1. 09 Jul, 2014 34 commits
  2. 07 Jul, 2014 6 commits
    • Greg Kroah-Hartman's avatar
      Linux 3.10.47 · 75dca413
      Greg Kroah-Hartman authored
      75dca413
    • Oleg Nesterov's avatar
      tracing: Fix syscall_*regfunc() vs copy_process() race · e6bc60b8
      Oleg Nesterov authored
      commit 4af4206b upstream.
      
      syscall_regfunc() and syscall_unregfunc() should set/clear
      TIF_SYSCALL_TRACEPOINT system-wide, but do_each_thread() can race
      with copy_process() and miss the new child which was not added to
      the process/thread lists yet.
      
      Change copy_process() to update the child's TIF_SYSCALL_TRACEPOINT
      under tasklist.
      
      Link: http://lkml.kernel.org/p/20140413185854.GB20668@redhat.com
      
      Fixes: a871bd33 "tracing: Add syscall tracepoints"
      Acked-by: default avatarFrederic Weisbecker <fweisbec@gmail.com>
      Acked-by: default avatarPaul E. McKenney <paulmck@linux.vnet.ibm.com>
      Signed-off-by: default avatarOleg Nesterov <oleg@redhat.com>
      Signed-off-by: default avatarSteven Rostedt <rostedt@goodmis.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      e6bc60b8
    • Steven Rostedt (Red Hat)'s avatar
      tracing: Try again for saved cmdline if failed due to locking · c5bce736
      Steven Rostedt (Red Hat) authored
      commit 379cfdac upstream.
      
      In order to prevent the saved cmdline cache from being filled when
      tracing is not active, the comms are only recorded after a trace event
      is recorded.
      
      The problem is, a comm can fail to be recorded if the trace_cmdline_lock
      is held. That lock is taken via a trylock to allow it to happen from
      any context (including NMI). If the lock fails to be taken, the comm
      is skipped. No big deal, as we will try again later.
      
      But! Because of the code that was added to only record after an event,
      we may not try again later as the recording is made as a oneshot per
      event per CPU.
      
      Only disable the recording of the comm if the comm is actually recorded.
      
      Fixes: 7ffbd48d "tracing: Cache comms only after an event occurred"
      Signed-off-by: default avatarSteven Rostedt <rostedt@goodmis.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      c5bce736
    • Jacob Keller's avatar
      Documentation/SubmittingPatches: describe the Fixes: tag · a5e309fe
      Jacob Keller authored
      commit 8401aa1f upstream.
      
      Update the SubmittingPatches process to include howto about the new
      'Fixes:' tag to be used when a patch fixes an issue in a previous commit
      (found by git-bisect for example).
      Signed-off-by: default avatarJacob Keller <jacob.e.keller@intel.com>
      Tested-by: default avatarAaron Brown <aaron.f.brown@intel.com>
      Signed-off-by: default avatarJeff Kirsher <jeffrey.t.kirsher@intel.com>
      Cc: Randy Dunlap <rdunlap@infradead.org>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      a5e309fe
    • Mathias Krause's avatar
      netfilter: ipt_ULOG: fix info leaks · 3ca69683
      Mathias Krause authored
      commit 278f2b3e upstream.
      
      The ulog messages leak heap bytes by the means of padding bytes and
      incompletely filled string arrays. Fix those by memset(0)'ing the
      whole struct before filling it.
      Signed-off-by: default avatarMathias Krause <minipli@googlemail.com>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      Cc: Jan Tore Morken <jantore@morken.priv.no>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      3ca69683
    • Krzysztof Kozlowski's avatar
      extcon: max77693: Fix two NULL pointer exceptions on missing pdata · a50ea099
      Krzysztof Kozlowski authored
      commit d5653f2b upstream.
      
      Fix NULL pointer exceptions when platform data is not supplied.
      
      Trace of one exception:
      Unable to handle kernel NULL pointer dereference at virtual address 00000008
      pgd = c0004000
      [00000008] *pgd=00000000
      Internal error: Oops: 5 [#1] PREEMPT SMP ARM
      Modules linked in:
      CPU: 2 PID: 1 Comm: swapper/0 Not tainted 3.14.0-12045-gead5dd4687a6-dirty #1628
      task: eea80000 ti: eea88000 task.ti: eea88000
      PC is at max77693_muic_probe+0x27c/0x528
      LR is at regmap_write+0x50/0x60
      pc : [<c041d1c8>]    lr : [<c02eba60>]    psr: 20000113
      sp : eea89e38  ip : 00000000  fp : c098a834
      r10: ee1a5a10  r9 : 00000005  r8 : c098a83c
      r7 : 0000000a  r6 : c098a774  r5 : 00000005  r4 : eeb006d0
      r3 : c0697bd8  r2 : 00000000  r1 : 00000001  r0 : 00000000
      Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
      Control: 10c5387d  Table: 4000404a  DAC: 00000015
      Process swapper/0 (pid: 1, stack limit = 0xeea88240)
      Stack: (0xeea89e38 to 0xeea8a000)
      9e20:                                                       c08499fc eeb006d0
      9e40: 00000000 00000000 c0915f98 00000001 00000000 ee1a5a10 c098a730 c09a88b8
      9e60: 00000000 c098a730 c0915f98 00000000 00000000 c02d6aa0 c02d6a88 ee1a5a10
      9e80: c0a712c8 c02d54e4 00001204 c0628b00 ee1a5a10 c098a730 ee1a5a44 00000000
      9ea0: eea88000 c02d57b4 00000000 c098a730 c02d5728 c02d3a24 ee813e5c eeb9d534
      9ec0: c098a730 ee22f700 c097c720 c02d4b14 c08174ec c098a730 00000006 c098a730
      9ee0: 00000006 c092fd30 c09b8500 c02d5df8 00000000 c093cbb8 00000006 c0008928
      9f00: 000000c3 ef7fc785 00000000 ef7fc794 00000000 c08af968 00000072 eea89f30
      9f20: ef7fc85e c065f198 000000c3 c003e87c 00000003 00000000 c092fd3c 00000000
      9f40: c08af618 c0826d58 00000006 00000006 c0956f58 c093cbb8 00000006 c092fd30
      9f60: c09b8500 000000c3 c092fd3c c08e8510 00000000 c08e8bb0 00000006 00000006
      9f80: c08e8510 c0c0c0c0 00000000 c0628fac 00000000 00000000 00000000 00000000
      9fa0: 00000000 c0628fb4 00000000 c000f038 00000000 00000000 00000000 00000000
      9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 c0c0c0c0 c0c0c0c0
      [<c041d1c8>] (max77693_muic_probe) from [<c02d6aa0>] (platform_drv_probe+0x18/0x48)
      [<c02d6aa0>] (platform_drv_probe) from [<c02d54e4>] (driver_probe_device+0x140/0x384)
      [<c02d54e4>] (driver_probe_device) from [<c02d57b4>] (__driver_attach+0x8c/0x90)
      [<c02d57b4>] (__driver_attach) from [<c02d3a24>] (bus_for_each_dev+0x54/0x88)
      [<c02d3a24>] (bus_for_each_dev) from [<c02d4b14>] (bus_add_driver+0xe8/0x204)
      [<c02d4b14>] (bus_add_driver) from [<c02d5df8>] (driver_register+0x78/0xf4)
      [<c02d5df8>] (driver_register) from [<c0008928>] (do_one_initcall+0xc4/0x174)
      [<c0008928>] (do_one_initcall) from [<c08e8bb0>] (kernel_init_freeable+0xfc/0x1c8)
      [<c08e8bb0>] (kernel_init_freeable) from [<c0628fb4>] (kernel_init+0x8/0xec)
      [<c0628fb4>] (kernel_init) from [<c000f038>] (ret_from_fork+0x14/0x3c)
      Code: caffffe7 e59d200c e3550001 b3a05001 (e5923008)
      ---[ end trace 85db969ce011bde7 ]---
      Signed-off-by: default avatarKrzysztof Kozlowski <k.kozlowski@samsung.com>
      Fixes: 190d7cfcSigned-off-by: default avatarChanwoo Choi <cw00.choi@samsung.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      a50ea099