1. 11 Nov, 2005 6 commits
    • Adrian Bunk's avatar
      [PATCH] airo.c/airo_cs.c: correct prototypes · f6e896dc
      Adrian Bunk authored
      This patch creates a file airo.h containing prototypes of the global
      functions in airo.c used by airo_cs.c .
      
      If you got strange problems with either airo_cs devices or in any other
      completely unrelated part of the kernel shortly or long after a airo_cs
      device was detected by the kernel, this might have been caused by the
      fact that caller and callee disagreed regarding the size of the first
      argument to init_airo_card()...
      Signed-off-by: default avatarAdrian Bunk <bunk@stusta.de>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      f6e896dc
    • Stephen Hemminger's avatar
      [PATCH] tcp: BIC max increment too large · 75be5e47
      Stephen Hemminger authored
      The max growth of BIC TCP is too large. Original code was based on
      BIC 1.0 and the default there was 32. Later code (2.6.13) included
      compensation for delayed acks, and should have reduced the default
      value to 16; since normally TCP gets one ack for every two packets sent.
      
      The current value of 32 makes BIC too aggressive and unfair to other
      flows.
      Submitted-by: default avatarInjong Rhee <rhee@eos.ncsu.edu>
      Signed-off-by: default avatarStephen Hemminger <shemminger@osdl.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      75be5e47
    • Greg Kroah-Hartman's avatar
      [PATCH] USB: always export interface information for modalias · 0b7a194c
      Greg Kroah-Hartman authored
      This fixes a problem with some cdc acm devices that were not getting
      automatically loaded as the module alias was not being reported
      properly.
      
      This check was for back in the days when we only reported hotplug events
      for the main usb device, not the interfaces.  We should always give the
      interface information for MODALIAS/modalias as it can be needed.
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      0b7a194c
    • Jens Axboe's avatar
      [PATCH] Oops on suspend after on-the-fly switch to anticipatory i/o scheduler - PowerBook5, 4 · d47698c7
      Jens Axboe authored
      Paul Collins wrote:
      >I boot with elevator=cfq (wanted to try the ionice stuff, never got
      >around to it).  Having decided to go back to the anticipatory
      >scheduler, I did the following:
      >
      ># echo anticipatory > /sys/block/hda/queue/scheduler
      ># echo anticipatory > /sys/block/hdc/queue/scheduler
      >
      >A while later I did 'sudo snooze', which produced the Oops below.
      >
      >Booting with elevator=as and then changing to cfq, sleep works fine.
      >But if I resume and change back to anticipatory I get a similar Oops
      >on the next 'sudo snooze'.
      >
      >
      >  Oops: kernel access of bad area, sig: 11 [#1]
      >  NIP: C01E1948 LR: C01D6A60 SP: EFBC5C20 REGS: efbc5b70 TRAP: 0300
      >Not tainted
      >  MSR: 00001032 EE: 0 PR: 0 FP: 0 ME: 1 IR/DR: 11
      >  DAR: 00000020, DSISR: 40000000
      >  TASK = efb012c0[1213] 'pmud' THREAD: efbc4000
      >  Last syscall: 54   GPR00: 00080000 EFBC5C20 EFB012C0 EFE9E044
      >EFBC5CE8 00000002 00000000 C03B0000   GPR08: C046E5D8 00000000
      >C03B47C8 E6A58360 22042422 1001E4DC 10010000 10000000   GPR16:
      >10000000 10000000 10000000 7FE4EB40 10000000 10000000 10010000
      >C0400000   GPR24: C0380000 00000002 00000002 C046E0C0 00000000
      >00000002 00000000 EFBC5CE8   NIP [c01e1948] as_insert_request+0xa8/0x6b0
      >  LR [c01d6a60] __elv_add_request+0xa0/0x100
      >  Call trace:
      >   [c01d6a60] __elv_add_request+0xa0/0x100
      >   [c01ffb84] ide_do_drive_cmd+0xb4/0x190
      >   [c01fc1c0] generic_ide_suspend+0x80/0xa0
      >   [c01d4574] suspend_device+0x104/0x160
      >   [c01d47c0] device_suspend+0x120/0x330
      >   [c03f3b50] pmac_suspend_devices+0x50/0x1b0
      >   [c03f4294] pmu_ioctl+0x344/0x9b0
      >   [c0082aa4] do_ioctl+0x84/0x90
      >   [c0082b3c] vfs_ioctl+0x8c/0x460
      >   [c0082f50] sys_ioctl+0x40/0x80
      >   [c0004850] ret_from_syscall+0x0/0x4c
      
      Don't clear ->elevator_data on exit, if we are switching queues we are
      overwriting the data of the new io scheduler.
      Signed-off-by: default avatarJens Axboe <axboe@suse.de>
      Signed-off-by: default avatarChris Wright <chrisw@osdl.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      d47698c7
    • Dimitri Puzin's avatar
      [PATCH] fix XFS_QUOTA for modular XFS · ee5b36ff
      Dimitri Puzin authored
      This patch by Dimitri Puzin submitted through kernel Bugzilla #5514
      fixes the following issue:
      
      Cannot build XFS filesystem support as module with quota support. It
      works only when the XFS filesystem support is compiled into the kernel.
      Menuconfig prevents from setting CONFIG_XFS_FS=m and CONFIG_XFS_QUOTA=y.
      
      How to reproduce: configure the XFS filesystem with quota support as
      module. The resulting kernel won't have quota support compiled into
      xfs.ko.
      
      Fix: Changing the fs/xfs/Kconfig file from tristate to bool lets you
      configure the quota support to be compiled into the XFS module. The
      Makefile-linux-2.6 checks only for CONFIG_XFS_QUOTA=y.
      Signed-off-by: default avatarAdrian Bunk <bunk@stusta.de>
      Signed-off-by: default avatarNathan Scott <nathans@sgi.com>
      Signed-off-by: default avatarChris Wright <chrisw@osdl.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      ee5b36ff
    • Roger While's avatar
      [PATCH] prism54 : Fix frame length · e0be26d5
      Roger While authored
      prism54 is leaking information when passing transmits to the firmware.
      There is no requirement to adjust the length to >= ETH_ZLEN.
      Just pass the skb length (after possible adjustment).
      Signed-off-by: default avatarRoger While <simrw@sim-basis.de>
      Acked-by: default avatarJeff Garzik <jgarzik@pobox.com>
      Signed-off-by: default avatarChris Wright <chrisw@osdl.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      e0be26d5
  2. 08 Nov, 2005 2 commits
    • Greg Kroah-Hartman's avatar
      Linux 2.6.14.1 · 93b188a9
      Greg Kroah-Hartman authored
      93b188a9
    • Al Viro's avatar
      [PATCH] CVE-2005-2709 sysctl unregistration oops · e4e04112
      Al Viro authored
      You could open the /proc/sys/net/ipv4/conf/<if>/<whatever> file, then
      wait for interface to go away, try to grab as much memory as possible in
      hope to hit the (kfreed) ctl_table.  Then fill it with pointers to your
      function. Then do read from file you've opened and if you are lucky,
      you'll get it called as ->proc_handler() in kernel mode.
      
      So this is at least an Oops and possibly more.  It does depend on an
      interface going away though, so less of a security risk than it would
      otherwise be.
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      e4e04112
  3. 28 Oct, 2005 1 commit
  4. 27 Oct, 2005 6 commits
  5. 26 Oct, 2005 14 commits
  6. 25 Oct, 2005 5 commits
  7. 24 Oct, 2005 6 commits