1. 17 Mar, 2006 19 commits
  2. 15 Mar, 2006 10 commits
  3. 14 Mar, 2006 11 commits
    • Dave Kleikamp's avatar
      [PATCH] JFS: Take logsync lock before testing mp->lsn · a488edc9
      Dave Kleikamp authored
      This fixes a race where lsn could be cleared before taking the lock
      Signed-off-by: default avatarDave Kleikamp <shaggy@austin.ibm.com>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      a488edc9
    • Linus Torvalds's avatar
      Merge master.kernel.org:/pub/scm/linux/kernel/git/jejb/scsi-rc-fixes-2.6 · 0f511ea7
      Linus Torvalds authored
      * master.kernel.org:/pub/scm/linux/kernel/git/jejb/scsi-rc-fixes-2.6:
        [SCSI] zfcp: fix device registration issues
        [SCSI] scsi_transport_fc: fix FC_HOST_NUM_ATTRS
        [SCSI] scsi: aha152x pcmcia driver needs spi transport
        [SCSI] zfcp: correctly set this_id for hosts
        [SCSI] Add Brownie to blacklist
      0f511ea7
    • Maneesh Soni's avatar
      [PATCH] Plug kdump shutdown race window · 67963132
      Maneesh Soni authored
      lapic_shutdown() re-enables interrupts which is un-desirable for panic
      case, so use local_irq_save() and local_irq_restore() to keep the irqs
      disabled for kexec on panic case, and close a possible race window while
      kdump shutdown as shown in this stack trace
      
         -- BUG: spinlock lockup on CPU#1, bash/4396, c52781a0
         [<c01c1870>] _raw_spin_lock+0xb7/0xd2
         [<c029e148>] _spin_lock+0x6/0x8
         [<c011b33f>] scheduler_tick+0xe7/0x328
         [<c0128a7c>] update_process_times+0x51/0x5d
         [<c0114592>] smp_apic_timer_interrupt+0x4f/0x58
         [<c01141ff>] lapic_shutdown+0x76/0x7e
         [<c0104d7c>] apic_timer_interrupt+0x1c/0x30
         [<c01141ff>] lapic_shutdown+0x76/0x7e
         [<c0116659>] machine_crash_shutdown+0x83/0xaa
         [<c013cc36>] crash_kexec+0xc1/0xe3
         [<c029e148>] _spin_lock+0x6/0x8
         [<c013cc22>] crash_kexec+0xad/0xe3
         [<c0215280>] __handle_sysrq+0x84/0xfd
         [<c018d937>] write_sysrq_trigger+0x2c/0x35
         [<c015e47b>] vfs_write+0xa2/0x13b
         [<c015ea73>] sys_write+0x3b/0x64
         [<c0103c69>] syscall_call+0x7/0xb
      Signed-off-by: default avatarManeesh Soni <maneesh@in.ibm.com>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      67963132
    • Linus Torvalds's avatar
      Revert "[PATCH] x86-64: Fix up handling of non canonical user RIPs" · cbf0ec6e
      Linus Torvalds authored
      This reverts commit c33d4568.
      
      Andrew Clayton and Hugh Dickins report that it's broken for them and
      causes strange page table and slab corruption, and spontaneous reboots.
      
      Let's get it right next time.
      
      Cc: Andrew Clayton <andrew@rootshell.co.uk>
      Cc: Hugh Dickins <hugh@veritas.com>
      Cc: Andi Kleen <ak@suse.de>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      cbf0ec6e
    • Dave Peterson's avatar
      [PATCH] EDAC: disable sysfs interface · ceb2ca9c
      Dave Peterson authored
      - Disable the EDAC sysfs code.  The sysfs interface that EDAC presents to
        user space needs more thought, and is likely to change substantially.
        Therefore disable it for now so users don't start depending on it in its
        current form.
      
      - Disable the default behavior of calling panic() when an uncorrectible
        error is detected (since for now, there is no sysfs interface that allows
        the user to configure this behavior).
      Signed-off-by: default avatarDavid S. Peterson <dsp@llnl.gov>
      Cc: Greg KH <greg@kroah.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      ceb2ca9c
    • Trond Myklebust's avatar
      [PATCH] NLM: Ensure we do not Oops in the case of an unlock · 30f4e20a
      Trond Myklebust authored
      In theory, NLM specs assure us that the server will only reply LCK_GRANTED or
      LCK_DENIED_GRACE_PERIOD to our NLM_UNLOCK request.
      
      In practice, we should not assume this to be the case, and the code will
      currently Oops if we do.
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      30f4e20a
    • Trond Myklebust's avatar
      [PATCH] SUNRPC: Fix potential deadlock in RPC code · e6d83d55
      Trond Myklebust authored
      In rpc_wake_up() and rpc_wake_up_status(), it is possible for the call to
      __rpc_wake_up_task() to fail if another thread happens to be calling
      rpc_wake_up_task() on the same rpc_task.
      
      Problem noticed by Bruno Faccini.
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      e6d83d55
    • Trond Myklebust's avatar
      [PATCH] NFSv4: fix mount segfault on errors returned that are < -1000 · c12e87f4
      Trond Myklebust authored
      It turns out that nfs4_proc_get_root() may return raw NFSv4 errors instead of
      mapping them to kernel errors.  Problem spotted by Neil Horman
      <nhorman@tuxdriver.com>
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      c12e87f4
    • Adrian Bunk's avatar
      [PATCH] SUNRPC: fix a NULL pointer dereference in net/sunrpc/clnt.c · 712917d1
      Adrian Bunk authored
      The Coverity checker spotted this possible NULL pointer dereference in
      rpc_new_client().
      Signed-off-by: default avatarAdrian Bunk <bunk@stusta.de>
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      712917d1
    • Trond Myklebust's avatar
      [PATCH] NFS: Fix a potential panic in O_DIRECT · 143f412e
      Trond Myklebust authored
      Based on an original patch by Mike O'Connor and Greg Banks of SGI.
      
      Mike states:
      
      A normal user can panic an NFS client and cause a local DoS with
      'judicious'(?) use of O_DIRECT.  Any O_DIRECT write to an NFS file where the
      user buffer starts with a valid mapped page and contains an unmapped page,
      will crash in this way.  I haven't followed the code, but O_DIRECT reads with
      similar user buffers will probably also crash albeit in different ways.
      
      Details: when nfs_get_user_pages() calls get_user_pages(), it detects and
      correctly handles get_user_pages() returning an error, which happens if the
      first page covered by the user buffer's address range is unmapped.  However,
      if the first page is mapped but some subsequent page isn't, get_user_pages()
      will return a positive number which is less than the number of pages requested
      (this behaviour is sort of analagous to a short write() call and appears to be
      intentional).  nfs_get_user_pages() doesn't detect this and hands off the
      array of pages (whose last few elements are random rubbish from the newly
      allocated array memory) to it's caller, whence they go to
      nfs_direct_write_seg(), which then totally ignores the nr_pages it's given,
      and calculates its own idea of how many pages are in the array from the user
      buffer length.  Needless to say, when it comes to transmit those uninitialised
      page* pointers, we see a crash in the network stack.
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      143f412e
    • GOTO Masanori's avatar
      [PATCH] Fix sigaltstack corruption among cloned threads · f9a3879a
      GOTO Masanori authored
      This patch fixes alternate signal stack corruption among cloned threads
      with CLONE_SIGHAND (and CLONE_VM) for linux-2.6.16-rc6.
      
      The value of alternate signal stack is currently inherited after a call of
      clone(...  CLONE_SIGHAND | CLONE_VM).  But if sigaltstack is set by a
      parent thread, and then if multiple cloned child threads (+ parent threads)
      call signal handler at the same time, some threads may be conflicted -
      because they share to use the same alternative signal stack region.
      Finally they get sigsegv.  It's an undesirable race condition.  Note that
      child threads created from NPTL pthread_create() also hit this conflict
      when the parent thread uses sigaltstack, without my patch.
      
      To fix this problem, this patch clears the child threads' sigaltstack
      information like exec().  This behavior follows the SUSv3 specification.
      In SUSv3, pthread_create() says "The alternate stack shall not be inherited
      (when new threads are initialized)".  It means that sigaltstack should be
      cleared when sigaltstack memory space is shared by cloned threads with
      CLONE_SIGHAND.
      
      Note that I chose "if (clone_flags & CLONE_SIGHAND)" line because:
        - If clone_flags line is not existed, fork() does not inherit sigaltstack.
        - CLONE_VM is another choice, but vfork() does not inherit sigaltstack.
        - CLONE_SIGHAND implies CLONE_VM, and it looks suitable.
        - CLONE_THREAD is another candidate, and includes CLONE_SIGHAND + CLONE_VM,
          but this flag has a bit different semantics.
      I decided to use CLONE_SIGHAND.
      
      [ Changed to test for CLONE_VM && !CLONE_VFORK after discussion --Linus ]
      Signed-off-by: default avatarGOTO Masanori <gotom@sanori.org>
      Cc: Roland McGrath <roland@redhat.com>
      Cc: Ingo Molnar <mingo@elte.hu>
      Acked-by: default avatarLinus Torvalds <torvalds@osdl.org>
      Cc: Ulrich Drepper <drepper@redhat.com>
      Cc: Jakub Jelinek <jakub@redhat.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      f9a3879a