[PATCH][GIT PULL][v3.4] tracing: Fix ftrace stack trace entries

2012-03-23 Thread Steven Rostedt
Mauerer Signed-off-by: Steven Rostedt diff --git a/kernel/trace/trace_entries.h b/kernel/trace/trace_entries.h index 9336590..205dcac 100644 --- a/kernel/trace/trace_entries.h +++ b/kernel/trace/trace_entries.h @@ -156,6 +156,12 @@ FTRACE_ENTRY_DUP(wakeup, ctx_switch_entry, #define

[PATCH][GIT PULL][v3.4] tracing: Fix ent_size in trace output

2012-03-27 Thread Steven Rostedt
Ingo, Please pull the latest tip/perf/urgent tree, which can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace.git tip/perf/urgent Head SHA1: 12b5da349a8b94c9dbc3430a6bc42eabd9eaf50b Steven Rostedt (1): tracing: Fix ent_size in trace output kernel

Re: Patch "tracing: Fix ent_size in trace output" has been added to the 3.0-stable tree

2012-04-05 Thread Steven Rostedt
On Wed, 2012-04-04 at 14:30 -0700, Greg KH wrote: > On Wed, Apr 04, 2012 at 12:27:02PM -0700, gre...@linuxfoundation.org wrote: > > > > This is a note to let you know that I've just added the patch titled > > > > tracing: Fix ent_size in trace output > > > > to the 3.0-stable tree which can

[PATCH][GIT PULL][v3.4] tracing: Fix stacktrace of latency tracers (irqsoff and friends)

2012-04-19 Thread Steven Rostedt
: db4c75cbebd7e5910cd3bcb6790272fcc3042857 Steven Rostedt (1): tracing: Fix stacktrace of latency tracers (irqsoff and friends) kernel/trace/trace_output.c |5 + 1 file changed, 5 insertions(+) --- commit db4c75cbebd7e5910cd3bcb6790272fcc3042857 Author: Steven Rostedt Date: Thu

Re: FAILED: patch "[PATCH] sched/rt: Fix task stack corruption under" failed to apply to 3.2-stable tree

2012-02-06 Thread Steven Rostedt
gt; > Signed-off-by: Chanho Min > Signed-off-by: Peter Zijlstra > Acked-by: Steven Rostedt > Cc: > Link: > http://lkml.kernel.org/r/CAOAMb1BHA=5fm7ktewyyke6u-8dp0iuujmpgqw54vnexfsg...@mail.gmail.com > Signed-off-by: Ingo Molnar > > diff --git a/kernel/sched/rt.c b/

Re: pca953x - warning on irq

2012-02-13 Thread Steven Rostedt
On Tue, 2011-12-27 at 10:33 +0100, Manfred Gruber wrote: > Hi Yong Zhang! > > Thx a lot, that fix removed the warning on 3.0.14-rt31+. Hi, I was thinking that this would have came into -rt as a 3.0 stable tree, but it doesn't seem to. Should this go into mainline stable? And is it still needed

Re: Patch "x86/nmi: Test saved %cs in NMI to determine nested NMI case" has been added to the 3.2-stable tree

2012-02-27 Thread Steven Rostedt
On Mon, 2012-02-27 at 13:46 -0800, gre...@linuxfoundation.org wrote: > This is a note to let you know that I've just added the patch titled > > x86/nmi: Test saved %cs in NMI to determine nested NMI case > > to the 3.2-stable tree which can be found at: > > http://www.kernel.org/git/?p=l

Missing stable commits?

2012-03-05 Thread Steven Rostedt
As I'm going through adding commits from Thomas's latest -rt patch set into the stable-rt tree, some of the patches conflicted. Looking at the conflicts, it seems that mainline has patches that should probably be added to the stable tree. Here's what I found so far: commit 1b71fe2efa31cd18c865db47

Re: Missing stable commits?

2012-03-05 Thread Steven Rostedt
Please ignore this. Seems it is in stable, but not in the branch I was looking at. Sorry for the noise :-p -- Steve On Mon, 2012-03-05 at 11:39 -0500, Steven Rostedt wrote: > As I'm going through adding commits from Thomas's latest -rt patch set > into the stable-rt tree, som

[PATCH RT 3/7] printk: Fix rq->lock vs logbuf_lock unlock lock inversion

2013-02-18 Thread Steven Rostedt
cts. Restore the ordering and unlock logbuf_lock before releasing console_sem. Signed-off-by: ybu Cc: Peter Zijlstra Cc: stable@vger.kernel.org Cc: stable...@vger.kernel.org Link: http://lkml.kernel.org/r/e807e903fe6cbe4d95e420fbfcc273b8274...@nasanexd01h.na.qualcomm.com Signed-off-by: Thomas G

[PATCH RT 3/7] printk: Fix rq->lock vs logbuf_lock unlock lock inversion

2013-02-18 Thread Steven Rostedt
cts. Restore the ordering and unlock logbuf_lock before releasing console_sem. Signed-off-by: ybu Cc: Peter Zijlstra Cc: stable@vger.kernel.org Cc: stable...@vger.kernel.org Link: http://lkml.kernel.org/r/e807e903fe6cbe4d95e420fbfcc273b8274...@nasanexd01h.na.qualcomm.com Signed-off-by: Thomas G

[PATCH 2/2] ftrace: Call ftrace cleanup module notifier after all other notifiers

2013-02-18 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" Commit: c1bf08ac "ftrace: Be first to run code modification on modules" changed ftrace module notifier's priority to INT_MAX in order to process the ftrace nops before anything else could touch them (namely kprobes). This wa

[PATCH][3.9] ftrace: Update the kconfig for DYNAMIC_FTRACE

2013-02-27 Thread Steven Rostedt
s unexpected results for the user. Just like any other bug would. Please pull the latest tip/perf/urgent tree, which can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace.git tip/perf/urgent Head SHA1: db05021d49a994ee40a9735d9c3cb0060c9babb8 Steven Rostedt (1):

Re: FAILED: patch "[PATCH] ftrace: Update the kconfig for DYNAMIC_FTRACE" failed to apply to 3.8-stable tree

2013-03-11 Thread Steven Rostedt
On Mon, 2013-03-11 at 13:39 -0700, gre...@linuxfoundation.org wrote: > The patch below does not apply to the 3.8-stable tree. > If someone wants it applied there, or to any other stable or longterm > tree, then please email the backport, including the original git commit > id to . > > thanks, > >

[3.8] [PATCH] ftrace: Update the kconfig for DYNAMIC_FTRACE

2013-03-11 Thread Steven Rostedt
-- original commit in Linus's tree -- >From db05021d49a994ee40a9735d9c3cb0060c9babb8 Mon Sep 17 00:00:00 2001 From: Steven Rostedt Date: Wed, 27 Feb 2013 21:48:09 -0500 Subject: [PATCH] ftrace: Update the kconfig for DYNAMIC_FTRACE The prompt t

[3.0,3.2,3.4] [PATCH] ftrace: Update the kconfig for DYNAMIC_FTRACE

2013-03-11 Thread Steven Rostedt
-- original commit in Linus's tree -- >From db05021d49a994ee40a9735d9c3cb0060c9babb8 Mon Sep 17 00:00:00 2001 From: Steven Rostedt Date: Wed, 27 Feb 2013 21:48:09 -0500 Subject: [PATCH] ftrace: Update the kconfig for DYNAMIC_FTRACE The prompt t

[PATCH][GIT PULL][3.9] tracing: Fix free of probe entry by calling call_rcu_sched()

2013-03-13 Thread Steven Rostedt
lease pull the latest tip/perf/urgent-2 tree, which can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace.git tip/perf/urgent-2 Head SHA1: 740466bc89ad8bd5afcc8de220f715f62b21e365 Steven Rostedt (Red Hat) (1): tracing: Fix free of probe entry by ca

Question about a patch for stable

2013-03-13 Thread Steven Rostedt
Hi Greg, I was bringing Documentation/trace/ftrace.txt up to date, and obviously I found some minor bugs in the code while doing so :-) One of the things I've discovered, is that the new -mfentry option for gcc used for function tracing (for only x86 and gcc >= 4.6.0), the stack tracer gives some

Re: Question about a patch for stable

2013-03-13 Thread Steven Rostedt
On Wed, 2013-03-13 at 19:48 -0700, Greg Kroah-Hartman wrote: > I always defer to the maintainer of the subsystem, so it's up to you. Great! I'll add them all :-) It just irritates me when I do a stack trace and see some strange results. Even when I know they are minor and understand why they ha

[PATCH 1/3] tracing: Protect tracer flags with trace_types_lock

2013-03-14 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" Seems that the tracer flags have never been protected from synchronous writes. Luckily, admins don't usually modify the tracing flags via two different tasks. But if scripts were to be used to modify them, then they could get corrupted. Move the t

[PATCH 2/3] tracing: Keep overwrite in sync between regular and snapshot buffers

2013-03-14 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" Changing the overwrite mode for the ring buffer via the trace option only sets the normal buffer. But the snapshot buffer could swap with it, and then the snapshot would be in non overwrite mode and the normal buffer would be in overwrite mode, even

[PATCH 3/3] tracing: Prevent buffer overwrite disabled for latency tracers

2013-03-14 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" The latency tracers require the buffers to be in overwrite mode, otherwise they get screwed up. Force the buffers to stay in overwrite mode when latency tracers are enabled. Added a flag_changed() method to the tracer structure to allow the tracers t

[PATCH 2/3 v2] tracing: Keep overwrite in sync between regular and snapshot buffers

2013-03-14 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" Changing the overwrite mode for the ring buffer via the trace option only sets the normal buffer. But the snapshot buffer could swap with it, and then the snapshot would be in non overwrite mode and the normal buffer would be in overwrite mode, even

[PATCH 1/3 v2] tracing: Protect tracer flags with trace_types_lock

2013-03-14 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" Seems that the tracer flags have never been protected from synchronous writes. Luckily, admins don't usually modify the tracing flags via two different tasks. But if scripts were to be used to modify them, then they could get corrupted. Move the t

[PATCH 3/3 v2] tracing: Prevent buffer overwrite disabled for latency tracers

2013-03-14 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" The latency tracers require the buffers to be in overwrite mode, otherwise they get screwed up. Force the buffers to stay in overwrite mode when latency tracers are enabled. Added a flag_changed() method to the tracer structure to allow the tracers t

[for-next][PATCH 16/20] tracing: Remove most or all of stack tracer stack size from stack_max_size

2013-03-15 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" Currently, the depth reported in the stack tracer stack_trace file does not match the stack_max_size file. This is because the stack_max_size includes the overhead of stack tracer itself while the depth does not. The first time a max is triggered, a c

[for-next][PATCH 15/20] tracing: Fix stack tracer with fentry use

2013-03-15 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" When gcc 4.6 on x86 is used, the function tracer will use the new option -mfentry which does a call to "fentry" at every function instead of "mcount". The significance of this is that fentry is called as the first operation of the

[for-next][PATCH 14/20] tracing: Use stack of calling function for stack tracer

2013-03-15 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" Use the stack of stack_trace_call() instead of check_stack() as the test pointer for max stack size. It makes it a bit cleaner and a little more accurate. Adding stable, as a later fix depends on this patch. Cc: stable@vger.kernel.org Signed-off-

[for-next][PATCH 8/9] tracing: Fix ftrace_dump()

2013-03-15 Thread Steven Rostedt
From: "Steven Rostedt (Red Hat)" ftrace_dump() had a lot of issues. What ftrace_dump() does, is when ftrace_dump_on_oops is set (via a kernel parameter or sysctl), it will dump out the ftrace buffers to the console when either a oops, panic, or a sysrq-z occurs. This was written a lon

Re: [PATCH] net: reduce net_rx_action() latency to 2 HZ

2013-03-21 Thread Steven Rostedt
On Thu, 2013-03-21 at 10:43 -0700, Eric Dumazet wrote: > On Thu, 2013-03-21 at 13:25 -0400, Paul Gortmaker wrote: > > > That is also reasonably portable back to 2.6.34. And it is more > > interesting too -- it will be interesting in a preempt_rt context > > too, once RT moves ahead off the curren

[RFC][PATCH] x86_32: Return actual stack when requesting sp from regs

2012-07-13 Thread Steven Rostedt
sshd-1352 [000] d... 362.690950: ftrace: (sys_read+0x4/0x70) s=f3febfa8 bash-1355 [001] d... 362.691033: ftrace: (sys_read+0x4/0x70) s=f5075fa8 [ I wonder if this should also go to stable? ] Signed-off-by: Steven Rostedt Index: linux-trace.git/arch/x86/incl

Re: [ 00/73] 3.2.25-stable review

2012-08-01 Thread Steven Rostedt
On Tue, 2012-07-31 at 05:43 +0100, Ben Hutchings wrote: > This is the start of the stable review cycle for the 3.2.25 release. > There are 73 patches in this series, which will be posted as responses > to this one. If anyone has any issues with these being applied, please > let me know. > > Respo

[PATCH 05/86] tcp: fix MSG_SENDPAGE_NOTLAST logic

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit ae62ca7b03217be5e74759dc6d7698c95df498b3 ] commit 35f9c09fe9c72e (tcp: tcp_sendpages() should call tcp_push() once) added an internal flag : MSG_SENDPAGE_NOTL

[PATCH 55/86] ipv6: stop multicast forwarding to process interface scoped addresses

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Hannes Frederic Sowa [ Upstream commit ddf64354af4a702ee0b85d0a285ba74c7278a460 ] v2: a) used struct ipv6_addr_props v3: a) reverted changes for ipv6_addr_props v4: a) do not use __ipv6_a

[PATCH 73/86] tcp: dont abort splice() after small transfers

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Willy Tarreau [ Upstream commit e9feca83d1496afabd0cc174863646e6d7101d85 ] TCP coalescing added a regression in splice(socket->pipe) performance, for some workloads because of the way tcp_r

[PATCH 70/86] ipv4: Fix route refcount on pmtu discovery

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Steffen Klassert [ Upstream commit 9a2a0fefaf476a4be4d153792eaa600203b83edf ] git commit 9cb3a50c (ipv4: Invalidate the socket cached route on pmtu events if possible) introduced a refcount

[PATCH 71/86] tcp: detect SYN/data drop when F-RTO is disabled

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit 9d475971466bf0e4c65a88d46031b8127a767897 ] On receiving the SYN-ACK, Fast Open checks icsk_retransmit for SYN retransmission to detect SYN/data drops. But if

[PATCH 72/86] tcp: fix an infinite loop in tcp_slow_start()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 93e3a886683c28e718e146c827e9cc750c88817e ] Since commit 9dc274151a548 (tcp: fix ABC in tcp_slow_start()), a nul snd_cwnd triggers an infinite loop in tcp_slow

[PATCH 57/86] dcbnl: fix various netlink info leaks

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Mathias Krause [ Upstream commit 29cd8ae0e1a39e239a3a7b67da1986add1199fc0 ] The dcb netlink interface leaks stack memory in various places: * perm_addr[] buffer is only filled at max with 1

[PATCH 58/86] 6lowpan: Fix endianness issue in is_addr_link_local().

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 9026c4927254f5bea695cc3ef2e255280e6a3011 ] Signed-off-by: YOSHIFUJI Hideaki Signed-off-by: David S. Miller --- net/ieee802154/6lowpan.h |2 +- 1 file changed, 1 insertion(+

[PATCH 59/86] ipv6: Change skb->data before using icmpv6_notify() to propagate redirect

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Duan Jiong [ Upstream commit 7801a085efab5f1d7cc54fa1f80b0c69b457db68 ] In function ndisc_redirect_rcv(), the skb->data points to the transport header, but function icmpv6_notify() need the

[PATCH 60/86] mac802154: fix NOHZ local_softirq_pending 08 warning

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Alexander Aring [ Upstream commit 386de15c3f62bf100b4e162c0a859785d2d58661 ] When using nanosleep() in an userspace application we get a ratelimit warning NOHZ: local_softirq_pending 08 f

[PATCH 62/86] macvlan: fix macvlan_get_size()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit ee19a438d8f4f7ff5a9469a2f30bba7bb15f00ec ] commit df8ef8f3aaa (macvlan: add FDB bridge ops and macvlan flags) forgot to update macvlan_get_size() after the ad

[PATCH 61/86] sctp: jsctp_sf_eat_sack: fix jprobes function signature mismatch

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit c5b1825fa547eb475ca8936f6f346c18b1ece298 ] Commit 24cb81a6a (sctp: Push struct net down into all of the state machine functions) introduced the net structu

[PATCH 63/86] tcp: fix incorrect LOCKDROPPEDICMPS counter

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 55ef74760190fb39eacaaee1816dfaeeadd5b92d ] commit 563d34d057 (tcp: dont drop MTU reduction indications) added an error leading to incorrect accounting of LINU

[PATCH 64/86] IP_GRE: Fix kernel panic in IP_GRE with GRE csum.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Pravin B Shelar [ Upstream commit d0a7cc630a337b0f56dc145e7eb6232852b14dd4 ] Due to IP_GRE GSO support, GRE can recieve non linear skb which results in panic in case of GRE_CSUM. Following

[PATCH 67/86] ipv6: Add an error handler for icmp6

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Steffen Klassert [ Upstream commit cdd6baf1fd9159d9b333938f1717e7c4cba025cc ] pmtu and redirect events are now handled in the protocols error handler, so add an error handler for icmp6 to d

[PATCH 65/86] ipv4: Remove output route check in ipv4_mtu

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Steffen Klassert [ Upstream commit 34f48df8ec531943ca83ea994eb2561897d8f9f4 ] The output route check was introduced with git commit 261663b0 (ipv4: Don't use the cached pmtu informations fo

[PATCH 66/86] ipv4: Dont update the pmtu on mtu locked routes

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Steffen Klassert [ Upstream commit 4ac7bed1ff5f935525a8c71c347bbc8cdff9e067 ] Routes with locked mtu should not use learned pmtu informations, so do not update the pmtu on these routes. Re

[PATCH 68/86] ipv4: Invalidate the socket cached route on pmtu events if possible

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Steffen Klassert [ Upstream commit c82d543a2e872727c6f93ba7a1bddd5228cc ] The route lookup in ipv4_sk_update_pmtu() might return a route different from the route we cached at the socket

[PATCH 74/86] tcp: splice: fix an infinite loop in tcp_read_sock()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 74b2a7b4ea60d5c1c94ac01ad001e16ac40132f3 ] commit 02275a2ee7c0 (tcp: don't abort splice() after small transfers) added a regression. [ 83.843570] INFO: rcu

[PATCH 69/86] ipv4: Add a socket release callback for datagram sockets

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Steffen Klassert [ Upstream commit 1c4fa590068ef4e257cb7b27643a3ee34cf9163b ] This implements a socket release callback function to check if the socket cached route got invalid during the t

[PATCH 75/86] tcp: fix splice() and tcp collapsing interaction

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit fdd384558afc89793bf35db6b5263e80ee92093d ] Under unusual circumstances, TCP collapse can split a big GRO TCP packet while its being used in a splice(socket->p

[PATCH 77/86] net: splice: fix __splice_segment()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 9049d7450887d54b199441144f8ba50fa4d8cf92 ] commit 9ca1b22d6d2 (net: splice: avoid high order page splitting) forgot that skb->head could need a copy into seve

[PATCH 76/86] net: splice: avoid high order page splitting

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 4678414601960b3d60b651d82e2913c48c53508d ] splice() can handle pages of any order, but network code tries hard to split them in PAGE_SIZE units. Not quite suc

[PATCH 52/86] netlabel: fix build problems when CONFIG_IPV6=n

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Paul Moore [ Upstream commit a6a8fe950e1b8596bb06f2c89c3a1a4bf2011ba9 ] My last patch to solve a problem where the static/fallback labels were not fully displayed resulted in build problems

[PATCH 78/86] sparc64: Add missing HAVE_ARCH_TRANSPARENT_HUGEPAGE.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit f53f5f1e2a84c2a95c47f28b0859ef5eee34569d ] This got missed in the cleanups done for the S390 THP support. CC: Gerald Schaefer Signed-off-by: David S. M

[PATCH 49/86] tcp: fix double-counted receiver RTT when leaving receiver fast path

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Neal Cardwell [ Upstream commit aab2b4bf224ef8358d262f95b568b8ad0cecf0a0 ] We should not update ts_recent and call tcp_rcv_rtt_measure_ts() both before and after going to step5. That wastes

[PATCH 48/86] net: ipv6: Dont purge default router if accept_ra=2

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Lorenzo Colitti [ Upstream commit 3e8b0ac3e41e3c88a5522d5df7212438ab51 ] Setting net.ipv6.conf..accept_ra=2 causes the kernel to accept RAs even when forwarding is enabled. However, ena

[PATCH 82/86] ipv6: fix race condition regarding dst->expires and dst->from.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit eaf11ca939f83c273740d5bcec7225969ae95295 ] Eric Dumazet wrote: | Some strange crashes happen in rt6_check_expired(), with access | to random addresses. | | At first glance, it loo

[PATCH 56/86] rtnl: fix info leak on RTM_GETLINK request for VF devices

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Mathias Krause [ Upstream commit 84d73cd3fb142bf1298a8c13fd4ca50fd2432372 ] Initialize the mac address buffer with 0 as the driver specific function will probably not fill the whole buffer.

[PATCH 83/86] ipv4: fix error handling in icmp_protocol.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Li Wei [ Upstream commit a426b816575c9701ddcb12a793693dbcbcee5c2b ] Now we handle icmp errors in each transport protocol's err_handler, for icmp protocols, that is ping_err. Since this hand

[PATCH 85/86] mlx4_en: fix allocation of CPU affinity reverse-map

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Kleber Sacilotto de Souza [ Upstream commit 77c5d9e186705280ca6eff08f3280a5f70c79f8e ] The mlx4_en driver allocates the number of objects for the CPU affinity reverse-map based on the numbe

[PATCH 86/86] team: unsyc the devices addresses when port is removed

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Vlad Yasevich [ Upstream commit 972ea34911d5f81639d963224d00add37170bd52 ] When a team port is removed, unsync all devices addresses that may have been synched to the port devices. CC: Jir

[PATCH 46/86] l2tp: Restore socket refcount when sendmsg succeeds

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Guillaume Nault [ Upstream commit 8b82547e33e85fc24d4d172a93c796de1fefa81a ] The sendmsg() syscall handler for PPPoL2TP doesn't decrease the socket reference counter after successful transm

[PATCH 33/86] bridge: Pull ip header into skb->data before looking into ip header.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Sarveshwar Bandi [ Upstream commit 6caab7b0544e83e6c160b5e80f5a4a7dd69545c7 ] If lower layer driver leaves the ip header in the skb fragment, it needs to be first pulled into skb->data befo

[PATCH 84/86] tcp: fix SYN-data space mis-accounting

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit f7983d26995f85994a08ee173ee7d0c4ff3da356 ] In fast open the sender unncessarily reduces the space available for data in SYN by 12 bytes. This is because in

Re: [PATCH 00/86] [ANNOUNCE] The new 3.6.11.x short-term extended stable series (stable review)

2013-03-26 Thread Steven Rostedt
On Tue, 2013-03-26 at 13:20 -0400, Steven Rostedt wrote: > Responses should be made by Fri Mar 29 2013. > Anything received after that time might be too late. I just realized that I wont be working Friday, so make that Thursday ;-) -- Steve -- To unsubscribe from this list: send th

[PATCH 43/86] ipv6: use a stronger hash for tcp

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 08dcdbf6a7b9d14c2302c5bd0c5390ddf122f664 ] It looks like its possible to open thousands of TCP IPv6 sessions on a server, all landing in a single slot of TCP

[PATCH 44/86] sock_diag: Fix out-of-bounds access to sock_diag_handlers[]

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Mathias Krause [ Upstream commit 6e601a53566d84e1ffd25e7b6fe0b6894ffd79c0 ] Userland can send a netlink message requesting SOCK_DIAG_BY_FAMILY with a family greater or equal then AF_MAX --

[PATCH 45/86] vlan: adjust vlan_set_encap_proto() for its callers

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Cong Wang [ Upstream commit da8c87241c26aac81a64c7e4d21d438a33018f4e ] There are two places to call vlan_set_encap_proto(): vlan_untag() and __pop_vlan_tci(). vlan_untag() assumes skb->dat

[PATCH 39/86] xen-netback: correctly return errors from netbk_count_requests()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: David Vrabel [ Upstream commit 35876b5ffc154c357476b2c3bdab10feaf4bd8f0 ] netbk_count_requests() could detect an error, call netbk_fatal_tx_error() but return 0. The vif may then be used a

[PATCH 81/86] ppp: set qdisc_tx_busylock to avoid LOCKDEP splat

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 0b652fb68c02c1acd0307d3acac4ae7123536031 ] If a qdisc is installed on a ppp device, its possible to get a lockdep splat under stress, because nested dev_queue

[PATCH 80/86] xfrm: release neighbor upon dst destruction

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Romain KUNTZ [ Upstream commit 2894f6da7e382a42948cc42ab52148dddf281c48 ] Neighbor is cloned in xfrm6_fill_dst but seems to never be released. Neighbor entry should be released when XFRM6 d

[PATCH 79/86] sparc64: Fix gfp_flags setting in tsb_grow().

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit 95a2fea6fbb81f56e2ecb60ef0c31e075d6a8995 ] We should "|= more_flags" rather than "= more_flags". Reported-by: David Rientjes Acked-by: David Rientjes

[PATCH 40/86] xen-netback: cancel the credit timer when taking the vif down

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: David Vrabel [ Upstream commit 3e55f8b306cf305832a4ac78aa82e1b40e818ece ] If the credit timer is left armed after calling xen_netbk_remove_xenvif(), then it may fire and attempt to schedule

[PATCH 42/86] ipv4: fix a bug in ping_err().

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Li Wei [ Upstream commit b531ed61a2a2a77eeb2f7c88b49aa5ec7d9880d8 ] We should get 'type' and 'code' from the outer ICMP header. Signed-off-by: Li Wei Signed-off-by: David S. Miller ---

[PATCH 47/86] rds: limit the size allocated by rds_message_alloc()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Cong Wang [ Upstream commit ece6b0a2b25652d684a7ced4ae680a863af041e0 ] Dave Jones reported the following bug: "When fed mangled socket data, rds will trust what userspace gives it, and tri

[PATCH 38/86] net: fix infinite loop in __skb_recv_datagram()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 77c1090f94d1b0b5186fb13a1b71b47b1343f87f ] Tommi was fuzzing with trinity and reported the following problem : commit 3f518bf745 (datagram: Add offset argume

[PATCH 41/86] net: fix a compile error when SOCK_REFCNT_DEBUG is enabled

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Ying Xue [ Upstream commit dec34fb0f5b7873de45132a84a3af29e61084a6b ] When SOCK_REFCNT_DEBUG is enabled, below build error is met: kernel/sysctl_binary.o: In function `sk_refcnt_debug_rele

[PATCH 54/86] bridging: fix rx_handlers return code

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Cristian Bercaru [ Upstream commit 3bc1b1add7a8484cc4a261c3e128dbe1528ce01f ] The frames for which rx_handlers return RX_HANDLER_CONSUMED are no longer counted as dropped. They are counted

[PATCH 51/86] macvlan: Set IFF_UNICAST_FLT flag to prevent unnecessary promisc mode.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Vlad Yasevich [ Upstream commit 87ab7f6f2874f1115817e394a7ed2dea1c72549e ] Macvlan already supports hw address filters. Set the IFF_UNICAST_FLT so that it doesn't needlesly enter PROMISC m

[PATCH 53/86] netlabel: correctly list all the static label mappings

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Paul Moore [ Upstream commit 0c1233aba1e948c37f6dc7620cb7c253fcd71ce9 ] When we have a large number of static label mappings that spill across the netlink message boundary we fail to proper

[PATCH 37/86] bridge: set priority of STP packets

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Stephen Hemminger [ Upstream commit 547b4e718115eea74087e28d7fa70aec619200db ] Spanning Tree Protocol packets should have always been marked as control packets, this causes them to get queu

[PATCH 35/86] tg3: Fix crc errors on jumbo frame receive

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Nithin Nayak Sujir [ Upstream commit daf3ec688e057f6060fb9bb0819feac7a8bbf45c ] TG3_PHY_AUXCTL_SMDSP_ENABLE/DISABLE macros do a blind write to the phy auxiliary control register and overwri

[PATCH 50/86] tun: add a missing nf_reset() in tun_net_xmit()

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit f8af75f3517a24838a36eb5797a1a3e60bf9e276 ] Dave reported following crash : general protection fault: [#1] SMP CPU 2 Pid: 25407, comm: qemu-kvm Not taint

[PATCH 32/86] tcp: fix for zero packets_in_flight was too broad

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: =?UTF-8?q?Ilpo=20J=C3=A4rvinen?= [ Upstream commit 6731d2095bd4aef18027c72ef845ab1087c3ba63 ] There are transients during normal FRTO procedure during which the packets_in_flight can go to

[PATCH 36/86] sunvdc: Fix off-by-one in generic_request().

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit f4d9605434c0fd4cc8639bf25cfc043418c52362 ] The 'operations' bitmap corresponds one-for-one with the operation codes, no adjustment is necessary. Reporte

[PATCH 34/86] tg3: Avoid null pointer dereference in tg3_interrupt in netconsole mode

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Nithin Nayak Sujir [ Upstream commit 9c13cb8bb477a83b9a3c9e5a5478a4e21294a760 ] When netconsole is enabled, logging messages generated during tg3_open can result in a null pointer dereferen

[PATCH 20/86] ipv6: do not create neighbor entries for local delivery

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Marcelo Ricardo Leitner [ Upstream commit bd30e947207e2ea0ff2c08f5b4a03025ddce48d3 ] They will be created at output, if ever needed. This avoids creating empty neighbor entries when TPROXYi

[PATCH 30/86] netback: correct netbk_tx_err to handle wrap around.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Ian Campbell [ Upstream commit b9149729ebdcfce63f853aa54a404c6a8f6ebbf3 ] Signed-off-by: Ian Campbell Acked-by: Jan Beulich Signed-off-by: David S. Miller --- drivers/net/xen-netback/ne

[PATCH 29/86] xen/netback: free already allocated memory on failure in xen_netbk_get_requests

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Ian Campbell [ Upstream commit 4cc7c1cb7b11b6f3515bd9075527576a1eecc4aa ] Signed-off-by: Ian Campbell Signed-off-by: David S. Miller --- drivers/net/xen-netback/netback.c | 13

[PATCH 22/86] packet: fix leakage of tx_ring memory

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Phil Sutter [ Upstream commit 9665d5d62487e8e7b1f546c00e11107155384b9a ] When releasing a packet socket, the routine packet_set_ring() is reused to free rings instead of allocating them. Bu

[PATCH 31/86] tcp: frto should not set snd_cwnd to 0

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 2e5f421211ff76c17130b4597bc06df4eeead24f ] Commit 9dc274151a548 (tcp: fix ABC in tcp_slow_start()) uncovered a bug in FRTO code : tcp_process_frto() is settin

[PATCH 26/86] net: sctp: sctp_endpoint_free: zero out secret key data

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit b5c37fe6e24eec194bb29d22fdd55d73bcc709bf ] On sctp_endpoint_destroy, previously used sensitive keying material should be zeroed out before the memory is re

[PATCH 27/86] xen/netback: shutdown the ring if it contains garbage.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Ian Campbell [ Upstream commit 48856286b64e4b66ec62b94e504d0b29c1ade664 ] A buggy or malicious frontend should not be able to confuse netback. If we spot anything which is not as it should

[PATCH 25/86] net: sctp: sctp_setsockopt_auth_key: use kzfree instead of kfree

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit 6ba542a291a5e558603ac51cda9bded347ce7627 ] In sctp_setsockopt_auth_key, we create a temporary copy of the user passed shared auth key for the endpoint or a

[PATCH 28/86] xen/netback: dont leak pages on failure in xen_netbk_tx_check_gop.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Matthew Daley [ Upstream commit 7d5145d8eb2b9791533ffe4dc003b129b9696c48 ] Signed-off-by: Matthew Daley Reviewed-by: Konrad Rzeszutek Wilk Acked-by: Ian Campbell Acked-by: Jan Beulich S

[PATCH 21/86] via-rhine: Fix bugs in NAPI support.

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit 559bcac35facfed49ab4f408e162971612dcfdf3 ] 1) rhine_tx() should use dev_kfree_skb() not dev_kfree_skb_irq() 2) rhine_slow_event_task's NAPI triggering l

[PATCH 19/86] pktgen: correctly handle failures when adding a device

2013-03-26 Thread Steven Rostedt
3.6.11.1 stable review patch. If anyone has any objections, please let me know. -- From: Cong Wang [ Upstream commit 604dfd6efc9b79bce432f2394791708d8e8f6efc ] The return value of pktgen_add_device() is not checked, so even if we fail to add some device, for example, non-exist

  1   2   3   4   5   6   7   8   9   10   >