1. 17 2月, 2015 1 次提交
  2. 11 11月, 2014 1 次提交
  3. 20 11月, 2013 1 次提交
    • H
      Revert "parisc: implement full version of access_ok()" · a0ffa8f0
      Helge Deller 提交于
      This reverts commit 63379c13.
      
      It broke userspace and adding more checking is not needed.
      Even checking if a syscall would access memory in page zero doesn't
      makes sense since it may lead to some syscalls returning -EFAULT
      where we would return other error codes on other platforms.
      In summary, just drop this change and return to always return 1.
      Signed-off-by: NHelge Deller <deller@gmx.de>
      a0ffa8f0
  4. 08 11月, 2013 2 次提交
    • H
      parisc: implement full version of access_ok() · 63379c13
      Helge Deller 提交于
      Up to now PA-RISC could live with a trivial version of access_ok().
      Our fault handlers can correctly handle fault cases.
      
      But testcases showed that we need a better access check else we won't
      always return correct errno failure codes to userspace.
      
      Problem showed up during 32bit userspace tests in which writev() used a
      32bit memory area and length which would then wrap around on 64bit
      kernel.
      Signed-off-by: NHelge Deller <deller@gmx.de>
      63379c13
    • H
      parisc: provide macro to create exception table entries · 61dbbaeb
      Helge Deller 提交于
      Provide a macro ASM_EXCEPTIONTABLE_ENTRY() to create exception table
      entries and convert all open-coded places to use that macro.
      
      This patch is a first step toward creating a exception table which only
      holds 32bit pointers even on a 64bit kernel. That way in my own kernel
      I was able to reduce the in-kernel exception table from 44kB to 22kB.
      Signed-off-by: NHelge Deller <deller@gmx.de>
      61dbbaeb
  5. 26 4月, 2013 1 次提交
    • W
      parisc: uaccess: fix compiler warnings caused by __put_user casting · 0f28b628
      Will Deacon 提交于
      When targetting 32-bit processors, __put_user emits a pair of stw
      instructions for the 8-byte case. If the type of __val is a pointer, the
      marshalling code casts it to the wider integer type of u64, resulting
      in the following compiler warnings:
      
        kernel/signal.c: In function 'copy_siginfo_to_user':
        kernel/signal.c:2752:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
        kernel/signal.c:2752:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
        [...]
      
      This patch fixes the warnings by removing the marshalling code and using
      the correct output modifiers in the __put_{user,kernel}_asm64 macros
      so that GCC will allocate the right registers without the need to
      extract the two words explicitly.
      
      Cc: Helge Deller <deller@gmx.de>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      Signed-off-by: NHelge Deller <deller@gmx.de>
      0f28b628
  6. 31 5月, 2012 1 次提交
  7. 29 3月, 2012 1 次提交
  8. 07 3月, 2010 1 次提交
  9. 12 6月, 2009 1 次提交
  10. 13 3月, 2009 1 次提交
  11. 06 1月, 2009 1 次提交
    • K
      parisc: fix kernel crash (protection id trap) when compiling ruby1.9 · c61c25eb
      Kyle McMartin 提交于
      On Wed, Dec 17, 2008 at 11:46:05PM +0100, Helge Deller wrote:
      >
      
      Honestly, I can't decide whether to apply this. It really should never
      happen in the kernel, since the kernel can guarantee it won't get the
      access rights failure (highest privilege level, and can set %sr and
      %protid to whatever it wants.)
      
      It really genuinely is a bug that probably should panic the kernel. The
      only precedent I can easily see is x86 fixing up a bad iret with a
      general protection fault, which is more or less analogous to code 27
      here.
      
      On the other hand, taking the exception on a userspace access really
      isn't all that critical, and there's fundamentally little reason for the
      kernel not to SIGSEGV the process, and continue...
      
      Argh.
      
      (btw, I've instrumented my do_sys_poll with a pile of assertions that
       %cr8 << 1 == %sr3 == current->mm.context... let's see if where we're
       getting corrupted is deterministic, though, I would guess that it won't
       be.)
      Signed-off-by: NKyle McMartin <kyle@mcmartin.ca>
      c61c25eb
  12. 11 10月, 2008 1 次提交
  13. 17 2月, 2007 4 次提交
  14. 28 6月, 2006 1 次提交
  15. 08 9月, 2005 1 次提交
  16. 01 5月, 2005 1 次提交
    • J
      [PATCH] misc verify_area cleanups · e49332bd
      Jesper Juhl 提交于
      There were still a few comments left refering to verify_area, and two
      functions, verify_area_skas & verify_area_tt that just wrap corresponding
      access_ok_skas & access_ok_tt functions, just like verify_area does for
      access_ok - deprecate those.
      
      There was also a few places that still used verify_area in commented-out
      code, fix those up to use access_ok.
      
      After applying this one there should not be anything left but finally
      removing verify_area completely, which will happen after a kernel release
      or two.
      Signed-off-by: NJesper Juhl <juhl-lkml@dif.dk>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      e49332bd
  17. 17 4月, 2005 1 次提交
    • L
      Linux-2.6.12-rc2 · 1da177e4
      Linus Torvalds 提交于
      Initial git repository build. I'm not bothering with the full history,
      even though we have it. We can create a separate "historical" git
      archive of that later if we want to, and in the meantime it's about
      3.2GB when imported into git - space that would just make the early
      git days unnecessarily complicated, when we don't have a lot of good
      infrastructure for it.
      
      Let it rip!
      1da177e4