Re: [PATCH v3 2/9] kexec_file: Generalize kexec_add_buffer.

2016-06-22 Thread Thiago Jung Bauermann
Am Mittwoch, 22 Juni 2016, 18:20:47 schrieb Dave Young: > The patch looks good, but could the subject be more specific? > > For example just like the first sentence of the patch descriotion: > Allow architectures to specify their own memory walking function Ok, What about this? I also changed

Re: [PATCH v3 2/9] kexec_file: Generalize kexec_add_buffer.

2016-06-22 Thread Thiago Jung Bauermann
Am Mittwoch, 22 Juni 2016, 18:20:47 schrieb Dave Young: > The patch looks good, but could the subject be more specific? > > For example just like the first sentence of the patch descriotion: > Allow architectures to specify their own memory walking function Ok, What about this? I also changed

[PATCH 3.14 11/29] wext: Fix 32 bit iwpriv compatibility issue with 64 bit Kernel

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Prasun Maiti commit 3d5fdff46c4b2b9534fa2f9fc78e90a48e0ff724 upstream. iwpriv app uses iw_point structure to send data to Kernel. The iw_point structure holds a

[PATCH 3.14 11/29] wext: Fix 32 bit iwpriv compatibility issue with 64 bit Kernel

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Prasun Maiti commit 3d5fdff46c4b2b9534fa2f9fc78e90a48e0ff724 upstream. iwpriv app uses iw_point structure to send data to Kernel. The iw_point structure holds a pointer. For compatibility

[PATCH 3.14 14/29] powerpc/pseries/eeh: Handle RTAS delay requests in configure_bridge

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Russell Currey commit 871e178e0f2c4fa788f694721a10b4758d494ce1 upstream. In the "ibm,configure-pe" and "ibm,configure-bridge" RTAS calls, the spec states that values of

[PATCH 3.14 14/29] powerpc/pseries/eeh: Handle RTAS delay requests in configure_bridge

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Russell Currey commit 871e178e0f2c4fa788f694721a10b4758d494ce1 upstream. In the "ibm,configure-pe" and "ibm,configure-bridge" RTAS calls, the spec states that values of 9900-9905 can be

[PATCH 3.14 00/29] 3.14.73-stable review

2016-06-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 3.14.73 release. There are 29 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri Jun 24 22:35:07 UTC 2016. Anything

[PATCH 3.14 00/29] 3.14.73-stable review

2016-06-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 3.14.73 release. There are 29 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri Jun 24 22:35:07 UTC 2016. Anything

[PATCH 3.14 12/29] fix d_walk()/non-delayed __d_free() race

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Al Viro commit 3d56c25e3bb0726a5c5e16fc2d9e38f8ed763085 upstream. Ascend-to-parent logics in d_walk() depends on all encountered child dentries not getting freed

[PATCH 3.14 16/29] netfilter: x_tables: make sure e->next_offset covers remaining blob size

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit 6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91 upstream. Otherwise this function may read data beyond the ruleset blob. Signed-off-by: Florian Westphal

[PATCH 3.14 12/29] fix d_walk()/non-delayed __d_free() race

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Al Viro commit 3d56c25e3bb0726a5c5e16fc2d9e38f8ed763085 upstream. Ascend-to-parent logics in d_walk() depends on all encountered child dentries not getting freed without an RCU delay.

[PATCH 3.14 16/29] netfilter: x_tables: make sure e->next_offset covers remaining blob size

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit 6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91 upstream. Otherwise this function may read data beyond the ruleset blob. Signed-off-by: Florian Westphal Signed-off-by:

[PATCH 3.14 15/29] netfilter: x_tables: validate e->target_offset early

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit bdf533de6968e9686df777dc178486f600c6e617 upstream. We should check that e->target_offset is sane before mark_source_chains gets called since it will

[PATCH 3.14 15/29] netfilter: x_tables: validate e->target_offset early

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit bdf533de6968e9686df777dc178486f600c6e617 upstream. We should check that e->target_offset is sane before mark_source_chains gets called since it will fetch the target

[PATCH 3.14 01/29] netlink: Fix dump skb leak/double free

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu [ Upstream commit 92964c79b357efd980812c4de5c1fd2ec8bb5520 ] When we free cb->skb after a dump, we do it after releasing the lock. This means that a

[PATCH 3.14 13/29] MIPS: Fix 64k page support for 32 bit kernels.

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Ralf Baechle commit d7de413475f443957a0c1d256e405d19b3a2cb22 upstream. TASK_SIZE was defined as 0x7fff8000UL which for 64k pages is not a multiple of the page size.

[PATCH 3.14 19/29] pipe: limit the per-user amount of pages allocated in pipes

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Willy Tarreau commit 759c01142a5d0f364a462346168a56de28a80f52 upstream. On no-so-small systems, it is possible for a single process to cause an OOM condition by filling large

[PATCH 3.14 06/29] crypto: ccp - Fix AES XTS error for request sizes above 4096

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Tom Lendacky commit ab6a11a7c8ef47f996974dd3c648c2c0b1a36ab1 upstream. The ccp-crypto module for AES XTS support has a bug that can allow requests greater than 4096

[PATCH 3.14 01/29] netlink: Fix dump skb leak/double free

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu [ Upstream commit 92964c79b357efd980812c4de5c1fd2ec8bb5520 ] When we free cb->skb after a dump, we do it after releasing the lock. This means that a new dump could have started in

[PATCH 3.14 13/29] MIPS: Fix 64k page support for 32 bit kernels.

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Ralf Baechle commit d7de413475f443957a0c1d256e405d19b3a2cb22 upstream. TASK_SIZE was defined as 0x7fff8000UL which for 64k pages is not a multiple of the page size. Somewhere further down

[PATCH 3.14 19/29] pipe: limit the per-user amount of pages allocated in pipes

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Willy Tarreau commit 759c01142a5d0f364a462346168a56de28a80f52 upstream. On no-so-small systems, it is possible for a single process to cause an OOM condition by filling large pipes with data

[PATCH 3.14 06/29] crypto: ccp - Fix AES XTS error for request sizes above 4096

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Tom Lendacky commit ab6a11a7c8ef47f996974dd3c648c2c0b1a36ab1 upstream. The ccp-crypto module for AES XTS support has a bug that can allow requests greater than 4096 bytes in size to be passed

[PATCH 3.14 02/29] sfc: on MC reset, clear PIO buffer linkage in TXQs

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Edward Cree [ Upstream commit c0795bf64cba4d1b796fdc5b74b33772841ed1bb ] Otherwise, if we fail to allocate new PIO buffers, our TXQs will try to use the old ones, which

[PATCH 3.14 03/29] tcp: record TLP and ER timer stats in v6 stats

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit ce3cf4ec0305919fc69a972f6c2b2efd35d36abc ] The v6 tcp stats scan do not provide TLP and ER timer information correctly like the v4 version .

[PATCH 0/3 v2] Certificate insertion support for x86 bzImages

2016-06-22 Thread Mehmet Kayaalp
These patches add support for modifying the reserved space for extra certificates in a compressed bzImage in x86. This allows separating the system keyring certificate from the kernel build process. After the kernel image is distributed, the insert-sys-cert script can be used to insert the

[PATCH 3.14 02/29] sfc: on MC reset, clear PIO buffer linkage in TXQs

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Edward Cree [ Upstream commit c0795bf64cba4d1b796fdc5b74b33772841ed1bb ] Otherwise, if we fail to allocate new PIO buffers, our TXQs will try to use the old ones, which aren't there any more.

[PATCH 3.14 03/29] tcp: record TLP and ER timer stats in v6 stats

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit ce3cf4ec0305919fc69a972f6c2b2efd35d36abc ] The v6 tcp stats scan do not provide TLP and ER timer information correctly like the v4 version . This patch fixes

[PATCH 0/3 v2] Certificate insertion support for x86 bzImages

2016-06-22 Thread Mehmet Kayaalp
These patches add support for modifying the reserved space for extra certificates in a compressed bzImage in x86. This allows separating the system keyring certificate from the kernel build process. After the kernel image is distributed, the insert-sys-cert script can be used to insert the

[PATCH 3.14 05/29] ARM: fix PTRACE_SETVFPREGS on SMP systems

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Russell King commit e2dfb4b880146bfd4b6aa8e138c0205407cebbaf upstream. PTRACE_SETVFPREGS fails to properly mark the VFP register set to be reloaded, because it

[PATCH 3.14 05/29] ARM: fix PTRACE_SETVFPREGS on SMP systems

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Russell King commit e2dfb4b880146bfd4b6aa8e138c0205407cebbaf upstream. PTRACE_SETVFPREGS fails to properly mark the VFP register set to be reloaded, because it undoes one of the effects of

[PATCH 3.14 07/29] powerpc: Fix definition of SIAR and SDAR registers

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Huth commit d23fac2b27d94aeb7b65536a50d32bfdc21fe01e upstream. The SIAR and SDAR registers are available twice, one time as SPRs 780 / 781 (unprivileged, but

[PATCH 3.14 21/29] netfilter: x_tables: validate targets of jumps

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit 36472341017529e2b12573093cc0f68719300997 upstream. When we see a jump also check that the offset gets us to beginning of a rule (an ipt_entry). The

[PATCH 3.14 07/29] powerpc: Fix definition of SIAR and SDAR registers

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Huth commit d23fac2b27d94aeb7b65536a50d32bfdc21fe01e upstream. The SIAR and SDAR registers are available twice, one time as SPRs 780 / 781 (unprivileged, but read-only), and one time

[PATCH 3.14 21/29] netfilter: x_tables: validate targets of jumps

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit 36472341017529e2b12573093cc0f68719300997 upstream. When we see a jump also check that the offset gets us to beginning of a rule (an ipt_entry). The extra overhead is

[PATCH 4.4 00/75] 4.4.14-stable review

2016-06-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.4.14 release. There are 75 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri Jun 24 22:34:00 UTC 2016. Anything

[PATCH 4.4 00/75] 4.4.14-stable review

2016-06-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.4.14 release. There are 75 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri Jun 24 22:34:00 UTC 2016. Anything

[PATCH 4.4 05/75] tipc: fix nametable publication field in nl compat

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Richard Alpe [ Upstream commit 039b941e136757b55c4cf775aab6068dfd94 ] The publication field of the old netlink API should contain the publication key and not the

[PATCH 3.14 09/29] parisc: Fix pagefault crash in unaligned __get_user() call

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Helge Deller commit 8b78f260887df532da529f225c49195d18fef36b upstream. One of the debian buildd servers had this crash in the syslog without any other information: Unaligned

[PATCH 4.4 05/75] tipc: fix nametable publication field in nl compat

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Richard Alpe [ Upstream commit 039b941e136757b55c4cf775aab6068dfd94 ] The publication field of the old netlink API should contain the publication key and not the publication reference.

[PATCH 3.14 09/29] parisc: Fix pagefault crash in unaligned __get_user() call

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Helge Deller commit 8b78f260887df532da529f225c49195d18fef36b upstream. One of the debian buildd servers had this crash in the syslog without any other information: Unaligned handler failed,

[PATCH 4.4 03/75] tipc: check nl sock before parsing nested attributes

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Richard Alpe [ Upstream commit 45e093ae2830cd1264677d47ff9a95a71f5d9f9c ] Make sure the socket for which the user is listing publication exists before parsing the

[PATCH 4.4 03/75] tipc: check nl sock before parsing nested attributes

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Richard Alpe [ Upstream commit 45e093ae2830cd1264677d47ff9a95a71f5d9f9c ] Make sure the socket for which the user is listing publication exists before parsing the socket netlink attributes.

[PATCH 3.14 08/29] powerpc: Use privileged SPR number for MMCR2

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Huth commit 8dd75ccb571f3c92c48014b3dabd3d51a115ab41 upstream. We are already using the privileged versions of MMCR0, MMCR1 and MMCRA in the kernel, so for MMCR2, we

[PATCH 3.14 08/29] powerpc: Use privileged SPR number for MMCR2

2016-06-22 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Huth commit 8dd75ccb571f3c92c48014b3dabd3d51a115ab41 upstream. We are already using the privileged versions of MMCR0, MMCR1 and MMCRA in the kernel, so for MMCR2, we should better use

[PATCH 4.4 02/75] scsi: Add QEMU CD-ROM to VPD Inquiry Blacklist

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ewan D. Milne commit fbd83006e3e536fcb103228d2422ea63129ccb03 upstream. Linux fails to boot as a guest with a QEMU CD-ROM: [4.439488] ata2.00: ATAPI: QEMU CD-ROM,

[PATCH 4.4 12/75] sfc: on MC reset, clear PIO buffer linkage in TXQs

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Edward Cree [ Upstream commit c0795bf64cba4d1b796fdc5b74b33772841ed1bb ] Otherwise, if we fail to allocate new PIO buffers, our TXQs will try to use the old ones, which

[PATCH 4.4 06/75] switchdev: pass pointer to fib_info instead of copy

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jiri Pirko [ Upstream commit da4ed55165d41b1073f9a476f1c18493e9bf8c8e ] The problem is that fib_info->nh is [0] so the struct fib_info allocation size depends on number of

[PATCH 4.4 02/75] scsi: Add QEMU CD-ROM to VPD Inquiry Blacklist

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ewan D. Milne commit fbd83006e3e536fcb103228d2422ea63129ccb03 upstream. Linux fails to boot as a guest with a QEMU CD-ROM: [4.439488] ata2.00: ATAPI: QEMU CD-ROM, 0.8.2, max UDMA/100 [

[PATCH 4.4 12/75] sfc: on MC reset, clear PIO buffer linkage in TXQs

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Edward Cree [ Upstream commit c0795bf64cba4d1b796fdc5b74b33772841ed1bb ] Otherwise, if we fail to allocate new PIO buffers, our TXQs will try to use the old ones, which aren't there any more.

[PATCH 4.4 06/75] switchdev: pass pointer to fib_info instead of copy

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jiri Pirko [ Upstream commit da4ed55165d41b1073f9a476f1c18493e9bf8c8e ] The problem is that fib_info->nh is [0] so the struct fib_info allocation size depends on number of nexthops. If we just

[PATCH 4.4 11/75] bpf, inode: disallow userns mounts

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit 612bacad78ba6d0a91166fc4487af114bac172a8 ] Follow-up to commit e27f4a942a0e ("bpf: Use mount_nodev not mount_ns to mount the bpf

[PATCH 4.4 01/75] scsi_lib: correctly retry failed zero length REQ_TYPE_FS commands

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: James Bottomley commit a621bac3044ed6f7ec5fa0326491b2d4838bfa93 upstream. When SCSI was written, all commands coming from the filesystem (REQ_TYPE_FS

[PATCH 4.4 11/75] bpf, inode: disallow userns mounts

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Borkmann [ Upstream commit 612bacad78ba6d0a91166fc4487af114bac172a8 ] Follow-up to commit e27f4a942a0e ("bpf: Use mount_nodev not mount_ns to mount the bpf filesystem"), which removes

[PATCH 4.4 01/75] scsi_lib: correctly retry failed zero length REQ_TYPE_FS commands

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: James Bottomley commit a621bac3044ed6f7ec5fa0326491b2d4838bfa93 upstream. When SCSI was written, all commands coming from the filesystem (REQ_TYPE_FS commands) had data. This meant that our

[PATCH 4.4 10/75] uapi glibc compat: fix compilation when !__USE_MISC in glibc

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Nicolas Dichtel [ Upstream commit f0a3fdca794d1e68ae284ef4caefe681f7c18e89 ] These structures are defined only if __USE_MISC is set in glibc net/if.h headers, ie

[PATCH 4.4 10/75] uapi glibc compat: fix compilation when !__USE_MISC in glibc

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Nicolas Dichtel [ Upstream commit f0a3fdca794d1e68ae284ef4caefe681f7c18e89 ] These structures are defined only if __USE_MISC is set in glibc net/if.h headers, ie when _BSD_SOURCE or

[PATCH 4.4 04/75] netlink: Fix dump skb leak/double free

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu [ Upstream commit 92964c79b357efd980812c4de5c1fd2ec8bb5520 ] When we free cb->skb after a dump, we do it after releasing the lock. This means that a

[PATCH 4.4 13/75] team: dont call netdev_change_features under team->lock

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ivan Vecera [ Upstream commit f6988cb63a4e698d8a62a1d085d263d1fcc351ea ] The team_device_event() notifier calls team_compute_features() to fix vlan_features under

[PATCH 4.4 08/75] bpf: Use mount_nodev not mount_ns to mount the bpf filesystem

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "Eric W. Biederman" [ Upstream commit e27f4a942a0ee4b84567a3c6cfa84f273e55cbb7 ] While reviewing the filesystems that set FS_USERNS_MOUNT I spotted the bpf filesystem.

[PATCH 4.4 04/75] netlink: Fix dump skb leak/double free

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Herbert Xu [ Upstream commit 92964c79b357efd980812c4de5c1fd2ec8bb5520 ] When we free cb->skb after a dump, we do it after releasing the lock. This means that a new dump could have started in

[PATCH 4.4 13/75] team: dont call netdev_change_features under team->lock

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Ivan Vecera [ Upstream commit f6988cb63a4e698d8a62a1d085d263d1fcc351ea ] The team_device_event() notifier calls team_compute_features() to fix vlan_features under team->lock to protect

[PATCH 4.4 08/75] bpf: Use mount_nodev not mount_ns to mount the bpf filesystem

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: "Eric W. Biederman" [ Upstream commit e27f4a942a0ee4b84567a3c6cfa84f273e55cbb7 ] While reviewing the filesystems that set FS_USERNS_MOUNT I spotted the bpf filesystem. Looking at the code I

[PATCH 4.4 14/75] vxlan: Accept user specified MTU value when create new vxlan link

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Chen Haiquan [ Upstream commit ce577668a426c6a9e2470a09dcd07fbd6e45272a ] When create a new vxlan link, example: ip link add vtap mtu 1440 type vxlan vni 1 dev eth0 The

[PATCH 4.4 07/75] tuntap: correctly wake up process during uninit

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jason Wang [ Upstream commit addf8fc4acb1cf79492ac64966f07178793cb3d7 ] We used to check dev->reg_state against NETREG_REGISTERED after each time we are woke up. But after

mmotm 2016-06-22-16-21 uploaded

2016-06-22 Thread akpm
The mm-of-the-moment snapshot 2016-06-22-16-21 has been uploaded to http://www.ozlabs.org/~akpm/mmotm/ mmotm-readme.txt says README for mm-of-the-moment: http://www.ozlabs.org/~akpm/mmotm/ This is a snapshot of my -mm patch queue. Uploaded at random hopefully more than once a week. You

[PATCH 4.4 14/75] vxlan: Accept user specified MTU value when create new vxlan link

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Chen Haiquan [ Upstream commit ce577668a426c6a9e2470a09dcd07fbd6e45272a ] When create a new vxlan link, example: ip link add vtap mtu 1440 type vxlan vni 1 dev eth0 The argument "mtu" has

[PATCH 4.4 07/75] tuntap: correctly wake up process during uninit

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jason Wang [ Upstream commit addf8fc4acb1cf79492ac64966f07178793cb3d7 ] We used to check dev->reg_state against NETREG_REGISTERED after each time we are woke up. But after commit 9e641bdcfa4e

mmotm 2016-06-22-16-21 uploaded

2016-06-22 Thread akpm
The mm-of-the-moment snapshot 2016-06-22-16-21 has been uploaded to http://www.ozlabs.org/~akpm/mmotm/ mmotm-readme.txt says README for mm-of-the-moment: http://www.ozlabs.org/~akpm/mmotm/ This is a snapshot of my -mm patch queue. Uploaded at random hopefully more than once a week. You

[PATCH 4.4 20/75] geneve: Relax MTU constraints

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: David Wragg [ Upstream commit 55e5bfb53cff286c1c1ff49f51325dc15c7fea63 ] Allow the MTU of geneve devices to be set to large values, in order to exploit underlying networks

[PATCH 4.4 17/75] l2tp: fix configuration passed to setup_udp_tunnel_sock()

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Guillaume Nault [ Upstream commit a5c5e2da8551eb69e5d5d09d51d526140b5db9fb ] Unused fields of udp_cfg must be all zeros. Otherwise setup_udp_tunnel_sock() fills

[PATCH 4.4 18/75] ipv6: Skip XFRM lookup if dst_entry in socket cache is valid

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jakub Sitnicki [ Upstream commit 00bc0ef5880dc7b82f9c320dead4afaad48e47be ] At present we perform an xfrm_lookup() for each UDPv6 message we send. The lookup involves querying

[PATCH 4.4 20/75] geneve: Relax MTU constraints

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: David Wragg [ Upstream commit 55e5bfb53cff286c1c1ff49f51325dc15c7fea63 ] Allow the MTU of geneve devices to be set to large values, in order to exploit underlying networks with larger frame

[PATCH 4.4 17/75] l2tp: fix configuration passed to setup_udp_tunnel_sock()

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Guillaume Nault [ Upstream commit a5c5e2da8551eb69e5d5d09d51d526140b5db9fb ] Unused fields of udp_cfg must be all zeros. Otherwise setup_udp_tunnel_sock() fills ->gro_receive and

[PATCH 4.4 18/75] ipv6: Skip XFRM lookup if dst_entry in socket cache is valid

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jakub Sitnicki [ Upstream commit 00bc0ef5880dc7b82f9c320dead4afaad48e47be ] At present we perform an xfrm_lookup() for each UDPv6 message we send. The lookup involves querying the flow cache

[PATCH 4.4 21/75] vxlan, gre, geneve: Set a large MTU on ovs-created tunnel devices

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: David Wragg [ Upstream commit 7e059158d57b79159eaf1f504825d19866ef2c42 ] Prior to 4.3, openvswitch tunnel vports (vxlan, gre and geneve) could transmit vxlan packets of any

[PATCH 4.4 21/75] vxlan, gre, geneve: Set a large MTU on ovs-created tunnel devices

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: David Wragg [ Upstream commit 7e059158d57b79159eaf1f504825d19866ef2c42 ] Prior to 4.3, openvswitch tunnel vports (vxlan, gre and geneve) could transmit vxlan packets of any size, constrained

[PATCH 4.4 25/75] ALSA: hda - Fix headset mic detection problem for Dell machine

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: AceLan Kao commit f90d83b301701026b2e4c437a3613f377f63290e upstream. Add the pin configuration value of this machine into the pin_quirk table to make

[PATCH 4.4 25/75] ALSA: hda - Fix headset mic detection problem for Dell machine

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: AceLan Kao commit f90d83b301701026b2e4c437a3613f377f63290e upstream. Add the pin configuration value of this machine into the pin_quirk table to make DELL1_MIC_NO_PRESENCE apply to this

[PATCH 4.4 15/75] tcp: record TLP and ER timer stats in v6 stats

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit ce3cf4ec0305919fc69a972f6c2b2efd35d36abc ] The v6 tcp stats scan do not provide TLP and ER timer information correctly like the v4 version .

[PATCH 4.4 24/75] ALSA: hda - Add PCI ID for Kabylake

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Vinod Koul commit 35639a0e98391036a4c7f23253c321d6621a8897 upstream. Kabylake shows up as PCI ID 0xa171. And Kabylake-LP as 0x9d71. Since these are similar to Skylake add

[PATCH 4.4 19/75] vxlan: Relax MTU constraints

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: David Wragg [ Upstream commit 72564b59ffc438ea103b0727a921aaddce766728 ] Allow the MTU of vxlan devices without an underlying device to be set to larger values (up to a

[PATCH 4.4 15/75] tcp: record TLP and ER timer stats in v6 stats

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit ce3cf4ec0305919fc69a972f6c2b2efd35d36abc ] The v6 tcp stats scan do not provide TLP and ER timer information correctly like the v4 version . This patch fixes

[PATCH 4.4 24/75] ALSA: hda - Add PCI ID for Kabylake

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Vinod Koul commit 35639a0e98391036a4c7f23253c321d6621a8897 upstream. Kabylake shows up as PCI ID 0xa171. And Kabylake-LP as 0x9d71. Since these are similar to Skylake add these to SKL_PLUS

[PATCH 4.4 19/75] vxlan: Relax MTU constraints

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: David Wragg [ Upstream commit 72564b59ffc438ea103b0727a921aaddce766728 ] Allow the MTU of vxlan devices without an underlying device to be set to larger values (up to a maximum based on IP

[PATCH 4.4 29/75] ARM: fix PTRACE_SETVFPREGS on SMP systems

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Russell King commit e2dfb4b880146bfd4b6aa8e138c0205407cebbaf upstream. PTRACE_SETVFPREGS fails to properly mark the VFP register set to be reloaded, because it

[PATCH 4.4 27/75] ALSA: hda/realtek - Add support for new codecs ALC700/ALC701/ALC703

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Kailang Yang commit 6fbae35a3170c3e2b1b9d7b9cc943cbe48771362 upstream. Support new codecs for ALC700/ALC701/ALC703. Signed-off-by: Kailang Yang

[PATCH 4.4 31/75] s390/bpf: fix recache skb->data/hlen for skb_vlan_push/pop

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Michael Holzheu commit 6edf0aa4f8bbdfbb4d6d786892fa02728d05dc36 upstream. In case of usage of skb_vlan_push/pop, in the prologue we store the SKB pointer on the

[PATCH 4.4 29/75] ARM: fix PTRACE_SETVFPREGS on SMP systems

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Russell King commit e2dfb4b880146bfd4b6aa8e138c0205407cebbaf upstream. PTRACE_SETVFPREGS fails to properly mark the VFP register set to be reloaded, because it undoes one of the effects of

[PATCH 4.4 27/75] ALSA: hda/realtek - Add support for new codecs ALC700/ALC701/ALC703

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Kailang Yang commit 6fbae35a3170c3e2b1b9d7b9cc943cbe48771362 upstream. Support new codecs for ALC700/ALC701/ALC703. Signed-off-by: Kailang Yang Signed-off-by: Takashi Iwai Signed-off-by:

[PATCH 4.4 31/75] s390/bpf: fix recache skb->data/hlen for skb_vlan_push/pop

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Michael Holzheu commit 6edf0aa4f8bbdfbb4d6d786892fa02728d05dc36 upstream. In case of usage of skb_vlan_push/pop, in the prologue we store the SKB pointer on the stack and restore it after

[PATCH 4.4 28/75] ALSA: hda/realtek: Add T560 docking unit fixup

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Torsten Hilbrich commit dab38e43b298501a4e8807b56117c029e2e98383 upstream. Tested with Lenovo Ultradock. Fixes the non-working headphone jack on the docking unit.

[PATCH 4.4 32/75] s390/bpf: reduce maximum program size to 64 KB

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Michael Holzheu commit 0fa963553a5c28d8f8aabd8878326d3f782045fc upstream. The s390 BFP compiler currently uses relative branch instructions that only support jumps

[PATCH 4.4 26/75] ALSA: hda/realtek - ALC256 speaker noise issue

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Kailang Yang commit e69e7e03ed225abf3e1c43545aa3bcb68dc81d5f upstream. That is some different register for ALC255 and ALC256. ALC256 can't fit with some ALC255 register.

[PATCH 4.4 32/75] s390/bpf: reduce maximum program size to 64 KB

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Michael Holzheu commit 0fa963553a5c28d8f8aabd8878326d3f782045fc upstream. The s390 BFP compiler currently uses relative branch instructions that only support jumps up to 64 KB. Examples are

[PATCH 4.4 26/75] ALSA: hda/realtek - ALC256 speaker noise issue

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Kailang Yang commit e69e7e03ed225abf3e1c43545aa3bcb68dc81d5f upstream. That is some different register for ALC255 and ALC256. ALC256 can't fit with some ALC255 register. This issue is cause

[PATCH 4.4 28/75] ALSA: hda/realtek: Add T560 docking unit fixup

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Torsten Hilbrich commit dab38e43b298501a4e8807b56117c029e2e98383 upstream. Tested with Lenovo Ultradock. Fixes the non-working headphone jack on the docking unit. Signed-off-by: Torsten

[PATCH 4.4 34/75] crypto: public_key: select CRYPTO_AKCIPHER

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Arnd Bergmann commit bad6a185b4d6f81d0ed2b6e4c16307969f160b95 upstream. In some rare randconfig builds, we can end up with ASYMMETRIC_PUBLIC_KEY_SUBTYPE enabled but

[PATCH 4.4 34/75] crypto: public_key: select CRYPTO_AKCIPHER

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Arnd Bergmann commit bad6a185b4d6f81d0ed2b6e4c16307969f160b95 upstream. In some rare randconfig builds, we can end up with ASYMMETRIC_PUBLIC_KEY_SUBTYPE enabled but CRYPTO_AKCIPHER disabled,

[PATCH 4.4 46/75] wext: Fix 32 bit iwpriv compatibility issue with 64 bit Kernel

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Prasun Maiti commit 3d5fdff46c4b2b9534fa2f9fc78e90a48e0ff724 upstream. iwpriv app uses iw_point structure to send data to Kernel. The iw_point structure holds a

[PATCH 4.4 46/75] wext: Fix 32 bit iwpriv compatibility issue with 64 bit Kernel

2016-06-22 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Prasun Maiti commit 3d5fdff46c4b2b9534fa2f9fc78e90a48e0ff724 upstream. iwpriv app uses iw_point structure to send data to Kernel. The iw_point structure holds a pointer. For compatibility

<    1   2   3   4   5   6   7   8   9   10   >