commit:     3d17cc6a46a7b90b3002170d6b61600732112f22
Author:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
AuthorDate: Sun Jul 31 15:27:06 2016 +0000
Commit:     Mike Pagano <mpagano <AT> gentoo <DOT> org>
CommitDate: Sun Jul 31 15:27:06 2016 +0000
URL:        https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=3d17cc6a

Linux patch 3.18.38

 0000_README              |   4 +
 1037_linux-3.18.38.patch | 360 +++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 364 insertions(+)

diff --git a/0000_README b/0000_README
index 35319e8..b5306ef 100644
--- a/0000_README
+++ b/0000_README
@@ -191,6 +191,10 @@ Patch:  1036_linux-3.18.37.patch
 From:   http://www.kernel.org
 Desc:   Linux 3.18.37
 
+Patch:  1037_linux-3.18.38.patch
+From:   http://www.kernel.org
+Desc:   Linux 3.18.38
+
 Patch:  1500_XATTR_USER_PREFIX.patch
 From:   https://bugs.gentoo.org/show_bug.cgi?id=470644
 Desc:   Support for namespace user.pax.* on tmpfs.

diff --git a/1037_linux-3.18.38.patch b/1037_linux-3.18.38.patch
new file mode 100644
index 0000000..35be23d
--- /dev/null
+++ b/1037_linux-3.18.38.patch
@@ -0,0 +1,360 @@
+diff --git a/Makefile b/Makefile
+index e6953a43fe64..2940c7532661 100644
+--- a/Makefile
++++ b/Makefile
+@@ -1,6 +1,6 @@
+ VERSION = 3
+ PATCHLEVEL = 18
+-SUBLEVEL = 37
++SUBLEVEL = 38
+ EXTRAVERSION =
+ NAME = Diseased Newt
+ 
+diff --git a/arch/mips/include/asm/pgtable.h b/arch/mips/include/asm/pgtable.h
+index 060fc2e50cd2..825dd09e80a4 100644
+--- a/arch/mips/include/asm/pgtable.h
++++ b/arch/mips/include/asm/pgtable.h
+@@ -596,7 +596,8 @@ static inline struct page *pmd_page(pmd_t pmd)
+ 
+ static inline pmd_t pmd_modify(pmd_t pmd, pgprot_t newprot)
+ {
+-      pmd_val(pmd) = (pmd_val(pmd) & _PAGE_CHG_MASK) | pgprot_val(newprot);
++      pmd_val(pmd) = (pmd_val(pmd) & (_PAGE_CHG_MASK | _PAGE_HUGE)) |
++                     (pgprot_val(newprot) & ~_PAGE_CHG_MASK);
+       return pmd;
+ }
+ 
+diff --git a/arch/powerpc/kernel/prom.c b/arch/powerpc/kernel/prom.c
+index 7a218ab7e941..269ae9b58d74 100644
+--- a/arch/powerpc/kernel/prom.c
++++ b/arch/powerpc/kernel/prom.c
+@@ -166,8 +166,7 @@ static struct ibm_pa_feature {
+        * we don't want to turn on TM here, so we use the *_COMP versions
+        * which are 0 if the kernel doesn't support TM.
+        */
+-      {CPU_FTR_TM_COMP, 0, 0,
+-       PPC_FEATURE2_HTM_COMP|PPC_FEATURE2_HTM_NOSC_COMP, 22, 0, 0},
++      {CPU_FTR_TM_COMP, 0, 0, PPC_FEATURE2_HTM_COMP, 22, 0, 0},
+ };
+ 
+ static void __init scan_features(unsigned long node, const unsigned char 
*ftrs,
+diff --git a/arch/x86/kernel/amd_nb.c b/arch/x86/kernel/amd_nb.c
+index f04dbb3069b8..29f0c55d6efc 100644
+--- a/arch/x86/kernel/amd_nb.c
++++ b/arch/x86/kernel/amd_nb.c
+@@ -69,8 +69,8 @@ int amd_cache_northbridges(void)
+       while ((misc = next_northbridge(misc, amd_nb_misc_ids)) != NULL)
+               i++;
+ 
+-      if (i == 0)
+-              return 0;
++      if (!i)
++              return -ENODEV;
+ 
+       nb = kzalloc(i * sizeof(struct amd_northbridge), GFP_KERNEL);
+       if (!nb)
+diff --git a/block/ioprio.c b/block/ioprio.c
+index 31666c92b46a..563435684c3c 100644
+--- a/block/ioprio.c
++++ b/block/ioprio.c
+@@ -149,8 +149,10 @@ static int get_task_ioprio(struct task_struct *p)
+       if (ret)
+               goto out;
+       ret = IOPRIO_PRIO_VALUE(IOPRIO_CLASS_NONE, IOPRIO_NORM);
++      task_lock(p);
+       if (p->io_context)
+               ret = p->io_context->ioprio;
++      task_unlock(p);
+ out:
+       return ret;
+ }
+diff --git a/drivers/s390/net/qeth_l2_main.c b/drivers/s390/net/qeth_l2_main.c
+index c2679bfe7f66..d23138b87af3 100644
+--- a/drivers/s390/net/qeth_l2_main.c
++++ b/drivers/s390/net/qeth_l2_main.c
+@@ -911,6 +911,7 @@ static void qeth_l2_remove_device(struct ccwgroup_device 
*cgdev)
+               qeth_l2_set_offline(cgdev);
+ 
+       if (card->dev) {
++              netif_napi_del(&card->napi);
+               unregister_netdev(card->dev);
+               card->dev = NULL;
+       }
+diff --git a/drivers/s390/net/qeth_l3_main.c b/drivers/s390/net/qeth_l3_main.c
+index afebb9709763..0513d11b741e 100644
+--- a/drivers/s390/net/qeth_l3_main.c
++++ b/drivers/s390/net/qeth_l3_main.c
+@@ -3337,6 +3337,7 @@ static void qeth_l3_remove_device(struct ccwgroup_device 
*cgdev)
+               qeth_l3_set_offline(cgdev);
+ 
+       if (card->dev) {
++              netif_napi_del(&card->napi);
+               unregister_netdev(card->dev);
+               card->dev = NULL;
+       }
+diff --git a/drivers/scsi/ipr.c b/drivers/scsi/ipr.c
+index f2e1b92eb314..105adb4cf6a8 100644
+--- a/drivers/scsi/ipr.c
++++ b/drivers/scsi/ipr.c
+@@ -9759,6 +9759,7 @@ static int ipr_probe_ioa(struct pci_dev *pdev,
+               ioa_cfg->intr_flag = IPR_USE_MSI;
+       else {
+               ioa_cfg->intr_flag = IPR_USE_LSI;
++              ioa_cfg->clear_isr = 1;
+               ioa_cfg->nvectors = 1;
+               dev_info(&pdev->dev, "Cannot enable MSI.\n");
+       }
+diff --git a/drivers/xen/xen-acpi-processor.c 
b/drivers/xen/xen-acpi-processor.c
+index 59fc190f1e92..b96e207bf250 100644
+--- a/drivers/xen/xen-acpi-processor.c
++++ b/drivers/xen/xen-acpi-processor.c
+@@ -423,36 +423,7 @@ upload:
+ 
+       return 0;
+ }
+-static int __init check_prereq(void)
+-{
+-      struct cpuinfo_x86 *c = &cpu_data(0);
+-
+-      if (!xen_initial_domain())
+-              return -ENODEV;
+-
+-      if (!acpi_gbl_FADT.smi_command)
+-              return -ENODEV;
+-
+-      if (c->x86_vendor == X86_VENDOR_INTEL) {
+-              if (!cpu_has(c, X86_FEATURE_EST))
+-                      return -ENODEV;
+ 
+-              return 0;
+-      }
+-      if (c->x86_vendor == X86_VENDOR_AMD) {
+-              /* Copied from powernow-k8.h, can't include ../cpufreq/powernow
+-               * as we get compile warnings for the static functions.
+-               */
+-#define CPUID_FREQ_VOLT_CAPABILITIES    0x80000007
+-#define USE_HW_PSTATE                   0x00000080
+-              u32 eax, ebx, ecx, edx;
+-              cpuid(CPUID_FREQ_VOLT_CAPABILITIES, &eax, &ebx, &ecx, &edx);
+-              if ((edx & USE_HW_PSTATE) != USE_HW_PSTATE)
+-                      return -ENODEV;
+-              return 0;
+-      }
+-      return -ENODEV;
+-}
+ /* acpi_perf_data is a pointer to percpu data. */
+ static struct acpi_processor_performance __percpu *acpi_perf_data;
+ 
+@@ -509,10 +480,10 @@ struct notifier_block xen_acpi_processor_resume_nb = {
+ static int __init xen_acpi_processor_init(void)
+ {
+       unsigned int i;
+-      int rc = check_prereq();
++      int rc;
+ 
+-      if (rc)
+-              return rc;
++      if (!xen_initial_domain())
++              return -ENODEV;
+ 
+       nr_acpi_bits = get_max_acpi_id() + 1;
+       acpi_ids_done = kcalloc(BITS_TO_LONGS(nr_acpi_bits), sizeof(unsigned 
long), GFP_KERNEL);
+diff --git a/drivers/xen/xenbus/xenbus_dev_frontend.c 
b/drivers/xen/xenbus/xenbus_dev_frontend.c
+index 85534ea63555..531e76474983 100644
+--- a/drivers/xen/xenbus/xenbus_dev_frontend.c
++++ b/drivers/xen/xenbus/xenbus_dev_frontend.c
+@@ -316,26 +316,31 @@ static int xenbus_write_transaction(unsigned msg_type,
+                       rc = -ENOMEM;
+                       goto out;
+               }
++      } else {
++              list_for_each_entry(trans, &u->transactions, list)
++                      if (trans->handle.id == u->u.msg.tx_id)
++                              break;
++              if (&trans->list == &u->transactions)
++                      return -ESRCH;
+       }
+ 
+       reply = xenbus_dev_request_and_reply(&u->u.msg);
+       if (IS_ERR(reply)) {
+-              kfree(trans);
++              if (msg_type == XS_TRANSACTION_START)
++                      kfree(trans);
+               rc = PTR_ERR(reply);
+               goto out;
+       }
+ 
+       if (msg_type == XS_TRANSACTION_START) {
+-              trans->handle.id = simple_strtoul(reply, NULL, 0);
+-
+-              list_add(&trans->list, &u->transactions);
+-      } else if (msg_type == XS_TRANSACTION_END) {
+-              list_for_each_entry(trans, &u->transactions, list)
+-                      if (trans->handle.id == u->u.msg.tx_id)
+-                              break;
+-              BUG_ON(&trans->list == &u->transactions);
++              if (u->u.msg.type == XS_ERROR)
++                      kfree(trans);
++              else {
++                      trans->handle.id = simple_strtoul(reply, NULL, 0);
++                      list_add(&trans->list, &u->transactions);
++              }
++      } else if (u->u.msg.type == XS_TRANSACTION_END) {
+               list_del(&trans->list);
+-
+               kfree(trans);
+       }
+ 
+diff --git a/drivers/xen/xenbus/xenbus_xs.c b/drivers/xen/xenbus/xenbus_xs.c
+index ba804f3d8278..ce65591b4168 100644
+--- a/drivers/xen/xenbus/xenbus_xs.c
++++ b/drivers/xen/xenbus/xenbus_xs.c
+@@ -250,9 +250,6 @@ void *xenbus_dev_request_and_reply(struct xsd_sockmsg *msg)
+ 
+       mutex_unlock(&xs_state.request_mutex);
+ 
+-      if (IS_ERR(ret))
+-              return ret;
+-
+       if ((msg->type == XS_TRANSACTION_END) ||
+           ((req_msg.type == XS_TRANSACTION_START) &&
+            (msg->type == XS_ERROR)))
+diff --git a/fs/ecryptfs/file.c b/fs/ecryptfs/file.c
+index 77a3db3791c7..c02f52cfe64a 100644
+--- a/fs/ecryptfs/file.c
++++ b/fs/ecryptfs/file.c
+@@ -177,6 +177,19 @@ out:
+       return rc;
+ }
+ 
++static int ecryptfs_mmap(struct file *file, struct vm_area_struct *vma)
++{
++      struct file *lower_file = ecryptfs_file_to_lower(file);
++      /*
++       * Don't allow mmap on top of file systems that don't support it
++       * natively.  If FILESYSTEM_MAX_STACK_DEPTH > 2 or ecryptfs
++       * allows recursive mounting, this will need to be extended.
++       */
++      if (!lower_file->f_op->mmap)
++              return -ENODEV;
++      return generic_file_mmap(file, vma);
++}
++
+ /**
+  * ecryptfs_open
+  * @inode: inode speciying file to open
+@@ -374,7 +387,7 @@ const struct file_operations ecryptfs_main_fops = {
+ #ifdef CONFIG_COMPAT
+       .compat_ioctl = ecryptfs_compat_ioctl,
+ #endif
+-      .mmap = generic_file_mmap,
++      .mmap = ecryptfs_mmap,
+       .open = ecryptfs_open,
+       .flush = ecryptfs_flush,
+       .release = ecryptfs_release,
+diff --git a/fs/ecryptfs/kthread.c b/fs/ecryptfs/kthread.c
+index 9b661a4ccee7..f1ea610362c6 100644
+--- a/fs/ecryptfs/kthread.c
++++ b/fs/ecryptfs/kthread.c
+@@ -25,7 +25,6 @@
+ #include <linux/slab.h>
+ #include <linux/wait.h>
+ #include <linux/mount.h>
+-#include <linux/file.h>
+ #include "ecryptfs_kernel.h"
+ 
+ struct ecryptfs_open_req {
+@@ -148,7 +147,7 @@ int ecryptfs_privileged_open(struct file **lower_file,
+       flags |= IS_RDONLY(lower_dentry->d_inode) ? O_RDONLY : O_RDWR;
+       (*lower_file) = dentry_open(&req.path, flags, cred);
+       if (!IS_ERR(*lower_file))
+-              goto have_file;
++              goto out;
+       if ((flags & O_ACCMODE) == O_RDONLY) {
+               rc = PTR_ERR((*lower_file));
+               goto out;
+@@ -166,16 +165,8 @@ int ecryptfs_privileged_open(struct file **lower_file,
+       mutex_unlock(&ecryptfs_kthread_ctl.mux);
+       wake_up(&ecryptfs_kthread_ctl.wait);
+       wait_for_completion(&req.done);
+-      if (IS_ERR(*lower_file)) {
++      if (IS_ERR(*lower_file))
+               rc = PTR_ERR(*lower_file);
+-              goto out;
+-      }
+-have_file:
+-      if ((*lower_file)->f_op->mmap == NULL) {
+-              fput(*lower_file);
+-              *lower_file = NULL;
+-              rc = -EMEDIUMTYPE;
+-      }
+ out:
+       return rc;
+ }
+diff --git a/mm/swap.c b/mm/swap.c
+index 9ccec11ed3fb..e657ba642e5e 100644
+--- a/mm/swap.c
++++ b/mm/swap.c
+@@ -623,7 +623,7 @@ static void __lru_cache_add(struct page *page)
+       struct pagevec *pvec = &get_cpu_var(lru_add_pvec);
+ 
+       page_cache_get(page);
+-      if (!pagevec_space(pvec) || PageCompound(page))
++      if (!pagevec_add(pvec, page) || PageCompound(page))
+               __pagevec_lru_add(pvec);
+       put_cpu_var(lru_add_pvec);
+ }
+diff --git a/sound/core/timer.c b/sound/core/timer.c
+index 2fd0dccf8505..5c769ea59b68 100644
+--- a/sound/core/timer.c
++++ b/sound/core/timer.c
+@@ -1959,6 +1959,7 @@ static ssize_t snd_timer_user_read(struct file *file, 
char __user *buffer,
+ 
+               qhead = tu->qhead++;
+               tu->qhead %= tu->queue_size;
++              tu->qused--;
+               spin_unlock_irq(&tu->qlock);
+ 
+               if (tu->tread) {
+@@ -1972,7 +1973,6 @@ static ssize_t snd_timer_user_read(struct file *file, 
char __user *buffer,
+               }
+ 
+               spin_lock_irq(&tu->qlock);
+-              tu->qused--;
+               if (err < 0)
+                       goto _error;
+               result += unit;
+diff --git a/sound/pci/au88x0/au88x0_core.c b/sound/pci/au88x0/au88x0_core.c
+index 72e81286b70e..8eae95acc09c 100644
+--- a/sound/pci/au88x0/au88x0_core.c
++++ b/sound/pci/au88x0/au88x0_core.c
+@@ -1442,9 +1442,8 @@ static int vortex_wtdma_bufshift(vortex_t * vortex, int 
wtdma)
+       int page, p, pp, delta, i;
+ 
+       page =
+-          (hwread(vortex->mmio, VORTEX_WTDMA_STAT + (wtdma << 2)) &
+-           WT_SUBBUF_MASK)
+-          >> WT_SUBBUF_SHIFT;
++          (hwread(vortex->mmio, VORTEX_WTDMA_STAT + (wtdma << 2))
++           >> WT_SUBBUF_SHIFT) & WT_SUBBUF_MASK;
+       if (dma->nr_periods >= 4)
+               delta = (page - dma->period_real) & 3;
+       else {
+diff --git a/sound/pci/echoaudio/echoaudio.c b/sound/pci/echoaudio/echoaudio.c
+index 631aaa4046ad..3a1fe2c79b4a 100644
+--- a/sound/pci/echoaudio/echoaudio.c
++++ b/sound/pci/echoaudio/echoaudio.c
+@@ -2247,11 +2247,11 @@ static int snd_echo_resume(struct device *dev)
+ 
+       DE_INIT(("resume start\n"));
+       pci_restore_state(pci);
+-      commpage_bak = kmalloc(sizeof(struct echoaudio), GFP_KERNEL);
++      commpage_bak = kmalloc(sizeof(*commpage), GFP_KERNEL);
+       if (commpage_bak == NULL)
+               return -ENOMEM;
+       commpage = chip->comm_page;
+-      memcpy(commpage_bak, commpage, sizeof(struct comm_page));
++      memcpy(commpage_bak, commpage, sizeof(*commpage));
+ 
+       err = init_hw(chip, chip->pci->device, chip->pci->subsystem_device);
+       if (err < 0) {

Reply via email to