[PATCH 4.4 13/73] net/mlx5e: Fix minimum MTU

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit d8edd2469ace550db707798180d1c84d81f93bca ] Minimum MTU that can be set in Connectx4 device is 68. This fixes the case where a user wants

[PATCH 4.4 13/73] net/mlx5e: Fix minimum MTU

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit d8edd2469ace550db707798180d1c84d81f93bca ] Minimum MTU that can be set in Connectx4 device is 68. This fixes the case where a user wants to set invalid MTU,

[PATCH 4.4 01/73] decnet: Do not build routes to devices without decnet private data.

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit a36a0d4008488fa545c74445d69eaf56377d5d4e ] In particular, make sure we check for decnet private presence for loopback devices.

[PATCH 4.4 01/73] decnet: Do not build routes to devices without decnet private data.

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit a36a0d4008488fa545c74445d69eaf56377d5d4e ] In particular, make sure we check for decnet private presence for loopback devices. Signed-off-by: David S.

[PATCH 4.4 00/73] 4.4.11-stable review

2016-05-16 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.4.11 release. There are 73 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu May 19 01:14:33 UTC 2016. Anything

[PATCH 4.4 00/73] 4.4.11-stable review

2016-05-16 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.4.11 release. There are 73 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu May 19 01:14:33 UTC 2016. Anything

Re: [PATCH] usb: xhci-mtk: fixup mouse wakeup failure during system suspend

2016-05-16 Thread chunfeng yun
On Wed, 2016-05-04 at 14:56 +0300, Felipe Balbi wrote: > Hi, > > chunfeng yun writes: > >> chunfeng yun writes: > >> > On Tue, 2016-05-03 at 12:33 +0300, Felipe Balbi wrote: > >> >> Hi, > >> >> > >> >> chunfeng yun

[PATCH 4.4 15/73] net/mlx4_en: fix spurious timestamping callbacks

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit fc96256c906362e845d848d0f6a6354450059e81 ] When multiple skb are TX-completed in a row, we might incorrectly keep a timestamp of a prior skb

Re: [PATCH] usb: xhci-mtk: fixup mouse wakeup failure during system suspend

2016-05-16 Thread chunfeng yun
On Wed, 2016-05-04 at 14:56 +0300, Felipe Balbi wrote: > Hi, > > chunfeng yun writes: > >> chunfeng yun writes: > >> > On Tue, 2016-05-03 at 12:33 +0300, Felipe Balbi wrote: > >> >> Hi, > >> >> > >> >> chunfeng yun writes: > >> >> >> chunfeng yun writes: > >> >> >> > On Thu, 2016-04-21 at

[PATCH 4.4 15/73] net/mlx4_en: fix spurious timestamping callbacks

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit fc96256c906362e845d848d0f6a6354450059e81 ] When multiple skb are TX-completed in a row, we might incorrectly keep a timestamp of a prior skb and cause extra

[PATCH 4.4 16/73] bpf: fix double-fdput in replace_map_fd_with_map_ptr()

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jann Horn [ Upstream commit 8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 ] When bpf(BPF_PROG_LOAD, ...) was invoked with a BPF program whose bytecode references a non-map file

[PATCH 4.4 16/73] bpf: fix double-fdput in replace_map_fd_with_map_ptr()

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jann Horn [ Upstream commit 8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 ] When bpf(BPF_PROG_LOAD, ...) was invoked with a BPF program whose bytecode references a non-map file descriptor as a map

[PATCH 4.4 19/73] samples/bpf: fix trace_output example

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 569cc39d39385a74b23145496bca2df5ac8b2fb8 ] llvm cannot always recognize memset as builtin function and optimize it away, so just delete it. It

[PATCH 4.4 19/73] samples/bpf: fix trace_output example

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 569cc39d39385a74b23145496bca2df5ac8b2fb8 ] llvm cannot always recognize memset as builtin function and optimize it away, so just delete it. It was a

[PATCH 4.4 17/73] bpf: fix refcnt overflow

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 92117d8443bc5afacc8d5ba82e541946310f106e ] On a system with >32Gbyte of phyiscal memory and infinite RLIMIT_MEMLOCK, the malicious application

[PATCH 4.4 18/73] bpf: fix check_map_func_compatibility logic

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 6aff67c85c9e5a4bc99e5211c1bac547936626ca ] The commit 35578d798400 ("bpf: Implement function bpf_perf_event_read() that get the selected

[PATCH 4.4 02/73] route: do not cache fib route info on local routes with oif

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Chris Friesen [ Upstream commit d6d5e999e5df67f8ec20b6be45e2229455ee3699 ] For local routes that require a particular output interface we do not want to cache the

[PATCH 4.4 17/73] bpf: fix refcnt overflow

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 92117d8443bc5afacc8d5ba82e541946310f106e ] On a system with >32Gbyte of phyiscal memory and infinite RLIMIT_MEMLOCK, the malicious application may overflow

[PATCH 4.4 18/73] bpf: fix check_map_func_compatibility logic

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 6aff67c85c9e5a4bc99e5211c1bac547936626ca ] The commit 35578d798400 ("bpf: Implement function bpf_perf_event_read() that get the selected hardware PMU

[PATCH 4.4 02/73] route: do not cache fib route info on local routes with oif

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Chris Friesen [ Upstream commit d6d5e999e5df67f8ec20b6be45e2229455ee3699 ] For local routes that require a particular output interface we do not want to cache the result. Caching the result

[PATCH 4.4 21/73] gre: do not pull header in ICMP error processing

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jiri Benc [ Upstream commit b7f8fe251e4609e2a437bd2c2dea01e61db6849c ] iptunnel_pull_header expects that IP header was already pulled; with this expectation, it pulls the

[PATCH 4.4 11/73] openvswitch: use flow protocol when recalculating ipv6 checksums

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Simon Horman [ Upstream commit b4f70527f052b0c00be4d7cac562baa75b212df5 ] When using masked actions the ipv6_proto field of an action to set IPv6 fields may be zero

[PATCH 4.4 12/73] net/mlx5e: Devices mtu field is u16 and not int

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit 046339eaab26804f52f6604877f5674f70815b26 ] For set/query MTU port firmware commands the MTU field is 16 bits, here I changed all the "int

[PATCH 4.4 08/73] net: use skb_postpush_rcsum instead of own implementations

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit 6b83d28a55a891a9d70fc61ccb1c138e47dcbe74 ] Replace individual implementations with the recently introduced skb_postpush_rcsum() helper.

[PATCH 4.4 21/73] gre: do not pull header in ICMP error processing

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jiri Benc [ Upstream commit b7f8fe251e4609e2a437bd2c2dea01e61db6849c ] iptunnel_pull_header expects that IP header was already pulled; with this expectation, it pulls the tunnel header. This

[PATCH 4.4 11/73] openvswitch: use flow protocol when recalculating ipv6 checksums

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Simon Horman [ Upstream commit b4f70527f052b0c00be4d7cac562baa75b212df5 ] When using masked actions the ipv6_proto field of an action to set IPv6 fields may be zero rather than the prevailing

[PATCH 4.4 12/73] net/mlx5e: Devices mtu field is u16 and not int

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit 046339eaab26804f52f6604877f5674f70815b26 ] For set/query MTU port firmware commands the MTU field is 16 bits, here I changed all the "int mtu" parameters of

[PATCH 4.4 08/73] net: use skb_postpush_rcsum instead of own implementations

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit 6b83d28a55a891a9d70fc61ccb1c138e47dcbe74 ] Replace individual implementations with the recently introduced skb_postpush_rcsum() helper. Signed-off-by: Daniel

[PATCH 4.4 04/73] net: sched: do not requeue a NULL skb

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Lars Persson [ Upstream commit 3dcd493fbebfd631913df6e2773cc295d3bf7d22 ] A failure in validate_xmit_skb_list() triggered an unconditional call to dev_requeue_skb with

[PATCH 4.4 03/73] packet: fix heap info leak in PACKET_DIAG_MCLIST sock_diag interface

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Mathias Krause [ Upstream commit 309cf37fe2a781279b7675d4bb7173198e532867 ] Because we miss to wipe the remainder of i->addr[] in packet_mc_add(), pdiag_put_mclist()

[PATCH 4.4 04/73] net: sched: do not requeue a NULL skb

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Lars Persson [ Upstream commit 3dcd493fbebfd631913df6e2773cc295d3bf7d22 ] A failure in validate_xmit_skb_list() triggered an unconditional call to dev_requeue_skb with skb=NULL. This slowly

[PATCH 4.4 03/73] packet: fix heap info leak in PACKET_DIAG_MCLIST sock_diag interface

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Mathias Krause [ Upstream commit 309cf37fe2a781279b7675d4bb7173198e532867 ] Because we miss to wipe the remainder of i->addr[] in packet_mc_add(), pdiag_put_mclist() leaks uninitialized heap

perf probe -L on ubuntu 16.04

2016-05-16 Thread Arnaldo Carvalho de Melo
Hi Masami, Have you ever tried using 'perf probe' on ubuntu? acme@ubuntu:~/git/linux$ sudo apt-cache search linux-image-$(uname -r) linux-image-4.4.0-21-generic - Linux kernel image for version 4.4.0 on 64 bit x86 SMP linux-image-4.4.0-21-generic-dbgsym - Linux kernel debug image for

perf probe -L on ubuntu 16.04

2016-05-16 Thread Arnaldo Carvalho de Melo
Hi Masami, Have you ever tried using 'perf probe' on ubuntu? acme@ubuntu:~/git/linux$ sudo apt-cache search linux-image-$(uname -r) linux-image-4.4.0-21-generic - Linux kernel image for version 4.4.0 on 64 bit x86 SMP linux-image-4.4.0-21-generic-dbgsym - Linux kernel debug image for

[PATCH 4.4 31/73] VSOCK: do not disconnect socket when peer has shutdown SEND only

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ian Campbell [ Upstream commit dedc58e067d8c379a15a8a183c5db318201295bb ] The peer may be expecting a reply having sent a request and then done a shutdown(SHUT_WR), so

[PATCH 4.4 22/73] net_sched: introduce qdisc_replace() helper

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit 86a7996cc8a078793670d82ed97d5a99bb4e8496 ] Remove nearly duplicated code and prepare for the following patch. Cc: Jamal Hadi Salim

[PATCH 4.4 22/73] net_sched: introduce qdisc_replace() helper

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit 86a7996cc8a078793670d82ed97d5a99bb4e8496 ] Remove nearly duplicated code and prepare for the following patch. Cc: Jamal Hadi Salim Acked-by: Jamal Hadi Salim

[PATCH 4.4 31/73] VSOCK: do not disconnect socket when peer has shutdown SEND only

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ian Campbell [ Upstream commit dedc58e067d8c379a15a8a183c5db318201295bb ] The peer may be expecting a reply having sent a request and then done a shutdown(SHUT_WR), so tearing down the whole

[PATCH 4.4 26/73] netem: Segment GSO packets on enqueue

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Neil Horman [ Upstream commit 6071bd1aa13ed9e41824bafad845b7b7f4df5cfd ] This was recently reported to me, and reproduced on the latest net kernel, when attempting to

[PATCH 4.4 10/73] atl2: Disable unimplemented scatter/gather feature

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ben Hutchings [ Upstream commit f43bfaeddc79effbf3d0fcb53ca477cca66f3db8 ] atl2 includes NETIF_F_SG in hw_features even though it has no support for non-linear skbs.

[PATCH 4.4 24/73] sch_htb: update backlog as well

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit 431e3a8e36a05a37126f34b41aa3a5a6456af04e ] We saw qlen!=0 but backlog==0 on our production machine: qdisc htb 1: dev eth0 root refcnt 2

[PATCH 4.4 10/73] atl2: Disable unimplemented scatter/gather feature

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ben Hutchings [ Upstream commit f43bfaeddc79effbf3d0fcb53ca477cca66f3db8 ] atl2 includes NETIF_F_SG in hw_features even though it has no support for non-linear skbs. This bug was originally

[PATCH 4.4 24/73] sch_htb: update backlog as well

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit 431e3a8e36a05a37126f34b41aa3a5a6456af04e ] We saw qlen!=0 but backlog==0 on our production machine: qdisc htb 1: dev eth0 root refcnt 2 r2q 10 default 1

[PATCH 4.4 26/73] netem: Segment GSO packets on enqueue

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Neil Horman [ Upstream commit 6071bd1aa13ed9e41824bafad845b7b7f4df5cfd ] This was recently reported to me, and reproduced on the latest net kernel, when attempting to run netperf from a host

[PATCH 4.4 23/73] net_sched: update hierarchical backlog too

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit 2f5fb43ff62b2b96cc58d95fc0b3596516e4 ] When the bottom qdisc decides to, for example, drop some packet, it calls

[PATCH 4.4 25/73] sch_dsmark: update backlog as well

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit bdf17661f63a79c3cb4209b970b1cc39e34f7543 ] Similarly, we need to update backlog too when we update qlen. Cc: Jamal Hadi Salim

[PATCH 4.4 23/73] net_sched: update hierarchical backlog too

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit 2f5fb43ff62b2b96cc58d95fc0b3596516e4 ] When the bottom qdisc decides to, for example, drop some packet, it calls qdisc_tree_decrease_qlen() to update the queue

[PATCH 4.4 25/73] sch_dsmark: update backlog as well

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: WANG Cong [ Upstream commit bdf17661f63a79c3cb4209b970b1cc39e34f7543 ] Similarly, we need to update backlog too when we update qlen. Cc: Jamal Hadi Salim Signed-off-by: Cong Wang

[PATCH 4.4 09/73] vlan: pull on __vlan_insert_tag error path and fix csum correction

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit 9241e2df4fbc648a92ea0752918e05c26255649e ] When __vlan_insert_tag() fails from skb_vlan_push() path due to the skb_cow_head(), we need

[PATCH 4.4 09/73] vlan: pull on __vlan_insert_tag error path and fix csum correction

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit 9241e2df4fbc648a92ea0752918e05c26255649e ] When __vlan_insert_tag() fails from skb_vlan_push() path due to the skb_cow_head(), we need to undo the

[PATCH 4.4 05/73] bpf/verifier: reject invalid LD_ABS | BPF_DW instruction

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit d82bccc69041a51f7b7b9b4a36db0772f4cdba21 ] verifier must check for reserved size bits in instruction opcode and reject BPF_LD | BPF_ABS |

[PATCH 4.4 05/73] bpf/verifier: reject invalid LD_ABS | BPF_DW instruction

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit d82bccc69041a51f7b7b9b4a36db0772f4cdba21 ] verifier must check for reserved size bits in instruction opcode and reject BPF_LD | BPF_ABS | BPF_DW and BPF_LD

[PATCH 4.4 30/73] net/mlx4_en: Fix endianness bug in IPV6 csum calculation

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Jurgens [ Upstream commit 82d69203df634b4dfa765c94f60ce9482bcc44d6 ] Use htons instead of unconditionally byte swapping nexthdr. On a little endian systems

[PATCH 4.4 36/73] net: thunderx: avoid exposing kernel stack

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "xypron.g...@gmx.de" [ Upstream commit 161de2caf68c549c266e571ffba8e2163886fb10 ] Reserved fields should be set to zero to avoid exposing bits from the kernel stack.

[PATCH 4.4 30/73] net/mlx4_en: Fix endianness bug in IPV6 csum calculation

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Jurgens [ Upstream commit 82d69203df634b4dfa765c94f60ce9482bcc44d6 ] Use htons instead of unconditionally byte swapping nexthdr. On a little endian systems shifting the byte is correct

[PATCH 4.4 36/73] net: thunderx: avoid exposing kernel stack

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "xypron.g...@gmx.de" [ Upstream commit 161de2caf68c549c266e571ffba8e2163886fb10 ] Reserved fields should be set to zero to avoid exposing bits from the kernel stack. Signed-off-by: Heinrich

[PATCH 4.4 37/73] tcp: refresh skb timestamp at retransmit time

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 10a81980fc47e64ffac26a073139813d3f697b64 ] In the very unlikely case __tcp_retransmit_skb() can not use the cloning done in

[PATCH 4.4 37/73] tcp: refresh skb timestamp at retransmit time

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 10a81980fc47e64ffac26a073139813d3f697b64 ] In the very unlikely case __tcp_retransmit_skb() can not use the cloning done in tcp_transmit_skb(), we need to

Re: [PATCH v2 1/2] Documentation: DT: bindings: Add Broadcom STB PCIe bindings

2016-05-16 Thread Florian Fainelli
On 05/11/2016 07:45 AM, Bharat Kumar Gogada wrote: >> +- brcm,log2-scb-sizes: log2 size of the SCB window that is mapped to >> +PCIe space >> + there must be exactly one value per memory controller present in the >> +system >> + (ranges from 1 to 3) > > Can you please give more insight on what

Re: [PATCH v2 1/2] Documentation: DT: bindings: Add Broadcom STB PCIe bindings

2016-05-16 Thread Florian Fainelli
On 05/11/2016 07:45 AM, Bharat Kumar Gogada wrote: >> +- brcm,log2-scb-sizes: log2 size of the SCB window that is mapped to >> +PCIe space >> + there must be exactly one value per memory controller present in the >> +system >> + (ranges from 1 to 3) > > Can you please give more insight on what

Re: [PATCH 2/2] net: ethernet: ftgmac100: use phy_ethtool_{get|set}_link_ksettings

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:35:14 +0200 > There are two generics functions phy_ethtool_{get|set}_link_ksettings, > so we can use them instead of defining the same code in the driver. > > Signed-off-by: Philippe Reynes Applied.

Re: [PATCH 1/2] net: ethernet: ftgmac100: use phydev from struct net_device

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:35:13 +0200 > The private structure contain a pointer to phydev, but the structure > net_device already contain such pointer. So we can remove the pointer > phydev in the private structure, and update the driver to use the > one

Re: [PATCH 2/2] net: ethernet: ftgmac100: use phy_ethtool_{get|set}_link_ksettings

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:35:14 +0200 > There are two generics functions phy_ethtool_{get|set}_link_ksettings, > so we can use them instead of defining the same code in the driver. > > Signed-off-by: Philippe Reynes Applied.

Re: [PATCH 1/2] net: ethernet: ftgmac100: use phydev from struct net_device

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:35:13 +0200 > The private structure contain a pointer to phydev, but the structure > net_device already contain such pointer. So we can remove the pointer > phydev in the private structure, and update the driver to use the > one contained in struct

Re: [PATCH 1/2] net: ethernet: gianfar: use phydev from struct net_device

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:30:08 +0200 > The private structure contain a pointer to phydev, but the structure > net_device already contain such pointer. So we can remove the pointer > phydev in the private structure, and update the driver to use the > one

[PATCH 4.4 35/73] net: fix a kernel infoleak in x25 module

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Kangjie Lu [ Upstream commit 79e48650320e6fba48369fccf13fd045315b19b8 ] Stack object "dte_facilities" is allocated in x25_rx_call_request(), which is supposed to be

Re: [PATCH 2/2] net: ethernet: gianfar: use phy_ethtool_{get|set}_link_ksettings

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:30:09 +0200 > There are two generics functions phy_ethtool_{get|set}_link_ksettings, > so we can use them instead of defining the same code in the driver. > > Signed-off-by: Philippe Reynes Applied.

Re: [PATCH 1/2] net: ethernet: gianfar: use phydev from struct net_device

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:30:08 +0200 > The private structure contain a pointer to phydev, but the structure > net_device already contain such pointer. So we can remove the pointer > phydev in the private structure, and update the driver to use the > one contained in struct

[PATCH 4.4 35/73] net: fix a kernel infoleak in x25 module

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Kangjie Lu [ Upstream commit 79e48650320e6fba48369fccf13fd045315b19b8 ] Stack object "dte_facilities" is allocated in x25_rx_call_request(), which is supposed to be initialized in

Re: [PATCH 2/2] net: ethernet: gianfar: use phy_ethtool_{get|set}_link_ksettings

2016-05-16 Thread David Miller
From: Philippe Reynes Date: Mon, 16 May 2016 01:30:09 +0200 > There are two generics functions phy_ethtool_{get|set}_link_ksettings, > so we can use them instead of defining the same code in the driver. > > Signed-off-by: Philippe Reynes Applied.

[PATCH 4.4 38/73] net/route: enforce hoplimit max value

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 626abd59e51d4d8c6367e03aae252a8aa759ac78 ] Currently, when creating or updating a route, no check is performed in both ipv4 and ipv6 code to

[PATCH 4.4 39/73] ocfs2: revert using ocfs2_acl_chmod to avoid inode cluster lock hang

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Junxiao Bi commit 5ee0fbd50fdf1c1329de8bee35ea9d7c6a81a2e0 upstream. Commit 743b5f1434f5 ("ocfs2: take inode lock in ocfs2_iop_set/get_acl()") introduced this issue.

[PATCH 4.4 40/73] ocfs2: fix posix_acl_create deadlock

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Junxiao Bi commit c25a1e0671fbca7b2c0d0757d533bd2650d6dc0c upstream. Commit 702e5bc68ad2 ("ocfs2: use generic posix ACL infrastructure") refactored code to use

[PATCH 4.4 38/73] net/route: enforce hoplimit max value

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 626abd59e51d4d8c6367e03aae252a8aa759ac78 ] Currently, when creating or updating a route, no check is performed in both ipv4 and ipv6 code to the hoplimit value.

[PATCH 4.4 39/73] ocfs2: revert using ocfs2_acl_chmod to avoid inode cluster lock hang

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Junxiao Bi commit 5ee0fbd50fdf1c1329de8bee35ea9d7c6a81a2e0 upstream. Commit 743b5f1434f5 ("ocfs2: take inode lock in ocfs2_iop_set/get_acl()") introduced this issue. ocfs2_setattr called by

[PATCH 4.4 40/73] ocfs2: fix posix_acl_create deadlock

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Junxiao Bi commit c25a1e0671fbca7b2c0d0757d533bd2650d6dc0c upstream. Commit 702e5bc68ad2 ("ocfs2: use generic posix ACL infrastructure") refactored code to use posix_acl_create. The problem

Re: [PATCH v2 2/2] pci: host: Add Broadcom STB PCIE RC controller

2016-05-16 Thread Florian Fainelli
On 05/11/2016 07:47 AM, Bharat Kumar Gogada wrote: [snip] >> +/* Get the value for the log2 of the scb sizes. Subtract 15 from >> + * each because the target register field has 0==disabled and 1==6KB. >> + */ >> +log2_scb_sizes = of_get_property(dn, "brcm,log2-scb-sizes", ); >> +

Re: [PATCH v2 2/2] pci: host: Add Broadcom STB PCIE RC controller

2016-05-16 Thread Florian Fainelli
On 05/11/2016 07:47 AM, Bharat Kumar Gogada wrote: [snip] >> +/* Get the value for the log2 of the scb sizes. Subtract 15 from >> + * each because the target register field has 0==disabled and 1==6KB. >> + */ >> +log2_scb_sizes = of_get_property(dn, "brcm,log2-scb-sizes", ); >> +

[PATCH 4.4 44/73] crypto: hash - Fix page length clamping in hash walk

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu commit 13f4bb78cf6a312bbdec367ba3da044b09bf0e29 upstream. The crypto hash walk code is broken when supplied with an offset greater than or equal to

[PATCH 4.4 44/73] crypto: hash - Fix page length clamping in hash walk

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu commit 13f4bb78cf6a312bbdec367ba3da044b09bf0e29 upstream. The crypto hash walk code is broken when supplied with an offset greater than or equal to PAGE_SIZE. This patch fixes it

[PATCH 4.4 43/73] crypto: qat - fix invalid pf2vf_resp_wq logic

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Tadeusz Struk commit 9e209fcfb804da262e38e5cd2e680c47a41f0f95 upstream. The pf2vf_resp_wq is a global so it has to be created at init and destroyed at exit, instead of

[PATCH 4.4 43/73] crypto: qat - fix invalid pf2vf_resp_wq logic

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Tadeusz Struk commit 9e209fcfb804da262e38e5cd2e680c47a41f0f95 upstream. The pf2vf_resp_wq is a global so it has to be created at init and destroyed at exit, instead of per device. Tested-by:

[PATCH 4.4 42/73] s390/mm: fix asce_bits handling with dynamic pagetable levels

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Gerald Schaefer commit 723cacbd9dc79582e562c123a0bacf8bfc69e72a upstream. There is a race with multi-threaded applications between context switch and pagetable

[PATCH 4.4 41/73] zsmalloc: fix zs_can_compact() integer overflow

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Sergey Senozhatsky commit 44f43e99fe70833058482d183e99fdfd11220996 upstream. zs_can_compact() has two race conditions in its core calculation: unsigned long

[PATCH 4.4 41/73] zsmalloc: fix zs_can_compact() integer overflow

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Sergey Senozhatsky commit 44f43e99fe70833058482d183e99fdfd11220996 upstream. zs_can_compact() has two race conditions in its core calculation: unsigned long obj_wasted = zs_stat_get(class,

[PATCH 4.4 42/73] s390/mm: fix asce_bits handling with dynamic pagetable levels

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Gerald Schaefer commit 723cacbd9dc79582e562c123a0bacf8bfc69e72a upstream. There is a race with multi-threaded applications between context switch and pagetable upgrade. In switch_mm() a new

[PATCH 4.4 47/73] ALSA: usb-audio: Yet another Phoneix Audio device quirk

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Takashi Iwai commit 84add303ef950b8d85f54bc2248c2bc73467c329 upstream. Phoenix Audio has yet another device with another id (even a different vendor id, 0556:0014) that requires

[PATCH 4.4 47/73] ALSA: usb-audio: Yet another Phoneix Audio device quirk

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Takashi Iwai commit 84add303ef950b8d85f54bc2248c2bc73467c329 upstream. Phoenix Audio has yet another device with another id (even a different vendor id, 0556:0014) that requires the same quirk

[PATCH 4.4 46/73] ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Takashi Iwai commit 2d2c038af423e820d89db2b5d7774b67ba49 upstream. Phoenix Audio MT202pcs (1de7:0114) and MT202exe (1de7:0013) need the same workaround as TMX320 for

[PATCH 4.4 46/73] ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Takashi Iwai commit 2d2c038af423e820d89db2b5d7774b67ba49 upstream. Phoenix Audio MT202pcs (1de7:0114) and MT202exe (1de7:0013) need the same workaround as TMX320 for avoiding the firmware

[PATCH 4.5 017/101] net/mlx5e: Use vport MTU rather than physical port MTU

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit cd255efff9baadd654d6160e52d17ae7c568c9d3 ] Set and report vport MTU rather than physical MTU, Driver will set both vport and physical port

[PATCH 4.4 45/73] crypto: testmgr - Use kmalloc memory for RSA input

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu commit df27b26f04ed388ff4cc2b5d8cfdb5d97678816f upstream. As akcipher uses an SG interface, you must not use vmalloc memory as input for it. This patch

[PATCH 4.5 017/101] net/mlx5e: Use vport MTU rather than physical port MTU

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit cd255efff9baadd654d6160e52d17ae7c568c9d3 ] Set and report vport MTU rather than physical MTU, Driver will set both vport and physical port mtu and will rely on

[PATCH 4.4 45/73] crypto: testmgr - Use kmalloc memory for RSA input

2016-05-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu commit df27b26f04ed388ff4cc2b5d8cfdb5d97678816f upstream. As akcipher uses an SG interface, you must not use vmalloc memory as input for it. This patch fixes testmgr to copy the

[PATCH 4.5 016/101] net/mlx5e: Fix minimum MTU

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit d8edd2469ace550db707798180d1c84d81f93bca ] Minimum MTU that can be set in Connectx4 device is 68. This fixes the case where a user wants

[PATCH 4.5 002/101] decnet: Do not build routes to devices without decnet private data.

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit a36a0d4008488fa545c74445d69eaf56377d5d4e ] In particular, make sure we check for decnet private presence for loopback devices.

[PATCH 4.5 021/101] bpf: fix refcnt overflow

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 92117d8443bc5afacc8d5ba82e541946310f106e ] On a system with >32Gbyte of phyiscal memory and infinite RLIMIT_MEMLOCK, the malicious application

[PATCH 4.5 016/101] net/mlx5e: Fix minimum MTU

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: Saeed Mahameed [ Upstream commit d8edd2469ace550db707798180d1c84d81f93bca ] Minimum MTU that can be set in Connectx4 device is 68. This fixes the case where a user wants to set invalid MTU,

[PATCH 4.5 002/101] decnet: Do not build routes to devices without decnet private data.

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: "David S. Miller" [ Upstream commit a36a0d4008488fa545c74445d69eaf56377d5d4e ] In particular, make sure we check for decnet private presence for loopback devices. Signed-off-by: David S.

[PATCH 4.5 021/101] bpf: fix refcnt overflow

2016-05-16 Thread Greg Kroah-Hartman
4.5-stable review patch. If anyone has any objections, please let me know. -- From: Alexei Starovoitov [ Upstream commit 92117d8443bc5afacc8d5ba82e541946310f106e ] On a system with >32Gbyte of phyiscal memory and infinite RLIMIT_MEMLOCK, the malicious application may overflow

<    1   2   3   4   5   6   7   8   9   10   >