.
>
> Juergen Gross <jgr...@suse.com> writes:
>
>> Mails to chr...@sous-sol.org are not deliverable since several months.
>> Drop him as PARAVIRT_OPS maintainer.
>>
>> Signed-off-by: Juergen Gross <jgr...@suse.com>
Acked-by: Chris Wright <chr...@redhat.c
* Ryan Anderson ([EMAIL PROTECTED]) wrote:
> On Sat, Mar 26, 2005 at 01:27:53AM -0800, Chris Wright wrote:
> > > Could you please add CAN IDs to the stable changelog for already assigned
> > > vulnerabilities?
> >
> > That's what I did for .5 -> .6. We
* Pekka Enberg ([EMAIL PROTECTED]) wrote:
> This patch removes macro obfuscation from fs/isofs/rock.c and cleans it up
> a bit to make it more readable and maintainable. There are no functional
> changes, only cleanups. I have only tested this lightly but it passes
> mount and read on small Rock
* Ali Akcaagac ([EMAIL PROTECTED]) wrote:
> And happy easter to you all. Just got this while trying to delete some
> files on my system.
I'm curious, what was the virtual address the kernel was "Unable to handle..."
That part was left off this bug report.
> : printing eip:
> : c021f089
> : *pde
* Andries Brouwer ([EMAIL PROTECTED]) wrote:
> On Mon, Mar 28, 2005 at 12:02:52PM -0800, Chris Wright wrote:
> > * Pekka Enberg ([EMAIL PROTECTED]) wrote:
> > > This patch removes macro obfuscation from fs/isofs/rock.c and cleans it up
> > > a bit to make it mor
* Coywolf Qi Hunt ([EMAIL PROTECTED]) wrote:
> On Mon, 28 Mar 2005 14:44:30 -0800, Chris Wright <[EMAIL PROTECTED]> wrote:
> > * Ali Akcaagac ([EMAIL PROTECTED]) wrote:
> > > And happy easter to you all. Just got this while trying to delete some
> > > files on my s
* Coywolf Qi Hunt ([EMAIL PROTECTED]) wrote:
> How to explain:
> Call Trace: [get_empty_filp+89/208] get_empty_filp+0x59/0xd0 ?
Imperfect stack trace decoding.
thanks,
-chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
* Nathan Scott ([EMAIL PROTECTED]) wrote:
> On Mon, Mar 28, 2005 at 02:44:30PM -0800, Chris Wright wrote:
> > * Ali Akcaagac ([EMAIL PROTECTED]) wrote:
> > > And happy easter to you all. Just got this while trying to delete some
> > > files on my system.
> > ...
&
* L. A. Walsh ([EMAIL PROTECTED]) wrote:
> Given the frequency with which stabilization patches may be released, it
> may not be practical to expect users to catch each release announcement
> and download each patch.
>
> Especially if small patches are released for stability, as one might
>
* John Richard Moser ([EMAIL PROTECTED]) wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Well the LSM mailing list seems to be dead, even the archives stop at
> Jan 15 2005. My own mails don't come back to me (I'm subscribed).
They're coming through just fine, not sure why the
* Robin Rosenberg ([EMAIL PROTECTED]) wrote:
>
> I see regular crashes with 2.6.11.6 (mandrake-patched) and Java 1.5.02 (01 too
> btw, but not 1.4.2). Gentoo people report the same problem sugesting that it
> may have appeared between 2.6.11.4 and 2.6.11.5.
Sounds very unlikely, we didn't change
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
> This patch adds two checks to do_follow_link() and sys_link(), for
> prevent users to follow (untrusted) symlinks owned by other users in
> world-writable +t directories (i.e. /tmp), unless the owner of the
> symlink is the owner of
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
> About what things it can break, I haven't noticed any issue on it (at
> least regarding grSecurity or OpenWall), but of course I would
> appreciate a lot any information on them, so, I could report to the
> developers that are
* John Richard Moser ([EMAIL PROTECTED]) wrote:
> I've yet to see this break anything on Ubuntu or Gentoo; Brad Spengler
> claims this breaks nothing on Debian. On the other hand, this could
> potentially squash the second most prevalent security bug.
Yes I know, I've worked on distro with it as
* Michael Halcrow ([EMAIL PROTECTED]) wrote:
> This is the third in a series of eight patches to the BSD Secure
> Levels LSM. It moves the claim on the block device from the inode
> struct to the file struct in order to address a potential
> circumvention of the control via hard links to block
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
> Attached you can find a patch which adds a new hook for the sys_chroot()
> syscall, and makes us able to add additional enforcing and security
> checks by using the Linux Security Modules framework (ie. chdir
> enforcing, etc).
If you
* John Richard Moser ([EMAIL PROTECTED]) wrote:
> Yes, mkdtemp() and mkstemp().
>
> Of course we can't always rely on programmers to get it right, so the
> idea here is to make sure we ask broken code to behave nicely, and stab
> it in the face if it doesn't. Please try to examine this in that
* [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
> open("/tmp/sh-thd-1107848098", O_WRONLY|O_CREAT|O_TRUNC|O_EXCL|O_LARGEFILE,
> 0600) = 3
O_EXCL
> Wow - if my /tmp was on the same partition, and I'd hard-linked that
> file to /etc/passwd, it would be toast now if root had run it.
So, in fact,
8 that will fix this. 6/8 no longer
applies cleanly with this change.
Signed-off-by: Chris Wright <[EMAIL PROTECTED]>
--- a/security/seclvl.c~bd_claim2005-02-08 15:05:09.0 -0800
+++ b/security/seclvl.c 2005-02-08 15:05:17.0 -0800
@@ -492,17 +492,16 @@
*/
stati
* Michael Halcrow ([EMAIL PROTECTED]) wrote:
> This is the sixth in a series of eight patches to the BSD Secure
> Levels LSM. It makes several trivial changes to make the code
> consistent.
These are inconsistent with CodingStyle. I'd drop this, and go the
other way (patch is smaller) ala
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
> As commented yesterday, I was going to release a few more hooks for some
> *critical* syscalls, this one adds a hook to sys_chmod(), and makes us
> able to apply checks and logics before releasing the operation to
> sys_chmod().
This
* Jean Tourrilhes ([EMAIL PROTECTED]) wrote:
> The first is the handling of spyoffset which is potentially
> unsafe. Unfortunately, the fix involve some API/infrastructure change,
> so is not transparent. Fortunately drivers are clever enough to not
> trigger this bug.
> The second is
* Jean Tourrilhes ([EMAIL PROTECTED]) wrote:
> On Tue, Feb 08, 2005 at 05:51:29PM -0800, Chris Wright wrote:
> > Hmm, having ability to read kernel data is not so nice.
>
> It's not like you can read any arbitrary address, exploiting
> such a flaw is in my mind
Hi Mark,
* Mark F. Haigh ([EMAIL PROTECTED]) wrote:
> [Aargh! Missing Signed-off-by.]
>
> Unless I'm missing something, in kernel/fork.c, dup_mmap():
>
> if (security_vm_enough_memory(len))
> goto fail_nomem;
> /* ... */
> fail_nomem:
>
isolated one that allows architectures to define only
> the offending rlimits.
Heh, I did it this way first, then worried people might find it confusing
to only have a subset of the block overwritten I backed it down to
the __ARCH_RLIMIT_ORDER method. Anyway, I like this change.
Acked-by: Chris Wright &l
* Ingo Molnar ([EMAIL PROTECTED]) wrote:
>
> * Chris Wright <[EMAIL PROTECTED]> wrote:
>
> > * Ingo Molnar ([EMAIL PROTECTED]) wrote:
> > > this patch does the final consolidation of asm-*/resource.h file,
> > > without changing any of the rlimit definitio
* Hugh Dickins ([EMAIL PROTECTED]) wrote:
> dup_mmap's charge starts out at 0 and gets added to each time around
> the loop through vmas; if security_vm_enough_memory fails at any point
> in that loop, we need to vm_unacct_memory the charge already accumulated.
If that's the requirement, then
* Kylene Hall ([EMAIL PROTECTED]) wrote:
> diff -uprN linux-2.6.10/drivers/char/tpm/tpm_atmel.c
> linux-2.6.10-tpm/drivers/char/tpm/tpm_atmel.c
> --- linux-2.6.10/drivers/char/tpm/tpm_atmel.c 2005-02-04 15:03:03.0
> -0600
> +++ linux-2.6.10-tpm/drivers/char/tpm/tpm_atmel.c 2005-02-09
* Jonathan Ho ([EMAIL PROTECTED]) wrote:
> Fixed some weird whitespace, solved redundancies (applies to v2.6.10).
>
> Signed-off-by: Jonathan Ho <[EMAIL PROTECTED]>
>
> --- lib/string.cFri Dec 24 13:35:25 2004
> +++ \documents and settings\jonathan\desktop/string.cWed Feb 09
This won't
* Matt Mackall ([EMAIL PROTECTED]) wrote:
> What happened to the RT rlimit code from Chris?
I still have it, but I had the impression Ingo didn't like it as a long
term solution/hack (albeit small) to the scheduler. Whereas the rt-lsm
patch is wholly self-contained.
thanks,
-chris
--
Linux
to remove ethertap altogether in favor of tun/tap, but at
lest remove the bits that won't build in case ethertap is still used.
Signed-off-by: Chris Wright <[EMAIL PROTECTED]>
drivers/net/ethertap.c | 84 -
1 files changed, 84 deletions(-)
= d
NL_EMULATE_DEV handler functions can't ever be set, so let's rip them
out too. I realize the other half (netlink_attach()) just came out in
2.6.11-rc1, but what's left behind can't be used at all.
Signed-off-by: Chris Wright <[EMAIL PROTECTED]>
af_netlink.c | 24 +
* Kurt Garloff ([EMAIL PROTECTED]) wrote:
> this goes back to a discussion in August last year:
> http://www.ussg.iu.edu/hypermail/linux/kernel/0408.1/0623.html
Thanks for follow up Kurt. I'm travelling at the moment so bear with me
if my response time is slow. In short, I don't mind switching
* linux-os ([EMAIL PROTECTED]) wrote:
>
> Hello,
> Tell me. When all those kernel functions are made static
> how does one use a kernel debugger? How does the OOPS
> get decoded if nothing is in /proc/kallsyms or System.map???
static != inline. Locally scoped symbols, 't', and global, 'T',
* David Weinehall ([EMAIL PROTECTED]) wrote:
> BTW: Wishlist request. Would you consider adding -p (--show-c-function)
> to the set of flags used for the diffs created by BitKeeper?
It's already there.
thanks,
-chris
--
Linux Security Modules http://lsm.immunix.org
* [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
>
> CC: <[EMAIL PROTECTED]>
>
> This trick is useless, because sys_ni.c will handle this problem by itself,
> like it does even on UML for other syscalls.
> Also, it does not provide the NFSD syscall when NFSD is compiled as a module,
> which is a
* John M Collins ([EMAIL PROTECTED]) wrote:
> Thanks to everyone for the pointers on this one I've rebuilt the kernels
> and we'll see what happens.
BTW, I'd recommend updating to 2.6.11.7 so that you're protected from
another local root exploit.
thanks,
-chris
-
To unsubscribe from this list:
* Amelia Nilsson ([EMAIL PROTECTED]) wrote:
> I've found a bug in 2.6.11.6. I have a Toshiba laptop and when i did
> run 2.6.11.6 my touchpad flipped out, it clicked everywhere when it
> wasn't supposed to click. I couldn't even move my mouse without it was
> clicking all over. It works fine i
* Andrew Morton ([EMAIL PROTECTED]) wrote:
> Jani Jaakkola <[EMAIL PROTECTED]> wrote:
> >
> > SMP race handling is broken in key_user_lookup() in security/keys/key.c
>
> This was fixed post-2.6.11. Can you confirm that 2.6.12-rc2 works OK?
>
> This is the patch we used. It should go into
* Andi Kleen ([EMAIL PROTECTED]) wrote:
> > I will take a closer look at the rc1/rc2 patches later this evening
> > and see if I can spot something. Can only report back tomorrow though.
>
> Actually itt started in .11 already - sigh - on rereading the thread.
> That will make the code audit
* Tomasz Chmielewski ([EMAIL PROTECTED]) wrote:
> or should I wait for 2.6.11.7 (?), where it should be corrected?
Wait, no longer, 2.6.11.7 has been here already ;-) However, nothing in
this area was touched. If there's an outstanding issue, please chase it
down, and if it's reasonable
* Ted Kremenek ([EMAIL PROTECTED]) wrote:
> In several network drivers that handle the ioctl command SIOCSMIIREG
> (writes a register on the network card) most implementations check for
> the CAP_NET_ADMIN capability. Several drivers use the function
> "generic_mii_ioctl" to process this
* Andi Kleen ([EMAIL PROTECTED]) wrote:
> On Thu, Apr 14, 2005 at 11:27:12AM -0700, Chris Wright wrote:
> > Yes, I've seen it in .11 and earlier kernels. Happen to have same
> > "x86_64" string on my bad pmd dumps, but can't reproduce it at all.
> > So, fo
* Linda Luu ([EMAIL PROTECTED]) wrote:
> Vanderpool is a hardware support for OS virtualization (running multiple OS
> "at the same time"), how does Linux kernel make use of this, particularly
> which part of the kernel code?
There's Xen support for upcoming VT, which will allow running
* Igor Shmukler ([EMAIL PROTECTED]) wrote:
> We are working on a LKM for the 2.6 kernel.
> We HAVE to intercept system calls. I understand this could be
> something developers are no encouraged to do these days, but we need
> this.
I don't think you'll find much empathy or support here. This is
* Daniel Souza ([EMAIL PROTECTED]) wrote:
> No, I was tracking file creations/modifications/attemps of
> access/directory creations|modifications/file movings/program
> executions with some filter exceptions (avoid logging library loads by
> ldd to preserve disk space).
>
> It was a little module
* Timur Tabi ([EMAIL PROTECTED]) wrote:
> Andy Isaacson wrote:
> >Do you guys simply raise RLIMIT_MEMLOCK to allow apps to lock their
> >pages? Or are you doing something more nasty?
>
> A little more nasty. I raise RLIMIT_MEMLOCK in the driver to "unlimited"
> and also set
* Timur Tabi ([EMAIL PROTECTED]) wrote:
> It works with every kernel I've tried. I'm sure there are plenty of kernel
> configuration options that will break our driver. But as long as all the
> distros our customers use work, as well as reasonably-configured custom
> kernels, we're happy.
>
Acked-by: Chris Mason <[EMAIL PROTECTED]>
Signed-off-by: Chris Wright <[EMAIL PROTECTED]>
Signed-off-by: Greg Kroah-Hartman <[EMAIL PROTECTED]>
--- linux-2.6-ext3/fs/jbd/transaction.c.=K=.orig
+++ linux-2.6-ext3/fs/jbd/transaction.c
@@ -1775,10 +1775,10 @@ static
* Thomas Backlund ([EMAIL PROTECTED]) wrote:
> Chris Wright wrote:
> >* Andy ([EMAIL PROTECTED]) wrote:
> >
> >>cross posted due to the severity of this issue.
> >>
> >>I have killed two Dell 1850 (x86_64) with megaraid 4e/SI servers using
> >>ker
* Alexander Nyberg ([EMAIL PROTECTED]) wrote:
> > tree e6a38b3d6bf434f08054562113bb660c4227769f
> > parent 4a89a04f1ee21a7c1f4413f1ad7dcfac50ff9b63
> > author Linus Torvalds <[EMAIL PROTECTED]> Sun, 03 Jul 2005 00:35:33 -0700
> > committer Linus Torvalds <[EMAIL PROTECTED]> Sun, 03 Jul 2005
* Jussi Hamalainen ([EMAIL PROTECTED]) wrote:
> On Tue, 5 Jul 2005, Chris Wright wrote:
>
> >>Any news on this matter?
> >>I hvr a PE1850 waiting for kernel upgrade, but I'm afraid to do so now...
> >>
> >>I can't break my box with tests since it'
* randy_dunlap ([EMAIL PROTECTED]) wrote:
> kernel/audit.c (2.6.13-rc1-git5) audit_log_start() says:
>
> /* Obtain an audit buffer. This routine does locking to obtain the
> * audit buffer, but then no locking is required for calls to
> * audit_log_*format. If the tsk is a task that is
* Stephen Smalley ([EMAIL PROTECTED]) wrote:
> It still has to be mounted by userspace, right? So /sbin/init still
> needs to know to mount securityfs, and where the selinux nodes live
> under it, so you are still talking about changing it (and libselinux and
> rc.sysinit), and risking
* randy_dunlap ([EMAIL PROTECTED]) wrote:
> Yes, that's why I asked, I'm adding kerneldoc format comments
> to audit*.c (2 files). You'll see it soon.
Great! Thanks Randy.
-chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL
I've been asked about this a couple times, and there's no info in
MAINTAINERS file. Add MAINTAINERS entry for audit subsystem.
Signed-off-by: Chris Wright <[EMAIL PROTECTED]>
---
diff --git a/MAINTAINERS b/MAINTAINERS
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -370,6 +370,10 @@ W
* Kylene Jo Hall ([EMAIL PROTECTED]) wrote:
> A problem was reported that the tpm driver was interfereing with
> networking on the 8139 chipset. The tpm driver was using a hard coded
> the memory address instead of the value the BIOS was putting the chip
> at. This was in the tpm_lpc_bus_init
* David Woodhouse ([EMAIL PROTECTED]) wrote:
> On Thu, 2005-07-07 at 18:12 -0700, Chris Wright wrote:
> > I've been asked about this a couple times, and there's no info in
> > MAINTAINERS file. Add MAINTAINERS entry for audit subsystem.
>
> It's already there in -mm, alt
* Greg KH ([EMAIL PROTECTED]) wrote:
> Chris, care to forward the securityfs patch to Linus?
Yeah, I've got it queued up right now, and I'm playing with it a bit.
As well as this one. Thanks guys.
-chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a
* Lee Revell ([EMAIL PROTECTED]) wrote:
> I think it's already queued for -stable.
Yes, it is.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the
* Timothy R. Chavez ([EMAIL PROTECTED]) wrote:
> @@ -69,6 +70,8 @@ int inode_setattr(struct inode * inode,
> unsigned int ia_valid = attr->ia_valid;
> int error = 0;
>
> + audit_notify_watch(inode, MAY_WRITE);
> +
Hmm, this looks wrong. It should be in notify_change, since
The following two patches simply split fsnotify from inotify.
There should be no functional change to inotify at all. Perhaps the
split will help identify the interface bits that can easily converge
for inotify and audit. They're completely untested... I started with
inotify-45 in
Add fsnotify as infrastructure for various fs notifcation schemes.
Move dnotify to fsnotify.
fs/attr.c| 33 +
fs/compat.c | 12 +++-
fs/file_table.c |3 +
fs/namei.c | 30 ++-
fs/nfsd/vfs.c|6 +-
inotify
Documentation/filesystems/inotify.txt | 155 +
fs/Kconfig| 13
fs/Makefile |1
fs/inode.c|6
fs/inotify.c | 1011 ++
* David Woodhouse ([EMAIL PROTECTED]) wrote:
> What would make sense, perhaps, would be to actually merge those hooks;
> not just a cosmetic amalgamation of the calling sites. Currently, each
> of inotify and the audit code does its own filtering when its hooks are
> triggered, and then acts upon
* Tomasz Lemiech ([EMAIL PROTECTED]) wrote:
> Today I tried 2.6.12.2 on an Asus A7V333 (socket A) with AMD Duron 1300
> MHz CPU and noticed, that the system clock was running about 60 times
> faster than real time and the keyboard was unresponsive. However, I was
> able to log in remotely and
* [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
> Revert the following patch, because of miscompilation problems in different
> environments leading to UML not working *at all* in TT mode; it was merged
> lately in 2.6 development cycle, a little after being written, and has caused
> problems to
* David S. Miller ([EMAIL PROTECTED]) wrote:
> From: Patrick McHardy <[EMAIL PROTECTED]>
> Date: Tue, 12 Jul 2005 13:58:27 +0200
>
> > Daniel Drake wrote:
> > > You'll have to forgive my lack of netfilter knowledge, I set up my
> > > firewall
> > > ages ago and haven't really touched it since :)
* Tomasz Lemiech ([EMAIL PROTECTED]) wrote:
> On Tue, 12 Jul 2005, Chris Wright wrote:
>
> >>- 2.6.12.2 with acpi_register_gsi() one-line fix works without problems
>
> My apologies - I meant: "_without_ acpi_register_gsi() one-line fix". That
> is, _reverti
* Patrick McHardy ([EMAIL PROTECTED]) wrote:
> Chris Wright wrote:
> >* David S. Miller ([EMAIL PROTECTED]) wrote:
> >
> >>Now the question is what to do about the 2.6.12.x stable
> >>tree. I think we put the offending change there, now we
> >>need to rev
* Tomasz Lemiech ([EMAIL PROTECTED]) wrote:
> Yup, it does, thanks much. Now I see that there was an earlier thread
> concerning the same problem. Sorry for extra noise.
No problem, thanks for verifying. That patch should be in .3, so I'm
happy to build up success cases with it.
thanks,
-chris
* Blaisorblade ([EMAIL PROTECTED]) wrote:
> On Tuesday 12 July 2005 20:50, Chris Wright wrote:
> > * [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
> > > For now there's not yet a fix for this patch, so for now the best thing
> > > is to drop it (which was widely report
* Jan Engelhardt ([EMAIL PROTECTED]) wrote:
> the following patch adds a post_setgid() security hook, and necessary dummy
> funcs.
why?
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
e to allow the filesystem to perform its own access control.
>
> OK, thanks. I'll assume that the other three patches are unchanged.
>
> I don't think we've heard from the SELinux team regarding these patches?
I've no issue with these patches.
Acked-by: Chris Wright <[EM
* Matt Mackall ([EMAIL PROTECTED]) wrote:
> On Tue, Mar 08, 2005 at 04:32:50AM +, Christoph Hellwig wrote:
> > On Mon, Mar 07, 2005 at 08:28:21PM -0800, Andrew Morton wrote:
> > > > please describe this "very simple and very real-world problem" in simple
> > > > terms. Lets make sure "problem"
* Peter Williams ([EMAIL PROTECTED]) wrote:
> Andrew Morton wrote:
> >Matt Mackall <[EMAIL PROTECTED]> wrote:
> >
> >>I think Chris Wright's last rlimit patch is more sensible and ready to
> >>go.
> >
> >
> >I must say that I like rlimits - very straightforward, although somewhat
> >awkward to use
* Peter Williams ([EMAIL PROTECTED]) wrote:
> But the patch you describe still seems a little loose to me in that it
> doesn't control both which users AND which programs they can run.
> Although I suppose that can be managed by suitable setting of file
> permissions?
rlimits are typically
n-root tasks to raise nice and rt
> priorities. Defaults to traditional behavior. Originally written by
> Chris Wright.
>
> Signed-off-by: Matt Mackall <[EMAIL PROTECTED]>
>
> Index: rlimits/include/asm-generic/resource.h
> =
* Clemens Schwaighofer ([EMAIL PROTECTED]) wrote:
> --On Monday, March 07, 2005 09:34:22 PM + Alan Cox
> <[EMAIL PROTECTED]> wrote:
>
> >For a couple of reasons I've not yet merged Greg's 2.6.11.1 yet but this
> >diff should actually apply to either right now.
> >
> >2.6.11-ac1
> >oFix
* Bill Davidsen ([EMAIL PROTECTED]) wrote:
> Jeff Garzik wrote:
> >>nfsd--svcrpc-add-a-per-flavor-set_client-method.patch
> >
> >is this critical?
>
> Wasn't part of the Linus proposal that it had to fix an oops or
> non-functional feature?
We're working on the criteria, should have some
* Dave Airlie ([EMAIL PROTECTED]) wrote:
>
> Egbert Eich reported a bug 2673 on bugs.freedesktop.org and tracked it
> down to a missing memset in the setversion ioctl, this causes X server
> crashes so I would like to see the fix in a 2.6.11.x tree if possible..
Could you please add
Add security contact info and relevant documentation.
Signed-off-by: Chris Wright <[EMAIL PROTECTED]>
MAINTAINERS|5 +
REPORTING-BUGS |4
Documentation/SecurityBugs | 38 ++
3 files changed, 47 inse
* Andi Kleen ([EMAIL PROTECTED]) wrote:
> Greg KH <[EMAIL PROTECTED]> writes:
> >
> > Rules on what kind of patches are accepted, and what ones are not, into
> > the "-stable" tree:
> > - It must be obviously correct and tested.
> > - It can not bigger than 100 lines, with context.
>
> This
* Alan Cox ([EMAIL PROTECTED]) wrote:
> On Mer, 2005-03-09 at 09:56, Andi Kleen wrote:
> > - It must be accepted to mainline.
>
> Strongly disagree. What if the mainline fix is a rewrite of the core API
> involved. Some times you need to put in the short term fix. What must
> never happen is
* Jean Delvare ([EMAIL PROTECTED]) wrote:
> Hi all,
>
> While working on the saa7110 driver I found a problem with the way
> various video drivers (found on Zoran-based boards) prepare i2c messages
> to be used by i2c_transfer. The drivers improperly copy the i2c client
> flags as the message
* Andi Kleen ([EMAIL PROTECTED]) wrote:
> On Wed, Mar 09, 2005 at 10:28:22AM -0800, Chris Wright wrote:
> > * Andi Kleen ([EMAIL PROTECTED]) wrote:
> > > Greg KH <[EMAIL PROTECTED]> writes:
> > > One rule I'm missing:
> > >
> > > - It must
* DHollenbeck ([EMAIL PROTECTED]) wrote:
> [PATCH] drivers/net/via-rhine.c: make a variable static const
>
> This patch makes a needlessly global variable static const.
>
> Signed-off-by: Adrian Bunk <[EMAIL PROTECTED]>
> Signed-off-by: Jeff Garzik <[EMAIL PROTECTED]>
>
>
* Jean Delvare ([EMAIL PROTECTED]) wrote:
> >
> > Are people reporting this as a problem?
>
> Not that I know. For adv7175 it couldn't be reported so far anyway
> because people would hit the oops in saa7110 before (same board: DC10+,
> oops fixed in a different patch).
Heh, right.
> It is
* Ulrich Drepper ([EMAIL PROTECTED]) wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> The current kernel (and all before as far as I can see) have a problem
> with the file system limit handling. The behavior does not conform to
> the current POSIX spec.
> It might also be that some
* Justin M. Forbes ([EMAIL PROTECTED]) wrote:
> With the new stable series kernels, the .x versioning is being added to
> EXTRAVERSION. This has traditionally been a space for local modification.
> I know several distributions are using EXTRAVERSION for build numbers,
> platform and assorted
* Dave Airlie ([EMAIL PROTECTED]) wrote:
>
> Egbert Eich reported a bug 2673 on bugs.freedesktop.org and tracked it
> down to a missing memset in the setversion ioctl, this causes X server
> crashes...
>
> From: Egbert Eich <[EMAIL PROTECTED]>
> Signed-off-by: Dave Airlie <[EMAIL PROTECTED]>
* Lee Revell ([EMAIL PROTECTED]) wrote:
> On Thu, 2005-03-10 at 08:43 -0800, Greg KH wrote:
> > That, and a zillion other specific wordings that people suggested fall
> > under the:
> > or some "oh, that's not good" issue
> > rule.
>
> So just to be 100% clear, no sound with 2.6.N where the
* Jeff Garzik ([EMAIL PROTECTED]) wrote:
> This will update the following files:
>
> drivers/net/sis900.c| 41 +
> drivers/net/via-rhine.c |3 +++
The via-rhine fix is already in the stable queue. But the sis900 oops
fix does not apply to the
* Jeff Garzik ([EMAIL PROTECTED]) wrote:
> Chris Wright wrote:
> >* Jeff Garzik ([EMAIL PROTECTED]) wrote:
> >
> >
> >>This will update the following files:
> >>
> >>drivers/net/sis900.c| 41 +
> >
* Greg KH ([EMAIL PROTECTED]) wrote:
> If you wish to be a reviewer, please email [EMAIL PROTECTED] to add your name
> to
ITYM [EMAIL PROTECTED] ;-)
thanks,
-chris
--
Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
-
To unsubscribe from this list: send the line
* Jean Delvare ([EMAIL PROTECTED]) wrote:
> Hi Greg, all,
>
> > > Not that I really care, but isn't there a rule that a patch "... can
> > > not contain any "trivial" fixes in it (spelling changes, whitespace
> > > cleanups, etc.)"?
> >
> > Good point. Jean, care to respin the patch?
>
> Sure,
* Krzysztof Halasa ([EMAIL PROTECTED]) wrote:
> Another patch for 2.6.11.x: already in main tree, fixes kernel panic
> on receive with WAN cards based on Hitachi SCA/SCA-II: N2, C101,
> PCI200SYN.
> Also a documentation change fixing user-panic can-t-find-required-software
> failure (just the same
* Daniele Venzano ([EMAIL PROTECTED]) wrote:
>
> I have been acting maintainer for more than a year now, and I'm
> completely fine with the patch.
Thanks.
-chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More
* Matt Mackall ([EMAIL PROTECTED]) wrote:
> Or do you want to do it the same way you do for every other branch? I
> don't want to special-case it in my code and I don't think users want
> to special-case it in their brains. Have separate interdiffs on the
> side, please, and then people can
* Krzysztof Halasa ([EMAIL PROTECTED]) wrote:
> Chris Wright <[EMAIL PROTECTED]> writes:
>
> > * Krzysztof Halasa ([EMAIL PROTECTED]) wrote:
> >> Another patch for 2.6.11.x: already in main tree, fixes kernel panic
> >> on receive with WAN cards b
1 - 100 of 1959 matches
Mail list logo