~ubuntu-kernel/ubuntu/+source/linux/+git/raring:master

Last commit made on 2013-12-02
Get this branch:
git clone -b master https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/raring
Members of Ubuntu Kernel Repositories can upload to this branch. Log in for directions.

Branch merges

Branch information

Recent commits

34d2a63... by Steve Conklin

UBUNTU: Ubuntu-3.8.0-35.50

Signed-off-by: Steve Conklin <email address hidden>

38bdfd2... by Kamal Mostafa

Linux 3.8.13.13

BugLink: http://bugs.launchpad.net/bugs/1257026

Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

5e02d25... by David Vrabel

xen-netback: transition to CLOSED when removing a VIF

BugLink: http://bugs.launchpad.net/bugs/1257026

commit dc62ccaccfb139d9b04bbc5a2688a4402adbfab3 upstream.

If a guest is destroyed without transitioning its frontend to CLOSED,
the domain becomes a zombie as netback was not grant unmapping the
shared rings.

When removing a VIF, transition the backend to CLOSED so the VIF is
disconnected if necessary (which will unmap the shared rings etc).

This fixes a regression introduced by
279f438e36c0a70b23b86d2090aeec50155034a9 (xen-netback: Don't destroy
the netdev until the vif is shut down).

Signed-off-by: David Vrabel <email address hidden>
Cc: Ian Campbell <email address hidden>
Cc: Wei Liu <email address hidden>
Cc: Paul Durrant <email address hidden>
Acked-by: Wei Liu <email address hidden>
Reviewed-by: Paul Durrant <email address hidden>
Signed-off-by: David S. Miller <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

674eab3... by Paul Durrant <email address hidden>

xen-netback: Handle backend state transitions in a more robust way

BugLink: http://bugs.launchpad.net/bugs/1257026

commit ea732dff5cfa10789007bf4a5b935388a0bb2a8f upstream.

When the frontend state changes netback now specifies its desired state to
a new function, set_backend_state(), which transitions through any
necessary intermediate states.
This fixes an issue observed with some old Windows frontend drivers where
they failed to transition through the Closing state and netback would not
behave correctly.

Signed-off-by: Paul Durrant <email address hidden>
Cc: Ian Campbell <email address hidden>
Cc: Wei Liu <email address hidden>
Cc: David Vrabel <email address hidden>
Acked-by: Ian Campbell <email address hidden>
Signed-off-by: David S. Miller <email address hidden>
[ kamal: backport to 3.8 (context); prereq for
  dc62ccaccfb1 "xen-netback: transition to CLOSED when removing a VIF" ]
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

138de10... by Ming Lei

scripts/kallsyms: filter symbols not in kernel address space

BugLink: http://bugs.launchpad.net/bugs/1257026

commit f6537f2f0eba4eba3354e48dbe3047db6d8b6254 upstream.

This patch uses CONFIG_PAGE_OFFSET to filter symbols which
are not in kernel address space because these symbols are
generally for generating code purpose and can't be run at
kernel mode, so we needn't keep them in /proc/kallsyms.

For example, on ARM there are some symbols which may be
linked in relocatable code section, then perf can't parse
symbols any more from /proc/kallsyms, this patch fixes the
problem (introduced b9b32bf70f2fb710b07c94e13afbc729afe221da)

Cc: Russell King <email address hidden>
Cc: <email address hidden>
Cc: Michal Marek <email address hidden>
Signed-off-by: Ming Lei <email address hidden>
Signed-off-by: Rusty Russell <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

ae171da... by Ming Lei

lib/scatterlist.c: don't flush_kernel_dcache_page on slab page

BugLink: http://bugs.launchpad.net/bugs/1257026

commit 3d77b50c5874b7e923be946ba793644f82336b75 upstream.

Commit b1adaf65ba03 ("[SCSI] block: add sg buffer copy helper
functions") introduces two sg buffer copy helpers, and calls
flush_kernel_dcache_page() on pages in SG list after these pages are
written to.

Unfortunately, the commit may introduce a potential bug:

 - Before sending some SCSI commands, kmalloc() buffer may be passed to
   block layper, so flush_kernel_dcache_page() can see a slab page
   finally

 - According to cachetlb.txt, flush_kernel_dcache_page() is only called
   on "a user page", which surely can't be a slab page.

 - ARCH's implementation of flush_kernel_dcache_page() may use page
   mapping information to do optimization so page_mapping() will see the
   slab page, then VM_BUG_ON() is triggered.

Aaro Koskinen reported the bug on ARM/kirkwood when DEBUG_VM is enabled,
and this patch fixes the bug by adding test of '!PageSlab(miter->page)'
before calling flush_kernel_dcache_page().

Signed-off-by: Ming Lei <email address hidden>
Reported-by: Aaro Koskinen <email address hidden>
Tested-by: Simon Baatz <email address hidden>
Cc: Russell King - ARM Linux <email address hidden>
Cc: Will Deacon <email address hidden>
Cc: Aaro Koskinen <email address hidden>
Acked-by: Catalin Marinas <email address hidden>
Cc: FUJITA Tomonori <email address hidden>
Cc: Tejun Heo <email address hidden>
Cc: "James E.J. Bottomley" <email address hidden>
Cc: Jens Axboe <email address hidden>
Signed-off-by: Andrew Morton <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

fc78b0d... by Russell King <email address hidden>

ALSA: fix oops in snd_pcm_info() caused by ASoC DPCM

BugLink: http://bugs.launchpad.net/bugs/1257026

commit a4461f41b94cb52e0141af717dcf4ef6558c8e2e upstream.

Unable to handle kernel NULL pointer dereference at virtual address 00000008
pgd = d5300000
[00000008] *pgd=0d265831, *pte=00000000, *ppte=00000000
Internal error: Oops: 17 [#1] PREEMPT ARM
CPU: 0 PID: 2295 Comm: vlc Not tainted 3.11.0+ #755
task: dee74800 ti: e213c000 task.ti: e213c000
PC is at snd_pcm_info+0xc8/0xd8
LR is at 0x30232065
pc : [<c031b52c>] lr : [<30232065>] psr: a0070013
sp : e213dea8 ip : d81cb0d0 fp : c05f7678
r10: c05f7770 r9 : fffffdfd r8 : 00000000
r7 : d8a968a8 r6 : d8a96800 r5 : d8a96200 r4 : d81cb000
r3 : 00000000 r2 : d81cb000 r1 : 00000001 r0 : d8a96200
Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
Control: 10c5387d Table: 15300019 DAC: 00000015
Process vlc (pid: 2295, stack limit = 0xe213c248)
[<c031b52c>] (snd_pcm_info) from [<c031b570>] (snd_pcm_info_user+0x34/0x9c)
[<c031b570>] (snd_pcm_info_user) from [<c03164a4>] (snd_pcm_control_ioctl+0x274/0x280)
[<c03164a4>] (snd_pcm_control_ioctl) from [<c0311458>] (snd_ctl_ioctl+0xc0/0x55c)
[<c0311458>] (snd_ctl_ioctl) from [<c00eca84>] (do_vfs_ioctl+0x80/0x31c)
[<c00eca84>] (do_vfs_ioctl) from [<c00ecd5c>] (SyS_ioctl+0x3c/0x60)
[<c00ecd5c>] (SyS_ioctl) from [<c000e500>] (ret_fast_syscall+0x0/0x48)
Code: e1a00005 e59530dc e3a01001 e1a02004 (e5933008)
---[ end trace cb3d9bdb8dfefb3c ]---

This is provoked when the ASoC front end is open along with its backend,
(which causes the backend to have a runtime assigned to it) and then the
SNDRV_CTL_IOCTL_PCM_INFO is requested for the (visible) backend device.

Resolve this by ensuring that ASoC internal backend devices are not
visible to userspace, just as the commentry for snd_pcm_new_internal()
says it should be.

Signed-off-by: Russell King <email address hidden>
Acked-by: Mark Brown <email address hidden>
Signed-off-by: Takashi Iwai <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

2525c7d... by Dan Carpenter <email address hidden>

Staging: sb105x: info leak in mp_get_count()

BugLink: http://bugs.launchpad.net/bugs/1257026

commit a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 upstream.

The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.

Reported-by: Nico Golde <email address hidden>
Reported-by: Fabian Yamaguchi <email address hidden>
Signed-off-by: Dan Carpenter <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

fc27cde... by Dan Carpenter <email address hidden>

Staging: bcm: info leak in ioctl

BugLink: http://bugs.launchpad.net/bugs/1257026

commit 8d1e72250c847fa96498ec029891de4dc638a5ba upstream.

The DevInfo.u32Reserved[] array isn't initialized so it leaks kernel
information to user space.

Reported-by: Nico Golde <email address hidden>
Reported-by: Fabian Yamaguchi <email address hidden>
Signed-off-by: Dan Carpenter <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>

fecd92d... by Dan Carpenter <email address hidden>

staging: wlags49_h2: buffer overflow setting station name

BugLink: http://bugs.launchpad.net/bugs/1257026

commit b5e2f339865fb443107e5b10603e53bbc92dc054 upstream.

We need to check the length parameter before doing the memcpy(). I've
actually changed it to strlcpy() as well so that it's NUL terminated.

You need CAP_NET_ADMIN to trigger these so it's not the end of the
world.

Reported-by: Nico Golde <email address hidden>
Reported-by: Fabian Yamaguchi <email address hidden>
Signed-off-by: Dan Carpenter <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>
[ kamal: backport to 3.8 (context) ]
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Brad Figg <email address hidden>