Hi,

2.6.10-as is now in purely maintenance mode; that is, I'll only include
security fixes or quick things that people send me (that don't require
much effort on my part :).  This includes the security fix from
2.6.11.2.  I'll have 2.6.11-as1 soon, after I sync up w/ Debian stuff
and go through about 800 more changesets.  We'll see where 2.6.x.y goes
from there; if feeding patches is easy, then there won't be much need
for -as; otherwise, I'll continue doing it as a vendor base (at least
one person who does vendor kernels has expressed the opinion that they'd
prefer 2.6.x.y to be a bit more liberal than it currently is).

Also, note the email address; I'm trying to phase out usage of my
voxel.net address, as I no longer work there.


The -as tree is intended to include only security and bugfixes, from
various sources.  I do not include hardware driver updates
(specifically, anything that changes how the hardware registers
themselves are probed/poked), large subsystem updates, cleanups, and so
on; only fixes that will not contain regressions.  The hope is that
vendors/distributors can use this tree as a base for their kernels.  It
is also what I'd want a 2.6.x.y tree to have.

The kernel patches can be grabbed from here:
http://www.acm.cs.rpi.edu/~dilinger/patches/2.6.10/as7/

86f79bd2e50963829da3c0456804df0f  ChangeLog
e852090bafa5ea4ff7c6b922d33ec1e7  linux-2.6.10-as7.tar.gz
8ca1ac89c1eac2111f146cc21d6193c2  patch-2.6.10-as7.gz

Changes from 2.6.10-as6:

2005-03-10 21:51:49 GMT Andres Salomon <[EMAIL PROTECTED]>      patch-155

    Summary:
      tag 2.6.10-as7
    Revision:
      linux--dilinger--0--patch-155

    
    

    modified files:
     000-extraversion.patch


2005-03-10 21:50:21 GMT Andres Salomon <[EMAIL PROTECTED]>      patch-154

    Summary:
      144-sys_epoll_wait_int_overflow.patch
    Revision:
      linux--dilinger--0--patch-154

    [SECURITY] sys_epoll_wait contains an integer overflow; see
    http://seclists.org/lists/fulldisclosure/2005/Mar/0293.html for
additional
    details.
    
    

    new files:
     .arch-ids/144-sys_epoll_wait_int_overflow.patch.id
     144-sys_epoll_wait_int_overflow.patch


2005-03-10 21:46:21 GMT Andres Salomon <[EMAIL PROTECTED]>      patch-153

    Summary:
      143-sysfs_write_file_signedness_problem.patch
    Revision:
      linux--dilinger--0--patch-153

    [SYSFS] sysfs_write_file assigns the result of fill_write_buffer
(which is
    signed and returns negative upon error) to an unsigned int.
Clearly, bad
    and wrong..
    

    new files:
     .arch-ids/143-sysfs_write_file_signedness_problem.patch.id
     143-sysfs_write_file_signedness_problem.patch


-- 
Andres Salomon <[EMAIL PROTECTED]>

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to