Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Commits on Jan 9, 2008
  1. @gregkh

    Linux 2.6.23.13

    gregkh authored
  2. @gregkh

    hwmon: (w83627ehf) Be more careful when changing VID input level

    Jean Delvare authored gregkh committed
    Already in Linus' tree:
    http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=58e6e78119da2bdade9f6f588155f0320072b76b
    
    Fix for:
    http://bugzilla.kernel.org/show_bug.cgi?id=9634
    
    The VID input level change has been reported to cause trouble. Be more
    careful in this respect:
    * Only change the level on the W83627EHF/EHG. The W83627DHG is more
      complex in this respect.
    * Don't change the level if the VID pins are in output mode.
    * Only set the level to TTL if VRM 9.x is used.
    
    Signed-off-by: Jean Delvare <khali@linux-fr.org>
    Signed-off-by: Mark M. Hoffman <mhoffman@lightlink.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Commits on Dec 18, 2007
  1. @gregkh

    Linux 2.6.23.12

    gregkh authored
  2. @gregkh

    Revert "PNP: increase the maximum number of resources"

    gregkh authored
    This reverts commit fc175ad.
    
    There have been reports that it causes problems:
    	http://bugzilla.kernel.org/show_bug.cgi?id=9514
    people are still debating for 2.6.24 if it should be reverted or not,
    but as it causes a known problem, we will revert this for now.
    
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Commits on Dec 15, 2007
  1. @gregkh

    Linux 2.6.23.11

    gregkh authored
  2. @gregkh

    BRIDGE: Section fix.

    Andrew Morton authored gregkh committed
    WARNING: vmlinux.o(.init.text+0x204e2): Section mismatch: reference to .exit.text:br_fdb_fini (between 'br_init' and 'br_fdb_init')
    
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  3. @gregkh

    Revert "Freezer: Fix APM emulation breakage"

    gregkh authored
    This reverts commit a6eda37.
    
    It causes a build breakage.
    
    Thanks to Chuck Ebbert <cebbert@redhat.com> for pointing it out.
    
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Commits on Dec 14, 2007
  1. @gregkh

    Linux 2.6.23.10

    gregkh authored
  2. @rjwysocki @gregkh

    XFS: Make xfsbufd threads freezable

    rjwysocki authored gregkh committed
    patch 978c7b2 in mainline
    
    Fix breakage caused by commit 8314418
    that did not introduce the necessary call to set_freezable() in
    xfs/linux-2.6/xfs_buf.c .
    
    SGI-PV: 974224
    SGI-Modid: xfs-linux-melb:xfs-kern:30203a
    
    Signed-off-by: Rafael J. Wysocki <rjw@sisk.pl>
    Signed-off-by: David Chinner <dgc@sgi.com>
    Signed-off-by: Lachlan McIlroy <lachlan@sgi.com>
    Cc: Oliver Pintr <oliver.pntr@gmail.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  3. @xemul @gregkh

    BRIDGE: Properly dereference the br_should_route_hook

    xemul authored gregkh committed
    [BRIDGE]: Properly dereference the br_should_route_hook
    
    [ Upstream commit: 82de382 ]
    
    This hook is protected with the RCU, so simple
    
    if (br_should_route_hook)
    	br_should_route_hook(...)
    
    is not enough on some architectures.
    
    Use the rcu_dereference/rcu_assign_pointer in this case.
    
    Fixed Stephen's comment concerning using the typeof().
    
    Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  4. @kaber @gregkh

    NETFILTER: xt_TCPMSS: remove network triggerable WARN_ON

    kaber authored gregkh committed
    [NETFILTER]: xt_TCPMSS: remove network triggerable WARN_ON
    
    [ Upstream commit: 9dc0564 ]
    
    ipv6_skip_exthdr() returns -1 for invalid packets. don't WARN_ON
    that.
    
    Signed-off-by: Patrick McHardy <kaber@trash.net>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  5. @kaber @gregkh

    XFRM: Fix leak of expired xfrm_states

    kaber authored gregkh committed
    [XFRM]: Fix leak of expired xfrm_states
    
    [ Upstream commit: 5dba479 ]
    
    The xfrm_timer calls __xfrm_state_delete, which drops the final reference
    manually without triggering destruction of the state. Change it to use
    xfrm_state_put to add the state to the gc list when we're dropping the
    last reference. The timer function may still continue to use the state
    safely since the final destruction does a del_timer_sync().
    
    Signed-off-by: Patrick McHardy <kaber@trash.net>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  6. @htejun @gregkh

    libata: kill spurious NCQ completion detection

    htejun authored gregkh committed
    patch 459ad68 in mainline.
    
    Spurious NCQ completion detection implemented in ahci was incorrect.
    On AHCI receving and processing FISes and raising interrupts are not
    interlocked and spurious interrupts are expected.
    
    For example, if an interrupt occurs while interrupt handler is running
    and the running interrupt handler handles the event the new IRQ
    indicated, after IRQ handler finishes, it will be executed again
    because IRQ pending bit is set by the new interrupt but there won't be
    anything to process.
    
    Please read the following message for more information.
    
      http://article.gmane.org/gmane.linux.ide/26012
    
    This patch...
    
    * Removes all spurious IRQ whining from ahci.  Spurious NCQ completion
      detection was completely wrong.  Spurious D2H Register FIS taught us
      that some early drives send spurious D2H Register FIS with I bit set
      while NCQ commands are in progress but none of recent drives does
      that and even the ones which show such behavior can do NCQ fine.
    
    * Kills all NCQ blacklist entries which were added because of spurious
      NCQ completions.  I tracked down each commit and verified all
      removed ones are actually added because of spurious completions.
    
      WD740ADFD-00NLR1 wasn't deleted but moved upward because the drive
      not only had spurious NCQ completions but also is slow on sequential
      data transfers if NCQ is enabled.
    
      Maxtor 7V300F0 was added by 0e3dbc0
      from Alan Cox.  I can only find evidences that the drive only had
      troubles with spuruious completions by searching the mailing list.
      This entry needs to be verified and removed if it doesn't have other
      NCQ related problems.
    
    Signed-off-by: Tejun Heo <htejun@gmail.com>
    Cc: Alan Cox <alan@lxorguk.ukuu.org.uk>
    Signed-off-by: Jeff Garzik <jeff@garzik.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  7. @gregkh

    NETFILTER: fix forgotten module release in xt_CONNMARK and xt_CONNSEC…

    Jan Engelhardt authored gregkh committed
    …MARK
    
    [NETFILTER]: fix forgotten module release in xt_CONNMARK and xt_CONNSECMARK
    
    [ Upstream commit: 67b4af2 ]
    
    Fix forgotten module release in xt_CONNMARK and xt_CONNSECMARK
    
    When xt_CONNMARK is used outside the mangle table and the user specified
    "--restore-mark", the connmark_tg_check() function will (correctly)
    error out, but (incorrectly) forgets to release the L3 conntrack module.
    Same for xt_CONNSECMARK.
    
    Fix is to move the call to acquire the L3 module after the basic
    constraint checks.
    
    Signed-off-by: Jan Engelhardt <jengelh@computergmbh.de>
    Signed-off-by: Patrick McHardy <kaber@trash.net>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  8. @gregkh

    UNIX: EOF on non-blocking SOCK_SEQPACKET

    Florian Zumbiehl authored gregkh committed
    [UNIX]: EOF on non-blocking SOCK_SEQPACKET
    
    [ Upstream commit: 0a11225 ]
    
    I am not absolutely sure whether this actually is a bug (as in: I've got
    no clue what the standards say or what other implementations do), but at
    least I was pretty surprised when I noticed that a recv() on a
    non-blocking unix domain socket of type SOCK_SEQPACKET (which is connection
    oriented, after all) where the remote end has closed the connection
    returned -1 (EAGAIN) rather than 0 to indicate end of file.
    
    This is a test case:
    
    | #include <sys/types.h>
    | #include <unistd.h>
    | #include <sys/socket.h>
    | #include <sys/un.h>
    | #include <fcntl.h>
    | #include <string.h>
    | #include <stdlib.h>
    |
    | int main(){
    | 	int sock;
    | 	struct sockaddr_un addr;
    | 	char buf[4096];
    | 	int pfds[2];
    |
    | 	pipe(pfds);
    | 	sock=socket(PF_UNIX,SOCK_SEQPACKET,0);
    | 	addr.sun_family=AF_UNIX;
    | 	strcpy(addr.sun_path,"/tmp/foobar_testsock");
    | 	bind(sock,(struct sockaddr *)&addr,sizeof(addr));
    | 	listen(sock,1);
    | 	if(fork()){
    | 		close(sock);
    | 		sock=socket(PF_UNIX,SOCK_SEQPACKET,0);
    | 		connect(sock,(struct sockaddr *)&addr,sizeof(addr));
    | 		fcntl(sock,F_SETFL,fcntl(sock,F_GETFL)|O_NONBLOCK);
    | 		close(pfds[1]);
    | 		read(pfds[0],buf,sizeof(buf));
    | 		recv(sock,buf,sizeof(buf),0); // <-- this one
    | 	}else accept(sock,NULL,NULL);
    | 	exit(0);
    | }
    
    If you try it, make sure /tmp/foobar_testsock doesn't exist.
    
    The marked recv() returns -1 (EAGAIN) on 2.6.23.9. Below you find a
    patch that fixes that.
    
    Signed-off-by: Florian Zumbiehl <florz@florz.de>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  9. @gregkh

    TCP: illinois: Incorrect beta usage

    Stephen Hemminger authored gregkh committed
    [TCP] illinois: Incorrect beta usage
    
    [ Upstream commit: a357dde ]
    
    Lachlan Andrew observed that my TCP-Illinois implementation uses the
    beta value incorrectly:
    The parameter  beta  in the paper specifies the amount to decrease
    *by*:  that is, on loss,
     W <-  W -  beta*W
    but in   tcp_illinois_ssthresh() uses  beta  as the amount
    to decrease  *to*: W <- beta*W
    
    This bug makes the Linux TCP-Illinois get less-aggressive on uncongested network,
    hurting performance. Note: since the base beta value is .5, it has no
    impact on a congested network.
    
    Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  10. @gregkh

    IPV6: Restore IPv6 when MTU is big enough

    Evgeniy Polyakov authored gregkh committed
    [IPV6]: Restore IPv6 when MTU is big enough
    
    [ Upstream commit: d31c7b8 ]
    
    Avaid provided test application, so bug got fixed.
    
    IPv6 addrconf removes ipv6 inner device from netdev each time cmu
    changes and new value is less than IPV6_MIN_MTU (1280 bytes).
    When mtu is changed and new value is greater than IPV6_MIN_MTU,
    it does not add ipv6 addresses and inner device bac.
    
    This patch fixes that.
    
    Tested with Avaid's application, which works ok now.
    
    Signed-off-by: Evgeniy Polyakov <johnpol@2ka.mipt.ru>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  11. @xemul @gregkh

    DECNET: dn_nl_deladdr() almost always returns no error

    xemul authored gregkh committed
    [DECNET]: dn_nl_deladdr() almost always returns no error
    
    [ Upstream commit: 3ccd862 ]
    
    As far as I see from the err variable initialization
    the dn_nl_deladdr() routine was designed to report errors
    like "EADDRNOTAVAIL" and probaby "ENODEV".
    
    But the code sets this err to 0 after the first nlmsg_parse
    and goes on, returning this 0 in any case.
    
    Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
    Acked-by: Steven Whitehouse <swhiteho@redhat.com>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  12. @joonwpark @gregkh

    VLAN: Fix nested VLAN transmit bug

    joonwpark authored gregkh committed
    [VLAN]: Fix nested VLAN transmit bug
    
    [ Upstream commit: 6ab3b48 ]
    
    Fix misbehavior of vlan_dev_hard_start_xmit() for recursive encapsulations.
    
    Signed-off-by: Joonwoo Park <joonwpark81@gmail.com>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  13. @gregkh

    TEXTSEARCH: Do not allow zero length patterns in the textsearch infra…

    Pablo Neira Ayuso authored gregkh committed
    …structure
    
    [TEXTSEARCH]: Do not allow zero length patterns in the textsearch infrastructure
    
    [ Upstream commit: e03ba84 ]
    
    If a zero length pattern is passed then return EINVAL.
    Avoids infinite loops (bm) or invalid memory accesses (kmp).
    
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: Patrick McHardy <kaber@trash.net>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  14. @gregkh

    RXRPC: Add missing select on CRYPTO

    David Howells authored gregkh committed
    [RXRPC]: Add missing select on CRYPTO
    
    [ Upstream commit: d5a784b ]
    
    AF_RXRPC uses the crypto services, so should depend on or select CRYPTO.
    
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  15. @xemul @gregkh

    BRIDGE: Lost call to br_fdb_fini() in br_init() error path

    xemul authored gregkh committed
    [BRIDGE]: Lost call to br_fdb_fini() in br_init() error path
    
    [ Upstream commit: 17efdd4 ]
     
    In case the br_netfilter_init() (or any subsequent call)
    fails, the br_fdb_fini() must be called to free the allocated
    in br_fdb_init() br_fdb_cache kmem cache.
    
    Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  16. @gregkh

    PFKEY: Sending an SADB_GET responds with an SADB_GET

    Charles Hardin authored gregkh committed
    [PFKEY]: Sending an SADB_GET responds with an SADB_GET
    
    [ Upstream commit: 435000b ]
    
    Kernel needs to respond to an SADB_GET with the same message type to
    conform to the RFC 2367 Section 3.1.5
    
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  17. @gregkh

    TCP: MTUprobe: fix potential sk_send_head corruption

    Ilpo Järvinen authored gregkh committed
    [TCP] MTUprobe: fix potential sk_send_head corruption
    
    [ Upstream commit: 6e42141 ]
    
    When the abstraction functions got added, conversion here was
    made incorrectly. As a result, the skb may end up pointing
    to skb which got included to the probe skb and then was freed.
    For it to trigger, however, skb_transmit must fail sending as
    well.
    
    Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@helsinki.fi>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Cc: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  18. @herbertx @gregkh

    TCP: Fix TCP header misalignment

    herbertx authored gregkh committed
    [TCP]: Fix TCP header misalignment
    
    [ Upstream commit: 21df56c ]
    
    Indeed my previous change to alloc_pskb has made it possible
    for the TCP header to be misaligned iff the MTU is not a multiple
    of 4 (and less than a page).  So I suspect the optimised IPsec
    MTU calculation is giving you just such an MTU :)
    
    This patch fixes it by changing alloc_pskb to make sure that
    the size is at least 32-bit aligned.  This does not cause the
    problem fixed by the previous patch because max_header is always
    32-bit aligned which means that in the SG/NOTSO case this will
    be a no-op.
    
    I thought about putting this in the callers but all the current
    callers are from TCP.  If and when we get a non-TCP caller we
    can always create a TCP wrapper for this function and move the
    alignment over there.
    
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  19. @herbertx @gregkh

    CRYPTO api: Fix potential race in crypto_remove_spawn

    herbertx authored gregkh committed
    [CRYPTO] api: Fix potential race in crypto_remove_spawn
    
    [ Upstream commit: 38cb241 ]
    
    As it is crypto_remove_spawn may try to unregister an instance which is
    yet to be registered.  This patch fixes this by checking whether the
    instance has been registered before attempting to remove it.
    
    It also removes a bogus cra_destroy check in crypto_register_instance as
    1) it's outside the mutex;
    2) we have a check in __crypto_register_alg already.
    
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Cc: David Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  20. @gregkh

    TCP: Problem bug with sysctl_tcp_congestion_control function

    Sam Jansen authored gregkh committed
    [TCP]: Problem bug with sysctl_tcp_congestion_control function
    
    [ Upstream commit: 5487796 ]
    
    sysctl_tcp_congestion_control seems to have a bug that prevents it
    from actually calling the tcp_set_default_congestion_control
    function. This is not so apparent because it does not return an error
    and generally the /proc interface is used to configure the default TCP
    congestion control algorithm.  This is present in 2.6.18 onwards and
    probably earlier, though I have not inspected 2.6.15--2.6.17.
    
    sysctl_tcp_congestion_control calls sysctl_string and expects a successful
    return code of 0. In such a case it actually sets the congestion control
    algorithm with tcp_set_default_congestion_control. Otherwise, it returns the
    value returned by sysctl_string. This was correct in 2.6.14, as sysctl_string
    returned 0 on success. However, sysctl_string was updated to return 1 on
    success around about 2.6.15 and sysctl_tcp_congestion_control was not updated.
    Even though sysctl_tcp_congestion_control returns 1, do_sysctl_strategy
    converts this return code to '0', so the caller never notices the error.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Cc: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  21. @gregkh

    ATM: [he] initialize lock and tasklet earlier

    chas williams authored gregkh committed
    [ATM]: [he] initialize lock and tasklet earlier
    
    [ Upstream commit: 8a8037a ]
    
    if you are lucky (unlucky?) enough to have shared interrupts, the
    interrupt handler can be called before the tasklet and lock are ready
    for use.
    
    Signed-off-by: chas williams <chas@cmf.nrl.navy.mil>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Cc: David Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  22. @gregkh

    IPV4: Remove bogus ifdef mess in arp_process

    Adrian Bunk authored gregkh committed
    [IPV4]: Remove bogus ifdef mess in arp_process
    
    [ Upstream commit: 3660019 ]
    
    The #ifdef's in arp_process() were not only a mess, they were also wrong
    in the CONFIG_NET_ETHERNET=n and (CONFIG_NETDEV_1000=y or
    CONFIG_NETDEV_10000=y) cases.
    
    Since they are not required this patch removes them.
    
    Also removed are some #ifdef's around #include's that caused compile
    errors after this change.
    
    Signed-off-by: Adrian Bunk <bunk@kernel.org>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Cc: David Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  23. @gregkh

    NET: Corrects a bug in ip_rt_acct_read()

    Eric Dumazet authored gregkh committed
    [NET]: Corrects a bug in ip_rt_acct_read()
    
    [ Upstream commit: 483b23f ]
    
    It seems that stats of cpu 0 are counted twice, since
    for_each_possible_cpu() is looping on all possible cpus, including 0
    
    Before percpu conversion of ip_rt_acct, we should also remove the
    assumption that CPU 0 is online (or even possible)
    
    Signed-off-by: Eric Dumazet <dada1@cosmosbay.com>
    Cc: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  24. @gregkh

    create /sys/.../power when CONFIG_PM is set

    Daniel Drake authored gregkh committed
    patch dec13c1 in mainline.
    
    The CONFIG_SUSPEND changes in 2.6.23 caused a regression under certain
    configuration conditions (SUSPEND=n, USB_AUTOSUSPEND=y) where all USB
    device attributes in sysfs (idVendor, idProduct, ...) silently disappeared,
    causing udev breakage and more.
    
    The cause of this is that the /sys/.../power subdirectory is now only
    created when CONFIG_PM_SLEEP is set, however, it should be created whenever
    CONFIG_PM is set to handle the above situation.  The following patch fixes
    the regression.
    
    Signed-off-by: Daniel Drake <dsd@gentoo.org>
    Acked-by: Rafael J. Wysocki <rjw@sisk.pl>
    Cc: Alan Stern <stern@rowland.harvard.edu>
    Cc: Kay Sievers <kay.sievers@vrfy.org>
    Cc: stable <stable@kernel.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  25. @gregkh

    netfilter: Fix kernel panic with REDIRECT target.

    Evgeniy Polyakov authored gregkh committed
    This patch fixes a NAT regression in 2.6.23, resulting in a
    crash when a connection is NATed and matches a conntrack
    helper after NAT.
    
    Please apply, thanks.
    [NETFILTER]: Fix kernel panic with REDIRECT target.
    
    Upstream commit 1f30532
    
    When connection tracking entry (nf_conn) is about to copy itself it can
    have some of its extension users (like nat) as being already freed and
    thus not required to be copied.
    
    Actually looking at this function I suspect it was copied from
    nf_nat_setup_info() and thus bug was introduced.
    
    Report and testing from David <david@unsolicited.net>.
    
    [ Patrick McHardy states:
    
            I now understand whats happening:
    
            - new connection is allocated without helper
            - connection is REDIRECTed to localhost
            - nf_nat_setup_info adds NAT extension, but doesn't initialize it yet
            - nf_conntrack_alter_reply performs a helper lookup based on the
               new tuple, finds the SIP helper and allocates a helper extension,
               causing reallocation because of too little space
            - nf_nat_move_storage is called with the uninitialized nat extension
    
            So your fix is entirely correct, thanks a lot :)  ]
    
    Signed-off-by: Evgeniy Polyakov <johnpol@2ka.mipt.ru>
    Acked-by: Patrick McHardy <kaber@trash.net>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  26. @gregkh

    nf_nat: fix memset error

    Li Zefan authored gregkh committed
    This patch fixes an incorrect memset in the NAT code, causing
    misbehaviour when unloading and reloading the NAT module.
    Applies to stable-2.6.22 and stable-2.6.23.
    
    Please apply, thanks.
    [NETFILTER]: nf_nat: fix memset error
    
    Upstream commit e0bf9cf
    
    The size passing to memset is the size of a pointer. Fixes
    misbehaviour when unloading and reloading the NAT module.
    
    Signed-off-by: Li Zefan <lizf@cn.fujitsu.com>
    Signed-off-by: Patrick McHardy <kaber@trash.net>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  27. @gregkh

    esp_scsi: fix reset cleanup spinlock recursion

    Maciej W. Rozycki authored gregkh committed
    patch 522939d in mainline.
    
    The esp_reset_cleanup() function is called with the host lock held and
    invokes starget_for_each_device() which wants to take it too.  Here is a
    fix along the lines of shost_for_each_device()/__shost_for_each_device()
    adding a __starget_for_each_device() counterpart which assumes the lock
    has already been taken.
    
    Eventually, I think the driver should get modified so that more work is
    done as a softirq rather than in the interrupt context, but for now it
    fixes a bug that causes the spinlock debugger to fire.
    
    While at it, it fixes a small number of cosmetic problems with
    starget_for_each_device() too.
    
    Signed-off-by: Maciej W. Rozycki <macro@linux-mips.org>
    Acked-by: David S. Miller <davem@davemloft.net>
    Cc: James Bottomley <James.Bottomley@steeleye.com>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  28. @gregkh

    revert "dpt_i2o: convert to SCSI hotplug model"

    Andrew Morton authored gregkh committed
    patch 24601bb in mainline.
    
    revert
    
        commit 55d9fcf
        Author: Matthew Wilcox <matthew@wil.cx>
        Date:   Mon Jul 30 15:19:18 2007 -0600
    
            [SCSI] dpt_i2o: convert to SCSI hotplug model
    
             - Delete refereces to HOSTS_C
             - Switch to module_init/module_exit instead of detect/release
             - Don't pass around the host template and rename it to adpt_template
             - Switch from scsi_register/scsi_unregister to scsi_host_alloc,
               scsi_add_host, scsi_scan_host and scsi_host_put.
    
    Because it caused (for unknown reasons) Andres' all-data-reads-as-zeroes
    problem, reported at
    http://groups.google.com/group/fa.linux.kernel/msg/083a9acff0330234
    
    Cc: Matthew Wilcox <matthew@wil.cx>
    Cc: Mark Salyzyn <mark_salyzyn@adaptec.com>
    Cc: James Bottomley <James.Bottomley@SteelEye.com>
    Acked-by: FUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>
    Cc: Anders Henke <anders.henke@1und1.de>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Something went wrong with that request. Please try again.