1. 30 Oct, 2004 3 commits
    • Russell King's avatar
      [SERIAL] 8250: move basic initialisation of 8250 ports. · 394138bf
      Russell King authored
      This moves the basic initialisation of 8250 ports from
      serial8250_register_ports() into serial8250_isa_init_ports()
      394138bf
    • Russell King's avatar
      [SERIAL] 8250: Fix resource handling. · c35ec6da
      Russell King authored
      serial8250_request_std_resource() is now responsible for claiming
      the standard resources, _and_ calling ioremap if necessary.
      serial8250_release_std_resource() performs the complementary function
      in its entirety.
      serial8250_*_rsa_resource() perform the similar operations for RSA
      ports, with the exception that RSA ports can only be mapped into IO
      space.
      c35ec6da
    • Russell King's avatar
      [SERIAL] Clean up serial_core.c write functions. · c1d0b9d9
      Russell King authored
      Since the tty layer now takes care of user space writes,
      __uart_user_write() and associated temporary buffer and temporary
      buffer semaphore have all become unnecessary.  There's also little
      point in having __uart_kern_write() separate from uart_write(), so
      combine the two together.
      
      Adrian Bunk kindly provided the patch to remove __uart_user_write().
      The rest of the work is rmk's.
      
      Signed-off-by: Adrian Bunk
      Signed-off-by: default avatarRussell King <rmk@arm.linux.org.uk>
      c1d0b9d9
  2. 24 Oct, 2004 1 commit
    • Arjan van de Ven's avatar
      [SERIAL] Remove dead code. · 506b73c0
      Arjan van de Ven authored
      serial8250_get_irq_map is no longer used anywhere in the kernel (it
      used to be used by the isapnp code but isn't anymore) so it's dead
      code, below is a patch to remove this.
      506b73c0
  3. 23 Oct, 2004 5 commits
    • Roland McGrath's avatar
      [PATCH] fix core-dump return code · fb9099bd
      Roland McGrath authored
      While looking at the signal.c coredumping BUG_ON race, I noticed a bug
      (not directly related) in do_coredump.  It was setting the "core dumped"
      flag even when the format dumping hook failed (e.g.  for memory
      allocation failures).
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      fb9099bd
    • Roland McGrath's avatar
      [PATCH] Fix ptrace problem · 66edd549
      Roland McGrath authored
      This is indeed a new bug, and it is not architecture-specific.  In my
      recent changes to close some race conditions, I overlooked the case of a
      process using PTRACE_ATTACH on its own children.  The new PT_ATTACHED flag
      does not really mean "PTRACE_ATTACH was used", it means "PTRACE_ATTACH is
      changing the ->parent link".
      
      This fixes the problem that Stephane Eranian program demonstrates.
      Signed-off-by: default avatarRoland McGrath <roland@redhat.com>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      66edd549
    • Roland McGrath's avatar
      [PATCH] Invalid BUG_ONs in signal.c · 63bd6144
      Roland McGrath authored
      Oh, duh.  The race is obvious.  Sorry for the confusion there.
      
      The BUG_ON's were useful for debugging, since they trigger on a lot of
      errors, but they _also_ trigger on some unlikely (but valid) races.
      
      So just remove them - just fall through to the regular exit code after
      core-dumping (which does everything right).
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      63bd6144
    • Linus Torvalds's avatar
      Merge bk://bart.bkbits.net/ide-2.6 · 8421a12c
      Linus Torvalds authored
      into ppc970.osdl.org:/home/torvalds/v2.6/linux
      8421a12c
    • Chris Wright's avatar
      [PATCH] delay rq_lock acquisition in setscheduler · 67a2dad3
      Chris Wright authored
      Doing access control checks with rq_lock held can cause deadlock when
      audit messages are created (via printk or audit infrastructure) which
      trigger a wakeup and deadlock, as noted by both SELinux and SubDomain
      folks.  This patch will let the security checks happen w/out lock held,
      then re-sample the p->policy in case it was raced. 
      
      Originally from John Johansen <johansen@immunix.com>, reworked by me.
      AFAIK, this version drew no objections from Ingo or Andrea. 
      
      From: John Johansen <johansen@immunix.com>
      Acked-by: default avatarIngo Molnar <mingo@elte.hu>
      Signed-off-by: default avatarChris Wright <chrisw@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      67a2dad3
  4. 22 Oct, 2004 31 commits