diff options
author | Greg Kroah-Hartman <gregkh@suse.de> | 2011-06-06 16:19:43 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2011-06-06 16:19:43 -0700 |
commit | 08f14a91e3c2ee6a190f9dc805942616b08fdbbe (patch) | |
tree | 4bf488152bbc2c97bff6f7bce80c9644b4acc84d | |
parent | e06783ab867e400ca87ba7af83ab1b488f772a0a (diff) | |
download | longterm-queue-2.6.33-08f14a91e3c2ee6a190f9dc805942616b08fdbbe.tar.gz |
.33 patches
9 files changed, 390 insertions, 40 deletions
diff --git a/queue-2.6.33/ath9k-set-40-mhz-rate-only-if-hw-is-configured-in-ht40.patch b/queue-2.6.33/ath9k-set-40-mhz-rate-only-if-hw-is-configured-in-ht40.patch new file mode 100644 index 0000000..414ce68 --- /dev/null +++ b/queue-2.6.33/ath9k-set-40-mhz-rate-only-if-hw-is-configured-in-ht40.patch @@ -0,0 +1,45 @@ +From 41e2b05b9598d6bdf91fc20280bfc538d853f769 Mon Sep 17 00:00:00 2001 +From: Rajkumar Manoharan <rmanoharan@atheros.com> +Date: Fri, 20 May 2011 17:52:14 +0530 +Subject: ath9k: set 40 Mhz rate only if hw is configured in ht40 + +From: Rajkumar Manoharan <rmanoharan@atheros.com> + +commit 41e2b05b9598d6bdf91fc20280bfc538d853f769 upstream. + +Whenever there is a channel width change from 40 Mhz to 20 Mhz, +the hardware is reconfigured to ht20. Meantime before doing +the rate control updation, the packets are being transmitted are +selected rate with IEEE80211_TX_RC_40_MHZ_WIDTH. + +While transmitting ht40 rate packets in ht20 mode is causing +baseband panic with AR9003 based chips. + +==== BB update: BB status=0x02001109 ==== +ath: ** BB state: wd=1 det=1 rdar=0 rOFDM=1 rCCK=1 tOFDM=0 tCCK=0 agc=2 +src=0 ** +ath: ** BB WD cntl: cntl1=0xffff0085 cntl2=0x00000004 ** +ath: ** BB mode: BB_gen_controls=0x000033c0 ** +ath: ** BB busy times: rx_clear=99%, rx_frame=0%, tx_frame=0% ** +ath: ==== BB update: done ==== + +Signed-off-by: Rajkumar Manoharan <rmanoharan@atheros.com> +Signed-off-by: John W. Linville <linville@tuxdriver.com> +Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> + +--- + drivers/net/wireless/ath/ath9k/rc.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +--- a/drivers/net/wireless/ath/ath9k/rc.c ++++ b/drivers/net/wireless/ath/ath9k/rc.c +@@ -614,7 +614,8 @@ static void ath_rc_rate_set_series(const + + if (WLAN_RC_PHY_HT(rate_table->info[rix].phy)) { + rate->flags |= IEEE80211_TX_RC_MCS; +- if (WLAN_RC_PHY_40(rate_table->info[rix].phy)) ++ if (WLAN_RC_PHY_40(rate_table->info[rix].phy) && ++ conf_is_ht40(&txrc->hw->conf)) + rate->flags |= IEEE80211_TX_RC_40_MHZ_WIDTH; + if (WLAN_RC_PHY_SGI(rate_table->info[rix].phy)) + rate->flags |= IEEE80211_TX_RC_SHORT_GI; diff --git a/queue-2.6.33/block-export-blk_-get-put-_queue.patch b/queue-2.6.33/block-export-blk_-get-put-_queue.patch new file mode 100644 index 0000000..9c3bd5c --- /dev/null +++ b/queue-2.6.33/block-export-blk_-get-put-_queue.patch @@ -0,0 +1,37 @@ +From d86e0e83b32bc84600adb0b6ea1fce389b266682 Mon Sep 17 00:00:00 2001 +From: Jens Axboe <jaxboe@fusionio.com> +Date: Fri, 27 May 2011 07:44:43 +0200 +Subject: block: export blk_{get,put}_queue() + +From: Jens Axboe <jaxboe@fusionio.com> + +commit d86e0e83b32bc84600adb0b6ea1fce389b266682 upstream. + +We need them in SCSI to fix a bug, but currently they are not +exported to modules. Export them. + +Signed-off-by: Jens Axboe <jaxboe@fusionio.com> +Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> + +--- + block/blk-core.c | 2 ++ + 1 file changed, 2 insertions(+) + +--- a/block/blk-core.c ++++ b/block/blk-core.c +@@ -310,6 +310,7 @@ void blk_unplug_timeout(unsigned long da + trace_block_unplug_timer(q); + kblockd_schedule_work(q, &q->unplug_work); + } ++EXPORT_SYMBOL(blk_put_queue); + + void blk_unplug(struct request_queue *q) + { +@@ -612,6 +613,7 @@ int blk_get_queue(struct request_queue * + + return 1; + } ++EXPORT_SYMBOL(blk_get_queue); + + static inline void blk_free_request(struct request_queue *q, struct request *rq) + { diff --git a/queue-2.6.33/fix-oops-caused-by-queue-refcounting-failure.patch b/queue-2.6.33/fix-oops-caused-by-queue-refcounting-failure.patch new file mode 100644 index 0000000..25affa0 --- /dev/null +++ b/queue-2.6.33/fix-oops-caused-by-queue-refcounting-failure.patch @@ -0,0 +1,47 @@ +From e73e079bf128d68284efedeba1fbbc18d78610f9 Mon Sep 17 00:00:00 2001 +From: James Bottomley <James.Bottomley@HansenPartnership.com> +Date: Wed, 25 May 2011 15:52:14 -0500 +Subject: [SCSI] Fix oops caused by queue refcounting failure + +From: James Bottomley <James.Bottomley@HansenPartnership.com> + +commit e73e079bf128d68284efedeba1fbbc18d78610f9 upstream. + +In certain circumstances, we can get an oops from a torn down device. +Most notably this is from CD roms trying to call scsi_ioctl. The root +cause of the problem is the fact that after scsi_remove_device() has +been called, the queue is fully torn down. This is actually wrong +since the queue can be used until the sdev release function is called. +Therefore, we add an extra reference to the queue which is released in +sdev->release, so the queue always exists. + +Reported-by: Parag Warudkar <parag.lkml@gmail.com> +Signed-off-by: James Bottomley <jbottomley@parallels.com> +Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> + +--- + drivers/scsi/scsi_scan.c | 2 +- + drivers/scsi/scsi_sysfs.c | 1 + + 2 files changed, 2 insertions(+), 1 deletion(-) + +--- a/drivers/scsi/scsi_scan.c ++++ b/drivers/scsi/scsi_scan.c +@@ -294,7 +294,7 @@ static struct scsi_device *scsi_alloc_sd + kfree(sdev); + goto out; + } +- ++ blk_get_queue(sdev->request_queue); + sdev->request_queue->queuedata = sdev; + scsi_adjust_queue_depth(sdev, 0, sdev->host->cmd_per_lun); + +--- a/drivers/scsi/scsi_sysfs.c ++++ b/drivers/scsi/scsi_sysfs.c +@@ -318,6 +318,7 @@ static void scsi_device_dev_release_user + kfree(evt); + } + ++ blk_put_queue(sdev->request_queue); + /* NULL queue means the device can't be used */ + sdev->request_queue = NULL; + diff --git a/queue-2.6.33/mm-fix-enospc-returned-by-handle_mm_fault.patch b/queue-2.6.33/mm-fix-enospc-returned-by-handle_mm_fault.patch new file mode 100644 index 0000000..522b55e --- /dev/null +++ b/queue-2.6.33/mm-fix-enospc-returned-by-handle_mm_fault.patch @@ -0,0 +1,37 @@ +From e0dcd8a05be438b3d2e49ef61441ea3a463663f8 Mon Sep 17 00:00:00 2001 +From: Hugh Dickins <hughd@google.com> +Date: Sun, 5 Jun 2011 22:03:13 -0700 +Subject: mm: fix ENOSPC returned by handle_mm_fault() + +From: Hugh Dickins <hughd@google.com> + +commit e0dcd8a05be438b3d2e49ef61441ea3a463663f8 upstream. + +Al Viro observes that in the hugetlb case, handle_mm_fault() may return +a value of the kind ENOSPC when its caller is expecting a value of the +kind VM_FAULT_SIGBUS: fix alloc_huge_page()'s failure returns. + +Signed-off-by: Hugh Dickins <hughd@google.com> +Acked-by: Al Viro <viro@zeniv.linux.org.uk> +Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> +Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> + +--- + mm/hugetlb.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +--- a/mm/hugetlb.c ++++ b/mm/hugetlb.c +@@ -1026,10 +1026,10 @@ static struct page *alloc_huge_page(stru + */ + chg = vma_needs_reservation(h, vma, addr); + if (chg < 0) +- return ERR_PTR(chg); ++ return ERR_PTR(-VM_FAULT_OOM); + if (chg) + if (hugetlb_get_quota(inode->i_mapping, chg)) +- return ERR_PTR(-ENOSPC); ++ return ERR_PTR(-VM_FAULT_SIGBUS); + + spin_lock(&hugetlb_lock); + page = dequeue_huge_page_vma(h, vma, addr, avoid_reserve); diff --git a/queue-2.6.33/mtd-return-badblockbits-back.patch b/queue-2.6.33/mtd-return-badblockbits-back.patch deleted file mode 100644 index de281c1..0000000 --- a/queue-2.6.33/mtd-return-badblockbits-back.patch +++ /dev/null @@ -1,39 +0,0 @@ -From 26d9be11485ea8c1102c3e8eaa7667412eef4950 Mon Sep 17 00:00:00 2001 -From: Artem Bityutskiy <Artem.Bityutskiy@nokia.com> -Date: Thu, 28 Apr 2011 20:26:59 +0300 -Subject: mtd: return badblockbits back - -From: Artem Bityutskiy <Artem.Bityutskiy@nokia.com> - -commit 26d9be11485ea8c1102c3e8eaa7667412eef4950 upstream. - -In commit c7b28e25cb9beb943aead770ff14551b55fa8c79 the initialization of -the backblockbits was accidentally removed. This patch returns it back, -because otherwise some NAND drivers are broken. - -This problem was reported by "Saxena, Parth <parth.saxena@ti.com>" here: -http://lists.infradead.org/pipermail/linux-mtd/2011-April/035221.html - -Reported-by: Saxena, Parth <parth.saxena@ti.com> -Signed-off-by: Artem Bityutskiy <Artem.Bityutskiy@nokia.com> -Tested-by: Saxena, Parth <parth.saxena@ti.com> -Acked-by: Saxena, Parth <parth.saxena@ti.com> -Acked-by: Brian Norris <computersforpeace@gmail.com> -Signed-off-by: David Woodhouse <David.Woodhouse@intel.com> -Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> - ---- - drivers/mtd/nand/nand_base.c | 2 ++ - 1 file changed, 2 insertions(+) - ---- a/drivers/mtd/nand/nand_base.c -+++ b/drivers/mtd/nand/nand_base.c -@@ -2701,6 +2701,8 @@ static struct nand_flash_dev *nand_get_f - else - chip->chip_shift = ffs((unsigned)(chip->chipsize >> 32)) + 32 - 1; - -+ chip->badblockbits = 8; -+ - /* Set the bad block position */ - chip->badblockpos = mtd->writesize > 512 ? - NAND_LARGE_BADBLOCK_POS : NAND_SMALL_BADBLOCK_POS; diff --git a/queue-2.6.33/nbd-limit-module-parameters-to-a-sane-value.patch b/queue-2.6.33/nbd-limit-module-parameters-to-a-sane-value.patch new file mode 100644 index 0000000..8a5b51b --- /dev/null +++ b/queue-2.6.33/nbd-limit-module-parameters-to-a-sane-value.patch @@ -0,0 +1,88 @@ +From 3b2710824e00d238554c13b5add347e6c701ab1a Mon Sep 17 00:00:00 2001 +From: Namhyung Kim <namhyung@gmail.com> +Date: Sat, 28 May 2011 14:44:46 +0200 +Subject: nbd: limit module parameters to a sane value + +From: Namhyung Kim <namhyung@gmail.com> + +commit 3b2710824e00d238554c13b5add347e6c701ab1a upstream. + +The 'max_part' parameter controls the number of maximum partition +a nbd device can have. However if a user specifies very large +value it would exceed the limitation of device minor number and +can cause a kernel oops (or, at least, produce invalid device +nodes in some cases). + +In addition, specifying large 'nbds_max' value causes same +problem for the same reason. + +On my desktop, following command results to the kernel bug: + +$ sudo modprobe nbd max_part=100000 + kernel BUG at /media/Linux_Data/project/linux/fs/sysfs/group.c:65! + invalid opcode: 0000 [#1] SMP + last sysfs file: /sys/devices/virtual/block/nbd4/range + CPU 1 + Modules linked in: nbd(+) bridge stp llc kvm_intel kvm asus_atk0110 sg sr_mod cdrom + + Pid: 2522, comm: modprobe Tainted: G W 2.6.39-leonard+ #159 System manufacturer System Product Name/P5G41TD-M PRO + RIP: 0010:[<ffffffff8115aa08>] [<ffffffff8115aa08>] internal_create_group+0x2f/0x166 + RSP: 0018:ffff8801009f1de8 EFLAGS: 00010246 + RAX: 00000000ffffffef RBX: ffff880103920478 RCX: 00000000000a7bd3 + RDX: ffffffff81a2dbe0 RSI: 0000000000000000 RDI: ffff880103920478 + RBP: ffff8801009f1e38 R08: ffff880103920468 R09: ffff880103920478 + R10: ffff8801009f1de8 R11: ffff88011eccbb68 R12: ffffffff81a2dbe0 + R13: ffff880103920468 R14: 0000000000000000 R15: ffff880103920400 + FS: 00007f3c49de9700(0000) GS:ffff88011f800000(0000) knlGS:0000000000000000 + CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b + CR2: 00007f3b7fe7c000 CR3: 00000000cd58d000 CR4: 00000000000406e0 + DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 + DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 + Process modprobe (pid: 2522, threadinfo ffff8801009f0000, task ffff8801009a93a0) + Stack: + ffff8801009f1e58 ffffffff812e8f6e ffff8801009f1e58 ffffffff812e7a80 + ffff880000000010 ffff880103920400 ffff8801002fd0c0 ffff880103920468 + 0000000000000011 ffff880103920400 ffff8801009f1e48 ffffffff8115ab6a + Call Trace: + [<ffffffff812e8f6e>] ? device_add+0x4f1/0x5e4 + [<ffffffff812e7a80>] ? dev_set_name+0x41/0x43 + [<ffffffff8115ab6a>] sysfs_create_group+0x13/0x15 + [<ffffffff810b857e>] blk_trace_init_sysfs+0x14/0x16 + [<ffffffff811ee58b>] blk_register_queue+0x4c/0xfd + [<ffffffff811f3bdf>] add_disk+0xe4/0x29c + [<ffffffffa007e2ab>] nbd_init+0x2ab/0x30d [nbd] + [<ffffffffa007e000>] ? 0xffffffffa007dfff + [<ffffffff8100020f>] do_one_initcall+0x7f/0x13e + [<ffffffff8107ab0a>] sys_init_module+0xa1/0x1e3 + [<ffffffff814f3542>] system_call_fastpath+0x16/0x1b + Code: 41 57 41 56 41 55 41 54 53 48 83 ec 28 0f 1f 44 00 00 48 89 fb 41 89 f6 49 89 d4 48 85 ff 74 0b 85 f6 75 0b 48 83 + 7f 30 00 75 14 <0f> 0b eb fe b9 ea ff ff ff 48 83 7f 30 00 0f 84 09 01 00 00 49 + RIP [<ffffffff8115aa08>] internal_create_group+0x2f/0x166 + RSP <ffff8801009f1de8> + ---[ end trace 753285ffbf72c57c ]--- + +Signed-off-by: Namhyung Kim <namhyung@gmail.com> +Cc: Laurent Vivier <Laurent.Vivier@bull.net> +Cc: Paul Clements <Paul.Clements@steeleye.com> +Signed-off-by: Jens Axboe <jaxboe@fusionio.com> +Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> + +--- + drivers/block/nbd.c | 6 ++++++ + 1 file changed, 6 insertions(+) + +--- a/drivers/block/nbd.c ++++ b/drivers/block/nbd.c +@@ -754,6 +754,12 @@ static int __init nbd_init(void) + if (max_part > 0) + part_shift = fls(max_part); + ++ if ((1UL << part_shift) > DISK_MAX_PARTS) ++ return -EINVAL; ++ ++ if (nbds_max > 1UL << (MINORBITS - part_shift)) ++ return -EINVAL; ++ + for (i = 0; i < nbds_max; i++) { + struct gendisk *disk = alloc_disk(1 << part_shift); + if (!disk) diff --git a/queue-2.6.33/nl80211-fix-check-for-valid-ssid-size-in-scan-operations.patch b/queue-2.6.33/nl80211-fix-check-for-valid-ssid-size-in-scan-operations.patch new file mode 100644 index 0000000..c56f42b --- /dev/null +++ b/queue-2.6.33/nl80211-fix-check-for-valid-ssid-size-in-scan-operations.patch @@ -0,0 +1,44 @@ +From 208c72f4fe44fe09577e7975ba0e7fa0278f3d03 Mon Sep 17 00:00:00 2001 +From: Luciano Coelho <coelho@ti.com> +Date: Thu, 19 May 2011 00:43:38 +0300 +Subject: nl80211: fix check for valid SSID size in scan operations + +From: Luciano Coelho <coelho@ti.com> + +commit 208c72f4fe44fe09577e7975ba0e7fa0278f3d03 upstream. + +In both trigger_scan and sched_scan operations, we were checking for +the SSID length before assigning the value correctly. Since the +memory was just kzalloc'ed, the check was always failing and SSID with +over 32 characters were allowed to go through. + +This was causing a buffer overflow when copying the actual SSID to the +proper place. + +This bug has been there since 2.6.29-rc4. + +Signed-off-by: Luciano Coelho <coelho@ti.com> +Signed-off-by: John W. Linville <linville@tuxdriver.com> +Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> + + +--- + net/wireless/nl80211.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +--- a/net/wireless/nl80211.c ++++ b/net/wireless/nl80211.c +@@ -3078,12 +3078,12 @@ static int nl80211_trigger_scan(struct s + i = 0; + if (info->attrs[NL80211_ATTR_SCAN_SSIDS]) { + nla_for_each_nested(attr, info->attrs[NL80211_ATTR_SCAN_SSIDS], tmp) { ++ request->ssids[i].ssid_len = nla_len(attr); + if (request->ssids[i].ssid_len > IEEE80211_MAX_SSID_LEN) { + err = -EINVAL; + goto out_free; + } + memcpy(request->ssids[i].ssid, nla_data(attr), nla_len(attr)); +- request->ssids[i].ssid_len = nla_len(attr); + i++; + } + } diff --git a/queue-2.6.33/pci-set-pcie-maxpayload-for-card-during-hotplug-insertion.patch b/queue-2.6.33/pci-set-pcie-maxpayload-for-card-during-hotplug-insertion.patch new file mode 100644 index 0000000..9894977 --- /dev/null +++ b/queue-2.6.33/pci-set-pcie-maxpayload-for-card-during-hotplug-insertion.patch @@ -0,0 +1,85 @@ +From e522a7126c7c144a1dd14c6f217ac31e71082b1d Mon Sep 17 00:00:00 2001 +From: "Jordan_Hargrave@Dell.com" <Jordan_Hargrave@Dell.com> +Date: Mon, 9 May 2011 15:24:55 -0500 +Subject: PCI: Set PCIE maxpayload for card during hotplug insertion + +From: "Jordan_Hargrave@Dell.com" <Jordan_Hargrave@Dell.com> + +commit e522a7126c7c144a1dd14c6f217ac31e71082b1d upstream. + +The following patch sets the MaxPayload setting to match the parent +reading when inserting a PCIE card into a hotplug slot. On our system, +the upstream bridge is set to 256, but when inserting a card, the card +setting defaults to 128. As soon as I/O is performed to the card it +starts receiving errors since the payload size is too small. + +Reviewed-by: Kenji Kaneshige <kaneshige.kenji@jp.fujitsu.com> +Signed-off-by: Jordan Hargrave <jordan_hargrave@dell.com> +Signed-off-by: Jesse Barnes <jbarnes@virtuousgeek.org> +Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> + +--- + drivers/pci/hotplug/pcihp_slot.c | 45 +++++++++++++++++++++++++++++++++++++++ + 1 file changed, 45 insertions(+) + +--- a/drivers/pci/hotplug/pcihp_slot.c ++++ b/drivers/pci/hotplug/pcihp_slot.c +@@ -158,6 +158,47 @@ static void program_hpp_type2(struct pci + */ + } + ++/* Program PCIE MaxPayload setting on device: ensure parent maxpayload <= device */ ++static int pci_set_payload(struct pci_dev *dev) ++{ ++ int pos, ppos; ++ u16 pctl, psz; ++ u16 dctl, dsz, dcap, dmax; ++ struct pci_dev *parent; ++ ++ parent = dev->bus->self; ++ pos = pci_find_capability(dev, PCI_CAP_ID_EXP); ++ if (!pos) ++ return 0; ++ ++ /* Read Device MaxPayload capability and setting */ ++ pci_read_config_word(dev, pos + PCI_EXP_DEVCTL, &dctl); ++ pci_read_config_word(dev, pos + PCI_EXP_DEVCAP, &dcap); ++ dsz = (dctl & PCI_EXP_DEVCTL_PAYLOAD) >> 5; ++ dmax = (dcap & PCI_EXP_DEVCAP_PAYLOAD); ++ ++ /* Read Parent MaxPayload setting */ ++ ppos = pci_find_capability(parent, PCI_CAP_ID_EXP); ++ if (!ppos) ++ return 0; ++ pci_read_config_word(parent, ppos + PCI_EXP_DEVCTL, &pctl); ++ psz = (pctl & PCI_EXP_DEVCTL_PAYLOAD) >> 5; ++ ++ /* If parent payload > device max payload -> error ++ * If parent payload > device payload -> set speed ++ * If parent payload <= device payload -> do nothing ++ */ ++ if (psz > dmax) ++ return -1; ++ else if (psz > dsz) { ++ dev_info(&dev->dev, "Setting MaxPayload to %d\n", 128 << psz); ++ pci_write_config_word(dev, pos + PCI_EXP_DEVCTL, ++ (dctl & ~PCI_EXP_DEVCTL_PAYLOAD) + ++ (psz << 5)); ++ } ++ return 0; ++} ++ + void pci_configure_slot(struct pci_dev *dev) + { + struct pci_dev *cdev; +@@ -169,6 +210,10 @@ void pci_configure_slot(struct pci_dev * + (dev->class >> 8) == PCI_CLASS_BRIDGE_PCI))) + return; + ++ ret = pci_set_payload(dev); ++ if (ret) ++ dev_warn(&dev->dev, "could not set device max payload\n"); ++ + memset(&hpp, 0, sizeof(hpp)); + ret = pci_get_hp_params(dev, &hpp); + if (ret) diff --git a/queue-2.6.33/series b/queue-2.6.33/series index c5af757..6122d66 100644 --- a/queue-2.6.33/series +++ b/queue-2.6.33/series @@ -6,7 +6,6 @@ powerpc-oprofile-handle-events-that-raise-an-exception-without-overflowing.patch block-rescan-partitions-on-invalidated-devices-on-enomedia.patch block-add-proper-state-guards-to-__elv_next_request.patch mtd-mtdconcat-fix-nand-oob-write.patch -mtd-return-badblockbits-back.patch x86-64-bit-fix-copy__user-checks-for-the.patch ext3-fix-fs-corruption-when-make_indexed_dir-fails.patch jbd-fix-forever-sleeping-process-in-do_get_write_access.patch @@ -52,3 +51,10 @@ fix-refcounting-bug-in-scsi_get_host_dev.patch fix-duplicate-removal-on-error-path-in.patch ubifs-fix-shrinker-object-count-reports.patch ubifs-fix-memory-leak-on-error-path.patch +nbd-limit-module-parameters-to-a-sane-value.patch +block-export-blk_-get-put-_queue.patch +fix-oops-caused-by-queue-refcounting-failure.patch +ath9k-set-40-mhz-rate-only-if-hw-is-configured-in-ht40.patch +mm-fix-enospc-returned-by-handle_mm_fault.patch +pci-set-pcie-maxpayload-for-card-during-hotplug-insertion.patch +nl80211-fix-check-for-valid-ssid-size-in-scan-operations.patch |