From: Greg KH <gregkh@suse.de>, gregkh@mini.kroah.org
To: linux-kernel@vger.kernel.org, stable@kernel.org
Cc: stable-review@kernel.org, torvalds@linux-foundation.org,
akpm@linux-foundation.org, alan@lxorguk.ukuu.org.uk
Subject: [0/8] 2.6.27.37-stable review
Date: Fri, 9 Oct 2009 16:23:00 -0700 [thread overview]
Message-ID: <20091009232300.GA403@kroah.com> (raw)
This is the start of the stable review cycle for the 2.6.27.37 release.
There are 8 patches in this series, all will be posted as a response to
this one. If anyone has any issues with these being applied, please let
us know. If anyone is a maintainer of the proper subsystem, and wants
to add a Signed-off-by: line to the patch, please respond with it.
Responses should be made by Sunday October 11, 23:00:00 UTC. Anything
received after that time might be too late.
The whole patch series can be found in one patch at:
kernel.org/pub/linux/kernel/v2.6/stable-review/patch-2.6.27.37-rc1.gz
and the diffstat can be found below.
thanks,
greg k-h
Makefile | 2 +-
arch/x86/ia32/ia32entry.S | 56 +++++++++++++++++++++++--------------------
arch/x86/kvm/x86.c | 6 ++++
arch/x86/mm/mmap.c | 17 +++++++++++-
drivers/net/iseries_veth.c | 2 +-
drivers/watchdog/hpwdt.c | 15 +++++------
fs/ecryptfs/inode.c | 2 +
include/asm-x86/elf.h | 2 +
include/linux/kvm_para.h | 1 +
kernel/time/timekeeping.c | 22 +++++++++++++++++
10 files changed, 87 insertions(+), 38 deletions(-)
next reply other threads:[~2009-10-09 23:27 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20091009232123.464253035@mini.kroah.org>
2009-10-09 23:23 ` Greg KH, gregkh [this message]
2009-10-09 23:21 ` [1/8] net: Fix wrong sizeof Greg KH, gregkh
2009-10-09 23:21 ` [2/8] x86-64: slightly stream-line 32-bit syscall entry code Greg KH, gregkh
2009-10-09 23:21 ` [3/8] x86: Dont leak 64-bit kernel register values to 32-bit processes Greg KH, gregkh
2009-10-09 23:21 ` [4/8] eCryptfs: Prevent lower dentry from going negative during unlink (CVE-2009-2908) Greg KH, gregkh
2009-10-09 23:21 ` [5/8] x86: Increase MIN_GAP to include randomized stack Greg KH, gregkh
2009-10-09 23:21 ` [6/8] KVM: x86: Disallow hypercalls for guest callers in rings > 0 [CVE-2009-3290] Greg KH, gregkh
2009-10-09 23:21 ` [7/8] [WATCHDOG] hpwdt.c: Add new HP BMC controller Greg KH, gregkh
2009-10-09 23:21 ` [8/8] time: catch xtime_nsec underflows and fix them Greg KH, gregkh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20091009232300.GA403@kroah.com \
--to=gregkh@suse.de \
--cc=akpm@linux-foundation.org \
--cc=alan@lxorguk.ukuu.org.uk \
--cc=gregkh@mini.kroah.org \
--cc=linux-kernel@vger.kernel.org \
--cc=stable-review@kernel.org \
--cc=stable@kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox