[kernel] r19478 - in dists/trunk/linux/debian: . patches patches/debian patches/features/all/rt

Ben Hutchings benh at alioth.debian.org
Fri Nov 2 05:34:59 UTC 2012


Author: benh
Date: Fri Nov  2 05:34:58 2012
New Revision: 19478

Log:
Update to 3.6.5

This fixes a regression in 3.6.4 and includes a fix previously in the rt
series.

It also disables link security restrictions by default, so add a patch to
re-enable them.

Added:
   dists/trunk/linux/debian/patches/debian/fs-enable-link-security-restrictions-by-default.patch
Deleted:
   dists/trunk/linux/debian/patches/features/all/rt/cpufreq-powernow-k8-fix-bogus-smp-processor-id-usage.patch
Modified:
   dists/trunk/linux/debian/changelog
   dists/trunk/linux/debian/patches/series
   dists/trunk/linux/debian/patches/series-rt

Modified: dists/trunk/linux/debian/changelog
==============================================================================
--- dists/trunk/linux/debian/changelog	Thu Nov  1 14:20:16 2012	(r19477)
+++ dists/trunk/linux/debian/changelog	Fri Nov  2 05:34:58 2012	(r19478)
@@ -1,4 +1,9 @@
-linux (3.6.4-1~experimental.2) UNRELEASED; urgency=low
+linux (3.6.5-1~experimental.2) UNRELEASED; urgency=low
+
+  * New upstream stable update:
+    http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.5
+    - [x86] mm: Find_early_table_space based on ranges that are actually
+      being mapped (Closes: #692067)
 
   [ Uwe Kleine-König ]
   * [rt] bump to 3.6.4-rt10
@@ -6,6 +11,8 @@
   [ Ben Hutchings ]
   * [x86] staging: Re-enable ZSMALLOC as module, previously selected by
     ZRAM but now a dependency (Closes: #692024)
+  * fs: Re-enable link security restrictions that are disabled by default
+    in 3.6.5
 
  -- Uwe Kleine-König <uwe at kleine-koenig.org>  Mon, 29 Oct 2012 15:50:12 +0100
 

Added: dists/trunk/linux/debian/patches/debian/fs-enable-link-security-restrictions-by-default.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ dists/trunk/linux/debian/patches/debian/fs-enable-link-security-restrictions-by-default.patch	Fri Nov  2 05:34:58 2012	(r19478)
@@ -0,0 +1,21 @@
+From: Ben Hutchings <ben at decadent.org.uk>
+Subject: fs: Enable link security restrictions by default
+Date: Fri, 02 Nov 2012 05:32:06 +0000
+Bug-Debian: http://bugs.debian.org/609455
+
+This reverts commit 561ec64ae67ef25cac8d72bb9c4bfc955edfd415
+('VFS: don't do protected {sym,hard}links by default').
+
+--- a/fs/namei.c
++++ b/fs/namei.c
+@@ -651,8 +651,8 @@ static inline void put_link(struct namei
+ 	path_put(link);
+ }
+ 
+-int sysctl_protected_symlinks __read_mostly = 0;
+-int sysctl_protected_hardlinks __read_mostly = 0;
++int sysctl_protected_symlinks __read_mostly = 1;
++int sysctl_protected_hardlinks __read_mostly = 1;
+ 
+ /**
+  * may_follow_link - Check symlink following for unsafe situations

Modified: dists/trunk/linux/debian/patches/series
==============================================================================
--- dists/trunk/linux/debian/patches/series	Thu Nov  1 14:20:16 2012	(r19477)
+++ dists/trunk/linux/debian/patches/series	Fri Nov  2 05:34:58 2012	(r19478)
@@ -47,3 +47,4 @@
 bugfix/all/speakup-lower-default-software-speech-rate.patch
 debian/iwlwifi-do-not-request-unreleased-firmware.patch
 debian/cirrus-disable-modeset-by-default.patch
+debian/fs-enable-link-security-restrictions-by-default.patch

Modified: dists/trunk/linux/debian/patches/series-rt
==============================================================================
--- dists/trunk/linux/debian/patches/series-rt	Thu Nov  1 14:20:16 2012	(r19477)
+++ dists/trunk/linux/debian/patches/series-rt	Fri Nov  2 05:34:58 2012	(r19478)
@@ -598,7 +598,6 @@
 # Enable full RT
 features/all/rt/rcu-tiny-solve-rt-mistery.patch
 features/all/rt/mm-enable-slub.patch
-features/all/rt/cpufreq-powernow-k8-fix-bogus-smp-processor-id-usage.patch
 features/all/rt/kconfig-disable-a-few-options-rt.patch
 features/all/rt/kconfig-preempt-rt-full.patch
 #rt-replace-rt-spin-lock-to-raw-one-in-res_counter.patch



More information about the Kernel-svn-changes mailing list