1. 23 6月, 2009 16 次提交
  2. 22 6月, 2009 16 次提交
  3. 21 6月, 2009 8 次提交
    • T
      Merge branch 'topic/hda' into for-linus · 47166281
      Takashi Iwai 提交于
      * topic/hda:
        ALSA: hda - Add model=6530g option
        ALSA: hda - Acer Inspire 6530G model for Realtek ALC888
        ALSA: HDA - Correct trivial typos in comments.
        ALSA: HDA - Name-fixes in code (tagra/targa)
        ALSA: HDA - Add pci-quirk for MSI MS-7350 motherboard.
        ALSA: hda - Fix memory leak at codec creation
      47166281
    • T
      Merge branch 'topic/caiaq' into for-linus · 0b6306f6
      Takashi Iwai 提交于
      * topic/caiaq:
        ALSA: snd_usb_caiaq: fix legacy input streaming
      0b6306f6
    • T
      Merge branch 'topic/asoc' into for-linus · 9fd0d96e
      Takashi Iwai 提交于
      * topic/asoc:
        ASoC: Kill BUS_ID_SIZE
      9fd0d96e
    • T
      ALSA: hda - Add model=6530g option · b1a91469
      Takashi Iwai 提交于
      Add the new model string corresponding to the previous Acer Aspire
      6530G support.
      Signed-off-by: NTakashi Iwai <tiwai@suse.de>
      b1a91469
    • T
      ALSA: hda - Acer Inspire 6530G model for Realtek ALC888 · d2fd4b09
      Tony Vroon 提交于
      The selected 4930G model seemed to keep the subwoofer 'tuba'
      function from operating correctly. Removing the existing PCI
      ID match made this work again, but it was mapped to 'Side'
      instead of to LFE as one would expect.
      This attempts to enable all functionality and keep the amount
      of available mixer sliders low. Any slider that had no audible
      effect on the output audio has been removed, and as such EAPD
      is not currently enabled.
      Signed-off-by: NTony Vroon <tony@linx.net>
      Signed-off-by: NTakashi Iwai <tiwai@suse.de>
      d2fd4b09
    • P
      lockdep: Select frame pointers on x86 · 00540e5d
      Peter Zijlstra 提交于
      x86 stack traces are a piece of crap without frame pointers, and its not
      like the 'performance gain' of not having stack pointers matters when you
      selected lockdep.
      Reported-by: NAndrew Morton <akpm@linux-foundation.org>
      LKML-Reference: <new-submission>
      Cc: <stable@kernel.org>
      Signed-off-by: NPeter Zijlstra <a.p.zijlstra@chello.nl>
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      00540e5d
    • J
      mm: page_alloc: clear PG_locked before checking flags on free · c277331d
      Johannes Weiner 提交于
      da456f14 "page allocator: do not disable interrupts in free_page_mlock()" moved
      the PG_mlocked clearing after the flag sanity checking which makes mlocked
      pages always trigger 'bad page'.  Fix this by clearing the bit up front.
      Reported--and-debugged-by: NPeter Chubb <peter.chubb@nicta.com.au>
      Signed-off-by: NJohannes Weiner <hannes@cmpxchg.org>
      Acked-by: NMel Gorman <mel@csn.ul.ie>
      Tested-by: NMaxim Levitsky <maximlevitsky@gmail.com>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      c277331d
    • L
      x86, 64-bit: Clean up user address masking · 9063c61f
      Linus Torvalds 提交于
      The discussion about using "access_ok()" in get_user_pages_fast() (see
      commit 7f818906: "x86: don't use
      'access_ok()' as a range check in get_user_pages_fast()" for details and
      end result), made us notice that x86-64 was really being very sloppy
      about virtual address checking.
      
      So be way more careful and straightforward about masking x86-64 virtual
      addresses:
      
       - All the VIRTUAL_MASK* variants now cover half of the address
         space, it's not like we can use the full mask on a signed
         integer, and the larger mask just invites mistakes when
         applying it to either half of the 48-bit address space.
      
       - /proc/kcore's kc_offset_to_vaddr() becomes a lot more
         obvious when it transforms a file offset into a
         (kernel-half) virtual address.
      
       - Unify/simplify the 32-bit and 64-bit USER_DS definition to
         be based on TASK_SIZE_MAX.
      
      This cleanup and more careful/obvious user virtual address checking also
      uncovered a buglet in the x86-64 implementation of strnlen_user(): it
      would do an "access_ok()" check on the whole potential area, even if the
      string itself was much shorter, and thus return an error even for valid
      strings. Our sloppy checking had hidden this.
      
      So this fixes 'strnlen_user()' to do this properly, the same way we
      already handled user strings in 'strncpy_from_user()'.  Namely by just
      checking the first byte, and then relying on fault handling for the
      rest.  That always works, since we impose a guard page that cannot be
      mapped at the end of the user space address space (and even if we
      didn't, we'd have the address space hole).
      Acked-by: NIngo Molnar <mingo@elte.hu>
      Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
      Cc: Andrew Morton <akpm@linux-foundation.org>
      Cc: Nick Piggin <npiggin@suse.de>
      Cc: Hugh Dickins <hugh.dickins@tiscali.co.uk>
      Cc: H. Peter Anvin <hpa@zytor.com>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Alan Cox <alan@lxorguk.ukuu.org.uk>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      9063c61f