On Fri, Aug 3, 2018 at 3:26 AM Thomas Gleixner wrote:
>
> On Wed, 18 Jul 2018, Alistair Strachan wrote:
> > export CPPFLAGS_vdso.lds += -P -C
> >
> > -VDSO_LDFLAGS_vdso.lds = -m64 -Wl,-soname=linux-vdso.so.1 \
> > - -Wl,--no-undefined \
> &
el-t...@android.com
Cc: j...@joelfernandes.org
Signed-off-by: Alistair Strachan
Acked-by: Andy Lutomirski
---
v2: Updated changelog and rediffed
Supersedes "x86: vdso: Fix leaky vdso link with CC=clang"
arch/x86/entry/vdso/Makefile | 22 +-
1 file changed, 9 insertions(+), 13
On Fri, Aug 3, 2018 at 9:38 AM Nick Desaulniers wrote:
>
> On Fri, Aug 3, 2018 at 6:10 AM Jean Delvare wrote:
> >
> > Hi Nick,
> >
> > It seems that this linux kernel commit of yours:
> >
> > commit d0a8d9378d16eb3c69bd8e6d23779fbdbee3a8c7
> > Author: Nick Desaulniers
> > Date: Thu Jun 21 09:23
On Mon, Jun 18, 2018 at 8:09 AM Arnd Bergmann wrote:
>
> The timespec structure suffers from the y2038 overflow and should not
> be used. This changes handle_vsoc_cond_wait() to use ktime_t directly.
>
> Signed-off-by: Arnd Bergmann
Tested-by: Alistair Strachan
> ---
g else) is very welcome.
>
> Thanks so much!
> Ray
>
> Signed-off-by: Ray Clinton
Acked-by: Alistair Strachan
> ---
> drivers/staging/android/uapi/vsoc_shm.h | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/drivers/staging/android/uapi
olnar
Cc: "H. Peter Anvin"
Cc: Greg Kroah-Hartman
Cc: x...@kernel.org
Cc: kernel-t...@android.com
Cc: j...@joelfernandes.com
Signed-off-by: Alistair Strachan
---
Supersedes "x86: vdso: Fix leaky vdso link with CC=clang"
arch/x86/entry/vdso/Makefile | 22 +---
KBUILD_CFLAGS. These flags direct clang to the
appropriate toolchain to link the vdsos.
Cc: Andy Lutomirski
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: "H. Peter Anvin"
Cc: Greg Kroah-Hartman
Cc: x...@kernel.org
Cc: kernel-t...@android.com
Cc: j...@joelfernandes.com
Signed-off-by: Alistai
On Thu, Jul 12, 2018 at 1:25 PM H. Peter Anvin wrote:
> On 07/12/18 13:10, Alistair Strachan wrote:
> > The vdso{32,64}.so can fail to link with CC=clang when clang tries to
> > find a suitable GCC toolchain to link these libraries with.
> >
> > /usr/bin/ld: arch/x86/
On Thu, Jul 12, 2018 at 4:20 PM Andy Lutomirski wrote:
>
> > On Jul 12, 2018, at 3:06 PM, H. Peter Anvin wrote:
> >
> >> On 07/12/18 13:37, Alistair Strachan wrote:
> >>> On Thu, Jul 12, 2018 at 1:25 PM H. Peter Anvin wrote:
> >>>> On 07/12
...@driverdev.osuosl.org
Cc: kernel-t...@android.com
Signed-off-by: Greg Hartman
[astrachan: rebased against 4.16, added TODO, fixed checkpatch issues]
Signed-off-by: Alistair Strachan
---
v2: addressed issues with class_create() failure handling and redundant
null pointer checks noticed by Dan
...@driverdev.osuosl.org
Cc: kernel-t...@android.com
Signed-off-by: Greg Hartman
[astrachan: rebased against 4.16, added TODO, fixed checkpatch issues]
Signed-off-by: Alistair Strachan
---
drivers/staging/android/Kconfig |9 +
drivers/staging/android/Makefile|1 +
drivers/staging/android/TODO
(Resent plain text)
On Thu, May 24, 2018 at 11:24 AM Nick Desaulniers
wrote:
> On Thu, May 24, 2018 at 11:20 AM wrote:
> > A stack canary on an *inlined* function? That's bound to break things
> elsewhere too sooner or later.
> But it's *not* inlined by GCC or Clang.
FWIW, GCC can also insert
namespace implementation, maintaining
> kernel mounts of proc is removed.
>
> In addition removing the unnecessary complexity of the kernel mount
> fixes a regression that caused the proc mount options to be ignored.
> Now that the initial mount of proc comes from userspace, those mount
>
: Alistair Strachan
---
drivers/staging/android/ashmem.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/drivers/staging/android/ashmem.c b/drivers/staging/android/ashmem.c
index a1a0025b59e0..1eeedb529a10 100644
--- a/drivers/staging/android/ashmem.c
+++ b/drivers/staging/android/ashmem.c
HI Greg,
On Tue, Jun 19, 2018 at 4:01 PM Greg Kroah-Hartman
wrote:
>
> On Tue, Jun 19, 2018 at 03:24:44PM -0700, Alistair Strachan wrote:
> > The ashmem driver did not check that the size/offset of the vma passed
> > to its .mmap() function was not larger than the ashmem objec
Signed-off-by: Alistair Strachan
---
drivers/staging/android/ashmem.c | 34
1 file changed, 17 insertions(+), 17 deletions(-)
diff --git a/drivers/staging/android/ashmem.c b/drivers/staging/android/ashmem.c
index a1a0025b59e0..c6386e4f5c9b 100644
--- a/drivers/staging
...@android.com
Cc: Joel Fernandes
Signed-off-by: Alistair Strachan
---
v2: Removed unnecessary use of unlikely() macro
drivers/staging/android/ashmem.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/drivers/staging/android/ashmem.c b/drivers/staging/android/ashmem.c
index c6386e4f5c9b
On Mon, Jun 11, 2018 at 6:22 PM Eric W. Biederman wrote:
>
> Alistair Strachan writes:
>
> > In commit e94591d0d90c "proc: Convert proc_mount to use mount_ns"
> > the parsing of mount parameters for the proc filesystem was broken.
> >
> &
google.com/forum/#!topic/syzkaller/Ot1fOE6v1d8
A similar (non-compiling) patch was provided at that time.
Reported-by: syzbot
Signed-off-by: Alistair Strachan
Cc: Laurent Pinchart
Cc: Mauro Carvalho Chehab
Cc: linux-me...@vger.kernel.org
Cc: kernel-t...@android.com
---
drivers/media/usb/uvc/uv
Hi Laurent,
On Tue, Dec 18, 2018 at 1:42 AM Laurent Pinchart
wrote:
>
> Hi Alistair,
>
> Thank you for the patch.
>
> On Monday, 17 December 2018 23:02:22 EET Alistair Strachan wrote:
> > When initially testing the Camera Terminal Descriptor wTerminalType
> > fiel
in the wTerminalType field.
If the bit is set, assume the descriptor is bad, and abort parsing it.
Originally reported here:
https://groups.google.com/forum/#!topic/syzkaller/Ot1fOE6v1d8
A similar (non-compiling) patch was provided at that time.
Reported-by: syzbot
Signed-off-by: Alistair
On Wed, Dec 19, 2018 at 12:16 AM Laurent Pinchart
wrote:
>
> Hi Alistair,
>
> Thank you for the patch.
>
> On Wednesday, 19 December 2018 03:32:48 EET Alistair Strachan wrote:
> > From: Laurent Pinchart
>
> Are you sure you don't want to keep authorship ? I
Hi Laura,
On Fri, Dec 14, 2018 at 1:48 PM Laura Abbott wrote:
> Hi,
>
> There are two reports of a regression with unwinding with
> 379d98ddf413 ("x86: vdso: Use $LD instead of $CC to link")
>
> https://bugzilla.kernel.org/show_bug.cgi?id=201741
> https://bugzilla.redhat.com/show_bug.cgi?id=16592
"H. Peter Anvin"
Cc: X86 ML
Cc: Florian Weimer ,
Cc: Carlos O'Donell ,
Cc: "H. J. Lu"
Cc: Joel Fernandes
Cc: kernel-t...@android.com
Signed-off-by: Alistair Strachan
---
arch/x86/entry/vdso/Makefile | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/
stead of $CC to link")
Cc: sta...@vger.kernel.org
Cc: Andy Lutomirski
Cc: Thomas Gleixner
Cc: "H. Peter Anvin"
Cc: X86 ML
Cc: Joel Fernandes
Cc: kernel-t...@android.com
Signed-off-by: Alistair Strachan
---
v2: Updated commit message, no changes to the code
arch/x86/entry/vdso/Makefil
Hi Kirill,
I noticed that booting 4.19 in qemu while injecting a FDT using the
"-dtb /path/to/blob" feature might have been broken by your change
372fddf70904 ("x86/mm: Introduce the 'no5lvl' kernel parameter").
This manifests either as FDT corruption, which causes the setup code
to fail to unpac
is offline, hope you don't mind if I repost
> > your description:
> > ===
> > Just from reading the code, I think I can see how this happens. Fuse
> > is wrapping its inode mutex with a check for "parallel_dirops", which
> > is set up in process_init_reply(). The FUSE_PARALLEL_DIROPS appears to
> > always be set, in fuse_send_init(), but its initial state is to be
> > disabled. So if the mutex gets taken, and it'll never be unlocked if
> > the initial command is flushed by fuse_readdir()'s use of
> > fuse_lock_inode().
> > ===
>
> Ah, indeed. Fix attached.
Looks good to me.
Tested-by: Alistair Strachan
> Thanks,
> Miklos
Cc: Greg Kroah-Hartman
Cc: Arve Hjønnevåg
Cc: Todd Kjos
Cc: Martijn Coenen
Cc: Greg Hartman
Cc: de...@driverdev.osuosl.org
Cc: kernel-t...@android.com
Signed-off-by: Alistair Strachan
---
drivers/staging/android/vsoc.c | 100 -
1 file changed, 49 insertions
an
Cc: de...@driverdev.osuosl.org
Cc: kernel-t...@android.com
Signed-off-by: Alistair Strachan
---
drivers/staging/android/vsoc.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/staging/android/vsoc.c b/drivers/staging/android/vsoc.c
index 794137b7751f..3e6e4af7d6a1 100644
---
Map the region shm as write-combining instead of uncachable.
Cc: Greg Kroah-Hartman
Cc: Arve Hjønnevåg
Cc: Todd Kjos
Cc: Martijn Coenen
Cc: Greg Hartman
Cc: de...@driverdev.osuosl.org
Cc: kernel-t...@android.com
Signed-off-by: Alistair Strachan
---
drivers/staging/android/TODO | 1
, corrupting the active list.
This problem can be reproduced quite easily with CONFIG_DEBUG_LIST=y
and fences with more than one sync point.
Change-Id: Ie2a6bc1480bbcfdc14f9b385fca5a2b833effc05
Signed-off-by: Alistair Strachan
Cc: Maarten Lankhorst
Cc: Greg Kroah-Hartman
Cc: Colin Cross
, corrupting the active list.
This problem can be reproduced quite easily with CONFIG_DEBUG_LIST=y
and fences with more than one sync point.
Signed-off-by: Alistair Strachan
Cc: Maarten Lankhorst
Cc: Greg Kroah-Hartman
Cc: Colin Cross
---
drivers/staging/android/sync.c | 2 +-
1 file changed, 1
On Mon, Feb 11, 2019 at 9:22 AM Todd Kjos wrote:
>
> +Alistair Strachan
>
> On Mon, Feb 11, 2019 at 9:11 AM Greg KH wrote:
> >
> > On Mon, Feb 11, 2019 at 10:15:18PM +0530, Souptick Joarder wrote:
> > > On Mon, Feb 11, 2019 at 9:27 PM Greg KH
> > > w
t;proc: Convert proc_mount to use mount_ns")
Signed-off-by: Alistair Strachan
Cc: Seth Forshee
Cc: Djalal Harouni
Cc: "Eric W. Biederman"
Cc: kernel-t...@android.com
Cc: linux-kernel@vger.kernel.org
---
fs/proc/inode.c| 4
fs/proc/internal.h | 1 -
fs/proc/root.c
Commit-ID: 379d98ddf41344273d9718556f761420f4dc80b3
Gitweb: https://git.kernel.org/tip/379d98ddf41344273d9718556f761420f4dc80b3
Author: Alistair Strachan
AuthorDate: Fri, 3 Aug 2018 10:39:31 -0700
Committer: Thomas Gleixner
CommitDate: Sun, 5 Aug 2018 22:33:50 +0200
x86: vdso: Use $LD
Commit-ID: cd01544a268ad8ee5b1dfe42c4393f1095f86879
Gitweb: https://git.kernel.org/tip/cd01544a268ad8ee5b1dfe42c4393f1095f86879
Author: Alistair Strachan
AuthorDate: Fri, 14 Dec 2018 14:36:37 -0800
Committer: Borislav Petkov
CommitDate: Sat, 15 Dec 2018 11:37:51 +0100
x86/vdso: Pass
36 matches
Mail list logo