<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux-toradex.git/net, branch v3.2-rt10</title>
<subtitle>Linux kernel for Apalis and Colibri modules</subtitle>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/'/>
<entry>
<title>ping-sysrq.patch</title>
<updated>2012-01-16T19:00:35+00:00</updated>
<author>
<name>Carsten Emde</name>
<email>C.Emde@osadl.org</email>
</author>
<published>2011-07-19T12:51:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=591536db6504182d2104fedd5ccc347ec2660d96'/>
<id>591536db6504182d2104fedd5ccc347ec2660d96</id>
<content type='text'>
There are (probably rare) situations when a system crashed and the system
console becomes unresponsive but the network icmp layer still is alive.
Wouldn't it be wonderful, if we then could submit a sysreq command via ping?

This patch provides this facility. Please consult the updated documentation
Documentation/sysrq.txt for details.

Signed-off-by: Carsten Emde &lt;C.Emde@osadl.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
There are (probably rare) situations when a system crashed and the system
console becomes unresponsive but the network icmp layer still is alive.
Wouldn't it be wonderful, if we then could submit a sysreq command via ping?

This patch provides this facility. Please consult the updated documentation
Documentation/sysrq.txt for details.

Signed-off-by: Carsten Emde &lt;C.Emde@osadl.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>net: Avoid livelock in net_tx_action() on RT</title>
<updated>2012-01-16T19:00:35+00:00</updated>
<author>
<name>Steven Rostedt</name>
<email>srostedt@redhat.com</email>
</author>
<published>2011-10-06T14:48:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=bd240c24f8c2d9f37a1714f41184fff6f874f778'/>
<id>bd240c24f8c2d9f37a1714f41184fff6f874f778</id>
<content type='text'>
qdisc_lock is taken w/o disabling interrupts or bottom halfs. So code
holding a qdisc_lock() can be interrupted and softirqs can run on the
return of interrupt in !RT.

The spin_trylock() in net_tx_action() makes sure, that the softirq
does not deadlock. When the lock can't be acquired q is requeued and
the NET_TX softirq is raised. That causes the softirq to run over and
over.

That works in mainline as do_softirq() has a retry loop limit and
leaves the softirq processing in the interrupt return path and
schedules ksoftirqd. The task which holds qdisc_lock cannot be
preempted, so the lock is released and either ksoftirqd or the next
softirq in the return from interrupt path can proceed. Though it's a
bit strange to actually run MAX_SOFTIRQ_RESTART (10) loops before it
decides to bail out even if it's clear in the first iteration :)

On RT all softirq processing is done in a FIFO thread and we don't
have a loop limit, so ksoftirqd preempts the lock holder forever and
unqueues and requeues until the reset button is hit.

Due to the forced threading of ksoftirqd on RT we actually cannot
deadlock on qdisc_lock because it's a "sleeping lock". So it's safe to
replace the spin_trylock() with a spin_lock(). When contended,
ksoftirqd is scheduled out and the lock holder can proceed.

[ tglx: Massaged changelog and code comments ]

Solved-by: Thomas Gleixner &lt;tglx@linuxtronix.de&gt;
Signed-off-by: Steven Rostedt &lt;rostedt@goodmis.org&gt;
Tested-by: Carsten Emde &lt;cbe@osadl.org&gt;
Cc: Clark Williams &lt;williams@redhat.com&gt;
Cc: John Kacur &lt;jkacur@redhat.com&gt;
Cc: Luis Claudio R. Goncalves &lt;lclaudio@redhat.com&gt;
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
qdisc_lock is taken w/o disabling interrupts or bottom halfs. So code
holding a qdisc_lock() can be interrupted and softirqs can run on the
return of interrupt in !RT.

The spin_trylock() in net_tx_action() makes sure, that the softirq
does not deadlock. When the lock can't be acquired q is requeued and
the NET_TX softirq is raised. That causes the softirq to run over and
over.

That works in mainline as do_softirq() has a retry loop limit and
leaves the softirq processing in the interrupt return path and
schedules ksoftirqd. The task which holds qdisc_lock cannot be
preempted, so the lock is released and either ksoftirqd or the next
softirq in the return from interrupt path can proceed. Though it's a
bit strange to actually run MAX_SOFTIRQ_RESTART (10) loops before it
decides to bail out even if it's clear in the first iteration :)

On RT all softirq processing is done in a FIFO thread and we don't
have a loop limit, so ksoftirqd preempts the lock holder forever and
unqueues and requeues until the reset button is hit.

Due to the forced threading of ksoftirqd on RT we actually cannot
deadlock on qdisc_lock because it's a "sleeping lock". So it's safe to
replace the spin_trylock() with a spin_lock(). When contended,
ksoftirqd is scheduled out and the lock holder can proceed.

[ tglx: Massaged changelog and code comments ]

Solved-by: Thomas Gleixner &lt;tglx@linuxtronix.de&gt;
Signed-off-by: Steven Rostedt &lt;rostedt@goodmis.org&gt;
Tested-by: Carsten Emde &lt;cbe@osadl.org&gt;
Cc: Clark Williams &lt;williams@redhat.com&gt;
Cc: John Kacur &lt;jkacur@redhat.com&gt;
Cc: Luis Claudio R. Goncalves &lt;lclaudio@redhat.com&gt;
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>skbufhead-raw-lock.patch</title>
<updated>2012-01-16T19:00:33+00:00</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2011-07-12T13:38:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=420c862a20ec5b5963c10131f0abc88b6080b1e0'/>
<id>420c862a20ec5b5963c10131f0abc88b6080b1e0</id>
<content type='text'>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>net-netif_rx_ni-migrate-disable.patch</title>
<updated>2012-01-16T19:00:26+00:00</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2011-07-17T14:29:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=2994a83e7f75ad655e4fd3ce4ac9026821c9750e'/>
<id>2994a83e7f75ad655e4fd3ce4ac9026821c9750e</id>
<content type='text'>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>net-ipv4-route-use-locks-on-up-rt.patch</title>
<updated>2012-01-16T19:00:19+00:00</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2011-07-15T14:24:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=5bda3abd439784dfc40da88b535dd9f271296189'/>
<id>5bda3abd439784dfc40da88b535dd9f271296189</id>
<content type='text'>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>net-wireless-warn-nort.patch</title>
<updated>2012-01-16T19:00:15+00:00</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2011-07-21T19:05:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=48edaae756b196efe5534ff91f55a626512b9d3d'/>
<id>48edaae756b196efe5534ff91f55a626512b9d3d</id>
<content type='text'>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>softirq-thread-do-softirq.patch</title>
<updated>2012-01-16T19:00:10+00:00</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2011-06-28T13:44:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=4af2f75d1c44342510c37c3210aec526880eb045'/>
<id>4af2f75d1c44342510c37c3210aec526880eb045</id>
<content type='text'>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>net-flip-lock-dep-thingy.patch</title>
<updated>2012-01-16T19:00:10+00:00</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2011-06-28T08:59:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=7a249f1009a600943fa7a59af9e226ce15ea0625'/>
<id>7a249f1009a600943fa7a59af9e226ce15ea0625</id>
<content type='text'>
=======================================================
[ INFO: possible circular locking dependency detected ]
3.0.0-rc3+ #26
-------------------------------------------------------
ip/1104 is trying to acquire lock:
 (local_softirq_lock){+.+...}, at: [&lt;ffffffff81056d12&gt;] __local_lock+0x25/0x68

but task is already holding lock:
 (sk_lock-AF_INET){+.+...}, at: [&lt;ffffffff81433308&gt;] lock_sock+0x10/0x12

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-&gt; #1 (sk_lock-AF_INET){+.+...}:
       [&lt;ffffffff810836e5&gt;] lock_acquire+0x103/0x12e
       [&lt;ffffffff813e2781&gt;] lock_sock_nested+0x82/0x92
       [&lt;ffffffff81433308&gt;] lock_sock+0x10/0x12
       [&lt;ffffffff81433afa&gt;] tcp_close+0x1b/0x355
       [&lt;ffffffff81453c99&gt;] inet_release+0xc3/0xcd
       [&lt;ffffffff813dff3f&gt;] sock_release+0x1f/0x74
       [&lt;ffffffff813dffbb&gt;] sock_close+0x27/0x2b
       [&lt;ffffffff81129c63&gt;] fput+0x11d/0x1e3
       [&lt;ffffffff81126577&gt;] filp_close+0x70/0x7b
       [&lt;ffffffff8112667a&gt;] sys_close+0xf8/0x13d
       [&lt;ffffffff814ae882&gt;] system_call_fastpath+0x16/0x1b

-&gt; #0 (local_softirq_lock){+.+...}:
       [&lt;ffffffff81082ecc&gt;] __lock_acquire+0xacc/0xdc8
       [&lt;ffffffff810836e5&gt;] lock_acquire+0x103/0x12e
       [&lt;ffffffff814a7e40&gt;] _raw_spin_lock+0x3b/0x4a
       [&lt;ffffffff81056d12&gt;] __local_lock+0x25/0x68
       [&lt;ffffffff81056d8b&gt;] local_bh_disable+0x36/0x3b
       [&lt;ffffffff814a7fc4&gt;] _raw_write_lock_bh+0x16/0x4f
       [&lt;ffffffff81433c38&gt;] tcp_close+0x159/0x355
       [&lt;ffffffff81453c99&gt;] inet_release+0xc3/0xcd
       [&lt;ffffffff813dff3f&gt;] sock_release+0x1f/0x74
       [&lt;ffffffff813dffbb&gt;] sock_close+0x27/0x2b
       [&lt;ffffffff81129c63&gt;] fput+0x11d/0x1e3
       [&lt;ffffffff81126577&gt;] filp_close+0x70/0x7b
       [&lt;ffffffff8112667a&gt;] sys_close+0xf8/0x13d
       [&lt;ffffffff814ae882&gt;] system_call_fastpath+0x16/0x1b

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(sk_lock-AF_INET);
                               lock(local_softirq_lock);
                               lock(sk_lock-AF_INET);
  lock(local_softirq_lock);

 *** DEADLOCK ***

1 lock held by ip/1104:
 #0:  (sk_lock-AF_INET){+.+...}, at: [&lt;ffffffff81433308&gt;] lock_sock+0x10/0x12

stack backtrace:
Pid: 1104, comm: ip Not tainted 3.0.0-rc3+ #26
Call Trace:
 [&lt;ffffffff81081649&gt;] print_circular_bug+0x1f8/0x209
 [&lt;ffffffff81082ecc&gt;] __lock_acquire+0xacc/0xdc8
 [&lt;ffffffff81056d12&gt;] ? __local_lock+0x25/0x68
 [&lt;ffffffff810836e5&gt;] lock_acquire+0x103/0x12e
 [&lt;ffffffff81056d12&gt;] ? __local_lock+0x25/0x68
 [&lt;ffffffff81046c75&gt;] ? get_parent_ip+0x11/0x41
 [&lt;ffffffff814a7e40&gt;] _raw_spin_lock+0x3b/0x4a
 [&lt;ffffffff81056d12&gt;] ? __local_lock+0x25/0x68
 [&lt;ffffffff81046c8c&gt;] ? get_parent_ip+0x28/0x41
 [&lt;ffffffff81056d12&gt;] __local_lock+0x25/0x68
 [&lt;ffffffff81056d8b&gt;] local_bh_disable+0x36/0x3b
 [&lt;ffffffff81433308&gt;] ? lock_sock+0x10/0x12
 [&lt;ffffffff814a7fc4&gt;] _raw_write_lock_bh+0x16/0x4f
 [&lt;ffffffff81433c38&gt;] tcp_close+0x159/0x355
 [&lt;ffffffff81453c99&gt;] inet_release+0xc3/0xcd
 [&lt;ffffffff813dff3f&gt;] sock_release+0x1f/0x74
 [&lt;ffffffff813dffbb&gt;] sock_close+0x27/0x2b
 [&lt;ffffffff81129c63&gt;] fput+0x11d/0x1e3
 [&lt;ffffffff81126577&gt;] filp_close+0x70/0x7b
 [&lt;ffffffff8112667a&gt;] sys_close+0xf8/0x13d
 [&lt;ffffffff814ae882&gt;] system_call_fastpath+0x16/0x1b


Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
=======================================================
[ INFO: possible circular locking dependency detected ]
3.0.0-rc3+ #26
-------------------------------------------------------
ip/1104 is trying to acquire lock:
 (local_softirq_lock){+.+...}, at: [&lt;ffffffff81056d12&gt;] __local_lock+0x25/0x68

but task is already holding lock:
 (sk_lock-AF_INET){+.+...}, at: [&lt;ffffffff81433308&gt;] lock_sock+0x10/0x12

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-&gt; #1 (sk_lock-AF_INET){+.+...}:
       [&lt;ffffffff810836e5&gt;] lock_acquire+0x103/0x12e
       [&lt;ffffffff813e2781&gt;] lock_sock_nested+0x82/0x92
       [&lt;ffffffff81433308&gt;] lock_sock+0x10/0x12
       [&lt;ffffffff81433afa&gt;] tcp_close+0x1b/0x355
       [&lt;ffffffff81453c99&gt;] inet_release+0xc3/0xcd
       [&lt;ffffffff813dff3f&gt;] sock_release+0x1f/0x74
       [&lt;ffffffff813dffbb&gt;] sock_close+0x27/0x2b
       [&lt;ffffffff81129c63&gt;] fput+0x11d/0x1e3
       [&lt;ffffffff81126577&gt;] filp_close+0x70/0x7b
       [&lt;ffffffff8112667a&gt;] sys_close+0xf8/0x13d
       [&lt;ffffffff814ae882&gt;] system_call_fastpath+0x16/0x1b

-&gt; #0 (local_softirq_lock){+.+...}:
       [&lt;ffffffff81082ecc&gt;] __lock_acquire+0xacc/0xdc8
       [&lt;ffffffff810836e5&gt;] lock_acquire+0x103/0x12e
       [&lt;ffffffff814a7e40&gt;] _raw_spin_lock+0x3b/0x4a
       [&lt;ffffffff81056d12&gt;] __local_lock+0x25/0x68
       [&lt;ffffffff81056d8b&gt;] local_bh_disable+0x36/0x3b
       [&lt;ffffffff814a7fc4&gt;] _raw_write_lock_bh+0x16/0x4f
       [&lt;ffffffff81433c38&gt;] tcp_close+0x159/0x355
       [&lt;ffffffff81453c99&gt;] inet_release+0xc3/0xcd
       [&lt;ffffffff813dff3f&gt;] sock_release+0x1f/0x74
       [&lt;ffffffff813dffbb&gt;] sock_close+0x27/0x2b
       [&lt;ffffffff81129c63&gt;] fput+0x11d/0x1e3
       [&lt;ffffffff81126577&gt;] filp_close+0x70/0x7b
       [&lt;ffffffff8112667a&gt;] sys_close+0xf8/0x13d
       [&lt;ffffffff814ae882&gt;] system_call_fastpath+0x16/0x1b

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(sk_lock-AF_INET);
                               lock(local_softirq_lock);
                               lock(sk_lock-AF_INET);
  lock(local_softirq_lock);

 *** DEADLOCK ***

1 lock held by ip/1104:
 #0:  (sk_lock-AF_INET){+.+...}, at: [&lt;ffffffff81433308&gt;] lock_sock+0x10/0x12

stack backtrace:
Pid: 1104, comm: ip Not tainted 3.0.0-rc3+ #26
Call Trace:
 [&lt;ffffffff81081649&gt;] print_circular_bug+0x1f8/0x209
 [&lt;ffffffff81082ecc&gt;] __lock_acquire+0xacc/0xdc8
 [&lt;ffffffff81056d12&gt;] ? __local_lock+0x25/0x68
 [&lt;ffffffff810836e5&gt;] lock_acquire+0x103/0x12e
 [&lt;ffffffff81056d12&gt;] ? __local_lock+0x25/0x68
 [&lt;ffffffff81046c75&gt;] ? get_parent_ip+0x11/0x41
 [&lt;ffffffff814a7e40&gt;] _raw_spin_lock+0x3b/0x4a
 [&lt;ffffffff81056d12&gt;] ? __local_lock+0x25/0x68
 [&lt;ffffffff81046c8c&gt;] ? get_parent_ip+0x28/0x41
 [&lt;ffffffff81056d12&gt;] __local_lock+0x25/0x68
 [&lt;ffffffff81056d8b&gt;] local_bh_disable+0x36/0x3b
 [&lt;ffffffff81433308&gt;] ? lock_sock+0x10/0x12
 [&lt;ffffffff814a7fc4&gt;] _raw_write_lock_bh+0x16/0x4f
 [&lt;ffffffff81433c38&gt;] tcp_close+0x159/0x355
 [&lt;ffffffff81453c99&gt;] inet_release+0xc3/0xcd
 [&lt;ffffffff813dff3f&gt;] sock_release+0x1f/0x74
 [&lt;ffffffff813dffbb&gt;] sock_close+0x27/0x2b
 [&lt;ffffffff81129c63&gt;] fput+0x11d/0x1e3
 [&lt;ffffffff81126577&gt;] filp_close+0x70/0x7b
 [&lt;ffffffff8112667a&gt;] sys_close+0xf8/0x13d
 [&lt;ffffffff814ae882&gt;] system_call_fastpath+0x16/0x1b


Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem</title>
<updated>2012-01-04T16:37:30+00:00</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2012-01-04T16:37:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=d8f46ff11081f03b09efe82245a3257bab6bf60e'/>
<id>d8f46ff11081f03b09efe82245a3257bab6bf60e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth</title>
<updated>2012-01-03T19:26:56+00:00</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2012-01-03T19:26:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=f9dc73e541348288b530c62c21d0fb8fdc7bbd0f'/>
<id>f9dc73e541348288b530c62c21d0fb8fdc7bbd0f</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
