lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 29 Jul 2008 14:57:29 +0200 (CEST)
From:	Thomas Gleixner <tglx@...utronix.de>
To:	LKML <linux-kernel@...r.kernel.org>
cc:	rt-users <linux-rt-users@...r.kernel.org>,
	Steven Rostedt <rostedt@...dmis.org>,
	Ingo Molnar <mingo@...e.hu>,
	Clark Williams <williams@...hat.com>,
	Peter Zijlstra <peterz@...radead.org>,
	Wolfgang Grandegger <wg@...ndegger.com>,
	Carsten Emde <ce@...g.ch>
Subject: Re: 2.6.24.7-rt16

We are pleased to announce the 2.6.24.7-rt17 tree, which can be
downloaded from the location:
  
   http://rt.et.redhat.com/download/
 
Information on the RT patch can be found at:

   http://rt.wiki.kernel.org/index.php/Main_Page
 
This is a bugfix update:
 
	- use the correct version of the ppc64 percpu patch
	  pointed out by Chirag Jog

to build a 2.6.24.7-rt17 tree, the following patches should be applied:

  http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.24.tar.bz2
  http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.24.7.bz2
  http://rt.et.redhat.com/download/patch-2.6.24.7-rt17.bz2
 
And like always, Steven's RT version of Matt Mackall's ketchup will get this
for you nicely:

  http://people.redhat.com/srostedt/rt/tools/ketchup-0.9.8-rt3

As usual the broken out patches are also available.

Thanks,

	tglx

---

--- patches/series	2008-07-27 11:20:44.000000000 +0200
+++ patches/series	2008-07-29 14:28:39.000000000 +0200
@@ -1105,7 +1105,7 @@
 ftrace-preempt-trace-check.patch
 fix_SCHED_FIFO_spec_violation.patch
 
-ppc64-fix_preempt_unsafe_access_to_per_cpu_variables.patch
+ppc64-fix-preempt-unsafe-paths-accessing-per_cpu-variables.patch
 bz235099-idle-load-fix.patch
 
 raw-spinlocks-for-nmi-print.patch


Index: linux-2.6.24.7/arch/powerpc/mm/tlb_64.c
===================================================================
--- linux-2.6.24.7.orig/arch/powerpc/mm/tlb_64.c
+++ linux-2.6.24.7/arch/powerpc/mm/tlb_64.c
@@ -99,7 +99,6 @@ void pgtable_free_tlb(struct mmu_gather 
 	    cpus_equal(tlb->mm->cpu_vm_mask, local_cpumask)) {
 		pgtable_free(pgf);
 		goto cleanup;
-		return;
 	}
 
 	if (*batchp == NULL) {
@@ -107,7 +106,6 @@ void pgtable_free_tlb(struct mmu_gather 
 		if (*batchp == NULL) {
 			pgtable_free_now(pgf);
 			goto cleanup;
-			return;
 		}
 		(*batchp)->index = 0;
 	}
@@ -261,6 +259,7 @@ void pte_free_finish(void)
 		pte_free_submit(*batchp);
 		*batchp = NULL;
 	}
+
 	put_cpu_var_locked(pte_freelist_cur, cpu);
 }
 
Index: linux-2.6.24.7/arch/powerpc/platforms/pseries/iommu.c
===================================================================
--- linux-2.6.24.7.orig/arch/powerpc/platforms/pseries/iommu.c
+++ linux-2.6.24.7/arch/powerpc/platforms/pseries/iommu.c
@@ -155,7 +155,7 @@ static void tce_buildmulti_pSeriesLP(str
 						   uaddr, direction);
 		}
 
-		per_cpu_var_locked(tce_page, &cpu) = tcep;
+		per_cpu_var_locked(tce_page, cpu) = tcep;
 	}
 
 	rpn = (virt_to_abs(uaddr)) >> TCE_SHIFT;

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ