rpms/kernel/FC-5 linux-2.6-20.8b-x86_perfctr_fix_bitmap_sizing.patch, NONE, 1.1 linux-2.6-20.8e-isdn-capi-disable-debug-messages.patch, NONE, 1.1 linux-2.6-20.8f-oom_kill_all_threads_that_share_mm.patch, NONE, 1.1 linux-2.6-20.8f-x86_64_always_flush_all_pages.patch, NONE, 1.1 linux-2.6-20.8n-ipsec_fix_oops_with_large_context.patch, NONE, 1.1 linux-2.6-20.8n-net_vlan_allow_with_bridge.patch, NONE, 1.1 linux-2.6-20.8n-ppp_fix_skb_under_panic.patch, NONE, 1.1 linux-2.6-page_is_ram.patch, NONE, 1.1 patch-2.6.20.10-11.bz2.sign, NONE, 1.1 patch-2.6.20.9-10.bz2.sign, NONE, 1.1 .cvsignore, 1.442, 1.443 kernel-2.6.spec, 1.2316, 1.2317 sources, 1.382, 1.383 upstream, 1.345, 1.346 linux-2.6.20.10-unoffical.patch, 1.1, NONE
fedora-cvs-commits at redhat.com
fedora-cvs-commits at redhat.com
Wed May 2 17:54:42 UTC 2007
- Previous message (by thread): rpms/kernel/FC-6 linux-2.6-20.8b-x86_perfctr_fix_bitmap_sizing.patch, NONE, 1.1 linux-2.6-20.8e-isdn-capi-disable-debug-messages.patch, NONE, 1.1 linux-2.6-20.8f-oom_kill_all_threads_that_share_mm.patch, NONE, 1.1 linux-2.6-20.8f-x86_64_always_flush_all_pages.patch, NONE, 1.1 linux-2.6-20.8n-ipsec_fix_oops_with_large_context.patch, NONE, 1.1 linux-2.6-20.8n-net_vlan_allow_with_bridge.patch, NONE, 1.1 linux-2.6-20.8n-ppp_fix_skb_under_panic.patch, NONE, 1.1 linux-2.6-page_is_ram.patch, NONE, 1.1 patch-2.6.20.10-11.bz2.sign, NONE, 1.1 patch-2.6.20.9-10.bz2.sign, NONE, 1.1 .cvsignore, 1.561, 1.562 kernel-2.6.spec, 1.2948, 1.2949 sources, 1.525, 1.526 upstream, 1.445, 1.446 linux-2.6.20.10-unoffical.patch, 1.1, NONE
- Next message (by thread): rpms/vim/FC-6 7.0.202,NONE,1.1
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: cebbert
Update of /cvs/dist/rpms/kernel/FC-5
In directory cvs.devel.redhat.com:/tmp/cvs-serv6979
Modified Files:
.cvsignore kernel-2.6.spec sources upstream
Added Files:
linux-2.6-20.8b-x86_perfctr_fix_bitmap_sizing.patch
linux-2.6-20.8e-isdn-capi-disable-debug-messages.patch
linux-2.6-20.8f-oom_kill_all_threads_that_share_mm.patch
linux-2.6-20.8f-x86_64_always_flush_all_pages.patch
linux-2.6-20.8n-ipsec_fix_oops_with_large_context.patch
linux-2.6-20.8n-net_vlan_allow_with_bridge.patch
linux-2.6-20.8n-ppp_fix_skb_under_panic.patch
linux-2.6-page_is_ram.patch patch-2.6.20.10-11.bz2.sign
patch-2.6.20.9-10.bz2.sign
Removed Files:
linux-2.6.20.10-unoffical.patch
Log Message:
* Tue May 05 2007 Chuck Ebbert <cebbert at redhat.com> 1.2317
- 2.6.20.10 (official)
- 2.6.20.11
- Additional fixes (1830 - 1837)
linux-2.6-20.8b-x86_perfctr_fix_bitmap_sizing.patch:
i386/kernel/nmi.c | 9 +++++----
x86_64/kernel/nmi.c | 10 ++++++----
2 files changed, 11 insertions(+), 8 deletions(-)
--- NEW FILE linux-2.6-20.8b-x86_perfctr_fix_bitmap_sizing.patch ---
Gitweb: http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1714f9bfc92d6ee67e84127332a1fae27772acfe
Commit: 1714f9bfc92d6ee67e84127332a1fae27772acfe
Parent: 08269c6d38e003adb12f55c6d795daa89bdc1bae
Author: Andi Kleen <ak at suse.de>
AuthorDate: Mon Apr 16 10:30:27 2007 +0200
Committer: Andi Kleen <andi at basil.nowhere.org>
CommitDate: Mon Apr 16 10:30:27 2007 +0200
[PATCH] x86: Fix potential overflow in perfctr reservation
While reviewing this code again I found a potential overflow of the bitmap.
The p4 oprofile can theoretically set bits beyond the reservation bitmap for
specific configurations. Avoid that by sizing the bitmaps properly.
Signed-off-by: Andi Kleen <ak at suse.de>
---
arch/i386/kernel/nmi.c | 9 +++++----
arch/x86_64/kernel/nmi.c | 10 ++++++----
2 files changed, 11 insertions(+), 8 deletions(-)
diff --git a/arch/i386/kernel/nmi.c b/arch/i386/kernel/nmi.c
index a98ba88..9f1e8c1 100644
--- a/arch/i386/kernel/nmi.c
+++ b/arch/i386/kernel/nmi.c
@@ -41,16 +41,17 @@ int nmi_watchdog_enabled;
* different subsystems this reservation system just tries to coordinate
* things a little
*/
-static DEFINE_PER_CPU(unsigned long, perfctr_nmi_owner);
-static DEFINE_PER_CPU(unsigned long, evntsel_nmi_owner[3]);
-
-static cpumask_t backtrace_mask = CPU_MASK_NONE;
/* this number is calculated from Intel's MSR_P4_CRU_ESCR5 register and it's
* offset from MSR_P4_BSU_ESCR0. It will be the max for all platforms (for now)
*/
#define NMI_MAX_COUNTER_BITS 66
+#define NMI_MAX_COUNTER_LONGS BITS_TO_LONGS(NMI_MAX_COUNTER_BITS)
+static DEFINE_PER_CPU(unsigned long, perfctr_nmi_owner[NMI_MAX_COUNTER_LONGS]);
+static DEFINE_PER_CPU(unsigned long, evntsel_nmi_owner[NMI_MAX_COUNTER_LONGS]);
+
+static cpumask_t backtrace_mask = CPU_MASK_NONE;
/* nmi_active:
* >0: the lapic NMI watchdog is active, but can be disabled
* <0: the lapic NMI watchdog has not been set up, and cannot
diff --git a/arch/x86_64/kernel/nmi.c b/arch/x86_64/kernel/nmi.c
index a90996c..dfab9f1 100644
--- a/arch/x86_64/kernel/nmi.c
+++ b/arch/x86_64/kernel/nmi.c
@@ -39,15 +39,17 @@ int panic_on_unrecovered_nmi;
* different subsystems this reservation system just tries to coordinate
* things a little
*/
-static DEFINE_PER_CPU(unsigned, perfctr_nmi_owner);
-static DEFINE_PER_CPU(unsigned, evntsel_nmi_owner[2]);
-
-static cpumask_t backtrace_mask = CPU_MASK_NONE;
/* this number is calculated from Intel's MSR_P4_CRU_ESCR5 register and it's
* offset from MSR_P4_BSU_ESCR0. It will be the max for all platforms (for now)
*/
#define NMI_MAX_COUNTER_BITS 66
+#define NMI_MAX_COUNTER_LONGS BITS_TO_LONGS(NMI_MAX_COUNTER_BITS)
+
+static DEFINE_PER_CPU(unsigned, perfctr_nmi_owner[NMI_MAX_COUNTER_LONGS]);
+static DEFINE_PER_CPU(unsigned, evntsel_nmi_owner[NMI_MAX_COUNTER_LONGS]);
+
+static cpumask_t backtrace_mask = CPU_MASK_NONE;
/* nmi_active:
* >0: the lapic NMI watchdog is active, but can be disabled
linux-2.6-20.8e-isdn-capi-disable-debug-messages.patch:
capiutil.c | 14 +++++++++++++-
1 files changed, 13 insertions(+), 1 deletion(-)
--- NEW FILE linux-2.6-20.8e-isdn-capi-disable-debug-messages.patch ---
Minimal fix for CAPI buffer overflow.
Original patch by Karsten Keil <kkeil at suse.de>
Modified by Chuck Ebbert <cebbert at redhat.com>
to unconditionally disable CAPI debug messages.
Signed-off-by: Chuck Ebbert <cebbert at redhat.com>
--- linux-2.6.16.21-0.23.org/drivers/isdn/capi/capiutil.c
+++ linux-2.6.16.21-0.23/drivers/isdn/capi/capiutil.c
@@ -647,7 +647,7 @@ char *capi_cmd2str(u8 cmd, u8 subcmd)
return mnames[command_2_index(cmd, subcmd)];
}
-
+#if 0
/*-------------------------------------------------------*/
/*-------------------------------------------------------*/
@@ -849,6 +849,18 @@ char *capi_cmsg2str(_cmsg * cmsg)
protocol_message_2_pars(cmsg, 1);
return buf;
}
+#else
+
+char *capi_message2str(u8 * msg)
+{
+ return "capi_message2str not implemented";
+}
+
+char *capi_cmsg2str(_cmsg * cmsg)
+{
+ return "capi_cmsg2str not implemented";
+}
+#endif
EXPORT_SYMBOL(capi_cmsg2message);
EXPORT_SYMBOL(capi_message2cmsg);
linux-2.6-20.8f-oom_kill_all_threads_that_share_mm.patch:
oom_kill.c | 2 +-
1 files changed, 1 insertion(+), 1 deletion(-)
--- NEW FILE linux-2.6-20.8f-oom_kill_all_threads_that_share_mm.patch ---
Gitweb: http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=650a7c974f1b91de9732c0f720e792837f8abfd6
Commit: 650a7c974f1b91de9732c0f720e792837f8abfd6
Parent: c445a31cd7f469d77acc37538ab43a99530968b8
Author: David Rientjes <rientjes at google.com>
AuthorDate: Mon Apr 23 21:36:13 2007 -0700
Committer: Linus Torvalds <torvalds at woody.linux-foundation.org>
CommitDate: Tue Apr 24 08:11:49 2007 -0700
oom: kill all threads that share mm with killed task
oom_kill_task() calls __oom_kill_task() to OOM kill a selected task.
When finding other threads that share an mm with that task, we need to
kill those individual threads and not the same one.
(Bug introduced by f2a2a7108aa0039ba7a5fe7a0d2ecef2219a7584)
Acked-by: William Irwin <bill.irwin at oracle.com>
Acked-by: Christoph Lameter <clameter at engr.sgi.com>
Cc: Nick Piggin <npiggin at suse.de>
Cc: Andrew Morton <akpm at osdl.org>
Cc: Andi Kleen <ak at suse.de>
Signed-off-by: David Rientjes <rientjes at google.com>
Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
---
mm/oom_kill.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/mm/oom_kill.c b/mm/oom_kill.c
index 2f39169..af981b6 100644
--- a/mm/oom_kill.c
+++ b/mm/oom_kill.c
@@ -333,7 +333,7 @@ static int oom_kill_task(struct task_struct *p)
*/
do_each_thread(g, q) {
if (q->mm == mm && q->tgid != p->tgid)
- force_sig(SIGKILL, p);
+ force_sig(SIGKILL, q);
} while_each_thread(g, q);
return 0;
linux-2.6-20.8f-x86_64_always_flush_all_pages.patch:
pageattr.c | 2 +-
1 files changed, 1 insertion(+), 1 deletion(-)
--- NEW FILE linux-2.6-20.8f-x86_64_always_flush_all_pages.patch ---
Gitweb: http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=90767bd13febfdf8a5f5077e2bb975f79d6b919c
Commit: 90767bd13febfdf8a5f5077e2bb975f79d6b919c
Parent: 9ce883becb83190061369940de9c415595836c9b
Author: Andi Kleen <ak at suse.de>
AuthorDate: Tue Apr 24 13:05:37 2007 +0200
Committer: Andi Kleen <andi at basil.nowhere.org>
CommitDate: Tue Apr 24 13:05:37 2007 +0200
[PATCH] x86-64: Always flush all pages in change_page_attr
change_page_attr on x86-64 only flushed the TLB for pages that got
reverted. That's not correct: it has to be flushed in all cases.
This bug was added in some earlier changes.
Just flush all pages for now.
This could be done more efficiently, but for this late in the release
this seem to be the best fix.
Pointed out by Jan Beulich
Signed-off-by: Andi Kleen <ak at suse.de>
---
arch/x86_64/mm/pageattr.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86_64/mm/pageattr.c b/arch/x86_64/mm/pageattr.c
index 65c5eaa..081409a 100644
--- a/arch/x86_64/mm/pageattr.c
+++ b/arch/x86_64/mm/pageattr.c
@@ -81,8 +81,8 @@ static void flush_kernel_map(void *arg)
void *adr = page_address(pg);
if (cpu_has_clflush)
cache_flush_page(adr);
- __flush_tlb_one(adr);
}
+ __flush_tlb_all();
}
static inline void flush_map(struct list_head *l)
linux-2.6-20.8n-ipsec_fix_oops_with_large_context.patch:
xfrm_user.c | 7 +++----
1 files changed, 3 insertions(+), 4 deletions(-)
--- NEW FILE linux-2.6-20.8n-ipsec_fix_oops_with_large_context.patch ---
Gitweb: http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=661697f728d75302e1f661a58db2fcba71d5cbc9
Commit: 661697f728d75302e1f661a58db2fcba71d5cbc9
Parent: 279e172a580d415b83eba4f9fbbc77b08e546553
Author: Joy Latten <latten at austin.ibm.com>
AuthorDate: Fri Apr 13 16:14:35 2007 -0700
Committer: David S. Miller <davem at davemloft.net>
CommitDate: Fri Apr 13 16:14:35 2007 -0700
[IPSEC] XFRM_USER: kernel panic when large security contexts in ACQUIRE
When sending a security context of 50+ characters in an ACQUIRE
message, following kernel panic occurred.
kernel BUG in xfrm_send_acquire at net/xfrm/xfrm_user.c:1781!
cpu 0x3: Vector: 700 (Program Check) at [c0000000421bb2e0]
pc: c00000000033b074: .xfrm_send_acquire+0x240/0x2c8
lr: c00000000033b014: .xfrm_send_acquire+0x1e0/0x2c8
sp: c0000000421bb560
msr: 8000000000029032
current = 0xc00000000fce8f00
paca = 0xc000000000464b00
pid = 2303, comm = ping
kernel BUG in xfrm_send_acquire at net/xfrm/xfrm_user.c:1781!
enter ? for help
3:mon> t
[c0000000421bb650] c00000000033538c .km_query+0x6c/0xec
[c0000000421bb6f0] c000000000337374 .xfrm_state_find+0x7f4/0xb88
[c0000000421bb7f0] c000000000332350 .xfrm_tmpl_resolve+0xc4/0x21c
[c0000000421bb8d0] c0000000003326e8 .xfrm_lookup+0x1a0/0x5b0
[c0000000421bba00] c0000000002e6ea0 .ip_route_output_flow+0x88/0xb4
[c0000000421bbaa0] c0000000003106d8 .ip4_datagram_connect+0x218/0x374
[c0000000421bbbd0] c00000000031bc00 .inet_dgram_connect+0xac/0xd4
[c0000000421bbc60] c0000000002b11ac .sys_connect+0xd8/0x120
[c0000000421bbd90] c0000000002d38d0 .compat_sys_socketcall+0xdc/0x214
[c0000000421bbe30] c00000000000869c syscall_exit+0x0/0x40
--- Exception: c00 (System Call) at 0000000007f0ca9c
SP (fc0ef8f0) is in userspace
We are using size of security context from xfrm_policy to determine
how much space to alloc skb and then putting security context from
xfrm_state into skb. Should have been using size of security context
from xfrm_state to alloc skb. Following fix does that
Signed-off-by: Joy Latten <latten at austin.ibm.com>
Acked-by: James Morris <jmorris at namei.org>
Signed-off-by: David S. Miller <davem at davemloft.net>
---
net/xfrm/xfrm_user.c | 7 +++----
1 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
index e81e2fb..816e369 100644
--- a/net/xfrm/xfrm_user.c
+++ b/net/xfrm/xfrm_user.c
@@ -272,9 +272,8 @@ static int attach_encap_tmpl(struct xfrm_encap_tmpl **encapp, struct rtattr *u_a
}
-static inline int xfrm_user_sec_ctx_size(struct xfrm_policy *xp)
+static inline int xfrm_user_sec_ctx_size(struct xfrm_sec_ctx *xfrm_ctx)
{
- struct xfrm_sec_ctx *xfrm_ctx = xp->security;
int len = 0;
if (xfrm_ctx) {
@@ -2170,7 +2169,7 @@ static int xfrm_send_acquire(struct xfrm_state *x, struct xfrm_tmpl *xt,
len = RTA_SPACE(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr);
len += NLMSG_SPACE(sizeof(struct xfrm_user_acquire));
- len += RTA_SPACE(xfrm_user_sec_ctx_size(xp));
+ len += RTA_SPACE(xfrm_user_sec_ctx_size(x->security));
#ifdef CONFIG_XFRM_SUB_POLICY
len += RTA_SPACE(sizeof(struct xfrm_userpolicy_type));
#endif
@@ -2280,7 +2279,7 @@ static int xfrm_exp_policy_notify(struct xfrm_policy *xp, int dir, struct km_eve
len = RTA_SPACE(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr);
len += NLMSG_SPACE(sizeof(struct xfrm_user_polexpire));
- len += RTA_SPACE(xfrm_user_sec_ctx_size(xp));
+ len += RTA_SPACE(xfrm_user_sec_ctx_size(xp->security));
#ifdef CONFIG_XFRM_SUB_POLICY
len += RTA_SPACE(sizeof(struct xfrm_userpolicy_type));
#endif
linux-2.6-20.8n-net_vlan_allow_with_bridge.patch:
vlan_dev.c | 3 +++
1 files changed, 3 insertions(+)
--- NEW FILE linux-2.6-20.8n-net_vlan_allow_with_bridge.patch ---
Gitweb: http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=279e172a580d415b83eba4f9fbbc77b08e546553
Commit: 279e172a580d415b83eba4f9fbbc77b08e546553
Parent: 09fe3ef46c5a2cc65d173df9518013e208eb3ba3
Author: Jerome Borsboom <j.borsboom at erasmusmc.nl>
AuthorDate: Fri Apr 13 16:12:47 2007 -0700
Committer: David S. Miller <davem at davemloft.net>
CommitDate: Fri Apr 13 16:12:47 2007 -0700
[VLAN]: Allow VLAN interface on top of bridge interface
When a VLAN interface is created on top of a bridge interface and
netfilter is enabled to see the bridged packets, the packets can be
corrupted when passing through the netfilter code. This is caused by the
VLAN driver not setting the 'protocol' and 'nh' members of the sk_buff
structure. In general, this is no problem as the VLAN interface is mostly
connected to a physical ethernet interface which does not use the
'protocol' and 'nh' members. For a bridge interface, however, these
members do matter.
Signed-off-by: Jerome Borsboom <j.borsboom at erasmusmc.nl>
Signed-off-by: David S. Miller <davem at davemloft.net>
---
net/8021q/vlan_dev.c | 3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/net/8021q/vlan_dev.c b/net/8021q/vlan_dev.c
index 2fc8fe2..b6e0eea 100644
--- a/net/8021q/vlan_dev.c
+++ b/net/8021q/vlan_dev.c
@@ -380,6 +380,9 @@ int vlan_dev_hard_header(struct sk_buff *skb, struct net_device *dev,
} else {
vhdr->h_vlan_encapsulated_proto = htons(len);
}
+
+ skb->protocol = htons(ETH_P_8021Q);
+ skb->nh.raw = skb->data;
}
/* Before delegating work to the lower layer, enter our MAC-address */
linux-2.6-20.8n-ppp_fix_skb_under_panic.patch:
ppp_async.c | 4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
--- NEW FILE linux-2.6-20.8n-ppp_fix_skb_under_panic.patch ---
Gitweb: http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c5050e3e49f6d89af0d63111611693d9625d1f5
Commit: 7c5050e3e49f6d89af0d63111611693d9625d1f5
Parent: 895e1fc7226e6732bc77138955b6c7dfa279f57a
Author: Paul Mackerras <paulus at samba.org>
AuthorDate: Thu Apr 19 13:05:52 2007 -0700
Committer: David S. Miller <davem at davemloft.net>
CommitDate: Thu Apr 19 13:05:52 2007 -0700
[PPP]: Fix skbuff.c:BUG due incorrect logic in process_input_packet()
From: Paul Mackerras <paulus at samba.org>
This fixes:
Subject: kernel BUG at net/core/skbuff.c in linux-2.6.21-rc6
process_input_packet() treats the case where the first byte is 0xff
(PPP_ALLSTATIONS) but the second byte is 0x03 (PPP_UI) as indicating a
packet with a PPP protocol number of 0xff. Arguably that's wrong
since PPP protocol 0xff is reserved, and the RFC does envision the
possibility of receiving frames where the control field has values
other than 0x03.
Signed-off-by: David S. Miller <davem at davemloft.net>
---
drivers/net/ppp_async.c | 4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/net/ppp_async.c b/drivers/net/ppp_async.c
index 933e2f3..caabbc4 100644
--- a/drivers/net/ppp_async.c
+++ b/drivers/net/ppp_async.c
@@ -802,9 +802,9 @@ process_input_packet(struct asyncppp *ap)
/* check for address/control and protocol compression */
p = skb->data;
- if (p[0] == PPP_ALLSTATIONS && p[1] == PPP_UI) {
+ if (p[0] == PPP_ALLSTATIONS) {
/* chop off address/control */
- if (skb->len < 3)
+ if (p[1] != PPP_UI || skb->len < 3)
goto err;
p = skb_pull(skb, 2);
}
linux-2.6-page_is_ram.patch:
e820.c | 2 +-
1 files changed, 1 insertion(+), 1 deletion(-)
--- NEW FILE linux-2.6-page_is_ram.patch ---
Make e820map non-initdata.
Otherwise execshild is broken.
--- linux-2.6.20.x86_64/arch/x86_64/kernel/e820.c.orig 2007-04-26 14:38:12.000000000 -0400
+++ linux-2.6.20.x86_64/arch/x86_64/kernel/e820.c 2007-04-26 14:38:24.000000000 -0400
@@ -25,7 +25,7 @@
#include <asm/bootsetup.h>
#include <asm/sections.h>
-struct e820map e820 __initdata;
+struct e820map e820;
/*
* PFN of last memory page.
--- NEW FILE patch-2.6.20.10-11.bz2.sign ---
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: See http://www.kernel.org/signature.html for info
iD8DBQBGN9+qyGugalF9Dw4RAp6mAJ9GTQyYpln+s5442QpXRtoQMwztsACgh2HN
+ja7W7F60EvN6prII08nHoQ=
=fyPC
-----END PGP SIGNATURE-----
--- NEW FILE patch-2.6.20.9-10.bz2.sign ---
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: See http://www.kernel.org/signature.html for info
iD8DBQBGMnJ8yGugalF9Dw4RAswuAJ0Xv/NuAjc397yS9xyXF9J93q+2TgCgjRnj
WRRoVHZln0Vi0xCvWnC4d08=
=VVLI
-----END PGP SIGNATURE-----
Index: .cvsignore
===================================================================
RCS file: /cvs/dist/rpms/kernel/FC-5/.cvsignore,v
retrieving revision 1.442
retrieving revision 1.443
diff -u -r1.442 -r1.443
--- .cvsignore 26 Apr 2007 15:04:06 -0000 1.442
+++ .cvsignore 2 May 2007 17:54:40 -0000 1.443
@@ -13,3 +13,5 @@
patch-2.6.20.6-7.bz2
patch-2.6.20.7-8.bz2
patch-2.6.20.8-9.bz2
+patch-2.6.20.9-10.bz2
+patch-2.6.20.10-11.bz2
Index: kernel-2.6.spec
===================================================================
RCS file: /cvs/dist/rpms/kernel/FC-5/kernel-2.6.spec,v
retrieving revision 1.2316
retrieving revision 1.2317
diff -u -r1.2316 -r1.2317
--- kernel-2.6.spec 27 Apr 2007 22:41:56 -0000 1.2316
+++ kernel-2.6.spec 2 May 2007 17:54:40 -0000 1.2317
@@ -319,7 +319,8 @@
Patch7: patch-2.6.20.6-7.bz2
Patch8: patch-2.6.20.7-8.bz2
Patch9: patch-2.6.20.8-9.bz2
-Patch10: linux-2.6.20.10-unoffical.patch
+Patch10: patch-2.6.20.9-10.bz2
+Patch11: patch-2.6.20.10-11.bz2
# Patches 10 through 99 are for things that are going upstream really soon.
@@ -466,8 +467,18 @@
Patch1809: linux-2.6-21-rc6-readahead.patch
Patch1810: linux-2.6-i386_pci-add_debugging.patch
+# post 2.6.20.11
+Patch1830: linux-2.6-20.8b-x86_perfctr_fix_bitmap_sizing.patch
+Patch1831: linux-2.6-20.8e-isdn-capi-disable-debug-messages.patch
+Patch1832: linux-2.6-20.8f-oom_kill_all_threads_that_share_mm.patch
+Patch1833: linux-2.6-20.8f-x86_64_always_flush_all_pages.patch
+Patch1834: linux-2.6-20.8n-ipsec_fix_oops_with_large_context.patch
+Patch1835: linux-2.6-20.8n-net_vlan_allow_with_bridge.patch
+Patch1836: linux-2.6-20.8n-ppp_fix_skb_under_panic.patch
+Patch1837: linux-2.6-page_is_ram.patch
+
# SELinux/audit patches.
-Patch1850: linux-2.6-selinux-mprotect-checks.patch
+Patch1890: linux-2.6-selinux-mprotect-checks.patch
# Warn about usage of various obsolete functionality that may go away.
Patch1900: linux-2.6-obsolete-oss-warning.patch
@@ -884,6 +895,7 @@
%patch8 -p1
%patch9 -p1
%patch10 -p1
+%patch11 -p1
# Patches 10 through 100 are meant for core subsystem upgrades
@@ -1105,8 +1117,18 @@
%patch1809 -p1
%patch1810 -p1
+# post 2.6.20.11
+%patch1830 -p1
+%patch1831 -p1
+%patch1832 -p1
+%patch1833 -p1
+%patch1834 -p1
+%patch1835 -p1
+%patch1836 -p1
+%patch1837 -p1
+
# Fix the SELinux mprotect checks on executable mappings
-%patch1850 -p1
+%patch1890 -p1
# Warn about obsolete functionality usage.
%patch1900 -p1
@@ -1894,6 +1916,11 @@
%endif
%changelog
+* Tue May 05 2007 Chuck Ebbert <cebbert at redhat.com> 1.2317
+- 2.6.20.10 (official)
+- 2.6.20.11
+- Additional fixes (1830 - 1837)
+
* Fri Apr 27 2007 Chuck Ebbert <cebbert at redhat.com> 1.2316
- 2.6.20.10 (from mailing list)
Index: sources
===================================================================
RCS file: /cvs/dist/rpms/kernel/FC-5/sources,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -r1.382 -r1.383
--- sources 26 Apr 2007 15:04:07 -0000 1.382
+++ sources 2 May 2007 17:54:40 -0000 1.383
@@ -9,3 +9,5 @@
557549a69f3ec7b615d252f302ad5099 patch-2.6.20.6-7.bz2
2d67b7c603a3cb081da1db6048bd7316 patch-2.6.20.7-8.bz2
931bd27010da400fc4902bef049904b9 patch-2.6.20.8-9.bz2
+26877e8750d036d6ea81a9bef6c685c6 patch-2.6.20.9-10.bz2
+71d6e53cf0accd8f09aa27ac9dd7f25d patch-2.6.20.10-11.bz2
Index: upstream
===================================================================
RCS file: /cvs/dist/rpms/kernel/FC-5/upstream,v
retrieving revision 1.345
retrieving revision 1.346
diff -u -r1.345 -r1.346
--- upstream 26 Apr 2007 15:04:07 -0000 1.345
+++ upstream 2 May 2007 17:54:40 -0000 1.346
@@ -8,3 +8,5 @@
patch-2.6.20.6-7.bz2
patch-2.6.20.7-8.bz2
patch-2.6.20.8-9.bz2
+patch-2.6.20.9-10.bz2
+patch-2.6.20.10-11.bz2
--- linux-2.6.20.10-unoffical.patch DELETED ---
- Previous message (by thread): rpms/kernel/FC-6 linux-2.6-20.8b-x86_perfctr_fix_bitmap_sizing.patch, NONE, 1.1 linux-2.6-20.8e-isdn-capi-disable-debug-messages.patch, NONE, 1.1 linux-2.6-20.8f-oom_kill_all_threads_that_share_mm.patch, NONE, 1.1 linux-2.6-20.8f-x86_64_always_flush_all_pages.patch, NONE, 1.1 linux-2.6-20.8n-ipsec_fix_oops_with_large_context.patch, NONE, 1.1 linux-2.6-20.8n-net_vlan_allow_with_bridge.patch, NONE, 1.1 linux-2.6-20.8n-ppp_fix_skb_under_panic.patch, NONE, 1.1 linux-2.6-page_is_ram.patch, NONE, 1.1 patch-2.6.20.10-11.bz2.sign, NONE, 1.1 patch-2.6.20.9-10.bz2.sign, NONE, 1.1 .cvsignore, 1.561, 1.562 kernel-2.6.spec, 1.2948, 1.2949 sources, 1.525, 1.526 upstream, 1.445, 1.446 linux-2.6.20.10-unoffical.patch, 1.1, NONE
- Next message (by thread): rpms/vim/FC-6 7.0.202,NONE,1.1
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-cvs-commits
mailing list