4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Johannes Weiner
commit c73322d098e4b6f5f0f0fa1330bf57e218775539 upstream.
Patch series "mm: kswapd spinning on unreclaimable nodes - fixes and
cleanups".
Jia reported a scenario in which the k
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jonathan Dieter
commit e5dfa3f902b9a642ae8c6997d57d7c41e384a90b upstream.
The usbip userspace tools call sprintf()/snprintf() and don't check for
the return value which can lead the paths to ov
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Yuiko Oshino
[ Upstream commit a5b1379afbfabf91e3a689e82ac619a7157336b3 ]
Fix initialize the uninitialized tx_qlen to an appropriate value when USB
Full Speed is used.
Fixes: 55d7de9de6c3 ("
Ensure that a core serializing instruction is issued before returning to
user-mode. x86 implements return to user-space through sysexit, sysrel,
and sysretq, which are not core serializing.
Signed-off-by: Mathieu Desnoyers
Acked-by: Peter Zijlstra (Intel)
CC: Thomas Gleixner
CC: Andy Lutomirski
Hi Ingo, Peter, Thomas,
Here is the updated membarrier patch series following Acked-by from
Peter.
It would be appreciated of those can go through the scheduler tree for
the 4.16 merge window.
Highlights:
"powerpc: membarrier: Skip memory barrier in switch_mm()" takes care of
a TODO that was le
Allow PowerPC to skip the full memory barrier in switch_mm(), and
only issue the barrier when scheduling into a task belonging to a
process that has registered to use expedited private.
Threads targeting the same VM but which belong to different thread
groups is a tricky case. It has a few consequ
Test the new MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE and
MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE commands.
Signed-off-by: Mathieu Desnoyers
Acked-by: Shuah Khan
Acked-by: Peter Zijlstra (Intel)
CC: Greg Kroah-Hartman
CC: Paul E. McKenney
CC: Boqun Feng
CC: Andrew Hunter
CC: M
From: Yazen Ghannam
The acpi_idle driver will default to ACPI_CSTATE_HALT for C1 if a _CST
object for C1 is not defined. However, the description will not be set,
so users will see "" when reading the description from sysfs.
Set the C1 state description when defaulting to ACPI_CSTATE_HALT.
Sign
There are two places where core serialization is needed by membarrier:
1) When returning from the membarrier IPI,
2) After scheduler updates curr to a thread with a different mm, before
going back to user-space, since the curr->mm is used by membarrier to
check whether it needs to send an IP
Provide core serializing membarrier command to support memory reclaim
by JIT.
Each architecture needs to explicitly opt into that support by
documenting in their architecture code how they provide the core
serializing instructions required when returning from the membarrier
IPI, and after the sche
Signed-off-by: Mathieu Desnoyers
Acked-by: Peter Zijlstra (Intel)
CC: Andy Lutomirski
CC: Paul E. McKenney
CC: Boqun Feng
CC: Andrew Hunter
CC: Maged Michael
CC: Avi Kivity
CC: Benjamin Herrenschmidt
CC: Paul Mackerras
CC: Michael Ellerman
CC: Dave Watson
CC: Thomas Gleixner
CC: Ingo M
Document the membarrier requirement on having a full memory barrier in
__schedule() after coming from user-space, before storing to rq->curr.
It is provided by smp_mb__after_spinlock() in __schedule().
Document that membarrier requires a full barrier on transition from
kernel thread to userspace t
Test the new MEMBARRIER_CMD_GLOBAL_EXPEDITED and
MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED commands.
Adapt to the MEMBARRIER_CMD_SHARED -> MEMBARRIER_CMD_GLOBAL rename.
Signed-off-by: Mathieu Desnoyers
Acked-by: Shuah Khan
Acked-by: Peter Zijlstra (Intel)
CC: Greg Kroah-Hartman
CC: Paul E. McK
Allow expedited membarrier to be used for data shared between processes
through shared memory.
Processes wishing to receive the membarriers register with
MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED. Those which want to issue
membarrier invoke MEMBARRIER_CMD_GLOBAL_EXPEDITED.
This allows extremely si
Test the new MEMBARRIER_CMD_PRIVATE_EXPEDITED and
MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED commands.
Add checks expecting specific error values on system calls expected to
fail.
Signed-off-by: Mathieu Desnoyers
Acked-by: Shuah Khan
Acked-by: Greg Kroah-Hartman
Acked-by: Peter Zijlstra (Intel)
Introduce an architecture function that ensures the current CPU
issues a core serializing instruction before returning to usermode.
This is needed for the membarrier "sync_core" command.
Architectures defining the sync_core_before_usermode() static inline
need to select ARCH_HAS_SYNC_CORE_BEFORE_
On 01/29/2018 06:36 PM, Greg KH wrote:
> On Mon, Jan 29, 2018 at 04:36:35PM +0100, Daniel Borkmann wrote:
>> On 01/29/2018 12:40 AM, Daniel Borkmann wrote:
>>> On 01/28/2018 03:45 PM, Greg KH wrote:
On Wed, Jan 24, 2018 at 11:10:50AM +0100, Daniel Borkmann wrote:
> On 01/24/2018 11:07 AM,
On Mon, Jan 29, 2018 at 04:36:35PM +0100, Daniel Borkmann wrote:
> On 01/29/2018 12:40 AM, Daniel Borkmann wrote:
> > On 01/28/2018 03:45 PM, Greg KH wrote:
> >> On Wed, Jan 24, 2018 at 11:10:50AM +0100, Daniel Borkmann wrote:
> >>> On 01/24/2018 11:07 AM, David Woodhouse wrote:
> On Tue, 2018
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Alexei Starovoitov
[ upstream commit 290af86629b25ffd1ed6232c4e9107da031705cb ]
The BPF interpreter has been used as part of the spectre 2 attack CVE-2017-5715.
A quote from goolge project zer
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Guillaume Nault
[ Upstream commit 02612bb05e51df8489db5e94d0cf8d1c81f87b0c ]
In pppoe_sendmsg(), reserving dev->hard_header_len bytes of headroom
was probably fine before the introduction of
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Xin Long
[ Upstream commit 625637bf4afa45204bd87e4218645182a919485a ]
After introducing sctp_stream structure, sctp uses stream->outcnt as the
out stream nums instead of c.sinit_num_ostreams.
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Jiri Slaby
commit fc3dc67471461c0efcb1ed22fb7595121d65fad9 upstream.
fcntl(0, F_SETOWN, 0x8000) triggers:
UBSAN: Undefined behaviour in fs/fcntl.c:118:7
negation of -2147483648 cannot be r
On some laptop like the Dell Inspiron 7000 series
tablet mode switch implemented in Intel ACPI,
the events to enter and exit the tablet mode are 0xCC and 0xCD
This initializes the tablet/laptop mode at the correct value
if the system booted in tablet mode (or the vbtn module loaded
with the device
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Neil Horman
[ Upstream commit 848b159835ddef99cc4193083f7e786c3992f580 ]
with the introduction of commit
b0eb57cb97e7837ebb746404c2c58c6f536f23fa, it appears that rq->buf_info
is improperly h
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Boris Brezillon
commit 17b11b76b87afe9f8be199d7a5f442497133e2b0 upstream.
When saving BOs in the hang state we skip one entry of the
kernel_state->bo[] array, thus leaving it to NULL. This lea
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Andrew Goodbody
commit 21619792d1eca7e772ca190ba68588e57f29595b upstream.
Change spin_lock calls to spin_lock_irqsave to prevent
attmpted recursive lock taking in interrupt context.
This patch
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Jan Kara
commit 6883cd7f68245e43e91e5ee583b7550abf14523f upstream.
When new directory 'DIR1' is created in a directory 'DIR0' with SGID bit
set, DIR1 is expected to have SGID bit set (and ownin
Hi,
Dne ponedeljek, 29. januar 2018 ob 19:05:26 CET je Rob Herring napisal(a):
> On Wed, Jan 17, 2018 at 09:14:15PM +0100, Jernej Skrabec wrote:
> > This commit adds all necessary compatibles and descriptions needed to
> > implement A83T HDMI pipeline.
> >
> > Mixer is already properly described,
Linus,
Please pull the userns-linus branch from the git tree:
git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace.git
userns-linus
HEAD: 8b2770a4e1c7a837e1889d4f00026e999da5faa0 fix typo in assignment of fs
default overflow gid
Between the holidays and other distracti
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Francois Romieu
[ Upstream commit a78e93661c5fd30b9e1dee464b2f62f966883ef7 ]
Hardware statistics retrieval hurts in tight invocation loops.
Avoid extraneous write and enforce strict ordering
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: H. Nikolaus Schaller
commit c52c545ead97fcc2f4f8ea38f1ae3c23211e09a8 upstream.
commit e7ec014a47e4 ("Input: twl6040-vibra - update for device tree support")
made the separate vibra DT node to
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Kevin Cernekee
commit 916a27901de01446bcf57ecca4783f6cff493309 upstream.
The capability check in nfnetlink_rcv() verifies that the caller
has CAP_NET_ADMIN in the namespace that "owns" the net
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jeff Mahoney
commit 54930dfeb46e978b447af0fb8ab4e181c1bf9d7a upstream.
Most extended attributes will fit in a single block. More importantly,
we drop the reference to the inode while holding t
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Jeff Mahoney
commit 54930dfeb46e978b447af0fb8ab4e181c1bf9d7a upstream.
Most extended attributes will fit in a single block. More importantly,
we drop the reference to the inode while holding t
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Florian Westphal
commit 95a8d19f28e6b29377a880c6264391a62e07fccc upstream.
In case nf_conntrack_tuple_taken did not find a conflicting entry
check that all entries in this hash slot were tested
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ upstream commit f37a8cb84cce18762e8f86a70bd6a49a66ab964c ]
Alexei found that verifier does not reject stores into context
via BPF_ST instead of BPF_STX. And while looking at i
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 95ef498d977bf44ac094778fd448b98af158a3e6 ]
In my last patch, I missed fact that cork.base.dst was not initialized
in ip6_make_skb() :
If ip6_setup_cork() return
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jia Zhang
commit 7e702d17ed138cf4ae7c00e8c00681ed464587c7 upstream.
Commit b94b73733171 ("x86/microcode/intel: Extend BDW late-loading with a
revision check") reduced the impact of erratum BDF9
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Russell King
commit 02088d9b392f605c892894b46aa8c83e3abd0115 upstream.
When an eBPF program tail-calls another eBPF program, it enters it after
the prologue to avoid having complex stack manip
On Mon, Jan 29, 2018 at 8:35 PM, wrote:
>> -Original Message-
>> From: Andy Shevchenko [mailto:andy.shevche...@gmail.com]
>> Sent: Monday, January 29, 2018 12:57 PM
>> To: Marco Martin
>> Cc: Platform Driver ; Limonciello, Mario
>> ; Andy Shevchenko ; Pali
>> Rohár ; Darren Hart ; Matthe
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jiri Slaby
commit 999898355e08ae3b92dfd0a08db706e0c6703d30 upstream.
When LONG_MIN is passed to msgrcv, one would expect to recieve any
message. But convert_mode does *msgtyp = -*msgtyp and -L
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Willem de Bruijn
[ Upstream commit 121d57af308d0cf943f08f4738d24d3966c38cd9 ]
Validate gso_type during segmentation as SKB_GSO_DODGY sources
may pass packets where the gso_type does not match
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Sabrina Dubroca
[ Upstream commit 877d17c79b66466942a836403773276e34fe3614 ]
do_tls_setsockopt_tx returns 0 without doing anything when crypto_info
is already set. Silent failure is confusing
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Michal Hocko
commit 561b5e0709e4a248c67d024d4d94b6e31e3edf2f upstream.
Commit 1be7107fbe18 ("mm: larger stack guard gap, between vmas") has
introduced a regression in some rust and Java environ
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Shuah Khan
commit 635f545a7e8be7596b9b2b6a43cab6bbd5a88e43 upstream.
get_pipe() routine doesn't validate the input endpoint number
and uses to reference ep_in and ep_out arrays. Invalid endpoin
Any movement on the following proposal? tglx@ do you have an update?
-- Mark
On 11/14/2017 02:50 PM, Thomas Gleixner wrote:
On Tue, 14 Nov 2017, Linus Torvalds wrote:
I'd suggest simply adding another time to the internal 'struct
printk_log' (and probably just set it in "log_store()").
Doesn'
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Craig Gallek
commit d9b3fca27385eafe61c3ca6feab6cb1e7dc77482 upstream.
tcp_hdrlen is wasteful if you already have a pointer to struct tcphdr.
This splits the size calculation into a helper fun
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Russell King
commit ec19e02b343db991d2d1610c409efefebf4e2ca9 upstream.
When the source and destination register are identical, our JIT does not
generate correct code, which leads to kernel oop
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit d5421ea43d30701e03cadc56a38854c36a8b4433 upstream.
The hrtimer interrupt code contains a hang detection and mitigation
mechanism, which prevents that a long delayed hrtim
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Mark Furneaux
commit e5c9c6a885fad00aa559b49d8fc23a60e290824e upstream.
Adds support for the current lineup of Xbox One controllers from PDP
(Performance Designed Products). These controllers
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 7c68d1a6b4db9012790af7ac0f0fdc0d2083422a ]
Without proper validation of DODGY packets, we might very well
feed qdisc_pkt_len_init() with invalid GSO packets.
tc
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ upstream commit c366287ebd698ef5e3de300d90cd62ee9ee7373e ]
Divides by zero are not nice, lets avoid them if possible.
Also do_div() seems not needed when dealing with 32bit oper
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ upstream commit be95a845cc4402272994ce290e3ad928aff06cb9 ]
In addition to commit b2157399cc98 ("bpf: prevent out-of-bounds
speculation") also change the layout of struct bpf_
This is the start of the stable review cycle for the 4.14.16 release.
There are 71 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Wed Jan 31 12:37:59 UTC 2018.
Anything receiv
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Cong Wang
[ Upstream commit 59b36613e85fb16ebf9feaf914570879cd5c2a21 ]
When tipc_node_find_by_name() fails, the nlmsg is not
freed.
While on it, switch to a goto label to properly
free it.
F
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Rafael J. Wysocki
commit 86314751c7945fa0c67f459beeda2e7c610ca429 upstream.
Roland Dreier reports that one of his systems cannot boot because of
the changes made by commit ac212b6980d8 (ACPI /
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Jan Kara
commit a992f2d38e4ce17b8c7d1f7f67b2de0eebdea069 upstream.
When new directory 'DIR1' is created in a directory 'DIR0' with SGID bit
set, DIR1 is expected to have SGID bit set (and ownin
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Pau Espin Pedrol
commit cc31d43b4154ad5a7d8aa5543255a93b7e89edc2 upstream.
Otherwise, RST packets generated by ipt_REJECT always have mark 0 when
the routing is checked later in the same code p
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Liping Zhang
commit b173a28f62cf929324a8a6adcc45adadce311d16 upstream.
The 'name' filed in struct nf_conntrack_expect_policy{} is not a
pointer, so check it is NULL or not will always return t
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Jim Westfall
[ Upstream commit 096b9854c04df86f03b38a97d40b6506e5730919 ]
Use n->primary_key instead of pkey to account for the possibility that a neigh
constructor function may have modified
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Hongxu Jia
commit 17a49cd549d9dc8707dc9262210166455c612dde upstream.
Since 09d9686047db ("netfilter: x_tables: do compat validation via
translate_table"), it used compatr structure to assign ne
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Biggers
commit 4e765b4972af7b07adcb1feb16e7a525ce1f6b28 upstream.
If a message sent to a PF_KEY socket ended with an incomplete extension
header (fewer than 4 bytes remaining), then parse
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Xin Long
[ Upstream commit cd443f1e91ca600a092e780e8250cd6a2954b763 ]
Move up the extack reset/initialization in netlink_rcv_skb, so that
those 'goto ack' will not skip it. Otherwise, later o
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Paolo Abeni
commit 83170f3bed7ceb4f9a0ac0c4dc736afde90c upstream.
With the commit 48e8aa6e3137 ("ipv6: Set FLOWI_FLAG_KNOWN_NH at
flowi6_flags") ip6_pol_route() callers were asked to to set
On Sun, Jan 28, 2018 at 1:14 AM, Ingo Molnar wrote:
>
> * Dan Williams wrote:
>
>> --- a/arch/x86/include/asm/uaccess.h
>> +++ b/arch/x86/include/asm/uaccess.h
>> @@ -124,6 +124,11 @@ extern int __get_user_bad(void);
>>
>> #define __uaccess_begin() stac()
>> #define __uaccess_end() clac()
>>
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Josef Bacik
commit e4fd493c0541d36953f7b9d3bfced67a1321792f upstream.
In fixing the readdir+pagefault deadlock I accidentally introduced a
stale entry regression in readdir. If we get close t
This is the start of the stable review cycle for the 4.9.79 release.
There are 66 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Wed Jan 31 12:38:12 UTC 2018.
Anything receive
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Sabrina Dubroca
[ Upstream commit 6db959c82eb039a151d95a0f8b7dea643657327a ]
The current code copies directly from userspace to ctx->crypto_send, but
doesn't always reinitialize it to 0 on fa
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jim Westfall
[ Upstream commit 096b9854c04df86f03b38a97d40b6506e5730919 ]
Use n->primary_key instead of pkey to account for the possibility that a neigh
constructor function may have modified
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Mike Maloney
[ Upstream commit 749439bfac6e1a2932c582e2699f91d329658196 ]
The logic in __ip6_append_data() assumes that the MTU is at least large
enough for the headers. A device's MTU may be
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Lorenzo Colitti
[ Upstream commit 6503a30440962f1e1ccb8868816b4e18201218d4 ]
Commit 3765d35ed8b9 ("net: ipv4: Convert inet_rtm_getroute to rcu
versions of route lookup") broke "ip route get"
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ upstream commit f37a8cb84cce18762e8f86a70bd6a49a66ab964c ]
Alexei found that verifier does not reject stores into context
via BPF_ST instead of BPF_STX. And while looking at
On Mon, Jan 29, 2018 at 12:26:00PM +0200, Laurent Pinchart wrote:
> Hi Kieran,
>
> Thank you for the patch.
>
> On Monday, 22 January 2018 14:50:00 EET Kieran Bingham wrote:
> > The ADV7511 has four 256-byte maps that can be accessed via the main I²C
> > ports. Each map has it own I²C address and
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Martin Brandenburg
commit a0ec1ded22e6a6bc41981fae22406835b006a66e upstream.
In orangefs_devreq_read, there is a loop which picks an op off the list
of pending ops. If the loop fails to find
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Alexey Kodanev
[ Upstream commit dd5684ecae3bd8e44b644f50e2c12c7e57fdfef5 ]
ccid2_hc_tx_rto_expire() timer callback always restarts the timer
again and can run indefinitely (unless it is stopp
On Mon, Jan 29, 2018 at 08:17:02PM +, David Woodhouse wrote:
> On Mon, 2018-01-29 at 18:14 -0200, Eduardo Habkost wrote:
> >
> > Sorry for being confused here, as probably the answer is buried
> > on a LKML thread somewhere. The comment explains what the code
> > does, but not why. Why exact
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit d0c081b49137cd3200f2023c0875723be66e7ce5 ]
syzbot reported yet another crash [1] that is caused by
insufficient validation of DODGY packets.
Two bugs are happen
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Michal Hocko
commit 561b5e0709e4a248c67d024d4d94b6e31e3edf2f upstream.
Commit 1be7107fbe18 ("mm: larger stack guard gap, between vmas") has
introduced a regression in some rust and Java environ
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Marc Kleine-Budde
commit d4689846881d160a4d12a514e991a740bcb5d65a upstream.
If an invalid CANFD frame is received, from a driver or from a tun
interface, a Kernel warning is generated.
This p
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Michal Hocko
commit 18365225f0440d09708ad9daade2ec11275c3df9 upstream.
Laurent Dufour has noticed that hwpoinsoned pages are kept charged. In
his particular case he has hit a bad_page("page st
On 1/29/2018 12:42 PM, Eduardo Habkost wrote:
The question is how the hypervisor could tell that to the guest.
If Intel doesn't give us a CPUID bit that can be used to tell
that retpolines are enough, maybe we should use a hypervisor
CPUID bit for that?
the objective is to have retpoline be saf
On Fri, Jan 26, 2018 at 02:16:28PM +0100, Thierry Escande wrote:
> From: Tomasz Figa
>
> This patch removes unused fields from vop structure.
>
> Signed-off-by: Tomasz Figa
> Signed-off-by: Sean Paul
> Signed-off-by: Thierry Escande
Reviewed-by: Sean Paul
> ---
> drivers/gpu/drm/rockchip
On Mon, Jan 29, 2018 at 02:42:49PM +0100, Wolfgang Walter wrote:
> Hello!
>
> Am Montag, 29. Januar 2018, 13:22:49 schrieb Wolfgang Walter:
> > Hello,
> >
> > after upgrading our nfs-server from 4.9.75 to 4.9.78 group permissions stop
> > working (for clients). If you need group permissions to a
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Arnd Bergmann
commit cc622420798c4bcf093785d872525087a7798db9 upstream.
Enabling gcov is counterproductive to compile testing: it significantly
increases the kernel image size, compile time, a
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Ben Hutchings
[ Upstream commit e9191ffb65d8e159680ce0ad2224e1acbde6985c ]
Commit 513674b5a2c9 ("net: reevalulate autoflowlabel setting after
sysctl setting") removed the initialisation of
ipv
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Shuah Khan
commit 2f2d0088eb93db5c649d2a5e34a3800a8a935fc5 upstream.
When a client has a USB device attached over IP, the vhci_hcd driver is
locally leaking a socket pointer address via the
/s
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Yuiko Oshino
[ Upstream commit a5b1379afbfabf91e3a689e82ac619a7157336b3 ]
Fix initialize the uninitialized tx_qlen to an appropriate value when USB
Full Speed is used.
Fixes: 55d7de9de6c3 ("M
This is the start of the stable review cycle for the 4.4.114 release.
There are 74 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Wed Jan 31 12:38:21 UTC 2018.
Anything receiv
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Michal Hocko
commit 561b5e0709e4a248c67d024d4d94b6e31e3edf2f upstream.
Commit 1be7107fbe18 ("mm: larger stack guard gap, between vmas") has
introduced a regression in some rust and Java enviro
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: David Ahern
[ Upstream commit cbbdf8433a5f117b1a2119ea30fc651b61ef7570 ]
syzbot triggered the WARN_ON in netlink_ack testing the bad_attr value.
The problem is that netlink_rcv_skb loops over
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Mike Maloney
[ Upstream commit 749439bfac6e1a2932c582e2699f91d329658196 ]
The logic in __ip6_append_data() assumes that the MTU is at least large
enough for the headers. A device's MTU may b
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Alexei Starovoitov
[ upstream commit 68fda450a7df51cff9e5a4d4a4d9d0d5f2589153 ]
due to some JITs doing if (src_reg == 0) check in 64-bit mode
for div/mod operations mask upper 32-bits of src re
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Felix Fietkau
[ Upstream commit ad23b750933ea7bf962678972a286c78a8fa36aa ]
Commit "net: igmp: Use correct source address on IGMPv3 reports"
introduced a check to validate the source address of
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Guillaume Nault
[ Upstream commit 02612bb05e51df8489db5e94d0cf8d1c81f87b0c ]
In pppoe_sendmsg(), reserving dev->hard_header_len bytes of headroom
was probably fine before the introduction of -
3.18-stable review patch. If anyone has any objections, please let me know.
--
From: Jeff Mahoney
commit 08db141b5313ac2f64b844fb5725b8d81744b417 upstream.
The main loop in __discard_prealloc is protected by the reiserfs write lock
which is dropped across schedules like the BK
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Streetman
[ Upstream commit 4ee806d51176ba7b8ff1efd81f271d7252e03a1d ]
When a tcp socket is closed, if it detects that its net namespace is
exiting, close immediately and do not wait for
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: yangbo lu
commit 1ef5e49e46b919052474d9b54a15debc79ff0133 upstream.
A previous patch had removed esdhc_of_platform_init() by mistake.
static void esdhc_of_platform_init(struct sdhci_host *host)
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Bristot de Oliveira
commit 3effcb4247e74a51f5d8b775a1ee4abf87cc089a upstream.
We have been facing some problems with self-suspending constrained
deadline tasks. The main reason is that t
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ upstream commit 7891a87efc7116590eaba57acc3c422487802c6f ]
The following snippet was throwing an 'unknown opcode cc' warning
in BPF interpreter:
0: (18) r0 = 0x0
2: (7b)
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Doug Berger
commit e048cb32f69038aa1c8f11e5c1b331be4181659d upstream.
The align_offset parameter is used by bitmap_find_next_zero_area_off()
to represent the offset of map's base from the previ
601 - 700 of 1013 matches
Mail list logo