Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Commits on Apr 2, 2010
  1. Merge remote branch 'tuxonice-2.6.33'

    Oleksandr Natalenko authored
  2. fix merge conflict

    Oleksandr Natalenko authored
  3. version-2.6.33: bump to v2.6.33-pf1

    Oleksandr Natalenko authored
  4. fix merge conflict

    Oleksandr Natalenko authored
  5. @NigelCunningham
Commits on Apr 1, 2010
  1. @gregkh

    Linux 2.6.33.2

    gregkh authored
  2. @gregkh

    pata_via: fix VT6410/6415/6330 detection issue

    JosephChan@via.com.tw authored gregkh committed
    commit bc8a673 upstream.
    
    When using VT6410/6415/6330 chips on some VIA's platforms, the HDD
    connection to VT6410/6415/6330 cannot be detected.
    
    It is because the driver detects wrong via_isa_bridge ID, and then
    causes this issue to happen.
    
    Signed-off-by: Joseph Chan <josephchan@via.com.tw>
    Signed-off-by: Jeff Garzik <jgarzik@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  3. @gregkh

    GFS2: Skip check for mandatory locks when unlocking

    Sachin Prabhu authored gregkh committed
    commit 720e774 upstream.
    
    gfs2_lock() will skip locks on file which have mode set to 02666. This is a problem in cases where the mode of the file is changed after a process has obtained a lock on the file. Such a lock will be skipped and will result in a BUG in locks_remove_flock().
    
    gfs2_lock() should skip the check for mandatory locks when unlocking a file.
    
    Signed-off-by: Sachin Prabhu <sprabhu@redhat.com>
    Signed-off-by: Steven Whitehouse <swhiteho@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  4. @gregkh

    classmate-laptop: use a single MODULE_DEVICE_TABLE to get correct ali…

    Thadeu Lima de Souza Cascardo authored gregkh committed
    …ases
    
    commit 02e77a5 upstream.
    
    Instead of a MODULE_DEVICE_TABLE for every acpi_driver ids table, we
    create a table containing all ids to export to get a module alias for
    each one.
    
    This will fix automatic loading of the driver when one of the ACPI
    devices is not present (like the accelerometer, which is not present in
    some models).
    
    Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@holoscopio.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  5. @gregkh

    x86: Fix sched_clock_cpu for systems with unsynchronized TSC

    Dimitri Sivanich authored gregkh committed
    commit 14be1f7 upstream.
    
    On UV systems, the TSC is not synchronized across blades.  The
    sched_clock_cpu() function is returning values that can go
    backwards  (I've seen as much as 8 seconds) when switching
    between cpus.
    
    As each cpu comes up, early_init_intel() will currently set the
    sched_clock_stable flag true.  When mark_tsc_unstable() runs, it
    clears the flag, but this only occurs once (the first time a cpu
    comes up whose TSC is not synchronized with cpu 0).  After this,
    early_init_intel() will set the flag again as the next cpu comes
    up.
    
    Only set sched_clock_stable if tsc has not been marked unstable.
    
    Signed-off-by: Dimitri Sivanich <sivanich@sgi.com>
    Acked-by: Venkatesh Pallipadi <venkatesh.pallipadi@intel.com>
    Acked-by: Peter Zijlstra <a.p.zijlstra@chello.nl>
    LKML-Reference: <20100301174815.GC8224@sgi.com>
    Signed-off-by: Ingo Molnar <mingo@elte.hu>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  6. @gregkh

    b43: Workaround circular locking in hw-tkip key update callback

    Michael Buesch authored gregkh committed
    commit 96869a3 upstream
    
    The TKIP key update callback is called from the RX path, where the driver
    mutex is already locked. This results in a circular locking bug.
    Avoid this by removing the lock.
    
    Johannes noted that there is a separate bug: The callback still breaks on SDIO
    hardware, because SDIO hardware access needs to sleep, but we are not allowed
    to sleep in the callback due to mac80211's RCU locking.
    
    Signed-off-by: Michael Buesch <mb@bu3sch.de>
    Tested-by: Larry Finger <Larry.Finger@lwfinger.net>
    Reported-by: kecsa@kutfo.hit.bme.hu
    Cc: Johannes Berg <johannes@sipsolutions.net>
    Signed-off-by: John W. Linville <linville@tuxdriver.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  7. @gregkh

    Bluetooth: Fix kernel crash on L2CAP stress tests

    Andrei Emeltchenko authored gregkh committed
    commit c2c77ec upstream.
    
    Added very simple check that req buffer has enough space to
    fit configuration parameters. Shall be enough to reject packets
    with configuration size more than req buffer.
    
    Crash trace below
    
    [ 6069.659393] Unable to handle kernel paging request at virtual address 02000205
    [ 6069.673034] Internal error: Oops: 805 [#1] PREEMPT
    ...
    [ 6069.727172] PC is at l2cap_add_conf_opt+0x70/0xf0 [l2cap]
    [ 6069.732604] LR is at l2cap_recv_frame+0x1350/0x2e78 [l2cap]
    ...
    [ 6070.030303] Backtrace:
    [ 6070.032806] [<bf1c2880>] (l2cap_add_conf_opt+0x0/0xf0 [l2cap]) from
    [<bf1c6624>] (l2cap_recv_frame+0x1350/0x2e78 [l2cap])
    [ 6070.043823]  r8:dc5d3100 r7:df2a91d6 r6:00000001 r5:df2a8000 r4:00000200
    [ 6070.050659] [<bf1c52d4>] (l2cap_recv_frame+0x0/0x2e78 [l2cap]) from
    [<bf1c8408>] (l2cap_recv_acldata+0x2bc/0x350 [l2cap])
    [ 6070.061798] [<bf1c814c>] (l2cap_recv_acldata+0x0/0x350 [l2cap]) from
    [<bf0037a4>] (hci_rx_task+0x244/0x478 [bluetooth])
    [ 6070.072631]  r6:dc647700 r5:00000001 r4:df2ab740
    [ 6070.077362] [<bf003560>] (hci_rx_task+0x0/0x478 [bluetooth]) from
    [<c006b9fc>] (tasklet_action+0x78/0xd8)
    [ 6070.087005] [<c006b984>] (tasklet_action+0x0/0xd8) from [<c006c160>]
    
    Signed-off-by: Andrei Emeltchenko <andrei.emeltchenko@nokia.com>
    Acked-by: Gustavo F. Padovan <gustavo@padovan.org>
    Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  8. @holtmann @gregkh

    Bluetooth: Fix potential bad memory access with sysfs files

    holtmann authored gregkh committed
    commit 101545f upstream.
    
    When creating a high number of Bluetooth sockets (L2CAP, SCO
    and RFCOMM) it is possible to scribble repeatedly on arbitrary
    pages of memory. Ensure that the content of these sysfs files is
    always less than one page. Even if this means truncating. The
    files in question are scheduled to be moved over to debugfs in
    the future anyway.
    
    Based on initial patches from Neil Brown and Linus Torvalds
    
    Reported-by: Neil Brown <neilb@suse.de>
    Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  9. @gregkh

    ahci: use BIOS date in broken_suspend list

    Tejun Heo authored gregkh committed
    commit 9deb343 upstream.
    
    HP is recycling both DMI_PRODUCT_NAME and DMI_BIOS_VERSION making
    ahci_broken_suspend() trigger for later products which are not
    affected by the original problems.  Match BIOS date instead of version
    and add references to bko's so that full information can be found
    easier later.
    
    This fixes http://bugzilla.kernel.org/show_bug.cgi?id=15462
    
    Signed-off-by: Tejun Heo <tj@kernel.org>
    Reported-by: tigerfishdaisy@gmail.com
    Signed-off-by: Jeff Garzik <jgarzik@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  10. @jankara @gregkh

    quota: Fix warning when a delayed write happens before quota is enabled

    jankara authored gregkh committed
    commit 0a5a9c7 upstream.
    
    If a delayed-allocation write happens before quota is enabled, the
    kernel spits out a warning:
    WARNING: at fs/quota/dquot.c:988 dquot_claim_space+0x77/0x112()
    
    because the fact that user has some delayed allocation is not recorded
    in quota structure.
    
    Make dquot_initialize() update amount of reserved space for user if it sees
    inode has some space reserved. Also make sure that reserved quota space does
    not go negative and we warn about the filesystem bug just once.
    
    Signed-off-by: Jan Kara <jack@suse.cz>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  11. @dmonakhov @gregkh

    quota: manage reserved space when quota is not active [v2]

    dmonakhov authored gregkh committed
    commit c469070 upstream.
    
    Since we implemented generic reserved space management interface,
    then it is possible to account reserved space even when quota
    is not active (similar to i_blocks/i_bytes).
    
    Without this patch following testcase result in massive comlain from
    WARN_ON in dquot_claim_space()
    
    TEST_CASE:
    mount /dev/sdb /mnt -oquota
    dd if=/dev/zero of=/mnt/test bs=1M count=1
    quotaon /mnt
    # fs_reserved_spave == 1Mb
    # quota_reserved_space == 0, because quota was disabled
    dd if=/dev/zero of=/mnt/test seek=1 bs=1M count=1
    # fs_reserved_spave == 2Mb
    # quota_reserved_space == 1Mb
    sync  # ->dquot_claim_space() -> WARN_ON
    
    Signed-off-by: Dmitry Monakhov <dmonakhov@openvz.org>
    Signed-off-by: Jan Kara <jack@suse.cz>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  12. @gregkh

    tcp: Fix tcp_make_synack()

    Eric Dumazet authored gregkh committed
    [ Upstream commit 28b2774 ]
    
    Commit 4957faa (TCPCT part 1g: Responder Cookie => Initiator), part
    of TCP_COOKIE_TRANSACTION implementation, forgot to correctly size
    synack skb in case user data must be included.
    
    Many thanks to Mika Pentillä for spotting this error.
    
    Reported-by: Penttillä Mika <mika.penttila@ixonos.com>
    Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  13. @gregkh

    tcp: Fix OOB POLLIN avoidance.

    Alexandra Kossovsky authored gregkh committed
    [ Upstream commit b634f87 ]
    
    From: Alexandra.Kossovsky@oktetlabs.ru
    
    Fixes kernel bugzilla #15541
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  14. @gregkh

    tcp: Fix tcp_mark_head_lost() with packets == 0

    Lennart Schulte authored gregkh committed
    [ Upstream commit 6830c25 ]
    
    A packet is marked as lost in case packets == 0, although nothing should be done.
    This results in a too early retransmitted packet during recovery in some cases.
    This small patch fixes this issue by returning immediately.
    
    Signed-off-by: Lennart Schulte <lennart.schulte@nets.rwth-aachen.de>
    Signed-off-by: Arnd Hannemann <hannemann@nets.rwth-aachen.de>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  15. @gregkh

    skbuff: remove unused dma_head & dma_maps fields

    Alexander Duyck authored gregkh committed
    [ Upstream commit 03e6d81 ]
    
    The dma map fields in the skb_shared_info structure no longer has any users
    and can be dropped since it is making the skb_shared_info unecessarily larger.
    
    Running slabtop show that we were using 4K slabs for the skb->head on x86_64 w/
    an allocation size of 1522.  It turns out that the dma_head and dma_maps array
    made skb_shared large enough that we had crossed over the 2k boundary with
    standard frames and as such we were using 4k blocks of memory for all skbs.
    
    Signed-off-by: Alexander Duyck <alexander.h.duyck@intel.com>
    Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
    Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  16. @gregkh

    net: Potential null skb->dev dereference

    Eric Dumazet authored gregkh committed
    [ Upstream commit 0641e4f ]
    
    When doing "ifenslave -d bond0 eth0", there is chance to get NULL
    dereference in netif_receive_skb(), because dev->master suddenly becomes
    NULL after we tested it.
    
    We should use ACCESS_ONCE() to avoid this (or rcu_dereference())
    
    Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  17. @gregkh

    r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)

    Neil Horman authored gregkh committed
    [ Upstream commit c0cd884 ]
    
    Official patch to fix the r8169 frame length check error.
    
    Based on this initial thread:
    http://marc.info/?l=linux-netdev&m=126202972828626&w=1
    This is the official patch to fix the frame length problems in the r8169
    driver.  As noted in the previous thread, while this patch incurs a performance
    hit on the driver, its possible to improve performance dynamically by updating
    the mtu and rx_copybreak values at runtime to return performance to what it was
    for those NICS which are unaffected by the ideosyncracy (if there are any).
    
    Summary:
    
        A while back Eric submitted a patch for r8169 in which the proper
    allocated frame size was written to RXMaxSize to prevent the NIC from dmaing too
    much data.  This was done in commit fdd7b4c.  A
    long time prior to that however, Francois posted
    126fa4b, which expiclitly disabled the MaxSize
    setting due to the fact that the hardware behaved in odd ways when overlong
    frames were received on NIC's supported by this driver.  This was mentioned in a
    security conference recently:
    http://events.ccc.de/congress/2009/Fahrplan//events/3596.en.html
    
    It seems that if we can't enable frame size filtering, then, as Eric correctly
    noticed, we can find ourselves DMA-ing too much data to a buffer, causing
    corruption.  As a result is seems that we are forced to allocate a frame which
    is ready to handle a maximally sized receive.
    
    This obviously has performance issues with it, so to mitigate that issue, this
    patch does two things:
    
    1) Raises the copybreak value to the frame allocation size, which should force
    appropriately sized packets to get allocated on rx, rather than a full new 16k
    buffer.
    
    2) This patch only disables frame filtering initially (i.e., during the NIC
    open), changing the MTU results in ring buffer allocation of a size in relation
    to the new mtu (along with a warning indicating that this is dangerous).
    
    Because of item (2), individuals who can't cope with the performance hit (or can
    otherwise filter frames to prevent the bug), or who have hardware they are sure
    is unaffected by this issue, can manually lower the copybreak and reset the mtu
    such that performance is restored easily.
    
    Signed-off-by: Neil Horman <nhorman@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  18. @gregkh

    netlink: fix unaligned access in nla_get_be64()

    Pablo Neira Ayuso authored gregkh committed
    [ Upstream commit f5d410f ]
    
    This patch fixes a unaligned access in nla_get_be64() that was
    introduced by myself in a17c859.
    
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  19. @gregkh

    netfilter: ctnetlink: fix reliable event delivery if message building…

    Pablo Neira Ayuso authored gregkh committed
    … fails
    
    [ Upstream commit 37b7ef7 ]
    
    This patch fixes a bug that allows to lose events when reliable
    event delivery mode is used, ie. if NETLINK_BROADCAST_SEND_ERROR
    and NETLINK_RECV_NO_ENOBUFS socket options are set.
    
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  20. @gregkh

    netlink: fix NETLINK_RECV_NO_ENOBUFS in netlink_set_err()

    Pablo Neira Ayuso authored gregkh committed
    [ Upstream commit 1a50307 ]
    
    Currently, ENOBUFS errors are reported to the socket via
    netlink_set_err() even if NETLINK_RECV_NO_ENOBUFS is set. However,
    that should not happen. This fixes this problem and it changes the
    prototype of netlink_set_err() to return the number of sockets that
    have set the NETLINK_RECV_NO_ENOBUFS socket option. This return
    value is used in the next patch in these bugfix series.
    
    Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  21. @smagnani @gregkh

    NET_DMA: free skbs periodically

    smagnani authored gregkh committed
    [ Upstream commit 73852e8 ]
    
    Under NET_DMA, data transfer can grind to a halt when userland issues a
    large read on a socket with a high RCVLOWAT (i.e., 512 KB for both).
    This appears to be because the NET_DMA design queues up lots of memcpy
    operations, but doesn't issue or wait for them (and thus free the
    associated skbs) until it is time for tcp_recvmesg() to return.
    The socket hangs when its TCP window goes to zero before enough data is
    available to satisfy the read.
    
    Periodically issue asynchronous memcpy operations, and free skbs for ones
    that have completed, to prevent sockets from going into zero-window mode.
    
    Signed-off-by: Steven J. Magnani <steve@digidescorp.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  22. @gregkh

    ipv6: Don't drop cache route entry unless timer actually expired.

    YOSHIFUJI Hideaki / 吉藤英明 authored gregkh committed
    [ Upstream commit 54c1a85 ]
    
    This is ipv6 variant of the commit 5e016cb.. ("ipv4: Don't drop
    redirected route cache entry unless PTMU actually expired")
    by Guenter Roeck <guenter.roeck@ericsson.com>.
    
    Remove cache route entry in ipv6_negative_advice() only if
    the timer is expired.
    
    Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  23. @gregkh

    ipv4: Don't drop redirected route cache entry unless PTMU actually ex…

    Guenter Roeck authored gregkh committed
    …pired
    
    [ Upstream commit 5e016cb ]
    
    TCP sessions over IPv4 can get stuck if routers between endpoints
    do not fragment packets but implement PMTU instead, and we are using
    those routers because of an ICMP redirect.
    
    Setup is as follows
    
           MTU1    MTU2   MTU1
        A--------B------C------D
    
    with MTU1 > MTU2. A and D are endpoints, B and C are routers. B and C
    implement PMTU and drop packets larger than MTU2 (for example because
    DF is set on all packets). TCP sessions are initiated between A and D.
    There is packet loss between A and D, causing frequent TCP
    retransmits.
    
    After the number of retransmits on a TCP session reaches tcp_retries1,
    tcp calls dst_negative_advice() prior to each retransmit. This results
    in route cache entries for the peer to be deleted in
    ipv4_negative_advice() if the Path MTU is set.
    
    If the outstanding data on an affected TCP session is larger than
    MTU2, packets sent from the endpoints will be dropped by B or C, and
    ICMP NEEDFRAG will be returned. A and D receive NEEDFRAG messages and
    update PMTU.
    
    Before the next retransmit, tcp will again call dst_negative_advice(),
    causing the route cache entry (with correct PMTU) to be deleted. The
    retransmitted packet will be larger than MTU2, causing it to be
    dropped again.
    
    This sequence repeats until the TCP session aborts or is terminated.
    
    Problem is fixed by removing redirected route cache entries in
    ipv4_negative_advice() only if the PMTU is expired.
    
    Signed-off-by: Guenter Roeck <guenter.roeck@ericsson.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  24. @fabled @gregkh

    ipv4: check rt_genid in dst_check

    fabled authored gregkh committed
    [ Upstream commit d11a4dc ]
    
    Xfrm_dst keeps a reference to ipv4 rtable entries on each
    cached bundle. The only way to renew xfrm_dst when the underlying
    route has changed, is to implement dst_check for this. This is
    what ipv6 side does too.
    
    The problems started after 87c1e12
    ("ipsec: Fix bogus bundle flowi") which fixed a bug causing xfrm_dst
    to not get reused, until that all lookups always generated new
    xfrm_dst with new route reference and path mtu worked. But after the
    fix, the old routes started to get reused even after they were expired
    causing pmtu to break (well it would occationally work if the rtable
    gc had run recently and marked the route obsolete causing dst_check to
    get called).
    
    Signed-off-by: Timo Teras <timo.teras@iki.fi>
    Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  25. @herbertx @gregkh

    ipsec: Fix bogus bundle flowi

    herbertx authored gregkh committed
    [ Upstream commit 87c1e12 ]
    
    When I merged the bundle creation code, I introduced a bogus
    flowi value in the bundle.  Instead of getting from the caller,
    it was instead set to the flow in the route object, which is
    totally different.
    
    The end result is that the bundles we created never match, and
    we instead end up with an ever growing bundle list.
    
    Thanks to Jamal for find this problem.
    
    Reported-by: Jamal Hadi Salim <hadi@cyberus.ca>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
    Acked-by: Steffen Klassert <steffen.klassert@secunet.com>
    Acked-by: Jamal Hadi Salim <hadi@cyberus.ca>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  26. @fabled @gregkh

    ip_gre: include route header_len in max_headroom calculation

    fabled authored gregkh committed
    [ Upstream commit 243aad8 ]
    
    Taking route's header_len into account, and updating gre device
    needed_headroom will give better hints on upper bound of required
    headroom. This is useful if the gre traffic is xfrm'ed.
    
    Signed-off-by: Timo Teras <timo.teras@iki.fi>
    Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  27. @davem330 @gregkh

    e100: Fix ring parameter change handling regression.

    davem330 authored gregkh committed
    [ Upstream commit 211a0d9 ]
    
    When the PCI pool changes were added to fix resume failures:
    
    commit 98468ef
    e100: Use pci pool to work around GFP_ATOMIC order 5 memory allocation failu
    
    and
    
    commit 70abc8c
    e100: Fix broken cbs accounting due to missing memset.
    
    This introduced a problem that can happen if the TX ring size
    is increased.  We need to size the PCI pool using cbs->max
    instead of the default cbs->count value.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  28. @kaber @gregkh

    bonding: fix device leak on error in bond_create()

    kaber authored gregkh committed
    [ Upstream commit 8d6184e ]
    
    When the register_netdevice() call fails, the newly allocated device is
    not freed.
    
    Signed-off-by: Patrick McHardy <kaber@trash.net>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  29. @gregkh

    net: add __must_check to sk_add_backlog

    Zhu Yi authored gregkh committed
    [ Upstream commit 4045635 ]
    
    Add the "__must_check" tag to sk_add_backlog() so that any failure to
    check and drop packets will be warned about.
    
    Signed-off-by: Zhu Yi <yi.zhu@intel.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
  30. @gregkh

    net: backlog functions rename

    Zhu Yi authored gregkh committed
    [ Upstream commit a3a858f ]
    
    sk_add_backlog -> __sk_add_backlog
    sk_add_backlog_limited -> sk_add_backlog
    
    Signed-off-by: Zhu Yi <yi.zhu@intel.com>
    Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Something went wrong with that request. Please try again.