<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux, branch v2.6.38.6</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/?h=v2.6.38.6</id>
<link rel='self' href='https://git.amat.us/linux/atom/?h=v2.6.38.6'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-05-09T22:16:23Z</updated>
<entry>
<title>Linux 2.6.38.6</title>
<updated>2011-05-09T22:16:23Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2011-05-09T22:16:23Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=678562e527fd9979f1765ffa1eb34738fc174425'/>
<id>urn:sha1:678562e527fd9979f1765ffa1eb34738fc174425</id>
<content type='text'>
</content>
</entry>
<entry>
<title>VM: skip the stack guard page lookup in get_user_pages only for mlock</title>
<updated>2011-05-09T22:06:51Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2011-05-05T04:30:28Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=1e79fafb77908cd89d3ece2b297ff21ac55e0bef'/>
<id>urn:sha1:1e79fafb77908cd89d3ece2b297ff21ac55e0bef</id>
<content type='text'>
commit a1fde08c74e90accd62d4cfdbf580d2ede938fe7 upstream.

The logic in __get_user_pages() used to skip the stack guard page lookup
whenever the caller wasn't interested in seeing what the actual page
was.  But Michel Lespinasse points out that there are cases where we
don't care about the physical page itself (so 'pages' may be NULL), but
do want to make sure a page is mapped into the virtual address space.

So using the existence of the "pages" array as an indication of whether
to look up the guard page or not isn't actually so great, and we really
should just use the FOLL_MLOCK bit.  But because that bit was only set
for the VM_LOCKED case (and not all vma's necessarily have it, even for
mlock()), we couldn't do that originally.

Fix that by moving the VM_LOCKED check deeper into the call-chain, which
actually simplifies many things.  Now mlock() gets simpler, and we can
also check for FOLL_MLOCK in __get_user_pages() and the code ends up
much more straightforward.

Reported-and-reviewed-by: Michel Lespinasse &lt;walken@google.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>fix oops in scsi_run_queue()</title>
<updated>2011-05-09T22:06:51Z</updated>
<author>
<name>James Bottomley</name>
<email>James.Bottomley@suse.de</email>
</author>
<published>2011-05-01T14:42:07Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a4dbc2902ff426f9ded7542eeb3f347442f7fc1f'/>
<id>urn:sha1:a4dbc2902ff426f9ded7542eeb3f347442f7fc1f</id>
<content type='text'>
commit c055f5b2614b4f758ae6cc86733f31fa4c2c5844 upstream.

The recent commit closing the race window in device teardown:

commit 86cbfb5607d4b81b1a993ff689bbd2addd5d3a9b
Author: James Bottomley &lt;James.Bottomley@suse.de&gt;
Date:   Fri Apr 22 10:39:59 2011 -0500

    [SCSI] put stricter guards on queue dead checks

is causing a potential NULL deref in scsi_run_queue() because the
q-&gt;queuedata may already be NULL by the time this function is called.
Since we shouldn't be running a queue that is being torn down, simply
add a NULL check in scsi_run_queue() to forestall this.

Tested-by: Jim Schutt &lt;jaschut@sandia.gov&gt;
Signed-off-by: James Bottomley &lt;James.Bottomley@suse.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>can: add missing socket check in can/raw release</title>
<updated>2011-05-09T22:06:50Z</updated>
<author>
<name>Oliver Hartkopp</name>
<email>socketcan@hartkopp.net</email>
</author>
<published>2011-04-20T01:57:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8bd26179f756612921ff54dbf4f9d2bd0afa01cd'/>
<id>urn:sha1:8bd26179f756612921ff54dbf4f9d2bd0afa01cd</id>
<content type='text'>
commit 10022a6c66e199d8f61d9044543f38785713cbbd upstream.

v2: added space after 'if' according code style.

We can get here with a NULL socket argument passed from userspace,
so we need to handle it accordingly.

Thanks to Dave Jones pointing at this issue in net/can/bcm.c

Signed-off-by: Oliver Hartkopp &lt;socketcan@hartkopp.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Cc: Chuck Ebbert &lt;cebbert@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>drm/radeon/kms: add some new pci ids</title>
<updated>2011-05-09T22:06:50Z</updated>
<author>
<name>Alex Deucher</name>
<email>alexdeucher@gmail.com</email>
</author>
<published>2011-05-03T19:15:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8fac1f02574d9b19a805d19cea24bc74d19cd3e4'/>
<id>urn:sha1:8fac1f02574d9b19a805d19cea24bc74d19cd3e4</id>
<content type='text'>
commit e2c85d8e3974c9041ad7b080846b28d2243e771b upstream.

Signed-off-by: Alex Deucher &lt;alexdeucher@gmail.com&gt;
Signed-off-by: Dave Airlie &lt;airlied@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>KVM: SVM: check for progress after IRET interception</title>
<updated>2011-05-09T22:06:50Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2011-02-03T13:29:52Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5ea2c1536c7e93485849c3eb05a022ea26144c6a'/>
<id>urn:sha1:5ea2c1536c7e93485849c3eb05a022ea26144c6a</id>
<content type='text'>
commit bd3d1ec3d26b61120bb4f60b18ee99aa81839e6b upstream.

When we enable an NMI window, we ask for an IRET intercept, since
the IRET re-enables NMIs.  However, the IRET intercept happens before
the instruction executes, while the NMI window architecturally opens
afterwards.

To compensate for this mismatch, we only open the NMI window in the
following exit, assuming that the IRET has by then executed; however,
this assumption is not always correct; we may exit due to a host interrupt
or page fault, without having executed the instruction.

Fix by checking for forward progress by recording and comparing the IRET's
rip.  This is somewhat of a hack, since an unchaging rip does not mean that
no forward progress has been made, but is the simplest fix for now.

Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>cx88: Fix HVR4000 IR keymap</title>
<updated>2011-05-09T22:06:49Z</updated>
<author>
<name>Lawrence Rust</name>
<email>lvr@softsystem.dot.uk</email>
</author>
<published>2011-05-05T02:25:10Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fcd9079e754fa9050ed50ef2ba294ccf5825b837'/>
<id>urn:sha1:fcd9079e754fa9050ed50ef2ba294ccf5825b837</id>
<content type='text'>
[fixed in .39 in a much different way that is too big to backport to
.38 - gregkh]

Fixes the RC key input for Nova-S plus, HVR1100, HVR3000 and HVR4000 in
the 2.6.38 kernel.

Signed-off-by: Lawrence Rust &lt;lvr@softsystem.dot.uk&gt;
Acked-by: Jarod Wilson &lt;jarod@wilsonet.com&gt;
Signed-off-by: Mauro Carvalho Chehab &lt;mchehab@redhat.com&gt;

</content>
</entry>
<entry>
<title>fs/partitions/ldm.c: fix oops caused by corrupted partition table</title>
<updated>2011-05-09T22:06:49Z</updated>
<author>
<name>Timo Warns</name>
<email>Warns@pre-sense.de</email>
</author>
<published>2011-04-14T22:21:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c99afaf0385d61a8e1747511904c66838270b02b'/>
<id>urn:sha1:c99afaf0385d61a8e1747511904c66838270b02b</id>
<content type='text'>
commit c340b1d640001c8c9ecff74f68fd90422ae2448a upstream.

The kernel automatically evaluates partition tables of storage devices.
The code for evaluating LDM partitions (in fs/partitions/ldm.c) contains
a bug that causes a kernel oops on certain corrupted LDM partitions.
A kernel subsystem seems to crash, because, after the oops, the kernel no
longer recognizes newly connected storage devices.

The patch validates the value of vblk_size.

[akpm@linux-foundation.org: coding-style fixes]
Signed-off-by: Timo Warns &lt;warns@pre-sense.de&gt;
Cc: Eugene Teo &lt;eugeneteo@kernel.sg&gt;
Cc: Harvey Harrison &lt;harvey.harrison@gmail.com&gt;
Cc: Richard Russon &lt;rich@flatcap.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>can: Add missing socket check in can/bcm release.</title>
<updated>2011-05-09T22:06:48Z</updated>
<author>
<name>Dave Jones</name>
<email>davej@redhat.com</email>
</author>
<published>2011-04-20T03:36:59Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ba1ba1c0aaa659914bf9d47616453f6378add40f'/>
<id>urn:sha1:ba1ba1c0aaa659914bf9d47616453f6378add40f</id>
<content type='text'>
commit c6914a6f261aca0c9f715f883a353ae7ff51fe83 upstream.

We can get here with a NULL socket argument passed from userspace,
so we need to handle it accordingly.

Signed-off-by: Dave Jones &lt;davej@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>Open with O_CREAT flag set fails to open existing files on non writable directories</title>
<updated>2011-05-09T22:06:48Z</updated>
<author>
<name>Sachin Prabhu</name>
<email>sprabhu@redhat.com</email>
</author>
<published>2011-04-20T12:09:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6f0a6240e8ce1659574e944eac04e871a9dc1fe7'/>
<id>urn:sha1:6f0a6240e8ce1659574e944eac04e871a9dc1fe7</id>
<content type='text'>
commit 1574dff8996ab1ed92c09012f8038b5566fce313 upstream.

An open on a NFS4 share using the O_CREAT flag on an existing file for
which we have permissions to open but contained in a directory with no
write permissions will fail with EACCES.

A tcpdump shows that the client had set the open mode to UNCHECKED which
indicates that the file should be created if it doesn't exist and
encountering an existing flag is not an error. Since in this case the
file exists and can be opened by the user, the NFS server is wrong in
attempting to check create permissions on the parent directory.

The patch adds a conditional statement to check for create permissions
only if the file doesn't exist.

Signed-off-by: Sachin S. Prabhu &lt;sprabhu@redhat.com&gt;
Signed-off-by: J. Bruce Fields &lt;bfields@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
</feed>
