Hello community,
here is the log from the commit of package kernel-source
checked in at Fri Oct 5 00:37:31 CEST 2007.
--------
--- kernel-source/kernel-bigsmp.changes 2007-09-28 09:38:36.000000000 +0200
+++ /mounts/work_src_done/STABLE/kernel-source/kernel-bigsmp.changes 2007-10-04 19:24:39.219359000 +0200
@@ -1,0 +2,58 @@
+Thu Oct 4 19:23:56 CEST 2007 - jeffm@suse.de
+
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+
+-------------------------------------------------------------------
+Thu Oct 4 19:21:21 CEST 2007 - jeffm@suse.de
+
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+
+-------------------------------------------------------------------
+Tue Oct 2 19:55:51 CEST 2007 - lmb@suse.de
+
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+
+-------------------------------------------------------------------
+Sun Sep 30 22:16:14 CEST 2007 - kkeil@suse.de
+
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+
+-------------------------------------------------------------------
+Sun Sep 30 17:57:25 CEST 2007 - jeffm@suse.de
+
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+
+-------------------------------------------------------------------
+Sat Sep 29 22:47:14 CEST 2007 - teheo@suse.de
+
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+
+-------------------------------------------------------------------
+Fri Sep 28 23:57:28 CEST 2007 - agruen@suse.de
+
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+
+-------------------------------------------------------------------
+Fri Sep 28 22:04:58 CEST 2007 - jeffm@suse.de
+
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
+
+-------------------------------------------------------------------
kernel-debug.changes: same change
kernel-default.changes: same change
kernel-dummy.changes: same change
kernel-kdump.changes: same change
kernel-ppc64.changes: same change
kernel-rt.changes: same change
kernel-rt_debug.changes: same change
kernel-s390.changes: same change
kernel-source.changes: same change
kernel-syms.changes: same change
kernel-vanilla.changes: same change
kernel-xen.changes: same change
kernel-xenpae.changes: same change
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ kernel-bigsmp.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:27.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:27.000000000 +0200
@@ -39,7 +39,7 @@
%endif
Summary: Kernel with PAE Support
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: System/Kernel
AutoReqProv: on
@@ -169,7 +169,7 @@
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -556,6 +556,40 @@
%files -f kernel.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
kernel-debug.spec: same change
kernel-default.spec: same change
++++++ kernel-dummy.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:28.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:28.000000000 +0200
@@ -15,7 +15,7 @@
Url: http://www.kernel.org/
Summary: Internal dummy package for synchronizing release numbers
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: System/Kernel
AutoReqProv: off
@@ -28,7 +28,7 @@
--------
Andreas Gruenbacher
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%install
rm -rf %buildroot
@@ -39,6 +39,40 @@
%defattr(-, root, root)
/etc/dummy
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-kdump.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:28.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:28.000000000 +0200
@@ -39,7 +39,7 @@
%endif
Summary: kernel for kdump
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: System/Kernel
AutoReqProv: on
@@ -173,7 +173,7 @@
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -560,6 +560,40 @@
%files -f kernel.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-ppc64.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:28.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:28.000000000 +0200
@@ -38,7 +38,7 @@
%endif
Summary: Kernel for ppc64 Systems
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later; LGPL v2 or later
Group: System/Kernel
AutoReqProv: on
@@ -185,7 +185,7 @@
Tom Gall
see /usr/src/linux/CREDITS for more details.
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -572,6 +572,40 @@
%files -f kernel.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-rt_debug.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:29.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:29.000000000 +0200
@@ -39,7 +39,7 @@
%endif
Summary: A Debug Version of the Kernel
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: System/Kernel
AutoReqProv: on
@@ -171,7 +171,7 @@
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -558,6 +558,40 @@
%files -f kernel.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-rt.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:29.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:29.000000000 +0200
@@ -39,7 +39,7 @@
%endif
Summary: The Realtime Linux Kernel
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: System/Kernel
AutoReqProv: on
@@ -187,7 +187,7 @@
see /usr/src/linux/CREDITS for more details.
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -574,6 +574,40 @@
%files -f kernel.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-s390.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:29.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:29.000000000 +0200
@@ -39,7 +39,7 @@
%endif
Summary: The Standard Kernel
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: System/Kernel
AutoReqProv: on
@@ -167,7 +167,7 @@
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -554,6 +554,40 @@
%files -f kernel.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-source.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:29.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:29.000000000 +0200
@@ -22,7 +22,7 @@
%endif
Summary: The Linux Kernel Sources
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 only
Group: Development/Sources
AutoReqProv: off
@@ -105,7 +105,7 @@
see /usr/src/linux/CREDITS for more details.
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -277,6 +277,40 @@
%files -f kernel-source.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-syms.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:29.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:29.000000000 +0200
@@ -21,7 +21,7 @@
%endif
Summary: Kernel Symbol Versions (modversions)
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: Development/Sources
AutoReqProv: off
@@ -95,7 +95,7 @@
see /usr/src/linux/CREDITS for more details.
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
echo "Architecture symbol(s):" %symbols
@@ -149,6 +149,40 @@
/boot/symsets-*-*.tar.gz
/lib/modules/*/build
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
++++++ kernel-vanilla.spec ++++++
--- /var/tmp/diff_new_pack.x11868/_old 2007-10-05 00:34:30.000000000 +0200
+++ /var/tmp/diff_new_pack.x11868/_new 2007-10-05 00:34:30.000000000 +0200
@@ -39,7 +39,7 @@
%endif
Summary: The Standard Kernel - without any SUSE patches
Version: 2.6.22.9
-Release: 1
+Release: 2
License: GPL v2 or later
Group: System/Kernel
AutoReqProv: on
@@ -187,7 +187,7 @@
-Source Timestamp: 2007/09/27 22:31:16 UTC
+Source Timestamp: 2007/10/04 17:24:08 UTC
%prep
if ! [ -e %_sourcedir/linux-2.6.22.tar.bz2 ]; then
@@ -574,6 +574,40 @@
%files -f kernel.files
%changelog
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+* Thu Oct 04 2007 - jeffm@suse.de
+- patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg: kABI: rework
+ tcp_sendmsg fix from 2.6.22.6
+- patches.suse/kabi-safe-2.6.22.8-snd_mem: kABI: rework ALSA
+ memalloc seq_file change from 2.6.22.8
+- patches.suse/kabi-safe-2.6.22.9-mtd: kABI: revert
+ mtdcore/mtdsuper module merging from 2.6.22.9
+* Tue Oct 02 2007 - lmb@suse.de
+- patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sun Sep 30 2007 - kkeil@suse.de
+- patches.fixes/sky2-tx-sum-resume.patch: sky2: fix transmit
+ state on resume (#297132, #326376)
+* Sun Sep 30 2007 - jeffm@suse.de
+- patches.fixes/i386-fixup-TRACE_IRQ-breakage: i386: fixup
+ TRACE_IRQ breakage (326270, CVE-2007-3731).
+- patches.fixes/handle-bogus-%%cs-selector-in-single-step-instruction-decoding:
+ Handle bogus %%cs selector in single-step instruction decoding
+ (326270, CVE-2007-3731).
+* Sat Sep 29 2007 - teheo@suse.de
+- patches.drivers/libata-HPA-off-by-one-horkage: Fix HPA handling
+ regression (329584).
+* Fri Sep 28 2007 - agruen@suse.de
+- patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query filesystem
+ for NFSv4 getattr of FATTR4_MAXNAME (271803).
+* Fri Sep 28 2007 - jeffm@suse.de
+- patches.fixes/jffs2-fix-ACL-vs-mode-handling: Fix ACL vs. mode
+ handling. (310520).
* Fri Sep 28 2007 - agruen@suse.de
- kernel-syms.rpm: move the copies of the Modules.alias files from
/lib/modules/... to /usr/src/linux-obj/... to avoid a file
kernel-xenpae.spec: same change
kernel-xen.spec: same change
++++++ build-source-timestamp ++++++
--- kernel-source/build-source-timestamp 2007-09-28 09:38:31.000000000 +0200
+++ /mounts/work_src_done/STABLE/kernel-source/build-source-timestamp 2007-10-04 19:24:33.501071000 +0200
@@ -1 +1 @@
-2007/09/27 22:31:16 UTC
+2007/10/04 17:24:08 UTC
++++++ config.tar.bz2 ++++++
++++++ kabi-checks ++++++
--- kernel-source/kabi-checks 2007-09-28 09:38:39.000000000 +0200
+++ /mounts/work_src_done/STABLE/kernel-source/kabi-checks 2007-10-04 19:24:45.174385000 +0200
@@ -49,7 +49,7 @@
"
# Turning off UTF-8 processing provides a major speedup.
-export LC_ALL=C
+export LANG=POSIX
echo "${0##*/} $@"
@@ -159,24 +159,28 @@
}
filter_out_identical_symbols() {
- # This expression works no matter how many columns the files have.
- grep -v -P '^\S+ -(\S+)( \S+)+ \+\1( \S+)+$'
+ grep -v -P '^\S+ -(\S+) \S+ \+\1 \S+$'
}
check_modified_symbols() {
declare -i RC=0 _rc
+ declare ignored
- while read symbol tail; do
- # Split in half no matter how many columns the files have.
- set -- $tail ; half=$(($#/2+1))
- version1=$1 ; version2=${!half} ; shift
- source1=$1 ; source2=${!half} ; shift
-
+ while read symbol version1 source1 version2 source2; do
case "$version1$version2" in
-\#*)
continue
;;
-*+* | -*)
+ ignored=
+ case "$version1" in
+ *=\>*)
+ if [ "${version1#*=>}" = "${version2#+}" ]; then
+ version1="${version1%=>*}"
+ ignored="; ignored"
+ fi
+ ;;
+ esac
severity $symbol $source1 && continue
_rc=$?
if [ -z "$quiet" ]; then
@@ -188,8 +192,9 @@
else
echo -n "removed"
fi
- echo " (badness ${_rc})"
+ echo " (badness ${_rc}$ignored)"
fi
+ [ -n "$ignored" ] && _rc=0
;;
*)
if [ -n "$verbose" ]; then
++++++ kabi.tar.bz2 ++++++
++++ 52890 lines of diff (skipped)
++++++ needed_space_in_mb ++++++
--- kernel-source/needed_space_in_mb 2007-10-03 01:04:04.000000000 +0200
+++ /mounts/work_src_done/STABLE/kernel-source/needed_space_in_mb 2007-10-04 19:25:07.392144000 +0200
@@ -1 +1 @@
-6000
+6144
++++++ novell-kmp.tar.bz2 ++++++
++++++ patches.apparmor.tar.bz2 ++++++
++++++ patches.arch.tar.bz2 ++++++
++++++ patches.drivers.tar.bz2 ++++++
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.drivers/libata-HPA-off-by-one-horkage new/patches.drivers/libata-HPA-off-by-one-horkage
--- old/patches.drivers/libata-HPA-off-by-one-horkage 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.drivers/libata-HPA-off-by-one-horkage 2007-09-29 22:47:30.000000000 +0200
@@ -0,0 +1,54 @@
+From: Alan Cox
+Subject: [PATCH] Fix HPA handling regression
+References: 329584
+Patch-Mainline: pending
+
+Restore the support for handling drives that report one sector too many
+(ie SCSI not ATA style). This worked before the HPA update but was
+removed in that process
+
+Signed-off-by: Alan Cox
+Signed-off-by: Tejun Heo
+---
+---
+ drivers/ata/libata-core.c | 7 ++++++-
+ include/linux/libata.h | 1 +
+ 2 files changed, 7 insertions(+), 1 deletion(-)
+
+Index: linux-2.6.22/drivers/ata/libata-core.c
+===================================================================
+--- linux-2.6.22.orig/drivers/ata/libata-core.c
++++ linux-2.6.22/drivers/ata/libata-core.c
+@@ -940,7 +940,8 @@ static int ata_read_native_max_address(s
+ *max_sectors = ata_tf_to_lba48(&tf);
+ else
+ *max_sectors = ata_tf_to_lba(&tf);
+-
++ if (dev->horkage & ATA_HORKAGE_HPA_SIZE)
++ (*max_sectors)--;
+ return 0;
+ }
+
+@@ -3941,6 +3942,10 @@ static const struct ata_blacklist_entry
+ { "WDC WD2500JD-00HBB0", "WD-WMAL71490727", ATA_HORKAGE_BROKEN_HPA },
+ { "MAXTOR 6L080L4", "A93.0500", ATA_HORKAGE_BROKEN_HPA },
+
++ /* Devices which report 1 sector over size HPA */
++ { "ST340823A", NULL, ATA_HORKAGE_HPA_SIZE, },
++ { "ST320413A", NULL, ATA_HORKAGE_HPA_SIZE, },
++
+ /* End Marker */
+ { }
+ };
+Index: linux-2.6.22/include/linux/libata.h
+===================================================================
+--- linux-2.6.22.orig/include/linux/libata.h
++++ linux-2.6.22/include/linux/libata.h
+@@ -327,6 +327,7 @@ enum {
+ ATA_HORKAGE_MAX_SEC_128 = (1 << 3), /* Limit max sects to 128 */
+ ATA_HORKAGE_SKIP_PM = (1 << 4), /* Skip PM operations */
+ ATA_HORKAGE_BROKEN_HPA = (1 << 5), /* Broken HPA */
++ ATA_HORKAGE_HPA_SIZE = (1 << 6), /* Reports native size off by one */
+
+ /* DMA mask for user DMA control: User visible values do not
+ renumber */
++++++ patches.fixes.tar.bz2 ++++++
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.fixes/handle-bogus-%cs-selector-in-single-step-instruction-decoding new/patches.fixes/handle-bogus-%cs-selector-in-single-step-instruction-decoding
--- old/patches.fixes/handle-bogus-%cs-selector-in-single-step-instruction-decoding 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.fixes/handle-bogus-%cs-selector-in-single-step-instruction-decoding 2007-09-30 17:55:57.000000000 +0200
@@ -0,0 +1,91 @@
+From: Roland McGrath
+Date: Mon, 16 Jul 2007 08:03:16 +0000 (-0700)
+Subject: Handle bogus %cs selector in single-step instruction decoding
+Patch-mainline: 2.6.23-rc1
+References: 326270, CVE-2007-3731
+
+Handle bogus %cs selector in single-step instruction decoding
+
+The code for LDT segment selectors was not robust in the face of a bogus
+selector set in %cs via ptrace before the single-step was done.
+
+Signed-off-by: Roland McGrath
+Signed-off-by: Linus Torvalds
+Acked-by: Jeff Mahoney
+---
+
+ arch/i386/kernel/ptrace.c | 22 +++++++++++++++-------
+ arch/x86_64/kernel/ptrace.c | 23 ++++++++++++++++-------
+ 2 files changed, 31 insertions(+), 14 deletions(-)
+
+diff --git a/arch/i386/kernel/ptrace.c b/arch/i386/kernel/ptrace.c
+index 1c075f5..0c8f00e 100644
+--- a/arch/i386/kernel/ptrace.c
++++ b/arch/i386/kernel/ptrace.c
+@@ -164,14 +164,22 @@ static unsigned long convert_eip_to_linear(struct task_struct *child, struct pt_
+ u32 *desc;
+ unsigned long base;
+
+- down(&child->mm->context.sem);
+- desc = child->mm->context.ldt + (seg & ~7);
+- base = (desc[0] >> 16) | ((desc[1] & 0xff) << 16) | (desc[1] & 0xff000000);
++ seg &= ~7UL;
+
+- /* 16-bit code segment? */
+- if (!((desc[1] >> 22) & 1))
+- addr &= 0xffff;
+- addr += base;
++ down(&child->mm->context.sem);
++ if (unlikely((seg >> 3) >= child->mm->context.size))
++ addr = -1L; /* bogus selector, access would fault */
++ else {
++ desc = child->mm->context.ldt + seg;
++ base = ((desc[0] >> 16) |
++ ((desc[1] & 0xff) << 16) |
++ (desc[1] & 0xff000000));
++
++ /* 16-bit code segment? */
++ if (!((desc[1] >> 22) & 1))
++ addr &= 0xffff;
++ addr += base;
++ }
+ up(&child->mm->context.sem);
+ }
+ return addr;
+diff --git a/arch/x86_64/kernel/ptrace.c b/arch/x86_64/kernel/ptrace.c
+index fa6775e..e83cc67 100644
+--- a/arch/x86_64/kernel/ptrace.c
++++ b/arch/x86_64/kernel/ptrace.c
+@@ -102,16 +102,25 @@ unsigned long convert_rip_to_linear(struct task_struct *child, struct pt_regs *r
+ u32 *desc;
+ unsigned long base;
+
+- down(&child->mm->context.sem);
+- desc = child->mm->context.ldt + (seg & ~7);
+- base = (desc[0] >> 16) | ((desc[1] & 0xff) << 16) | (desc[1] & 0xff000000);
++ seg &= ~7UL;
+
+- /* 16-bit code segment? */
+- if (!((desc[1] >> 22) & 1))
+- addr &= 0xffff;
+- addr += base;
++ down(&child->mm->context.sem);
++ if (unlikely((seg >> 3) >= child->mm->context.size))
++ addr = -1L; /* bogus selector, access would fault */
++ else {
++ desc = child->mm->context.ldt + seg;
++ base = ((desc[0] >> 16) |
++ ((desc[1] & 0xff) << 16) |
++ (desc[1] & 0xff000000));
++
++ /* 16-bit code segment? */
++ if (!((desc[1] >> 22) & 1))
++ addr &= 0xffff;
++ addr += base;
++ }
+ up(&child->mm->context.sem);
+ }
++
+ return addr;
+ }
+
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.fixes/i386-fixup-TRACE_IRQ-breakage new/patches.fixes/i386-fixup-TRACE_IRQ-breakage
--- old/patches.fixes/i386-fixup-TRACE_IRQ-breakage 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.fixes/i386-fixup-TRACE_IRQ-breakage 2007-09-30 17:55:58.000000000 +0200
@@ -0,0 +1,69 @@
+From: Peter Zijlstra
+Date: Wed, 18 Jul 2007 18:59:22 +0000 (+0200)
+Subject: i386: fixup TRACE_IRQ breakage
+Patch-mainline: 2.6.23-rc1
+References: 326270, CVE-2007-3731
+
+i386: fixup TRACE_IRQ breakage
+
+The TRACE_IRQS_ON function in iret_exc: calls a C function without
+ensuring that the segments are set properly. Move the trace function and
+the enabling of interrupt into the C stub.
+
+Signed-off-by: Peter Zijlstra
+Signed-off-by: Linus Torvalds
+Acked-by: Jeff Mahoney
+---
+
+ arch/i386/kernel/entry.S | 2 --
+ arch/i386/kernel/traps.c | 10 ++++++----
+ 2 files changed, 6 insertions(+), 6 deletions(-)
+
+diff --git a/arch/i386/kernel/entry.S b/arch/i386/kernel/entry.S
+index 32980b8..a714d6b 100644
+--- a/arch/i386/kernel/entry.S
++++ b/arch/i386/kernel/entry.S
+@@ -409,8 +409,6 @@ restore_nocheck_notrace:
+ 1: INTERRUPT_RETURN
+ .section .fixup,"ax"
+ iret_exc:
+- TRACE_IRQS_ON
+- ENABLE_INTERRUPTS(CLBR_NONE)
+ pushl $0 # no error code
+ pushl $do_iret_error
+ jmp error_code
+diff --git a/arch/i386/kernel/traps.c b/arch/i386/kernel/traps.c
+index 18c1c28..d32fd4b 100644
+--- a/arch/i386/kernel/traps.c
++++ b/arch/i386/kernel/traps.c
+@@ -518,10 +518,12 @@ fastcall void do_##name(struct pt_regs * regs, long error_code) \
+ do_trap(trapnr, signr, str, 0, regs, error_code, NULL); \
+ }
+
+-#define DO_ERROR_INFO(trapnr, signr, str, name, sicode, siaddr) \
++#define DO_ERROR_INFO(trapnr, signr, str, name, sicode, siaddr, irq) \
+ fastcall void do_##name(struct pt_regs * regs, long error_code) \
+ { \
+ siginfo_t info; \
++ if (irq) \
++ local_irq_enable(); \
+ info.si_signo = signr; \
+ info.si_errno = 0; \
+ info.si_code = sicode; \
+@@ -561,13 +563,13 @@ DO_VM86_ERROR( 3, SIGTRAP, "int3", int3)
+ #endif
+ DO_VM86_ERROR( 4, SIGSEGV, "overflow", overflow)
+ DO_VM86_ERROR( 5, SIGSEGV, "bounds", bounds)
+-DO_ERROR_INFO( 6, SIGILL, "invalid opcode", invalid_op, ILL_ILLOPN, regs->eip)
++DO_ERROR_INFO( 6, SIGILL, "invalid opcode", invalid_op, ILL_ILLOPN, regs->eip, 0)
+ DO_ERROR( 9, SIGFPE, "coprocessor segment overrun", coprocessor_segment_overrun)
+ DO_ERROR(10, SIGSEGV, "invalid TSS", invalid_TSS)
+ DO_ERROR(11, SIGBUS, "segment not present", segment_not_present)
+ DO_ERROR(12, SIGBUS, "stack segment", stack_segment)
+-DO_ERROR_INFO(17, SIGBUS, "alignment check", alignment_check, BUS_ADRALN, 0)
+-DO_ERROR_INFO(32, SIGSEGV, "iret exception", iret_error, ILL_BADSTK, 0)
++DO_ERROR_INFO(17, SIGBUS, "alignment check", alignment_check, BUS_ADRALN, 0, 0)
++DO_ERROR_INFO(32, SIGSEGV, "iret exception", iret_error, ILL_BADSTK, 0, 1)
+
+ fastcall void __kprobes do_general_protection(struct pt_regs * regs,
+ long error_code)
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.fixes/jffs2-fix-ACL-vs-mode-handling new/patches.fixes/jffs2-fix-ACL-vs-mode-handling
--- old/patches.fixes/jffs2-fix-ACL-vs-mode-handling 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.fixes/jffs2-fix-ACL-vs-mode-handling 2007-09-28 22:03:56.000000000 +0200
@@ -0,0 +1,357 @@
+From: David Woodhouse
+Date: Wed, 22 Aug 2007 11:39:19 +0000 (+0100)
+Subject: [JFFS2] Fix ACL vs. mode handling.
+Patch-Mainline: not yet
+X-Git-Url: http://git.infradead.org/?p=mtd-2.6.git;a=commitdiff_plain;h=9ed437c50d89eab...
+References: 310520
+
+[JFFS2] Fix ACL vs. mode handling.
+
+When POSIX ACL support was enabled, we weren't writing correct
+legacy modes to the medium on inode creation, or when the ACL was set.
+This meant that the permissions would be incorrect after the file system
+was remounted.
+
+Signed-off-by: David Woodhouse
+---
+
+diff --git a/fs/jffs2/acl.c b/fs/jffs2/acl.c
+index 65b3a1b..8ec9323 100644
+--- a/fs/jffs2/acl.c
++++ b/fs/jffs2/acl.c
+@@ -176,7 +176,7 @@ static void jffs2_iset_acl(struct inode *inode, struct posix_acl **i_acl, struct
+ spin_unlock(&inode->i_lock);
+ }
+
+-static struct posix_acl *jffs2_get_acl(struct inode *inode, int type)
++struct posix_acl *jffs2_get_acl(struct inode *inode, int type)
+ {
+ struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode);
+ struct posix_acl *acl;
+@@ -247,8 +247,13 @@ static int jffs2_set_acl(struct inode *inode, int type, struct posix_acl *acl)
+ if (rc < 0)
+ return rc;
+ if (inode->i_mode != mode) {
+- inode->i_mode = mode;
+- jffs2_dirty_inode(inode);
++ struct iattr attr;
++
++ attr.ia_valid = ATTR_MODE;
++ attr.ia_mode = mode;
++ rc = jffs2_do_setattr(inode, &attr);
++ if (rc < 0)
++ return rc;
+ }
+ if (rc == 0)
+ acl = NULL;
+@@ -307,22 +312,16 @@ int jffs2_permission(struct inode *inode, int mask, struct nameidata *nd)
+ return generic_permission(inode, mask, jffs2_check_acl);
+ }
+
+-int jffs2_init_acl(struct inode *inode, struct inode *dir)
++int jffs2_init_acl(struct inode *inode, struct posix_acl *acl)
+ {
+ struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode);
+- struct posix_acl *acl = NULL, *clone;
++ struct posix_acl *clone;
+ mode_t mode;
+ int rc = 0;
+
+ f->i_acl_access = JFFS2_ACL_NOT_CACHED;
+ f->i_acl_default = JFFS2_ACL_NOT_CACHED;
+- if (!S_ISLNK(inode->i_mode)) {
+- acl = jffs2_get_acl(dir, ACL_TYPE_DEFAULT);
+- if (IS_ERR(acl))
+- return PTR_ERR(acl);
+- if (!acl)
+- inode->i_mode &= ~current->fs->umask;
+- }
++
+ if (acl) {
+ if (S_ISDIR(inode->i_mode)) {
+ rc = jffs2_set_acl(inode, ACL_TYPE_DEFAULT, acl);
+diff --git a/fs/jffs2/acl.h b/fs/jffs2/acl.h
+index c84378c..90a2dbf 100644
+--- a/fs/jffs2/acl.h
++++ b/fs/jffs2/acl.h
+@@ -28,9 +28,10 @@ struct jffs2_acl_header {
+
+ #define JFFS2_ACL_NOT_CACHED ((void *)-1)
+
++extern struct posix_acl *jffs2_get_acl(struct inode *inode, int type);
+ extern int jffs2_permission(struct inode *, int, struct nameidata *);
+ extern int jffs2_acl_chmod(struct inode *);
+-extern int jffs2_init_acl(struct inode *, struct inode *);
++extern int jffs2_init_acl(struct inode *, struct posix_acl *);
+ extern void jffs2_clear_acl(struct jffs2_inode_info *);
+
+ extern struct xattr_handler jffs2_acl_access_xattr_handler;
+@@ -38,6 +39,7 @@ extern struct xattr_handler jffs2_acl_default_xattr_handler;
+
+ #else
+
++#define jffs2_get_acl(inode, type) (NULL)
+ #define jffs2_permission NULL
+ #define jffs2_acl_chmod(inode) (0)
+ #define jffs2_init_acl(inode,dir) (0)
+diff --git a/fs/jffs2/dir.c b/fs/jffs2/dir.c
+index d293a1f..8353eb9 100644
+--- a/fs/jffs2/dir.c
++++ b/fs/jffs2/dir.c
+@@ -182,6 +182,7 @@ static int jffs2_create(struct inode *dir_i, struct dentry *dentry, int mode,
+ struct jffs2_inode_info *f, *dir_f;
+ struct jffs2_sb_info *c;
+ struct inode *inode;
++ struct posix_acl *acl;
+ int ret;
+
+ ri = jffs2_alloc_raw_inode();
+@@ -192,7 +193,7 @@ static int jffs2_create(struct inode *dir_i, struct dentry *dentry, int mode,
+
+ D1(printk(KERN_DEBUG "jffs2_create()\n"));
+
+- inode = jffs2_new_inode(dir_i, mode, ri);
++ inode = jffs2_new_inode(dir_i, mode, ri, &acl);
+
+ if (IS_ERR(inode)) {
+ D1(printk(KERN_DEBUG "jffs2_new_inode() failed\n"));
+@@ -212,12 +213,12 @@ static int jffs2_create(struct inode *dir_i, struct dentry *dentry, int mode,
+ dentry->d_name.name, dentry->d_name.len);
+
+ if (ret)
+- goto fail;
++ goto fail_acl;
+
+ ret = jffs2_init_security(inode, dir_i);
+ if (ret)
+- goto fail;
+- ret = jffs2_init_acl(inode, dir_i);
++ goto fail_acl;
++ ret = jffs2_init_acl(inode, acl);
+ if (ret)
+ goto fail;
+
+@@ -230,6 +231,8 @@ static int jffs2_create(struct inode *dir_i, struct dentry *dentry, int mode,
+ inode->i_ino, inode->i_mode, inode->i_nlink, f->inocache->nlink, inode->i_mapping->nrpages));
+ return 0;
+
++ fail_acl:
++ posix_acl_release(acl);
+ fail:
+ make_bad_inode(inode);
+ iput(inode);
+@@ -306,6 +309,7 @@ static int jffs2_symlink (struct inode *dir_i, struct dentry *dentry, const char
+ struct jffs2_full_dirent *fd;
+ int namelen;
+ uint32_t alloclen;
++ struct posix_acl *acl;
+ int ret, targetlen = strlen(target);
+
+ /* FIXME: If you care. We'd need to use frags for the target
+@@ -332,7 +336,7 @@ static int jffs2_symlink (struct inode *dir_i, struct dentry *dentry, const char
+ return ret;
+ }
+
+- inode = jffs2_new_inode(dir_i, S_IFLNK | S_IRWXUGO, ri);
++ inode = jffs2_new_inode(dir_i, S_IFLNK | S_IRWXUGO, ri, &acl);
+
+ if (IS_ERR(inode)) {
+ jffs2_free_raw_inode(ri);
+@@ -362,6 +366,7 @@ static int jffs2_symlink (struct inode *dir_i, struct dentry *dentry, const char
+ up(&f->sem);
+ jffs2_complete_reservation(c);
+ jffs2_clear_inode(inode);
++ posix_acl_release(acl);
+ return PTR_ERR(fn);
+ }
+
+@@ -372,6 +377,7 @@ static int jffs2_symlink (struct inode *dir_i, struct dentry *dentry, const char
+ up(&f->sem);
+ jffs2_complete_reservation(c);
+ jffs2_clear_inode(inode);
++ posix_acl_release(acl);
+ return -ENOMEM;
+ }
+
+@@ -389,9 +395,10 @@ static int jffs2_symlink (struct inode *dir_i, struct dentry *dentry, const char
+ ret = jffs2_init_security(inode, dir_i);
+ if (ret) {
+ jffs2_clear_inode(inode);
++ posix_acl_release(acl);
+ return ret;
+ }
+- ret = jffs2_init_acl(inode, dir_i);
++ ret = jffs2_init_acl(inode, acl);
+ if (ret) {
+ jffs2_clear_inode(inode);
+ return ret;
+@@ -469,6 +476,7 @@ static int jffs2_mkdir (struct inode *dir_i, struct dentry *dentry, int mode)
+ struct jffs2_full_dirent *fd;
+ int namelen;
+ uint32_t alloclen;
++ struct posix_acl *acl;
+ int ret;
+
+ mode |= S_IFDIR;
+@@ -491,7 +499,7 @@ static int jffs2_mkdir (struct inode *dir_i, struct dentry *dentry, int mode)
+ return ret;
+ }
+
+- inode = jffs2_new_inode(dir_i, mode, ri);
++ inode = jffs2_new_inode(dir_i, mode, ri, &acl);
+
+ if (IS_ERR(inode)) {
+ jffs2_free_raw_inode(ri);
+@@ -518,6 +526,7 @@ static int jffs2_mkdir (struct inode *dir_i, struct dentry *dentry, int mode)
+ up(&f->sem);
+ jffs2_complete_reservation(c);
+ jffs2_clear_inode(inode);
++ posix_acl_release(acl);
+ return PTR_ERR(fn);
+ }
+ /* No data here. Only a metadata node, which will be
+@@ -531,9 +540,10 @@ static int jffs2_mkdir (struct inode *dir_i, struct dentry *dentry, int mode)
+ ret = jffs2_init_security(inode, dir_i);
+ if (ret) {
+ jffs2_clear_inode(inode);
++ posix_acl_release(acl);
+ return ret;
+ }
+- ret = jffs2_init_acl(inode, dir_i);
++ ret = jffs2_init_acl(inode, acl);
+ if (ret) {
+ jffs2_clear_inode(inode);
+ return ret;
+@@ -629,6 +639,7 @@ static int jffs2_mknod (struct inode *dir_i, struct dentry *dentry, int mode, de
+ union jffs2_device_node dev;
+ int devlen = 0;
+ uint32_t alloclen;
++ struct posix_acl *acl;
+ int ret;
+
+ if (!new_valid_dev(rdev))
+@@ -655,7 +666,7 @@ static int jffs2_mknod (struct inode *dir_i, struct dentry *dentry, int mode, de
+ return ret;
+ }
+
+- inode = jffs2_new_inode(dir_i, mode, ri);
++ inode = jffs2_new_inode(dir_i, mode, ri, &acl);
+
+ if (IS_ERR(inode)) {
+ jffs2_free_raw_inode(ri);
+@@ -684,6 +695,7 @@ static int jffs2_mknod (struct inode *dir_i, struct dentry *dentry, int mode, de
+ up(&f->sem);
+ jffs2_complete_reservation(c);
+ jffs2_clear_inode(inode);
++ posix_acl_release(acl);
+ return PTR_ERR(fn);
+ }
+ /* No data here. Only a metadata node, which will be
+@@ -697,9 +709,10 @@ static int jffs2_mknod (struct inode *dir_i, struct dentry *dentry, int mode, de
+ ret = jffs2_init_security(inode, dir_i);
+ if (ret) {
+ jffs2_clear_inode(inode);
++ posix_acl_release(acl);
+ return ret;
+ }
+- ret = jffs2_init_acl(inode, dir_i);
++ ret = jffs2_init_acl(inode, acl);
+ if (ret) {
+ jffs2_clear_inode(inode);
+ return ret;
+diff --git a/fs/jffs2/fs.c b/fs/jffs2/fs.c
+index 1d3b7a9..dd64ddc 100644
+--- a/fs/jffs2/fs.c
++++ b/fs/jffs2/fs.c
+@@ -24,7 +24,7 @@
+
+ static int jffs2_flash_setup(struct jffs2_sb_info *c);
+
+-static int jffs2_do_setattr (struct inode *inode, struct iattr *iattr)
++int jffs2_do_setattr (struct inode *inode, struct iattr *iattr)
+ {
+ struct jffs2_full_dnode *old_metadata, *new_metadata;
+ struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode);
+@@ -36,10 +36,8 @@ static int jffs2_do_setattr (struct inode *inode, struct iattr *iattr)
+ unsigned int ivalid;
+ uint32_t alloclen;
+ int ret;
++
+ D1(printk(KERN_DEBUG "jffs2_setattr(): ino #%lu\n", inode->i_ino));
+- ret = inode_change_ok(inode, iattr);
+- if (ret)
+- return ret;
+
+ /* Special cases - we don't want more than one data node
+ for these types on the medium at any time. So setattr
+@@ -183,9 +181,14 @@ int jffs2_setattr(struct dentry *dentry, struct iattr *iattr)
+ {
+ int rc;
+
++ rc = inode_change_ok(dentry->d_inode, iattr);
++ if (rc)
++ return rc;
++
+ rc = jffs2_do_setattr(dentry->d_inode, iattr);
+ if (!rc && (iattr->ia_valid & ATTR_MODE))
+ rc = jffs2_acl_chmod(dentry->d_inode);
++
+ return rc;
+ }
+
+@@ -399,7 +402,8 @@ void jffs2_write_super (struct super_block *sb)
+
+ /* jffs2_new_inode: allocate a new inode and inocache, add it to the hash,
+ fill in the raw_inode while you're at it. */
+-struct inode *jffs2_new_inode (struct inode *dir_i, int mode, struct jffs2_raw_inode *ri)
++struct inode *jffs2_new_inode (struct inode *dir_i, int mode, struct jffs2_raw_inode *ri,
++ struct posix_acl **acl)
+ {
+ struct inode *inode;
+ struct super_block *sb = dir_i->i_sb;
+@@ -431,7 +435,23 @@ struct inode *jffs2_new_inode (struct inode *dir_i, int mode, struct jffs2_raw_i
+ } else {
+ ri->gid = cpu_to_je16(current->fsgid);
+ }
+- ri->mode = cpu_to_jemode(mode);
++
++ /* POSIX ACLs have to be processed now, at least partly.
++ The umask is only applied if there's no default ACL */
++ if (!S_ISLNK(mode)) {
++ *acl = jffs2_get_acl(dir_i, ACL_TYPE_DEFAULT);
++ if (IS_ERR(*acl)) {
++ make_bad_inode(inode);
++ iput(inode);
++ inode = (void *)*acl;
++ *acl = NULL;
++ return inode;
++ }
++ if (!(*acl))
++ mode &= ~current->fs->umask;
++ } else {
++ *acl = NULL;
++ }
+ ret = jffs2_do_new_inode (c, f, mode, ri);
+ if (ret) {
+ make_bad_inode(inode);
+diff --git a/fs/jffs2/os-linux.h b/fs/jffs2/os-linux.h
+index 80daea9..f6743a9 100644
+--- a/fs/jffs2/os-linux.h
++++ b/fs/jffs2/os-linux.h
+@@ -173,12 +173,15 @@ int jffs2_ioctl(struct inode *, struct file *, unsigned int, unsigned long);
+ extern const struct inode_operations jffs2_symlink_inode_operations;
+
+ /* fs.c */
++struct posix_acl;
++
+ int jffs2_setattr (struct dentry *, struct iattr *);
++int jffs2_do_setattr (struct inode *, struct iattr *);
+ void jffs2_read_inode (struct inode *);
+ void jffs2_clear_inode (struct inode *);
+ void jffs2_dirty_inode(struct inode *inode);
+ struct inode *jffs2_new_inode (struct inode *dir_i, int mode,
+- struct jffs2_raw_inode *ri);
++ struct jffs2_raw_inode *ri, struct posix_acl **acl);
+ int jffs2_statfs (struct dentry *, struct kstatfs *);
+ void jffs2_write_super (struct super_block *);
+ int jffs2_remount_fs (struct super_block *, int *, char *);
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.fixes/nfsv4-MAXNAME-fix.diff new/patches.fixes/nfsv4-MAXNAME-fix.diff
--- old/patches.fixes/nfsv4-MAXNAME-fix.diff 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.fixes/nfsv4-MAXNAME-fix.diff 2007-09-28 23:57:09.000000000 +0200
@@ -0,0 +1,38 @@
+From: J. Bruce Fields
+Date: Fri, 28 Sep 2007 16:45:51 -0400
+Subject: knfsd: query filesystem for NFSv4 getattr of FATTR4_MAXNAME
+References: 271803
+Patch-mainline: 2.6.24 (likely)
+
+Without this we always return 2^32-1 as the the maximum namelength.
+
+Signed-off-by: J. Bruce Fields
+Signed-off-by: Andreas Gruenbacher
+
+---
+ fs/nfsd/nfs4xdr.c | 5 +++--
+ 1 files changed, 3 insertions(+), 2 deletions(-)
+
+diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c
+index 9cf9007..e15f2cf 100644
+--- a/fs/nfsd/nfs4xdr.c
++++ b/fs/nfsd/nfs4xdr.c
+@@ -1475,7 +1475,8 @@ nfsd4_encode_fattr(struct svc_fh *fhp, struct svc_export *exp,
+ err = vfs_getattr(exp->ex_mnt, dentry, &stat);
+ if (err)
+ goto out_nfserr;
+- if ((bmval0 & (FATTR4_WORD0_FILES_FREE | FATTR4_WORD0_FILES_TOTAL)) ||
++ if ((bmval0 & (FATTR4_WORD0_FILES_FREE | FATTR4_WORD0_FILES_TOTAL |
++ FATTR4_WORD0_MAXNAME)) ||
+ (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
+ FATTR4_WORD1_SPACE_TOTAL))) {
+ err = vfs_statfs(dentry, &statfs);
+@@ -1721,7 +1722,7 @@ out_acl:
+ if (bmval0 & FATTR4_WORD0_MAXNAME) {
+ if ((buflen -= 4) < 0)
+ goto out_resource;
+- WRITE32(~(u32) 0);
++ WRITE32(statfs.f_namelen);
+ }
+ if (bmval0 & FATTR4_WORD0_MAXREAD) {
+ if ((buflen -= 8) < 0)
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.fixes/sky2-tx-sum-resume.patch new/patches.fixes/sky2-tx-sum-resume.patch
--- old/patches.fixes/sky2-tx-sum-resume.patch 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.fixes/sky2-tx-sum-resume.patch 2007-09-30 22:17:35.000000000 +0200
@@ -0,0 +1,48 @@
+From: Stephen Hemminger
+Acked-by: Karsten Keil
+Subject: sky2: fix transmit state on resume
+
+After resume, driver has reset the chip so the current state
+of transmit checksum offload state machine and DMA state machine
+will be undefined.
+
+The fix is to set the state so that first Tx will set MSS and offset
+values.
+
+Signed-off-by: Stephen Hemminger
+
+Index: linux-2.6.22/drivers/net/sky2.c
+===================================================================
+--- linux-2.6.22.orig/drivers/net/sky2.c
++++ linux-2.6.22/drivers/net/sky2.c
+@@ -835,6 +835,20 @@ static inline struct sky2_tx_le *get_tx_
+ return le;
+ }
+
++static void tx_init(struct sky2_port *sky2)
++{
++ struct sky2_tx_le *le;
++
++ sky2->tx_prod = sky2->tx_cons = 0;
++ sky2->tx_tcpsum = 0;
++ sky2->tx_last_mss = 0;
++
++ le = get_tx_le(sky2);
++ le->addr = 0;
++ le->opcode = OP_ADDR64 | HW_OWNER;
++ sky2->tx_addr64 = 0;
++}
++
+ static inline struct tx_ring_info *tx_le_re(struct sky2_port *sky2,
+ struct sky2_tx_le *le)
+ {
+@@ -1248,7 +1262,8 @@ static int sky2_up(struct net_device *de
+ GFP_KERNEL);
+ if (!sky2->tx_ring)
+ goto err_out;
+- sky2->tx_prod = sky2->tx_cons = 0;
++
++ tx_init(sky2);
+
+ sky2->rx_le = pci_alloc_consistent(hw->pdev, RX_LE_BYTES,
+ &sky2->rx_le_map);
++++++ patches.kernel.org.tar.bz2 ++++++
++++++ patches.rpmify.tar.bz2 ++++++
++++++ patches.rt.tar.bz2 ++++++
++++++ patches.suse.tar.bz2 ++++++
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg new/patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg
--- old/patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg 2007-10-04 19:20:13.000000000 +0200
@@ -0,0 +1,63 @@
+From: Jeff Mahoney
+Subject: [PATCH] kABI: rework tcp_sendmsg fix from 2.6.22.6
+References: None, proactive fix.
+Patch-mainline: Never
+
+ This patch adds a trampoline so we don't change the prototype of tcp_sendmsg.
+
+Signed-off-by: Jeff Mahoney
+---
+ include/net/tcp.h | 2 +-
+ net/ipv4/af_inet.c | 8 +++++++-
+ net/ipv4/tcp.c | 3 +--
+ 3 files changed, 9 insertions(+), 4 deletions(-)
+
+--- a/include/net/tcp.h 2007-10-01 15:36:23.000000000 -0400
++++ b/include/net/tcp.h 2007-10-01 15:38:03.000000000 -0400
+@@ -281,7 +281,7 @@ extern int tcp_v4_remember_stamp(struc
+
+ extern int tcp_v4_tw_remember_stamp(struct inet_timewait_sock *tw);
+
+-extern int tcp_sendmsg(struct kiocb *iocb, struct socket *sock,
++extern int tcp_sendmsg(struct kiocb *iocb, struct sock *sk,
+ struct msghdr *msg, size_t size);
+ extern ssize_t tcp_sendpage(struct socket *sock, struct page *page, int offset, size_t size, int flags);
+
+--- a/net/ipv4/af_inet.c 2007-10-01 15:36:23.000000000 -0400
++++ b/net/ipv4/af_inet.c 2007-10-01 15:41:13.000000000 -0400
+@@ -692,6 +692,12 @@ int inet_sendmsg(struct kiocb *iocb, str
+ return sk->sk_prot->sendmsg(iocb, sk, msg, size);
+ }
+
++/* KABI safe workaround for 2.6.22.6 tcp_sendmsg change -jeffm */
++static int inet_tcp_sendmsg(struct kiocb *iocb, struct socket *sock,
++ struct msghdr *msg, size_t size)
++{
++ return tcp_sendmsg(iocb, sock->sk, msg, size);
++}
+
+ static ssize_t inet_sendpage(struct socket *sock, struct page *page, int offset, size_t size, int flags)
+ {
+@@ -831,7 +837,7 @@ const struct proto_ops inet_stream_ops =
+ .shutdown = inet_shutdown,
+ .setsockopt = sock_common_setsockopt,
+ .getsockopt = sock_common_getsockopt,
+- .sendmsg = tcp_sendmsg,
++ .sendmsg = inet_tcp_sendmsg,
+ .recvmsg = sock_common_recvmsg,
+ .mmap = sock_no_mmap,
+ .sendpage = tcp_sendpage,
+--- a/net/ipv4/tcp.c 2007-10-01 15:36:23.000000000 -0400
++++ b/net/ipv4/tcp.c 2007-10-01 15:38:17.000000000 -0400
+@@ -658,10 +658,9 @@ static inline int select_size(struct soc
+ return tmp;
+ }
+
+-int tcp_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg,
++int tcp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
+ size_t size)
+ {
+- struct sock *sk = sock->sk;
+ struct iovec *iov;
+ struct tcp_sock *tp = tcp_sk(sk);
+ struct sk_buff *skb;
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.suse/kabi-safe-2.6.22.8-snd_mem new/patches.suse/kabi-safe-2.6.22.8-snd_mem
--- old/patches.suse/kabi-safe-2.6.22.8-snd_mem 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.suse/kabi-safe-2.6.22.8-snd_mem 2007-10-04 19:18:28.000000000 +0200
@@ -0,0 +1,71 @@
+From: Jeff Mahoney
+Subject: [PATCH] kABI: rework ALSA memalloc seq_file change from 2.6.22.8
+References: None, proactive fix
+Patch-mainline: Never
+
+ This patch moves the exports and #include's to preserve the exported symbol
+ symvers. This is really just working around a stupidity in the ksym
+ calculations.
+
+Signed-off-by: Jeff Mahoney
+---
+ sound/core/memalloc.c | 31 +++++++++++++++++--------------
+ 1 file changed, 17 insertions(+), 14 deletions(-)
+
+--- a/sound/core/memalloc.c 2007-10-03 10:50:09.000000000 -0400
++++ b/sound/core/memalloc.c 2007-10-03 10:53:10.000000000 -0400
+@@ -27,7 +27,6 @@
+ #include
+ #include
+ #include
+-#include
+ #include
+ #include
+ #include
+@@ -474,11 +474,28 @@ static void free_all_reserved_pages(void
+ mutex_unlock(&list_mutex);
+ }
+
++/*
++ * exports
++ */
++EXPORT_SYMBOL(snd_dma_alloc_pages);
++EXPORT_SYMBOL(snd_dma_alloc_pages_fallback);
++EXPORT_SYMBOL(snd_dma_free_pages);
++
++EXPORT_SYMBOL(snd_dma_get_reserved_buf);
++EXPORT_SYMBOL(snd_dma_reserve_buf);
++
++EXPORT_SYMBOL(snd_malloc_pages);
++EXPORT_SYMBOL(snd_free_pages);
+
+ #ifdef CONFIG_PROC_FS
+ /*
+ * proc file interface
+ */
++/* lmb, 2007-10-02 - reordering the include down here prevents
++ * previously opaque types from being expanded to protect the precious
++ * kABI - gross hack. */
++#include
++
+ #define SND_MEM_PROC_FILE "driver/snd-page-alloc"
+ static struct proc_dir_entry *snd_mem_proc;
+
+@@ -640,17 +657,3 @@ static void __exit snd_mem_exit(void)
+
+ module_init(snd_mem_init)
+ module_exit(snd_mem_exit)
+-
+-
+-/*
+- * exports
+- */
+-EXPORT_SYMBOL(snd_dma_alloc_pages);
+-EXPORT_SYMBOL(snd_dma_alloc_pages_fallback);
+-EXPORT_SYMBOL(snd_dma_free_pages);
+-
+-EXPORT_SYMBOL(snd_dma_get_reserved_buf);
+-EXPORT_SYMBOL(snd_dma_reserve_buf);
+-
+-EXPORT_SYMBOL(snd_malloc_pages);
+-EXPORT_SYMBOL(snd_free_pages);
++++++ patches.uml.tar.bz2 ++++++
++++++ patches.xen.tar.bz2 ++++++
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding new/patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding
--- old/patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding 1970-01-01 01:00:00.000000000 +0100
+++ new/patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding 2007-10-02 19:55:59.000000000 +0200
@@ -0,0 +1,82 @@
+From: Ralf Hemmenstaedt
+Date: Mon, 16 Jul 2007 08:03:16 +0000 (-0700)
+Subject: Handle bogus %cs selector in single-step instruction decoding
+Patch-mainline: 2.6.23-rc1
+References: 326270, CVE-2007-3731
+
+Handle bogus %cs selector in single-step instruction decoding
+
+The code for LDT segment selectors was not robust in the face of a bogus
+selector set in %cs via ptrace before the single-step was done.
+
+Acked-by: lmb@suse.de
+
+---
+ arch/x86_64/ia32/ia32entry-xen.S | 19 ++++++++++++++++---
+ 1 file changed, 16 insertions(+), 3 deletions(-)
+
+--- linux-2.6.22.orig/arch/x86_64/ia32/ia32entry-xen.S 2007-10-02 19:50:46.000000000 +0200
++++ linux-2.6.22/arch/x86_64/ia32/ia32entry-xen.S 2007-10-02 19:54:48.000000000 +0200
+@@ -38,10 +38,23 @@
+ movq %rax,R10(%rsp)
+ movq %rax,R9(%rsp)
+ movq %rax,R8(%rsp)
+ .endm
+
++ .macro LOAD_ARGS32 offset
++ movl \offset(%rsp),%r11d
++ movl \offset+8(%rsp),%r10d
++ movl \offset+16(%rsp),%r9d
++ movl \offset+24(%rsp),%r8d
++ movl \offset+40(%rsp),%ecx
++ movl \offset+48(%rsp),%edx
++ movl \offset+56(%rsp),%esi
++ movl \offset+64(%rsp),%edi
++ movl \offset+72(%rsp),%eax
++ .endm
++
++
+ #if defined (__XEN_X86_64)
+ #include "../kernel/xen_entry.S"
+
+ #define __swapgs
+ #define __cli
+@@ -170,11 +183,11 @@ sysenter_tracesys:
+ SAVE_REST
+ CLEAR_RREGS
+ movq $-ENOSYS,RAX(%rsp) /* really needed? */
+ movq %rsp,%rdi /* &pt_regs -> arg1 */
+ call syscall_trace_enter
+- LOAD_ARGS ARGOFFSET /* reload args from stack in case ptrace changed it */
++ LOAD_ARGS32 ARGOFFSET /* reload args from stack in case ptrace changed it */
+ RESTORE_REST
+ movl %ebp, %ebp
+ /* no need to do an access_ok check here because rbp has been
+ 32bit zero extended */
+ 1: movl (%rbp),%r9d
+@@ -275,11 +288,11 @@ cstar_tracesys:
+ SAVE_REST
+ CLEAR_RREGS
+ movq $-ENOSYS,RAX(%rsp) /* really needed? */
+ movq %rsp,%rdi /* &pt_regs -> arg1 */
+ call syscall_trace_enter
+- LOAD_ARGS ARGOFFSET /* reload args from stack in case ptrace changed it */
++ LOAD_ARGS32 ARGOFFSET /* reload args from stack in case ptrace changed it */
+ RESTORE_REST
+ movl RSP-ARGOFFSET(%rsp), %r8d
+ /* no need to do an access_ok check here because r8 has been
+ 32bit zero extended */
+ 1: movl (%r8),%r9d
+@@ -358,11 +371,11 @@ ia32_sysret:
+ ia32_tracesys:
+ SAVE_REST
+ movq $-ENOSYS,RAX(%rsp) /* really needed? */
+ movq %rsp,%rdi /* &pt_regs -> arg1 */
+ call syscall_trace_enter
+- LOAD_ARGS ARGOFFSET /* reload args from stack in case ptrace changed it */
++ LOAD_ARGS32 ARGOFFSET /* reload args from stack in case ptrace changed it */
+ RESTORE_REST
+ jmp ia32_do_syscall
+ END(ia32_syscall)
+
+ ia32_badsys:
++++++ series.conf ++++++
--- kernel-source/series.conf 2007-09-28 09:38:19.000000000 +0200
+++ /mounts/work_src_done/STABLE/kernel-source/series.conf 2007-10-04 19:24:20.585997000 +0200
@@ -38,6 +38,12 @@
patches.kernel.org/patch-2.6.22.8-9
########################################################
+ # kABI consistency patches
+ ########################################################
+ patches.suse/kabi-safe-2.6.22.6-tcp_sendmsg
+ patches.suse/kabi-safe-2.6.22.8-snd_mem
+
+ ########################################################
# kbuild/module infrastructure fixes
########################################################
patches.suse/error-implicit-function-declaration.patch
@@ -90,6 +96,7 @@
# i386
########################################################
patches.fixes/i386-use-global-flag-to-disable-broken-local-apic-timer-on-AMD-cpus.diff
+ patches.fixes/i386-fixup-TRACE_IRQ-breakage
# amd64 | x86-64 | x86_64
# 'Intel(r) Extended Memory 64 Technology' | 'Intel(r) EM64T'
@@ -104,6 +111,7 @@
patches.arch/x86-early-quirks-unificiation
patches.arch/x86-nvidia-timer-quirk
patches.arch/x86-fam10-l3cache
+ patches.fixes/handle-bogus-%cs-selector-in-single-step-instruction-decoding
-RT patches.arch/disable-apic-error
########################################################
@@ -265,6 +273,7 @@
patches.suse/connector-read-mostly
patches.suse/kbd-ignore-gfx.patch
patches.fixes/rename-TSS_sysenter_esp0-SYSENTER_stack_esp0.patch
+ patches.fixes/nfsv4-MAXNAME-fix.diff
########################################################
#
@@ -415,12 +424,14 @@
# other filesystem stuff
########################################################
patches.suse/squashfs.patch
+ patches.fixes/jffs2-fix-ACL-vs-mode-handling
########################################################
# Networking, IPv6
########################################################
patches.fixes/ipv6-no-autoconf
+
########################################################
# These patches are from the netfilter team, and
# are required to tag IPsec packets for packet
@@ -440,6 +451,7 @@
patches.drivers/e1000-7.6.5.patch
patches.drivers/e1000-7.6.5-napi-tail.patch
patches.drivers/e1000e.patch
+ patches.fixes/sky2-tx-sum-resume.patch
########################################################
# Storage
@@ -516,6 +528,7 @@
patches.drivers/libata-sata_via-kill-SATA_PATA_SHARING
patches.drivers/libata-sata_sil24-fix-IRQ-clearing-race-on-IRQ_WOC
patches.drivers/libata-pata_ali-fix-garbage-PCI-rev-value
+ patches.drivers/libata-HPA-off-by-one-horkage
patches.fixes/mptbase-vmware-fix
@@ -846,6 +859,7 @@
-RT patches.xen/xen-intel-agp
-RT patches.xen/xen-blkback-cdrom
-RT patches.xen/xen-isa-dma
+-RT patches.xen/handle-bogus-cs-selector-in-single-step-instruction-decoding
# RT
+RT patches.rt/patch-2.6.22.1-rt4.openSUSE
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Remember to have fun...
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-commit+help@opensuse.org