4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 4eaf3b84f2881c9c028f1d5e76c52ab575fe3a66 ]
qdisc_tree_decrease_qlen() suffers from two problems on multiqueue
devices.
One problem is that it updates
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
commit 0ee9608c89e81a1ccee52ecb58a7ff040e2522d9 upstream.
In debugfs' start_creating(), we pin the file system to safely access
its root. When we failed to create a file, we
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Robin Ruede
commit b96b1db039ebc584d03a9933b279e0d3e704c528 upstream.
This fixes a regression introduced by 37b8d27d between v4.1 and v4.2.
When a snapshot is received, its received_uuid is
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Andrej Ota
[ Upstream commit 5f715c097965c0ad037f64393d0b95c50287775b ]
Because eth_type_trans() consumes ethernet header worth of bytes, a call
to read TCI from end of packet using
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: David Sterba
commit 849ef9286f30c88113906dc35f44a499c0cb385d upstream.
We don't verify that all the balance filter arguments supplemented by
the flags are actually known to the kernel. Thus we
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Junxiao Bi
commit 8f1eb48758aacf6c1ffce18179295adbf3bd7640 upstream.
New created file's mode is not masked with umask, and this makes umask not
work for ocfs2 volume.
Fixes: 702e5bc ("ocfs2:
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 5d4c9bfbabdb1d497f21afd81501e5c54b0c85d9 ]
tcp_send_rcvq() is used for re-injecting data into tcp receive queue.
Problems :
- No check against size is
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit fbca9d2d35c6ef1b323fae75cc9545005ba25097 ]
During own review but also reported by Dmitry's syzkaller [1] it has been
noticed that we trigger a heap
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Filipe Manana
commit 0305cd5f7fca85dae392b9ba85b116896eb7c1c7 upstream.
When truncating a file to a smaller size which consists of an inline
extent that is compressed, we did not discard (or
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Filipe Manana
commit 8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9 upstream.
Currently the clone ioctl allows to clone an inline extent from one file
to another that already has other (non-inlined)
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Nicolas Dichtel
[ Upstream commit 304d888b29cf96f1dd53511ee686499cd8cdf249 ]
This reverts commit ab450605b35caa768ca33e86db9403229bf42be4.
In IPv6, we cannot inherit the dst of the original
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Paul Gortmaker
commit 48dbc164b40dd9195dea8cd966e394819e420b64 upstream.
Currently we see this in "git status" if we build in the source dir:
Untracked files:
(use "git add ..." to include
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Martin KaFai Lau
[ Upstrem commit 02bcf4e082e4dc634409a6a6cb7def8806d6e5e6 ]
All DST_NOCACHE rt6_info used to have rt->dst.from set to
its parent.
After commit 8e3d5be73681 ("ipv6: Avoid
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit 8844f97238ca6c1ca92a5d6c69f53efd361a266f ]
In case multiple writes to a unix stream socket race we could end up in a
situation where we pre-allocate a
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit a3a116e04cc6a94d595ead4e956ab1bc1d2f4746 ]
While possibly in future we don't necessarily need to use
sk_buff_head.lock this is a rather larger change, as
ptrace_has_cap() checks whether the current process should be
treated as having a certain capability for ptrace checks
against another process. Until now, this was equivalent to
has_ns_capability(current, target_ns, CAP_SYS_PTRACE).
However, if a root-owned process wants to enter a user
namespace
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit 73ed5d25dce0354ea381d6dc93005c3085fae03d ]
During splicing an af-unix socket to a pipe we have to drop all
af-unix socket locks. While doing so we allow
On the interrupt path, we repeatedly establish the pointer to the
storvsc_device. Fix this.
Signed-off-by: K. Y. Srinivasan
Reviewed-by: Long Li
Reviewed-by: Johannes Thumshirn
Tested-by: Alex Ng
---
drivers/scsi/storvsc_drv.c | 23 ---
1 files changed, 8 insertions(+),
For FC devices managed by this driver, atttach the appropriate transport
template. This will allow us to create the appropriate sysfs files for
these devices. With this we can publish the wwn for both the port and the node.
Signed-off-by: K. Y. Srinivasan
Reviewed-by: Long Li
Tested-by: Alex Ng
The function storvsc_channel_init() repeatedly interacts with the host to
extract various channel properties. Refactor this code to eliminate code
repetition.
Signed-off-by: K. Y. Srinivasan
Reviewed-by: Long Li
Reviewed-by: Johannes Thumshirn
Tested-by: Alex Ng
---
V2: Fixed error
The hv_fc_wwn_packet is exchanged over vmbus. Make the definition in Linux match
the Window's definition.
Signed-off-by: K. Y. Srinivasan
Reviewed-by: Johannes Thumshirn
Reviewed-by: Long Li
Tested-by: Alex Ng
---
drivers/scsi/storvsc_drv.c |5 ++---
1 files changed, 2 insertions(+), 3
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: =?UTF-8?q?fran=C3=A7ois=20romieu?=
[ Upstream commit 39174291d8e8acfd1113214a943263aaa03c57c8 ]
Signed-off-by: Francois Romieu
Reported-by: Dave Jones
Fixes: d7d2d89d4b0af ("r8169: Add
Properly support FC hosts. Additional cleanup patches are also
included.
In this version I have adddressed comments from
Dan Carpenter and
from Johannes Thumshirn .
K. Y. Srinivasan (4):
scsi: storvsc: Fix a bug in the layout of the hv_fc_wwn_packet
scsi: storvsc: Properly support Fibre
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit 9490f886b192964796285907d777ff00fba1fa0f ]
sendpage did not care about credentials at all. This could lead to
situations in which because of fd passing
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 8fd6c80d9dd938ca338c70698533a7e304752846 ]
We concluded that the skb_probe_transport_header() should better be
called unconditionally. Avoiding the call into
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 3c70c132488794e2489ab045559b0ce0afcf17de ]
Packet sockets can be used by various net devices and are not
really restricted to ARPHRD_ETHER device types.
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Rainer Weikusat
[ Upstream commit 7d267278a9ece963d77eefec61630223fce08c6c ]
Rainer Weikusat writes:
An AF_UNIX datagram socket being the client in an n:1 association with
some server socket
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 5cfb4c8d05b4409c4044cb9c05b19705c1d9818b ]
Since it's introduction in commit 69e3c75f4d54 ("net: TX_RING and
packet mmap"), TX_RING could be used from
This is the start of the stable review cycle for the 4.3.3 release.
There are 71 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Mon Dec 14 20:05:02 UTC 2015.
Anything
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Martin KaFai Lau
[ Upstream commit 5973fb1e245086071bf71994c8b54d99526ded03 ]
Since the expires of the DST_NOCACHE rt can be set during
the ip6_rt_update_pmtu(), we also need to consider the
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit efdfa2f7848f64517008136fb41f53c4a1faf93a ]
In tpacket_fill_skb() commit c1aad275b029 ("packet: set transport
header before doing xmit") and later on
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Hans Verkuil
commit fc88dd16a0e430f57458e6bd9b62a631c6ea53a1 upstream.
The cobalt driver should depend on VIDEO_V4L2_SUBDEV_API.
This fixes this kbuild error:
tree:
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Kamal Mostafa
[ Upstream commit d7475de58575c904818efa369c82e88c6648ce2e ]
Use the local uapi headers to keep in sync with "recently" added #define's
(e.g. SKF_AD_VLAN_TPID). Refactored
4.3-stable review patch. If anyone has any objections, please let me know.
--
From: Martin KaFai Lau
[ Upstream commit 0d3f6d297bfb7af24d0508460fdb3d1ec4903fa3 ]
The original bug report:
https://bugzilla.redhat.com/show_bug.cgi?id=1272571
The setup has a IPv4 GRE tunnel
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit a3a116e04cc6a94d595ead4e956ab1bc1d2f4746 ]
While possibly in future we don't necessarily need to use
sk_buff_head.lock this is a rather larger change, as
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Rainer Weikusat
[ Upstream commit 7d267278a9ece963d77eefec61630223fce08c6c ]
Rainer Weikusat writes:
An AF_UNIX datagram socket being the client in an n:1 association with
some server socket
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daeho Jeong
commit 4327ba52afd03fc4b5afa0ee1d774c9c5b0e85c5 upstream.
If a EXT4 filesystem utilizes JBD2 journaling and an error occurs, the
journaling will be aborted first and the error
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit 8844f97238ca6c1ca92a5d6c69f53efd361a266f ]
In case multiple writes to a unix stream socket race we could end up in a
situation where we pre-allocate a
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: lucien
[ Upstream commit ed5a377d87dc4c87fb3e1f7f698cba38cd893103 ]
now sctp auth cannot work well when setting a hmacid manually, which
is caused by that we didn't use the network order for
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit 9490f886b192964796285907d777ff00fba1fa0f ]
sendpage did not care about credentials at all. This could lead to
situations in which because of fd passing
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Martin KaFai Lau
[ Upstream commit 0d3f6d297bfb7af24d0508460fdb3d1ec4903fa3 ]
The original bug report:
https://bugzilla.redhat.com/show_bug.cgi?id=1272571
The setup has a IPv4 GRE tunnel
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Martin KaFai Lau
[ Upstrem commit 02bcf4e082e4dc634409a6a6cb7def8806d6e5e6 ]
All DST_NOCACHE rt6_info used to have rt->dst.from set to
its parent.
After commit 8e3d5be73681 ("ipv6: Avoid
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Martin KaFai Lau
[ Upstream commit 5973fb1e245086071bf71994c8b54d99526ded03 ]
Since the expires of the DST_NOCACHE rt can be set during
the ip6_rt_update_pmtu(), we also need to consider the
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Theodore Ts'o
commit 937d7b84dca58f2565715f2c8e52f14c3d65fb22 upstream.
There are times when ext4_bio_write_page() is called even though we
don't actually need to do any I/O. This happens
On 12/12/2015 01:48 PM, William Cohen wrote:
On 12/12/2015 12:56 AM, David Long wrote:
On 12/11/2015 11:09 AM, William Cohen wrote:
On 12/11/2015 12:05 AM, David Long wrote:
There is a moderate amount of code already in kprobes on ARM and the current
ARMv8 patch to deal with conditional
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: =?UTF-8?q?Michal=20Kube=C4=8Dek?=
[ Upstream commit 264640fc2c5f4f913db5c73fa3eb1ead2c45e9d7 ]
If a fragmented multicast packet is received on an ethernet device which
has an active macvlan on
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Kamal Mostafa
[ Upstream commit d7475de58575c904818efa369c82e88c6648ce2e ]
Use the local uapi headers to keep in sync with "recently" added #define's
(e.g. SKF_AD_VLAN_TPID). Refactored
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 1b8e6a01e19f001e9f93b39c32387961c91ed3cc ]
When a passive TCP is created, we eventually call tcp_md5_do_add()
with sk pointing to the child. It is not owner by
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 5d4c9bfbabdb1d497f21afd81501e5c54b0c85d9 ]
tcp_send_rcvq() is used for re-injecting data into tcp receive queue.
Problems :
- No check against size is
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Yuchung Cheng
[ Upstream commit 0e45f4da5981895e885dd72fe912a3f8e32bae73 ]
Some middle-boxes black-hole the data after the Fast Open handshake
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Nikolay Aleksandrov
[ Upstream commit 0e615e9601a15efeeb8942cf7cd4dadba0c8c5a7 ]
When destroying an mrt table the static mfc entries and the static
devices are kept, which leads to devices
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Aaro Koskinen
[ Upstream commit 3c25a860d17b7378822f35d8c9141db9507e3beb ]
Commit fcb26ec5b18d ("broadcom: move all PHY_ID's to header")
updated broadcom_tbl to use PHY_IDs, but incorrectly
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 142a2e7ece8d8ac0e818eb2c91f99ca894730e2a ]
Dmitry provided a syzkaller (http://github.com/google/syzkaller)
generated program that triggers the WARNING at
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 5cfb4c8d05b4409c4044cb9c05b19705c1d9818b ]
Since it's introduction in commit 69e3c75f4d54 ("net: TX_RING and
packet mmap"), TX_RING could be used from
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Nikolay Aleksandrov
[ Upstream commit 4c6980462f32b4f282c5d8e5f7ea8070e2937725 ]
Similar to ipv4, when destroying an mrt table the static mfc entries and
the static devices are kept, which
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 6900317f5eff0a7070c5936e5383f589e0de7a09 ]
David and HacKurx reported a following/similar size overflow triggered
in a grsecurity kernel, thanks to PaX's gcc
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Filipe Manana
commit aeafbf8486c9e2bd53f5cc3c10c0b7fd7149d69c upstream.
While running a stress test I got the following warning triggered:
[191627.672810] [ cut here
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 3c70c132488794e2489ab045559b0ce0afcf17de ]
Packet sockets can be used by various net devices and are not
really restricted to ARPHRD_ETHER device types.
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Filipe Manana
commit f1cd1f0b7d1b5d4aaa5711e8f4e4898b0045cb6d upstream.
When listing a inode's xattrs we have a time window where we race against
a concurrent operation for adding a new hard
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: David Sterba
commit 9dcbeed4d7e11e1dcf5e55475de3754f0855d1c2 upstream.
The calculation of range length in btrfs_sync_file leads to signed
overflow. This was caught by PaX gcc SIZE_OVERFLOW
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Filipe Manana
commit 1d512cb77bdbda80f0dd0620a3b260d697fd581d upstream.
If we are using the NO_HOLES feature, we have a tiny time window when
running delalloc for a nodatacow inode where we
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit c72219b75fde768efccf7666342282fab7f9e4e7 ]
In case no struct sockaddr_ll has been passed to packet
socket's sendmsg() when doing a TX_RING flush run, then
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Neil Horman
[ Upstream commit 41033f029e393a64e81966cbe34d66c6cf8a2e7e ]
the OUTMCAST stat is double incremented, getting bumped once in the mcast code
itself, and again in the common ip
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Quentin Casasnovas
[ Upstream commit 8c7188b23474cca017b3ef354c4a58456f68303a ]
Sasha's found a NULL pointer dereference in the RDS connection code when
sending a message to an apparently
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 45f6fad84cc305103b28d73482b344d7f5b76f39 ]
This patch addresses multiple problems :
UDP/RAW sendmsg() need to get a stable struct ipv6_txoptions
while socket is
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Hannes Frederic Sowa
[ Upstream commit 73ed5d25dce0354ea381d6dc93005c3085fae03d ]
During splicing an af-unix socket to a pipe we have to drop all
af-unix socket locks. While doing so we allow
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit efdfa2f7848f64517008136fb41f53c4a1faf93a ]
In tpacket_fill_skb() commit c1aad275b029 ("packet: set transport
header before doing xmit") and later on
4.2-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 8fd6c80d9dd938ca338c70698533a7e304752846 ]
We concluded that the skb_probe_transport_header() should better be
called unconditionally. Avoiding the call into
===
NOTE:
This is the last 4.2.y kernel to be released, unless something
major comes up, it is end-of-life after this release. Everyone
should have moved to 4.3.y by now, you have been warned.
===
This is the start of the stable review
Ping ?
On Saturday 05 December 2015 00:53:24 Laurent Pinchart wrote:
> Hello,
>
> I ran into the following warning when running v4.4-rc3 on a TI OMAP4
> (pandaboard) using nfsroot.
>
> [ 8063.208526] [ cut here ]
> [ 8063.213653] WARNING: CPU: 1 PID: 81 at
On Sat, Dec 12, 2015 at 03:34:50PM +0100, SF Markus Elfring wrote:
> From: Markus Elfring
> Date: Sat, 12 Dec 2015 11:36:02 +0100
>
> Omit the unnecessary setting to a null pointer for the variable "param"
> at the beginning of the function "iscsi_set_default_param"
> because it can be directly
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Rainer Weikusat
[ Upstream commit 7d267278a9ece963d77eefec61630223fce08c6c ]
Rainer Weikusat writes:
An AF_UNIX datagram socket being the client in an n:1 association with
some server socket
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 1b8e6a01e19f001e9f93b39c32387961c91ed3cc ]
When a passive TCP is created, we eventually call tcp_md5_do_add()
with sk pointing to the child. It is not owner by
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Neil Horman
[ Upstream commit 41033f029e393a64e81966cbe34d66c6cf8a2e7e ]
the OUTMCAST stat is double incremented, getting bumped once in the mcast code
itself, and again in the common ip
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 5d4c9bfbabdb1d497f21afd81501e5c54b0c85d9 ]
tcp_send_rcvq() is used for re-injecting data into tcp receive queue.
Problems :
- No check against size is
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 3c70c132488794e2489ab045559b0ce0afcf17de ]
Packet sockets can be used by various net devices and are not
really restricted to ARPHRD_ETHER device types.
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Yuchung Cheng
[ Upstream commit 0e45f4da5981895e885dd72fe912a3f8e32bae73 ]
Some middle-boxes black-hole the data after the Fast Open handshake
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Arnd Bergmann
commit 777d738a5e58ba3b6f3932ab1543ce93703f4873 upstream.
create_request_message() computes the maximum length of a message,
but uses the wrong type for the time stamp:
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: "Lu, Han"
commit e2656412f2a7343ecfd13eb74bac0a6e6e9c5aad upstream.
Broxton and Skylake have the same behavior on display audio. So this patch
applys Skylake fix-ups to Broxton.
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 8fd6c80d9dd938ca338c70698533a7e304752846 ]
We concluded that the skb_probe_transport_header() should better be
called unconditionally. Avoiding the call into
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit efdfa2f7848f64517008136fb41f53c4a1faf93a ]
In tpacket_fill_skb() commit c1aad275b029 ("packet: set transport
header before doing xmit") and later on
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Aaro Koskinen
[ Upstream commit 3c25a860d17b7378822f35d8c9141db9507e3beb ]
Commit fcb26ec5b18d ("broadcom: move all PHY_ID's to header")
updated broadcom_tbl to use PHY_IDs, but incorrectly
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: =?UTF-8?q?Michal=20Kube=C4=8Dek?=
[ Upstream commit 264640fc2c5f4f913db5c73fa3eb1ead2c45e9d7 ]
If a fragmented multicast packet is received on an ethernet device which
has an active macvlan on
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Kamal Mostafa
[ Upstream commit d7475de58575c904818efa369c82e88c6648ce2e ]
Use the local uapi headers to keep in sync with "recently" added #define's
(e.g. SKF_AD_VLAN_TPID). Refactored
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Nikolay Aleksandrov
[ Upstream commit 4c6980462f32b4f282c5d8e5f7ea8070e2937725 ]
Similar to ipv4, when destroying an mrt table the static mfc entries and
the static devices are kept, which
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Nikolay Aleksandrov
[ Upstream commit 0e615e9601a15efeeb8942cf7cd4dadba0c8c5a7 ]
When destroying an mrt table the static mfc entries and the static
devices are kept, which leads to devices
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 6900317f5eff0a7070c5936e5383f589e0de7a09 ]
David and HacKurx reported a following/similar size overflow triggered
in a grsecurity kernel, thanks to PaX's gcc
On Sat, Dec 12, 2015 at 10:33 AM, Linus Torvalds
wrote:
>
> Peter, did that patch also handle just plain "lock_page()" case?
Looking more at it, I think this all goes back to commit 743162013d40
("sched: Remove proliferation of wait_on_bit() action functions").
Before that, we had
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit 5cfb4c8d05b4409c4044cb9c05b19705c1d9818b ]
Since it's introduction in commit 69e3c75f4d54 ("net: TX_RING and
packet mmap"), TX_RING could be used from
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Stefan Richter
commit 100ceb66d5c40cc0c7018e06a9474302470be73c upstream.
Reported by Clifford and Craig for JMicron OHCI-1394 + SDHCI combo
controllers: Often or even most of the time, the
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Jeff Layton
commit 35a92fe8770ce54c5eb275cd76128645bea2d200 upstream.
Andrew was seeing a race occur when an OPEN and OPEN_DOWNGRADE were
running in parallel. The server would receive the
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Daniel Borkmann
[ Upstream commit c72219b75fde768efccf7666342282fab7f9e4e7 ]
In case no struct sockaddr_ll has been passed to packet
socket's sendmsg() when doing a TX_RING flush run, then
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: lucien
[ Upstream commit ed5a377d87dc4c87fb3e1f7f698cba38cd893103 ]
now sctp auth cannot work well when setting a hmacid manually, which
is caused by that we didn't use the network order for
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Konstantin Khlebnikov
[ Upstream commit 6adc5fd6a142c6e2c80574c1db0c7c17dedaa42e ]
Proxy entries could have null pointer to net-device.
Signed-off-by: Konstantin Khlebnikov
Fixes:
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Quentin Casasnovas
[ Upstream commit 8c7188b23474cca017b3ef354c4a58456f68303a ]
Sasha's found a NULL pointer dereference in the RDS connection code when
sending a message to an apparently
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Daeho Jeong
commit 4327ba52afd03fc4b5afa0ee1d774c9c5b0e85c5 upstream.
If a EXT4 filesystem utilizes JBD2 journaling and an error occurs, the
journaling will be aborted first and the error
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Eric Dumazet
[ Upstream commit 4eaf3b84f2881c9c028f1d5e76c52ab575fe3a66 ]
qdisc_tree_decrease_qlen() suffers from two problems on multiqueue
devices.
One problem is that it updates
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Lukas Czerner
commit 6934da9238da947628be83635e365df41064b09b upstream.
There is a use-after-free possibility in __ext4_journal_stop() in the
case that we free the handle in the first
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: David Sterba
commit 849ef9286f30c88113906dc35f44a499c0cb385d upstream.
We don't verify that all the balance filter arguments supplemented by
the flags are actually known to the kernel. Thus we
4.1-stable review patch. If anyone has any objections, please let me know.
--
From: Jeff Layton
commit c812012f9ca7cf89c9e1a1cd512e6c3b5be04b85 upstream.
If we pass in an empty nfs_fattr struct to nfs_update_inode, it will
(correctly) not update any of the attributes, but it
201 - 300 of 902 matches
Mail list logo