1. 17 8月, 2010 2 次提交
    • A
      kbuild: confdata.c explicitly reference errno, thus need <errno.h> · 94bedeca
      Arnaud Lacombe 提交于
      This fixes:
      % gmake LKC_GENPARSER=1 menuconfig
      [...]
      scripts/kconfig/confdata.c:739: error: 'errno' undeclared (first use in this function)
      scripts/kconfig/confdata.c:739: error: (Each undeclared identifier is reported only once
      scripts/kconfig/confdata.c:739: error: for each function it appears in.)
      scripts/kconfig/confdata.c:739: error: 'ENOENT' undeclared (first use in this function)
      
      triggered on NetBSD.
      Signed-off-by: NArnaud Lacombe <lacombar@gmail.com>
      Signed-off-by: NMichal Marek <mmarek@suse.cz>
      94bedeca
    • N
      nconfig: add search support · a72f3e2b
      Nir Tzachar 提交于
      Remove the old hotkeys feature, and replace it by an interactive string
      search.
      From nconfig help:
      
      Searching: pressing '/' triggers interactive search mode.
                 nconfig performs a case insensitive search for the string
                 in the menu prompts (no regex support).
                 Pressing the up/down keys highlights the previous/next
                 matching item. Backspace removes one character from the
                 match string. Pressing either '/' again or ESC exits
                 search mode. All other keys behave normally.
      
      Miscellaneous other changes (including Rundy's and Justin's input).
      Signed-off-by: NNir Tzachar <nir.tzachar@gmail.com>
      Acked-by: NSam Ravnborg <sam@ravnborg.org>
      Signed-off-by: NMichal Marek <mmarek@suse.cz>
      a72f3e2b
  2. 15 8月, 2010 2 次提交
    • S
      kconfig: fix segfault when detecting recursive dependency · 3643f849
      Sam Ravnborg 提交于
      Following sample Kconfig generated a segfault:
      
      config FOO
              bool
              select PERF_EVENTS if HAVE_HW_BREAKPOINT
      
      config PERF_EVENTS
              bool
      
      config HAVE_HW_BREAKPOINT
              bool
              depends on PERF_EVENTS
      
      Fix by reverting back to a valid property if there was no
      property on the stack of symbols.
      
      The above pattern were seen in sh Kconfig.
      A fix for the Kconfig file has been sent to the sh folks.
      Signed-off-by: NSam Ravnborg <sam@ravnborg.org>
      Signed-off-by: NMichal Marek <mmarek@suse.cz>
      3643f849
    • S
      kconfig: fix savedefconfig with choice marked optional · 84062dd3
      Sam Ravnborg 提交于
      savedefconfig failed to save the correct minimal config
      when it encountered a choice marked optional.
      
      Consider following minimal configuration:
      $cat Kconfig
      choice
      	prompt "choice"
      	optional
      
      config A
      	bool "a"
      
      config B
      	bool "b"
      
      endchoice
      
      $cat .config | grep -v ^#
      CONFIG_A=y
      
      $conf --savedefconfig=defconfig Kconfig
      
      would before this fix result in an empty file, because
      kconfig would assume that CONFIG_A=y is a default value.
      But because the choice is optional the default is that
      both A and B are =n.
      
      Fix so we handle optional choices correct.
      Signed-off-by: NSam Ravnborg <sam@ravnborg.org>
      Signed-off-by: NMichal Marek <mmarek@suse.cz>
      84062dd3
  3. 13 8月, 2010 3 次提交
  4. 12 8月, 2010 2 次提交
    • S
      kconfig: fix tristate choice with minimal config · a64b44ea
      Sam Ravnborg 提交于
      If a minimal config did not specify the value
      of all choice values, the resulting configuration
      could have wrong values.
      
      Consider following example:
      config M
              def_bool y
              option modules
      choice
              prompt "choice list"
      config A
              tristate "a"
      config B
      	tristate "b"
      endchoice
      
      With a defconfig like this:
      CONFIG_M=y
      CONFIG_A=y
      
      The resulting configuration would have
      
          CONFIG_A=m
      
      which was unexpected.
      
      The problem was not not all choice values were set and thus
      kconfig calculated a wrong value.
      
      The fix is to set all choice values when we
      read a defconfig files.
      
      conf_set_all_new_symbols() is refactored such that
      random choice values are now handled by a dedicated function.
      And new choice values are set by set_all_choice_values().
      
      This was not the minimal fix, but the fix that resulted
      in the most readable code.
      Signed-off-by: NSam Ravnborg <sam@ravnborg.org>
      Reported-by: NArve Hjønnevåg <arve@android.com>
      Tested-by: NArve Hjønnevåg <arve@android.com>
      Signed-off-by: NMichal Marek <mmarek@suse.cz>
      a64b44ea
    • S
      kconfig: fix savedefconfig for tristate choices · 801690ca
      Sam Ravnborg 提交于
      savedefconfig failed to save choice symbols equal to 'y'
      for tristate choices.
      This resulted in this value being lost.
      
      In particular is fixes an issue where
      
      	make ARCH=avr32 atngw100_defconfig
      	make ARCH=avr32 savedefconfig
      	cp defconfig arch/avr32/configs/atngw100_defconfig
      	make ARCH=avr32 atngw100_defconfig
      	diff -u .config .config.old
      
      failed to produce an identical .config.
      Signed-off-by: NSam Ravnborg <sam@ravnborg.org>
      Signed-off-by: NMichal Marek <mmarek@suse.cz>
      801690ca
  5. 04 8月, 2010 1 次提交
  6. 03 8月, 2010 9 次提交
  7. 02 8月, 2010 2 次提交
  8. 31 7月, 2010 13 次提交
  9. 30 7月, 2010 6 次提交
    • L
      Merge branch 'for-linus' of git://git390.marist.edu/pub/scm/linux-2.6 · a2dccdb2
      Linus Torvalds 提交于
      * 'for-linus' of git://git390.marist.edu/pub/scm/linux-2.6:
        [S390] etr: fix clock synchronization race
        [S390] Fix IRQ tracing in case of PER
      a2dccdb2
    • L
    • L
      Merge branch 'fix/hda' of git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound-2.6 · e271e872
      Linus Torvalds 提交于
      * 'fix/hda' of git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound-2.6:
        ALSA: hda - Add a PC-beep workaround for ASUS P5-V
        ALSA: hda - Assume PC-beep as default for Realtek
        ALSA: hda - Don't register beep input device when no beep is available
        ALSA: hda - Fix pin-detection of Nvidia HDMI
      e271e872
    • D
      CRED: Fix __task_cred()'s lockdep check and banner comment · 8f92054e
      David Howells 提交于
      Fix __task_cred()'s lockdep check by removing the following validation
      condition:
      
      	lockdep_tasklist_lock_is_held()
      
      as commit_creds() does not take the tasklist_lock, and nor do most of the
      functions that call it, so this check is pointless and it can prevent
      detection of the RCU lock not being held if the tasklist_lock is held.
      
      Instead, add the following validation condition:
      
      	task->exit_state >= 0
      
      to permit the access if the target task is dead and therefore unable to change
      its own credentials.
      
      Fix __task_cred()'s comment to:
      
       (1) discard the bit that says that the caller must prevent the target task
           from being deleted.  That shouldn't need saying.
      
       (2) Add a comment indicating the result of __task_cred() should not be passed
           directly to get_cred(), but rather than get_task_cred() should be used
           instead.
      
      Also put a note into the documentation to enforce this point there too.
      Signed-off-by: NDavid Howells <dhowells@redhat.com>
      Acked-by: NJiri Olsa <jolsa@redhat.com>
      Cc: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      8f92054e
    • D
      CRED: Fix get_task_cred() and task_state() to not resurrect dead credentials · de09a977
      David Howells 提交于
      It's possible for get_task_cred() as it currently stands to 'corrupt' a set of
      credentials by incrementing their usage count after their replacement by the
      task being accessed.
      
      What happens is that get_task_cred() can race with commit_creds():
      
      	TASK_1			TASK_2			RCU_CLEANER
      	-->get_task_cred(TASK_2)
      	rcu_read_lock()
      	__cred = __task_cred(TASK_2)
      				-->commit_creds()
      				old_cred = TASK_2->real_cred
      				TASK_2->real_cred = ...
      				put_cred(old_cred)
      				  call_rcu(old_cred)
      		[__cred->usage == 0]
      	get_cred(__cred)
      		[__cred->usage == 1]
      	rcu_read_unlock()
      							-->put_cred_rcu()
      							[__cred->usage == 1]
      							panic()
      
      However, since a tasks credentials are generally not changed very often, we can
      reasonably make use of a loop involving reading the creds pointer and using
      atomic_inc_not_zero() to attempt to increment it if it hasn't already hit zero.
      
      If successful, we can safely return the credentials in the knowledge that, even
      if the task we're accessing has released them, they haven't gone to the RCU
      cleanup code.
      
      We then change task_state() in procfs to use get_task_cred() rather than
      calling get_cred() on the result of __task_cred(), as that suffers from the
      same problem.
      
      Without this change, a BUG_ON in __put_cred() or in put_cred_rcu() can be
      tripped when it is noticed that the usage count is not zero as it ought to be,
      for example:
      
      kernel BUG at kernel/cred.c:168!
      invalid opcode: 0000 [#1] SMP
      last sysfs file: /sys/kernel/mm/ksm/run
      CPU 0
      Pid: 2436, comm: master Not tainted 2.6.33.3-85.fc13.x86_64 #1 0HR330/OptiPlex
      745
      RIP: 0010:[<ffffffff81069881>]  [<ffffffff81069881>] __put_cred+0xc/0x45
      RSP: 0018:ffff88019e7e9eb8  EFLAGS: 00010202
      RAX: 0000000000000001 RBX: ffff880161514480 RCX: 00000000ffffffff
      RDX: 00000000ffffffff RSI: ffff880140c690c0 RDI: ffff880140c690c0
      RBP: ffff88019e7e9eb8 R08: 00000000000000d0 R09: 0000000000000000
      R10: 0000000000000001 R11: 0000000000000040 R12: ffff880140c690c0
      R13: ffff88019e77aea0 R14: 00007fff336b0a5c R15: 0000000000000001
      FS:  00007f12f50d97c0(0000) GS:ffff880007400000(0000) knlGS:0000000000000000
      CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      CR2: 00007f8f461bc000 CR3: 00000001b26ce000 CR4: 00000000000006f0
      DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
      DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
      Process master (pid: 2436, threadinfo ffff88019e7e8000, task ffff88019e77aea0)
      Stack:
       ffff88019e7e9ec8 ffffffff810698cd ffff88019e7e9ef8 ffffffff81069b45
      <0> ffff880161514180 ffff880161514480 ffff880161514180 0000000000000000
      <0> ffff88019e7e9f28 ffffffff8106aace 0000000000000001 0000000000000246
      Call Trace:
       [<ffffffff810698cd>] put_cred+0x13/0x15
       [<ffffffff81069b45>] commit_creds+0x16b/0x175
       [<ffffffff8106aace>] set_current_groups+0x47/0x4e
       [<ffffffff8106ac89>] sys_setgroups+0xf6/0x105
       [<ffffffff81009b02>] system_call_fastpath+0x16/0x1b
      Code: 48 8d 71 ff e8 7e 4e 15 00 85 c0 78 0b 8b 75 ec 48 89 df e8 ef 4a 15 00
      48 83 c4 18 5b c9 c3 55 8b 07 8b 07 48 89 e5 85 c0 74 04 <0f> 0b eb fe 65 48 8b
      04 25 00 cc 00 00 48 3b b8 58 04 00 00 75
      RIP  [<ffffffff81069881>] __put_cred+0xc/0x45
       RSP <ffff88019e7e9eb8>
      ---[ end trace df391256a100ebdd ]---
      Signed-off-by: NDavid Howells <dhowells@redhat.com>
      Acked-by: NJiri Olsa <jolsa@redhat.com>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      de09a977
    • W
      watchdog: update MAINTAINERS entry · 230a5cef
      Wim Van Sebroeck 提交于
      Add Mailing-list and website to watchdog MAINTAINERS entry.
      Signed-off-by: NWim Van Sebroeck <wim@iguana.be>
      230a5cef