1. 11 Nov, 2005 3 commits
    • Jens Axboe's avatar
      [PATCH] Oops on suspend after on-the-fly switch to anticipatory i/o scheduler - PowerBook5, 4 · d47698c7
      Jens Axboe authored
      Paul Collins wrote:
      >I boot with elevator=cfq (wanted to try the ionice stuff, never got
      >around to it).  Having decided to go back to the anticipatory
      >scheduler, I did the following:
      >
      ># echo anticipatory > /sys/block/hda/queue/scheduler
      ># echo anticipatory > /sys/block/hdc/queue/scheduler
      >
      >A while later I did 'sudo snooze', which produced the Oops below.
      >
      >Booting with elevator=as and then changing to cfq, sleep works fine.
      >But if I resume and change back to anticipatory I get a similar Oops
      >on the next 'sudo snooze'.
      >
      >
      >  Oops: kernel access of bad area, sig: 11 [#1]
      >  NIP: C01E1948 LR: C01D6A60 SP: EFBC5C20 REGS: efbc5b70 TRAP: 0300
      >Not tainted
      >  MSR: 00001032 EE: 0 PR: 0 FP: 0 ME: 1 IR/DR: 11
      >  DAR: 00000020, DSISR: 40000000
      >  TASK = efb012c0[1213] 'pmud' THREAD: efbc4000
      >  Last syscall: 54   GPR00: 00080000 EFBC5C20 EFB012C0 EFE9E044
      >EFBC5CE8 00000002 00000000 C03B0000   GPR08: C046E5D8 00000000
      >C03B47C8 E6A58360 22042422 1001E4DC 10010000 10000000   GPR16:
      >10000000 10000000 10000000 7FE4EB40 10000000 10000000 10010000
      >C0400000   GPR24: C0380000 00000002 00000002 C046E0C0 00000000
      >00000002 00000000 EFBC5CE8   NIP [c01e1948] as_insert_request+0xa8/0x6b0
      >  LR [c01d6a60] __elv_add_request+0xa0/0x100
      >  Call trace:
      >   [c01d6a60] __elv_add_request+0xa0/0x100
      >   [c01ffb84] ide_do_drive_cmd+0xb4/0x190
      >   [c01fc1c0] generic_ide_suspend+0x80/0xa0
      >   [c01d4574] suspend_device+0x104/0x160
      >   [c01d47c0] device_suspend+0x120/0x330
      >   [c03f3b50] pmac_suspend_devices+0x50/0x1b0
      >   [c03f4294] pmu_ioctl+0x344/0x9b0
      >   [c0082aa4] do_ioctl+0x84/0x90
      >   [c0082b3c] vfs_ioctl+0x8c/0x460
      >   [c0082f50] sys_ioctl+0x40/0x80
      >   [c0004850] ret_from_syscall+0x0/0x4c
      
      Don't clear ->elevator_data on exit, if we are switching queues we are
      overwriting the data of the new io scheduler.
      Signed-off-by: default avatarJens Axboe <axboe@suse.de>
      Signed-off-by: default avatarChris Wright <chrisw@osdl.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      d47698c7
    • Dimitri Puzin's avatar
      [PATCH] fix XFS_QUOTA for modular XFS · ee5b36ff
      Dimitri Puzin authored
      This patch by Dimitri Puzin submitted through kernel Bugzilla #5514
      fixes the following issue:
      
      Cannot build XFS filesystem support as module with quota support. It
      works only when the XFS filesystem support is compiled into the kernel.
      Menuconfig prevents from setting CONFIG_XFS_FS=m and CONFIG_XFS_QUOTA=y.
      
      How to reproduce: configure the XFS filesystem with quota support as
      module. The resulting kernel won't have quota support compiled into
      xfs.ko.
      
      Fix: Changing the fs/xfs/Kconfig file from tristate to bool lets you
      configure the quota support to be compiled into the XFS module. The
      Makefile-linux-2.6 checks only for CONFIG_XFS_QUOTA=y.
      Signed-off-by: default avatarAdrian Bunk <bunk@stusta.de>
      Signed-off-by: default avatarNathan Scott <nathans@sgi.com>
      Signed-off-by: default avatarChris Wright <chrisw@osdl.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      ee5b36ff
    • Roger While's avatar
      [PATCH] prism54 : Fix frame length · e0be26d5
      Roger While authored
      prism54 is leaking information when passing transmits to the firmware.
      There is no requirement to adjust the length to >= ETH_ZLEN.
      Just pass the skb length (after possible adjustment).
      Signed-off-by: default avatarRoger While <simrw@sim-basis.de>
      Acked-by: default avatarJeff Garzik <jgarzik@pobox.com>
      Signed-off-by: default avatarChris Wright <chrisw@osdl.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      e0be26d5
  2. 08 Nov, 2005 2 commits
    • Greg Kroah-Hartman's avatar
      Linux 2.6.14.1 · 93b188a9
      Greg Kroah-Hartman authored
      93b188a9
    • Al Viro's avatar
      [PATCH] CVE-2005-2709 sysctl unregistration oops · e4e04112
      Al Viro authored
      You could open the /proc/sys/net/ipv4/conf/<if>/<whatever> file, then
      wait for interface to go away, try to grab as much memory as possible in
      hope to hit the (kfreed) ctl_table.  Then fill it with pointers to your
      function. Then do read from file you've opened and if you are lucky,
      you'll get it called as ->proc_handler() in kernel mode.
      
      So this is at least an Oops and possibly more.  It does depend on an
      interface going away though, so less of a security risk than it would
      otherwise be.
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      e4e04112
  3. 28 Oct, 2005 1 commit
  4. 27 Oct, 2005 6 commits
  5. 26 Oct, 2005 14 commits
  6. 25 Oct, 2005 5 commits
  7. 24 Oct, 2005 9 commits