1. 06 Nov, 2006 20 commits
  2. 05 Nov, 2006 11 commits
  3. 04 Nov, 2006 5 commits
  4. 03 Nov, 2006 4 commits
    • Linus Torvalds's avatar
      Merge master.kernel.org:/pub/scm/linux/kernel/git/gregkh/pci-2.6 · a0d2db26
      Linus Torvalds authored
      * master.kernel.org:/pub/scm/linux/kernel/git/gregkh/pci-2.6:
        PCI: Let PCI_MULTITHREAD_PROBE depend on BROKEN
        PCI: Revert "PCI: i386/x86_84: disable PCI resource decode on device disable"
      a0d2db26
    • Linus Torvalds's avatar
      Merge master.kernel.org:/pub/scm/linux/kernel/git/gregkh/usb-2.6 · ced3985f
      Linus Torvalds authored
      * master.kernel.org:/pub/scm/linux/kernel/git/gregkh/usb-2.6:
        USB: use MII hooks only if CONFIG_MII is enabled
        USB Storage: unusual_devs.h entry for Sony Ericsson P990i
        USB: xpad: additional USB id's added
        USB: fix compiler issues with newer gcc versions
        USB: HID: add blacklist AIRcable USB, little beautification
        USB: usblp: fix system suspend for some systems
        USB: failure in usblp's error path
        usbtouchscreen: use endpoint address from endpoint descriptor
        USB: sierra: Fix id for Sierra Wireless MC8755 in new table
        USB: new VID/PID-combos for cp2101
        hid-core: big-endian fix fix
        USB: usb-storage: Unusual_dev update
        USB: add another sierra wireless device id
      ced3985f
    • Andreas Gruenbacher's avatar
      [PATCH] Fix user.* xattr permission check for sticky dirs · f1f2d871
      Andreas Gruenbacher authored
      The user.* extended attributes are only allowed on regular files and
      directories.  Sticky directories further restrict write access to the owner
      and privileged users.  (See the attr(5) man page for an explanation.)
      
      The original check in ext2/ext3 when user.* xattrs were merged was more
      restrictive than intended, and when the xattr permission checks were moved
      into the VFS, read access to user.* attributes on sticky directores ended
      up being denied in addition.
      
      Originally-from: Gerard Neil <xyzzy@devferret.org>
      Signed-off-by: default avatarAndreas Gruenbacher <agruen@suse.de>
      Cc: Dave Kleikamp <shaggy@austin.ibm.com>
      Cc: Jan Engelhardt <jengelh@linux01.gwdg.de>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      f1f2d871
    • Stephen Rothwell's avatar
      [PATCH] Fix sys_move_pages when a NULL node list is passed · 8ce08464
      Stephen Rothwell authored
      sys_move_pages() uses vmalloc() to allocate an array of structures that is
      fills with information passed from user mode and then passes to
      do_stat_pages() (in the case the node list is NULL).  do_stat_pages()
      depends on a marker in the node field of the structure to decide how large
      the array is and this marker is correctly inserted into the last element of
      the array.  However, vmalloc() doesn't zero the memory it allocates and if
      the user passes NULL for the node list, then the node fields are not filled
      in (except for the end marker).  If the memory the vmalloc() returned
      happend to have a word with the marker value in it in just the right place,
      do_pages_stat will fail to fill the status field of part of the array and
      we will return (random) kernel data to user mode.
      Signed-off-by: default avatarStephen Rothwell <sfr@canb.auug.org.au>
      Cc: Christoph Lameter <clameter@engr.sgi.com>
      Cc: <stable@kernel.org>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      8ce08464