Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
branch: android-tegra-…
Commits on May 7, 2012
  1. @TomGiordano @Whitehawkx

    star: update defconfigs

    TomGiordano authored Whitehawkx committed
    Change-Id: Ie1daa40d83a0bd2ab27c011c3961f301414c9424
Commits on Feb 21, 2012
  1. @rmcc

    tegra_odm_touch: More ICS-compatibility

    rmcc authored
    Add a tracking ID to the event tuples, and make sure the pressure
    value is _never_ repeated, even for different fingers
Commits on Feb 20, 2012
  1. @rmcc

    netfilter: fix compilation when conntrack is disabled but tproxy is e…

    KOVACS Krisztian authored rmcc committed
    …nabled
    
    The IPv6 tproxy patches split IPv6 defragmentation off of conntrack, but
    failed to update the #ifdef stanzas guarding the defragmentation related
    fields and code in skbuff and conntrack related code in nf_defrag_ipv6.c.
    
    This patch adds the required #ifdefs so that IPv6 tproxy can truly be used
    without connection tracking.
    
    Original report:
    http://marc.info/?l=linux-netdev&m=129010118516341&w=2
    
    Reported-by: Randy Dunlap <randy.dunlap@oracle.com>
    Acked-by: Randy Dunlap <randy.dunlap@oracle.com>
    Signed-off-by: KOVACS Krisztian <hidden@balabit.hu>
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
  2. @bazsi @rmcc

    tproxy: split off ipv6 defragmentation to a separate module

    bazsi authored rmcc committed
    Like with IPv4, TProxy needs IPv6 defragmentation but does not
    require connection tracking. Since defragmentation was coupled
    with conntrack, I split off the two, creating an nf_defrag_ipv6 module,
    similar to the already existing nf_defrag_ipv4.
    
    Signed-off-by: Balazs Scheidler <bazsi@balabit.hu>
    Signed-off-by: KOVACS Krisztian <hidden@balabit.hu>
    Signed-off-by: Patrick McHardy <kaber@trash.net>
Commits on Feb 19, 2012
  1. @bazsi @rmcc

    tproxy: added udp6_lib_lookup function

    bazsi authored rmcc committed
    Just like with IPv4, we need access to the UDP hash table to look up local
    sockets, but instead of exporting the global udp_table, export a lookup
    function.
    
    Signed-off-by: Balazs Scheidler <bazsi@balabit.hu>
    Signed-off-by: KOVACS Krisztian <hidden@balabit.hu>
    Signed-off-by: Patrick McHardy <kaber@trash.net>
  2. @bazsi @rmcc

    tproxy: added IPv6 socket lookup function to nf_tproxy_core

    bazsi authored rmcc committed
    Signed-off-by: Balazs Scheidler <bazsi@balabit.hu>
    Signed-off-by: KOVACS Krisztian <hidden@balabit.hu>
    Signed-off-by: Patrick McHardy <kaber@trash.net>
Commits on Feb 15, 2012
  1. @rmcc

    tegra_odm_touch: Fix pressure/size reporting on ICS

    rmcc authored
    This puts these values in their expected report types, and makes
    the touchscreen actually capable of using userspace calibration,
    solving reported sensitivity issues
Commits on Feb 13, 2012
  1. @rmcc

    Bump carveout again

    rmcc authored
    Memory pressure on the carveout was causing frequent killing of media
    processes by the carveout killer
Commits on Feb 12, 2012
  1. @rmcc

    star: Fix building without USB

    rmcc authored
  2. @rmcc

    nvmap: Add carveout killer

    rmcc authored
Commits on Feb 9, 2012
  1. @rmcc

    nvrm: Always use the main dispatcher

    rmcc authored
    Workaround to get the camera GPIO setup working. _Apparently_ with
    no serious side-effects
Commits on Feb 8, 2012
  1. @rmcc

    USB: Fix oops in backported rndis driver

    rmcc authored
    init_rndis() is now used in runtime, take it out of the __init section
Commits on Feb 7, 2012
  1. @rmcc

    Temporary: Reduce carveout size

    rmcc authored
  2. @rmcc

    Merge branch 'android-tegra-2.6.32' into android-tegra-2.6.32-ics

    rmcc authored
    * android-tegra-2.6.32: (112 commits)
      ts0710: Disable logspam
      Import more v20l updates
      Linux 2.6.32.55
      kprobes: initialize before using a hlist
      score: fix off-by-one index into syscall table
      sym53c8xx: Fix NULL pointer dereference in slave_destroy
      ALSA: HDA: Fix internal microphone on Dell Studio 16 XPS 1645
      kernel.h: add printk_ratelimited and pr_<level>_rl
      block: add and use scsi_blk_cmd_ioctl
      USB: Fix 'bad dma' problem on WDM device disconnect
      fix cputime overflow in uptime_proc_show
      USB: cdc-wdm: fix misuse of logical operation in place of bitop
      nfsd: Fix oops when parsing a 0 length export
      svcrpc: destroy server sockets all at once
      svcrpc: fix double-free on shutdown of nfsd after changing pool mode
      V4L/DVB: v4l2-ioctl: integer overflow in video_usercopy()
      i2c: Fix error value returned by several bus drivers
      UBI: fix nameless volumes handling
      x86: Fix mmap random address range
      PNP: work around Dell 1536/1546 BIOS MMCONFIG bug that breaks USB
      ...
    
    Conflicts:
    	drivers/input/touchscreen/tegra_odm_touch.c
Commits on Feb 5, 2012
  1. @rmcc

    ts0710: Disable logspam

    rmcc authored
Commits on Feb 2, 2012
  1. @rmcc

    Merge branch 'android-tegra-2.6.32' of github.com:CyanogenMod/lge-ker…

    rmcc authored
    …nel-star into android-tegra-2.6.32
Commits on Feb 1, 2012
  1. @rmcc

    Merge branch 'linux-2.6.32.y' of git://git.kernel.org/pub/scm/linux/k…

    rmcc authored
    …ernel/git/stable/linux-stable into android-tegra-2.6.32
    
    * 'linux-2.6.32.y' of git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable: (106 commits)
      Linux 2.6.32.55
      kprobes: initialize before using a hlist
      score: fix off-by-one index into syscall table
      sym53c8xx: Fix NULL pointer dereference in slave_destroy
      ALSA: HDA: Fix internal microphone on Dell Studio 16 XPS 1645
      kernel.h: add printk_ratelimited and pr_<level>_rl
      block: add and use scsi_blk_cmd_ioctl
      USB: Fix 'bad dma' problem on WDM device disconnect
      fix cputime overflow in uptime_proc_show
      USB: cdc-wdm: fix misuse of logical operation in place of bitop
      nfsd: Fix oops when parsing a 0 length export
      svcrpc: destroy server sockets all at once
      svcrpc: fix double-free on shutdown of nfsd after changing pool mode
      V4L/DVB: v4l2-ioctl: integer overflow in video_usercopy()
      i2c: Fix error value returned by several bus drivers
      UBI: fix nameless volumes handling
      x86: Fix mmap random address range
      PNP: work around Dell 1536/1546 BIOS MMCONFIG bug that breaks USB
      ima: free duplicate measurement memory
      xen/xenbus: Reject replies with payload > XENSTORE_PAYLOAD_MAX.
      ...
  2. @rmcc

    Import more v20l updates

    rmcc authored
    * Reduce RAM refresh rate
    * SPI/rinnet/tsmux adjustments
    * Merge p990/p999 CP watcher
    * Updated sensor drivers, add virtual sensors for G, linear accel, and rotation
Commits on Jan 25, 2012
  1. @gregkh

    Linux 2.6.32.55

    gregkh authored
  2. @gregkh

    kprobes: initialize before using a hlist

    Ananth N Mavinakayanahalli authored gregkh committed
    commit d496aab567e7e52b3e974c9192a5de6e77dce32c upstream.
    
    Commit ef53d9c ("kprobes: improve kretprobe scalability with hashed
    locking") introduced a bug where we can potentially leak
    kretprobe_instances since we initialize a hlist head after having used
    it.
    
    Initialize the hlist head before using it.
    
    Reported by: Jim Keniston <jkenisto@us.ibm.com>
    Acked-by: Jim Keniston <jkenisto@us.ibm.com>
    Signed-off-by: Ananth N Mavinakayanahalli <ananth@in.ibm.com>
    Acked-by: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
    Cc: Srinivasa D S <srinivasa@in.ibm.com>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  3. @gregkh

    score: fix off-by-one index into syscall table

    Dan Rosenberg authored gregkh committed
    commit c25a785d6647984505fa165b5cd84cfc9a95970b upstream.
    
    If the provided system call number is equal to __NR_syscalls, the
    current check will pass and a function pointer just after the system
    call table may be called, since sys_call_table is an array with total
    size __NR_syscalls.
    
    Whether or not this is a security bug depends on what the compiler puts
    immediately after the system call table.  It's likely that this won't do
    anything bad because there is an additional NULL check on the syscall
    entry, but if there happens to be a non-NULL value immediately after the
    system call table, this may result in local privilege escalation.
    
    Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com>
    Cc: Chen Liqin <liqin.chen@sunplusct.com>
    Cc: Lennox Wu <lennox.wu@gmail.com>
    Cc: Eugene Teo <eugeneteo@kernel.sg>
    Cc: Arnd Bergmann <arnd@arndb.de>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  4. @psomas @gregkh

    sym53c8xx: Fix NULL pointer dereference in slave_destroy

    psomas authored gregkh committed
    commit cced5041ed5a2d1352186510944b0ddfbdbe4c0b upstream.
    
    sym53c8xx_slave_destroy unconditionally assumes that sym53c8xx_slave_alloc has
    succesesfully allocated a sym_lcb. This can lead to a NULL pointer dereference
    (exposed by commit 4e6c82b).
    
    Signed-off-by: Stratos Psomadakis <psomas@gentoo.org>
    Signed-off-by: James Bottomley <JBottomley@Parallels.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  5. @diwic @gregkh

    ALSA: HDA: Fix internal microphone on Dell Studio 16 XPS 1645

    diwic authored gregkh committed
    commit ffe535edb9a9c5b4d5fe03dfa3d89a1495580f1b upstream.
    
    More than one user reports that changing the model from "both" to
    "dmic" makes their Internal Mic work.
    
    Tested-by: Martin Ling <martin-launchpad@earth.li>
    BugLink: https://bugs.launchpad.net/bugs/795823
    Signed-off-by: David Henningsson <david.henningsson@canonical.com>
    Signed-off-by: Takashi Iwai <tiwai@suse.de>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  6. @gregkh

    kernel.h: add printk_ratelimited and pr_<level>_rl

    Joe Perches authored gregkh committed
    commit 8a64f336bc1d4aa203b138d29d5a9c414a9fbb47 upstream.
    
    Add a printk_ratelimited statement expression macro that uses a per-call
    ratelimit_state so that multiple subsystems output messages are not
    suppressed by a global __ratelimit state.
    
    [akpm@linux-foundation.org: coding-style fixes]
    [akpm@linux-foundation.org: s/_rl/_ratelimited/g]
    Signed-off-by: Joe Perches <joe@perches.com>
    Cc: Naohiro Ooiwa <nooiwa@miraclelinux.com>
    Cc: Ingo Molnar <mingo@elte.hu>
    Cc: Hiroshi Shimamoto <h-shimamoto@ct.jp.nec.com>
    Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  7. @bonzini @gregkh

    block: add and use scsi_blk_cmd_ioctl

    bonzini authored gregkh committed
    commit 577ebb374c78314ac4617242f509e2f5e7156649 upstream.
    
    Introduce a wrapper around scsi_cmd_ioctl that takes a block device.
    
    The function will then be enhanced to detect partition block devices
    and, in that case, subject the ioctls to whitelisting.
    
    Cc: linux-scsi@vger.kernel.org
    Cc: Jens Axboe <axboe@kernel.dk>
    Cc: James Bottomley <JBottomley@parallels.com>
    Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
    [bwh: Backport to 2.6.32 - adjust context]
    Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
  8. @gregkh

    USB: Fix 'bad dma' problem on WDM device disconnect

    Robert Lukassen authored gregkh committed
    commit 878b753e32ca765cd346a5d3038d630178ec78ff upstream.
    [ changed s/usb_free_coherent/usb_buffer_free/ for 2.6.32.x]
    
    In the WDM class driver a disconnect event leads to calls to
    usb_free_coherent to put back two USB DMA buffers allocated earlier.
    The call to usb_free_coherent uses a different size parameter
    (desc->wMaxCommand) than the corresponding call to usb_alloc_coherent
    (desc->bMaxPacketSize0).
    
    When a disconnect event occurs, this leads to 'bad dma' complaints
    from usb core because the USB DMA buffer is being pushed back to the
    'buffer-2048' pool from which it has not been allocated.
    
    This patch against the most recent linux-2.6 kernel ensures that the
    parameters used by usb_alloc_coherent & usb_free_coherent calls in
    cdc-wdm.c match.
    
    Signed-off-by: Robert Lukassen <robert.lukassen@tomtom.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
    Signed-off-by: Bjørn Mork <bjorn@mork.no>
  9. @gregkh

    fix cputime overflow in uptime_proc_show

    Martin Schwidefsky authored gregkh committed
    commit c3e0ef9a298e028a82ada28101ccd5cf64d209ee upstream.
    
    For 32-bit architectures using standard jiffies the idletime calculation
    in uptime_proc_show will quickly overflow. It takes (2^32 / HZ) seconds
    of idle-time, or e.g. 12.45 days with no load on a quad-core with HZ=1000.
    Switch to 64-bit calculations.
    
    Cc: Michael Abbott <michael.abbott@diamond.ac.uk>
    Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  10. @gregkh

    USB: cdc-wdm: fix misuse of logical operation in place of bitop

    David Sterba authored gregkh committed
    commit 0cdfb819b6a97e79c7a0aa0c471cd7000367103b upstream.
    
    CC: Greg Kroah-Hartman <gregkh@suse.de>
    CC: Oliver Neukum <oliver@neukum.org>
    CC: Marcel Holtmann <marcel@holtmann.org>
    Signed-off-by: David Sterba <dsterba@suse.cz>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
    Signed-off-by: Bjørn Mork <bjorn@mork.no>
  11. @sashalevin @gregkh

    nfsd: Fix oops when parsing a 0 length export

    sashalevin authored gregkh committed
    commit b2ea70afade7080360ac55c4e64ff7a5fafdb67b upstream.
    
    expkey_parse() oopses when handling a 0 length export. This is easily
    triggerable from usermode by writing 0 bytes into
    '/proc/[proc id]/net/rpc/nfsd.fh/channel'.
    
    Below is the log:
    
    [ 1402.286893] BUG: unable to handle kernel paging request at ffff880077c49fff
    [ 1402.287632] IP: [<ffffffff812b4b99>] expkey_parse+0x28/0x2e1
    [ 1402.287632] PGD 2206063 PUD 1fdfd067 PMD 1ffbc067 PTE 8000000077c49160
    [ 1402.287632] Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
    [ 1402.287632] CPU 1
    [ 1402.287632] Pid: 20198, comm: trinity Not tainted 3.2.0-rc2-sasha-00058-gc65cd37 #6
    [ 1402.287632] RIP: 0010:[<ffffffff812b4b99>]  [<ffffffff812b4b99>] expkey_parse+0x28/0x2e1
    [ 1402.287632] RSP: 0018:ffff880077f0fd68  EFLAGS: 00010292
    [ 1402.287632] RAX: ffff880077c49fff RBX: 00000000ffffffea RCX: 0000000001043400
    [ 1402.287632] RDX: 0000000000000000 RSI: ffff880077c4a000 RDI: ffffffff82283de0
    [ 1402.287632] RBP: ffff880077f0fe18 R08: 0000000000000001 R09: ffff880000000000
    [ 1402.287632] R10: 0000000000000000 R11: 0000000000000001 R12: ffff880077c4a000
    [ 1402.287632] R13: ffffffff82283de0 R14: 0000000001043400 R15: ffffffff82283de0
    [ 1402.287632] FS:  00007f25fec3f700(0000) GS:ffff88007d400000(0000) knlGS:0000000000000000
    [ 1402.287632] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
    [ 1402.287632] CR2: ffff880077c49fff CR3: 0000000077e1d000 CR4: 00000000000406e0
    [ 1402.287632] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    [ 1402.287632] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    [ 1402.287632] Process trinity (pid: 20198, threadinfo ffff880077f0e000, task ffff880077db17b0)
    [ 1402.287632] Stack:
    [ 1402.287632]  ffff880077db17b0 ffff880077c4a000 ffff880077f0fdb8 ffffffff810b411e
    [ 1402.287632]  ffff880000000000 ffff880077db17b0 ffff880077c4a000 ffffffff82283de0
    [ 1402.287632]  0000000001043400 ffffffff82283de0 ffff880077f0fde8 ffffffff81111f63
    [ 1402.287632] Call Trace:
    [ 1402.287632]  [<ffffffff810b411e>] ? lock_release+0x1af/0x1bc
    [ 1402.287632]  [<ffffffff81111f63>] ? might_fault+0x97/0x9e
    [ 1402.287632]  [<ffffffff81111f1a>] ? might_fault+0x4e/0x9e
    [ 1402.287632]  [<ffffffff81a8bcf2>] cache_do_downcall+0x3e/0x4f
    [ 1402.287632]  [<ffffffff81a8c950>] cache_write.clone.16+0xbb/0x130
    [ 1402.287632]  [<ffffffff81a8c9df>] ? cache_write_pipefs+0x1a/0x1a
    [ 1402.287632]  [<ffffffff81a8c9f8>] cache_write_procfs+0x19/0x1b
    [ 1402.287632]  [<ffffffff8118dc54>] proc_reg_write+0x8e/0xad
    [ 1402.287632]  [<ffffffff8113fe81>] vfs_write+0xaa/0xfd
    [ 1402.287632]  [<ffffffff8114142d>] ? fget_light+0x35/0x9e
    [ 1402.287632]  [<ffffffff8113ff8b>] sys_write+0x48/0x6f
    [ 1402.287632]  [<ffffffff81bbdb92>] system_call_fastpath+0x16/0x1b
    [ 1402.287632] Code: c0 c9 c3 55 48 63 d2 48 89 e5 48 8d 44 32 ff 41 57 41 56 41 55 41 54 53 bb ea ff ff ff 48 81 ec 88 00 00 00 48 89 b5 58 ff ff ff
    [ 1402.287632]  38 0a 0f 85 89 02 00 00 c6 00 00 48 8b 3d 44 4a e5 01 48 85
    [ 1402.287632] RIP  [<ffffffff812b4b99>] expkey_parse+0x28/0x2e1
    [ 1402.287632]  RSP <ffff880077f0fd68>
    [ 1402.287632] CR2: ffff880077c49fff
    [ 1402.287632] ---[ end trace 368ef53ff773a5e3 ]---
    
    Cc: "J. Bruce Fields" <bfields@fieldses.org>
    Cc: Neil Brown <neilb@suse.de>
    Cc: linux-nfs@vger.kernel.org
    Signed-off-by: Sasha Levin <levinsasha928@gmail.com>
    Signed-off-by: J. Bruce Fields <bfields@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  12. @gregkh

    svcrpc: destroy server sockets all at once

    J. Bruce Fields authored gregkh committed
    commit 2fefb8a09e7ed251ae8996e0c69066e74c5aa560 upstream.
    
    There's no reason I can see that we need to call sv_shutdown between
    closing the two lists of sockets.
    
    Signed-off-by: J. Bruce Fields <bfields@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  13. @gregkh

    svcrpc: fix double-free on shutdown of nfsd after changing pool mode

    J. Bruce Fields authored gregkh committed
    commit 61c8504c428edcebf23b97775a129c5b393a302b upstream.
    
    The pool_to and to_pool fields of the global svc_pool_map are freed on
    shutdown, but are initialized in nfsd startup only in the
    SVC_POOL_PERCPU and SVC_POOL_PERNODE cases.
    
    They *are* initialized to zero on kernel startup.  So as long as you use
    only SVC_POOL_GLOBAL (the default), this will never be a problem.
    
    You're also OK if you only ever use SVC_POOL_PERCPU or SVC_POOL_PERNODE.
    
    However, the following sequence events leads to a double-free:
    
    	1. set SVC_POOL_PERCPU or SVC_POOL_PERNODE
    	2. start nfsd: both fields are initialized.
    	3. shutdown nfsd: both fields are freed.
    	4. set SVC_POOL_GLOBAL
    	5. start nfsd: the fields are left untouched.
    	6. shutdown nfsd: now we try to free them again.
    
    Step 4 is actually unnecessary, since (for some bizarre reason), nfsd
    automatically resets the pool mode to SVC_POOL_GLOBAL on shutdown.
    
    Signed-off-by: J. Bruce Fields <bfields@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  14. @gregkh

    V4L/DVB: v4l2-ioctl: integer overflow in video_usercopy()

    Dan Carpenter authored gregkh committed
    commit 6c06108be53ca5e94d8b0e93883d534dd9079646 upstream.
    
    If ctrls->count is too high the multiplication could overflow and
    array_size would be lower than expected.  Mauro and Hans Verkuil
    suggested that we cap it at 1024.  That comes from the maximum
    number of controls with lots of room for expantion.
    
    $ grep V4L2_CID include/linux/videodev2.h | wc -l
    211
    
    Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
    Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  15. @gregkh

    i2c: Fix error value returned by several bus drivers

    Jean Delvare authored gregkh committed
    commit 7c1f59c9d5caf3a84f35549b5d58f3c055a68da5 upstream.
    
    When adding checks for ACPI resource conflicts to many bus drivers,
    not enough attention was paid to the error paths, and for several
    drivers this causes 0 to be returned on error in some cases. Fix this
    by properly returning a non-zero value on every error.
    
    Signed-off-by: Jean Delvare <khali@linux-fr.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  16. @richardweinberger @gregkh

    UBI: fix nameless volumes handling

    richardweinberger authored gregkh committed
    commit 4a59c797a18917a5cf3ff7ade296b46134d91e6a upstream.
    
    Currently it's possible to create a volume without a name. E.g:
    ubimkvol -n 32 -s 2MiB -t static /dev/ubi0 -N ""
    
    After that vtbl_check() will always fail because it does not permit
    empty strings.
    
    Signed-off-by: Richard Weinberger <richard@nod.at>
    Signed-off-by: Artem Bityutskiy <Artem.Bityutskiy@linux.intel.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  17. @lnussel @gregkh

    x86: Fix mmap random address range

    lnussel authored gregkh committed
    commit 9af0c7a6fa860698d080481f24a342ba74b68982 upstream.
    
    On x86_32 casting the unsigned int result of get_random_int() to
    long may result in a negative value.  On x86_32 the range of
    mmap_rnd() therefore was -255 to 255.  The 32bit mode on x86_64
    used 0 to 255 as intended.
    
    The bug was introduced by 675a081 ("x86: unify mmap_{32|64}.c")
    in January 2008.
    
    Signed-off-by: Ludwig Nussel <ludwig.nussel@suse.de>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: harvey.harrison@gmail.com
    Cc: "H. Peter Anvin" <hpa@zytor.com>
    Cc: Harvey Harrison <harvey.harrison@gmail.com>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Link: http://lkml.kernel.org/r/201111152246.pAFMklOB028527@wpaz5.hot.corp.google.com
    Signed-off-by: Ingo Molnar <mingo@elte.hu>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Something went wrong with that request. Please try again.