1. 16 7月, 2011 1 次提交
    • B
      NFSD: allow OP_DESTROY_CLIENTID to be only op in COMPOUND · 094b5d74
      Benny Halevy 提交于
         DESTROY_CLIENTID MAY be preceded with a SEQUENCE operation as long as
         the client ID derived from the session ID of SEQUENCE is not the same
         as the client ID to be destroyed.  If the client IDs are the same,
         then the server MUST return NFS4ERR_CLIENTID_BUSY.
      
      (that's not implemented yet)
      
         If DESTROY_CLIENTID is not prefixed by SEQUENCE, it MUST be the only
         operation in the COMPOUND request (otherwise, the server MUST return
         NFS4ERR_NOT_ONLY_OP).
      
      This fixes the error return; before, we returned
      NFS4ERR_OP_NOT_IN_SESSION; after this patch, we return NFS4ERR_NOTSUPP.
      Signed-off-by: NBenny Halevy <benny@tonian.com>
      Signed-off-by: NJ. Bruce Fields <bfields@redhat.com>
      094b5d74
  2. 14 7月, 2011 6 次提交
  3. 13 7月, 2011 7 次提交
  4. 12 7月, 2011 23 次提交
  5. 11 7月, 2011 3 次提交
    • E
      hp-wmi: fix use after free · 0401846c
      Eric Dumazet 提交于
      [  191.310008] WARNING: kmemcheck: Caught 32-bit read from freed memory (f0d25f14)
      [  191.310011] c056d2f088000000105fd2f00000000050415353040000000000000000000000
      [  191.310020]  i i i i f f f f f f f f f f f f f f f f f f f f f f f f f f f f
      [  191.310027]                                          ^
      [  191.310029]
      [  191.310032] Pid: 737, comm: modprobe Not tainted 3.0.0-rc5+ #268 Hewlett-Packard HP Compaq 6005 Pro SFF PC/3047h
      [  191.310036] EIP: 0060:[<f80b3104>] EFLAGS: 00010286 CPU: 0
      [  191.310039] EIP is at hp_wmi_perform_query+0x104/0x150 [hp_wmi]
      [  191.310041] EAX: f0d25601 EBX: f0d25f00 ECX: 000121cf EDX: 000121ce
      [  191.310043] ESI: f0d25f10 EDI: f0f97ea8 EBP: f0f97ec4 ESP: c173f34c
      [  191.310045]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
      [  191.310046] CR0: 8005003b CR2: f540c000 CR3: 30f30000 CR4: 000006d0
      [  191.310048] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
      [  191.310050] DR6: ffff4ff0 DR7: 00000400
      [  191.310051]  [<f80b317b>] hp_wmi_dock_state+0x2b/0x40 [hp_wmi]
      [  191.310054]  [<f80b6093>] hp_wmi_init+0x93/0x1a8 [hp_wmi]
      [  191.310057]  [<c10011f0>] do_one_initcall+0x30/0x170
      [  191.310061]  [<c107ab9f>] sys_init_module+0xef/0x1a60
      [  191.310064]  [<c149f998>] sysenter_do_call+0x12/0x28
      [  191.310067]  [<ffffffff>] 0xffffffff
      Signed-off-by: NEric Dumazet <eric.dumazet@gmail.com>
      Signed-off-by: NMatthew Garrett <mjg@redhat.com>
      0401846c
    • J
      dell-laptop - using buffer without mutex_lock · b486742a
      Jose Alonso 提交于
      Using buffer->output[1] without mutex_lock()
      Signed-off-by: NJose Alonso <joalonsof@gmail.com>
      Signed-off-by: NMatthew Garrett <mjg@redhat.com>
      b486742a
    • K
      Revert: "dell-laptop: Toggle the unsupported hardware killswitch" · be65dde8
      Keng-Yu Lin 提交于
      This reverts commit a3d77411,
      
      as it causes a mess in the wireless rfkill status on some models.
      It is probably a bad idea to toggle the rfkill for all dell models
      without the respect to the claim that it is hardware-controlled.
      
      Cc: stable@kernel.org
      Signed-off-by: NKeng-Yu Lin <kengyu@canonical.com>
      Signed-off-by: NMatthew Garrett <mjg@redhat.com>
      be65dde8