packages: kernel/kernel-small_fixes.patch - removed hunks applied in 3.0-rc6

baggins baggins at pld-linux.org
Mon Jul 11 11:33:44 CEST 2011


Author: baggins                      Date: Mon Jul 11 09:33:44 2011 GMT
Module: packages                      Tag: HEAD
---- Log message:
- removed hunks applied in 3.0-rc6

---- Files affected:
packages/kernel:
   kernel-small_fixes.patch (1.28 -> 1.29) 

---- Diffs:

================================================================
Index: packages/kernel/kernel-small_fixes.patch
diff -u packages/kernel/kernel-small_fixes.patch:1.28 packages/kernel/kernel-small_fixes.patch:1.29
--- packages/kernel/kernel-small_fixes.patch:1.28	Tue Jul  5 22:39:19 2011
+++ packages/kernel/kernel-small_fixes.patch	Mon Jul 11 11:33:39 2011
@@ -59,73 +59,3 @@
  	/* block receiver */
  	sky2_write8(hw, SK_REG(port, RX_GMF_CTRL_T), GMF_RST_SET);
  }
-
-
-
-blk_cleanup_queue() calls elevator_exit() and after this, we can't
-touch the elevator without oopsing.  __elv_next_request() must check
-for this state because in the refcounted queue model, we can still
-call it after blk_cleanup_queue() has been called.
-
-This was reported as causing an oops attributable to scsi.
-
-Signed-off-by: James Bottomley <James.Bottomley at suse.de>
----
- block/blk.h |    3 ++-
- 1 files changed, 2 insertions(+), 1 deletions(-)
-
-diff --git a/block/blk.h b/block/blk.h
-index 6126346..4df474d 100644
---- a/block/blk.h
-+++ b/block/blk.h
-@@ -62,7 +62,8 @@ static inline struct request *__elv_next_request(struct request_queue *q)
- 			return rq;
- 		}
- 
--		if (!q->elevator->ops->elevator_dispatch_fn(q, 0))
-+		if (test_bit(QUEUE_FLAG_DEAD, &q->queue_flags) ||
-+		    !q->elevator->ops->elevator_dispatch_fn(q, 0))
- 			return NULL;
- 	}
- }
--- 
-1.7.4.1
-
-
-
---
-To unsubscribe from this list: send the line "unsubscribe linux-scsi" in
-the body of a message to majordomo at vger.kernel.org
-More majordomo info at  http://vger.kernel.org/majordomo-info.htmlcommit a5b2c5b2ad5853591a6cac6134cd0f599a720865
-Author: Kees Cook <kees.cook at canonical.com>
-Date:   Tue May 31 11:31:41 2011 -0700
-
-    AppArmor: fix oops in apparmor_setprocattr
-    
-    When invalid parameters are passed to apparmor_setprocattr a NULL deref
-    oops occurs when it tries to record an audit message. This is because
-    it is passing NULL for the profile parameter for aa_audit. But aa_audit
-    now requires that the profile passed is not NULL.
-    
-    Fix this by passing the current profile on the task that is trying to
-    setprocattr.
-    
-    Signed-off-by: Kees Cook <kees at ubuntu.com>
-    Signed-off-by: John Johansen <john.johansen at canonical.com>
-    Cc: stable at kernel.org
-    Signed-off-by: James Morris <jmorris at namei.org>
-
-diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c
-index ae3a698..ec1bcec 100644
---- a/security/apparmor/lsm.c
-+++ b/security/apparmor/lsm.c
-@@ -593,7 +593,8 @@ static int apparmor_setprocattr(struct task_struct *task, char *name,
- 			sa.aad.op = OP_SETPROCATTR;
- 			sa.aad.info = name;
- 			sa.aad.error = -EINVAL;
--			return aa_audit(AUDIT_APPARMOR_DENIED, NULL, GFP_KERNEL,
-+			return aa_audit(AUDIT_APPARMOR_DENIED,
-+					__aa_current_profile(), GFP_KERNEL,
- 					&sa, NULL);
- 		}
- 	} else if (strcmp(name, "exec") == 0) {
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/kernel/kernel-small_fixes.patch?r1=1.28&r2=1.29&f=u



More information about the pld-cvs-commit mailing list