* Glauber de Oliveira Costa ([EMAIL PROTECTED]) wrote:
As alternatives what we have now, we can either keep the paravirt_ops as
it is now for the native case, just hooking the vsmp functions in place
of the normal one, (there are just three ops anyway), refill the
paravirt_ops entirely in
* Glauber de Oliveira Costa ([EMAIL PROTECTED]) wrote:
Only caveat, is that it has to be done before smp gets in the game, and
with interrupts disabled. (which makes the function in vsmp.c not eligible).
My current option is to force VSMP to use PARAVIRT, as said before, and
then fill
* Oleg Nesterov ([EMAIL PROTECTED]) wrote:
On 08/03, Chris Wright wrote:
+long do_restart_poll(struct restart_block *restart_block)
+{
+ struct pollfd __user *ufds = (struct pollfd __user*)restart_block-arg0;
+ int nfds = restart_block-arg1;
+ s64 timeout = ((s64)restart_block
* Jeff Dike ([EMAIL PROTECTED]) wrote:
[ This is both 2.6.24 and -stable material ]
SuSE seems to require that binaries have a .note.SuSE section.
Without it, UML segfaults if any parameters are passed on the command
line.
Huh!? Why do we need a SuSE section?
thanks,
-chris
-
To
* Jeremy Fitzhardinge ([EMAIL PROTECTED]) wrote:
This patch breaks Xen booting. I get infinite recursive faults during
patching when this patch is present. If I boot with
noreplace-paravirt it works OK, and it works as expected if I back
this patch out. I haven't tracked down the exact
* Andi Kleen ([EMAIL PROTECTED]) wrote:
This patch breaks Xen booting.
Check the latest git head. Does it still break?
Yeah, this is the latest git. The broken commit is Rusty's patch which,
after Linus reverted the write-protected remap changes, is no longer
necessary. AFAICT patching
* Linus Torvalds ([EMAIL PROTECTED]) wrote:
On Sat, 18 Aug 2007, Chris Wright wrote:
Check the latest git head. Does it still break?
Yeah, this is the latest git. The broken commit is Rusty's patch which,
after Linus reverted the write-protected remap changes, is no longer
* Chris Wright ([EMAIL PROTECTED]) wrote:
Now that I understand the problem, I do have a very simple (slightly
overkill) fix for paravirt patching. This can be cleaned up to avoid
the copies when they aren't needed, but that will take a little more
auditing of the various patchers. If you
be
working fine right now with d34fda4a84c18402640a1a2342d6e6d9829e6db7
committed, and can be further refined with the patch below that's just
waiting on some further testing.
thanks,
-chris
--
Subject: [PATCH] x86: skip paravirt patching when appropriate
From: Chris Wright [EMAIL PROTECTED]
commit
* Manfred Spraul ([EMAIL PROTECTED]) wrote:
poll() returns -EINTR if a signal is pending.
EINTR is a bad choice: it means that poll returns to user space if the
task is stopped by SIGSTOP/SIGCONT or by the freezer.
select() and ppoll() both use ERESTARTNOHAND, this avoids a return to
user
* Andrew Morton ([EMAIL PROTECTED]) wrote:
On Sun, 29 Jul 2007 19:05:05 +0200 Manfred Spraul [EMAIL PROTECTED] wrote:
poll() returns -EINTR if a signal is pending.
EINTR is a bad choice: it means that poll returns to user space if the
task is stopped by SIGSTOP/SIGCONT or by the freezer.
* Linus Torvalds ([EMAIL PROTECTED]) wrote:
On Thu, 26 Jul 2007, Rafael J. Wysocki wrote:
On my Turion64-based HPC nx6325 with the 2.6.23-rc1 x86_64 kernel doing
# echo 0 /sys/devices/system/cpu/cpu1/online
causes the system to crash in a spectacular fashion (call traces going
* Linus Torvalds ([EMAIL PROTECTED]) wrote:
On Mon, 30 Jul 2007, Chris Wright wrote:
This also fixes paravirt patching which was broken when text_poke()
tried to patch the various pv ops in lookup_address.
Hmm. What is this? The revert?
Yes, sorry, your revert also fixes paravirt
* Oleg Nesterov ([EMAIL PROTECTED]) wrote:
I am not sure. This means we restart sys_poll() with the same timeout
if there is no pending signal. I think we need ERESTART_RESTARTBLOCK
logic.
Forgot to mention, sys_select() can use ERESTARTNOHAND because it
modifies struct timeval __user
--
Subject: [PATCH] Use ERESTART_RESTARTBLOCK if poll() is interrupted by a signal
From: Chris Wright [EMAIL PROTECTED]
Lomesh reported poll returning EINTR during suspend/resume cycle.
This is caused by the STOP/CONT cycle that the freezer uses, generating
a pending signal for what in effect
* Jeremy Fitzhardinge ([EMAIL PROTECTED]) wrote:
Eric W. Biederman wrote:
Then why you had to allocate enough pages to cause a failure has me stumped.
Perhaps there is some other bug?
Perhaps, but nothing comes to mind. I'll see what happens when I boot
this kernel on real hardware
* Greg KH ([EMAIL PROTECTED]) wrote:
On Thu, Apr 26, 2007 at 09:48:22AM -0700, David Lang wrote:
any idea why there are so many more -stable patches for 2.6.20? this is
the
10th -stable series, and most of them have been dozens of patches.
is there a new team reporting and fixing
* Peter Keilty ([EMAIL PROTECTED]) wrote:
diff --git a/drivers/acpi/processor_idle.c b/drivers/acpi/processor_idle.c
index 6077300..35ad71f 100644
--- a/drivers/acpi/processor_idle.c
+++ b/drivers/acpi/processor_idle.c
@@ -480,10 +480,12 @@ #endif
/* Get end time (ticks) */
* Robin Rosenberg ([EMAIL PROTECTED]) wrote:
I see regular crashes with 2.6.11.6 (mandrake-patched) and Java 1.5.02 (01 too
btw, but not 1.4.2). Gentoo people report the same problem sugesting that it
may have appeared between 2.6.11.4 and 2.6.11.5.
Sounds very unlikely, we didn't change
* [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
CC: [EMAIL PROTECTED]
This trick is useless, because sys_ni.c will handle this problem by itself,
like it does even on UML for other syscalls.
Also, it does not provide the NFSD syscall when NFSD is compiled as a module,
which is a big
* John M Collins ([EMAIL PROTECTED]) wrote:
Thanks to everyone for the pointers on this one I've rebuilt the kernels
and we'll see what happens.
BTW, I'd recommend updating to 2.6.11.7 so that you're protected from
another local root exploit.
thanks,
-chris
-
To unsubscribe from this list:
* Amelia Nilsson ([EMAIL PROTECTED]) wrote:
I've found a bug in 2.6.11.6. I have a Toshiba laptop and when i did
run 2.6.11.6 my touchpad flipped out, it clicked everywhere when it
wasn't supposed to click. I couldn't even move my mouse without it was
clicking all over. It works fine i 2.6.10
* Andrew Morton ([EMAIL PROTECTED]) wrote:
Jani Jaakkola [EMAIL PROTECTED] wrote:
SMP race handling is broken in key_user_lookup() in security/keys/key.c
This was fixed post-2.6.11. Can you confirm that 2.6.12-rc2 works OK?
This is the patch we used. It should go into -stable if it's
* Andi Kleen ([EMAIL PROTECTED]) wrote:
I will take a closer look at the rc1/rc2 patches later this evening
and see if I can spot something. Can only report back tomorrow though.
Actually itt started in .11 already - sigh - on rereading the thread.
That will make the code audit harder :/
* Tomasz Chmielewski ([EMAIL PROTECTED]) wrote:
or should I wait for 2.6.11.7 (?), where it should be corrected?
Wait, no longer, 2.6.11.7 has been here already ;-) However, nothing in
this area was touched. If there's an outstanding issue, please chase it
down, and if it's reasonable
* Ted Kremenek ([EMAIL PROTECTED]) wrote:
In several network drivers that handle the ioctl command SIOCSMIIREG
(writes a register on the network card) most implementations check for
the CAP_NET_ADMIN capability. Several drivers use the function
generic_mii_ioctl to process this command
* Andi Kleen ([EMAIL PROTECTED]) wrote:
On Thu, Apr 14, 2005 at 11:27:12AM -0700, Chris Wright wrote:
Yes, I've seen it in .11 and earlier kernels. Happen to have same
x86_64 string on my bad pmd dumps, but can't reproduce it at all.
So, for now, I can hold off on adding the reload cr3
* Linda Luu ([EMAIL PROTECTED]) wrote:
Vanderpool is a hardware support for OS virtualization (running multiple OS
at the same time), how does Linux kernel make use of this, particularly
which part of the kernel code?
There's Xen support for upcoming VT, which will allow running unmodified
* Igor Shmukler ([EMAIL PROTECTED]) wrote:
We are working on a LKM for the 2.6 kernel.
We HAVE to intercept system calls. I understand this could be
something developers are no encouraged to do these days, but we need
this.
I don't think you'll find much empathy or support here. This is
* Daniel Souza ([EMAIL PROTECTED]) wrote:
No, I was tracking file creations/modifications/attemps of
access/directory creations|modifications/file movings/program
executions with some filter exceptions (avoid logging library loads by
ldd to preserve disk space).
It was a little module that
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
This patch adds two checks to do_follow_link() and sys_link(), for
prevent users to follow (untrusted) symlinks owned by other users in
world-writable +t directories (i.e. /tmp), unless the owner of the
symlink is the owner of the
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
About what things it can break, I haven't noticed any issue on it (at
least regarding grSecurity or OpenWall), but of course I would
appreciate a lot any information on them, so, I could report to the
developers that are currently
* John Richard Moser ([EMAIL PROTECTED]) wrote:
I've yet to see this break anything on Ubuntu or Gentoo; Brad Spengler
claims this breaks nothing on Debian. On the other hand, this could
potentially squash the second most prevalent security bug.
Yes I know, I've worked on distro with it as
* Michael Halcrow ([EMAIL PROTECTED]) wrote:
This is the third in a series of eight patches to the BSD Secure
Levels LSM. It moves the claim on the block device from the inode
struct to the file struct in order to address a potential
circumvention of the control via hard links to block
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
Attached you can find a patch which adds a new hook for the sys_chroot()
syscall, and makes us able to add additional enforcing and security
checks by using the Linux Security Modules framework (ie. chdir
enforcing, etc).
If you
* John Richard Moser ([EMAIL PROTECTED]) wrote:
Yes, mkdtemp() and mkstemp().
Of course we can't always rely on programmers to get it right, so the
idea here is to make sure we ask broken code to behave nicely, and stab
it in the face if it doesn't. Please try to examine this in that scope.
* [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
open(/tmp/sh-thd-1107848098, O_WRONLY|O_CREAT|O_TRUNC|O_EXCL|O_LARGEFILE,
0600) = 3
O_EXCL
Wow - if my /tmp was on the same partition, and I'd hard-linked that
file to /etc/passwd, it would be toast now if root had run it.
So, in fact, it
this. 6/8 no longer
applies cleanly with this change.
Signed-off-by: Chris Wright [EMAIL PROTECTED]
--- a/security/seclvl.c~bd_claim2005-02-08 15:05:09.0 -0800
+++ b/security/seclvl.c 2005-02-08 15:05:17.0 -0800
@@ -492,17 +492,16 @@
*/
static int seclvl_bd_claim(struct
* Michael Halcrow ([EMAIL PROTECTED]) wrote:
This is the sixth in a series of eight patches to the BSD Secure
Levels LSM. It makes several trivial changes to make the code
consistent.
These are inconsistent with CodingStyle. I'd drop this, and go the
other way (patch is smaller) ala Lindent.
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote:
As commented yesterday, I was going to release a few more hooks for some
*critical* syscalls, this one adds a hook to sys_chmod(), and makes us
able to apply checks and logics before releasing the operation to
sys_chmod().
This is
* Jean Tourrilhes ([EMAIL PROTECTED]) wrote:
The first is the handling of spyoffset which is potentially
unsafe. Unfortunately, the fix involve some API/infrastructure change,
so is not transparent. Fortunately drivers are clever enough to not
trigger this bug.
The second is a
* Jean Tourrilhes ([EMAIL PROTECTED]) wrote:
On Tue, Feb 08, 2005 at 05:51:29PM -0800, Chris Wright wrote:
Hmm, having ability to read kernel data is not so nice.
It's not like you can read any arbitrary address, exploiting
such a flaw is in my mind theoritical. Let's not overblow
Hi Mark,
* Mark F. Haigh ([EMAIL PROTECTED]) wrote:
[Aargh! Missing Signed-off-by.]
Unless I'm missing something, in kernel/fork.c, dup_mmap():
if (security_vm_enough_memory(len))
goto fail_nomem;
/* ... */
fail_nomem:
retval =
architectures to define only
the offending rlimits.
Heh, I did it this way first, then worried people might find it confusing
to only have a subset of the block overwritten I backed it down to
the __ARCH_RLIMIT_ORDER method. Anyway, I like this change.
Acked-by: Chris Wright [EMAIL PROTECTED
* Hugh Dickins ([EMAIL PROTECTED]) wrote:
dup_mmap's charge starts out at 0 and gets added to each time around
the loop through vmas; if security_vm_enough_memory fails at any point
in that loop, we need to vm_unacct_memory the charge already accumulated.
If that's the requirement, then it's
* Kylene Hall ([EMAIL PROTECTED]) wrote:
diff -uprN linux-2.6.10/drivers/char/tpm/tpm_atmel.c
linux-2.6.10-tpm/drivers/char/tpm/tpm_atmel.c
--- linux-2.6.10/drivers/char/tpm/tpm_atmel.c 2005-02-04 15:03:03.0
-0600
+++ linux-2.6.10-tpm/drivers/char/tpm/tpm_atmel.c 2005-02-09
* Jonathan Ho ([EMAIL PROTECTED]) wrote:
Fixed some weird whitespace, solved redundancies (applies to v2.6.10).
Signed-off-by: Jonathan Ho [EMAIL PROTECTED]
--- lib/string.cFri Dec 24 13:35:25 2004
+++ \documents and settings\jonathan\desktop/string.cWed Feb 09
This won't apply
* Matt Mackall ([EMAIL PROTECTED]) wrote:
What happened to the RT rlimit code from Chris?
I still have it, but I had the impression Ingo didn't like it as a long
term solution/hack (albeit small) to the scheduler. Whereas the rt-lsm
patch is wholly self-contained.
thanks,
-chris
--
Linux
to remove ethertap altogether in favor of tun/tap, but at
lest remove the bits that won't build in case ethertap is still used.
Signed-off-by: Chris Wright [EMAIL PROTECTED]
drivers/net/ethertap.c | 84 -
1 files changed, 84 deletions(-)
= drivers
NL_EMULATE_DEV handler functions can't ever be set, so let's rip them
out too. I realize the other half (netlink_attach()) just came out in
2.6.11-rc1, but what's left behind can't be used at all.
Signed-off-by: Chris Wright [EMAIL PROTECTED]
af_netlink.c | 24 +---
1
* Kurt Garloff ([EMAIL PROTECTED]) wrote:
this goes back to a discussion in August last year:
http://www.ussg.iu.edu/hypermail/linux/kernel/0408.1/0623.html
Thanks for follow up Kurt. I'm travelling at the moment so bear with me
if my response time is slow. In short, I don't mind switching
* linux-os ([EMAIL PROTECTED]) wrote:
Hello,
Tell me. When all those kernel functions are made static
how does one use a kernel debugger? How does the OOPS
get decoded if nothing is in /proc/kallsyms or System.map???
static != inline. Locally scoped symbols, 't', and global, 'T',
are in
* David Weinehall ([EMAIL PROTECTED]) wrote:
BTW: Wishlist request. Would you consider adding -p (--show-c-function)
to the set of flags used for the diffs created by BitKeeper?
It's already there.
thanks,
-chris
--
Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
* Patrick McHardy ([EMAIL PROTECTED]) wrote:
Chris Wright wrote:
* David S. Miller ([EMAIL PROTECTED]) wrote:
Now the question is what to do about the 2.6.12.x stable
tree. I think we put the offending change there, now we
need to revert it there too. Patrick, could you push this
patch
* Tomasz Lemiech ([EMAIL PROTECTED]) wrote:
Yup, it does, thanks much. Now I see that there was an earlier thread
concerning the same problem. Sorry for extra noise.
No problem, thanks for verifying. That patch should be in .3, so I'm
happy to build up success cases with it.
thanks,
-chris
-
* Blaisorblade ([EMAIL PROTECTED]) wrote:
On Tuesday 12 July 2005 20:50, Chris Wright wrote:
* [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
For now there's not yet a fix for this patch, so for now the best thing
is to drop it (which was widely reported to give a working kernel
* Jan Engelhardt ([EMAIL PROTECTED]) wrote:
the following patch adds a post_setgid() security hook, and necessary dummy
funcs.
why?
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
* Jan Engelhardt ([EMAIL PROTECTED]) wrote:
And when is this becoming business? What made post_setUid go into the kernel?
That went as part of supporting capabilities as they were, to do fixups
on set{r,e,s}uid.
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body
* aq ([EMAIL PROTECTED]) wrote:
Function lib/cmdline.c:memparse() wrongly calculates the memory if the
given string has K/M/G suffix. This patch (against 2.6.13-rc3) fixes
the problem. Please apply.
Patch looks incorrect.
--- 2.6.13-rc3/lib/cmdline.c 2005-04-30 10:31:37.0 +0900
+++
* Andi Kleen ([EMAIL PROTECTED]) wrote:
On Fri, Jul 15, 2005 at 07:17:44PM -0700, Siddha, Suresh B wrote:
On Fri, Jul 15, 2005 at 10:53:33AM -0500, Justin M. Forbes wrote:
That said, I will be testing this patch a bit further
Thanks. Let me know if you see any issues.
myself, and
* Timur Tabi ([EMAIL PROTECTED]) wrote:
Andy Isaacson wrote:
Do you guys simply raise RLIMIT_MEMLOCK to allow apps to lock their
pages? Or are you doing something more nasty?
A little more nasty. I raise RLIMIT_MEMLOCK in the driver to unlimited
and also set cap_raise(IPC_LOCK). I do
* Timur Tabi ([EMAIL PROTECTED]) wrote:
It works with every kernel I've tried. I'm sure there are plenty of kernel
configuration options that will break our driver. But as long as all the
distros our customers use work, as well as reasonably-configured custom
kernels, we're happy.
Hey,
Mason [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Signed-off-by: Greg Kroah-Hartman [EMAIL PROTECTED]
--- linux-2.6-ext3/fs/jbd/transaction.c.=K=.orig
+++ linux-2.6-ext3/fs/jbd/transaction.c
@@ -1775,10 +1775,10 @@ static int journal_unmap_buffer(journal_
* Thomas Backlund ([EMAIL PROTECTED]) wrote:
Chris Wright wrote:
* Andy ([EMAIL PROTECTED]) wrote:
cross posted due to the severity of this issue.
I have killed two Dell 1850 (x86_64) with megaraid 4e/SI servers using
kernel 2.6.11.7. When the system boots, it looks like it does not see
* Alexander Nyberg ([EMAIL PROTECTED]) wrote:
tree e6a38b3d6bf434f08054562113bb660c4227769f
parent 4a89a04f1ee21a7c1f4413f1ad7dcfac50ff9b63
author Linus Torvalds [EMAIL PROTECTED] Sun, 03 Jul 2005 00:35:33 -0700
committer Linus Torvalds [EMAIL PROTECTED] Sun, 03 Jul 2005 00:35:33 -0700
* Jussi Hamalainen ([EMAIL PROTECTED]) wrote:
On Tue, 5 Jul 2005, Chris Wright wrote:
Any news on this matter?
I hvr a PE1850 waiting for kernel upgrade, but I'm afraid to do so now...
I can't break my box with tests since it's in active use...
For now I'm running a 2.6.8.1 based kernel
* randy_dunlap ([EMAIL PROTECTED]) wrote:
kernel/audit.c (2.6.13-rc1-git5) audit_log_start() says:
/* Obtain an audit buffer. This routine does locking to obtain the
* audit buffer, but then no locking is required for calls to
* audit_log_*format. If the tsk is a task that is currently
* Stephen Smalley ([EMAIL PROTECTED]) wrote:
It still has to be mounted by userspace, right? So /sbin/init still
needs to know to mount securityfs, and where the selinux nodes live
under it, so you are still talking about changing it (and libselinux and
rc.sysinit), and risking compatibility
* randy_dunlap ([EMAIL PROTECTED]) wrote:
Yes, that's why I asked, I'm adding kerneldoc format comments
to audit*.c (2 files). You'll see it soon.
Great! Thanks Randy.
-chris
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
I've been asked about this a couple times, and there's no info in
MAINTAINERS file. Add MAINTAINERS entry for audit subsystem.
Signed-off-by: Chris Wright [EMAIL PROTECTED]
---
diff --git a/MAINTAINERS b/MAINTAINERS
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -370,6 +370,10 @@ W: http
* Kylene Jo Hall ([EMAIL PROTECTED]) wrote:
A problem was reported that the tpm driver was interfereing with
networking on the 8139 chipset. The tpm driver was using a hard coded
the memory address instead of the value the BIOS was putting the chip
at. This was in the tpm_lpc_bus_init
* David Woodhouse ([EMAIL PROTECTED]) wrote:
On Thu, 2005-07-07 at 18:12 -0700, Chris Wright wrote:
I've been asked about this a couple times, and there's no info in
MAINTAINERS file. Add MAINTAINERS entry for audit subsystem.
It's already there in -mm, although I was evidently having
* Greg KH ([EMAIL PROTECTED]) wrote:
Chris, care to forward the securityfs patch to Linus?
Yeah, I've got it queued up right now, and I'm playing with it a bit.
As well as this one. Thanks guys.
-chris
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a
* Lee Revell ([EMAIL PROTECTED]) wrote:
I think it's already queued for -stable.
Yes, it is.
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the
* Timothy R. Chavez ([EMAIL PROTECTED]) wrote:
@@ -69,6 +70,8 @@ int inode_setattr(struct inode * inode,
unsigned int ia_valid = attr-ia_valid;
int error = 0;
+ audit_notify_watch(inode, MAY_WRITE);
+
Hmm, this looks wrong. It should be in notify_change, since I don't
The following two patches simply split fsnotify from inotify.
There should be no functional change to inotify at all. Perhaps the
split will help identify the interface bits that can easily converge
for inotify and audit. They're completely untested... I started with
inotify-45 in
Add fsnotify as infrastructure for various fs notifcation schemes.
Move dnotify to fsnotify.
fs/attr.c| 33 +
fs/compat.c | 12 +++-
fs/file_table.c |3 +
fs/namei.c | 30 ++-
fs/nfsd/vfs.c|6 +-
inotify
Documentation/filesystems/inotify.txt | 155 +
fs/Kconfig| 13
fs/Makefile |1
fs/inode.c|6
fs/inotify.c | 1011 ++
* David Woodhouse ([EMAIL PROTECTED]) wrote:
What would make sense, perhaps, would be to actually merge those hooks;
not just a cosmetic amalgamation of the calling sites. Currently, each
of inotify and the audit code does its own filtering when its hooks are
triggered, and then acts upon the
* Tomasz Lemiech ([EMAIL PROTECTED]) wrote:
Today I tried 2.6.12.2 on an Asus A7V333 (socket A) with AMD Duron 1300
MHz CPU and noticed, that the system clock was running about 60 times
faster than real time and the keyboard was unresponsive. However, I was
able to log in remotely and
* [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
Revert the following patch, because of miscompilation problems in different
environments leading to UML not working *at all* in TT mode; it was merged
lately in 2.6 development cycle, a little after being written, and has caused
problems to lots
* David S. Miller ([EMAIL PROTECTED]) wrote:
From: Patrick McHardy [EMAIL PROTECTED]
Date: Tue, 12 Jul 2005 13:58:27 +0200
Daniel Drake wrote:
You'll have to forgive my lack of netfilter knowledge, I set up my
firewall
ages ago and haven't really touched it since :)
We decided
* Tomasz Lemiech ([EMAIL PROTECTED]) wrote:
On Tue, 12 Jul 2005, Chris Wright wrote:
- 2.6.12.2 with acpi_register_gsi() one-line fix works without problems
My apologies - I meant: _without_ acpi_register_gsi() one-line fix. That
is, _reverting_
http://www.kernel.org/git/?p=linux/kernel
* Russell King ([EMAIL PROTECTED]) wrote:
At some point, I decided I'd like to run a certain program non-root
with certain capabilities only. I looked at the above two programs
and stupidly thought they'd actually allow me to do this.
However, the way the kernel is setup today, this seems
* Alexander Nyberg ([EMAIL PROTECTED]) wrote:
tis 2005-03-15 klockan 14:42 -0800 skrev Chris Wright:
It was meant to work with capabilities in the filesystem like setuid bits.
So the patches that have floated around from myself, Andy Lutomirski
and Alex Nyberg are attempts to make something
* Max Kamenetsky ([EMAIL PROTECTED]) wrote:
I've been seeing the following bug lately when running some memory- and
CPU-intensive MATLAB jobs. MATLAB hangs, and commands like ps and top
no longer work. The only solution I've found is to reboot. This
happens intermittently, and here's what
* Ondrej Zary ([EMAIL PROTECTED]) wrote:
This patch moves the name= field to the end of audit records. The
original placement is bad because it cannot be properly parsed. It is
impossible to tell if the name is /bin/true or /bin/true inode=469634
dev=00:00 because the inode= and dev= fields
This is the start of the stable review cycle for the 2.6.11.5 release. There
are 9 patches in this series, all will be posted as a response to this one.
If anyone has any issues with these being applied, please let us know. If
anyone is a maintainer of the proper subsystem, and wants to add a
, amd8111e_interrupt, SA_SHIRQ,
1375 dev-name, dev))
1376 return -EAGAIN;
Signed-off-by: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Signed-off-by: Greg Kroah-Hartman [EMAIL PROTECTED]
diff -Naru a/drivers/net/amd8111e.c b/drivers/net
sequence number.
This is wrong and confuses IPSEC daemons to no end.
[XFRM]: xfrm_find_acq_byseq should only return XFRM_STATE_ACQ states.
Signed-off-by: Patrick McHardy [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
diff -Nru a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
--- a/net
something that is less intrusive than
regular calls to del_timer_sync.
Signed-off-by: Ralf Baechle DL5RB [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Signed-off-by: Greg Kroah-Hartman [EMAIL PROTECTED]
--- bk-afu.orig/net/ax25/ax25_timer.c 2005-03-08 13:54:06.0 +
+++ bk
pointer dereference on RX.
Signed-off-by: Krzysztof Halasa [EMAIL PROTECTED]
Acked-by: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Signed-off-by: Greg Kroah-Hartman [EMAIL PROTECTED]
--- linux/drivers/net/wan/hd6457x.c 28 Oct 2004 06:16:08 - 1.15
for underflow
Signed-off-by: Patrick McHardy [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Signed-off-by: Greg Kroah-Hartman [EMAIL PROTECTED]
diff -Nru a/drivers/net/tun.c b/drivers/net/tun.c
--- a/drivers/net/tun.c 2005-03-04 19:41:56 +01:00
+++ b/drivers/net/tun.c 2005-03-04
too late to make it into 2.6.11.
Signed-off-by: Ralf Baechle [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Signed-off-by: Greg Kroah-Hartman [EMAIL PROTECTED]
--- bk-afu.orig/net/netrom/nr_in.c 2005-02-05 22:16:25.553987776 +
+++ bk-afu/net/netrom/nr_in.c 2005-02-05 22
because of possible
pci_alloc_consistent() failures.
Updated to CodingStyle.
Signed-off-by: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Signed-off-by: Greg Kroah-Hartman [EMAIL PROTECTED]
--- 1.89/drivers/net/via-rhine.c2005-01-10 08:52:27 -08:00
unlock, and fixing it fixes the symptom.
Signed-off-by: Hugh Dickins [EMAIL PROTECTED]
Acked-by: Roland McGrath [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
--- 2.6.11/kernel/signal.c 2005-03-02 07:38:56.0 +
+++ linux/kernel/signal.c 2005-03-16 18:10
* Patrick McHardy ([EMAIL PROTECTED]) wrote:
Chris Wright wrote:
-stable review patch. If anyone has any objections, please let us know.
I agree to both patches and additionally propose this one.
It fixes a crash when reading /proc/net/route (netstat -rn)
while routes are changed. I've
* Ian Pilcher ([EMAIL PROTECTED]) wrote:
Chris Wright wrote:
From: Andres Salomon [EMAIL PROTECTED]
It seems to me that if in the amd8111e_open() fuction dev-irq isn't
zero and the irq request succeeds it might not get released anymore.
Based on the wording above, I can't help wondering
* David Woodhouse ([EMAIL PROTECTED]) wrote:
On Wed, 2005-03-16 at 14:41 -0800, Chris Wright wrote:
* Ondrej Zary ([EMAIL PROTECTED]) wrote:
This patch moves the name= field to the end of audit records. The
original placement is bad because it cannot be properly parsed
* Adrian Bunk ([EMAIL PROTECTED]) wrote:
--- linux-2.6.12-rc1-mm1-full/fs/attr.c.old 2005-03-23 04:44:40.0
+0100
+++ linux-2.6.12-rc1-mm1-full/fs/attr.c 2005-03-23 04:45:40.0
+0100
@@ -112,7 +112,7 @@
int notify_change(struct dentry * dentry, struct iattr * attr)
101 - 200 of 1959 matches
Mail list logo