summaryrefslogtreecommitdiffstats
path: root/freed-ora/current/f12
diff options
context:
space:
mode:
authorAlexandre Oliva <lxoliva@fsfla.org>2010-08-16 16:54:27 +0000
committerAlexandre Oliva <lxoliva@fsfla.org>2010-08-16 16:54:27 +0000
commit409e8c485d61b7bbe7db510bd621673fbb478922 (patch)
tree37c5fedddd58e2a6df6a3530b5c0a8068283a11e /freed-ora/current/f12
parentf0fcf1e23fc7141f330e05f690afc765b0edfaba (diff)
downloadlinux-libre-raptor-409e8c485d61b7bbe7db510bd621673fbb478922.tar.gz
linux-libre-raptor-409e8c485d61b7bbe7db510bd621673fbb478922.zip
2.6.32.19-161.fc12
Diffstat (limited to 'freed-ora/current/f12')
-rw-r--r--freed-ora/current/f12/crypto-testmgr-add-null-test-for-aesni.patch138
-rw-r--r--freed-ora/current/f12/ext4-fix-freeze-deadlock-under-io.patch49
-rw-r--r--freed-ora/current/f12/ext4-make-sure-the-move_ext-ioctl-can-t-overwrite-append-only-files.patch34
-rw-r--r--freed-ora/current/f12/kernel.spec35
-rw-r--r--freed-ora/current/f12/linux-2.6-btrfs-fix-acl.patch25
-rw-r--r--freed-ora/current/f12/linux-2.6-usb-wwan-update.patch9
-rw-r--r--freed-ora/current/f12/patch-libre-2.6.32.18.bz2.sign7
-rw-r--r--freed-ora/current/f12/patch-libre-2.6.32.18.xdeltabin338 -> 0 bytes
-rw-r--r--freed-ora/current/f12/patch-libre-2.6.32.18.xdelta.sign7
-rw-r--r--freed-ora/current/f12/patch-libre-2.6.32.19.bz2.sign7
-rw-r--r--freed-ora/current/f12/patch-libre-2.6.32.19.xdeltabin0 -> 387 bytes
-rw-r--r--freed-ora/current/f12/patch-libre-2.6.32.19.xdelta.sign7
-rw-r--r--freed-ora/current/f12/sources2
13 files changed, 43 insertions, 277 deletions
diff --git a/freed-ora/current/f12/crypto-testmgr-add-null-test-for-aesni.patch b/freed-ora/current/f12/crypto-testmgr-add-null-test-for-aesni.patch
deleted file mode 100644
index b38a6f914..000000000
--- a/freed-ora/current/f12/crypto-testmgr-add-null-test-for-aesni.patch
+++ /dev/null
@@ -1,138 +0,0 @@
-From: Youquan, Song <youquan.song@intel.com>
-Date: Wed, 23 Dec 2009 11:45:20 +0000 (+0800)
-Subject: crypto: testmgr - Fix complain about lack test for internal used algorithm
-X-Git-Tag: v2.6.34-rc1~286^2~28
-X-Git-Url: http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Ftorvalds%2Flinux-2.6.git;a=commitdiff_plain;h=863b557a88f8c033f7419fabafef4712a5055f85
-
-crypto: testmgr - Fix complain about lack test for internal used algorithm
-
-When load aesni-intel and ghash_clmulni-intel driver,kernel will complain no
- test for some internal used algorithm.
-The strange information as following:
-
-alg: No test for __aes-aesni (__driver-aes-aesni)
-alg: No test for __ecb-aes-aesni (__driver-ecb-aes-aesni)
-alg: No test for __cbc-aes-aesni (__driver-cbc-aes-aesni)
-alg: No test for __ecb-aes-aesni (cryptd(__driver-ecb-aes-aesni)
-alg: No test for __ghash (__ghash-pclmulqdqni)
-alg: No test for __ghash (cryptd(__ghash-pclmulqdqni))
-
-This patch add NULL test entries for these algorithm and driver.
-
-Signed-off-by: Youquan, Song <youquan.song@intel.com>
-Signed-off-by: Ying, Huang <ying.huang@intel.com>
-Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
----
-
-diff --git a/crypto/testmgr.c b/crypto/testmgr.c
-index 7620bfc..c494d76 100644
---- a/crypto/testmgr.c
-+++ b/crypto/testmgr.c
-@@ -1477,9 +1477,54 @@ static int alg_test_cprng(const struct alg_test_desc *desc, const char *driver,
- return err;
- }
-
-+static int alg_test_null(const struct alg_test_desc *desc,
-+ const char *driver, u32 type, u32 mask)
-+{
-+ return 0;
-+}
-+
- /* Please keep this list sorted by algorithm name. */
- static const struct alg_test_desc alg_test_descs[] = {
- {
-+ .alg = "__driver-cbc-aes-aesni",
-+ .test = alg_test_null,
-+ .suite = {
-+ .cipher = {
-+ .enc = {
-+ .vecs = NULL,
-+ .count = 0
-+ },
-+ .dec = {
-+ .vecs = NULL,
-+ .count = 0
-+ }
-+ }
-+ }
-+ }, {
-+ .alg = "__driver-ecb-aes-aesni",
-+ .test = alg_test_null,
-+ .suite = {
-+ .cipher = {
-+ .enc = {
-+ .vecs = NULL,
-+ .count = 0
-+ },
-+ .dec = {
-+ .vecs = NULL,
-+ .count = 0
-+ }
-+ }
-+ }
-+ }, {
-+ .alg = "__ghash-pclmulqdqni",
-+ .test = alg_test_null,
-+ .suite = {
-+ .hash = {
-+ .vecs = NULL,
-+ .count = 0
-+ }
-+ }
-+ }, {
- .alg = "ansi_cprng",
- .test = alg_test_cprng,
- .fips_allowed = 1,
-@@ -1623,6 +1668,30 @@ static const struct alg_test_desc alg_test_descs[] = {
- }
- }
- }, {
-+ .alg = "cryptd(__driver-ecb-aes-aesni)",
-+ .test = alg_test_null,
-+ .suite = {
-+ .cipher = {
-+ .enc = {
-+ .vecs = NULL,
-+ .count = 0
-+ },
-+ .dec = {
-+ .vecs = NULL,
-+ .count = 0
-+ }
-+ }
-+ }
-+ }, {
-+ .alg = "cryptd(__ghash-pclmulqdqni)",
-+ .test = alg_test_null,
-+ .suite = {
-+ .hash = {
-+ .vecs = NULL,
-+ .count = 0
-+ }
-+ }
-+ }, {
- .alg = "ctr(aes)",
- .test = alg_test_skcipher,
- .fips_allowed = 1,
-@@ -1669,6 +1738,21 @@ static const struct alg_test_desc alg_test_descs[] = {
- }
- }
- }, {
-+ .alg = "ecb(__aes-aesni)",
-+ .test = alg_test_null,
-+ .suite = {
-+ .cipher = {
-+ .enc = {
-+ .vecs = NULL,
-+ .count = 0
-+ },
-+ .dec = {
-+ .vecs = NULL,
-+ .count = 0
-+ }
-+ }
-+ }
-+ }, {
- .alg = "ecb(aes)",
- .test = alg_test_skcipher,
- .fips_allowed = 1,
diff --git a/freed-ora/current/f12/ext4-fix-freeze-deadlock-under-io.patch b/freed-ora/current/f12/ext4-fix-freeze-deadlock-under-io.patch
deleted file mode 100644
index f50dee118..000000000
--- a/freed-ora/current/f12/ext4-fix-freeze-deadlock-under-io.patch
+++ /dev/null
@@ -1,49 +0,0 @@
-From: Eric Sandeen <sandeen@sandeen.net>
-Date: Sun, 1 Aug 2010 21:33:29 +0000 (-0400)
-Subject: ext4: fix freeze deadlock under IO
-X-Git-Url: http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Ftorvalds%2Flinux-2.6.git;a=commitdiff_plain;h=437f88cc031ffe7f37f3e705367f4fe1f4be8b0f
-
-ext4: fix freeze deadlock under IO
-
-Commit 6b0310fbf087ad6 caused a regression resulting in deadlocks
-when freezing a filesystem which had active IO; the vfs_check_frozen
-level (SB_FREEZE_WRITE) did not let the freeze-related IO syncing
-through. Duh.
-
-Changing the test to FREEZE_TRANS should let the normal freeze
-syncing get through the fs, but still block any transactions from
-starting once the fs is completely frozen.
-
-I tested this by running fsstress in the background while periodically
-snapshotting the fs and running fsck on the result. I ran into
-occasional deadlocks, but different ones. I think this is a
-fine fix for the problem at hand, and the other deadlocky things
-will need more investigation.
-
-Reported-by: Phillip Susi <psusi@cfl.rr.com>
-Signed-off-by: Eric Sandeen <sandeen@redhat.com>
-Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
----
-
-diff --git a/fs/ext4/super.c b/fs/ext4/super.c
-index e046eba..282a270 100644
---- a/fs/ext4/super.c
-+++ b/fs/ext4/super.c
-@@ -241,7 +241,7 @@ handle_t *ext4_journal_start_sb(struct super_block *sb, int nblocks)
- if (sb->s_flags & MS_RDONLY)
- return ERR_PTR(-EROFS);
-
-- vfs_check_frozen(sb, SB_FREEZE_WRITE);
-+ vfs_check_frozen(sb, SB_FREEZE_TRANS);
- /* Special case here: if the journal has aborted behind our
- * backs (eg. EIO in the commit thread), then we still need to
- * take the FS itself readonly cleanly. */
-@@ -3608,7 +3608,7 @@ int ext4_force_commit(struct super_block *sb)
-
- journal = EXT4_SB(sb)->s_journal;
- if (journal) {
-- vfs_check_frozen(sb, SB_FREEZE_WRITE);
-+ vfs_check_frozen(sb, SB_FREEZE_TRANS);
- ret = ext4_journal_force_commit(journal);
- }
-
diff --git a/freed-ora/current/f12/ext4-make-sure-the-move_ext-ioctl-can-t-overwrite-append-only-files.patch b/freed-ora/current/f12/ext4-make-sure-the-move_ext-ioctl-can-t-overwrite-append-only-files.patch
deleted file mode 100644
index 14407a5a9..000000000
--- a/freed-ora/current/f12/ext4-make-sure-the-move_ext-ioctl-can-t-overwrite-append-only-files.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From 1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72 Mon Sep 17 00:00:00 2001
-From: Theodore Ts'o <tytso@mit.edu>
-Date: Wed, 2 Jun 2010 22:04:39 -0400
-Subject: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
-
-From: Theodore Ts'o <tytso@mit.edu>
-
-commit 1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72 upstream.
-
-Dan Roseberg has reported a problem with the MOVE_EXT ioctl. If the
-donor file is an append-only file, we should not allow the operation
-to proceed, lest we end up overwriting the contents of an append-only
-file.
-
-Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
-Cc: Dan Rosenberg <dan.j.rosenberg@gmail.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/ext4/move_extent.c | 3 +++
- 1 file changed, 3 insertions(+)
-
---- a/fs/ext4/move_extent.c
-+++ b/fs/ext4/move_extent.c
-@@ -959,6 +959,9 @@ mext_check_arguments(struct inode *orig_
- return -EINVAL;
- }
-
-+ if (IS_IMMUTABLE(donor_inode) || IS_APPEND(donor_inode))
-+ return -EPERM;
-+
- /* Ext4 move extent does not support swapfile */
- if (IS_SWAPFILE(orig_inode) || IS_SWAPFILE(donor_inode)) {
- ext4_debug("ext4 move extent: The argument files should "
diff --git a/freed-ora/current/f12/kernel.spec b/freed-ora/current/f12/kernel.spec
index bcab29ca7..e0ea8b621 100644
--- a/freed-ora/current/f12/kernel.spec
+++ b/freed-ora/current/f12/kernel.spec
@@ -47,7 +47,7 @@ Summary: The Linux kernel
# reset this by hand to 1 (or to 0 and then use rpmdev-bumpspec).
# scripts/rebase.sh should be made to do that for you, actually.
#
-%global baserelease 159
+%global baserelease 161
%global fedora_build %{baserelease}
# base_sublevel is the kernel version we're starting with and patching
@@ -73,7 +73,7 @@ Summary: The Linux kernel
%if 0%{?released_kernel}
# Do we have a -stable update to apply?
-%define stable_update 18
+%define stable_update 19
# Is it a -stable RC?
%define stable_rc 0
# Set rpm version accordingly
@@ -794,7 +794,6 @@ Patch3050: linux-2.6-nfsd4-proots.patch
Patch3051: linux-2.6-nfs4-callback-hidden.patch
# btrfs
-Patch3100: linux-2.6-btrfs-fix-acl.patch
Patch3101: btrfs-prohibit-a-operation-of-changing-acls-mask-when-noacl-mount-option-is-used.patch
# XFS
@@ -861,12 +860,8 @@ Patch13030: l2tp-fix-oops-in-pppol2tp_xmit.patch
Patch14020: inotify-fix-inotify-oneshot-support.patch
Patch14030: inotify-send-IN_UNMOUNT-events.patch
-Patch14040: crypto-testmgr-add-null-test-for-aesni.patch
Patch14050: crypto-add-async-hash-testing.patch
-Patch14110: ext4-make-sure-the-move_ext-ioctl-can-t-overwrite-append-only-files.patch
-Patch14120: ext4-fix-freeze-deadlock-under-io.patch
-
# Red Hat Bugzilla #610911
Patch14130: kvm-mmu-fix-conflict-access-permissions-in-direct-sp.patch
@@ -1381,7 +1376,6 @@ ApplyPatch linux-2.6-execshield.patch
# xfs
# btrfs
-ApplyPatch linux-2.6-btrfs-fix-acl.patch
ApplyPatch btrfs-prohibit-a-operation-of-changing-acls-mask-when-noacl-mount-option-is-used.patch
# eCryptfs
@@ -1607,16 +1601,9 @@ ApplyPatch l2tp-fix-oops-in-pppol2tp_xmit.patch
ApplyPatch inotify-fix-inotify-oneshot-support.patch
ApplyPatch inotify-send-IN_UNMOUNT-events.patch
-# add tests for aesni module (#571577)
-ApplyPatch crypto-testmgr-add-null-test-for-aesni.patch
# add tests for crypto async hashing (#571577)
ApplyPatch crypto-add-async-hash-testing.patch
-# CVE-2010-2066
-ApplyPatch ext4-make-sure-the-move_ext-ioctl-can-t-overwrite-append-only-files.patch
-# Fix deadlock caused by patch in 2.6.32.17
-ApplyPatch ext4-fix-freeze-deadlock-under-io.patch
-
ApplyPatch kvm-mmu-fix-conflict-access-permissions-in-direct-sp.patch
# RHBZ #592785
@@ -2273,6 +2260,24 @@ fi
%kernel_variant_files -k vmlinux %{with_kdump} kdump
%changelog
+* Sun Aug 15 2010 Alexandre Oliva <lxoliva@fsfla.org> -libre
+- Adjusted patch-libre-2.6.32.19.
+
+* Sat Aug 14 2010 Chuck Ebbert <cebbert@redhat.com> 2.6.32.19-161
+- Linux 2.6.32.19
+
+* Fri Aug 13 2010 Chuck Ebbert <cebbert@redhat.com> 2.6.32.19-160.rc1
+- Linux 2.6.32.19-rc1
+- Comment out patches merged upstream:
+ linux-2.6-btrfs-fix-acl.patch
+ crypto-testmgr-add-null-test-for-aesni.patch
+ ext4-make-sure-the-move_ext-ioctl-can-t-overwrite-append-only-files.patch
+ ext4-fix-freeze-deadlock-under-io.patch
+- Fix linux-2.6-usb-wwan-update.patch to apply after 2.6.32.19
+
+* Fri Aug 13 2010 Alexandre Oliva <lxoliva@fsfla.org> -libre Sun Aug 15
+- Adjusted patch-libre-2.6.32.18.
+
* Tue Aug 10 2010 Chuck Ebbert <cebbert@redhat.com> 2.6.32.18-159
- Linux 2.6.32.18
- Backport nouveau noaccel fix for nva3+ cards from f13.
diff --git a/freed-ora/current/f12/linux-2.6-btrfs-fix-acl.patch b/freed-ora/current/f12/linux-2.6-btrfs-fix-acl.patch
deleted file mode 100644
index 3e015da42..000000000
--- a/freed-ora/current/f12/linux-2.6-btrfs-fix-acl.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-diff -up linux-2.6.32.noarch/fs/btrfs/acl.c.orig linux-2.6.32.noarch/fs/btrfs/acl.c
---- linux-2.6.32.noarch/fs/btrfs/acl.c.orig 2009-12-02 22:51:21.000000000 -0500
-+++ linux-2.6.32.noarch/fs/btrfs/acl.c 2010-01-14 15:36:25.926371944 -0500
-@@ -110,13 +110,15 @@ static int btrfs_set_acl(struct inode *i
-
- switch (type) {
- case ACL_TYPE_ACCESS:
-- mode = inode->i_mode;
-- ret = posix_acl_equiv_mode(acl, &mode);
-- if (ret < 0)
-- return ret;
-- ret = 0;
-- inode->i_mode = mode;
- name = POSIX_ACL_XATTR_ACCESS;
-+ if (acl) {
-+ mode = inode->i_mode;
-+ ret = posix_acl_equiv_mode(acl, &mode);
-+ if (ret < 0)
-+ return ret;
-+ ret = 0;
-+ inode->i_mode = mode;
-+ }
- break;
- case ACL_TYPE_DEFAULT:
- if (!S_ISDIR(inode->i_mode))
diff --git a/freed-ora/current/f12/linux-2.6-usb-wwan-update.patch b/freed-ora/current/f12/linux-2.6-usb-wwan-update.patch
index d6ab3d38d..1077e5bc9 100644
--- a/freed-ora/current/f12/linux-2.6-usb-wwan-update.patch
+++ b/freed-ora/current/f12/linux-2.6-usb-wwan-update.patch
@@ -116,7 +116,7 @@ diff -up linux-2.6.32.noarch/drivers/usb/serial/option.c.orig linux-2.6.32.noarc
struct option_port_private {
/* Input endpoints and buffer for this port */
struct urb *in_urbs[N_IN_URB];
-@@ -767,216 +740,28 @@ module_exit(option_exit);
+@@ -767,223 +740,35 @@ module_exit(option_exit);
static int option_probe(struct usb_serial *serial,
const struct usb_device_id *id)
{
@@ -135,6 +135,13 @@ diff -up linux-2.6.32.noarch/drivers/usb/serial/option.c.orig linux-2.6.32.noarc
serial->interface->cur_altsetting->desc.bInterfaceClass != 0xff)
return -ENODEV;
+ /* Don't bind network interfaces on Huawei K3765 & K4505 */
+ if (serial->dev->descriptor.idVendor == HUAWEI_VENDOR_ID &&
+ (serial->dev->descriptor.idProduct == HUAWEI_PRODUCT_K3765 ||
+ serial->dev->descriptor.idProduct == HUAWEI_PRODUCT_K4505) &&
+ serial->interface->cur_altsetting->desc.bInterfaceNumber == 1)
+ return -ENODEV;
+
- data = serial->private = kzalloc(sizeof(struct option_intf_private), GFP_KERNEL);
+ data = serial->private = kzalloc(sizeof(struct usb_wwan_intf_private), GFP_KERNEL);
if (!data)
diff --git a/freed-ora/current/f12/patch-libre-2.6.32.18.bz2.sign b/freed-ora/current/f12/patch-libre-2.6.32.18.bz2.sign
deleted file mode 100644
index c8c1f5ac5..000000000
--- a/freed-ora/current/f12/patch-libre-2.6.32.18.bz2.sign
+++ /dev/null
@@ -1,7 +0,0 @@
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.14 (GNU/Linux)
-
-iEYEABECAAYFAkxjeOoACgkQvLfPh359R6diJACfRWmXaRr/urroiB62BC0eSboF
-bl8An3IG37OXASX3l0wcFyNohSax3OHf
-=wWiY
------END PGP SIGNATURE-----
diff --git a/freed-ora/current/f12/patch-libre-2.6.32.18.xdelta b/freed-ora/current/f12/patch-libre-2.6.32.18.xdelta
deleted file mode 100644
index 11bcdeda9..000000000
--- a/freed-ora/current/f12/patch-libre-2.6.32.18.xdelta
+++ /dev/null
Binary files differ
diff --git a/freed-ora/current/f12/patch-libre-2.6.32.18.xdelta.sign b/freed-ora/current/f12/patch-libre-2.6.32.18.xdelta.sign
deleted file mode 100644
index a1686efe7..000000000
--- a/freed-ora/current/f12/patch-libre-2.6.32.18.xdelta.sign
+++ /dev/null
@@ -1,7 +0,0 @@
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.14 (GNU/Linux)
-
-iEYEABECAAYFAkxjeOgACgkQvLfPh359R6cO4ACggfeqi/BPNx3ZoQIb4JuLtmsG
-oYoAoJwc17fkChs1WEZy7dr9OAOseu0x
-=oO9t
------END PGP SIGNATURE-----
diff --git a/freed-ora/current/f12/patch-libre-2.6.32.19.bz2.sign b/freed-ora/current/f12/patch-libre-2.6.32.19.bz2.sign
new file mode 100644
index 000000000..a54bffd9d
--- /dev/null
+++ b/freed-ora/current/f12/patch-libre-2.6.32.19.bz2.sign
@@ -0,0 +1,7 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.14 (GNU/Linux)
+
+iEYEABECAAYFAkxoWaQACgkQvLfPh359R6cPYgCfcox4CeXf6BpBfmvWmLRWaxaL
+A3EAn3SLi4WFTutHUnV1j0zq+gMgzwDO
+=JxiH
+-----END PGP SIGNATURE-----
diff --git a/freed-ora/current/f12/patch-libre-2.6.32.19.xdelta b/freed-ora/current/f12/patch-libre-2.6.32.19.xdelta
new file mode 100644
index 000000000..c469c890f
--- /dev/null
+++ b/freed-ora/current/f12/patch-libre-2.6.32.19.xdelta
Binary files differ
diff --git a/freed-ora/current/f12/patch-libre-2.6.32.19.xdelta.sign b/freed-ora/current/f12/patch-libre-2.6.32.19.xdelta.sign
new file mode 100644
index 000000000..7d8bb9177
--- /dev/null
+++ b/freed-ora/current/f12/patch-libre-2.6.32.19.xdelta.sign
@@ -0,0 +1,7 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.14 (GNU/Linux)
+
+iEYEABECAAYFAkxoWaAACgkQvLfPh359R6ezzwCgkjJ8uFMx+cXMSgZukp5sghVZ
+02EAoJLCJ9D5+Tgaoamp9n+OmT4qzo/m
+=prMk
+-----END PGP SIGNATURE-----
diff --git a/freed-ora/current/f12/sources b/freed-ora/current/f12/sources
index d9cebf418..500c775d8 100644
--- a/freed-ora/current/f12/sources
+++ b/freed-ora/current/f12/sources
@@ -1,2 +1,2 @@
82f8fc14bf087bbb15ae5723533c56ee linux-2.6.32-libre1.tar.bz2
-196fc65cc1d4273b0f4a0edf899ac44f patch-libre-2.6.32.18.bz2
+fb0624ca4d7d0713e6cc8e4b28285c80 patch-libre-2.6.32.19.bz2
OpenPOWER on IntegriCloud