]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
2.6.17.8 release v2.6.17.8
authorGreg Kroah-Hartman <gregkh@suse.de>
Mon, 7 Aug 2006 05:14:06 +0000 (22:14 -0700)
committerGreg Kroah-Hartman <gregkh@suse.de>
Mon, 7 Aug 2006 05:14:06 +0000 (22:14 -0700)
25 files changed:
review-2.6.17/add-stable-branch-to-maintainers-file.patch [deleted file]
review-2.6.17/alsa-don-t-reject-o_rdwr-at-opening-pcm-oss.patch [deleted file]
review-2.6.17/cond_resched-fix.patch [deleted file]
review-2.6.17/don-t-allow-chmod-on-the-proc-pid-files.patch [deleted file]
review-2.6.17/e1000-add-forgotten-pci-id-for-supported-device.patch [deleted file]
review-2.6.17/ext3-avoid-triggering-ext3_error-on-bad-nfs-file-handle.patch [deleted file]
review-2.6.17/ext3-nobh-option-causes-oops.patch [deleted file]
review-2.6.17/fix-budget-av-compile-failure.patch [deleted file]
review-2.6.17/fix-race-related-problem-when-adding-items-to-and-svcrpc-auth-cache.patch [deleted file]
review-2.6.17/h.323-helper-fix-possible-null-ptr-dereference.patch [deleted file]
review-2.6.17/i2c-01-scx200_acb-fix-state-machine.patch [deleted file]
review-2.6.17/i2c-02-scx200_acb-fix-block-transactions.patch [deleted file]
review-2.6.17/i2c-03-fix-ignore-module-parameter-handling.patch [deleted file]
review-2.6.17/ieee1394-sbp2-enable-auto-spin-up-for-maxtor-disks.patch [deleted file]
review-2.6.17/invalidate_bdev-speedup.patch [deleted file]
review-2.6.17/mbox [deleted file]
review-2.6.17/pci-fix-issues-with-extended-conf-space-when-mmconfig-disabled-because-of-e820.patch [deleted file]
review-2.6.17/s390-fix-futex_atomic_cmpxchg_inatomic.patch [deleted file]
review-2.6.17/series [deleted file]
review-2.6.17/sky2-napi-bug.patch [deleted file]
review-2.6.17/sparc64-quad-float-emulation-fix.patch [deleted file]
review-2.6.17/tty-serialize-flush_to_ldisc.patch [deleted file]
review-2.6.17/uhci-fix-handling-of-short-last-packet.patch [deleted file]
review-2.6.17/update-frag_list-in-pskb_trim.patch [deleted file]
review-2.6.17/vlan-state-handling-fix.patch [deleted file]

diff --git a/review-2.6.17/add-stable-branch-to-maintainers-file.patch b/review-2.6.17/add-stable-branch-to-maintainers-file.patch
deleted file mode 100644 (file)
index 241e08a..0000000
+++ /dev/null
@@ -1,43 +0,0 @@
-From stable-bounces@linux.kernel.org Thu Aug  3 09:28:46 2006
-From: Steven Rostedt <rostedt@goodmis.org>
-To: Andrew Morton <akpm@osdl.org>
-Date: Thu, 03 Aug 2006 12:28:11 -0400
-Message-Id: <1154622491.32264.37.camel@localhost.localdomain>
-Cc: Chris Wright <chrisw@sous-sol.org>, Greg KH <greg@kroah.com>, LKML <linux-kernel@vger.kernel.org>, stable@kernel.org
-Subject: Add stable branch to maintainers file
-
-From: Steven Rostedt <rostedt@goodmis.org>
-
-While helping someone to submit a patch to the stable branch, I noticed
-that the stable branch is not listed in the MAINTAINERS file.  This was
-after I went there to look for the email addresses for the stable branch
-list (stable@kernel.org).
-
-This patch adds the stable branch to the maintainers file so that people
-can find where to send patches when they have a fix for the stable team.
-
-Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
-Signed-off-by: Chris Wright <chrisw@sous-sol.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- MAINTAINERS |    8 ++++++++
- 1 file changed, 8 insertions(+)
-
---- linux-2.6.17.7.orig/MAINTAINERS
-+++ linux-2.6.17.7/MAINTAINERS
-@@ -2572,6 +2572,14 @@ M:      dbrownell@users.sourceforge.net
- L:    spi-devel-general@lists.sourceforge.net
- S:    Maintained
-+STABLE BRANCH:
-+P:    Greg Kroah-Hartman
-+M:    greg@kroah.com
-+P:    Chris Wright
-+M:    chrisw@sous-sol.org
-+L:    stable@kernel.org
-+S:    Maintained
-+
- TPM DEVICE DRIVER
- P:    Kylene Hall
- M:    kjhall@us.ibm.com
diff --git a/review-2.6.17/alsa-don-t-reject-o_rdwr-at-opening-pcm-oss.patch b/review-2.6.17/alsa-don-t-reject-o_rdwr-at-opening-pcm-oss.patch
deleted file mode 100644 (file)
index 4a0b64d..0000000
+++ /dev/null
@@ -1,32 +0,0 @@
-From stable-bounces@linux.kernel.org Fri Aug  4 11:38:11 2006
-Date: Fri, 04 Aug 2006 20:37:33 +0200
-Message-ID: <s5hk65os5xu.wl%tiwai@suse.de>
-From: Takashi Iwai <tiwai@suse.de>
-To: stable@kernel.org
-Subject: ALSA: Don't reject O_RDWR at opening PCM OSS
-
-From: Takashi Iwai <tiwai@suse.de>
-
-[PATCH] ALSA: Don't reject O_RDWR at opening PCM OSS
-
-Accept O_RDWR at opening a PCM OSS device that is read- or write-only,
-just for the compatibility with the behavior of older versions.
-
-Signed-off-by: Takashi Iwai <tiwai@suse.de>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- sound/core/oss/pcm_oss.c |    2 ++
- 1 file changed, 2 insertions(+)
-
---- linux-2.6.17.7.orig/sound/core/oss/pcm_oss.c
-+++ linux-2.6.17.7/sound/core/oss/pcm_oss.c
-@@ -1745,6 +1745,8 @@ static int snd_pcm_oss_open_file(struct 
-       for (idx = 0; idx < 2; idx++) {
-               if (setup[idx].disable)
-                       continue;
-+              if (! pcm->streams[idx].substream_count)
-+                      continue; /* no matching substream */
-               if (idx == SNDRV_PCM_STREAM_PLAYBACK) {
-                       if (! (f_mode & FMODE_WRITE))
-                               continue;
diff --git a/review-2.6.17/cond_resched-fix.patch b/review-2.6.17/cond_resched-fix.patch
deleted file mode 100644 (file)
index 754470c..0000000
+++ /dev/null
@@ -1,125 +0,0 @@
-From stable-bounces@linux.kernel.org Fri Jul 28 19:53:01 2006
-Date: Fri, 28 Jul 2006 22:52:09 -0400
-From: Dave Jones <davej@redhat.com>
-To: stable@kernel.org
-Message-ID: <20060729025209.GA19848@redhat.com>
-Content-Disposition: inline
-Cc: akpm@osdl.org
-Subject: cond_resched() fix
-
-
-From: Andrew Morton <akpm@osdl.org>
-
-[PATCH] cond_resched() fix
-
-Fix a bug identified by Zou Nan hai <nanhai.zou@intel.com>:
-
-If the system is in state SYSTEM_BOOTING, and need_resched() is true,
-cond_resched() returns true even though it didn't reschedule.  Consequently
-need_resched() remains true and JBD locks up.
-
-Fix that by teaching cond_resched() to only return true if it really did call
-schedule().
-
-cond_resched_lock() and cond_resched_softirq() have a problem too.  If we're
-in SYSTEM_BOOTING state and need_resched() is true, these functions will drop
-the lock and will then try to call schedule(), but the SYSTEM_BOOTING state
-will prevent schedule() from being called.  So on return, need_resched() will
-still be true, but cond_resched_lock() has to return 1 to tell the caller that
-the lock was dropped.  The caller will probably lock up.
-
-Bottom line: if these functions dropped the lock, they _must_ call schedule()
-to clear need_resched().   Make it so.
-
-Also, uninline __cond_resched().  It's largeish, and slowpath.
-
-Acked-by: Ingo Molnar <mingo@elte.hu>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Linus Torvalds <torvalds@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- kernel/sched.c |   25 +++++++++++++------------
- 1 file changed, 13 insertions(+), 12 deletions(-)
-
---- linux-2.6.17.7.orig/kernel/sched.c
-+++ linux-2.6.17.7/kernel/sched.c
-@@ -4044,17 +4044,22 @@ asmlinkage long sys_sched_yield(void)
-       return 0;
- }
--static inline void __cond_resched(void)
-+static inline int __resched_legal(int expected_preempt_count)
-+{
-+      if (unlikely(preempt_count() != expected_preempt_count))
-+              return 0;
-+      if (unlikely(system_state != SYSTEM_RUNNING))
-+              return 0;
-+      return 1;
-+}
-+
-+static void __cond_resched(void)
- {
-       /*
-        * The BKS might be reacquired before we have dropped
-        * PREEMPT_ACTIVE, which could trigger a second
-        * cond_resched() call.
-        */
--      if (unlikely(preempt_count()))
--              return;
--      if (unlikely(system_state != SYSTEM_RUNNING))
--              return;
-       do {
-               add_preempt_count(PREEMPT_ACTIVE);
-               schedule();
-@@ -4064,13 +4069,12 @@ static inline void __cond_resched(void)
- int __sched cond_resched(void)
- {
--      if (need_resched()) {
-+      if (need_resched() && __resched_legal(0)) {
-               __cond_resched();
-               return 1;
-       }
-       return 0;
- }
--
- EXPORT_SYMBOL(cond_resched);
- /*
-@@ -4091,7 +4095,7 @@ int cond_resched_lock(spinlock_t *lock)
-               ret = 1;
-               spin_lock(lock);
-       }
--      if (need_resched()) {
-+      if (need_resched() && __resched_legal(1)) {
-               _raw_spin_unlock(lock);
-               preempt_enable_no_resched();
-               __cond_resched();
-@@ -4100,14 +4104,13 @@ int cond_resched_lock(spinlock_t *lock)
-       }
-       return ret;
- }
--
- EXPORT_SYMBOL(cond_resched_lock);
- int __sched cond_resched_softirq(void)
- {
-       BUG_ON(!in_softirq());
--      if (need_resched()) {
-+      if (need_resched() && __resched_legal(0)) {
-               __local_bh_enable();
-               __cond_resched();
-               local_bh_disable();
-@@ -4115,10 +4118,8 @@ int __sched cond_resched_softirq(void)
-       }
-       return 0;
- }
--
- EXPORT_SYMBOL(cond_resched_softirq);
--
- /**
-  * yield - yield the current processor to other threads.
-  *
diff --git a/review-2.6.17/don-t-allow-chmod-on-the-proc-pid-files.patch b/review-2.6.17/don-t-allow-chmod-on-the-proc-pid-files.patch
deleted file mode 100644 (file)
index e55862f..0000000
+++ /dev/null
@@ -1,136 +0,0 @@
-From stable-bounces@linux.kernel.org Sat Jul 15 17:21:18 2006
-From: Marcel Holtmann <marcel@holtmann.org>
-To: Greg KH <gregkh@suse.de>
-Date: Sun, 16 Jul 2006 02:20:53 +0200
-Message-Id: <1153009253.12764.20.camel@localhost>
-Cc: Andrew Morton <akpm@osdl.org>, torvalds@osdl.org,
-        linux-kernel@vger.kernel.org, stable@kernel.org
-Subject: Don't allow chmod() on the /proc/<pid>/ files
-
-From: Marcel Holtmann <marcel@holtmann.org>
-
-Don't allow chmod() on the /proc/<pid>/ files
-
-This just turns off chmod() on the /proc/<pid>/ files, since there is no
-good reason to allow it, and had we disallowed it originally, the nasty
-/proc race exploit wouldn't have been possible.
-
-The other patches already fixed the problem chmod() could cause, so this
-is really just some final mop-up..
-
-This particular version is based off a patch by Eugene and Marcel which
-had much better naming than my original equivalent one.
-
-Signed-off-by: Eugene Teo <eteo@redhat.com>
-Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
-Signed-off-by: Linus Torvalds <torvalds@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/proc/base.c |   33 ++++++++++++++++++++++++++++++++-
- 1 file changed, 32 insertions(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/fs/proc/base.c
-+++ linux-2.6.17.7/fs/proc/base.c
-@@ -596,6 +596,27 @@ static int proc_permission(struct inode 
-       return proc_check_root(inode);
- }
-+static int proc_setattr(struct dentry *dentry, struct iattr *attr)
-+{
-+      int error;
-+      struct inode *inode = dentry->d_inode;
-+
-+      if (attr->ia_valid & ATTR_MODE)
-+              return -EPERM;
-+
-+      error = inode_change_ok(inode, attr);
-+      if (!error) {
-+              error = security_inode_setattr(dentry, attr);
-+              if (!error)
-+                      error = inode_setattr(inode, attr);
-+      }
-+      return error;
-+}
-+
-+static struct inode_operations proc_def_inode_operations = {
-+      .setattr        = proc_setattr,
-+};
-+
- static int proc_task_permission(struct inode *inode, int mask, struct nameidata *nd)
- {
-       struct dentry *root;
-@@ -987,6 +1008,7 @@ static struct file_operations proc_oom_a
- static struct inode_operations proc_mem_inode_operations = {
-       .permission     = proc_permission,
-+      .setattr        = proc_setattr,
- };
- #ifdef CONFIG_AUDITSYSCALL
-@@ -1184,7 +1206,8 @@ out:
- static struct inode_operations proc_pid_link_inode_operations = {
-       .readlink       = proc_pid_readlink,
--      .follow_link    = proc_pid_follow_link
-+      .follow_link    = proc_pid_follow_link,
-+      .setattr        = proc_setattr,
- };
- #define NUMBUF 10
-@@ -1356,6 +1379,7 @@ static struct inode *proc_pid_make_inode
-       ei->task = NULL;
-       inode->i_mtime = inode->i_atime = inode->i_ctime = CURRENT_TIME;
-       inode->i_ino = fake_ino(task->pid, ino);
-+      inode->i_op = &proc_def_inode_operations;
-       if (!pid_alive(task))
-               goto out_unlock;
-@@ -1579,11 +1603,13 @@ static struct file_operations proc_task_
- static struct inode_operations proc_fd_inode_operations = {
-       .lookup         = proc_lookupfd,
-       .permission     = proc_permission,
-+      .setattr        = proc_setattr,
- };
- static struct inode_operations proc_task_inode_operations = {
-       .lookup         = proc_task_lookup,
-       .permission     = proc_task_permission,
-+      .setattr        = proc_setattr,
- };
- #ifdef CONFIG_SECURITY
-@@ -1873,10 +1899,12 @@ static struct file_operations proc_tid_b
- static struct inode_operations proc_tgid_base_inode_operations = {
-       .lookup         = proc_tgid_base_lookup,
-+      .setattr        = proc_setattr,
- };
- static struct inode_operations proc_tid_base_inode_operations = {
-       .lookup         = proc_tid_base_lookup,
-+      .setattr        = proc_setattr,
- };
- #ifdef CONFIG_SECURITY
-@@ -1918,10 +1946,12 @@ static struct dentry *proc_tid_attr_look
- static struct inode_operations proc_tgid_attr_inode_operations = {
-       .lookup         = proc_tgid_attr_lookup,
-+      .setattr        = proc_setattr,
- };
- static struct inode_operations proc_tid_attr_inode_operations = {
-       .lookup         = proc_tid_attr_lookup,
-+      .setattr        = proc_setattr,
- };
- #endif
-@@ -1946,6 +1976,7 @@ static void *proc_self_follow_link(struc
- static struct inode_operations proc_self_inode_operations = {
-       .readlink       = proc_self_readlink,
-       .follow_link    = proc_self_follow_link,
-+      .setattr        = proc_setattr,
- };
- /**
diff --git a/review-2.6.17/e1000-add-forgotten-pci-id-for-supported-device.patch b/review-2.6.17/e1000-add-forgotten-pci-id-for-supported-device.patch
deleted file mode 100644 (file)
index ae4baf3..0000000
+++ /dev/null
@@ -1,47 +0,0 @@
-From stable-bounces@linux.kernel.org Fri Jul 28 15:08:08 2006
-Message-ID: <44CA8A59.40002@intel.com>
-Date: Fri, 28 Jul 2006 15:06:17 -0700
-From: Auke Kok <auke-jan.h.kok@intel.com>
-To: Greg KH <greg@kroah.com>, stable@kernel.org
-Cc: Auke Kok <auke-jan.h.kok@intel.com>, NetDev <netdev@vger.kernel.org>,
-        "John W. Linville" <linville@tuxdriver.com>,
-        Jesse Brandeburg <jesse.brandeburg@intel.com>,
-        "Ronciak,
-       John" <john.ronciak@intel.com>,
-        "Kok, Auke" <auke@foo-projects.org>
-Subject: e1000: add forgotten PCI ID for supported device
-
-From: Auke Kok <auke-jan.h.kok@intel.com>
-
-The Intel(R) PRO/1000 82572EI card is fully supported by 7.0.33-k2 and
-onward.  Add the device ID so this card works with 2.6.17.y onward. This
-device ID was accidentally omitted.
-
-Signed-off-by: Auke Kok <auke-jan.h.kok@intel.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/net/e1000/e1000_hw.c |    1 +
- drivers/net/e1000/e1000_hw.h |    1 +
- 2 files changed, 2 insertions(+)
-
---- linux-2.6.17.7.orig/drivers/net/e1000/e1000_hw.c
-+++ linux-2.6.17.7/drivers/net/e1000/e1000_hw.c
-@@ -353,6 +353,7 @@ e1000_set_mac_type(struct e1000_hw *hw)
-     case E1000_DEV_ID_82572EI_COPPER:
-     case E1000_DEV_ID_82572EI_FIBER:
-     case E1000_DEV_ID_82572EI_SERDES:
-+    case E1000_DEV_ID_82572EI:
-         hw->mac_type = e1000_82572;
-         break;
-     case E1000_DEV_ID_82573E:
---- linux-2.6.17.7.orig/drivers/net/e1000/e1000_hw.h
-+++ linux-2.6.17.7/drivers/net/e1000/e1000_hw.h
-@@ -462,6 +462,7 @@ int32_t e1000_check_phy_reset_block(stru
- #define E1000_DEV_ID_82572EI_COPPER      0x107D
- #define E1000_DEV_ID_82572EI_FIBER       0x107E
- #define E1000_DEV_ID_82572EI_SERDES      0x107F
-+#define E1000_DEV_ID_82572EI             0x10B9
- #define E1000_DEV_ID_82573E              0x108B
- #define E1000_DEV_ID_82573E_IAMT         0x108C
- #define E1000_DEV_ID_82573L              0x109A
diff --git a/review-2.6.17/ext3-avoid-triggering-ext3_error-on-bad-nfs-file-handle.patch b/review-2.6.17/ext3-avoid-triggering-ext3_error-on-bad-nfs-file-handle.patch
deleted file mode 100644 (file)
index 7dd5ed9..0000000
+++ /dev/null
@@ -1,108 +0,0 @@
-From stable-bounces@linux.kernel.org Sun Jul 30 03:04:26 2006
-Message-Id: <200607301003.k6UA31hC002485@shell0.pdx.osdl.net>
-To: torvalds@osdl.org
-From: akpm@osdl.org
-Date: Sun, 30 Jul 2006 03:03:01 -0700
-Cc: akpm@osdl.org, jack@suse.cz, esandeen@redhat.com, neilb@suse.de,
-        sct@redhat.com, marcel@holtmann.org, stable@kernel.org
-Subject: ext3: avoid triggering ext3_error on bad NFS file handle
-
-From: Neil Brown <neilb@suse.de>
-
-The inode number out of an NFS file handle gets passed eventually to
-ext3_get_inode_block() without any checking.  If ext3_get_inode_block()
-allows it to trigger an error, then bad filehandles can have unpleasant
-effect - ext3_error() will usually cause a forced read-only remount, or a
-panic if `errors=panic' was used.
-
-So remove the call to ext3_error there and put a matching check in
-ext3/namei.c where inode numbers are read off storage.
-
-[akpm@osdl.org: fix off-by-one error]
-Signed-off-by: Neil Brown <neilb@suse.de>
-Signed-off-by: Jan Kara <jack@suse.cz>
-Cc: Marcel Holtmann <marcel@holtmann.org>
-Cc: "Stephen C. Tweedie" <sct@redhat.com>
-Cc: Eric Sandeen <esandeen@redhat.com>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/ext3/inode.c         |   13 +++++++------
- fs/ext3/namei.c         |   15 +++++++++++++--
- include/linux/ext3_fs.h |    9 +++++++++
- 3 files changed, 29 insertions(+), 8 deletions(-)
-
---- linux-2.6.17.7.orig/fs/ext3/inode.c
-+++ linux-2.6.17.7/fs/ext3/inode.c
-@@ -2402,14 +2402,15 @@ static unsigned long ext3_get_inode_bloc
-       struct buffer_head *bh;
-       struct ext3_group_desc * gdp;
--
--      if ((ino != EXT3_ROOT_INO && ino != EXT3_JOURNAL_INO &&
--              ino != EXT3_RESIZE_INO && ino < EXT3_FIRST_INO(sb)) ||
--              ino > le32_to_cpu(EXT3_SB(sb)->s_es->s_inodes_count)) {
--              ext3_error(sb, "ext3_get_inode_block",
--                          "bad inode number: %lu", ino);
-+      if (!ext3_valid_inum(sb, ino)) {
-+              /*
-+               * This error is already checked for in namei.c unless we are
-+               * looking at an NFS filehandle, in which case no error
-+               * report is needed
-+               */
-               return 0;
-       }
-+
-       block_group = (ino - 1) / EXT3_INODES_PER_GROUP(sb);
-       if (block_group >= EXT3_SB(sb)->s_groups_count) {
-               ext3_error(sb,"ext3_get_inode_block","group >= groups count");
---- linux-2.6.17.7.orig/fs/ext3/namei.c
-+++ linux-2.6.17.7/fs/ext3/namei.c
-@@ -1000,7 +1000,12 @@ static struct dentry *ext3_lookup(struct
-       if (bh) {
-               unsigned long ino = le32_to_cpu(de->inode);
-               brelse (bh);
--              inode = iget(dir->i_sb, ino);
-+              if (!ext3_valid_inum(dir->i_sb, ino)) {
-+                      ext3_error(dir->i_sb, "ext3_lookup",
-+                                 "bad inode number: %lu", ino);
-+                      inode = NULL;
-+              } else
-+                      inode = iget(dir->i_sb, ino);
-               if (!inode)
-                       return ERR_PTR(-EACCES);
-@@ -1028,7 +1033,13 @@ struct dentry *ext3_get_parent(struct de
-               return ERR_PTR(-ENOENT);
-       ino = le32_to_cpu(de->inode);
-       brelse(bh);
--      inode = iget(child->d_inode->i_sb, ino);
-+
-+      if (!ext3_valid_inum(child->d_inode->i_sb, ino)) {
-+              ext3_error(child->d_inode->i_sb, "ext3_get_parent",
-+                         "bad inode number: %lu", ino);
-+              inode = NULL;
-+      } else
-+              inode = iget(child->d_inode->i_sb, ino);
-       if (!inode)
-               return ERR_PTR(-EACCES);
---- linux-2.6.17.7.orig/include/linux/ext3_fs.h
-+++ linux-2.6.17.7/include/linux/ext3_fs.h
-@@ -495,6 +495,15 @@ static inline struct ext3_inode_info *EX
- {
-       return container_of(inode, struct ext3_inode_info, vfs_inode);
- }
-+
-+static inline int ext3_valid_inum(struct super_block *sb, unsigned long ino)
-+{
-+      return ino == EXT3_ROOT_INO ||
-+              ino == EXT3_JOURNAL_INO ||
-+              ino == EXT3_RESIZE_INO ||
-+              (ino >= EXT3_FIRST_INO(sb) &&
-+               ino <= le32_to_cpu(EXT3_SB(sb)->s_es->s_inodes_count));
-+}
- #else
- /* Assume that user mode programs are passing in an ext3fs superblock, not
-  * a kernel struct super_block.  This will allow us to call the feature-test
diff --git a/review-2.6.17/ext3-nobh-option-causes-oops.patch b/review-2.6.17/ext3-nobh-option-causes-oops.patch
deleted file mode 100644 (file)
index d2ffabc..0000000
+++ /dev/null
@@ -1,51 +0,0 @@
-From stable-bounces@linux.kernel.org Sun Jul 30 03:05:05 2006
-Message-Id: <200607301004.k6UA4E5T002773@shell0.pdx.osdl.net>
-To: torvalds@osdl.org
-From: akpm@osdl.org
-Date: Sun, 30 Jul 2006 03:04:14 -0700
-Cc: akpm@osdl.org, pbadari@us.ibm.com, stable@kernel.org
-Subject: ext3 -nobh option causes oops
-
-From: Badari Pulavarty <pbadari@us.ibm.com>
-
-For files other than IFREG, nobh option doesn't make sense.  Modifications
-to them are journalled and needs buffer heads to do that.  Without this
-patch, we get kernel oops in page_buffers().
-
-Signed-off-by: Badari Pulavarty <pbadari@us.ibm.com>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/ext3/inode.c |    6 +++---
- 1 file changed, 3 insertions(+), 3 deletions(-)
-
---- linux-2.6.17.7.orig/fs/ext3/inode.c
-+++ linux-2.6.17.7/fs/ext3/inode.c
-@@ -1159,7 +1159,7 @@ retry:
-               ret = PTR_ERR(handle);
-               goto out;
-       }
--      if (test_opt(inode->i_sb, NOBH))
-+      if (test_opt(inode->i_sb, NOBH) && ext3_should_writeback_data(inode))
-               ret = nobh_prepare_write(page, from, to, ext3_get_block);
-       else
-               ret = block_prepare_write(page, from, to, ext3_get_block);
-@@ -1245,7 +1245,7 @@ static int ext3_writeback_commit_write(s
-       if (new_i_size > EXT3_I(inode)->i_disksize)
-               EXT3_I(inode)->i_disksize = new_i_size;
--      if (test_opt(inode->i_sb, NOBH))
-+      if (test_opt(inode->i_sb, NOBH) && ext3_should_writeback_data(inode))
-               ret = nobh_commit_write(file, page, from, to);
-       else
-               ret = generic_commit_write(file, page, from, to);
-@@ -1495,7 +1495,7 @@ static int ext3_writeback_writepage(stru
-               goto out_fail;
-       }
--      if (test_opt(inode->i_sb, NOBH))
-+      if (test_opt(inode->i_sb, NOBH) && ext3_should_writeback_data(inode))
-               ret = nobh_writepage(page, ext3_get_block, wbc);
-       else
-               ret = block_write_full_page(page, ext3_get_block, wbc);
diff --git a/review-2.6.17/fix-budget-av-compile-failure.patch b/review-2.6.17/fix-budget-av-compile-failure.patch
deleted file mode 100644 (file)
index f18dbda..0000000
+++ /dev/null
@@ -1,67 +0,0 @@
-From mkrufky@linuxtv.org Tue Jul 25 10:09:09 2006
-Message-ID: <44C64FC1.4060501@linuxtv.org>
-Date: Tue, 25 Jul 2006 13:07:13 -0400
-From: Michael Krufky <mkrufky@linuxtv.org>
-To: Arjan van de Ven <arjan@infradead.org>
-Cc: David Lang <dlang@digitalinsight.com>,
-       Andrew de Quincey <adq_dvb@lidskialf.net>,
-       Arnaud Patard <apatard@mandriva.com>, Greg KH <gregkh@suse.de>,
-       linux-kernel@vger.kernel.org, stable@kernel.org
-Subject: Fix budget-av compile failure
-
-From: Andrew de Quincey <adq_dvb@lidskialf.net>
-
-Currently I am doing lots of refactoring work in the dvb tree. This
-bugfix became necessary to fix 2.6.17 whilst I was in the middle of this
-work. Unfortunately after I tested the original code for the patch, I
-generated the diff against the wrong tree (I accidentally used a tree
-with part of the refactoring code in it). This resulted in the reported
-compile errors because that tree (a) was incomplete, and (b) used
-features which are simply not in the mainline kernel yet.
-
-Many apologies for the error and problems this has caused. :(
-
-Signed-off-by: Andrew de Quincey <adq_dvb@lidskialf.net>
-Signed-off-by: Michael Krufky <mkrufky@linuxtv.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/media/dvb/ttpci/budget-av.c |   10 +++++-----
- 1 file changed, 5 insertions(+), 5 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/media/dvb/ttpci/budget-av.c
-+++ linux-2.6.17.7/drivers/media/dvb/ttpci/budget-av.c
-@@ -58,6 +58,7 @@ struct budget_av {
-       struct tasklet_struct ciintf_irq_tasklet;
-       int slot_status;
-       struct dvb_ca_en50221 ca;
-+      u8 reinitialise_demod:1;
- };
- /* GPIO Connections:
-@@ -214,8 +215,9 @@ static int ciintf_slot_reset(struct dvb_
-       while (--timeout > 0 && ciintf_read_attribute_mem(ca, slot, 0) != 0x1d)
-               msleep(100);
--      /* reinitialise the frontend */
--      dvb_frontend_reinitialise(budget_av->budget.dvb_frontend);
-+      /* reinitialise the frontend if necessary */
-+      if (budget_av->reinitialise_demod)
-+              dvb_frontend_reinitialise(budget_av->budget.dvb_frontend);
-       if (timeout <= 0)
-       {
-@@ -1064,12 +1066,10 @@ static void frontend_init(struct budget_
-               fe = tda10021_attach(&philips_cu1216_config,
-                                    &budget_av->budget.i2c_adap,
-                                    read_pwm(budget_av));
--              if (fe) {
--                      fe->ops.tuner_ops.set_params = philips_cu1216_tuner_set_params;
--              }
-               break;
-       case SUBID_DVBC_KNC1_PLUS:
-+              budget_av->reinitialise_demod = 1;
-               fe = tda10021_attach(&philips_cu1216_config,
-                                    &budget_av->budget.i2c_adap,
-                                    read_pwm(budget_av));
diff --git a/review-2.6.17/fix-race-related-problem-when-adding-items-to-and-svcrpc-auth-cache.patch b/review-2.6.17/fix-race-related-problem-when-adding-items-to-and-svcrpc-auth-cache.patch
deleted file mode 100644 (file)
index 4d2a36b..0000000
+++ /dev/null
@@ -1,57 +0,0 @@
-From stable-bounces@linux.kernel.org Wed Aug  2 17:21:12 2006
-From: Neil Brown <neilb@suse.de>
-To: Philipp Matthias Hahn <pmhahn@svs.Informatik.Uni-Oldenburg.de>
-Date: Thu, 3 Aug 2006 10:20:12 +1000
-Message-ID: <17617.16700.274788.869486@cse.unsw.edu.au>
-Cc: akpm@osdl.org, nfs@lists.sourceforge.net, stable@kernel.org,
-        linux-kernel@vger.kernel.org
-Subject: Fix race related problem when adding items to and svcrpc auth cache.
-
-From: Neil Brown <neilb@suse.de>
-
-Fix race related problem when adding items to and svcrpc auth cache.
-
-If we don't find the item we are lookng for, we allocate a new one,
-and then grab the lock again and search to see if it has been added
-while we did the alloc.
-If it had been added we need to 'cache_put' the newly created item
-that we are never going to use.  But as it hasn't been initialised
-properly, putting it can cause an oops.
-
-So move the ->init call earlier to that it will always be fully
-initilised if we have to put it.
-
-Thanks to Philipp Matthias Hahn <pmhahn@svs.Informatik.Uni-Oldenburg.de>
-for reporting the problem.
-
-Signed-off-by: Neil Brown <neilb@suse.de>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
-
----
- net/sunrpc/cache.c |    6 +++++-
- 1 file changed, 5 insertions(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/net/sunrpc/cache.c
-+++ linux-2.6.17.7/net/sunrpc/cache.c
-@@ -71,7 +71,12 @@ struct cache_head *sunrpc_cache_lookup(s
-       new = detail->alloc();
-       if (!new)
-               return NULL;
-+      /* must fully initialise 'new', else
-+       * we might get lose if we need to
-+       * cache_put it soon.
-+       */
-       cache_init(new);
-+      detail->init(new, key);
-       write_lock(&detail->hash_lock);
-@@ -85,7 +90,6 @@ struct cache_head *sunrpc_cache_lookup(s
-                       return tmp;
-               }
-       }
--      detail->init(new, key);
-       new->next = *head;
-       *head = new;
-       detail->entries++;
diff --git a/review-2.6.17/h.323-helper-fix-possible-null-ptr-dereference.patch b/review-2.6.17/h.323-helper-fix-possible-null-ptr-dereference.patch
deleted file mode 100644 (file)
index 2d7463f..0000000
+++ /dev/null
@@ -1,36 +0,0 @@
-From stable-bounces@linux.kernel.org Mon Jul 24 17:33:30 2006
-Message-ID: <44C56652.5020606@trash.net>
-Date: Tue, 25 Jul 2006 02:31:14 +0200
-From: Patrick McHardy <kaber@trash.net>
-To: stable@kernel.org
-Cc: "David S. Miller" <davem@davemloft.net>
-Subject: [NETFILTER]: H.323 helper: fix possible NULL-ptr dereference
-
-From: Patrick McHardy <kaber@trash.net>
-
-[NETFILTER]: H.323 helper: fix possible NULL-ptr dereference
-
-An RCF message containing a timeout results in a NULL-ptr dereference if
-no RRQ has been seen before.
-
-Noticed by the "SATURN tool", reported by Thomas Dillig <tdillig@stanford.edu>
-and Isil Dillig <isil@stanford.edu>.
-
-Signed-off-by: Patrick McHardy <kaber@trash.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- net/ipv4/netfilter/ip_conntrack_helper_h323.c |    2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/net/ipv4/netfilter/ip_conntrack_helper_h323.c
-+++ linux-2.6.17.7/net/ipv4/netfilter/ip_conntrack_helper_h323.c
-@@ -1092,7 +1092,7 @@ static struct ip_conntrack_expect *find_
-       tuple.dst.protonum = IPPROTO_TCP;
-       exp = __ip_conntrack_expect_find(&tuple);
--      if (exp->master == ct)
-+      if (exp && exp->master == ct)
-               return exp;
-       return NULL;
- }
diff --git a/review-2.6.17/i2c-01-scx200_acb-fix-state-machine.patch b/review-2.6.17/i2c-01-scx200_acb-fix-state-machine.patch
deleted file mode 100644 (file)
index 9430bb1..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-From stable-bounces@linux.kernel.org Wed Jul 26 12:48:02 2006
-Date: Wed, 26 Jul 2006 21:47:41 +0200
-From: Jean Delvare <khali@linux-fr.org>
-To: stable@kernel.org
-Message-Id: <20060726214741.d895b5e0.khali@linux-fr.org>
-Subject: scx200_acb: Fix the state machine
-Content-Disposition: inline; filename=i2c-01-scx200_acb-fix-state-machine.patch
-
-From: Thomas Andrews <tandrews@grok.co.za>
-
-Fix the scx200_acb state machine:
-
-* Nack was sent one byte too late on reads >= 2 bytes.
-* Stop bit was set one byte too late on reads.
-
-Signed-off-by: Jean Delvare <khali@linux-fr.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/i2c/busses/scx200_acb.c |   12 ++++++------
- 1 file changed, 6 insertions(+), 6 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/i2c/busses/scx200_acb.c
-+++ linux-2.6.17.7/drivers/i2c/busses/scx200_acb.c
-@@ -181,21 +181,21 @@ static void scx200_acb_machine(struct sc
-               break;
-       case state_read:
--              /* Set ACK if receiving the last byte */
--              if (iface->len == 1)
-+              /* Set ACK if _next_ byte will be the last one */
-+              if (iface->len == 2)
-                       outb(inb(ACBCTL1) | ACBCTL1_ACK, ACBCTL1);
-               else
-                       outb(inb(ACBCTL1) & ~ACBCTL1_ACK, ACBCTL1);
--              *iface->ptr++ = inb(ACBSDA);
--              --iface->len;
--
--              if (iface->len == 0) {
-+              if (iface->len == 1) {
-                       iface->result = 0;
-                       iface->state = state_idle;
-                       outb(inb(ACBCTL1) | ACBCTL1_STOP, ACBCTL1);
-               }
-+              *iface->ptr++ = inb(ACBSDA);
-+              --iface->len;
-+
-               break;
-       case state_write:
diff --git a/review-2.6.17/i2c-02-scx200_acb-fix-block-transactions.patch b/review-2.6.17/i2c-02-scx200_acb-fix-block-transactions.patch
deleted file mode 100644 (file)
index d9cf9e2..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-From stable-bounces@linux.kernel.org Wed Jul 26 12:52:59 2006
-Date: Wed, 26 Jul 2006 21:50:15 +0200
-From: Jean Delvare <khali@linux-fr.org>
-To: stable@kernel.org
-Message-Id: <20060726215015.9da8afda.khali@linux-fr.org>
-Subject: scx200_acb: Fix the block transactions
-Content-Disposition: inline; filename=i2c-02-scx200_acb-fix-block-transactions.patch
-
-From: Jean Delvare <khali@linux-fr.org>
-
-The scx200_acb i2c bus driver pretends to support SMBus block
-transactions, but in fact it implements the more simple I2C block
-transactions. Additionally, it lacks sanity checks on the length
-of the block transactions, which could lead to a buffer overrun.
-
-This fixes an oops reported by Alexander Atanasov:
-http://marc.theaimsgroup.com/?l=linux-kernel&m=114970382125094
-
-Thanks to Ben Gardner for fixing my bugs :)
-
-Signed-off-by: Jean Delvare <khali@linux-fr.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/i2c/busses/scx200_acb.c |    8 ++++++--
- 1 file changed, 6 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/i2c/busses/scx200_acb.c
-+++ linux-2.6.17.7/drivers/i2c/busses/scx200_acb.c
-@@ -304,8 +304,12 @@ static s32 scx200_acb_smbus_xfer(struct 
-               buffer = (u8 *)&cur_word;
-               break;
--      case I2C_SMBUS_BLOCK_DATA:
-+      case I2C_SMBUS_I2C_BLOCK_DATA:
-+              if (rw == I2C_SMBUS_READ)
-+                      data->block[0] = I2C_SMBUS_BLOCK_MAX; /* For now */
-               len = data->block[0];
-+              if (len == 0 || len > I2C_SMBUS_BLOCK_MAX)
-+                      return -EINVAL;
-               buffer = &data->block[1];
-               break;
-@@ -369,7 +373,7 @@ static u32 scx200_acb_func(struct i2c_ad
- {
-       return I2C_FUNC_SMBUS_QUICK | I2C_FUNC_SMBUS_BYTE |
-              I2C_FUNC_SMBUS_BYTE_DATA | I2C_FUNC_SMBUS_WORD_DATA |
--             I2C_FUNC_SMBUS_BLOCK_DATA;
-+             I2C_FUNC_SMBUS_I2C_BLOCK;
- }
- /* For now, we only handle combined mode (smbus) */
diff --git a/review-2.6.17/i2c-03-fix-ignore-module-parameter-handling.patch b/review-2.6.17/i2c-03-fix-ignore-module-parameter-handling.patch
deleted file mode 100644 (file)
index 11e5d61..0000000
+++ /dev/null
@@ -1,35 +0,0 @@
-From stable-bounces@linux.kernel.org Wed Jul 26 12:53:36 2006
-Date: Wed, 26 Jul 2006 21:53:13 +0200
-From: Jean Delvare <khali@linux-fr.org>
-To: stable@kernel.org
-Message-Id: <20060726215313.907eb30d.khali@linux-fr.org>
-Subject: i2c: Fix 'ignore' module parameter handling in i2c-core
-Content-Disposition: inline; filename=i2c-03-fix-ignore-module-parameter-handling.patch
-
-From: "Mark M. Hoffman" <mhoffman@lightlink.com>
-
-This patch fixes a bug in the handling of 'ignore' module parameters of I2C
-client drivers.
-
-Signed-off-by: Mark M. Hoffman <mhoffman@lightlink.com>
-Signed-off-by: Jean Delvare <khali@linux-fr.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/i2c/i2c-core.c |    4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/i2c/i2c-core.c
-+++ linux-2.6.17.7/drivers/i2c/i2c-core.c
-@@ -756,9 +756,9 @@ int i2c_probe(struct i2c_adapter *adapte
-                                       "parameter for adapter %d, "
-                                       "addr 0x%02x\n", adap_id,
-                                       address_data->ignore[j + 1]);
-+                              ignore = 1;
-+                              break;
-                       }
--                      ignore = 1;
--                      break;
-               }
-               if (ignore)
-                       continue;
diff --git a/review-2.6.17/ieee1394-sbp2-enable-auto-spin-up-for-maxtor-disks.patch b/review-2.6.17/ieee1394-sbp2-enable-auto-spin-up-for-maxtor-disks.patch
deleted file mode 100644 (file)
index 1b77e84..0000000
+++ /dev/null
@@ -1,37 +0,0 @@
-From stable-bounces@linux.kernel.org Wed Aug  2 10:43:49 2006
-Date: Wed, 2 Aug 2006 19:40:06 +0200 (CEST)
-From: Stefan Richter <stefanr@s5r6.in-berlin.de>
-To: Linus Torvalds <torvalds@osdl.org>, stable@kernel.org
-Message-ID: <tkrat.f5b216d7ca35e7f2@s5r6.in-berlin.de>
-Content-Disposition: INLINE
-Cc: Ben Collins <bcollins@ubuntu.com>, linux-kernel@vger.kernel.org
-Subject: ieee1394: sbp2: enable auto spin-up for Maxtor disks
-
-From: Stefan Richter <stefanr@s5r6.in-berlin.de>
-
-At least Maxtor OneTouch III require a "start stop unit" command after
-auto spin-down before the next access can proceed.  This patch activates
-the responsible code in scsi_mod for all Maxtor SBP-2 disks.
-https://bugzilla.novell.com/show_bug.cgi?id=183011
-
-Maybe that should be done for all SBP-2 disks, but better be cautious.
-
-Signed-off-by: Stefan Richter <stefanr@s5r6.in-berlin.de>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/ieee1394/sbp2.c |    3 +++
- 1 file changed, 3 insertions(+)
-
---- linux-2.6.17.7.orig/drivers/ieee1394/sbp2.c
-+++ linux-2.6.17.7/drivers/ieee1394/sbp2.c
-@@ -2541,6 +2541,9 @@ static int sbp2scsi_slave_configure(stru
-               sdev->skip_ms_page_8 = 1;
-       if (scsi_id->workarounds & SBP2_WORKAROUND_FIX_CAPACITY)
-               sdev->fix_capacity = 1;
-+      if (scsi_id->ne->guid_vendor_id == 0x0010b9 && /* Maxtor's OUI */
-+          (sdev->type == TYPE_DISK || sdev->type == TYPE_RBC))
-+              sdev->allow_restart = 1;
-       return 0;
- }
diff --git a/review-2.6.17/invalidate_bdev-speedup.patch b/review-2.6.17/invalidate_bdev-speedup.patch
deleted file mode 100644 (file)
index 2bc7b06..0000000
+++ /dev/null
@@ -1,46 +0,0 @@
-From stable-bounces@linux.kernel.org Sun Jul 30 03:04:04 2006
-Message-Id: <200607301003.k6UA3SlC002568@shell0.pdx.osdl.net>
-To: torvalds@osdl.org
-From: akpm@osdl.org
-Date: Sun, 30 Jul 2006 03:03:28 -0700
-Cc: akpm@osdl.org, jes@trained-monkey.org, stable@kernel.org
-Subject: invalidate_bdev() speedup
-
-From: Andrew Morton <akpm@osdl.org>
-
-We can immediately bale from invalidate_bdev() if the blockdev has no
-pagecache.
-
-This solves the huge IPI storms which hald is causing on the big ia64
-machines when it polls CDROM drives.
-
-Acked-by: Jes Sorensen <jes@sgi.com>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/buffer.c |    7 ++++++-
- 1 file changed, 6 insertions(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/fs/buffer.c
-+++ linux-2.6.17.7/fs/buffer.c
-@@ -473,13 +473,18 @@ out:
-    pass does the actual I/O. */
- void invalidate_bdev(struct block_device *bdev, int destroy_dirty_buffers)
- {
-+      struct address_space *mapping = bdev->bd_inode->i_mapping;
-+
-+      if (mapping->nrpages == 0)
-+              return;
-+
-       invalidate_bh_lrus();
-       /*
-        * FIXME: what about destroy_dirty_buffers?
-        * We really want to use invalidate_inode_pages2() for
-        * that, but not until that's cleaned up.
-        */
--      invalidate_inode_pages(bdev->bd_inode->i_mapping);
-+      invalidate_inode_pages(mapping);
- }
- /*
diff --git a/review-2.6.17/mbox b/review-2.6.17/mbox
deleted file mode 100644 (file)
index 0001eb8..0000000
+++ /dev/null
@@ -1,2181 +0,0 @@
-From greg@quad.kroah.org Thu Aug  3 22:33:57 2006
-Message-Id: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:32:58 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk
-Subject: [patch 00/23] -stable review
-Status: RO
-Content-Length: 907
-Lines: 22
-
-This is the start of the stable review cycle for the 2.6.17.8 release.
-There are 23 patches in this series, all will be posted as a response to
-this one.  If anyone has any issues with these being applied, please let
-us know.  If anyone is a maintainer of the proper subsystem, and wants
-to add a Signed-off-by: line to the patch, please respond with it.
-
-These patches are sent out with a number of different people on the Cc:
-line.  If you wish to be a reviewer, please email stable@kernel.org to
-add your name to the list.  If you want to be off the reviewer list,
-also email us.
-
-Responses should be made by Sunday, August 6, 05:00:00 UTC.  Anything
-received after that time might be too late.
-
-I've also posted a roll-up patch with all changes in it if people want
-to test it out.  It can be found at:
-
-       kernel.org/pub/linux/kernel/v2.6/testing/patch-2.6.17.8-rc1.gz
-
-thanks,
-
-the -stable release team
-
-From greg@quad.kroah.org Thu Aug  3 22:33:58 2006
-Message-Id: <20060804053357.992549721@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:32:59 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Chuck Ebbert <76306.1226@compuserve.com>,
- Arjan van de Ven <arjan@linux.intel.com>,
- Greg Kroah-Hartman <gregkh@suse.de>,
- Chris Wright <chrisw@sous-sol.org>
-Subject: [patch 01/23] PCI: fix issues with extended conf space when MMCONFIG disabled because of e820
-Content-Disposition: inline; filename=pci-fix-issues-with-extended-conf-space-when-mmconfig-disabled-because-of-e820.patch
-Content-Length: 4208
-Lines: 108
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Chuck Ebbert <76306.1226@compuserve.com>
-
-On 15 Jun 2006 03:45:10 +0200, Andi Kleen wrote:
-> Anyways I would say that if the BIOS can't get MCFG right then
-> it's likely not been validated on that board and shouldn't be used.
-
-According to Petr Vandrovec:
-
- ... "What is important (and checked) is address of MMCONFIG reported by MCFG
- table...  Unfortunately code does not bother with printing that address :-(
-
- "Another problem is that code has hardcoded that MMCONFIG area is 256MB large.
- Unfortunately for the code PCI specification allows any power of two between 2MB
- and 256MB if vendor knows that such amount of busses (from 2 to 128) will be
- sufficient for system.  With notebook it is quite possible that not full 8 bits
- are implemented for MMCONFIG bus number."
-
-So here is a patch.  Unfortunately my system still fails the test because
-it doesn't reserve any part of the MMCONFIG area, but this may fix others.
-
-Booted on x86_64, only compiled on i386.  x86_64 still remaps the max area
-(256MB) even though only 2MB is checked... but 2.6.16 had no check at all
-so it is still better.
-
-PCI: reduce size of x86 MMCONFIG reserved area check
-
-1.  Print the address of the MMCONFIG area when the test for that area
-    being reserved fails.
-
-2.  Only check if the first 2MB is reserved, as that is the minimum.
-
-Signed-off-by: Chuck Ebbert <76306.1226@compuserve.com>
-Acked-by: Arjan van de Ven <arjan@linux.intel.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-Signed-off-by: Chris Wright <chrisw@sous-sol.org>
----
- arch/i386/pci/mmconfig.c   |    9 ++++++---
- arch/x86_64/pci/mmconfig.c |   13 +++++++++----
- 2 files changed, 15 insertions(+), 7 deletions(-)
-
---- linux-2.6.17.7.orig/arch/i386/pci/mmconfig.c
-+++ linux-2.6.17.7/arch/i386/pci/mmconfig.c
-@@ -15,7 +15,9 @@
- #include <asm/e820.h>
- #include "pci.h"
--#define MMCONFIG_APER_SIZE (256*1024*1024)
-+/* aperture is up to 256MB but BIOS may reserve less */
-+#define MMCONFIG_APER_MIN     (2 * 1024*1024)
-+#define MMCONFIG_APER_MAX     (256 * 1024*1024)
- /* Assume systems with more busses have correct MCFG */
- #define MAX_CHECK_BUS 16
-@@ -197,9 +199,10 @@ void __init pci_mmcfg_init(void)
-               return;
-       if (!e820_all_mapped(pci_mmcfg_config[0].base_address,
--                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_SIZE,
-+                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_MIN,
-                       E820_RESERVED)) {
--              printk(KERN_ERR "PCI: BIOS Bug: MCFG area is not E820-reserved\n");
-+              printk(KERN_ERR "PCI: BIOS Bug: MCFG area at %x is not E820-reserved\n",
-+                              pci_mmcfg_config[0].base_address);
-               printk(KERN_ERR "PCI: Not using MMCONFIG.\n");
-               return;
-       }
---- linux-2.6.17.7.orig/arch/x86_64/pci/mmconfig.c
-+++ linux-2.6.17.7/arch/x86_64/pci/mmconfig.c
-@@ -13,7 +13,10 @@
- #include "pci.h"
--#define MMCONFIG_APER_SIZE (256*1024*1024)
-+/* aperture is up to 256MB but BIOS may reserve less */
-+#define MMCONFIG_APER_MIN     (2 * 1024*1024)
-+#define MMCONFIG_APER_MAX     (256 * 1024*1024)
-+
- /* Verify the first 16 busses. We assume that systems with more busses
-    get MCFG right. */
- #define MAX_CHECK_BUS 16
-@@ -175,9 +178,10 @@ void __init pci_mmcfg_init(void)
-               return;
-       if (!e820_all_mapped(pci_mmcfg_config[0].base_address,
--                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_SIZE,
-+                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_MIN,
-                       E820_RESERVED)) {
--              printk(KERN_ERR "PCI: BIOS Bug: MCFG area is not E820-reserved\n");
-+              printk(KERN_ERR "PCI: BIOS Bug: MCFG area at %x is not E820-reserved\n",
-+                              pci_mmcfg_config[0].base_address);
-               printk(KERN_ERR "PCI: Not using MMCONFIG.\n");
-               return;
-       }
-@@ -190,7 +194,8 @@ void __init pci_mmcfg_init(void)
-       }
-       for (i = 0; i < pci_mmcfg_config_num; ++i) {
-               pci_mmcfg_virt[i].cfg = &pci_mmcfg_config[i];
--              pci_mmcfg_virt[i].virt = ioremap_nocache(pci_mmcfg_config[i].base_address, MMCONFIG_APER_SIZE);
-+              pci_mmcfg_virt[i].virt = ioremap_nocache(pci_mmcfg_config[i].base_address,
-+                                                       MMCONFIG_APER_MAX);
-               if (!pci_mmcfg_virt[i].virt) {
-                       printk("PCI: Cannot map mmconfig aperture for segment %d\n",
-                              pci_mmcfg_config[i].pci_segment_group_number);
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:58 2006
-Message-Id: <20060804053358.134357681@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:00 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- Greg KH <gregkh@suse.de>
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Eugene Teo <eteo@redhat.com>,
- Marcel Holtmann <marcel@holtmann.org>
-Subject: [patch 02/23] Dont allow chmod() on the /proc/<pid>/ files
-Content-Disposition: inline; filename=don-t-allow-chmod-on-the-proc-pid-files.patch
-Content-Length: 3794
-Lines: 132
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Marcel Holtmann <marcel@holtmann.org>
-
-Don't allow chmod() on the /proc/<pid>/ files
-
-This just turns off chmod() on the /proc/<pid>/ files, since there is no
-good reason to allow it, and had we disallowed it originally, the nasty
-/proc race exploit wouldn't have been possible.
-
-The other patches already fixed the problem chmod() could cause, so this
-is really just some final mop-up..
-
-This particular version is based off a patch by Eugene and Marcel which
-had much better naming than my original equivalent one.
-
-Signed-off-by: Eugene Teo <eteo@redhat.com>
-Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
-Signed-off-by: Linus Torvalds <torvalds@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/proc/base.c |   33 ++++++++++++++++++++++++++++++++-
- 1 file changed, 32 insertions(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/fs/proc/base.c
-+++ linux-2.6.17.7/fs/proc/base.c
-@@ -596,6 +596,27 @@ static int proc_permission(struct inode 
-       return proc_check_root(inode);
- }
-+static int proc_setattr(struct dentry *dentry, struct iattr *attr)
-+{
-+      int error;
-+      struct inode *inode = dentry->d_inode;
-+
-+      if (attr->ia_valid & ATTR_MODE)
-+              return -EPERM;
-+
-+      error = inode_change_ok(inode, attr);
-+      if (!error) {
-+              error = security_inode_setattr(dentry, attr);
-+              if (!error)
-+                      error = inode_setattr(inode, attr);
-+      }
-+      return error;
-+}
-+
-+static struct inode_operations proc_def_inode_operations = {
-+      .setattr        = proc_setattr,
-+};
-+
- static int proc_task_permission(struct inode *inode, int mask, struct nameidata *nd)
- {
-       struct dentry *root;
-@@ -987,6 +1008,7 @@ static struct file_operations proc_oom_a
- static struct inode_operations proc_mem_inode_operations = {
-       .permission     = proc_permission,
-+      .setattr        = proc_setattr,
- };
- #ifdef CONFIG_AUDITSYSCALL
-@@ -1184,7 +1206,8 @@ out:
- static struct inode_operations proc_pid_link_inode_operations = {
-       .readlink       = proc_pid_readlink,
--      .follow_link    = proc_pid_follow_link
-+      .follow_link    = proc_pid_follow_link,
-+      .setattr        = proc_setattr,
- };
- #define NUMBUF 10
-@@ -1356,6 +1379,7 @@ static struct inode *proc_pid_make_inode
-       ei->task = NULL;
-       inode->i_mtime = inode->i_atime = inode->i_ctime = CURRENT_TIME;
-       inode->i_ino = fake_ino(task->pid, ino);
-+      inode->i_op = &proc_def_inode_operations;
-       if (!pid_alive(task))
-               goto out_unlock;
-@@ -1579,11 +1603,13 @@ static struct file_operations proc_task_
- static struct inode_operations proc_fd_inode_operations = {
-       .lookup         = proc_lookupfd,
-       .permission     = proc_permission,
-+      .setattr        = proc_setattr,
- };
- static struct inode_operations proc_task_inode_operations = {
-       .lookup         = proc_task_lookup,
-       .permission     = proc_task_permission,
-+      .setattr        = proc_setattr,
- };
- #ifdef CONFIG_SECURITY
-@@ -1873,10 +1899,12 @@ static struct file_operations proc_tid_b
- static struct inode_operations proc_tgid_base_inode_operations = {
-       .lookup         = proc_tgid_base_lookup,
-+      .setattr        = proc_setattr,
- };
- static struct inode_operations proc_tid_base_inode_operations = {
-       .lookup         = proc_tid_base_lookup,
-+      .setattr        = proc_setattr,
- };
- #ifdef CONFIG_SECURITY
-@@ -1918,10 +1946,12 @@ static struct dentry *proc_tid_attr_look
- static struct inode_operations proc_tgid_attr_inode_operations = {
-       .lookup         = proc_tgid_attr_lookup,
-+      .setattr        = proc_setattr,
- };
- static struct inode_operations proc_tid_attr_inode_operations = {
-       .lookup         = proc_tid_attr_lookup,
-+      .setattr        = proc_setattr,
- };
- #endif
-@@ -1946,6 +1976,7 @@ static void *proc_self_follow_link(struc
- static struct inode_operations proc_self_inode_operations = {
-       .readlink       = proc_self_readlink,
-       .follow_link    = proc_self_follow_link,
-+      .setattr        = proc_setattr,
- };
- /**
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:58 2006
-Message-Id: <20060804053358.278353515@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:01 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- "David S. Miller" <davem@davemloft.net>,
- Patrick McHardy <kaber@trash.net>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 03/23] : H.323 helper: fix possible NULL-ptr dereference
-Content-Disposition: inline; filename=h.323-helper-fix-possible-null-ptr-dereference.patch
-Content-Length: 1000
-Lines: 33
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Patrick McHardy <kaber@trash.net>
-
-[NETFILTER]: H.323 helper: fix possible NULL-ptr dereference
-
-An RCF message containing a timeout results in a NULL-ptr dereference if
-no RRQ has been seen before.
-
-Noticed by the "SATURN tool", reported by Thomas Dillig <tdillig@stanford.edu>
-and Isil Dillig <isil@stanford.edu>.
-
-Signed-off-by: Patrick McHardy <kaber@trash.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- net/ipv4/netfilter/ip_conntrack_helper_h323.c |    2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/net/ipv4/netfilter/ip_conntrack_helper_h323.c
-+++ linux-2.6.17.7/net/ipv4/netfilter/ip_conntrack_helper_h323.c
-@@ -1092,7 +1092,7 @@ static struct ip_conntrack_expect *find_
-       tuple.dst.protonum = IPPROTO_TCP;
-       exp = __ip_conntrack_expect_find(&tuple);
--      if (exp->master == ct)
-+      if (exp && exp->master == ct)
-               return exp;
-       return NULL;
- }
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:58 2006
-Message-Id: <20060804053358.419010691@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:02 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Jean Delvare <khali@linux-fr.org>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 04/23] scx200_acb: Fix the state machine
-Content-Disposition: inline; filename=i2c-01-scx200_acb-fix-state-machine.patch
-Content-Length: 1233
-Lines: 49
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Thomas Andrews <tandrews@grok.co.za>
-
-Fix the scx200_acb state machine:
-
-* Nack was sent one byte too late on reads >= 2 bytes.
-* Stop bit was set one byte too late on reads.
-
-Signed-off-by: Jean Delvare <khali@linux-fr.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/i2c/busses/scx200_acb.c |   12 ++++++------
- 1 file changed, 6 insertions(+), 6 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/i2c/busses/scx200_acb.c
-+++ linux-2.6.17.7/drivers/i2c/busses/scx200_acb.c
-@@ -181,21 +181,21 @@ static void scx200_acb_machine(struct sc
-               break;
-       case state_read:
--              /* Set ACK if receiving the last byte */
--              if (iface->len == 1)
-+              /* Set ACK if _next_ byte will be the last one */
-+              if (iface->len == 2)
-                       outb(inb(ACBCTL1) | ACBCTL1_ACK, ACBCTL1);
-               else
-                       outb(inb(ACBCTL1) & ~ACBCTL1_ACK, ACBCTL1);
--              *iface->ptr++ = inb(ACBSDA);
--              --iface->len;
--
--              if (iface->len == 0) {
-+              if (iface->len == 1) {
-                       iface->result = 0;
-                       iface->state = state_idle;
-                       outb(inb(ACBCTL1) | ACBCTL1_STOP, ACBCTL1);
-               }
-+              *iface->ptr++ = inb(ACBSDA);
-+              --iface->len;
-+
-               break;
-       case state_write:
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:58 2006
-Message-Id: <20060804053358.563924058@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:03 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Jean Delvare <khali@linux-fr.org>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 05/23] scx200_acb: Fix the block transactions
-Content-Disposition: inline; filename=i2c-02-scx200_acb-fix-block-transactions.patch
-Content-Length: 1560
-Lines: 49
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Jean Delvare <khali@linux-fr.org>
-
-The scx200_acb i2c bus driver pretends to support SMBus block
-transactions, but in fact it implements the more simple I2C block
-transactions. Additionally, it lacks sanity checks on the length
-of the block transactions, which could lead to a buffer overrun.
-
-This fixes an oops reported by Alexander Atanasov:
-http://marc.theaimsgroup.com/?l=linux-kernel&m=114970382125094
-
-Thanks to Ben Gardner for fixing my bugs :)
-
-Signed-off-by: Jean Delvare <khali@linux-fr.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/i2c/busses/scx200_acb.c |    8 ++++++--
- 1 file changed, 6 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/i2c/busses/scx200_acb.c
-+++ linux-2.6.17.7/drivers/i2c/busses/scx200_acb.c
-@@ -304,8 +304,12 @@ static s32 scx200_acb_smbus_xfer(struct 
-               buffer = (u8 *)&cur_word;
-               break;
--      case I2C_SMBUS_BLOCK_DATA:
-+      case I2C_SMBUS_I2C_BLOCK_DATA:
-+              if (rw == I2C_SMBUS_READ)
-+                      data->block[0] = I2C_SMBUS_BLOCK_MAX; /* For now */
-               len = data->block[0];
-+              if (len == 0 || len > I2C_SMBUS_BLOCK_MAX)
-+                      return -EINVAL;
-               buffer = &data->block[1];
-               break;
-@@ -369,7 +373,7 @@ static u32 scx200_acb_func(struct i2c_ad
- {
-       return I2C_FUNC_SMBUS_QUICK | I2C_FUNC_SMBUS_BYTE |
-              I2C_FUNC_SMBUS_BYTE_DATA | I2C_FUNC_SMBUS_WORD_DATA |
--             I2C_FUNC_SMBUS_BLOCK_DATA;
-+             I2C_FUNC_SMBUS_I2C_BLOCK;
- }
- /* For now, we only handle combined mode (smbus) */
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:58 2006
-Message-Id: <20060804053358.702419046@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:04 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- "Mark M. Hoffman" <mhoffman@lightlink.com>,
- Jean Delvare <khali@linux-fr.org>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 06/23] i2c: Fix ignore module parameter handling in i2c-core
-Content-Disposition: inline; filename=i2c-03-fix-ignore-module-parameter-handling.patch
-Content-Length: 836
-Lines: 32
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: "Mark M. Hoffman" <mhoffman@lightlink.com>
-
-This patch fixes a bug in the handling of 'ignore' module parameters of I2C
-client drivers.
-
-Signed-off-by: Mark M. Hoffman <mhoffman@lightlink.com>
-Signed-off-by: Jean Delvare <khali@linux-fr.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/i2c/i2c-core.c |    4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/i2c/i2c-core.c
-+++ linux-2.6.17.7/drivers/i2c/i2c-core.c
-@@ -756,9 +756,9 @@ int i2c_probe(struct i2c_adapter *adapte
-                                       "parameter for adapter %d, "
-                                       "addr 0x%02x\n", adap_id,
-                                       address_data->ignore[j + 1]);
-+                              ignore = 1;
-+                              break;
-                       }
--                      ignore = 1;
--                      break;
-               }
-               if (ignore)
-                       continue;
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:58 2006
-Message-Id: <20060804053358.841013249@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:05 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Stephen Hemminger <sch@sch-laptop.localdomain>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 07/23] sky2: NAPI bug
-Content-Disposition: inline; filename=sky2-napi-bug.patch
-Content-Length: 968
-Lines: 39
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Stephen Hemminger <shemminger@osdl.org>
-
-If the sky2 driver decides to defer processing because it's NAPI
-packet quota is done, then it won't correctly handle the rest
-when it is rescheduled.
-
-Signed-off-by: Stephen Hemminger <sch@sch-laptop.localdomain>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/net/sky2.c |    5 +----
- 1 file changed, 1 insertion(+), 4 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/net/sky2.c
-+++ linux-2.6.17.7/drivers/net/sky2.c
-@@ -2187,9 +2187,6 @@ static int sky2_poll(struct net_device *
-       int work_done = 0;
-       u32 status = sky2_read32(hw, B0_Y2_SP_EISR);
--      if (!~status)
--              goto out;
--
-       if (status & Y2_IS_HW_ERR)
-               sky2_hw_intr(hw);
-@@ -2226,7 +2223,7 @@ static int sky2_poll(struct net_device *
-       if (sky2_more_work(hw))
-               return 1;
--out:
-+
-       netif_rx_complete(dev0);
-       sky2_read32(hw, B0_Y2_SP_LISR);
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:59 2006
-Message-Id: <20060804053358.981284871@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:06 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Juan Pedro Paredes Caballero <juampe@iquis.com>,
- Duncan Sands <baldrick@free.fr>,
- Andrew Beverley <andy@andybev.com>,
- Alan Stern <stern@rowland.harvard.edu>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 08/23] UHCI: Fix handling of short last packet
-Content-Disposition: inline; filename=uhci-fix-handling-of-short-last-packet.patch
-Content-Length: 1684
-Lines: 46
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Alan Stern <stern@rowland.harvard.edu>
-
-This patch (as753) fixes the way uhci-hcd handles a short packet when it
-is the last packet of an URB.  Right now the driver handles short packets
-the same no matter when they occur.  However, the controller stops
-transferring packets when the short packet is not the last one (otherwise
-it would be reading beyond the end of the device's data) and needs to be
-restarted, whereas no such need occurs when the short packet is the last
-one.
-
-The result of the bug is that USB endpoint queues experience intermittent
-hangs, a regression in 2.6.17 with respect to earlier kernels.  The bug
-was raised in Bugzilla #6752 and this patch fixed it.
-
-Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
-
----
- drivers/usb/host/uhci-q.c |    6 ++++--
- 1 file changed, 4 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/usb/host/uhci-q.c
-+++ linux-2.6.17.7/drivers/usb/host/uhci-q.c
-@@ -896,12 +896,14 @@ static int uhci_result_common(struct uhc
-                       /*
-                        * This URB stopped short of its end.  We have to
-                        * fix up the toggles of the following URBs on the
--                       * queue and restart the queue.
-+                       * queue and restart the queue.  But only if this
-+                       * TD isn't the last one in the URB.
-                        *
-                        * Do this only the first time we encounter the
-                        * short URB.
-                        */
--                      if (!urbp->short_transfer) {
-+                      if (!urbp->short_transfer &&
-+                                      &td->list != urbp->td_list.prev) {
-                               urbp->short_transfer = 1;
-                               urbp->qh->initial_toggle =
-                                               uhci_toggle(td_token(td)) ^ 1;
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:59 2006
-Message-Id: <20060804053359.126470139@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:07 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- netdev@vger.kernel.org,
- David Miller <davem@davemloft.net>,
- Herbert Xu <herbert@gondor.apana.org.au>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 09/23] : Update frag_list in pskb_trim
-Content-Disposition: inline; filename=update-frag_list-in-pskb_trim.patch
-Content-Length: 6091
-Lines: 234
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Herbert Xu <herbert@gondor.apana.org.au>
-
-[NET]: Update frag_list in pskb_trim
-
-When pskb_trim has to defer to ___pksb_trim to trim the frag_list part of
-the packet, the frag_list is not updated to reflect the trimming.  This
-will usually work fine until you hit something that uses the packet length
-or tail from the frag_list.
-
-Examples include esp_output and ip_fragment.
-
-Another problem caused by this is that you can end up with a linear packet
-with a frag_list attached.
-
-It is possible to get away with this if we audit everything to make sure
-that they always consult skb->len before going down onto frag_list.  In
-fact we can do the samething for the paged part as well to avoid copying
-the data area of the skb.  For now though, let's do the conservative fix
-and update frag_list.
-
-Many thanks to Marco Berizzi for helping me to track down this bug.
-
-This 4-year old bug took 3 months to track down.  Marco was very patient
-indeed :)
-
-Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- include/linux/skbuff.h |   24 +++++------
- net/core/skbuff.c      |  106 ++++++++++++++++++++++++++++++++++---------------
- 2 files changed, 86 insertions(+), 44 deletions(-)
-
---- linux-2.6.17.7.orig/include/linux/skbuff.h
-+++ linux-2.6.17.7/include/linux/skbuff.h
-@@ -967,15 +967,16 @@ static inline void skb_reserve(struct sk
- #define NET_SKB_PAD   16
- #endif
--extern int ___pskb_trim(struct sk_buff *skb, unsigned int len, int realloc);
-+extern int ___pskb_trim(struct sk_buff *skb, unsigned int len);
- static inline void __skb_trim(struct sk_buff *skb, unsigned int len)
- {
--      if (!skb->data_len) {
--              skb->len  = len;
--              skb->tail = skb->data + len;
--      } else
--              ___pskb_trim(skb, len, 0);
-+      if (unlikely(skb->data_len)) {
-+              WARN_ON(1);
-+              return;
-+      }
-+      skb->len  = len;
-+      skb->tail = skb->data + len;
- }
- /**
-@@ -985,6 +986,7 @@ static inline void __skb_trim(struct sk_
-  *
-  *    Cut the length of a buffer down by removing data from the tail. If
-  *    the buffer is already under the length specified it is not modified.
-+ *    The skb must be linear.
-  */
- static inline void skb_trim(struct sk_buff *skb, unsigned int len)
- {
-@@ -995,12 +997,10 @@ static inline void skb_trim(struct sk_bu
- static inline int __pskb_trim(struct sk_buff *skb, unsigned int len)
- {
--      if (!skb->data_len) {
--              skb->len  = len;
--              skb->tail = skb->data+len;
--              return 0;
--      }
--      return ___pskb_trim(skb, len, 1);
-+      if (skb->data_len)
-+              return ___pskb_trim(skb, len);
-+      __skb_trim(skb, len);
-+      return 0;
- }
- static inline int pskb_trim(struct sk_buff *skb, unsigned int len)
---- linux-2.6.17.7.orig/net/core/skbuff.c
-+++ linux-2.6.17.7/net/core/skbuff.c
-@@ -251,11 +251,11 @@ nodata:
- }
--static void skb_drop_fraglist(struct sk_buff *skb)
-+static void skb_drop_list(struct sk_buff **listp)
- {
--      struct sk_buff *list = skb_shinfo(skb)->frag_list;
-+      struct sk_buff *list = *listp;
--      skb_shinfo(skb)->frag_list = NULL;
-+      *listp = NULL;
-       do {
-               struct sk_buff *this = list;
-@@ -264,6 +264,11 @@ static void skb_drop_fraglist(struct sk_
-       } while (list);
- }
-+static inline void skb_drop_fraglist(struct sk_buff *skb)
-+{
-+      skb_drop_list(&skb_shinfo(skb)->frag_list);
-+}
-+
- static void skb_clone_fraglist(struct sk_buff *skb)
- {
-       struct sk_buff *list;
-@@ -802,49 +807,86 @@ struct sk_buff *skb_pad(struct sk_buff *
-       return nskb;
- }     
-  
--/* Trims skb to length len. It can change skb pointers, if "realloc" is 1.
-- * If realloc==0 and trimming is impossible without change of data,
-- * it is BUG().
-+/* Trims skb to length len. It can change skb pointers.
-  */
--int ___pskb_trim(struct sk_buff *skb, unsigned int len, int realloc)
-+int ___pskb_trim(struct sk_buff *skb, unsigned int len)
- {
-+      struct sk_buff **fragp;
-+      struct sk_buff *frag;
-       int offset = skb_headlen(skb);
-       int nfrags = skb_shinfo(skb)->nr_frags;
-       int i;
-+      int err;
--      for (i = 0; i < nfrags; i++) {
-+      if (skb_cloned(skb) &&
-+          unlikely((err = pskb_expand_head(skb, 0, 0, GFP_ATOMIC))))
-+              return err;
-+
-+      i = 0;
-+      if (offset >= len)
-+              goto drop_pages;
-+
-+      for (; i < nfrags; i++) {
-               int end = offset + skb_shinfo(skb)->frags[i].size;
--              if (end > len) {
--                      if (skb_cloned(skb)) {
--                              BUG_ON(!realloc);
--                              if (pskb_expand_head(skb, 0, 0, GFP_ATOMIC))
--                                      return -ENOMEM;
--                      }
--                      if (len <= offset) {
--                              put_page(skb_shinfo(skb)->frags[i].page);
--                              skb_shinfo(skb)->nr_frags--;
--                      } else {
--                              skb_shinfo(skb)->frags[i].size = len - offset;
--                      }
-+
-+              if (end < len) {
-+                      offset = end;
-+                      continue;
-+              }
-+
-+              skb_shinfo(skb)->frags[i++].size = len - offset;
-+
-+drop_pages:
-+              skb_shinfo(skb)->nr_frags = i;
-+
-+              for (; i < nfrags; i++)
-+                      put_page(skb_shinfo(skb)->frags[i].page);
-+
-+              if (skb_shinfo(skb)->frag_list)
-+                      skb_drop_fraglist(skb);
-+              goto done;
-+      }
-+
-+      for (fragp = &skb_shinfo(skb)->frag_list; (frag = *fragp);
-+           fragp = &frag->next) {
-+              int end = offset + frag->len;
-+
-+              if (skb_shared(frag)) {
-+                      struct sk_buff *nfrag;
-+
-+                      nfrag = skb_clone(frag, GFP_ATOMIC);
-+                      if (unlikely(!nfrag))
-+                              return -ENOMEM;
-+
-+                      nfrag->next = frag->next;
-+                      kfree_skb(frag);
-+                      frag = nfrag;
-+                      *fragp = frag;
-               }
--              offset = end;
-+
-+              if (end < len) {
-+                      offset = end;
-+                      continue;
-+              }
-+
-+              if (end > len &&
-+                  unlikely((err = pskb_trim(frag, len - offset))))
-+                      return err;
-+
-+              if (frag->next)
-+                      skb_drop_list(&frag->next);
-+              break;
-       }
--      if (offset < len) {
-+done:
-+      if (len > skb_headlen(skb)) {
-               skb->data_len -= skb->len - len;
-               skb->len       = len;
-       } else {
--              if (len <= skb_headlen(skb)) {
--                      skb->len      = len;
--                      skb->data_len = 0;
--                      skb->tail     = skb->data + len;
--                      if (skb_shinfo(skb)->frag_list && !skb_cloned(skb))
--                              skb_drop_fraglist(skb);
--              } else {
--                      skb->data_len -= skb->len - len;
--                      skb->len       = len;
--              }
-+              skb->len       = len;
-+              skb->data_len  = 0;
-+              skb->tail      = skb->data + len;
-       }
-       return 0;
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:59 2006
-Message-Id: <20060804053359.266801958@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:08 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Stefan Rompf <stefan@loplof.de>,
- Patrick McHardy <kaber@trash.net>,
- "David S. Miller" <davem@davemloft.net>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 10/23] VLAN state handling fix
-Content-Disposition: inline; filename=vlan-state-handling-fix.patch
-Content-Length: 1543
-Lines: 46
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Stefan Rompf <stefan@loplof.de>
-
-[VLAN]: Fix link state propagation
-
-When the queue of the underlying device is stopped at initialization time
-or the device is marked "not present", the state will be propagated to the
-vlan device and never change. Based on an analysis by Patrick McHardy.
-
-Signed-off-by: Stefan Rompf <stefan@loplof.de>
-ACKed-by: Patrick McHardy <kaber@trash.net>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- net/8021q/vlan.c |    8 +++-----
- 1 file changed, 3 insertions(+), 5 deletions(-)
-
---- linux-2.6.17.7.orig/net/8021q/vlan.c
-+++ linux-2.6.17.7/net/8021q/vlan.c
-@@ -67,10 +67,6 @@ static struct packet_type vlan_packet_ty
-       .func = vlan_skb_recv, /* VLAN receive method */
- };
--/* Bits of netdev state that are propagated from real device to virtual */
--#define VLAN_LINK_STATE_MASK \
--      ((1<<__LINK_STATE_PRESENT)|(1<<__LINK_STATE_NOCARRIER)|(1<<__LINK_STATE_DORMANT))
--
- /* End of global variables definitions. */
- /*
-@@ -470,7 +466,9 @@ static struct net_device *register_vlan_
-       new_dev->flags = real_dev->flags;
-       new_dev->flags &= ~IFF_UP;
--      new_dev->state = real_dev->state & ~(1<<__LINK_STATE_START);
-+      new_dev->state = (real_dev->state & ((1<<__LINK_STATE_NOCARRIER) |
-+                                           (1<<__LINK_STATE_DORMANT))) |
-+                       (1<<__LINK_STATE_PRESENT);
-       /* need 4 bytes for extra VLAN header info,
-        * hope the underlying device can handle it.
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:59 2006
-Message-Id: <20060804053359.408447151@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:09 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- "David S. Miller" <davem@davemloft.net>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 11/23] Sparc64 quad-float emulation fix
-Content-Disposition: inline; filename=sparc64-quad-float-emulation-fix.patch
-Content-Length: 1098
-Lines: 33
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: David Miller <davem@davemloft.net>
-
-[SPARC64]: Fix quad-float multiply emulation.
-
-Something is wrong with the 3-multiply (vs. 4-multiply) optimized
-version of _FP_MUL_MEAT_2_*(), so just use the slower version
-which actually computes correct values.
-
-Noticed by Rene Rebe
-
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- include/asm-sparc64/sfp-machine.h |    2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/include/asm-sparc64/sfp-machine.h
-+++ linux-2.6.17.7/include/asm-sparc64/sfp-machine.h
-@@ -34,7 +34,7 @@
- #define _FP_MUL_MEAT_D(R,X,Y)                                 \
-   _FP_MUL_MEAT_1_wide(_FP_WFRACBITS_D,R,X,Y,umul_ppmm)
- #define _FP_MUL_MEAT_Q(R,X,Y)                                 \
--  _FP_MUL_MEAT_2_wide_3mul(_FP_WFRACBITS_Q,R,X,Y,umul_ppmm)
-+  _FP_MUL_MEAT_2_wide(_FP_WFRACBITS_Q,R,X,Y,umul_ppmm)
- #define _FP_DIV_MEAT_S(R,X,Y) _FP_DIV_MEAT_1_imm(S,R,X,Y,_FP_DIV_HELP_imm)
- #define _FP_DIV_MEAT_D(R,X,Y) _FP_DIV_MEAT_1_udiv_norm(D,R,X,Y)
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:59 2006
-Message-Id: <20060804053359.552688282@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:10 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- torvalds@osdl.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- jes@trained-monkey.org,
- Jes Sorensen <jes@sgi.com>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 12/23] invalidate_bdev() speedup
-Content-Disposition: inline; filename=invalidate_bdev-speedup.patch
-Content-Length: 1129
-Lines: 43
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Andrew Morton <akpm@osdl.org>
-
-We can immediately bale from invalidate_bdev() if the blockdev has no
-pagecache.
-
-This solves the huge IPI storms which hald is causing on the big ia64
-machines when it polls CDROM drives.
-
-Acked-by: Jes Sorensen <jes@sgi.com>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/buffer.c |    7 ++++++-
- 1 file changed, 6 insertions(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/fs/buffer.c
-+++ linux-2.6.17.7/fs/buffer.c
-@@ -473,13 +473,18 @@ out:
-    pass does the actual I/O. */
- void invalidate_bdev(struct block_device *bdev, int destroy_dirty_buffers)
- {
-+      struct address_space *mapping = bdev->bd_inode->i_mapping;
-+
-+      if (mapping->nrpages == 0)
-+              return;
-+
-       invalidate_bh_lrus();
-       /*
-        * FIXME: what about destroy_dirty_buffers?
-        * We really want to use invalidate_inode_pages2() for
-        * that, but not until that's cleaned up.
-        */
--      invalidate_inode_pages(bdev->bd_inode->i_mapping);
-+      invalidate_inode_pages(mapping);
- }
- /*
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:59 2006
-Message-Id: <20060804053359.695026885@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:11 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- Linus Torvalds <torvalds@osdl.org>
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Ben Collins <bcollins@ubuntu.com>,
- Stefan Richter <stefanr@s5r6.in-berlin.de>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 13/23] ieee1394: sbp2: enable auto spin-up for Maxtor disks
-Content-Disposition: inline; filename=ieee1394-sbp2-enable-auto-spin-up-for-maxtor-disks.patch
-Content-Length: 1101
-Lines: 33
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Stefan Richter <stefanr@s5r6.in-berlin.de>
-
-At least Maxtor OneTouch III require a "start stop unit" command after
-auto spin-down before the next access can proceed.  This patch activates
-the responsible code in scsi_mod for all Maxtor SBP-2 disks.
-https://bugzilla.novell.com/show_bug.cgi?id=183011
-
-Maybe that should be done for all SBP-2 disks, but better be cautious.
-
-Signed-off-by: Stefan Richter <stefanr@s5r6.in-berlin.de>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/ieee1394/sbp2.c |    3 +++
- 1 file changed, 3 insertions(+)
-
---- linux-2.6.17.7.orig/drivers/ieee1394/sbp2.c
-+++ linux-2.6.17.7/drivers/ieee1394/sbp2.c
-@@ -2541,6 +2541,9 @@ static int sbp2scsi_slave_configure(stru
-               sdev->skip_ms_page_8 = 1;
-       if (scsi_id->workarounds & SBP2_WORKAROUND_FIX_CAPACITY)
-               sdev->fix_capacity = 1;
-+      if (scsi_id->ne->guid_vendor_id == 0x0010b9 && /* Maxtor's OUI */
-+          (sdev->type == TYPE_DISK || sdev->type == TYPE_RBC))
-+              sdev->allow_restart = 1;
-       return 0;
- }
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:33:59 2006
-Message-Id: <20060804053359.837151169@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:12 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- Philipp Matthias Hahn <pmhahn@svs.Informatik.Uni-Oldenburg.de>
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- nfs@lists.sourceforge.net,
- Neil Brown <neilb@suse.de>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 14/23] Fix race related problem when adding items to and svcrpc auth cache.
-Content-Disposition: inline; filename=fix-race-related-problem-when-adding-items-to-and-svcrpc-auth-cache.patch
-Content-Length: 1467
-Lines: 53
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Neil Brown <neilb@suse.de>
-
-Fix race related problem when adding items to and svcrpc auth cache.
-
-If we don't find the item we are lookng for, we allocate a new one,
-and then grab the lock again and search to see if it has been added
-while we did the alloc.
-If it had been added we need to 'cache_put' the newly created item
-that we are never going to use.  But as it hasn't been initialised
-properly, putting it can cause an oops.
-
-So move the ->init call earlier to that it will always be fully
-initilised if we have to put it.
-
-Thanks to Philipp Matthias Hahn <pmhahn@svs.Informatik.Uni-Oldenburg.de>
-for reporting the problem.
-
-Signed-off-by: Neil Brown <neilb@suse.de>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
-
----
- net/sunrpc/cache.c |    6 +++++-
- 1 file changed, 5 insertions(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/net/sunrpc/cache.c
-+++ linux-2.6.17.7/net/sunrpc/cache.c
-@@ -71,7 +71,12 @@ struct cache_head *sunrpc_cache_lookup(s
-       new = detail->alloc();
-       if (!new)
-               return NULL;
-+      /* must fully initialise 'new', else
-+       * we might get lose if we need to
-+       * cache_put it soon.
-+       */
-       cache_init(new);
-+      detail->init(new, key);
-       write_lock(&detail->hash_lock);
-@@ -85,7 +90,6 @@ struct cache_head *sunrpc_cache_lookup(s
-                       return tmp;
-               }
-       }
--      detail->init(new, key);
-       new->next = *head;
-       *head = new;
-       detail->entries++;
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:00 2006
-Message-Id: <20060804053359.978040272@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:13 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- torvalds@osdl.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- pbadari@us.ibm.com,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 15/23] ext3 -nobh option causes oops
-Content-Disposition: inline; filename=ext3-nobh-option-causes-oops.patch
-Content-Length: 1637
-Lines: 48
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Badari Pulavarty <pbadari@us.ibm.com>
-
-For files other than IFREG, nobh option doesn't make sense.  Modifications
-to them are journalled and needs buffer heads to do that.  Without this
-patch, we get kernel oops in page_buffers().
-
-Signed-off-by: Badari Pulavarty <pbadari@us.ibm.com>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/ext3/inode.c |    6 +++---
- 1 file changed, 3 insertions(+), 3 deletions(-)
-
---- linux-2.6.17.7.orig/fs/ext3/inode.c
-+++ linux-2.6.17.7/fs/ext3/inode.c
-@@ -1159,7 +1159,7 @@ retry:
-               ret = PTR_ERR(handle);
-               goto out;
-       }
--      if (test_opt(inode->i_sb, NOBH))
-+      if (test_opt(inode->i_sb, NOBH) && ext3_should_writeback_data(inode))
-               ret = nobh_prepare_write(page, from, to, ext3_get_block);
-       else
-               ret = block_prepare_write(page, from, to, ext3_get_block);
-@@ -1245,7 +1245,7 @@ static int ext3_writeback_commit_write(s
-       if (new_i_size > EXT3_I(inode)->i_disksize)
-               EXT3_I(inode)->i_disksize = new_i_size;
--      if (test_opt(inode->i_sb, NOBH))
-+      if (test_opt(inode->i_sb, NOBH) && ext3_should_writeback_data(inode))
-               ret = nobh_commit_write(file, page, from, to);
-       else
-               ret = generic_commit_write(file, page, from, to);
-@@ -1495,7 +1495,7 @@ static int ext3_writeback_writepage(stru
-               goto out_fail;
-       }
--      if (test_opt(inode->i_sb, NOBH))
-+      if (test_opt(inode->i_sb, NOBH) && ext3_should_writeback_data(inode))
-               ret = nobh_writepage(page, ext3_get_block, wbc);
-       else
-               ret = block_write_full_page(page, ext3_get_block, wbc);
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:00 2006
-Message-Id: <20060804053400.120163577@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:14 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- torvalds@osdl.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- jack@suse.cz,
- esandeen@redhat.com,
- neilb@suse.de,
- Marcel Holtmann <marcel@holtmann.org>,
- "Stephen C. Tweedie" <sct@redhat.com>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 16/23] ext3: avoid triggering ext3_error on bad NFS file handle
-Content-Disposition: inline; filename=ext3-avoid-triggering-ext3_error-on-bad-nfs-file-handle.patch
-Content-Length: 3529
-Lines: 104
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Neil Brown <neilb@suse.de>
-
-The inode number out of an NFS file handle gets passed eventually to
-ext3_get_inode_block() without any checking.  If ext3_get_inode_block()
-allows it to trigger an error, then bad filehandles can have unpleasant
-effect - ext3_error() will usually cause a forced read-only remount, or a
-panic if `errors=panic' was used.
-
-So remove the call to ext3_error there and put a matching check in
-ext3/namei.c where inode numbers are read off storage.
-
-[akpm@osdl.org: fix off-by-one error]
-Signed-off-by: Neil Brown <neilb@suse.de>
-Signed-off-by: Jan Kara <jack@suse.cz>
-Cc: Marcel Holtmann <marcel@holtmann.org>
-Cc: "Stephen C. Tweedie" <sct@redhat.com>
-Cc: Eric Sandeen <esandeen@redhat.com>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/ext3/inode.c         |   13 +++++++------
- fs/ext3/namei.c         |   15 +++++++++++++--
- include/linux/ext3_fs.h |    9 +++++++++
- 3 files changed, 29 insertions(+), 8 deletions(-)
-
---- linux-2.6.17.7.orig/fs/ext3/inode.c
-+++ linux-2.6.17.7/fs/ext3/inode.c
-@@ -2402,14 +2402,15 @@ static unsigned long ext3_get_inode_bloc
-       struct buffer_head *bh;
-       struct ext3_group_desc * gdp;
--
--      if ((ino != EXT3_ROOT_INO && ino != EXT3_JOURNAL_INO &&
--              ino != EXT3_RESIZE_INO && ino < EXT3_FIRST_INO(sb)) ||
--              ino > le32_to_cpu(EXT3_SB(sb)->s_es->s_inodes_count)) {
--              ext3_error(sb, "ext3_get_inode_block",
--                          "bad inode number: %lu", ino);
-+      if (!ext3_valid_inum(sb, ino)) {
-+              /*
-+               * This error is already checked for in namei.c unless we are
-+               * looking at an NFS filehandle, in which case no error
-+               * report is needed
-+               */
-               return 0;
-       }
-+
-       block_group = (ino - 1) / EXT3_INODES_PER_GROUP(sb);
-       if (block_group >= EXT3_SB(sb)->s_groups_count) {
-               ext3_error(sb,"ext3_get_inode_block","group >= groups count");
---- linux-2.6.17.7.orig/fs/ext3/namei.c
-+++ linux-2.6.17.7/fs/ext3/namei.c
-@@ -1000,7 +1000,12 @@ static struct dentry *ext3_lookup(struct
-       if (bh) {
-               unsigned long ino = le32_to_cpu(de->inode);
-               brelse (bh);
--              inode = iget(dir->i_sb, ino);
-+              if (!ext3_valid_inum(dir->i_sb, ino)) {
-+                      ext3_error(dir->i_sb, "ext3_lookup",
-+                                 "bad inode number: %lu", ino);
-+                      inode = NULL;
-+              } else
-+                      inode = iget(dir->i_sb, ino);
-               if (!inode)
-                       return ERR_PTR(-EACCES);
-@@ -1028,7 +1033,13 @@ struct dentry *ext3_get_parent(struct de
-               return ERR_PTR(-ENOENT);
-       ino = le32_to_cpu(de->inode);
-       brelse(bh);
--      inode = iget(child->d_inode->i_sb, ino);
-+
-+      if (!ext3_valid_inum(child->d_inode->i_sb, ino)) {
-+              ext3_error(child->d_inode->i_sb, "ext3_get_parent",
-+                         "bad inode number: %lu", ino);
-+              inode = NULL;
-+      } else
-+              inode = iget(child->d_inode->i_sb, ino);
-       if (!inode)
-               return ERR_PTR(-EACCES);
---- linux-2.6.17.7.orig/include/linux/ext3_fs.h
-+++ linux-2.6.17.7/include/linux/ext3_fs.h
-@@ -495,6 +495,15 @@ static inline struct ext3_inode_info *EX
- {
-       return container_of(inode, struct ext3_inode_info, vfs_inode);
- }
-+
-+static inline int ext3_valid_inum(struct super_block *sb, unsigned long ino)
-+{
-+      return ino == EXT3_ROOT_INO ||
-+              ino == EXT3_JOURNAL_INO ||
-+              ino == EXT3_RESIZE_INO ||
-+              (ino >= EXT3_FIRST_INO(sb) &&
-+               ino <= le32_to_cpu(EXT3_SB(sb)->s_es->s_inodes_count));
-+}
- #else
- /* Assume that user mode programs are passing in an ext3fs superblock, not
-  * a kernel struct super_block.  This will allow us to call the feature-test
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:00 2006
-Message-Id: <20060804053400.261811336@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:15 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Auke Kok <auke-jan.h.kok@intel.com>,
- NetDev <netdev@vger.kernel.org>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 17/23] e1000: add forgotten PCI ID for supported device
-Content-Disposition: inline; filename=e1000-add-forgotten-pci-id-for-supported-device.patch
-Content-Length: 1439
-Lines: 39
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Auke Kok <auke-jan.h.kok@intel.com>
-
-The Intel(R) PRO/1000 82572EI card is fully supported by 7.0.33-k2 and
-onward.  Add the device ID so this card works with 2.6.17.y onward. This
-device ID was accidentally omitted.
-
-Signed-off-by: Auke Kok <auke-jan.h.kok@intel.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/net/e1000/e1000_hw.c |    1 +
- drivers/net/e1000/e1000_hw.h |    1 +
- 2 files changed, 2 insertions(+)
-
---- linux-2.6.17.7.orig/drivers/net/e1000/e1000_hw.c
-+++ linux-2.6.17.7/drivers/net/e1000/e1000_hw.c
-@@ -353,6 +353,7 @@ e1000_set_mac_type(struct e1000_hw *hw)
-     case E1000_DEV_ID_82572EI_COPPER:
-     case E1000_DEV_ID_82572EI_FIBER:
-     case E1000_DEV_ID_82572EI_SERDES:
-+    case E1000_DEV_ID_82572EI:
-         hw->mac_type = e1000_82572;
-         break;
-     case E1000_DEV_ID_82573E:
---- linux-2.6.17.7.orig/drivers/net/e1000/e1000_hw.h
-+++ linux-2.6.17.7/drivers/net/e1000/e1000_hw.h
-@@ -462,6 +462,7 @@ int32_t e1000_check_phy_reset_block(stru
- #define E1000_DEV_ID_82572EI_COPPER      0x107D
- #define E1000_DEV_ID_82572EI_FIBER       0x107E
- #define E1000_DEV_ID_82572EI_SERDES      0x107F
-+#define E1000_DEV_ID_82572EI             0x10B9
- #define E1000_DEV_ID_82573E              0x108B
- #define E1000_DEV_ID_82573E_IAMT         0x108C
- #define E1000_DEV_ID_82573L              0x109A
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:00 2006
-Message-Id: <20060804053400.405036929@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:16 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Ingo Molnar <mingo@elte.hu>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 18/23] cond_resched() fix
-Content-Disposition: inline; filename=cond_resched-fix.patch
-Content-Length: 3212
-Lines: 121
-
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Andrew Morton <akpm@osdl.org>
-
-[PATCH] cond_resched() fix
-
-Fix a bug identified by Zou Nan hai <nanhai.zou@intel.com>:
-
-If the system is in state SYSTEM_BOOTING, and need_resched() is true,
-cond_resched() returns true even though it didn't reschedule.  Consequently
-need_resched() remains true and JBD locks up.
-
-Fix that by teaching cond_resched() to only return true if it really did call
-schedule().
-
-cond_resched_lock() and cond_resched_softirq() have a problem too.  If we're
-in SYSTEM_BOOTING state and need_resched() is true, these functions will drop
-the lock and will then try to call schedule(), but the SYSTEM_BOOTING state
-will prevent schedule() from being called.  So on return, need_resched() will
-still be true, but cond_resched_lock() has to return 1 to tell the caller that
-the lock was dropped.  The caller will probably lock up.
-
-Bottom line: if these functions dropped the lock, they _must_ call schedule()
-to clear need_resched().   Make it so.
-
-Also, uninline __cond_resched().  It's largeish, and slowpath.
-
-Acked-by: Ingo Molnar <mingo@elte.hu>
-Signed-off-by: Andrew Morton <akpm@osdl.org>
-Signed-off-by: Linus Torvalds <torvalds@osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- kernel/sched.c |   25 +++++++++++++------------
- 1 file changed, 13 insertions(+), 12 deletions(-)
-
---- linux-2.6.17.7.orig/kernel/sched.c
-+++ linux-2.6.17.7/kernel/sched.c
-@@ -4044,17 +4044,22 @@ asmlinkage long sys_sched_yield(void)
-       return 0;
- }
--static inline void __cond_resched(void)
-+static inline int __resched_legal(int expected_preempt_count)
-+{
-+      if (unlikely(preempt_count() != expected_preempt_count))
-+              return 0;
-+      if (unlikely(system_state != SYSTEM_RUNNING))
-+              return 0;
-+      return 1;
-+}
-+
-+static void __cond_resched(void)
- {
-       /*
-        * The BKS might be reacquired before we have dropped
-        * PREEMPT_ACTIVE, which could trigger a second
-        * cond_resched() call.
-        */
--      if (unlikely(preempt_count()))
--              return;
--      if (unlikely(system_state != SYSTEM_RUNNING))
--              return;
-       do {
-               add_preempt_count(PREEMPT_ACTIVE);
-               schedule();
-@@ -4064,13 +4069,12 @@ static inline void __cond_resched(void)
- int __sched cond_resched(void)
- {
--      if (need_resched()) {
-+      if (need_resched() && __resched_legal(0)) {
-               __cond_resched();
-               return 1;
-       }
-       return 0;
- }
--
- EXPORT_SYMBOL(cond_resched);
- /*
-@@ -4091,7 +4095,7 @@ int cond_resched_lock(spinlock_t *lock)
-               ret = 1;
-               spin_lock(lock);
-       }
--      if (need_resched()) {
-+      if (need_resched() && __resched_legal(1)) {
-               _raw_spin_unlock(lock);
-               preempt_enable_no_resched();
-               __cond_resched();
-@@ -4100,14 +4104,13 @@ int cond_resched_lock(spinlock_t *lock)
-       }
-       return ret;
- }
--
- EXPORT_SYMBOL(cond_resched_lock);
- int __sched cond_resched_softirq(void)
- {
-       BUG_ON(!in_softirq());
--      if (need_resched()) {
-+      if (need_resched() && __resched_legal(0)) {
-               __local_bh_enable();
-               __cond_resched();
-               local_bh_disable();
-@@ -4115,10 +4118,8 @@ int __sched cond_resched_softirq(void)
-       }
-       return 0;
- }
--
- EXPORT_SYMBOL(cond_resched_softirq);
--
- /**
-  * yield - yield the current processor to other threads.
-  *
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:00 2006
-Message-Id: <20060804053400.546308576@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:17 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- Arjan van de Ven <arjan@infradead.org>
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- David Lang <dlang@digitalinsight.com>,
- Andrew de Quincey <adq_dvb@lidskialf.net>,
- Michael Krufky <mkrufky@linuxtv.org>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 19/23] Fix budget-av compile failure
-Content-Disposition: inline; filename=fix-budget-av-compile-failure.patch
-Content-Length: 2143
-Lines: 61
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Andrew de Quincey <adq_dvb@lidskialf.net>
-
-Currently I am doing lots of refactoring work in the dvb tree. This
-bugfix became necessary to fix 2.6.17 whilst I was in the middle of this
-work. Unfortunately after I tested the original code for the patch, I
-generated the diff against the wrong tree (I accidentally used a tree
-with part of the refactoring code in it). This resulted in the reported
-compile errors because that tree (a) was incomplete, and (b) used
-features which are simply not in the mainline kernel yet.
-
-Many apologies for the error and problems this has caused. :(
-
-Signed-off-by: Andrew de Quincey <adq_dvb@lidskialf.net>
-Signed-off-by: Michael Krufky <mkrufky@linuxtv.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/media/dvb/ttpci/budget-av.c |   10 +++++-----
- 1 file changed, 5 insertions(+), 5 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/media/dvb/ttpci/budget-av.c
-+++ linux-2.6.17.7/drivers/media/dvb/ttpci/budget-av.c
-@@ -58,6 +58,7 @@ struct budget_av {
-       struct tasklet_struct ciintf_irq_tasklet;
-       int slot_status;
-       struct dvb_ca_en50221 ca;
-+      u8 reinitialise_demod:1;
- };
- /* GPIO Connections:
-@@ -214,8 +215,9 @@ static int ciintf_slot_reset(struct dvb_
-       while (--timeout > 0 && ciintf_read_attribute_mem(ca, slot, 0) != 0x1d)
-               msleep(100);
--      /* reinitialise the frontend */
--      dvb_frontend_reinitialise(budget_av->budget.dvb_frontend);
-+      /* reinitialise the frontend if necessary */
-+      if (budget_av->reinitialise_demod)
-+              dvb_frontend_reinitialise(budget_av->budget.dvb_frontend);
-       if (timeout <= 0)
-       {
-@@ -1064,12 +1066,10 @@ static void frontend_init(struct budget_
-               fe = tda10021_attach(&philips_cu1216_config,
-                                    &budget_av->budget.i2c_adap,
-                                    read_pwm(budget_av));
--              if (fe) {
--                      fe->ops.tuner_ops.set_params = philips_cu1216_tuner_set_params;
--              }
-               break;
-       case SUBID_DVBC_KNC1_PLUS:
-+              budget_av->reinitialise_demod = 1;
-               fe = tda10021_attach(&philips_cu1216_config,
-                                    &budget_av->budget.i2c_adap,
-                                    read_pwm(budget_av));
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:00 2006
-Message-Id: <20060804053400.687529173@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:18 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Martin Schwidefsky <schwidefsky@de.ibm.com>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 20/23] S390: fix futex_atomic_cmpxchg_inatomic
-Content-Disposition: inline; filename=s390-fix-futex_atomic_cmpxchg_inatomic.patch
-Content-Length: 1027
-Lines: 35
-
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-[S390] fix futex_atomic_cmpxchg_inatomic
-
-futex_atomic_cmpxchg_inatomic has the same bug as the other
-atomic futex operations: the operation needs to be done in the
-user address space, not the kernel address space. Add the missing
-sacf 256 & sacf 0.
-
-Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- include/asm-s390/futex.h |    5 +++--
- 1 file changed, 3 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/include/asm-s390/futex.h
-+++ linux-2.6.17.7/include/asm-s390/futex.h
-@@ -98,9 +98,10 @@ futex_atomic_cmpxchg_inatomic(int __user
-       if (! access_ok (VERIFY_WRITE, uaddr, sizeof(int)))
-               return -EFAULT;
--      asm volatile("   cs   %1,%4,0(%5)\n"
-+      asm volatile("   sacf 256\n"
-+                   "   cs   %1,%4,0(%5)\n"
-                    "0: lr   %0,%1\n"
--                   "1:\n"
-+                   "1: sacf 0\n"
- #ifndef __s390x__
-                    ".section __ex_table,\"a\"\n"
-                    "   .align 4\n"
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:00 2006
-Message-Id: <20060804053400.828805318@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:19 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Paul Fulghum <paulkf@microgate.com>,
- Alan Cox <alan@redhat.com>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 21/23] tty serialize flush_to_ldisc
-Content-Disposition: inline; filename=tty-serialize-flush_to_ldisc.patch
-Content-Length: 1702
-Lines: 58
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Paul Fulghum <paulkf@microgate.com>
-
-Serialize processing of tty buffers in flush_to_ldisc
-to fix (very rare) corruption of tty buffer free list
-on SMP systems.
-
-Signed-off-by: Paul Fulghum <paulkf@microgate.com>
-Acked-by: Alan Cox <alan@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
-
----
- drivers/char/tty_io.c |   14 +++++++++-----
- 1 file changed, 9 insertions(+), 5 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/char/tty_io.c
-+++ linux-2.6.17.7/drivers/char/tty_io.c
-@@ -2776,7 +2776,7 @@ static void flush_to_ldisc(void *private
-       struct tty_struct *tty = (struct tty_struct *) private_;
-       unsigned long   flags;
-       struct tty_ldisc *disc;
--      struct tty_buffer *tbuf;
-+      struct tty_buffer *tbuf, *head;
-       int count;
-       char *char_buf;
-       unsigned char *flag_buf;
-@@ -2793,7 +2793,9 @@ static void flush_to_ldisc(void *private
-               goto out;
-       }
-       spin_lock_irqsave(&tty->buf.lock, flags);
--      while((tbuf = tty->buf.head) != NULL) {
-+      head = tty->buf.head;
-+      tty->buf.head = NULL;
-+      while((tbuf = head) != NULL) {
-               while ((count = tbuf->commit - tbuf->read) != 0) {
-                       char_buf = tbuf->char_buf_ptr + tbuf->read;
-                       flag_buf = tbuf->flag_buf_ptr + tbuf->read;
-@@ -2802,10 +2804,12 @@ static void flush_to_ldisc(void *private
-                       disc->receive_buf(tty, char_buf, flag_buf, count);
-                       spin_lock_irqsave(&tty->buf.lock, flags);
-               }
--              if (tbuf->active)
-+              if (tbuf->active) {
-+                      tty->buf.head = head;
-                       break;
--              tty->buf.head = tbuf->next;
--              if (tty->buf.head == NULL)
-+              }
-+              head = tbuf->next;
-+              if (head == NULL)
-                       tty->buf.tail = NULL;
-               tty_buffer_free(tty, tbuf);
-       }
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:01 2006
-Message-Id: <20060804053400.968206560@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:20 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org,
- Andrew Morton <akpm@osdl.org>
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Steven Rostedt <rostedt@goodmis.org>,
- Chris Wright <chrisw@sous-sol.org>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 22/23] Add stable branch to maintainers file
-Content-Disposition: inline; filename=add-stable-branch-to-maintainers-file.patch
-Content-Length: 1134
-Lines: 40
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Steven Rostedt <rostedt@goodmis.org>
-
-While helping someone to submit a patch to the stable branch, I noticed
-that the stable branch is not listed in the MAINTAINERS file.  This was
-after I went there to look for the email addresses for the stable branch
-list (stable@kernel.org).
-
-This patch adds the stable branch to the maintainers file so that people
-can find where to send patches when they have a fix for the stable team.
-
-Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
-Signed-off-by: Chris Wright <chrisw@sous-sol.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- MAINTAINERS |    8 ++++++++
- 1 file changed, 8 insertions(+)
-
---- linux-2.6.17.7.orig/MAINTAINERS
-+++ linux-2.6.17.7/MAINTAINERS
-@@ -2572,6 +2572,14 @@ M:      dbrownell@users.sourceforge.net
- L:    spi-devel-general@lists.sourceforge.net
- S:    Maintained
-+STABLE BRANCH:
-+P:    Greg Kroah-Hartman
-+M:    greg@kroah.com
-+P:    Chris Wright
-+M:    chrisw@sous-sol.org
-+L:    stable@kernel.org
-+S:    Maintained
-+
- TPM DEVICE DRIVER
- P:    Kylene Hall
- M:    kjhall@us.ibm.com
-
---
-
-From greg@quad.kroah.org Thu Aug  3 22:34:01 2006
-Message-Id: <20060804053401.109058817@quad.kroah.org>
-References: <20060804053258.391158155@quad.kroah.org>
-User-Agent: quilt/0.45-1
-Date: Thu, 03 Aug 2006 22:33:21 -0700
-From: Greg KH <gregkh@suse.de>
-To: linux-kernel@vger.kernel.org,
- stable@kernel.org
-Cc: Justin Forbes <jmforbes@linuxtx.org>,
- Zwane Mwaikambo <zwane@arm.linux.org.uk>,
- Theodore Ts'o <tytso@mit.edu>,
- Randy Dunlap <rdunlap@xenotime.net>,
- Dave Jones <davej@redhat.com>,
- Chuck Wolber <chuckw@quantumlinux.com>,
- Chris Wedgwood <reviews@ml.cw.f00f.org>,
- torvalds@osdl.org,
- akpm@osdl.org,
- alan@lxorguk.ukuu.org.uk,
- Marcel Holtmann <marcel@holtmann.org>,
- Neil Brown <neilb@suse.de>,
- Greg Kroah-Hartman <gregkh@suse.de>
-Subject: [patch 23/23] Have ext2 reject file handles with bad inode numbers early.
-Content-Disposition: inline; filename=have-ext2-reject-file-handles-with-bad-inode-numbers-early.patch
-Content-Length: 2019
-Lines: 75
-
--stable review patch.  If anyone has any objections, please let us know.
-
-------------------
-From: Neil Brown <neilb@suse.de>
-
-This prevents bad inode numbers from triggering errors in
-ext2_get_inode.
-
-
-Signed-off-by: Neil Brown <neilb@suse.de>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- fs/ext2/super.c |   41 +++++++++++++++++++++++++++++++++++++++++
- 1 file changed, 41 insertions(+)
-
---- linux-2.6.17.7.orig/fs/ext2/super.c
-+++ linux-2.6.17.7/fs/ext2/super.c
-@@ -252,6 +252,46 @@ static struct super_operations ext2_sops
- #endif
- };
-+static struct dentry *ext2_get_dentry(struct super_block *sb, void *vobjp)
-+{
-+      __u32 *objp = vobjp;
-+      unsigned long ino = objp[0];
-+      __u32 generation = objp[1];
-+      struct inode *inode;
-+      struct dentry *result;
-+
-+      if (ino != EXT2_ROOT_INO && ino < EXT2_FIRST_INO(sb))
-+              return ERR_PTR(-ESTALE);
-+      if (ino > le32_to_cpu(EXT2_SB(sb)->s_es->s_inodes_count))
-+              return ERR_PTR(-ESTALE);
-+
-+      /* iget isn't really right if the inode is currently unallocated!!
-+       * ext2_read_inode currently does appropriate checks, but
-+       * it might be "neater" to call ext2_get_inode first and check
-+       * if the inode is valid.....
-+       */
-+      inode = iget(sb, ino);
-+      if (inode == NULL)
-+              return ERR_PTR(-ENOMEM);
-+      if (is_bad_inode(inode)
-+          || (generation && inode->i_generation != generation)
-+              ) {
-+              /* we didn't find the right inode.. */
-+              iput(inode);
-+              return ERR_PTR(-ESTALE);
-+      }
-+      /* now to find a dentry.
-+       * If possible, get a well-connected one
-+       */
-+      result = d_alloc_anon(inode);
-+      if (!result) {
-+              iput(inode);
-+              return ERR_PTR(-ENOMEM);
-+      }
-+      return result;
-+}
-+
-+
- /* Yes, most of these are left as NULL!!
-  * A NULL value implies the default, which works with ext2-like file
-  * systems, but can be improved upon.
-@@ -259,6 +299,7 @@ static struct super_operations ext2_sops
-  */
- static struct export_operations ext2_export_ops = {
-       .get_parent = ext2_get_parent,
-+      .get_dentry = ext2_get_dentry,
- };
- static unsigned long get_sb_block(void **data)
-
---
-
diff --git a/review-2.6.17/pci-fix-issues-with-extended-conf-space-when-mmconfig-disabled-because-of-e820.patch b/review-2.6.17/pci-fix-issues-with-extended-conf-space-when-mmconfig-disabled-because-of-e820.patch
deleted file mode 100644 (file)
index ed8eea7..0000000
+++ /dev/null
@@ -1,108 +0,0 @@
-From ead2bfeb7f739d2ad6e09dc1343f0da51feb7f51 Mon Sep 17 00:00:00 2001
-From: Chuck Ebbert <76306.1226@compuserve.com>
-Date: Thu, 15 Jun 2006 04:41:52 -0400
-Subject: PCI: fix issues with extended conf space when MMCONFIG disabled because of e820
-
-From: Chuck Ebbert <76306.1226@compuserve.com>
-
-On 15 Jun 2006 03:45:10 +0200, Andi Kleen wrote:
-> Anyways I would say that if the BIOS can't get MCFG right then
-> it's likely not been validated on that board and shouldn't be used.
-
-According to Petr Vandrovec:
-
- ... "What is important (and checked) is address of MMCONFIG reported by MCFG
- table...  Unfortunately code does not bother with printing that address :-(
-
- "Another problem is that code has hardcoded that MMCONFIG area is 256MB large.
- Unfortunately for the code PCI specification allows any power of two between 2MB
- and 256MB if vendor knows that such amount of busses (from 2 to 128) will be
- sufficient for system.  With notebook it is quite possible that not full 8 bits
- are implemented for MMCONFIG bus number."
-
-So here is a patch.  Unfortunately my system still fails the test because
-it doesn't reserve any part of the MMCONFIG area, but this may fix others.
-
-Booted on x86_64, only compiled on i386.  x86_64 still remaps the max area
-(256MB) even though only 2MB is checked... but 2.6.16 had no check at all
-so it is still better.
-
-PCI: reduce size of x86 MMCONFIG reserved area check
-
-1.  Print the address of the MMCONFIG area when the test for that area
-    being reserved fails.
-
-2.  Only check if the first 2MB is reserved, as that is the minimum.
-
-Signed-off-by: Chuck Ebbert <76306.1226@compuserve.com>
-Acked-by: Arjan van de Ven <arjan@linux.intel.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-Signed-off-by: Chris Wright <chrisw@sous-sol.org>
----
- arch/i386/pci/mmconfig.c   |    9 ++++++---
- arch/x86_64/pci/mmconfig.c |   13 +++++++++----
- 2 files changed, 15 insertions(+), 7 deletions(-)
-
---- linux-2.6.17.7.orig/arch/i386/pci/mmconfig.c
-+++ linux-2.6.17.7/arch/i386/pci/mmconfig.c
-@@ -15,7 +15,9 @@
- #include <asm/e820.h>
- #include "pci.h"
--#define MMCONFIG_APER_SIZE (256*1024*1024)
-+/* aperture is up to 256MB but BIOS may reserve less */
-+#define MMCONFIG_APER_MIN     (2 * 1024*1024)
-+#define MMCONFIG_APER_MAX     (256 * 1024*1024)
- /* Assume systems with more busses have correct MCFG */
- #define MAX_CHECK_BUS 16
-@@ -197,9 +199,10 @@ void __init pci_mmcfg_init(void)
-               return;
-       if (!e820_all_mapped(pci_mmcfg_config[0].base_address,
--                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_SIZE,
-+                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_MIN,
-                       E820_RESERVED)) {
--              printk(KERN_ERR "PCI: BIOS Bug: MCFG area is not E820-reserved\n");
-+              printk(KERN_ERR "PCI: BIOS Bug: MCFG area at %x is not E820-reserved\n",
-+                              pci_mmcfg_config[0].base_address);
-               printk(KERN_ERR "PCI: Not using MMCONFIG.\n");
-               return;
-       }
---- linux-2.6.17.7.orig/arch/x86_64/pci/mmconfig.c
-+++ linux-2.6.17.7/arch/x86_64/pci/mmconfig.c
-@@ -13,7 +13,10 @@
- #include "pci.h"
--#define MMCONFIG_APER_SIZE (256*1024*1024)
-+/* aperture is up to 256MB but BIOS may reserve less */
-+#define MMCONFIG_APER_MIN     (2 * 1024*1024)
-+#define MMCONFIG_APER_MAX     (256 * 1024*1024)
-+
- /* Verify the first 16 busses. We assume that systems with more busses
-    get MCFG right. */
- #define MAX_CHECK_BUS 16
-@@ -175,9 +178,10 @@ void __init pci_mmcfg_init(void)
-               return;
-       if (!e820_all_mapped(pci_mmcfg_config[0].base_address,
--                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_SIZE,
-+                      pci_mmcfg_config[0].base_address + MMCONFIG_APER_MIN,
-                       E820_RESERVED)) {
--              printk(KERN_ERR "PCI: BIOS Bug: MCFG area is not E820-reserved\n");
-+              printk(KERN_ERR "PCI: BIOS Bug: MCFG area at %x is not E820-reserved\n",
-+                              pci_mmcfg_config[0].base_address);
-               printk(KERN_ERR "PCI: Not using MMCONFIG.\n");
-               return;
-       }
-@@ -190,7 +194,8 @@ void __init pci_mmcfg_init(void)
-       }
-       for (i = 0; i < pci_mmcfg_config_num; ++i) {
-               pci_mmcfg_virt[i].cfg = &pci_mmcfg_config[i];
--              pci_mmcfg_virt[i].virt = ioremap_nocache(pci_mmcfg_config[i].base_address, MMCONFIG_APER_SIZE);
-+              pci_mmcfg_virt[i].virt = ioremap_nocache(pci_mmcfg_config[i].base_address,
-+                                                       MMCONFIG_APER_MAX);
-               if (!pci_mmcfg_virt[i].virt) {
-                       printk("PCI: Cannot map mmconfig aperture for segment %d\n",
-                              pci_mmcfg_config[i].pci_segment_group_number);
diff --git a/review-2.6.17/s390-fix-futex_atomic_cmpxchg_inatomic.patch b/review-2.6.17/s390-fix-futex_atomic_cmpxchg_inatomic.patch
deleted file mode 100644 (file)
index cf3bc23..0000000
+++ /dev/null
@@ -1,36 +0,0 @@
-From foo@baz Tue Apr  9 12:12:43 2002
-Date: Wed, Jul 12 16:39:55 2006 +0200
-To: Greg KH <greg@kroah.com>
-From: Martin Schwidefsky <schwidefsky@de.ibm.com>
-Subject: S390: fix futex_atomic_cmpxchg_inatomic
-
-
-[S390] fix futex_atomic_cmpxchg_inatomic
-
-futex_atomic_cmpxchg_inatomic has the same bug as the other
-atomic futex operations: the operation needs to be done in the
-user address space, not the kernel address space. Add the missing
-sacf 256 & sacf 0.
-
-Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- include/asm-s390/futex.h |    5 +++--
- 1 file changed, 3 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/include/asm-s390/futex.h
-+++ linux-2.6.17.7/include/asm-s390/futex.h
-@@ -98,9 +98,10 @@ futex_atomic_cmpxchg_inatomic(int __user
-       if (! access_ok (VERIFY_WRITE, uaddr, sizeof(int)))
-               return -EFAULT;
--      asm volatile("   cs   %1,%4,0(%5)\n"
-+      asm volatile("   sacf 256\n"
-+                   "   cs   %1,%4,0(%5)\n"
-                    "0: lr   %0,%1\n"
--                   "1:\n"
-+                   "1: sacf 0\n"
- #ifndef __s390x__
-                    ".section __ex_table,\"a\"\n"
-                    "   .align 4\n"
diff --git a/review-2.6.17/series b/review-2.6.17/series
deleted file mode 100644 (file)
index 2454b1b..0000000
+++ /dev/null
@@ -1,23 +0,0 @@
-pci-fix-issues-with-extended-conf-space-when-mmconfig-disabled-because-of-e820.patch
-don-t-allow-chmod-on-the-proc-pid-files.patch
-h.323-helper-fix-possible-null-ptr-dereference.patch
-i2c-01-scx200_acb-fix-state-machine.patch
-i2c-02-scx200_acb-fix-block-transactions.patch
-i2c-03-fix-ignore-module-parameter-handling.patch
-sky2-napi-bug.patch
-uhci-fix-handling-of-short-last-packet.patch
-update-frag_list-in-pskb_trim.patch
-vlan-state-handling-fix.patch
-sparc64-quad-float-emulation-fix.patch
-invalidate_bdev-speedup.patch
-ieee1394-sbp2-enable-auto-spin-up-for-maxtor-disks.patch
-fix-race-related-problem-when-adding-items-to-and-svcrpc-auth-cache.patch
-ext3-nobh-option-causes-oops.patch
-ext3-avoid-triggering-ext3_error-on-bad-nfs-file-handle.patch
-e1000-add-forgotten-pci-id-for-supported-device.patch
-cond_resched-fix.patch
-fix-budget-av-compile-failure.patch
-s390-fix-futex_atomic_cmpxchg_inatomic.patch
-tty-serialize-flush_to_ldisc.patch
-add-stable-branch-to-maintainers-file.patch
-alsa-don-t-reject-o_rdwr-at-opening-pcm-oss.patch
diff --git a/review-2.6.17/sky2-napi-bug.patch b/review-2.6.17/sky2-napi-bug.patch
deleted file mode 100644 (file)
index 4b16617..0000000
+++ /dev/null
@@ -1,41 +0,0 @@
-From stable-bounces@linux.kernel.org Mon Jul 17 10:52:35 2006
-Date: Mon, 17 Jul 2006 13:51:50 -0400
-From: Stephen Hemminger <shemminger@osdl.org>
-To: stable@kernel.org
-Message-ID: <20060717135150.09aea07d@localhost.localdomain>
-Subject: sky2: NAPI bug
-
-From: Stephen Hemminger <shemminger@osdl.org>
-
-If the sky2 driver decides to defer processing because it's NAPI
-packet quota is done, then it won't correctly handle the rest
-when it is rescheduled.
-
-Signed-off-by: Stephen Hemminger <sch@sch-laptop.localdomain>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- drivers/net/sky2.c |    5 +----
- 1 file changed, 1 insertion(+), 4 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/net/sky2.c
-+++ linux-2.6.17.7/drivers/net/sky2.c
-@@ -2187,9 +2187,6 @@ static int sky2_poll(struct net_device *
-       int work_done = 0;
-       u32 status = sky2_read32(hw, B0_Y2_SP_EISR);
--      if (!~status)
--              goto out;
--
-       if (status & Y2_IS_HW_ERR)
-               sky2_hw_intr(hw);
-@@ -2226,7 +2223,7 @@ static int sky2_poll(struct net_device *
-       if (sky2_more_work(hw))
-               return 1;
--out:
-+
-       netif_rx_complete(dev0);
-       sky2_read32(hw, B0_Y2_SP_LISR);
diff --git a/review-2.6.17/sparc64-quad-float-emulation-fix.patch b/review-2.6.17/sparc64-quad-float-emulation-fix.patch
deleted file mode 100644 (file)
index 0373541..0000000
+++ /dev/null
@@ -1,35 +0,0 @@
-From stable-bounces@linux.kernel.org Thu Jul 27 17:03:23 2006
-Date: Thu, 27 Jul 2006 17:02:36 -0700 (PDT)
-Message-Id: <20060727.170236.92582647.davem@davemloft.net>
-To: stable@kernel.org
-From: David Miller <davem@davemloft.net>
-Subject: Sparc64 quad-float emulation fix
-
-From: David Miller <davem@davemloft.net>
-
-[SPARC64]: Fix quad-float multiply emulation.
-
-Something is wrong with the 3-multiply (vs. 4-multiply) optimized
-version of _FP_MUL_MEAT_2_*(), so just use the slower version
-which actually computes correct values.
-
-Noticed by Rene Rebe
-
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- include/asm-sparc64/sfp-machine.h |    2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- linux-2.6.17.7.orig/include/asm-sparc64/sfp-machine.h
-+++ linux-2.6.17.7/include/asm-sparc64/sfp-machine.h
-@@ -34,7 +34,7 @@
- #define _FP_MUL_MEAT_D(R,X,Y)                                 \
-   _FP_MUL_MEAT_1_wide(_FP_WFRACBITS_D,R,X,Y,umul_ppmm)
- #define _FP_MUL_MEAT_Q(R,X,Y)                                 \
--  _FP_MUL_MEAT_2_wide_3mul(_FP_WFRACBITS_Q,R,X,Y,umul_ppmm)
-+  _FP_MUL_MEAT_2_wide(_FP_WFRACBITS_Q,R,X,Y,umul_ppmm)
- #define _FP_DIV_MEAT_S(R,X,Y) _FP_DIV_MEAT_1_imm(S,R,X,Y,_FP_DIV_HELP_imm)
- #define _FP_DIV_MEAT_D(R,X,Y) _FP_DIV_MEAT_1_udiv_norm(D,R,X,Y)
diff --git a/review-2.6.17/tty-serialize-flush_to_ldisc.patch b/review-2.6.17/tty-serialize-flush_to_ldisc.patch
deleted file mode 100644 (file)
index 0be7e45..0000000
+++ /dev/null
@@ -1,63 +0,0 @@
-From paulkf@microgate.com Wed Jul 26 12:11:54 2006
-Subject: tty serialize flush_to_ldisc
-From: Paul Fulghum <paulkf@microgate.com>
-To: Greg KH <greg@kroah.com>
-Cc: Alan Cox <alan@lxorguk.ukuu.org.uk>,
-        Chuck Ebbert <76306.1226@compuserve.com>,
-        linux-stable <stable@kernel.org>
-Date: Wed, 26 Jul 2006 14:10:29 -0500
-Message-Id: <1153941029.6903.5.camel@amdx2.microgate.com>
-
-From: Paul Fulghum <paulkf@microgate.com>
-
-Serialize processing of tty buffers in flush_to_ldisc
-to fix (very rare) corruption of tty buffer free list
-on SMP systems.
-
-Signed-off-by: Paul Fulghum <paulkf@microgate.com>
-Acked-by: Alan Cox <alan@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
-
----
- drivers/char/tty_io.c |   14 +++++++++-----
- 1 file changed, 9 insertions(+), 5 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/char/tty_io.c
-+++ linux-2.6.17.7/drivers/char/tty_io.c
-@@ -2776,7 +2776,7 @@ static void flush_to_ldisc(void *private
-       struct tty_struct *tty = (struct tty_struct *) private_;
-       unsigned long   flags;
-       struct tty_ldisc *disc;
--      struct tty_buffer *tbuf;
-+      struct tty_buffer *tbuf, *head;
-       int count;
-       char *char_buf;
-       unsigned char *flag_buf;
-@@ -2793,7 +2793,9 @@ static void flush_to_ldisc(void *private
-               goto out;
-       }
-       spin_lock_irqsave(&tty->buf.lock, flags);
--      while((tbuf = tty->buf.head) != NULL) {
-+      head = tty->buf.head;
-+      tty->buf.head = NULL;
-+      while((tbuf = head) != NULL) {
-               while ((count = tbuf->commit - tbuf->read) != 0) {
-                       char_buf = tbuf->char_buf_ptr + tbuf->read;
-                       flag_buf = tbuf->flag_buf_ptr + tbuf->read;
-@@ -2802,10 +2804,12 @@ static void flush_to_ldisc(void *private
-                       disc->receive_buf(tty, char_buf, flag_buf, count);
-                       spin_lock_irqsave(&tty->buf.lock, flags);
-               }
--              if (tbuf->active)
-+              if (tbuf->active) {
-+                      tty->buf.head = head;
-                       break;
--              tty->buf.head = tbuf->next;
--              if (tty->buf.head == NULL)
-+              }
-+              head = tbuf->next;
-+              if (head == NULL)
-                       tty->buf.tail = NULL;
-               tty_buffer_free(tty, tbuf);
-       }
diff --git a/review-2.6.17/uhci-fix-handling-of-short-last-packet.patch b/review-2.6.17/uhci-fix-handling-of-short-last-packet.patch
deleted file mode 100644 (file)
index 71280e8..0000000
+++ /dev/null
@@ -1,49 +0,0 @@
-From stable-bounces@linux.kernel.org Mon Jul 24 09:07:30 2006
-Date: Mon, 24 Jul 2006 12:06:55 -0400 (EDT)
-From: Alan Stern <stern@rowland.harvard.edu>
-To: stable@kernel.org
-Message-ID: <Pine.LNX.4.44L0.0607241155180.15411-100000@iolanthe.rowland.org>
-Cc: Juan Pedro Paredes Caballero <juampe@iquis.com>, Duncan Sands <baldrick@free.fr>, Andrew Beverley <andy@andybev.com>
-Subject: UHCI: Fix handling of short last packet
-
-From: Alan Stern <stern@rowland.harvard.edu>
-
-This patch (as753) fixes the way uhci-hcd handles a short packet when it
-is the last packet of an URB.  Right now the driver handles short packets
-the same no matter when they occur.  However, the controller stops
-transferring packets when the short packet is not the last one (otherwise
-it would be reading beyond the end of the device's data) and needs to be
-restarted, whereas no such need occurs when the short packet is the last
-one.
-
-The result of the bug is that USB endpoint queues experience intermittent
-hangs, a regression in 2.6.17 with respect to earlier kernels.  The bug
-was raised in Bugzilla #6752 and this patch fixed it.
-
-Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
-
----
- drivers/usb/host/uhci-q.c |    6 ++++--
- 1 file changed, 4 insertions(+), 2 deletions(-)
-
---- linux-2.6.17.7.orig/drivers/usb/host/uhci-q.c
-+++ linux-2.6.17.7/drivers/usb/host/uhci-q.c
-@@ -896,12 +896,14 @@ static int uhci_result_common(struct uhc
-                       /*
-                        * This URB stopped short of its end.  We have to
-                        * fix up the toggles of the following URBs on the
--                       * queue and restart the queue.
-+                       * queue and restart the queue.  But only if this
-+                       * TD isn't the last one in the URB.
-                        *
-                        * Do this only the first time we encounter the
-                        * short URB.
-                        */
--                      if (!urbp->short_transfer) {
-+                      if (!urbp->short_transfer &&
-+                                      &td->list != urbp->td_list.prev) {
-                               urbp->short_transfer = 1;
-                               urbp->qh->initial_toggle =
-                                               uhci_toggle(td_token(td)) ^ 1;
diff --git a/review-2.6.17/update-frag_list-in-pskb_trim.patch b/review-2.6.17/update-frag_list-in-pskb_trim.patch
deleted file mode 100644 (file)
index 05eb650..0000000
+++ /dev/null
@@ -1,238 +0,0 @@
-From stable-bounces@linux.kernel.org Sun Jul 30 15:52:09 2006
-Date: Mon, 31 Jul 2006 08:50:37 +1000
-To: Greg KH <greg@kroah.com>
-Message-ID: <20060730225037.GA21685@gondor.apana.org.au>
-Content-Disposition: inline
-From: Herbert Xu <herbert@gondor.apana.org.au>
-Cc: netdev@vger.kernel.org, stable@kernel.org, David Miller <davem@davemloft.net>
-Subject: [NET]: Update frag_list in pskb_trim
-
-From: Herbert Xu <herbert@gondor.apana.org.au>
-
-[NET]: Update frag_list in pskb_trim
-
-When pskb_trim has to defer to ___pksb_trim to trim the frag_list part of
-the packet, the frag_list is not updated to reflect the trimming.  This
-will usually work fine until you hit something that uses the packet length
-or tail from the frag_list.
-
-Examples include esp_output and ip_fragment.
-
-Another problem caused by this is that you can end up with a linear packet
-with a frag_list attached.
-
-It is possible to get away with this if we audit everything to make sure
-that they always consult skb->len before going down onto frag_list.  In
-fact we can do the samething for the paged part as well to avoid copying
-the data area of the skb.  For now though, let's do the conservative fix
-and update frag_list.
-
-Many thanks to Marco Berizzi for helping me to track down this bug.
-
-This 4-year old bug took 3 months to track down.  Marco was very patient
-indeed :)
-
-Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- include/linux/skbuff.h |   24 +++++------
- net/core/skbuff.c      |  106 ++++++++++++++++++++++++++++++++++---------------
- 2 files changed, 86 insertions(+), 44 deletions(-)
-
---- linux-2.6.17.7.orig/include/linux/skbuff.h
-+++ linux-2.6.17.7/include/linux/skbuff.h
-@@ -967,15 +967,16 @@ static inline void skb_reserve(struct sk
- #define NET_SKB_PAD   16
- #endif
--extern int ___pskb_trim(struct sk_buff *skb, unsigned int len, int realloc);
-+extern int ___pskb_trim(struct sk_buff *skb, unsigned int len);
- static inline void __skb_trim(struct sk_buff *skb, unsigned int len)
- {
--      if (!skb->data_len) {
--              skb->len  = len;
--              skb->tail = skb->data + len;
--      } else
--              ___pskb_trim(skb, len, 0);
-+      if (unlikely(skb->data_len)) {
-+              WARN_ON(1);
-+              return;
-+      }
-+      skb->len  = len;
-+      skb->tail = skb->data + len;
- }
- /**
-@@ -985,6 +986,7 @@ static inline void __skb_trim(struct sk_
-  *
-  *    Cut the length of a buffer down by removing data from the tail. If
-  *    the buffer is already under the length specified it is not modified.
-+ *    The skb must be linear.
-  */
- static inline void skb_trim(struct sk_buff *skb, unsigned int len)
- {
-@@ -995,12 +997,10 @@ static inline void skb_trim(struct sk_bu
- static inline int __pskb_trim(struct sk_buff *skb, unsigned int len)
- {
--      if (!skb->data_len) {
--              skb->len  = len;
--              skb->tail = skb->data+len;
--              return 0;
--      }
--      return ___pskb_trim(skb, len, 1);
-+      if (skb->data_len)
-+              return ___pskb_trim(skb, len);
-+      __skb_trim(skb, len);
-+      return 0;
- }
- static inline int pskb_trim(struct sk_buff *skb, unsigned int len)
---- linux-2.6.17.7.orig/net/core/skbuff.c
-+++ linux-2.6.17.7/net/core/skbuff.c
-@@ -251,11 +251,11 @@ nodata:
- }
--static void skb_drop_fraglist(struct sk_buff *skb)
-+static void skb_drop_list(struct sk_buff **listp)
- {
--      struct sk_buff *list = skb_shinfo(skb)->frag_list;
-+      struct sk_buff *list = *listp;
--      skb_shinfo(skb)->frag_list = NULL;
-+      *listp = NULL;
-       do {
-               struct sk_buff *this = list;
-@@ -264,6 +264,11 @@ static void skb_drop_fraglist(struct sk_
-       } while (list);
- }
-+static inline void skb_drop_fraglist(struct sk_buff *skb)
-+{
-+      skb_drop_list(&skb_shinfo(skb)->frag_list);
-+}
-+
- static void skb_clone_fraglist(struct sk_buff *skb)
- {
-       struct sk_buff *list;
-@@ -802,49 +807,86 @@ struct sk_buff *skb_pad(struct sk_buff *
-       return nskb;
- }     
-  
--/* Trims skb to length len. It can change skb pointers, if "realloc" is 1.
-- * If realloc==0 and trimming is impossible without change of data,
-- * it is BUG().
-+/* Trims skb to length len. It can change skb pointers.
-  */
--int ___pskb_trim(struct sk_buff *skb, unsigned int len, int realloc)
-+int ___pskb_trim(struct sk_buff *skb, unsigned int len)
- {
-+      struct sk_buff **fragp;
-+      struct sk_buff *frag;
-       int offset = skb_headlen(skb);
-       int nfrags = skb_shinfo(skb)->nr_frags;
-       int i;
-+      int err;
--      for (i = 0; i < nfrags; i++) {
-+      if (skb_cloned(skb) &&
-+          unlikely((err = pskb_expand_head(skb, 0, 0, GFP_ATOMIC))))
-+              return err;
-+
-+      i = 0;
-+      if (offset >= len)
-+              goto drop_pages;
-+
-+      for (; i < nfrags; i++) {
-               int end = offset + skb_shinfo(skb)->frags[i].size;
--              if (end > len) {
--                      if (skb_cloned(skb)) {
--                              BUG_ON(!realloc);
--                              if (pskb_expand_head(skb, 0, 0, GFP_ATOMIC))
--                                      return -ENOMEM;
--                      }
--                      if (len <= offset) {
--                              put_page(skb_shinfo(skb)->frags[i].page);
--                              skb_shinfo(skb)->nr_frags--;
--                      } else {
--                              skb_shinfo(skb)->frags[i].size = len - offset;
--                      }
-+
-+              if (end < len) {
-+                      offset = end;
-+                      continue;
-+              }
-+
-+              skb_shinfo(skb)->frags[i++].size = len - offset;
-+
-+drop_pages:
-+              skb_shinfo(skb)->nr_frags = i;
-+
-+              for (; i < nfrags; i++)
-+                      put_page(skb_shinfo(skb)->frags[i].page);
-+
-+              if (skb_shinfo(skb)->frag_list)
-+                      skb_drop_fraglist(skb);
-+              goto done;
-+      }
-+
-+      for (fragp = &skb_shinfo(skb)->frag_list; (frag = *fragp);
-+           fragp = &frag->next) {
-+              int end = offset + frag->len;
-+
-+              if (skb_shared(frag)) {
-+                      struct sk_buff *nfrag;
-+
-+                      nfrag = skb_clone(frag, GFP_ATOMIC);
-+                      if (unlikely(!nfrag))
-+                              return -ENOMEM;
-+
-+                      nfrag->next = frag->next;
-+                      kfree_skb(frag);
-+                      frag = nfrag;
-+                      *fragp = frag;
-               }
--              offset = end;
-+
-+              if (end < len) {
-+                      offset = end;
-+                      continue;
-+              }
-+
-+              if (end > len &&
-+                  unlikely((err = pskb_trim(frag, len - offset))))
-+                      return err;
-+
-+              if (frag->next)
-+                      skb_drop_list(&frag->next);
-+              break;
-       }
--      if (offset < len) {
-+done:
-+      if (len > skb_headlen(skb)) {
-               skb->data_len -= skb->len - len;
-               skb->len       = len;
-       } else {
--              if (len <= skb_headlen(skb)) {
--                      skb->len      = len;
--                      skb->data_len = 0;
--                      skb->tail     = skb->data + len;
--                      if (skb_shinfo(skb)->frag_list && !skb_cloned(skb))
--                              skb_drop_fraglist(skb);
--              } else {
--                      skb->data_len -= skb->len - len;
--                      skb->len       = len;
--              }
-+              skb->len       = len;
-+              skb->data_len  = 0;
-+              skb->tail      = skb->data + len;
-       }
-       return 0;
diff --git a/review-2.6.17/vlan-state-handling-fix.patch b/review-2.6.17/vlan-state-handling-fix.patch
deleted file mode 100644 (file)
index 757ebc9..0000000
+++ /dev/null
@@ -1,48 +0,0 @@
-From stable-bounces@linux.kernel.org Mon Jul 24 13:54:38 2006
-Date: Mon, 24 Jul 2006 13:54:15 -0700 (PDT)
-Message-Id: <20060724.135415.68158299.davem@davemloft.net>
-To: stable@kernel.org
-From: David Miller <davem@davemloft.net>
-Subject: VLAN state handling fix
-
-From: Stefan Rompf <stefan@loplof.de>
-
-[VLAN]: Fix link state propagation
-
-When the queue of the underlying device is stopped at initialization time
-or the device is marked "not present", the state will be propagated to the
-vlan device and never change. Based on an analysis by Patrick McHardy.
-
-Signed-off-by: Stefan Rompf <stefan@loplof.de>
-ACKed-by: Patrick McHardy <kaber@trash.net>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-
----
- net/8021q/vlan.c |    8 +++-----
- 1 file changed, 3 insertions(+), 5 deletions(-)
-
---- linux-2.6.17.7.orig/net/8021q/vlan.c
-+++ linux-2.6.17.7/net/8021q/vlan.c
-@@ -67,10 +67,6 @@ static struct packet_type vlan_packet_ty
-       .func = vlan_skb_recv, /* VLAN receive method */
- };
--/* Bits of netdev state that are propagated from real device to virtual */
--#define VLAN_LINK_STATE_MASK \
--      ((1<<__LINK_STATE_PRESENT)|(1<<__LINK_STATE_NOCARRIER)|(1<<__LINK_STATE_DORMANT))
--
- /* End of global variables definitions. */
- /*
-@@ -470,7 +466,9 @@ static struct net_device *register_vlan_
-       new_dev->flags = real_dev->flags;
-       new_dev->flags &= ~IFF_UP;
--      new_dev->state = real_dev->state & ~(1<<__LINK_STATE_START);
-+      new_dev->state = (real_dev->state & ((1<<__LINK_STATE_NOCARRIER) |
-+                                           (1<<__LINK_STATE_DORMANT))) |
-+                       (1<<__LINK_STATE_PRESENT);
-       /* need 4 bytes for extra VLAN header info,
-        * hope the underlying device can handle it.