diff options
Diffstat (limited to 'kernel')
| -rw-r--r-- | kernel/kmod.c | 4 | ||||
| -rw-r--r-- | kernel/pid.c | 5 | ||||
| -rw-r--r-- | kernel/power/snapshot.c | 5 | ||||
| -rw-r--r-- | kernel/power/user.c | 8 | ||||
| -rw-r--r-- | kernel/softirq.c | 15 |
5 files changed, 33 insertions, 4 deletions
diff --git a/kernel/kmod.c b/kernel/kmod.c index fb326365b694..b086006c59e7 100644 --- a/kernel/kmod.c +++ b/kernel/kmod.c | |||
| @@ -571,6 +571,10 @@ int call_usermodehelper_exec(struct subprocess_info *sub_info, int wait) | |||
| 571 | DECLARE_COMPLETION_ONSTACK(done); | 571 | DECLARE_COMPLETION_ONSTACK(done); |
| 572 | int retval = 0; | 572 | int retval = 0; |
| 573 | 573 | ||
| 574 | if (!sub_info->path) { | ||
| 575 | call_usermodehelper_freeinfo(sub_info); | ||
| 576 | return -EINVAL; | ||
| 577 | } | ||
| 574 | helper_lock(); | 578 | helper_lock(); |
| 575 | if (!khelper_wq || usermodehelper_disabled) { | 579 | if (!khelper_wq || usermodehelper_disabled) { |
| 576 | retval = -EBUSY; | 580 | retval = -EBUSY; |
diff --git a/kernel/pid.c b/kernel/pid.c index ebe5e80b10f8..9b9a26698144 100644 --- a/kernel/pid.c +++ b/kernel/pid.c | |||
| @@ -273,6 +273,11 @@ void free_pid(struct pid *pid) | |||
| 273 | */ | 273 | */ |
| 274 | wake_up_process(ns->child_reaper); | 274 | wake_up_process(ns->child_reaper); |
| 275 | break; | 275 | break; |
| 276 | case PIDNS_HASH_ADDING: | ||
| 277 | /* Handle a fork failure of the first process */ | ||
| 278 | WARN_ON(ns->child_reaper); | ||
| 279 | ns->nr_hashed = 0; | ||
| 280 | /* fall through */ | ||
| 276 | case 0: | 281 | case 0: |
| 277 | schedule_work(&ns->proc_work); | 282 | schedule_work(&ns->proc_work); |
| 278 | break; | 283 | break; |
diff --git a/kernel/power/snapshot.c b/kernel/power/snapshot.c index 358a146fd4da..98c3b34a4cff 100644 --- a/kernel/power/snapshot.c +++ b/kernel/power/snapshot.c | |||
| @@ -743,7 +743,10 @@ int create_basic_memory_bitmaps(void) | |||
| 743 | struct memory_bitmap *bm1, *bm2; | 743 | struct memory_bitmap *bm1, *bm2; |
| 744 | int error = 0; | 744 | int error = 0; |
| 745 | 745 | ||
| 746 | BUG_ON(forbidden_pages_map || free_pages_map); | 746 | if (forbidden_pages_map && free_pages_map) |
| 747 | return 0; | ||
| 748 | else | ||
| 749 | BUG_ON(forbidden_pages_map || free_pages_map); | ||
| 747 | 750 | ||
| 748 | bm1 = kzalloc(sizeof(struct memory_bitmap), GFP_KERNEL); | 751 | bm1 = kzalloc(sizeof(struct memory_bitmap), GFP_KERNEL); |
| 749 | if (!bm1) | 752 | if (!bm1) |
diff --git a/kernel/power/user.c b/kernel/power/user.c index 72e8f4fd616d..957f06164ad1 100644 --- a/kernel/power/user.c +++ b/kernel/power/user.c | |||
| @@ -39,6 +39,7 @@ static struct snapshot_data { | |||
| 39 | char frozen; | 39 | char frozen; |
| 40 | char ready; | 40 | char ready; |
| 41 | char platform_support; | 41 | char platform_support; |
| 42 | bool free_bitmaps; | ||
| 42 | } snapshot_state; | 43 | } snapshot_state; |
| 43 | 44 | ||
| 44 | atomic_t snapshot_device_available = ATOMIC_INIT(1); | 45 | atomic_t snapshot_device_available = ATOMIC_INIT(1); |
| @@ -82,6 +83,10 @@ static int snapshot_open(struct inode *inode, struct file *filp) | |||
| 82 | data->swap = -1; | 83 | data->swap = -1; |
| 83 | data->mode = O_WRONLY; | 84 | data->mode = O_WRONLY; |
| 84 | error = pm_notifier_call_chain(PM_RESTORE_PREPARE); | 85 | error = pm_notifier_call_chain(PM_RESTORE_PREPARE); |
| 86 | if (!error) { | ||
| 87 | error = create_basic_memory_bitmaps(); | ||
| 88 | data->free_bitmaps = !error; | ||
| 89 | } | ||
| 85 | if (error) | 90 | if (error) |
| 86 | pm_notifier_call_chain(PM_POST_RESTORE); | 91 | pm_notifier_call_chain(PM_POST_RESTORE); |
| 87 | } | 92 | } |
| @@ -111,6 +116,8 @@ static int snapshot_release(struct inode *inode, struct file *filp) | |||
| 111 | pm_restore_gfp_mask(); | 116 | pm_restore_gfp_mask(); |
| 112 | free_basic_memory_bitmaps(); | 117 | free_basic_memory_bitmaps(); |
| 113 | thaw_processes(); | 118 | thaw_processes(); |
| 119 | } else if (data->free_bitmaps) { | ||
| 120 | free_basic_memory_bitmaps(); | ||
| 114 | } | 121 | } |
| 115 | pm_notifier_call_chain(data->mode == O_RDONLY ? | 122 | pm_notifier_call_chain(data->mode == O_RDONLY ? |
| 116 | PM_POST_HIBERNATION : PM_POST_RESTORE); | 123 | PM_POST_HIBERNATION : PM_POST_RESTORE); |
| @@ -231,6 +238,7 @@ static long snapshot_ioctl(struct file *filp, unsigned int cmd, | |||
| 231 | break; | 238 | break; |
| 232 | pm_restore_gfp_mask(); | 239 | pm_restore_gfp_mask(); |
| 233 | free_basic_memory_bitmaps(); | 240 | free_basic_memory_bitmaps(); |
| 241 | data->free_bitmaps = false; | ||
| 234 | thaw_processes(); | 242 | thaw_processes(); |
| 235 | data->frozen = 0; | 243 | data->frozen = 0; |
| 236 | break; | 244 | break; |
diff --git a/kernel/softirq.c b/kernel/softirq.c index 53cc09ceb0b8..d7d498d8cc4f 100644 --- a/kernel/softirq.c +++ b/kernel/softirq.c | |||
| @@ -328,10 +328,19 @@ void irq_enter(void) | |||
| 328 | 328 | ||
| 329 | static inline void invoke_softirq(void) | 329 | static inline void invoke_softirq(void) |
| 330 | { | 330 | { |
| 331 | if (!force_irqthreads) | 331 | if (!force_irqthreads) { |
| 332 | __do_softirq(); | 332 | /* |
| 333 | else | 333 | * We can safely execute softirq on the current stack if |
| 334 | * it is the irq stack, because it should be near empty | ||
| 335 | * at this stage. But we have no way to know if the arch | ||
| 336 | * calls irq_exit() on the irq stack. So call softirq | ||
| 337 | * in its own stack to prevent from any overrun on top | ||
| 338 | * of a potentially deep task stack. | ||
| 339 | */ | ||
| 340 | do_softirq(); | ||
| 341 | } else { | ||
| 334 | wakeup_softirqd(); | 342 | wakeup_softirqd(); |
| 343 | } | ||
| 335 | } | 344 | } |
| 336 | 345 | ||
| 337 | static inline void tick_irq_exit(void) | 346 | static inline void tick_irq_exit(void) |
