ||
13 | the amount of files open has always been an inherent performance | ||
14 | hit because the to_writer queue queues blocks. It limits the | ||
15 | block readhead to 1000 blocks, irrespective of how many files | ||
16 | that represents. A single file containing more than 1000 blocks | ||
17 | will still be limited to a 1000 block readahead even though the | ||
18 | data block cache typically can buffer more than this (at the | ||
19 | default data cache size of 256 Mbytes and the default block size | ||
20 | of 128 Kbytes, it can buffer 2048 blocks). Obviously the | ||
21 | caches serve more than just a read-ahead role (they also | ||
22 | cache decompressed blocks in case they're referenced later e.g. | ||
23 | by duplicate files), but the artificial limit imposed on | ||
24 | the read-ahead due to setting the to_writer queue to 1000 is | ||
25 | unnecessary. | ||
26 | |||
27 | This commit does away with the need to limit the to_writer queue, | ||
28 | by introducing open_wait() and close_wake() calls which correctly | ||
29 | track the amount of open files. | ||
30 | |||
31 | Signed-off-by: Phillip Lougher <phillip@squashfs.org.uk> | ||
32 | |||
33 | Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com> | ||
34 | |||
35 | diff -urpN a/unsquashfs.c b/unsquashfs.c | ||
36 | --- a/unsquashfs.c 2012-11-30 15:31:29.000000000 +0800 | ||
37 | +++ b/unsquashfs.c 2012-11-30 15:32:03.000000000 +0800 | ||
38 | @@ -31,6 +31,8 @@ | ||
39 | |||
40 | #include <sys/sysinfo.h> | ||
41 | #include <sys/types.h> | ||
42 | +#include <sys/time.h> | ||
43 | +#include <sys/resource.h> | ||
44 | |||
45 | struct cache *fragment_cache, *data_cache; | ||
46 | struct queue *to_reader, *to_deflate, *to_writer, *from_writer; | ||
47 | @@ -784,6 +786,46 @@ failure: | ||
48 | } | ||
49 | |||
50 | |||
51 | +pthread_mutex_t open_mutex = PTHREAD_MUTEX_INITIALIZER; | ||
52 | +pthread_cond_t open_empty = PTHREAD_COND_INITIALIZER; | ||
53 | +int open_unlimited, open_count; | ||
54 | +#define OPEN_FILE_MARGIN 10 | ||
55 | + | ||
56 | + | ||
57 | +void open_init(int count) | ||
58 | +{ | ||
59 | + open_count = count; | ||
60 | + open_unlimited = count == -1; | ||
61 | +} | ||
62 | + | ||
63 | + | ||
64 | +int open_wait(char *pathname, int flags, mode_t mode) | ||
65 | +{ | ||
66 | + if (!open_unlimited) { | ||
67 | + pthread_mutex_lock(&open_mutex); | ||
68 | + while (open_count == 0) | ||
69 | + pthread_cond_wait(&open_empty, &open_mutex); | ||
70 | + open_count --; | ||
71 | + pthread_mutex_unlock(&open_mutex); | ||
72 | + } | ||
73 | + | ||
74 | + return open(pathname, flags, mode); | ||
75 | +} | ||
76 | + | ||
77 | + | ||
78 | +void close_wake(int fd) | ||
79 | +{ | ||
80 | + close(fd); | ||
81 | + | ||
82 | + if (!open_unlimited) { | ||
83 | + pthread_mutex_lock(&open_mutex); | ||
84 | + open_count ++; | ||
85 | + pthread_cond_signal(&open_empty); | ||
86 | + pthread_mutex_unlock(&open_mutex); | ||
87 | + } | ||
88 | +} | ||
89 | + | ||
90 | + | ||
91 | int write_file(struct inode *inode, char *pathname) | ||
92 | { | ||
93 | unsigned int file_fd, i; | ||
94 | @@ -794,8 +836,8 @@ int write_file(struct inode *inode, char | ||
95 | |||
96 | TRACE("write_file: regular file, blocks %d\n", inode->blocks); | ||
97 | |||
98 | - file_fd = open(pathname, O_CREAT | O_WRONLY | (force ? O_TRUNC : 0), | ||
99 | - (mode_t) inode->mode & 0777); | ||
100 | + file_fd = open_wait(pathname, O_CREAT | O_WRONLY | | ||
101 | + (force ? O_TRUNC : 0), (mode_t) inode->mode & 0777); | ||
102 | if(file_fd == -1) { | ||
103 | ERROR("write_file: failed to create file %s, because %s\n", | ||
104 | pathname, strerror(errno)); | ||
105 | @@ -1712,7 +1754,7 @@ void *writer(void *arg) | ||
106 | } | ||
107 | } | ||
108 | |||
109 | - close(file_fd); | ||
110 | + close_wake(file_fd); | ||
111 | if(failed == FALSE) | ||
112 | set_attributes(file->pathname, file->mode, file->uid, | ||
113 | file->gid, file->time, file->xattr, force); | ||
114 | @@ -1803,9 +1845,9 @@ void *progress_thread(void *arg) | ||
115 | |||
116 | void initialise_threads(int fragment_buffer_size, int data_buffer_size) | ||
117 | { | ||
118 | - int i; | ||
119 | + struct rlimit rlim; | ||
120 | + int i, max_files, res; | ||
121 | sigset_t sigmask, old_mask; | ||
122 | - int all_buffers_size = fragment_buffer_size + data_buffer_size; | ||
123 | |||
124 | sigemptyset(&sigmask); | ||
125 | sigaddset(&sigmask, SIGINT); | ||
126 | @@ -1841,10 +1883,86 @@ void initialise_threads(int fragment_buf | ||
127 | EXIT_UNSQUASH("Out of memory allocating thread descriptors\n"); | ||
128 | deflator_thread = &thread[3]; | ||
129 | |||
130 | - to_reader = queue_init(all_buffers_size); | ||
131 | - to_deflate = queue_init(all_buffers_size); | ||
132 | - to_writer = queue_init(1000); | ||
133 | + /* | ||
134 | + * dimensioning the to_reader and to_deflate queues. The size of | ||
135 | + * these queues is directly related to the amount of block | ||
136 | + * read-ahead possible. To_reader queues block read requests to | ||
137 | + * the reader thread and to_deflate queues block decompression | ||
138 | + * requests to the deflate thread(s) (once the block has been read by | ||
139 | + * the reader thread). The amount of read-ahead is determined by | ||
140 | + * the combined size of the data_block and fragment caches which | ||
141 | + * determine the total number of blocks which can be "in flight" | ||
142 | + * at any one time (either being read or being decompressed) | ||
143 | + * | ||
144 | + * The maximum file open limit, however, affects the read-ahead | ||
145 | + * possible, in that for normal sizes of the fragment and data block | ||
146 | + * caches, where the incoming files have few data blocks or one fragment | ||
147 | + * only, the file open limit is likely to be reached before the | ||
148 | + * caches are full. This means the worst case sizing of the combined | ||
149 | + * sizes of the caches is unlikely to ever be necessary. However, is is | ||
150 | + * obvious read-ahead up to the data block cache size is always possible | ||
151 | + * irrespective of the file open limit, because a single file could | ||
152 | + * contain that number of blocks. | ||
153 | + * | ||
154 | + * Choosing the size as "file open limit + data block cache size" seems | ||
155 | + * to be a reasonable estimate. We can reasonably assume the maximum | ||
156 | + * likely read-ahead possible is data block cache size + one fragment | ||
157 | + * per open file. | ||
158 | + * | ||
159 | + * dimensioning the to_writer queue. The size of this queue is | ||
160 | + * directly related to the amount of block read-ahead possible. | ||
161 | + * However, unlike the to_reader and to_deflate queues, this is | ||
162 | + * complicated by the fact the to_writer queue not only contains | ||
163 | + * entries for fragments and data_blocks but it also contains | ||
164 | + * file entries, one per open file in the read-ahead. | ||
165 | + * | ||
166 | + * Choosing the size as "2 * (file open limit) + | ||
167 | + * data block cache size" seems to be a reasonable estimate. | ||
168 | + * We can reasonably assume the maximum likely read-ahead possible | ||
169 | + * is data block cache size + one fragment per open file, and then | ||
170 | + * we will have a file_entry for each open file. | ||
171 | + */ | ||
172 | + res = getrlimit(RLIMIT_NOFILE, &rlim); | ||
173 | + if (res == -1) { | ||
174 | + ERROR("failed to get open file limit! Defaulting to 1\n"); | ||
175 | + rlim.rlim_cur = 1; | ||
176 | + } | ||
177 | + | ||
178 | + if (rlim.rlim_cur != RLIM_INFINITY) { | ||
179 | + /* | ||
180 | + * leave OPEN_FILE_MARGIN free (rlim_cur includes fds used by | ||
181 | + * stdin, stdout, stderr and filesystem fd | ||
182 | + */ | ||
183 | + if (rlim.rlim_cur <= OPEN_FILE_MARGIN) | ||
184 | + /* no margin, use minimum possible */ | ||
185 | + max_files = 1; | ||
186 | + else | ||
187 | + max_files = rlim.rlim_cur - OPEN_FILE_MARGIN; | ||
188 | + } else | ||
189 | + max_files = -1; | ||
190 | + | ||
191 | + /* set amount of available files for use by open_wait and close_wake */ | ||
192 | + open_init(max_files); | ||
193 | + | ||
194 | + /* | ||
195 | + * allocate to_reader, to_deflate and to_writer queues. Set based on | ||
196 | + * open file limit and cache size, unless open file limit is unlimited, | ||
197 | + * in which case set purely based on cache limits | ||
198 | + */ | ||
199 | + if (max_files != -1) { | ||
200 | + to_reader = queue_init(max_files + data_buffer_size); | ||
201 | + to_deflate = queue_init(max_files + data_buffer_size); | ||
202 | + to_writer = queue_init(max_files * 2 + data_buffer_size); | ||
203 | + } else { | ||
204 | + int all_buffers_size = fragment_buffer_size + data_buffer_size; | ||
205 | + | ||
206 | + to_reader = queue_init(all_buffers_size); | ||
207 | + to_deflate = queue_init(all_buffers_size); | ||
208 | + to_writer = queue_init(all_buffers_size * 2); | ||
209 | + } | ||
210 | + | ||
211 | from_writer = queue_init(1); | ||
212 | + | ||
213 | fragment_cache = cache_init(block_size, fragment_buffer_size); | ||
214 | data_cache = cache_init(block_size, data_buffer_size); | ||
215 | pthread_create(&thread[0], NULL, reader, NULL); | ||
diff --git a/meta/recipes-devtools/squashfs-tools/squashfs-tools_4.2.bb b/meta/recipes-devtools/squashfs-tools/squashfs-tools_4.3.bb index 57400cdda0..e0c69ab127 100644 --- a/meta/recipes-devtools/squashfs-tools/squashfs-tools_4.2.bb +++ b/meta/recipes-devtools/squashfs-tools/squashfs-tools_4.3.bb | |||
@@ -3,22 +3,18 @@ | |||
3 | SUMMARY = "Tools for manipulating SquashFS filesystems" | 3 | SUMMARY = "Tools for manipulating SquashFS filesystems" |
4 | SECTION = "base" | 4 | SECTION = "base" |
5 | LICENSE = "GPL-2 & PD" | 5 | LICENSE = "GPL-2 & PD" |
6 | LIC_FILES_CHKSUM = "file://../COPYING;md5=0636e73ff0215e8d672dc4c32c317bb3 \ | 6 | LIC_FILES_CHKSUM = "file://../COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ |
7 | file://../../7zC.txt;beginline=12;endline=16;md5=2056cd6d919ebc3807602143c7449a7c \ | 7 | file://../../7zC.txt;beginline=12;endline=16;md5=2056cd6d919ebc3807602143c7449a7c \ |
8 | " | 8 | " |
9 | DEPENDS = "attr zlib xz" | 9 | DEPENDS = "attr zlib xz" |
10 | PR = "r2" | ||
11 | 10 | ||
12 | SRC_URI = "${SOURCEFORGE_MIRROR}/squashfs/squashfs${PV}.tar.gz;name=squashfs \ | 11 | SRC_URI = "${SOURCEFORGE_MIRROR}/squashfs/squashfs${PV}.tar.gz;name=squashfs \ |
13 | http://downloads.sourceforge.net/sevenzip/lzma465.tar.bz2;name=lzma \ | 12 | http://downloads.sourceforge.net/sevenzip/lzma465.tar.bz2;name=lzma \ |
14 | " | 13 | " |
15 | SRC_URI += "file://squashfs-4.2-fix-CVE-2012-4024.patch \ | 14 | |
16 | file://squashfs-add-a-commment-and-fix-some-other-comments.patch \ | 15 | SRC_URI[squashfs.md5sum] = "d92ab59aabf5173f2a59089531e30dbf" |
17 | file://squashfs-fix-open-file-limit.patch \ | 16 | SRC_URI[squashfs.sha256sum] = "0d605512437b1eb800b4736791559295ee5f60177e102e4d4ccd0ee241a5f3f6" |
18 | file://squashfs-4.2-fix-CVE-2012-4025.patch \ | 17 | |
19 | " | ||
20 | SRC_URI[squashfs.md5sum] = "1b7a781fb4cf8938842279bd3e8ee852" | ||
21 | SRC_URI[squashfs.sha256sum] = "d9e0195aa922dbb665ed322b9aaa96e04a476ee650f39bbeadb0d00b24022e96" | ||
22 | SRC_URI[lzma.md5sum] = "29d5ffd03a5a3e51aef6a74e9eafb759" | 18 | SRC_URI[lzma.md5sum] = "29d5ffd03a5a3e51aef6a74e9eafb759" |
23 | SRC_URI[lzma.sha256sum] = "c935fd04dd8e0e8c688a3078f3675d699679a90be81c12686837e0880aa0fa1e" | 19 | SRC_URI[lzma.sha256sum] = "c935fd04dd8e0e8c688a3078f3675d699679a90be81c12686837e0880aa0fa1e" |
24 | 20 | ||