[kernel] r6106 - dists/trunk/docs

maximilian attems maks-guest at costa.debian.org
Wed Mar 8 14:56:59 UTC 2006


Author: maks-guest
Date: Wed Mar  8 14:56:58 2006
New Revision: 6106

Modified:
   dists/trunk/docs/bits_kernel_team_0306.txt
Log:
tw=74


Modified: dists/trunk/docs/bits_kernel_team_0306.txt
==============================================================================
--- dists/trunk/docs/bits_kernel_team_0306.txt	(original)
+++ dists/trunk/docs/bits_kernel_team_0306.txt	Wed Mar  8 14:56:58 2006
@@ -20,17 +20,17 @@
 As mentioned above, we are tracking upstream closely.  Usually, the latest
 upstream release reaches unstable almost on the day of its release.
 Experimental acts as staging area, where the -rcX kernels are built.  If
-you want to be on the cutting edge, Bastian Blank provides daily builds out
-of the debian-kernel repository [1].
+you want to be on the cutting edge, Bastian Blank provides daily builds
+out of the debian-kernel repository [1].
 
 There has been lots of excitement around the x86 SMP alternatives patch,
 which would allow to reduce the current number of flavors. SMP hardware
 would just be a special case of hotplug CPUs. The uniprocessor flavors
 would also support SMP and the SMP ones could be dropped. On the feature
-side there is work going on to add vserver, Xen and UML flavors to
-linux-2.6.  Most legacy Debian specific patches have been cleared,
-the bulk of the current patchset is arch specific. 2.6 arch support is
-growing from release to release, so those patchsets should be of no concern.
+side there is work going on to add VServer, Xen and UML flavors to
+linux-2.6.  Most legacy Debian specific patches have been cleared, the
+bulk of the current patchset is arch specific. 2.6 arch support is growing
+from release to release, so those patchsets should be of no concern.
 
 2.6 Linux features initramfs, which contains the boot-relevant drivers.
 Currently there are two different supported tools for generating the
@@ -52,12 +52,12 @@
 
 Security
 ~~~~~~~~
-Dann Frazier, Simon Horman, and Moritz Muehlenhoff are doing a marvelous job in
-scanning and testing all CVEs (Common Vulnerabilities and Exposures, a unique
-ID for security issues) which get issued against the Linux kernel.  The second
-round of the sarge Debian kernel is prepared [3] and has been submitted to the
-stable security team. You won't believe it, but there is even a round for woody
-prepared [4].
+Dann Frazier, Simon Horman, and Moritz Muehlenhoff are doing a marvelous
+job in scanning and testing all CVEs (Common Vulnerabilities and
+Exposures, a unique ID for security issues) which get issued against the
+Linux kernel.  The second round of the sarge Debian kernel is prepared [3]
+and has been submitted to the stable security team. You won't believe it,
+but there is even a round for woody prepared [4].
 
 End of line
 ~~~~~~~~~~~
@@ -74,13 +74,13 @@
 
 Documentation
 ~~~~~~~~~~~~~
-The Debian Linux kernel handbook [5] contains lots of information
-about the Debian Linux kernel packages, recommended procedures, and
-other Debian-specific kernel-related information.  There you'll also
-find some practical chapters like "Filing a bug against a kernel
-package".  The kernel-handbook is currently a "work in progress", so
-any contributions, suggestions and corrections are very welcome.  They
-should be submitted to the kernel-handbook mailing list [6].
+The Debian Linux kernel handbook [5] contains lots of information about
+the Debian Linux kernel packages, recommended procedures, and other
+Debian-specific kernel-related information.  There you'll also find some
+practical chapters like "Filing a bug against a kernel package".  The
+kernel-handbook is currently a "work in progress", so any contributions,
+suggestions and corrections are very welcome.  They should be submitted to
+the kernel-handbook mailing list [6].
 
 Cheers,
 



More information about the Kernel-svn-changes mailing list