From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 10198 invoked from network); 27 Nov 2004 12:42:31 +0000 Received: from smtp.gentoo.org (156.56.111.197) by lists.gentoo.org with AES256-SHA encrypted SMTP; 27 Nov 2004 12:42:31 +0000 Received: from lists.gentoo.org ([156.56.111.196] helo=parrot.gentoo.org) by smtp.gentoo.org with esmtp (Exim 4.41) id 1CY1uJ-0005dO-Fm for arch-gentoo-mips@lists.gentoo.org; Sat, 27 Nov 2004 12:42:31 +0000 Received: (qmail 5910 invoked by uid 89); 27 Nov 2004 12:42:30 +0000 Mailing-List: contact gentoo-mips-help@gentoo.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail Reply-To: gentoo-mips@lists.gentoo.org X-BeenThere: gentoo-mips@gentoo.org Received: (qmail 29884 invoked from network); 27 Nov 2004 12:42:30 +0000 Message-ID: <41A876F0.8070803@gentoo.org> Date: Sat, 27 Nov 2004 07:45:36 -0500 From: Kumba User-Agent: Mozilla Thunderbird 0.9 (Windows/20041103) X-Accept-Language: en-us, en MIME-Version: 1.0 To: gentoo-mips@lists.gentoo.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: [gentoo-mips] 2.6.9-r4 marked unstable (~mips) X-Archives-Salt: 6f7f62db-6960-469c-8c92-337316589c75 X-Archives-Hash: 86f776ff5493c63fe4ad20f1a0e3d9fd For those users running unstable (ACCEPT_KEYWORDS="~mips"), I've marked mips-sources-2.6.9-r4 as unstable. Those running Indy/Indigo2-class systems, be wary, as this specific kernel version didn't stay up too long for me on my Indy, but that was a bootcd kernel, and it probably had bugs. If IP22 users get it to run for several days, then it's probably just my end. IP32, IP30, and Cobalt users should have no problems running this kernel. IP30 (Octane) users need to include "ip30" in their USE flags in order for the ebuild to apply the Octane patch. Cobalt users will need to include "cobalt" in their USE as well, but the Cobalt profiles should do this already. When in doubt, check your `emerge info` output and see what USE flags are set. This specific revision also includes several security fixes, including the new CAN-2004-0883 (smbfs bug) fix, and a fix for a mips-specific ptrace vuln. Users running stable setups probably don't want to play with this kernel unless they know what they are doing. Questions, comments, flames, and ice cubes welcome as replies to this message or on IRC in #gentoo-mips. --Kumba -- "Such is oft the course of deeds that move the wheels of the world: small hands do them because they must, while the eyes of the great are elsewhere." --Elrond -- gentoo-mips@gentoo.org mailing list