<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux-toradex.git, branch v2.6.33.9</title>
<subtitle>Linux kernel for Apalis and Colibri modules</subtitle>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/'/>
<entry>
<title>Linux 2.6.33.9</title>
<updated>2011-03-28T14:33:22+00:00</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2011-03-28T14:33:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=d55242335d9f4a68519dfc39e1677b0372d2f276'/>
<id>d55242335d9f4a68519dfc39e1677b0372d2f276</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>dcdbas: force SMI to happen when expected</title>
<updated>2011-03-28T14:31:23+00:00</updated>
<author>
<name>Stuart Hayes</name>
<email>stuart_hayes@yahoo.com</email>
</author>
<published>2011-03-02T12:42:05+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=ecf63042d77be3fd68519499399064db35bc91cd'/>
<id>ecf63042d77be3fd68519499399064db35bc91cd</id>
<content type='text'>
commit dd65c736d1b5312c80c88a64bf521db4959eded5 upstream.

The dcdbas driver can do an I/O write to cause a SMI to occur.  The SMI handler
looks at certain registers and memory locations, so the SMI needs to happen
immediately.  On some systems I/O writes are posted, though, causing the SMI to
happen well after the "outb" occurred, which causes random failures.  Following
the "outb" with an "inb" forces the write to go through even if it is posted.

Signed-off-by: Stuart Hayes &lt;stuart_hayes@yahoo.com&gt;
Acked-by: Doug Warzecha &lt;douglas_warzecha@dell.com&gt;
Cc: Chuck Ebbert &lt;cebbert@redhat.com&gt;
Signed-off-by: Jiri Kosina &lt;jkosina@suse.cz&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit dd65c736d1b5312c80c88a64bf521db4959eded5 upstream.

The dcdbas driver can do an I/O write to cause a SMI to occur.  The SMI handler
looks at certain registers and memory locations, so the SMI needs to happen
immediately.  On some systems I/O writes are posted, though, causing the SMI to
happen well after the "outb" occurred, which causes random failures.  Following
the "outb" with an "inb" forces the write to go through even if it is posted.

Signed-off-by: Stuart Hayes &lt;stuart_hayes@yahoo.com&gt;
Acked-by: Doug Warzecha &lt;douglas_warzecha@dell.com&gt;
Cc: Chuck Ebbert &lt;cebbert@redhat.com&gt;
Signed-off-by: Jiri Kosina &lt;jkosina@suse.cz&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>fs: call security_d_instantiate in d_obtain_alias V2</title>
<updated>2011-03-28T14:31:23+00:00</updated>
<author>
<name>Josef Bacik</name>
<email>josef@redhat.com</email>
</author>
<published>2010-11-19T01:52:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=a44ba30a832efbf9e48af31a5db8dc75f5a6663a'/>
<id>a44ba30a832efbf9e48af31a5db8dc75f5a6663a</id>
<content type='text'>
commit 24ff6663ccfdaf088dfa7acae489cb11ed4f43c4 upstream.

While trying to track down some NFS problems with BTRFS, I kept noticing I was
getting -EACCESS for no apparent reason.  Eric Paris and printk() helped me
figure out that it was SELinux that was giving me grief, with the following
denial

type=AVC msg=audit(1290013638.413:95): avc:  denied  { 0x800000 } for  pid=1772
comm="nfsd" name="" dev=sda1 ino=256 scontext=system_u:system_r:kernel_t:s0
tcontext=system_u:object_r:unlabeled_t:s0 tclass=file

Turns out this is because in d_obtain_alias if we can't find an alias we create
one and do all the normal instantiation stuff, but we don't do the
security_d_instantiate.

Usually we are protected from getting a hashed dentry that hasn't yet run
security_d_instantiate() by the parent's i_mutex, but obviously this isn't an
option there, so in order to deal with the case that a second thread comes in
and finds our new dentry before we get to run security_d_instantiate(), we go
ahead and call it if we find a dentry already.  Eric assures me that this is ok
as the code checks to see if the dentry has been initialized already so calling
security_d_instantiate() against the same dentry multiple times is ok.  With
this patch I'm no longer getting errant -EACCESS values.

Signed-off-by: Josef Bacik &lt;josef@redhat.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Cc: Chuck Ebbert &lt;cebbert@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 24ff6663ccfdaf088dfa7acae489cb11ed4f43c4 upstream.

While trying to track down some NFS problems with BTRFS, I kept noticing I was
getting -EACCESS for no apparent reason.  Eric Paris and printk() helped me
figure out that it was SELinux that was giving me grief, with the following
denial

type=AVC msg=audit(1290013638.413:95): avc:  denied  { 0x800000 } for  pid=1772
comm="nfsd" name="" dev=sda1 ino=256 scontext=system_u:system_r:kernel_t:s0
tcontext=system_u:object_r:unlabeled_t:s0 tclass=file

Turns out this is because in d_obtain_alias if we can't find an alias we create
one and do all the normal instantiation stuff, but we don't do the
security_d_instantiate.

Usually we are protected from getting a hashed dentry that hasn't yet run
security_d_instantiate() by the parent's i_mutex, but obviously this isn't an
option there, so in order to deal with the case that a second thread comes in
and finds our new dentry before we get to run security_d_instantiate(), we go
ahead and call it if we find a dentry already.  Eric assures me that this is ok
as the code checks to see if the dentry has been initialized already so calling
security_d_instantiate() against the same dentry multiple times is ok.  With
this patch I'm no longer getting errant -EACCESS values.

Signed-off-by: Josef Bacik &lt;josef@redhat.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Cc: Chuck Ebbert &lt;cebbert@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>SUNRPC: Never reuse the socket port after an xs_close()</title>
<updated>2011-03-28T14:31:23+00:00</updated>
<author>
<name>Trond Myklebust</name>
<email>Trond.Myklebust@netapp.com</email>
</author>
<published>2011-03-22T22:40:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=0db49efd46f6ad1db8ff26ccc4e4e2b6085180e1'/>
<id>0db49efd46f6ad1db8ff26ccc4e4e2b6085180e1</id>
<content type='text'>
commit 246408dcd5dfeef2df437ccb0ef4d6ee87805f58 upstream.

If we call xs_close(), we're in one of two situations:
 - Autoclose, which means we don't expect to resend a request
 - bind+connect failed, which probably means the port is in use

Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 246408dcd5dfeef2df437ccb0ef4d6ee87805f58 upstream.

If we call xs_close(), we're in one of two situations:
 - Autoclose, which means we don't expect to resend a request
 - bind+connect failed, which probably means the port is in use

Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>x86: Cleanup highmap after brk is concluded</title>
<updated>2011-03-28T14:31:23+00:00</updated>
<author>
<name>Yinghai Lu</name>
<email>yinghai@kernel.org</email>
</author>
<published>2011-02-18T11:30:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=b9806bf136fb416a48aaff18dc271de0e75bbcf0'/>
<id>b9806bf136fb416a48aaff18dc271de0e75bbcf0</id>
<content type='text'>
commit e5f15b45ddf3afa2bbbb10c7ea34fb32b6de0a0e upstream.

Now cleanup_highmap actually is in two steps: one is early in head64.c
and only clears above _end; a second one is in init_memory_mapping() and
tries to clean from _brk_end to _end.
It should check if those boundaries are PMD_SIZE aligned but currently
does not.
Also init_memory_mapping() is called several times for numa or memory
hotplug, so we really should not handle initial kernel mappings there.

This patch moves cleanup_highmap() down after _brk_end is settled so
we can do everything in one step.
Also we honor max_pfn_mapped in the implementation of cleanup_highmap.

Signed-off-by: Yinghai Lu &lt;yinghai@kernel.org&gt;
Signed-off-by: Stefano Stabellini &lt;stefano.stabellini@eu.citrix.com&gt;
LKML-Reference: &lt;alpine.DEB.2.00.1103171739050.3382@kaball-desktop&gt;
Signed-off-by: H. Peter Anvin &lt;hpa@zytor.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit e5f15b45ddf3afa2bbbb10c7ea34fb32b6de0a0e upstream.

Now cleanup_highmap actually is in two steps: one is early in head64.c
and only clears above _end; a second one is in init_memory_mapping() and
tries to clean from _brk_end to _end.
It should check if those boundaries are PMD_SIZE aligned but currently
does not.
Also init_memory_mapping() is called several times for numa or memory
hotplug, so we really should not handle initial kernel mappings there.

This patch moves cleanup_highmap() down after _brk_end is settled so
we can do everything in one step.
Also we honor max_pfn_mapped in the implementation of cleanup_highmap.

Signed-off-by: Yinghai Lu &lt;yinghai@kernel.org&gt;
Signed-off-by: Stefano Stabellini &lt;stefano.stabellini@eu.citrix.com&gt;
LKML-Reference: &lt;alpine.DEB.2.00.1103171739050.3382@kaball-desktop&gt;
Signed-off-by: H. Peter Anvin &lt;hpa@zytor.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Input: xen-kbdfront - advertise either absolute or relative coordinates</title>
<updated>2011-03-28T14:31:23+00:00</updated>
<author>
<name>Olaf Hering</name>
<email>olaf@aepfle.de</email>
</author>
<published>2011-03-17T05:11:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=6997348a861d3540085bf9adf4166b86ac7a96e5'/>
<id>6997348a861d3540085bf9adf4166b86ac7a96e5</id>
<content type='text'>
commit 8c3c283e6bf463ab498d6e7823aff6c4762314b6 upstream.

A virtualized display device is usually viewed with the vncviewer
application, either by 'xm vnc domU' or with vncviewer localhost:port.
vncviewer and the RFB protocol provides absolute coordinates to the
virtual display. These coordinates are either passed through to a PV
guest or converted to relative coordinates for a HVM guest.

A PV guest receives these coordinates and passes them to the kernels
evdev driver. There it can be picked up by applications such as the
xorg-input drivers. Using absolute coordinates avoids issues such as
guest mouse pointer not tracking host mouse pointer due to wrong mouse
acceleration settings in the guests X display.

Advertise either absolute or relative coordinates to the input system
and the evdev driver, depending on what dom0 provides. The xorg-input
driver prefers relative coordinates even if a devices provides both.

Signed-off-by: Olaf Hering &lt;olaf@aepfle.de&gt;
Signed-off-by: Stefano Stabellini &lt;stefano.stabellini@eu.citrix.com&gt;
Signed-off-by: Dmitry Torokhov &lt;dtor@mail.ru&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 8c3c283e6bf463ab498d6e7823aff6c4762314b6 upstream.

A virtualized display device is usually viewed with the vncviewer
application, either by 'xm vnc domU' or with vncviewer localhost:port.
vncviewer and the RFB protocol provides absolute coordinates to the
virtual display. These coordinates are either passed through to a PV
guest or converted to relative coordinates for a HVM guest.

A PV guest receives these coordinates and passes them to the kernels
evdev driver. There it can be picked up by applications such as the
xorg-input drivers. Using absolute coordinates avoids issues such as
guest mouse pointer not tracking host mouse pointer due to wrong mouse
acceleration settings in the guests X display.

Advertise either absolute or relative coordinates to the input system
and the evdev driver, depending on what dom0 provides. The xorg-input
driver prefers relative coordinates even if a devices provides both.

Signed-off-by: Olaf Hering &lt;olaf@aepfle.de&gt;
Signed-off-by: Stefano Stabellini &lt;stefano.stabellini@eu.citrix.com&gt;
Signed-off-by: Dmitry Torokhov &lt;dtor@mail.ru&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>USB: cdc-acm: fix potential null-pointer dereference on disconnect</title>
<updated>2011-03-28T14:31:23+00:00</updated>
<author>
<name>Johan Hovold</name>
<email>jhovold@gmail.com</email>
</author>
<published>2011-03-22T10:12:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=f0394bdd62745fa4285b351a2568c0b9e8fa28f1'/>
<id>f0394bdd62745fa4285b351a2568c0b9e8fa28f1</id>
<content type='text'>
commit 7e7797e7f6f7bfab73fca02c65e40eaa5bb9000c upstream.

Fix potential null-pointer exception on disconnect introduced by commit
11ea859d64b69a747d6b060b9ed1520eab1161fe (USB: additional power savings
for cdc-acm devices that support remote wakeup).

Only access acm-&gt;dev after making sure it is non-null in control urb
completion handler.

Signed-off-by: Johan Hovold &lt;jhovold@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 7e7797e7f6f7bfab73fca02c65e40eaa5bb9000c upstream.

Fix potential null-pointer exception on disconnect introduced by commit
11ea859d64b69a747d6b060b9ed1520eab1161fe (USB: additional power savings
for cdc-acm devices that support remote wakeup).

Only access acm-&gt;dev after making sure it is non-null in control urb
completion handler.

Signed-off-by: Johan Hovold &lt;jhovold@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>USB: cdc-acm: fix potential null-pointer dereference</title>
<updated>2011-03-28T14:31:22+00:00</updated>
<author>
<name>Johan Hovold</name>
<email>jhovold@gmail.com</email>
</author>
<published>2011-03-22T10:12:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=0530c26f6cd6991fe56e37101fb440d9953309af'/>
<id>0530c26f6cd6991fe56e37101fb440d9953309af</id>
<content type='text'>
commit 15e5bee33ffc11d0e5c6f819a65e7881c5c407be upstream.

Must check return value of tty_port_tty_get.

Signed-off-by: Johan Hovold &lt;jhovold@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 15e5bee33ffc11d0e5c6f819a65e7881c5c407be upstream.

Must check return value of tty_port_tty_get.

Signed-off-by: Johan Hovold &lt;jhovold@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>USB: cdc-acm: fix memory corruption / panic</title>
<updated>2011-03-28T14:31:22+00:00</updated>
<author>
<name>Johan Hovold</name>
<email>jhovold@gmail.com</email>
</author>
<published>2011-03-22T10:12:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=e9f4fcfaa4de566650a8837ff0d722a1f6876417'/>
<id>e9f4fcfaa4de566650a8837ff0d722a1f6876417</id>
<content type='text'>
commit 23b80550e2aa61d0ba3af98b831b9195be0db9ee upstream.

Prevent read urbs from being resubmitted from tasklet after port close.

The receive tasklet was not disabled on port close, which could lead to
corruption of receive lists on consecutive port open. In particular,
read urbs could be re-submitted before port open, added to free list in
open, and then added a second time to the free list in the completion
handler.

cdc-acm.c: Entering acm_tty_open.
cdc-acm.c: acm_control_msg: rq: 0x22 val: 0x3 len: 0x0 result: 0
cdc-acm.c: Entering acm_rx_tasklet
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da280, rcv 0xf57fbc24, buf 0xf57fbd64
cdc-acm.c: set line: 115200 0 0 8
cdc-acm.c: acm_control_msg: rq: 0x20 val: 0x0 len: 0x7 result: 7
cdc-acm.c: acm_tty_close
cdc-acm.c: acm_port_down
cdc-acm.c: acm_control_msg: rq: 0x22 val: 0x0 len: 0x0 result: 0
cdc-acm.c: acm_ctrl_irq - urb shutting down with status: -2
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da300, rcv 0xf57fbc10, buf 0xf57fbd50
cdc-acm.c: Entering acm_read_bulk with status -2
cdc_acm 4-1:1.1: Aborting, acm not ready
cdc-acm.c: Entering acm_read_bulk with status -2
cdc_acm 4-1:1.1: Aborting, acm not ready
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da380, rcv 0xf57fbbfc, buf 0xf57fbd3c
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da400, rcv 0xf57fbbe8, buf 0xf57fbd28
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da480, rcv 0xf57fbbd4, buf 0xf57fbd14
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da900, rcv 0xf57fbbc0, buf 0xf57fbd00
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da980, rcv 0xf57fbbac, buf 0xf57fbcec
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50daa00, rcv 0xf57fbb98, buf 0xf57fbcd8
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50daa80, rcv 0xf57fbb84, buf 0xf57fbcc4
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dab00, rcv 0xf57fbb70, buf 0xf57fbcb0
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dab80, rcv 0xf57fbb5c, buf 0xf57fbc9c
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dac00, rcv 0xf57fbb48, buf 0xf57fbc88
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dac80, rcv 0xf57fbb34, buf 0xf57fbc74
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dad00, rcv 0xf57fbb20, buf 0xf57fbc60
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dad80, rcv 0xf57fbb0c, buf 0xf57fbc4c
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da880, rcv 0xf57fbaf8, buf 0xf57fbc38
cdc-acm.c: Entering acm_tty_open.
cdc-acm.c: acm_control_msg: rq: 0x22 val: 0x3 len: 0x0 result: 0
cdc-acm.c: Entering acm_rx_tasklet
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da280, rcv 0xf57fbc24, buf 0xf57fbd64
cdc-acm.c: Entering acm_tty_write to write 3 bytes,
cdc-acm.c: Get 3 bytes...
cdc-acm.c: acm_write_start susp_count: 0
cdc-acm.c: Entering acm_read_bulk with status 0
------------[ cut here ]------------
WARNING: at /home/johan/src/linux/linux-2.6/lib/list_debug.c:57 list_del+0x10c/0x120()
Hardware name: Vostro 1520
list_del corruption. next-&gt;prev should be f57fbc10, but was f57fbaf8
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Not tainted 2.6.37+ #39
Call Trace:
 [&lt;c103c7e2&gt;] warn_slowpath_common+0x72/0xa0
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c103c8b3&gt;] warn_slowpath_fmt+0x33/0x40
 [&lt;c11dd8ac&gt;] list_del+0x10c/0x120
 [&lt;f8051dbf&gt;] acm_rx_tasklet+0xef/0x3e0 [cdc_acm]
 [&lt;c135465d&gt;] ? net_rps_action_and_irq_enable+0x6d/0x80
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
---[ end trace efd9a11434f0082e ]---
------------[ cut here ]------------
WARNING: at /home/johan/src/linux/linux-2.6/lib/list_debug.c:57 list_del+0x10c/0x120()
Hardware name: Vostro 1520
list_del corruption. next-&gt;prev should be f57fbd50, but was f57fbdb0
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.37+ #39
Call Trace:
 [&lt;c103c7e2&gt;] warn_slowpath_common+0x72/0xa0
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c103c8b3&gt;] warn_slowpath_fmt+0x33/0x40
 [&lt;c11dd8ac&gt;] list_del+0x10c/0x120
 [&lt;f8051dd6&gt;] acm_rx_tasklet+0x106/0x3e0 [cdc_acm]
 [&lt;c135465d&gt;] ? net_rps_action_and_irq_enable+0x6d/0x80
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
---[ end trace efd9a11434f0082f ]---
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da300, rcv 0xf57fbc10, buf 0xf57fbd50
cdc-acm.c: disconnected from network
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da380, rcv 0xf57fbbfc, buf 0xf57fbd3c
cdc-acm.c: Entering acm_rx_tasklet
------------[ cut here ]------------
WARNING: at /home/johan/src/linux/linux-2.6/lib/list_debug.c:48 list_del+0xd5/0x120()
Hardware name: Vostro 1520
list_del corruption, next is LIST_POISON1 (00100100)
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.37+ #39
Call Trace:
 [&lt;c103c7e2&gt;] warn_slowpath_common+0x72/0xa0
 [&lt;c11dd875&gt;] ? list_del+0xd5/0x120
 [&lt;c11dd875&gt;] ? list_del+0xd5/0x120
 [&lt;c103c8b3&gt;] warn_slowpath_fmt+0x33/0x40
 [&lt;c11dd875&gt;] list_del+0xd5/0x120
 [&lt;f8051fac&gt;] acm_rx_tasklet+0x2dc/0x3e0 [cdc_acm]
 [&lt;c106dbab&gt;] ? trace_hardirqs_on+0xb/0x10
 [&lt;c1042b30&gt;] ? tasklet_action+0x60/0x140
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
---[ end trace efd9a11434f00830 ]---
BUG: unable to handle kernel paging request at 00200200
IP: [&lt;c11dd7bd&gt;] list_del+0x1d/0x120
*pde = 00000000
Oops: 0000 [#1] PREEMPT SMP
last sysfs file: /sys/devices/pci0000:00/0000:00:1a.1/usb4/4-1/4-1:1.0/tty/ttyACM0/uevent
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.37+ #39 0T816J/Vostro 1520
EIP: 0060:[&lt;c11dd7bd&gt;] EFLAGS: 00010046 CPU: 0
EIP is at list_del+0x1d/0x120
EAX: f57fbd3c EBX: f57fb800 ECX: ffff8000 EDX: 00200200
ESI: f57fbe90 EDI: f57fbd3c EBP: f600bf54 ESP: f600bf3c
 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process ksoftirqd/0 (pid: 3, ti=f600a000 task=f60791c0 task.ti=f6082000)
Stack:
 c1527e84 00000030 c1527e54 00100100 f57fb800 f57fbd3c f600bf98 f8051fac
 f8053104 f8052b94 f600bf6c c106dbab f600bf80 00000286 f60791c0 c1042b30
 f57fbda8 f57f5800 f57fbdb0 f57fbd80 f57fbe7c c1656b04 00000000 f600bfb0
Call Trace:
 [&lt;f8051fac&gt;] ? acm_rx_tasklet+0x2dc/0x3e0 [cdc_acm]
 [&lt;c106dbab&gt;] ? trace_hardirqs_on+0xb/0x10
 [&lt;c1042b30&gt;] ? tasklet_action+0x60/0x140
 [&lt;c1042bb6&gt;] ? tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] ? __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;
 [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
Code: ff 48 14 e9 57 ff ff ff 90 90 90 90 90 90 55 89 e5 83 ec 18 81 38 00 01 10 00 0f 84 9c 00 00 00 8b 50 04 81 fa 00 02 20 00 74 33 &lt;8b&gt; 12 39 d0 75 5c 8b 10 8b 4a 04 39 c8 0f 85 b5 00 00 00 8b 48
EIP: [&lt;c11dd7bd&gt;] list_del+0x1d/0x120 SS:ESP 0068:f600bf3c
CR2: 0000000000200200
---[ end trace efd9a11434f00831 ]---
Kernel panic - not syncing: Fatal exception in interrupt
Pid: 3, comm: ksoftirqd/0 Tainted: G      D W   2.6.37+ #39
Call Trace:
 [&lt;c13fede1&gt;] ? printk+0x1d/0x24
 [&lt;c13fecce&gt;] panic+0x66/0x15c
 [&lt;c10067df&gt;] oops_end+0x8f/0x90
 [&lt;c1025476&gt;] no_context+0xc6/0x160
 [&lt;c10255a8&gt;] __bad_area_nosemaphore+0x98/0x140
 [&lt;c103cf68&gt;] ? release_console_sem+0x1d8/0x210
 [&lt;c1025667&gt;] bad_area_nosemaphore+0x17/0x20
 [&lt;c1025a49&gt;] do_page_fault+0x279/0x420
 [&lt;c1006a8f&gt;] ? show_trace+0x1f/0x30
 [&lt;c13fede1&gt;] ? printk+0x1d/0x24
 [&lt;c10257d0&gt;] ? do_page_fault+0x0/0x420
 [&lt;c140333b&gt;] error_code+0x5f/0x64
 [&lt;c103007b&gt;] ? select_task_rq_fair+0x37b/0x6a0
 [&lt;c10257d0&gt;] ? do_page_fault+0x0/0x420
 [&lt;c11dd7bd&gt;] ? list_del+0x1d/0x120
 [&lt;f8051fac&gt;] acm_rx_tasklet+0x2dc/0x3e0 [cdc_acm]
 [&lt;c106dbab&gt;] ? trace_hardirqs_on+0xb/0x10
 [&lt;c1042b30&gt;] ? tasklet_action+0x60/0x140
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
panic occurred, switching back to text console
------------[ cut here ]------------

Signed-off-by: Johan Hovold &lt;jhovold@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 23b80550e2aa61d0ba3af98b831b9195be0db9ee upstream.

Prevent read urbs from being resubmitted from tasklet after port close.

The receive tasklet was not disabled on port close, which could lead to
corruption of receive lists on consecutive port open. In particular,
read urbs could be re-submitted before port open, added to free list in
open, and then added a second time to the free list in the completion
handler.

cdc-acm.c: Entering acm_tty_open.
cdc-acm.c: acm_control_msg: rq: 0x22 val: 0x3 len: 0x0 result: 0
cdc-acm.c: Entering acm_rx_tasklet
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da280, rcv 0xf57fbc24, buf 0xf57fbd64
cdc-acm.c: set line: 115200 0 0 8
cdc-acm.c: acm_control_msg: rq: 0x20 val: 0x0 len: 0x7 result: 7
cdc-acm.c: acm_tty_close
cdc-acm.c: acm_port_down
cdc-acm.c: acm_control_msg: rq: 0x22 val: 0x0 len: 0x0 result: 0
cdc-acm.c: acm_ctrl_irq - urb shutting down with status: -2
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da300, rcv 0xf57fbc10, buf 0xf57fbd50
cdc-acm.c: Entering acm_read_bulk with status -2
cdc_acm 4-1:1.1: Aborting, acm not ready
cdc-acm.c: Entering acm_read_bulk with status -2
cdc_acm 4-1:1.1: Aborting, acm not ready
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da380, rcv 0xf57fbbfc, buf 0xf57fbd3c
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da400, rcv 0xf57fbbe8, buf 0xf57fbd28
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da480, rcv 0xf57fbbd4, buf 0xf57fbd14
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da900, rcv 0xf57fbbc0, buf 0xf57fbd00
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da980, rcv 0xf57fbbac, buf 0xf57fbcec
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50daa00, rcv 0xf57fbb98, buf 0xf57fbcd8
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50daa80, rcv 0xf57fbb84, buf 0xf57fbcc4
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dab00, rcv 0xf57fbb70, buf 0xf57fbcb0
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dab80, rcv 0xf57fbb5c, buf 0xf57fbc9c
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dac00, rcv 0xf57fbb48, buf 0xf57fbc88
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dac80, rcv 0xf57fbb34, buf 0xf57fbc74
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dad00, rcv 0xf57fbb20, buf 0xf57fbc60
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50dad80, rcv 0xf57fbb0c, buf 0xf57fbc4c
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da880, rcv 0xf57fbaf8, buf 0xf57fbc38
cdc-acm.c: Entering acm_tty_open.
cdc-acm.c: acm_control_msg: rq: 0x22 val: 0x3 len: 0x0 result: 0
cdc-acm.c: Entering acm_rx_tasklet
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da280, rcv 0xf57fbc24, buf 0xf57fbd64
cdc-acm.c: Entering acm_tty_write to write 3 bytes,
cdc-acm.c: Get 3 bytes...
cdc-acm.c: acm_write_start susp_count: 0
cdc-acm.c: Entering acm_read_bulk with status 0
------------[ cut here ]------------
WARNING: at /home/johan/src/linux/linux-2.6/lib/list_debug.c:57 list_del+0x10c/0x120()
Hardware name: Vostro 1520
list_del corruption. next-&gt;prev should be f57fbc10, but was f57fbaf8
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Not tainted 2.6.37+ #39
Call Trace:
 [&lt;c103c7e2&gt;] warn_slowpath_common+0x72/0xa0
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c103c8b3&gt;] warn_slowpath_fmt+0x33/0x40
 [&lt;c11dd8ac&gt;] list_del+0x10c/0x120
 [&lt;f8051dbf&gt;] acm_rx_tasklet+0xef/0x3e0 [cdc_acm]
 [&lt;c135465d&gt;] ? net_rps_action_and_irq_enable+0x6d/0x80
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
---[ end trace efd9a11434f0082e ]---
------------[ cut here ]------------
WARNING: at /home/johan/src/linux/linux-2.6/lib/list_debug.c:57 list_del+0x10c/0x120()
Hardware name: Vostro 1520
list_del corruption. next-&gt;prev should be f57fbd50, but was f57fbdb0
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.37+ #39
Call Trace:
 [&lt;c103c7e2&gt;] warn_slowpath_common+0x72/0xa0
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c11dd8ac&gt;] ? list_del+0x10c/0x120
 [&lt;c103c8b3&gt;] warn_slowpath_fmt+0x33/0x40
 [&lt;c11dd8ac&gt;] list_del+0x10c/0x120
 [&lt;f8051dd6&gt;] acm_rx_tasklet+0x106/0x3e0 [cdc_acm]
 [&lt;c135465d&gt;] ? net_rps_action_and_irq_enable+0x6d/0x80
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
---[ end trace efd9a11434f0082f ]---
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da300, rcv 0xf57fbc10, buf 0xf57fbd50
cdc-acm.c: disconnected from network
cdc-acm.c: acm_rx_tasklet: sending urb 0xf50da380, rcv 0xf57fbbfc, buf 0xf57fbd3c
cdc-acm.c: Entering acm_rx_tasklet
------------[ cut here ]------------
WARNING: at /home/johan/src/linux/linux-2.6/lib/list_debug.c:48 list_del+0xd5/0x120()
Hardware name: Vostro 1520
list_del corruption, next is LIST_POISON1 (00100100)
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.37+ #39
Call Trace:
 [&lt;c103c7e2&gt;] warn_slowpath_common+0x72/0xa0
 [&lt;c11dd875&gt;] ? list_del+0xd5/0x120
 [&lt;c11dd875&gt;] ? list_del+0xd5/0x120
 [&lt;c103c8b3&gt;] warn_slowpath_fmt+0x33/0x40
 [&lt;c11dd875&gt;] list_del+0xd5/0x120
 [&lt;f8051fac&gt;] acm_rx_tasklet+0x2dc/0x3e0 [cdc_acm]
 [&lt;c106dbab&gt;] ? trace_hardirqs_on+0xb/0x10
 [&lt;c1042b30&gt;] ? tasklet_action+0x60/0x140
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
---[ end trace efd9a11434f00830 ]---
BUG: unable to handle kernel paging request at 00200200
IP: [&lt;c11dd7bd&gt;] list_del+0x1d/0x120
*pde = 00000000
Oops: 0000 [#1] PREEMPT SMP
last sysfs file: /sys/devices/pci0000:00/0000:00:1a.1/usb4/4-1/4-1:1.0/tty/ttyACM0/uevent
Modules linked in: cdc_acm
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.37+ #39 0T816J/Vostro 1520
EIP: 0060:[&lt;c11dd7bd&gt;] EFLAGS: 00010046 CPU: 0
EIP is at list_del+0x1d/0x120
EAX: f57fbd3c EBX: f57fb800 ECX: ffff8000 EDX: 00200200
ESI: f57fbe90 EDI: f57fbd3c EBP: f600bf54 ESP: f600bf3c
 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process ksoftirqd/0 (pid: 3, ti=f600a000 task=f60791c0 task.ti=f6082000)
Stack:
 c1527e84 00000030 c1527e54 00100100 f57fb800 f57fbd3c f600bf98 f8051fac
 f8053104 f8052b94 f600bf6c c106dbab f600bf80 00000286 f60791c0 c1042b30
 f57fbda8 f57f5800 f57fbdb0 f57fbd80 f57fbe7c c1656b04 00000000 f600bfb0
Call Trace:
 [&lt;f8051fac&gt;] ? acm_rx_tasklet+0x2dc/0x3e0 [cdc_acm]
 [&lt;c106dbab&gt;] ? trace_hardirqs_on+0xb/0x10
 [&lt;c1042b30&gt;] ? tasklet_action+0x60/0x140
 [&lt;c1042bb6&gt;] ? tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] ? __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;
 [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
Code: ff 48 14 e9 57 ff ff ff 90 90 90 90 90 90 55 89 e5 83 ec 18 81 38 00 01 10 00 0f 84 9c 00 00 00 8b 50 04 81 fa 00 02 20 00 74 33 &lt;8b&gt; 12 39 d0 75 5c 8b 10 8b 4a 04 39 c8 0f 85 b5 00 00 00 8b 48
EIP: [&lt;c11dd7bd&gt;] list_del+0x1d/0x120 SS:ESP 0068:f600bf3c
CR2: 0000000000200200
---[ end trace efd9a11434f00831 ]---
Kernel panic - not syncing: Fatal exception in interrupt
Pid: 3, comm: ksoftirqd/0 Tainted: G      D W   2.6.37+ #39
Call Trace:
 [&lt;c13fede1&gt;] ? printk+0x1d/0x24
 [&lt;c13fecce&gt;] panic+0x66/0x15c
 [&lt;c10067df&gt;] oops_end+0x8f/0x90
 [&lt;c1025476&gt;] no_context+0xc6/0x160
 [&lt;c10255a8&gt;] __bad_area_nosemaphore+0x98/0x140
 [&lt;c103cf68&gt;] ? release_console_sem+0x1d8/0x210
 [&lt;c1025667&gt;] bad_area_nosemaphore+0x17/0x20
 [&lt;c1025a49&gt;] do_page_fault+0x279/0x420
 [&lt;c1006a8f&gt;] ? show_trace+0x1f/0x30
 [&lt;c13fede1&gt;] ? printk+0x1d/0x24
 [&lt;c10257d0&gt;] ? do_page_fault+0x0/0x420
 [&lt;c140333b&gt;] error_code+0x5f/0x64
 [&lt;c103007b&gt;] ? select_task_rq_fair+0x37b/0x6a0
 [&lt;c10257d0&gt;] ? do_page_fault+0x0/0x420
 [&lt;c11dd7bd&gt;] ? list_del+0x1d/0x120
 [&lt;f8051fac&gt;] acm_rx_tasklet+0x2dc/0x3e0 [cdc_acm]
 [&lt;c106dbab&gt;] ? trace_hardirqs_on+0xb/0x10
 [&lt;c1042b30&gt;] ? tasklet_action+0x60/0x140
 [&lt;c1042bb6&gt;] tasklet_action+0xe6/0x140
 [&lt;c104342f&gt;] __do_softirq+0xaf/0x210
 [&lt;c1043380&gt;] ? __do_softirq+0x0/0x210
 &lt;IRQ&gt;  [&lt;c1042c9a&gt;] ? run_ksoftirqd+0x8a/0x1c0
 [&lt;c1042c10&gt;] ? run_ksoftirqd+0x0/0x1c0
 [&lt;c105ac24&gt;] ? kthread+0x74/0x80
 [&lt;c105abb0&gt;] ? kthread+0x0/0x80
 [&lt;c100337a&gt;] ? kernel_thread_helper+0x6/0x10
panic occurred, switching back to text console
------------[ cut here ]------------

Signed-off-by: Johan Hovold &lt;jhovold@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>USB: uss720 fixup refcount position</title>
<updated>2011-03-28T14:31:22+00:00</updated>
<author>
<name>Peter Holik</name>
<email>peter@holik.at</email>
</author>
<published>2011-03-18T17:47:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=a390e88f47af360091497d4c8e67420e04d54fdb'/>
<id>a390e88f47af360091497d4c8e67420e04d54fdb</id>
<content type='text'>
commit adaa3c6342b249548ea830fe8e02aa5b45be8688 upstream.

My testprog do a lot of bitbang - after hours i got following warning and my machine lockups:
WARNING: at /build/buildd/linux-2.6.38/lib/kref.c:34
After debugging uss720 driver i discovered that the completion callback was called before
usb_submit_urb returns. The callback frees the request structure that is krefed on return by
usb_submit_urb.

Signed-off-by: Peter Holik &lt;peter@holik.at&gt;
Acked-by: Thomas Sailer &lt;t.sailer@alumni.ethz.ch&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit adaa3c6342b249548ea830fe8e02aa5b45be8688 upstream.

My testprog do a lot of bitbang - after hours i got following warning and my machine lockups:
WARNING: at /build/buildd/linux-2.6.38/lib/kref.c:34
After debugging uss720 driver i discovered that the completion callback was called before
usb_submit_urb returns. The callback frees the request structure that is krefed on return by
usb_submit_urb.

Signed-off-by: Peter Holik &lt;peter@holik.at&gt;
Acked-by: Thomas Sailer &lt;t.sailer@alumni.ethz.ch&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
</feed>
