[PATCH 3.14 105/130] sparc64: fix incorrect sign extension in sys_sparc64_personality

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Dmitry V. Levin commit 525fd5a94e1be0776fa652df5c687697db508c91 upstream. The value returned by sys_personality has type "long int". It is saved to a variable of type

[PATCH 3.14 112/130] drm/radeon/pm: adjust display configuration after powerstate

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Alex Deucher commit 39d4275058baf53e89203407bf3841ff2c74fa32 upstream. set_power_state defaults to no displays, so we need to update the display configuration after

[PATCH 3.14 105/130] sparc64: fix incorrect sign extension in sys_sparc64_personality

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Dmitry V. Levin commit 525fd5a94e1be0776fa652df5c687697db508c91 upstream. The value returned by sys_personality has type "long int". It is saved to a variable of type "int", which is not a

[PATCH 3.14 112/130] drm/radeon/pm: adjust display configuration after powerstate

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Alex Deucher commit 39d4275058baf53e89203407bf3841ff2c74fa32 upstream. set_power_state defaults to no displays, so we need to update the display configuration after setting up the powerstate

[PATCH 3.14 113/130] ACPI / PCI / hotplug: unlock in error path in acpiphp_enable_slot()

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Insu Yun commit 2c3033a0664dfae91e1dee7fabac10f24354b958 upstream. In acpiphp_enable_slot(), there is a missing unlock path when error occurred. It needs to be unlocked

[PATCH 3.14 113/130] ACPI / PCI / hotplug: unlock in error path in acpiphp_enable_slot()

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Insu Yun commit 2c3033a0664dfae91e1dee7fabac10f24354b958 upstream. In acpiphp_enable_slot(), there is a missing unlock path when error occurred. It needs to be unlocked before returning an

[PATCH 3.14 129/130] xen/pcifront: Fix mysterious crashes when NUMA locality information was extracted.

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 4d8c8bd6f2062c9988817183a91fe2e623c8aa5e upstream. Occasionaly PV guests would crash with: pciback :00:00.1: Xen PCI mapped GSI0 to

[PATCH 3.14 129/130] xen/pcifront: Fix mysterious crashes when NUMA locality information was extracted.

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 4d8c8bd6f2062c9988817183a91fe2e623c8aa5e upstream. Occasionaly PV guests would crash with: pciback :00:00.1: Xen PCI mapped GSI0 to IRQ16 BUG: unable to

[PATCH 3.14 110/130] drm/qxl: use kmalloc_array to alloc reloc_info in qxl_process_single_command

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Gerd Hoffmann commit 34855706c30d52b0a744da44348b5d1cc39fbe51 upstream. This avoids integer overflows on 32bit machines when calculating reloc_info size, as reported by

[PATCH 3.14 127/130] kernel/resource.c: fix muxed resource handling in __request_region()

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Simon Guinot commit 59ceeaaf355fa0fb16558ef7c24413c804932ada upstream. In __request_region, if a conflict with a BUSY and MUXED resource is detected, then the

[PATCH 3.14 110/130] drm/qxl: use kmalloc_array to alloc reloc_info in qxl_process_single_command

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Gerd Hoffmann commit 34855706c30d52b0a744da44348b5d1cc39fbe51 upstream. This avoids integer overflows on 32bit machines when calculating reloc_info size, as reported by Alan Cox. Cc:

[PATCH 3.14 127/130] kernel/resource.c: fix muxed resource handling in __request_region()

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Simon Guinot commit 59ceeaaf355fa0fb16558ef7c24413c804932ada upstream. In __request_region, if a conflict with a BUSY and MUXED resource is detected, then the caller goes to sleep and waits

[PATCH 4.4 010/342] net: dsa: fix mv88e6xxx switches

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Russell King [ Upstream commit db0e51afa481088e6396f11e02018d64113a6578 ] Since commit 76e398a62712 ("net: dsa: use switchdev obj for VLAN add/del ops"), the

[PATCH 3.14 120/130] libata: fix sff host state machine locking while polling

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Tejun Heo commit 8eee1d3ed5b6fc8e14389567c9a6f53f82bb7224 upstream. The bulk of ATA host state machine is implemented by ata_sff_hsm_move(). The function is called from

[PATCH 4.4 010/342] net: dsa: fix mv88e6xxx switches

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Russell King [ Upstream commit db0e51afa481088e6396f11e02018d64113a6578 ] Since commit 76e398a62712 ("net: dsa: use switchdev obj for VLAN add/del ops"), the Marvell 88E6xxx switch has been

[PATCH 3.14 120/130] libata: fix sff host state machine locking while polling

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Tejun Heo commit 8eee1d3ed5b6fc8e14389567c9a6f53f82bb7224 upstream. The bulk of ATA host state machine is implemented by ata_sff_hsm_move(). The function is called from either the interrupt

[PATCH 4.4 011/342] tipc: fix connection abort during subscription cancel

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Parthasarathy Bhuvaragan [ Upstream commit 4d5cfcba2f6ec494d8810b9e3c0a7b06255c8067 ] In 'commit 7fe8097cef5f ("tipc: fix nullpointer bug when

[PATCH 4.4 015/342] ipv6: enforce flowi6_oif usage in ip6_dst_lookup_tail()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 6f21c96a78b835259546d8f3fb4edff0f651d478 ] The current implementation of ip6_dst_lookup_tail basically ignore the egress ifindex match: if the

[PATCH 3.14 130/130] iwlwifi: update and fix 7265 series PCI IDs

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Oren Givon commit 006bda75d81fd27a583a3b310e9444fea2aa6ef2 upstream. Update and fix some 7265 PCI IDs entries. Signed-off-by: Oren Givon

[PATCH 4.4 011/342] tipc: fix connection abort during subscription cancel

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Parthasarathy Bhuvaragan [ Upstream commit 4d5cfcba2f6ec494d8810b9e3c0a7b06255c8067 ] In 'commit 7fe8097cef5f ("tipc: fix nullpointer bug when subscribing to events")', we terminate the

[PATCH 4.4 015/342] ipv6: enforce flowi6_oif usage in ip6_dst_lookup_tail()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 6f21c96a78b835259546d8f3fb4edff0f651d478 ] The current implementation of ip6_dst_lookup_tail basically ignore the egress ifindex match: if the saddr is set,

[PATCH 3.14 130/130] iwlwifi: update and fix 7265 series PCI IDs

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Oren Givon commit 006bda75d81fd27a583a3b310e9444fea2aa6ef2 upstream. Update and fix some 7265 PCI IDs entries. Signed-off-by: Oren Givon Signed-off-by: Emmanuel Grumbach Signed-off-by:

[PATCH 3.14 114/130] IB/qib: fix mcast detach when qp not attached

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Mike Marciniszyn commit 09dc9cd6528f5b52bcbd3292a6312e762c85260f upstream. The code produces the following trace: [1750924.419007] general protection fault:

[PATCH 3.14 114/130] IB/qib: fix mcast detach when qp not attached

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Mike Marciniszyn commit 09dc9cd6528f5b52bcbd3292a6312e762c85260f upstream. The code produces the following trace: [1750924.419007] general protection fault: [#3] SMP [1750924.420364]

[PATCH 4.4 017/342] ipv6: addrconf: Fix recursive spin lock call

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "subas...@codeaurora.org" [ Upstream commit 16186a82de1fdd868255448274e64ae2616e2640 ] A rcu stall with the following backtrace was seen on a system with forwarding,

[PATCH 4.4 019/342] unix: correctly track in-flight fds in sending process user_struct

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Hannes Frederic Sowa [ Upstream commit 415e3d3e90ce9e18727e8843ae343eda5a58fad6 ] The commit referenced in the Fixes tag incorrectly accounted the number of

[PATCH 4.4 017/342] ipv6: addrconf: Fix recursive spin lock call

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "subas...@codeaurora.org" [ Upstream commit 16186a82de1fdd868255448274e64ae2616e2640 ] A rcu stall with the following backtrace was seen on a system with forwarding, optimistic_dad and

[PATCH 4.4 019/342] unix: correctly track in-flight fds in sending process user_struct

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Hannes Frederic Sowa [ Upstream commit 415e3d3e90ce9e18727e8843ae343eda5a58fad6 ] The commit referenced in the Fixes tag incorrectly accounted the number of in-flight fds over a unix domain

[PATCH 3.14 122/130] nfs: fix nfs_size_to_loff_t

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Christoph Hellwig commit 50ab8ec74a153eb30db26529088bc57dd700b24c upstream. See http: //www.infradead.org/rpr.html X-Evolution-Source: 1451162204.2173...@leira.trondhjem.org

[PATCH 3.14 122/130] nfs: fix nfs_size_to_loff_t

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Christoph Hellwig commit 50ab8ec74a153eb30db26529088bc57dd700b24c upstream. See http: //www.infradead.org/rpr.html X-Evolution-Source: 1451162204.2173...@leira.trondhjem.org

[PATCH 4.4 020/342] tcp: do not drop syn_recv on all icmp reports

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 9cf7490360bf2c46a16b7525f899e4970c5fc144 ] Petr Novopashenniy reported that ICMP redirects on SYN_RECV sockets were leading to RST. This is

[PATCH 4.4 020/342] tcp: do not drop syn_recv on all icmp reports

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 9cf7490360bf2c46a16b7525f899e4970c5fc144 ] Petr Novopashenniy reported that ICMP redirects on SYN_RECV sockets were leading to RST. This is of course incorrect.

[PATCH 3.14 116/130] libceph: dont bail early from try_read() when skipping a message

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Ilya Dryomov commit e7a88e82fe380459b864e05b372638aeacb0f52d upstream. The contract between try_read() and try_write() is that when called each processes as much data as

[PATCH 4.4 002/342] gro: Make GRO aware of lightweight tunnels.

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Gross [ Upstream commit ce87fc6ce3f9f4488546187e3757cf666d9d4a2a ] GRO is currently not aware of tunnel metadata generated by lightweight tunnels and stored in the dst.

[PATCH 3.14 115/130] hwmon: (ads1015) Handle negative conversion values correctly

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Peter Rosin commit acc146943957d7418a6846f06e029b2c5e87e0d5 upstream. Make the divisor signed as DIV_ROUND_CLOSEST is undefined for negative dividends when the divisor is

[PATCH 4.4 002/342] gro: Make GRO aware of lightweight tunnels.

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Gross [ Upstream commit ce87fc6ce3f9f4488546187e3757cf666d9d4a2a ] GRO is currently not aware of tunnel metadata generated by lightweight tunnels and stored in the dst. This leads to two

[PATCH 3.14 115/130] hwmon: (ads1015) Handle negative conversion values correctly

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Peter Rosin commit acc146943957d7418a6846f06e029b2c5e87e0d5 upstream. Make the divisor signed as DIV_ROUND_CLOSEST is undefined for negative dividends when the divisor is unsigned.

[PATCH 3.14 116/130] libceph: dont bail early from try_read() when skipping a message

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Ilya Dryomov commit e7a88e82fe380459b864e05b372638aeacb0f52d upstream. The contract between try_read() and try_write() is that when called each processes as much data as possible. When

[PATCH 3.14 117/130] cdc-acm:exclude Samsung phone 04e8:685d

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Oliver Neukum commit e912e685f372ab62a2405a1acd923597f524e94a upstream. This phone needs to be handled by a specialised firmware tool and is reported to crash irrevocably if

Re: [PATCH 4.4 000/342] 4.4.4-stable review

2016-03-01 Thread Shuah Khan
On 03/01/2016 04:53 PM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.4.4 release. > There are 342 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses

Re: [PATCH 3.10 00/80] 3.10.99-stable review

2016-03-01 Thread Shuah Khan
On 03/01/2016 04:44 PM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 3.10.99 release. > There are 80 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses

Re: [PATCH 4.4 000/342] 4.4.4-stable review

2016-03-01 Thread Shuah Khan
On 03/01/2016 04:53 PM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.4.4 release. > There are 342 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses

Re: [PATCH 3.10 00/80] 3.10.99-stable review

2016-03-01 Thread Shuah Khan
On 03/01/2016 04:44 PM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 3.10.99 release. > There are 80 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses

[PATCH 3.14 117/130] cdc-acm:exclude Samsung phone 04e8:685d

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Oliver Neukum commit e912e685f372ab62a2405a1acd923597f524e94a upstream. This phone needs to be handled by a specialised firmware tool and is reported to crash irrevocably if cdc-acm takes it.

Re: [PATCH] futex: replace bare barrier() with a READ_ONCE()

2016-03-01 Thread Darren Hart
On Tue, Mar 01, 2016 at 08:44:48AM +0800, Jianyu Zhan wrote: > On Tue, Mar 1, 2016 at 6:22 AM, Darren Hart wrote: > > You've mention it causes problems a few times, but you do not specify what > > problem it causes or how it manifests. > > > > Is this a theoretical bug, or

Re: [PATCH] futex: replace bare barrier() with a READ_ONCE()

2016-03-01 Thread Darren Hart
On Tue, Mar 01, 2016 at 08:44:48AM +0800, Jianyu Zhan wrote: > On Tue, Mar 1, 2016 at 6:22 AM, Darren Hart wrote: > > You've mention it causes problems a few times, but you do not specify what > > problem it causes or how it manifests. > > > > Is this a theoretical bug, or have you experienced a

Re: [PATCH 3.14 000/130] 3.14.63-stable review

2016-03-01 Thread Shuah Khan
On 03/01/2016 04:44 PM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 3.14.63 release. > There are 130 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses

[PATCH] MAINTAINERS: Add powerpc drivers to the powerpc section

2016-03-01 Thread Michael Ellerman
We'd like folks working on drivers for powerpc to also Cc linuxppc-dev, so we can be aware of what's going on in drivers and/or review the changes. So add patterns to the powerpc MAINTAINERS section to catch some of the drivers we're interested in. Signed-off-by: Michael Ellerman

[PATCH 4.4 018/342] ipv6: fix a lockdep splat

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 44c3d0c1c0a880354e9de5d94175742e2c7c9683 ] Silence lockdep false positive about rcu_dereference() being used in the wrong context. First

Re: [PATCH 3.14 000/130] 3.14.63-stable review

2016-03-01 Thread Shuah Khan
On 03/01/2016 04:44 PM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 3.14.63 release. > There are 130 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses

[PATCH] MAINTAINERS: Add powerpc drivers to the powerpc section

2016-03-01 Thread Michael Ellerman
We'd like folks working on drivers for powerpc to also Cc linuxppc-dev, so we can be aware of what's going on in drivers and/or review the changes. So add patterns to the powerpc MAINTAINERS section to catch some of the drivers we're interested in. Signed-off-by: Michael Ellerman ---

[PATCH 4.4 018/342] ipv6: fix a lockdep splat

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 44c3d0c1c0a880354e9de5d94175742e2c7c9683 ] Silence lockdep false positive about rcu_dereference() being used in the wrong context. First one should use

[PATCH 4.4 024/342] sctp: translate network order to host order when users get a hmacid

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit 7a84bd46647ff181eb2659fdc99590e6f16e501d ] Commit ed5a377d87dc ("sctp: translate host order to network order when setting a hmacid") corrected

[PATCH 3.14 119/130] Revert "workqueue: make sure delayed work run in local cpu"

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Tejun Heo commit 041bd12e272c53a35c54c13875839bcb98c999ce upstream. This reverts commit 874bbfe600a660cba9c776b3957b1ce393151b76. Workqueue used to implicity guarantee that

[PATCH 4.4 025/342] net: Copy inner L3 and L4 headers as unaligned on GRE TEB

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexander Duyck [ Upstream commit 78565208d73ca9b654fb9a6b142214d52eeedfd1 ] This patch corrects the unaligned accesses seen on GRE TEB tunnels when generating hash keys.

[PATCH 4.4 024/342] sctp: translate network order to host order when users get a hmacid

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit 7a84bd46647ff181eb2659fdc99590e6f16e501d ] Commit ed5a377d87dc ("sctp: translate host order to network order when setting a hmacid") corrected the hmacid byte-order

[PATCH 3.14 119/130] Revert "workqueue: make sure delayed work run in local cpu"

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Tejun Heo commit 041bd12e272c53a35c54c13875839bcb98c999ce upstream. This reverts commit 874bbfe600a660cba9c776b3957b1ce393151b76. Workqueue used to implicity guarantee that work items queued

[PATCH 4.4 025/342] net: Copy inner L3 and L4 headers as unaligned on GRE TEB

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexander Duyck [ Upstream commit 78565208d73ca9b654fb9a6b142214d52eeedfd1 ] This patch corrects the unaligned accesses seen on GRE TEB tunnels when generating hash keys. Specifically what

[PATCH 4.4 028/342] bonding: Fix ARP monitor validation

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jay Vosburgh [ Upstream commit 21a75f0915dde8674708b39abfcda113911c49b1 ] The current logic in bond_arp_rcv will accept an incoming ARP for validation if (a) the

[PATCH 4.4 028/342] bonding: Fix ARP monitor validation

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jay Vosburgh [ Upstream commit 21a75f0915dde8674708b39abfcda113911c49b1 ] The current logic in bond_arp_rcv will accept an incoming ARP for validation if (a) the receiving slave is either

[PATCH 4.4 029/342] ipv4: fix memory leaks in ip_cmsg_send() callers

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 919483096bfe75dda338e98d56da91a263746a0a ] Dmitry reported memory leaks of IP options allocated in ip_cmsg_send() when/if this function

[PATCH 4.4 029/342] ipv4: fix memory leaks in ip_cmsg_send() callers

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 919483096bfe75dda338e98d56da91a263746a0a ] Dmitry reported memory leaks of IP options allocated in ip_cmsg_send() when/if this function returns an error.

[PATCH 4.4 003/342] net: dp83640: Fix tx timestamp overflow handling.

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Manfred Rudigier [ Upstream commit 81e8f2e930fe76b9814c71b9d87c30760b5eb705 ] PHY status frames are not reliable, the PHY may not be able to send them during heavy

[PATCH 4.4 003/342] net: dp83640: Fix tx timestamp overflow handling.

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Manfred Rudigier [ Upstream commit 81e8f2e930fe76b9814c71b9d87c30760b5eb705 ] PHY status frames are not reliable, the PHY may not be able to send them during heavy receive traffic. This

[PATCH 3.14 118/130] rfkill: fix rfkill_fop_read wait_event usage

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Johannes Berg commit 6736fde9672ff6717ac576e9bba2fd5f3dfec822 upstream. The code within wait_event_interruptible() is called with !TASK_RUNNING, so mustn't call any

[PATCH 4.4 009/342] sctp: allow setting SCTP_SACK_IMMEDIATELY by the application

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Marcelo Ricardo Leitner [ Upstream commit 27f7ed2b11d42ab6d796e96533c2076ec220affc ] This patch extends commit b93d6471748d ("sctp: implement the sender side for

[PATCH 4.4 001/342] af_iucv: Validate socket address length in iucv_sock_bind()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ursula Braun [ Upstream commit 52a82e23b9f2a9e1d429c5207f8575784290d008 ] Signed-off-by: Ursula Braun Reported-by: Dmitry Vyukov

[PATCH 3.14 118/130] rfkill: fix rfkill_fop_read wait_event usage

2016-03-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Johannes Berg commit 6736fde9672ff6717ac576e9bba2fd5f3dfec822 upstream. The code within wait_event_interruptible() is called with !TASK_RUNNING, so mustn't call any functions that can sleep,

[PATCH 4.4 009/342] sctp: allow setting SCTP_SACK_IMMEDIATELY by the application

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Marcelo Ricardo Leitner [ Upstream commit 27f7ed2b11d42ab6d796e96533c2076ec220affc ] This patch extends commit b93d6471748d ("sctp: implement the sender side for SACK-IMMEDIATELY extension")

[PATCH 4.4 001/342] af_iucv: Validate socket address length in iucv_sock_bind()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ursula Braun [ Upstream commit 52a82e23b9f2a9e1d429c5207f8575784290d008 ] Signed-off-by: Ursula Braun Reported-by: Dmitry Vyukov Reviewed-by: Evgeny Cherkashin Signed-off-by: David S.

[PATCH 4.4 013/342] switchdev: Require RTNL mutex to be held when sending FDB notifications

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ido Schimmel [ Upstream commit 4f2c6ae5c64c353fb1b0425e4747e5603feadba1 ] When switchdev drivers process FDB notifications from the underlying device they resolve the

[PATCH 4.4 013/342] switchdev: Require RTNL mutex to be held when sending FDB notifications

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ido Schimmel [ Upstream commit 4f2c6ae5c64c353fb1b0425e4747e5603feadba1 ] When switchdev drivers process FDB notifications from the underlying device they resolve the netdev to which the entry

[PATCH 4.4 006/342] tcp: fix NULL deref in tcp_v4_send_ack()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit e62a123b8ef7c5dc4db2c16383d506860ad21b47 ] Neal reported crashes with this stack trace : RIP: 0010:[] tcp_v4_send_ack+0x41/0x20f ... CR2:

[PATCH 4.4 006/342] tcp: fix NULL deref in tcp_v4_send_ack()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit e62a123b8ef7c5dc4db2c16383d506860ad21b47 ] Neal reported crashes with this stack trace : RIP: 0010:[] tcp_v4_send_ack+0x41/0x20f ... CR2: 0018

[PATCH 4.4 000/342] 4.4.4-stable review

2016-03-01 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.4.4 release. There are 342 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu Mar 3 23:44:48 UTC 2016. Anything

[PATCH 4.4 008/342] pptp: fix illegal memory access caused by multiple bind()s

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Hannes Frederic Sowa [ Upstream commit 9a368aff9cb370298fa02feeffa861f2db497c18 ] Several times already this has been reported as kasan reports caused by syzkaller

[PATCH 4.4 004/342] tunnels: Allow IPv6 UDP checksums to be correctly controlled.

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Gross [ Upstream commit 35e2d1152b22eae99c961affbe85374bef05a775 ] When configuring checksums on UDP tunnels, the flags are different for IPv4 vs. IPv6 (and reversed).

[PATCH 4.4 000/342] 4.4.4-stable review

2016-03-01 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.4.4 release. There are 342 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu Mar 3 23:44:48 UTC 2016. Anything

[PATCH 4.4 008/342] pptp: fix illegal memory access caused by multiple bind()s

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Hannes Frederic Sowa [ Upstream commit 9a368aff9cb370298fa02feeffa861f2db497c18 ] Several times already this has been reported as kasan reports caused by syzkaller and trinity and people

[PATCH 4.4 004/342] tunnels: Allow IPv6 UDP checksums to be correctly controlled.

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Gross [ Upstream commit 35e2d1152b22eae99c961affbe85374bef05a775 ] When configuring checksums on UDP tunnels, the flags are different for IPv4 vs. IPv6 (and reversed). However, when

[PATCH 4.4 041/342] route: check and remove route cache when we get route

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit deed49df7390d5239024199e249190328f1651e7 ] Since the gc of ipv4 route was removed, the route cached would has no chance to be removed, and even

[PATCH 4.4 014/342] tcp: beware of alignments in tcp_get_info()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit ff5d749772018602c47509bdc0093ff72acd82ec ] With some combinations of user provided flags in netlink command, it is possible to call

[PATCH 4.4 041/342] route: check and remove route cache when we get route

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Xin Long [ Upstream commit deed49df7390d5239024199e249190328f1651e7 ] Since the gc of ipv4 route was removed, the route cached would has no chance to be removed, and even it has been timeout,

[PATCH 4.4 014/342] tcp: beware of alignments in tcp_get_info()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit ff5d749772018602c47509bdc0093ff72acd82ec ] With some combinations of user provided flags in netlink command, it is possible to call tcp_get_info() with a buffer

[PATCH 4.4 016/342] ipv6/udp: use sticky pktinfo egress ifindex on connect()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 1cdda91871470f15e79375991bd2eddc6e86ddb1 ] Currently, the egress interface index specified via IPV6_PKTINFO is ignored by

[PATCH 4.4 016/342] ipv6/udp: use sticky pktinfo egress ifindex on connect()

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 1cdda91871470f15e79375991bd2eddc6e86ddb1 ] Currently, the egress interface index specified via IPV6_PKTINFO is ignored by __ip6_datagram_connect(), so that RFC

[PATCH 4.4 042/342] tcp/dccp: fix another race at listener dismantle

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 7716682cc58e305e22207d5bb315f26af6b1e243 ] Ilya reported following lockdep splat: kernel: = kernel: [ BUG: held

[PATCH 4.4 044/342] rtnl: RTM_GETNETCONF: fix wrong return value

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Anton Protopopov [ Upstream commit a97eb33ff225f34a8124774b3373fd244f0e83ce ] An error response from a RTM_GETNETCONF request can return the positive error value

[PATCH 4.4 045/342] tipc: unlock in error path

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Insu Yun [ Upstream commit b53ce3e7d407aa4196877a48b8601181162ab158 ] tipc_bcast_unlock need to be unlocked in error path. Signed-off-by: Insu Yun

[PATCH 4.4 042/342] tcp/dccp: fix another race at listener dismantle

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 7716682cc58e305e22207d5bb315f26af6b1e243 ] Ilya reported following lockdep splat: kernel: = kernel: [ BUG: held lock freed! ] kernel:

[PATCH 4.4 044/342] rtnl: RTM_GETNETCONF: fix wrong return value

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Anton Protopopov [ Upstream commit a97eb33ff225f34a8124774b3373fd244f0e83ce ] An error response from a RTM_GETNETCONF request can return the positive error value EINVAL in the struct nlmsgerr

[PATCH 4.4 045/342] tipc: unlock in error path

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Insu Yun [ Upstream commit b53ce3e7d407aa4196877a48b8601181162ab158 ] tipc_bcast_unlock need to be unlocked in error path. Signed-off-by: Insu Yun Signed-off-by: David S. Miller

Re: [RESEND PATCH] ASoC: atmel_ssc_dai: distinguish the different SSC

2016-03-01 Thread Mark Brown
On Tue, Mar 01, 2016 at 10:54:29AM +0100, Nicolas Ferre wrote: > > Signed-off-by: Songjun Wu > Acked-by: Nicolas Ferre > --- I can't look at patches that aren't signed off, please see SubmittingPatches for details. signature.asc Description:

[PATCH 4.4 027/342] bpf: fix branch offset adjustment on backjumps after patching ctx expansion

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit a1b14d27ed0965838350f1377ff97c93ee383492 ] When ctx access is used, the kernel often needs to expand/rewrite instructions, so after that

[PATCH 4.4 021/342] net:Add sysctl_max_skb_frags

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Hans Westgaard Ry [ Upstream commit 5f74f82ea34c0da80ea0b49192bb5ea06e063593 ] Devices may have limits on the number of fragments in an skb they support. Current

[PATCH 4.4 040/342] net_sched fix: reclassification needs to consider ether protocol changes

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jamal Hadi Salim [ Upstream commit 619fe32640b4b01f370574d50344ae0f62689816 ] actions could change the etherproto in particular with ethernet tunnelled data. Typically such

[PATCH 4.4 022/342] tg3: Fix for tg3 transmit queue 0 timed out when too many gso_segs

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Siva Reddy Kallam [ Upstream commit b7d987295c74500b733a0ba07f9a9bcc4074fa83 ] tg3_tso_bug() can hit a condition where the entire tx ring is not big enough to segment

Re: [PATCH] mmc: dw_mmc-rockchip: fix failing to mount partition with "discard"

2016-03-01 Thread Jaehoon Chung
Hi Shawn. On 03/01/2016 04:12 PM, Shawn Lin wrote: > Without MMC_CAP_ERASE support, we fail to mount partition > with "discard" option since mmc_queue_setup_discard is limited > for checking mmc_can_erase. Without doing mmc_queue_setup_discard, > blk_queue_discard fails to test QUEUE_FLAG_DISCARD

Re: [RESEND PATCH] ASoC: atmel_ssc_dai: distinguish the different SSC

2016-03-01 Thread Mark Brown
On Tue, Mar 01, 2016 at 10:54:29AM +0100, Nicolas Ferre wrote: > > Signed-off-by: Songjun Wu > Acked-by: Nicolas Ferre > --- I can't look at patches that aren't signed off, please see SubmittingPatches for details. signature.asc Description: PGP signature

[PATCH 4.4 027/342] bpf: fix branch offset adjustment on backjumps after patching ctx expansion

2016-03-01 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit a1b14d27ed0965838350f1377ff97c93ee383492 ] When ctx access is used, the kernel often needs to expand/rewrite instructions, so after that patching, branch

<    2   3   4   5   6   7   8   9   10   11   >