From 4bf3dea79c530f3cafbc0050a76801d80ea800f0 Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Tue, 10 May 2016 08:16:35 -0400 Subject: CVE-2016-4569 info leak in sound module (rhbz 1334643 1334645) --- ...imer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch | 33 +++++++++++++++++++++ ...Fix-leak-in-events-via-snd_timer_user_cca.patch | 34 ++++++++++++++++++++++ ...Fix-leak-in-events-via-snd_timer_user_tin.patch | 34 ++++++++++++++++++++++ kernel.spec | 8 +++++ 4 files changed, 109 insertions(+) create mode 100644 ALSA-timer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch create mode 100644 ALSA-timer-Fix-leak-in-events-via-snd_timer_user_cca.patch create mode 100644 ALSA-timer-Fix-leak-in-events-via-snd_timer_user_tin.patch diff --git a/ALSA-timer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch b/ALSA-timer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch new file mode 100644 index 000000000..3eb8bf183 --- /dev/null +++ b/ALSA-timer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch @@ -0,0 +1,33 @@ +From 527a5767c165abd2b4dba99da992c51ca7547562 Mon Sep 17 00:00:00 2001 +From: Kangjie Lu +Date: Tue, 3 May 2016 16:44:07 -0400 +Subject: [PATCH 1/3] ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +The stack object “tread” has a total size of 32 bytes. Its field +“event” and “val” both contain 4 bytes padding. These 8 bytes +padding bytes are sent to user without being initialized. + +Signed-off-by: Kangjie Lu +Signed-off-by: Takashi Iwai +--- + sound/core/timer.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/sound/core/timer.c b/sound/core/timer.c +index 6469bedda2f3..964f5ebf495e 100644 +--- a/sound/core/timer.c ++++ b/sound/core/timer.c +@@ -1739,6 +1739,7 @@ static int snd_timer_user_params(struct file *file, + if (tu->timeri->flags & SNDRV_TIMER_IFLG_EARLY_EVENT) { + if (tu->tread) { + struct snd_timer_tread tread; ++ memset(&tread, 0, sizeof(tread)); + tread.event = SNDRV_TIMER_EVENT_EARLY; + tread.tstamp.tv_sec = 0; + tread.tstamp.tv_nsec = 0; +-- +2.5.5 + diff --git a/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_cca.patch b/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_cca.patch new file mode 100644 index 000000000..e6f46f8a8 --- /dev/null +++ b/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_cca.patch @@ -0,0 +1,34 @@ +From addd6e9f0e25efb00d813d54528607c75b77c416 Mon Sep 17 00:00:00 2001 +From: Kangjie Lu +Date: Tue, 3 May 2016 16:44:20 -0400 +Subject: [PATCH 2/3] ALSA: timer: Fix leak in events via + snd_timer_user_ccallback +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +The stack object “r1” has a total size of 32 bytes. Its field +“event” and “val” both contain 4 bytes padding. These 8 bytes +padding bytes are sent to user without being initialized. + +Signed-off-by: Kangjie Lu +Signed-off-by: Takashi Iwai +--- + sound/core/timer.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/sound/core/timer.c b/sound/core/timer.c +index 964f5ebf495e..e98fa5feb731 100644 +--- a/sound/core/timer.c ++++ b/sound/core/timer.c +@@ -1225,6 +1225,7 @@ static void snd_timer_user_ccallback(struct snd_timer_instance *timeri, + tu->tstamp = *tstamp; + if ((tu->filter & (1 << event)) == 0 || !tu->tread) + return; ++ memset(&r1, 0, sizeof(r1)); + r1.event = event; + r1.tstamp = *tstamp; + r1.val = resolution; +-- +2.5.5 + diff --git a/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_tin.patch b/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_tin.patch new file mode 100644 index 000000000..7851c55a2 --- /dev/null +++ b/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_tin.patch @@ -0,0 +1,34 @@ +From b06a443b5679e9a0298e2f206ddb60845569f62f Mon Sep 17 00:00:00 2001 +From: Kangjie Lu +Date: Tue, 3 May 2016 16:44:32 -0400 +Subject: [PATCH 3/3] ALSA: timer: Fix leak in events via + snd_timer_user_tinterrupt +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +The stack object “r1” has a total size of 32 bytes. Its field +“event” and “val” both contain 4 bytes padding. These 8 bytes +padding bytes are sent to user without being initialized. + +Signed-off-by: Kangjie Lu +Signed-off-by: Takashi Iwai +--- + sound/core/timer.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/sound/core/timer.c b/sound/core/timer.c +index e98fa5feb731..c69a27155433 100644 +--- a/sound/core/timer.c ++++ b/sound/core/timer.c +@@ -1268,6 +1268,7 @@ static void snd_timer_user_tinterrupt(struct snd_timer_instance *timeri, + } + if ((tu->filter & (1 << SNDRV_TIMER_EVENT_RESOLUTION)) && + tu->last_resolution != resolution) { ++ memset(&r1, 0, sizeof(r1)); + r1.event = SNDRV_TIMER_EVENT_RESOLUTION; + r1.tstamp = tstamp; + r1.val = resolution; +-- +2.5.5 + diff --git a/kernel.spec b/kernel.spec index caa8cb7c8..d78545012 100644 --- a/kernel.spec +++ b/kernel.spec @@ -618,6 +618,11 @@ Patch706: USB-usbfs-fix-potential-infoleak-in-devio.patch Patch707: net-fix-infoleak-in-llc.patch Patch708: net-fix-infoleak-in-rtnetlink.patch +#CVE-2016-4569 rhbz 1334643 1334645 +Patch714: ALSA-timer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch +Patch715: ALSA-timer-Fix-leak-in-events-via-snd_timer_user_cca.patch +Patch716: ALSA-timer-Fix-leak-in-events-via-snd_timer_user_tin.patch + # END OF PATCH DEFINITIONS %endif @@ -2143,6 +2148,9 @@ fi # # %changelog +* Tue May 10 2016 Josh Boyer +- CVE-2016-4569 info leak in sound module (rhbz 1334643 1334645) + * Mon May 09 2016 Josh Boyer - 4.6.0-0.rc7.git0.1 - Linux v4.6-rc7 -- cgit From 802cbf85094c1f8456e447e819a7a605913ebef4 Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Tue, 10 May 2016 08:24:56 -0400 Subject: Enable XEN SCSI front and backend (rhbz 1334512) --- config-x86-generic | 4 ++-- kernel.spec | 1 + 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/config-x86-generic b/config-x86-generic index d21a99f58..06ddcd1a0 100644 --- a/config-x86-generic +++ b/config-x86-generic @@ -317,8 +317,8 @@ CONFIG_INPUT_XEN_KBDDEV_FRONTEND=m CONFIG_XEN_SELFBALLOONING=y CONFIG_XEN_PCIDEV_BACKEND=m CONFIG_XEN_ACPI_PROCESSOR=m -# CONFIG_XEN_SCSI_FRONTEND is not set -# CONFIG_XEN_SCSI_BACKEND is not set +CONFIG_XEN_SCSI_FRONTEND=m +CONFIG_XEN_SCSI_BACKEND=m CONFIG_XEN_SYMS=y CONFIG_SPI=y diff --git a/kernel.spec b/kernel.spec index d78545012..0f8fa5aa8 100644 --- a/kernel.spec +++ b/kernel.spec @@ -2149,6 +2149,7 @@ fi # %changelog * Tue May 10 2016 Josh Boyer +- Enable XEN SCSI front and backend (rhbz 1334512) - CVE-2016-4569 info leak in sound module (rhbz 1334643 1334645) * Mon May 09 2016 Josh Boyer - 4.6.0-0.rc7.git0.1 -- cgit From e0602bcbc4633f756e46da70b2ada0951e29762b Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Tue, 10 May 2016 10:45:12 -0400 Subject: Linux v4.6-rc7-45-g2d0bd9534c8d --- config-generic | 1 + gitrev | 2 +- kernel.spec | 9 +++---- net-fix-infoleak-in-llc.patch | 32 ------------------------ net-fix-infoleak-in-rtnetlink.patch | 50 ------------------------------------- sources | 1 + 6 files changed, 7 insertions(+), 88 deletions(-) delete mode 100644 net-fix-infoleak-in-llc.patch delete mode 100644 net-fix-infoleak-in-rtnetlink.patch diff --git a/config-generic b/config-generic index 4a5879d23..6e2c632f9 100644 --- a/config-generic +++ b/config-generic @@ -1707,6 +1707,7 @@ CONFIG_MLX4_INFINIBAND=m CONFIG_MLX5_CORE=m CONFIG_MLX5_CORE_EN=y CONFIG_MLX5_CORE_EN_DCB=y +CONFIG_MLX5_CORE_EN_VXLAN=y CONFIG_MLX5_INFINIBAND=m CONFIG_MLXSW_CORE=m CONFIG_MLXSW_CORE_HWMON=y diff --git a/gitrev b/gitrev index 9e88e8850..ecddf46af 100644 --- a/gitrev +++ b/gitrev @@ -1 +1 @@ -9caa7e78481f17fb6ff77dfaca774998e7440430 +2d0bd9534c8ddaebee64e1b4b7d621915f65e994 diff --git a/kernel.spec b/kernel.spec index 0f8fa5aa8..0b76a1a45 100644 --- a/kernel.spec +++ b/kernel.spec @@ -69,7 +69,7 @@ Summary: The Linux kernel # The rc snapshot level %define rcrev 7 # The git snapshot level -%define gitrev 0 +%define gitrev 1 # Set rpm version accordingly %define rpmversion 4.%{upstream_sublevel}.0 %endif @@ -614,10 +614,6 @@ Patch701: antenna_select.patch #CVE-2016-4482 rhbz 1332931 1332932 Patch706: USB-usbfs-fix-potential-infoleak-in-devio.patch -#CVE-2016-4486 CVE-2016-4485 rhbz 1333316 1333309 1333321 -Patch707: net-fix-infoleak-in-llc.patch -Patch708: net-fix-infoleak-in-rtnetlink.patch - #CVE-2016-4569 rhbz 1334643 1334645 Patch714: ALSA-timer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch Patch715: ALSA-timer-Fix-leak-in-events-via-snd_timer_user_cca.patch @@ -2148,6 +2144,9 @@ fi # # %changelog +* Tue May 10 2016 Josh Boyer - 4.6.0-0.rc7.git1.1 +- Linux v4.6-rc7-45-g2d0bd9534c8d + * Tue May 10 2016 Josh Boyer - Enable XEN SCSI front and backend (rhbz 1334512) - CVE-2016-4569 info leak in sound module (rhbz 1334643 1334645) diff --git a/net-fix-infoleak-in-llc.patch b/net-fix-infoleak-in-llc.patch deleted file mode 100644 index 38f0d506a..000000000 --- a/net-fix-infoleak-in-llc.patch +++ /dev/null @@ -1,32 +0,0 @@ -From ec0de35ded8c4a8588290a1b442aa3aa4bdf4de1 Mon Sep 17 00:00:00 2001 -From: Kangjie Lu -Date: Tue, 3 May 2016 16:35:05 -0400 -Subject: [PATCH 2/2] net: fix infoleak in llc -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -The stack object “info” has a total size of 12 bytes. Its last byte -is padding which is not initialized and leaked via “put_cmsg”. - -Signed-off-by: Kangjie Lu -Signed-off-by: David S. Miller ---- - net/llc/af_llc.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c -index b3c52e3f689a..8ae3ed97d95c 100644 ---- a/net/llc/af_llc.c -+++ b/net/llc/af_llc.c -@@ -626,6 +626,7 @@ static void llc_cmsg_rcv(struct msghdr *msg, struct sk_buff *skb) - if (llc->cmsg_flags & LLC_CMSG_PKTINFO) { - struct llc_pktinfo info; - -+ memset(&info, 0, sizeof(info)); - info.lpi_ifindex = llc_sk(skb->sk)->dev->ifindex; - llc_pdu_decode_dsap(skb, &info.lpi_sap); - llc_pdu_decode_da(skb, info.lpi_mac); --- -2.5.5 - diff --git a/net-fix-infoleak-in-rtnetlink.patch b/net-fix-infoleak-in-rtnetlink.patch deleted file mode 100644 index 0da35108d..000000000 --- a/net-fix-infoleak-in-rtnetlink.patch +++ /dev/null @@ -1,50 +0,0 @@ -From 55a8a812d867ec9953bde7d86eef255a1abbf93e Mon Sep 17 00:00:00 2001 -From: Kangjie Lu -Date: Tue, 3 May 2016 16:46:24 -0400 -Subject: [PATCH 1/2] net: fix infoleak in rtnetlink -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -The stack object “map” has a total size of 32 bytes. Its last 4 -bytes are padding generated by compiler. These padding bytes are -not initialized and sent out via “nla_put”. - -Signed-off-by: Kangjie Lu -Signed-off-by: David S. Miller ---- - net/core/rtnetlink.c | 18 ++++++++++-------- - 1 file changed, 10 insertions(+), 8 deletions(-) - -diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c -index a75f7e94b445..65763c29f845 100644 ---- a/net/core/rtnetlink.c -+++ b/net/core/rtnetlink.c -@@ -1180,14 +1180,16 @@ static noinline_for_stack int rtnl_fill_vfinfo(struct sk_buff *skb, - - static int rtnl_fill_link_ifmap(struct sk_buff *skb, struct net_device *dev) - { -- struct rtnl_link_ifmap map = { -- .mem_start = dev->mem_start, -- .mem_end = dev->mem_end, -- .base_addr = dev->base_addr, -- .irq = dev->irq, -- .dma = dev->dma, -- .port = dev->if_port, -- }; -+ struct rtnl_link_ifmap map; -+ -+ memset(&map, 0, sizeof(map)); -+ map.mem_start = dev->mem_start; -+ map.mem_end = dev->mem_end; -+ map.base_addr = dev->base_addr; -+ map.irq = dev->irq; -+ map.dma = dev->dma; -+ map.port = dev->if_port; -+ - if (nla_put(skb, IFLA_MAP, sizeof(map), &map)) - return -EMSGSIZE; - --- -2.5.5 - diff --git a/sources b/sources index 285fb2d9a..c3b48b089 100644 --- a/sources +++ b/sources @@ -1,3 +1,4 @@ a60d48eee08ec0536d5efb17ca819aef linux-4.5.tar.xz 6f557fe90b800b615c85c2ca04da6154 perf-man-4.5.tar.gz 2089df8a0f142e2a1cdcaca0f133e47d patch-4.6-rc7.xz +f47a22cd311223f0eef52e845d5e6507 patch-4.6-rc7-git1.xz -- cgit From 4f98eabc018bd4dfce36e8f7121f8c3951f56853 Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Wed, 11 May 2016 10:15:07 -0400 Subject: Linux v4.6-rc7-55-gc5114626f33b --- gitrev | 2 +- kernel.spec | 5 ++++- sources | 2 +- 3 files changed, 6 insertions(+), 3 deletions(-) diff --git a/gitrev b/gitrev index ecddf46af..ab0d61ef3 100644 --- a/gitrev +++ b/gitrev @@ -1 +1 @@ -2d0bd9534c8ddaebee64e1b4b7d621915f65e994 +c5114626f33b62fa7595e57d87f33d9d1f8298a2 diff --git a/kernel.spec b/kernel.spec index 0b76a1a45..fb426c6a0 100644 --- a/kernel.spec +++ b/kernel.spec @@ -69,7 +69,7 @@ Summary: The Linux kernel # The rc snapshot level %define rcrev 7 # The git snapshot level -%define gitrev 1 +%define gitrev 2 # Set rpm version accordingly %define rpmversion 4.%{upstream_sublevel}.0 %endif @@ -2144,6 +2144,9 @@ fi # # %changelog +* Wed May 11 2016 Josh Boyer - 4.6.0-0.rc7.git2.1 +- Linux v4.6-rc7-55-gc5114626f33b + * Tue May 10 2016 Josh Boyer - 4.6.0-0.rc7.git1.1 - Linux v4.6-rc7-45-g2d0bd9534c8d diff --git a/sources b/sources index c3b48b089..51ab1f052 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ a60d48eee08ec0536d5efb17ca819aef linux-4.5.tar.xz 6f557fe90b800b615c85c2ca04da6154 perf-man-4.5.tar.gz 2089df8a0f142e2a1cdcaca0f133e47d patch-4.6-rc7.xz -f47a22cd311223f0eef52e845d5e6507 patch-4.6-rc7-git1.xz +9c27262cc4c500a0b9b6727b257717c7 patch-4.6-rc7-git2.xz -- cgit From 104dc066906b7d67d2cb72793f181f3deea8f513 Mon Sep 17 00:00:00 2001 From: Peter Robinson Date: Thu, 12 May 2016 14:27:29 +0100 Subject: Some minor ARMv7 platform fixes from F-24 --- config-armv7-generic | 20 ++++++++++++++++++-- kernel.spec | 3 +++ 2 files changed, 21 insertions(+), 2 deletions(-) diff --git a/config-armv7-generic b/config-armv7-generic index 474409d9b..57ee4ef1f 100644 --- a/config-armv7-generic +++ b/config-armv7-generic @@ -52,6 +52,7 @@ CONFIG_CPU_SW_DOMAIN_PAN=y # CONFIG_DEBUG_ALIGN_RODATA is not set # Platforms enabled/disabled globally on ARMv7 +CONFIG_ARCH_BCM=y CONFIG_ARCH_BCM2835=y CONFIG_ARCH_EXYNOS=y CONFIG_ARCH_HIGHBANK=y @@ -60,7 +61,21 @@ CONFIG_ARCH_TEGRA=y CONFIG_ARCH_VEXPRESS_CORTEX_A5_A9_ERRATA=y CONFIG_ARCH_VIRT=y # CONFIG_ARCH_ARTPEC is not set -# CONFIG_ARCH_BCM is not set +# CONFIG_ARCH_BCM_CYGNUS is not set +# CONFIG_ARCH_BCM_NSP is not set +# CONFIG_ARCH_BCM_5301X is not set +# CONFIG_ARCH_BCM_281XX is not set +# CONFIG_ARCH_BCM_21664 is not set +# CONFIG_ARCH_BCM_63XX is not set +# CONFIG_ARCH_BRCMSTB is not set +# CONFIG_ARCH_BERLIN is not set +# CONFIG_ARCH_BCM_CYGNUS is not set +# CONFIG_ARCH_BCM_NSP is not set +# CONFIG_ARCH_BCM_5301X is not set +# CONFIG_ARCH_BCM_281XX is not set +# CONFIG_ARCH_BCM_21664 is not set +# CONFIG_ARCH_BCM_63XX is not set +# CONFIG_ARCH_BRCMSTB is not set # CONFIG_ARCH_BERLIN is not set # CONFIG_ARCH_HI3xxx is not set # CONFIG_ARCH_HISI is not set @@ -239,9 +254,10 @@ CONFIG_NVMEM_SUNXI_SID=m # BCM 283x CONFIG_SERIAL_AMBA_PL011=y CONFIG_SERIAL_AMBA_PL011_CONSOLE=y +CONFIG_SERIAL_8250_BCM2835AUX=y CONFIG_DMA_BCM2835=m -CONFIG_MMC_SDHCI_IPROC=m # CONFIG_MMC_SDHCI_BCM2835 is not set +CONFIG_MMC_SDHCI_IPROC=m CONFIG_BCM2835_MBOX=m CONFIG_PWM_BCM2835=m CONFIG_HW_RANDOM_BCM2835=m diff --git a/kernel.spec b/kernel.spec index fb426c6a0..43448fc02 100644 --- a/kernel.spec +++ b/kernel.spec @@ -2144,6 +2144,9 @@ fi # # %changelog +* Thu May 12 2016 Peter Robinson +- Some minor ARMv7 platform fixes from F-24 + * Wed May 11 2016 Josh Boyer - 4.6.0-0.rc7.git2.1 - Linux v4.6-rc7-55-gc5114626f33b -- cgit From df7dea68b2c8b57e116854b2cbe03a4d40342c25 Mon Sep 17 00:00:00 2001 From: Peter Robinson Date: Thu, 12 May 2016 18:04:14 +0100 Subject: Enable PCI_HOST_GENERIC for all ARM arches --- config-arm-generic | 2 +- config-armv7-generic | 1 - kernel.spec | 1 + 3 files changed, 2 insertions(+), 2 deletions(-) diff --git a/config-arm-generic b/config-arm-generic index 98a76fabc..5b03071db 100644 --- a/config-arm-generic +++ b/config-arm-generic @@ -198,7 +198,7 @@ CONFIG_OF_NET=y CONFIG_OF_OVERLAY=y CONFIG_OF_PCI_IRQ=m CONFIG_OF_PCI=m -# CONFIG_PCI_HOST_GENERIC is not set +CONFIG_PCI_HOST_GENERIC=y # CONFIG_PCIE_IPROC is not set CONFIG_OF_RESERVED_MEM=y CONFIG_OF_RESOLVE=y diff --git a/config-armv7-generic b/config-armv7-generic index 57ee4ef1f..ed26d946e 100644 --- a/config-armv7-generic +++ b/config-armv7-generic @@ -166,7 +166,6 @@ CONFIG_LSM_MMAP_MIN_ADDR=32768 CONFIG_XZ_DEC_ARM=y -CONFIG_PCI_HOST_GENERIC=y # CONFIG_PCI_LAYERSCAPE is not set # Do NOT enable this, it breaks stuff and makes things go slow # CONFIG_UACCESS_WITH_MEMCPY is not set diff --git a/kernel.spec b/kernel.spec index 43448fc02..3b819f830 100644 --- a/kernel.spec +++ b/kernel.spec @@ -2146,6 +2146,7 @@ fi %changelog * Thu May 12 2016 Peter Robinson - Some minor ARMv7 platform fixes from F-24 +- Enable PCI_HOST_GENERIC for all ARM arches * Wed May 11 2016 Josh Boyer - 4.6.0-0.rc7.git2.1 - Linux v4.6-rc7-55-gc5114626f33b -- cgit From 0c1193cdacceffd7b0f29ce3050b544854579c37 Mon Sep 17 00:00:00 2001 From: Peter Robinson Date: Thu, 12 May 2016 18:08:04 +0100 Subject: add credit to Jeremy Linton --- kernel.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel.spec b/kernel.spec index 3b819f830..d1ba71d09 100644 --- a/kernel.spec +++ b/kernel.spec @@ -2146,7 +2146,7 @@ fi %changelog * Thu May 12 2016 Peter Robinson - Some minor ARMv7 platform fixes from F-24 -- Enable PCI_HOST_GENERIC for all ARM arches +- Enable PCI_HOST_GENERIC for all ARM arches (Jeremy Linton) * Wed May 11 2016 Josh Boyer - 4.6.0-0.rc7.git2.1 - Linux v4.6-rc7-55-gc5114626f33b -- cgit From 6b8dfd16b6b23067a5f66320709f8f3a8e79c5dc Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Fri, 13 May 2016 11:30:08 -0400 Subject: Linux v4.6-rc7-116-ga2ccb68b1e6a --- gitrev | 2 +- kernel.spec | 5 ++++- sources | 2 +- 3 files changed, 6 insertions(+), 3 deletions(-) diff --git a/gitrev b/gitrev index ab0d61ef3..2d038f910 100644 --- a/gitrev +++ b/gitrev @@ -1 +1 @@ -c5114626f33b62fa7595e57d87f33d9d1f8298a2 +a2ccb68b1e6add42c0bf3ade73cd11c98d32b890 diff --git a/kernel.spec b/kernel.spec index d1ba71d09..3310bb8ee 100644 --- a/kernel.spec +++ b/kernel.spec @@ -69,7 +69,7 @@ Summary: The Linux kernel # The rc snapshot level %define rcrev 7 # The git snapshot level -%define gitrev 2 +%define gitrev 3 # Set rpm version accordingly %define rpmversion 4.%{upstream_sublevel}.0 %endif @@ -2144,6 +2144,9 @@ fi # # %changelog +* Fri May 13 2016 Josh Boyer - 4.6.0-0.rc7.git3.1 +- Linux v4.6-rc7-116-ga2ccb68b1e6a + * Thu May 12 2016 Peter Robinson - Some minor ARMv7 platform fixes from F-24 - Enable PCI_HOST_GENERIC for all ARM arches (Jeremy Linton) diff --git a/sources b/sources index 51ab1f052..029c11672 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ a60d48eee08ec0536d5efb17ca819aef linux-4.5.tar.xz 6f557fe90b800b615c85c2ca04da6154 perf-man-4.5.tar.gz 2089df8a0f142e2a1cdcaca0f133e47d patch-4.6-rc7.xz -9c27262cc4c500a0b9b6727b257717c7 patch-4.6-rc7-git2.xz +bf56da06679952234c9a2f31d2d259c8 patch-4.6-rc7-git3.xz -- cgit