On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
> if (nouveau_tv_norm) {
> + i = match_string(nv17_tv_norm_names,
> +n
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Masami Hiramatsu
commit eb0146daefdde65665b7f076fbff7b49dade95b9 upstream.
Prohibit kprobes on do_undefinstr because kprobes on
arm is implemented by undefined instruction. This means
if we pr
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Dmitry Safonov
commit acf46020012ccbca1172e9c7aeab399c950d9212 upstream.
The x86 mmap() code selects the mmap base for an allocation depending on
the bitness of the syscall. For 64bit sycalls
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Masami Hiramatsu
commit 70948c05fdde0aac32f9667856a88725c192fa40 upstream.
Prohibit probing on optimized_callback() because
it is called from kprobes itself. If we put a kprobes
on it, that wi
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Martin Schwidefsky
commit 9f18fff63cfd6f559daa1eaae60640372c65f84b upstream.
The inline assembly to call __do_softirq on the irq stack uses
an indirect branch. This can be replaced with a norm
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Kees Cook
commit f9544b2b076ca90d887c5ae5d74fab4c21bb7c13 upstream
There's no reason for these to be changed after boot.
Signed-off-by: Kees Cook
Signed-off-by: Thomas Gleixner
Signed-off-b
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk
commit ffed645e3be0e32f8e9ab068d257aee8d0fe8eec upstream
Fixes: 7bb4d366c ("x86/bugs: Make cpu_show_common() static")
Fixes: 24f7fc83b ("x86/bugs: Provide boot parameters
Hi Vittorio,
On Mon, May 21, 2018 at 07:44:35AM +0200, Vittorio Gambaletta (VittGam) wrote:
> Custom coreboot firmware does not contain "Google_*" as BIOS
> version string; also, booting through stock SeaBIOS will present
> an empty BIOS version string to Linux. So the generic match at
> the top w
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Jim Mattson
commit 5f2b745f5e1304f438f9b2cd03ebc8120b6e0d3b upstream
Cast val and (val >> 32) to (u32), so that they fit in a
general-purpose register in both 32-bit and 64-bit code.
[ tglx:
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 52817587e706686fcdb27f14c1b000c92f266c96 upstream
The SSBD enumeration is similarly to the other bits magically shared
between Intel and AMD though the mechanisms are di
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
https://patchwork.kernel.org/patch/10378815/
> Cc: Bartlomiej Zolnierkiewicz
> Cc: Arvind Yadav
> Cc: dri-de...@lists.free
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 15e6c22fd8e5a42c5ed6d487b7c9fe44c2517765 upstream
svm_vcpu_run() invokes x86_spec_ctrl_restore_host() after VMEXIT, but
before the host GS is restored. x86_spec_ctrl_res
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
> + i = match_string((const char **)trip_point->cdev_name,
Casting looks ugly. You need to constify the variable itsel
Hi,
Without this patch, when launching QEMU with -cpu +ssbd I ended up
with a warning seeing that the CPU does not support - which in fact it does.
The issue was the X86_FEATURE_ - the kvm_cpuid_7_0_edx_x86_features
had bit 17 set (X86_FEATURE_SSBD), while the right bit should have been
bit 31 (
The X86_FEATURE_SSBD is an synthetic CPU feature - that is
it bit location has no relevance to the real CPUID 0x7.EBX[31]
bit position. For that we need the new CPU feature name.
Fixes: 52817587e706 ("x86/cpufeatures: Disentangle SSBD enumeration")
CC: Paolo Bonzini
Cc: "Radim Krčmář"
Cc: Thoma
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 1f50ddb4f4189243c05926b842dc1a0332195f31 upstream
The AMD64_LS_CFG MSR is a per core MSR on Family 17H CPUs. That means when
hyperthreading is enabled the SSBD bit toggl
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Tom Lendacky
commit 11fb0683493b2da112cd64c9dada221b52463bf7 upstream
Some AMD processors only support a non-architectural means of enabling
speculative store bypass disable (SSBD). To allow
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit d1035d971829dcf80e8686ccde26f94b0a069472 upstream
Add a ZEN feature bit so family-dependent static_cpu_has() optimizations
can be built for ZEN.
Signed-off-by: Thomas G
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
>
This doesn't make code looks better anyhow. I even think it makes it
worse to read.
That's why I dropped my version of the
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 0270be3e34efb05a88bc4c422572ece038ef3608 upstream
The upcoming support for the virtual SPEC_CTRL MSR on AMD needs to reuse
speculative_store_bypass_update() to avoid cod
On Mon, May 21, 2018 at 12:53:20PM -0700, Vito Caputo wrote:
> Hello all,
>
> 4.17-rc4 (my latest kernel ATM) consistently fails to start xgalaga
> without -window. I will try find time to build the latest rc this
> evening.
>
> > ~$ xgalaga
> > X Error of failed request: BadValue (integer para
On 05/21/2018 02:30 PM, Steve Grubb wrote:
Hello Stefan,
On Monday, May 21, 2018 1:53:04 PM EDT Stefan Berger wrote:
On 05/21/2018 12:58 PM, Steve Grubb wrote:
On Thursday, May 17, 2018 10:18:13 AM EDT Stefan Berger wrote:
audit_log_container_info() then releasing the local context. This
ver
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit fa8ac4988249c38476f6ad678a4848a736373403 upstream
x86_spec_ctrl_base is the system wide default value for the SPEC_CTRL MSR.
x86_spec_ctrl_get_default() returns x86_spec
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit ccbcd2674472a978b48c91c1fbfb66c0ff959f24 upstream
AMD is proposing a VIRT_SPEC_CTRL MSR to handle the Speculative Store
Bypass Disable via MSR_AMD64_LS_CFG so that guest
Two driver fixes (zfcp and target core), one information leak in sg and
one build clean up.
The patch is available here:
git://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi.git scsi-fixes
The short changelog is:
Alexander Potapenko (1):
scsi: sg: allocate with __GFP_ZERO in sg_build_i
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
commit cc69b34989210f067b2c51d5539b5f96ebcc3a01 upstream
Function bodies are very similar and are going to grow more almost
identical code. Add a bool arg to determine whether
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 47c61b3955cf712cadfc25635bf9bc174af030ea upstream
Add the necessary logic for supporting the emulated VIRT_SPEC_CTRL MSR to
x86_virt_spec_ctrl(). If either X86_FEATURE_
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
https://patchwork.kernel.org/patch/10378781/
> Cc: Jason Cooper
> Cc: Andrew Lunn
> Cc: Gregory Clement
> Cc: Sebastian H
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit be6fcb5478e95bb1c91f489121238deb3abca46a upstream
x86_spec_ctrL_mask is intended to mask out bits from a MSR_SPEC_CTRL value
which are not to be modified. However the im
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk
commit 240da953fcc6a9008c92fae5b1f727ee5ed167ab upstream
The "336996 Speculative Execution Side Channel Mitigations" from
May defines this as SSB_NO, hence lets sync-up.
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Kees Cook
commit 00a02d0c502a06d15e07b857f8ff921e3e402675 upstream
If a seccomp user is not interested in Speculative Store Bypass mitigation
by default, it can set the new SECCOMP_FILTER_FLAG
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit b849a812f7eb92e96d1c8239b06581b2cfd8b275 upstream
Use PR_SPEC_FORCE_DISABLE in seccomp() because seccomp does not allow to
widen restrictions.
Signed-off-by: Thomas Gle
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Kees Cook
commit f21b53b20c754021935ea43364dbf53778eeba32 upstream
Unless explicitly opted out of, anything running under seccomp will have
SSB mitigations enabled. Choosing the "prctl" mode w
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk
commit e96f46ee8587607a828f783daa6eb5b44d25004d upstream
The style for the 'status' file is CamelCase or this. _.
Fixes: fae1fa0fc ("proc: Provide details on speculation
Bart Van Assche wrote:
> On Wed, 2018-05-16 at 17:16 +0200, Dmitry Vyukov wrote:
> > On Wed, May 16, 2018 at 4:56 PM, Bart Van Assche
> > wrote:
> > > On Wed, 2018-05-16 at 22:05 +0900, Tetsuo Handa wrote:
> > > > diff --git a/block/blk-core.c b/block/blk-core.c
> > > > index 85909b4..59e2496 100
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
commit dd0792699c4058e63c0715d9a7c2d40226fcdddc upstream
Fix some typos, improve formulations, end sentences with a fullstop.
Signed-off-by: Borislav Petkov
Signed-off-by: Th
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
> + return match_string(core->parent_names,
> + core->num_parents, parent_core->name) >= 0;
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Mathias Nyman
commit 2278446e2b7cd33ad894b32e7eb63afc7db6c86e upstream.
Hub driver will try to disable a USB3 device twice at logical disconnect,
racing with xhci_free_dev() callback from the
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Andy Shevchenko
commit efc4a13724b852ddaa3358402a8dec024ffbcb17 upstream.
Currently the 32-bit device address only is supported for DMA. However,
starting from Intel Sunrisepoint PCH the DMA a
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Wenwen Wang
commit 3f12888dfae2a48741c4caa9214885b3aaf350f9 upstream.
In snd_ctl_elem_add_compat(), the fields of the struct 'data' need to be
copied from the corresponding fields of the struc
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Andre Przywara
commit 388d4359680b56dba82fe2ffca05871e9fd2b73e upstream.
As Jan reported [1], lockdep complains about the VGIC not being bullet
proof. This seems to be due to two issues:
- Whe
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Guenter Roeck
commit 40626a1bf657eef557fcee9e1b8ef5b4f5b56dcd upstream.
The HTC (Hardware Temperature Control) register has moved
for recent chips.
Cc: sta...@vger.kernel.org # v4.16+
Tested-
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Andre Przywara
commit 711702b57cc3c50b84bd648de0f1ca0a378805be upstream.
kvm_read_guest() will eventually look up in kvm_memslots(), which requires
either to hold the kvm->slots_lock or to be
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Andre Przywara
commit 9c4188762f7fee032abf8451fd9865a9abfc5516 upstream.
Apparently the development of update_affinity() overlapped with the
promotion of irq_lock to be _irqsave, so the patch
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Steven Rostedt (VMware)
commit 45dd9b0666a162f8e4be76096716670cf1741f0e upstream.
Doing an audit of trace events, I discovered two trace events in the xen
subsystem that use a hack to create z
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Shuah Khan
commit 28b68acc4a88dcf91fd1dcf2577371dc9bf574cc upstream.
Refine probe and disconnect debug msgs to be useful and say what is
in progress.
Signed-off-by: Shuah Khan
Cc: stable
Si
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Guenter Roeck
commit 3b031622f598481970400519bd5abc2a16708282 upstream.
The SMN (System Management Network) on Family 17h AMD CPUs is also accessed
from other drivers, specifically EDAC. Acces
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
>
> Cc: Michael Turquette
> Cc: Stephen Boyd
> Cc: Eric Anholt
> Cc: Stefan Wahren
> Cc: linux-...@vger.kernel.org
> Cc: l
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Florian Westphal
commit 569ccae68b38654f04b6842b034aa33857f605fe upstream.
rules in nftables a free'd using kfree, but protected by rcu, i.e. we
must wait for a grace period to elapse.
Normal
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Halil Pasic
commit d66a7355717ec903d455277a550d930ba13df4a8 upstream.
If the translation of a channel program fails, we may end up attempting
to clean up (free, unpin) stuff that never got tra
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Guenter Roeck
commit f9bc6b2dd9cf025f827f471769e1d88b527bfb91 upstream.
Add Raven Ridge root bridge and data fabric PCI IDs.
This is required for amd_pci_dev_to_node_id() and amd_smn_read().
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Jann Horn
commit bb765d1c331f62b59049d35607ed2e365802bef9 upstream.
Bump the file's refcount before moving the reference into the fd table,
not afterwards. The old code could drop the file's r
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Shuah Khan (Samsung OSG)
commit 7510df3f29d44685bab7b1918b61a8ccd57126a9 upstream.
After removing usbip_host module, devices it releases are left without
a driver. For example, when a keyboard
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Florian Westphal
commit 2f6adf481527c8ab8033c601f55bfb5b3712b2ac upstream.
set->name must be free'd here in case ops->init fails.
Fixes: 387454901bd6 ("netfilter: nf_tables: Allow set names o
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Jeremy Soller
commit 2f0d520a1a73555ac51c19cd494493f60b4c1cea upstream.
This adds support for the P950ER, which has the same required fixup as
the P950HR, but has a different PCI ID.
Signed-o
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Shuah Khan (Samsung OSG)
commit c171654caa875919be3c533d3518da8be5be966e upstream.
stub_probe() calls put_busid_priv() in an error path when device isn't
found in the busid_table. Fix it by ma
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Federico Cuello
commit 21493316a3c4598f308d5a9fa31cc74639c4caff upstream.
Currently it's not possible to set volume lower than 26% (it just mutes).
Also fixes this warning:
Warning! Unlike
This is the start of the stable review cycle for the 4.16.11 release.
There are 110 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Tue May 22 21:04:14 UTC 2018.
Anything recei
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Maxime Chevallier
commit a057344806d035cb9ac991619fa07854e807562d upstream.
The Marvell XSMI controller needs 3 clocks to operate correctly :
- The MG clock (clk 5)
- The MG Core clock (clk
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Pavel Tatashin
commit ab1e8d8960b68f54af42b6484b5950bd13a4054b upstream.
It is unsafe to do virtual to physical translations before mm_init() is
called if struct page is needed in order to det
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Michel Thierry
commit b579f924a90f42fa561afd8201514fc216b71949 upstream.
Factor in clear values wherever required while updating destination
min/max.
References: HSDES#160184
Signed-off-b
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Martin Schwidefsky
commit 9f18fff63cfd6f559daa1eaae60640372c65f84b upstream.
The inline assembly to call __do_softirq on the irq stack uses
an indirect branch. This can be replaced with a norm
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Coly Li
commit 1c1a2ee1b53b006754073eefc65d2b2cedb5264b upstream.
Commit 539d39eb2708 ("bcache: fix wrong return value in bch_debug_init()")
returns the return value of debugfs_create_dir() to
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
>
https://www.spinics.net/lists/linux-ide/msg55658.html
> Cc: Bartlomiej Zolnierkiewicz
> Cc: Tejun Heo
> Cc: linux-...@vg
On 05/21/2018 11:17 PM, Alexei Starovoitov wrote:
> Detect code patterns where malicious 'speculative store bypass' can be used
> and sanitize such patterns.
>
> 39: (bf) r3 = r10
> 40: (07) r3 += -216
> 41: (79) r8 = *(u64 *)(r7 +0) // slow read
> 42: (7a) *(u64 *)(r10 -72) = 0 // verifier
Make sure to invoke pci_disable_device() when errors occur in
pcnet32_probe_pci().
Signed-off-by: Bo Chen
---
drivers/net/ethernet/amd/pcnet32.c | 10 +++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/drivers/net/ethernet/amd/pcnet32.c
b/drivers/net/ethernet/amd/pcnet32.c
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
>
https://patchwork.ozlabs.org/patch/908133/
> Cc: Kishon Vijay Abraham I
> Cc: Thierry Reding
> Cc: Jonathan Hunter
> Cc
Hi Mark,
On 5/17/2018 1:21 AM, Mark Brown wrote:
> On Mon, May 07, 2018 at 02:29:45PM -0600, Mahadevan, Girish wrote:
>> On 5/3/2018 5:38 PM, Mark Brown wrote:
>
>>> This is a DT based driver but there is no binding documentation.
>>> Binding documentation is required for any new DT stuff.
>
>>
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Dave Hansen
commit 0a0b152083cfc44ec1bb599b57b7aab41327f998 upstream.
I got a bug report that the following code (roughly) was
causing a SIGSEGV:
mprotect(ptr, size, PROT_EXEC);
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Dave Hansen
commit 2fa9d1cfaf0e02f8abef0757002bff12dfcfa4e6 upstream.
mm_pkey_is_allocated() treats pkey 0 as unallocated. That is
inconsistent with the manpages, and also inconsistent with
m
Jacek
Thanks for the review
On 05/21/2018 04:09 PM, Jacek Anaszewski wrote:
> Hi Dan,
>
> Thank you for the update.
>
> On 05/21/2018 08:09 PM, Dan Murphy wrote:
>> Introduce the family of LED devices that can
>> drive a torch, strobe or IR LED.
>>
>> The LED driver can be configured with a str
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Maxime Chevallier
commit f43194c1447c9536efb0859c2f3f46f6bf2b9154 upstream.
Marvell PPv2.2 controller present on CP-110 need the extra "mg_core_clk"
clock to avoid system hangs when powering s
On 5/21/18 2:04 PM, Jeff Moyer wrote:
> adam.manzana...@wdc.com writes:
>
>> From: Adam Manzanares
>>
>> Now that kiocb has an ioprio field copy this over to the bio when it is
>> created from the kiocb.
>>
>> Signed-off-by: Adam Manzanares
>> ---
>> fs/block_dev.c | 1 +
>> 1 file changed,
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Ard Biesheuvel
commit 0b3225ab9407f557a8e20f23f37aa7236c10a9b1 upstream.
Mixed mode allows a kernel built for x86_64 to interact with 32-bit
EFI firmware, but requires us to define all struct
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit fed71f7d98795ed0fa1d431910787f0f4a68324f upstream.
Rick bisected a regression on large systems which use the x2apic cluster
mode for interrupt delivery to the commit wic
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
> int ret, bt_force_ant_mode;
>
> - for (bt_force_ant_mode = 0;
> -bt_force_ant_mode < ARRAY_SIZE(m
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Masami Hiramatsu
commit 69af7e23a6870df2ea6fa79ca16493d59b3eebeb upstream.
Since get_kprobe_ctlblk() uses smp_processor_id() to access
per-cpu variable, it hits smp_processor_id sanity check a
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Dmitry Safonov
commit acf46020012ccbca1172e9c7aeab399c950d9212 upstream.
The x86 mmap() code selects the mmap base for an allocation depending on
the bitness of the syscall. For 64bit sycalls
On 5/21/18 1:57 PM, Jeff Moyer wrote:
> Hi, Adam,
>
> adam.manzana...@wdc.com writes:
>
>> From: Adam Manzanares
>>
>> This is the per-I/O equivalent of the ioprio_set system call.
>> See the following link for performance implications on a SATA HDD:
>> https://lkml.org/lkml/2016/12/6/495
>>
>
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Masami Hiramatsu
commit 0d73c3f8e7f6ee2aab1bb350f60c180f5ae21a2c upstream.
Since do_undefinstr() uses get_user to get the undefined
instruction, it can be called before kprobes processes
recur
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Robbie Ko
commit 6f2f0b394b54e2b159ef969a0b5274e9bbf82ff2 upstream.
[BUG]
btrfs incremental send BUG happens when creating a snapshot of snapshot
that is being used by send.
[REASON]
The prob
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Anand Jain
commit 02ee654d3a04563c67bfe658a05384548b9bb105 upstream.
We set the BTRFS_BALANCE_RESUME flag in the btrfs_recover_balance()
only, which isn't called during the remount. So when re
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Nikolay Borisov
commit fe816d0f1d4c31c4c31d42ca78a87660565fc800 upstream.
When a transaction is aborted btrfs_cleanup_transaction is called to
cleanup all the various in-flight bits and pieces
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Liu Bo
commit 02a3307aa9c20b4f6626255b028f07f6cfa16feb upstream.
If a btree block, aka. extent buffer, is not available in the extent
buffer cache, it'll be read out from the disk instead, i.e
HI!
> On Sun, Apr 22, 2018 at 09:42:13AM +0200, Pavel Machek wrote:
> > v4.17-rc1 broke display for me on Nokia N900. (I don't know if system
> > boots, but I can see on red flash LED that at least that driver
> > succeeded. So it should not be early boot crash).
> >
> > v4.17-rc1 also broke boot
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote:
> match_string() returns the index of an array for a matching string,
> which can be used intead of open coded variant.
> - for (i = 0; i < ARRAY_SIZE(cudbg_region); i++) {
> - if (!strcmp(cudbg_region[i], region_name)) {
> -
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Nicholas Piggin
commit c1d2a31397ec51f0370f6bd17b19b39152c263cb upstream.
Similarly to opal_event_shutdown, opal_nvram_write can be called in
the crash path with irqs disabled. Special case th
On 5/21/2018 2:04 PM, Guenter Roeck wrote:
On Mon, May 21, 2018 at 01:50:34PM -0700, Jae Hyun Yoo wrote:
On 5/21/2018 1:42 PM, Guenter Roeck wrote:
On Mon, May 21, 2018 at 12:59:52PM -0700, Jae Hyun Yoo wrote:
This commit adds PECI cputemp hwmon driver.
Signed-off-by: Jae Hyun Yoo
Reviewed-b
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Linus Torvalds
commit 1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f upstream
The macro is not type safe and I did look for why that "g" constraint for
the asm doesn't work: it's because the asm is
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Boris Brezillon
commit 90d617633368ab97a2c7571c6e66dad54f39228d upstream.
The code is doing monolithic reads for all chunks except the last one
which is wrong since a monolithic read will issu
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Haneen Mohammed
commit 7f6df440b8623c441c42d070bf592e2d2c1fa9bb upstream.
This patch matches the sysfs name used in the unlinking with the
linking function. Otherwise, remove_compat_control_li
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Ross Zwisler
commit 9f418224e8114156d995b98fa4e0f4fd21f685fe upstream.
Fix a race in the multi-order iteration code which causes the kernel to
hit a GP fault. This was first seen with a produ
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Matthew Wilcox
commit 1e3054b98c5415d5cb5f8824fc33b548ae5644c3 upstream.
I had neglected to increment the error counter when the tests failed,
which made the tests noisy when they fail, but no
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk
commit da39556f66f5cfe8f9c989206974f1cb16ca5d7c upstream
Expose the CPUID.7.EDX[31] bit to the guest, and also guard against various
combinations of SPEC_CTRL MSR values.
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit a73ec77ee17ec556fe7f165d00314cb7c047b1ac upstream
Add prctl based control for Speculative Store Bypass mitigation and make it
the default mitigation for Intel and AMD.
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: kbuild test robot
commit ae0662f84b105776734cb089703a7bf834bac195 upstream.
Fixes: 3ecbfd65f50e ("netfilter: nf_tables: allocate handle and delete objects
via handle")
Signed-off-by: Fengguan
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 28a2775217b17208811fa43a9e96bd1fdf417b86 upstream
Having everything in nospec-branch.h creates a hell of dependencies when
adding the prctl based switching mechanism. Mo
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit 885f82bfbc6fefb6664ea27965c3ab9ac4194b8c upstream
The Speculative Store Bypass vulnerability can be mitigated with the
Reduced Data Speculation (RDS) feature. To allow f
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Thomas Gleixner
commit b617cfc858161140d69cc0b5cc211996b557a1c7 upstream
Add two new prctls to control aspects of speculation related vulnerabilites
and their mitigations to provide finer grai
4.16-stable review patch. If anyone has any objections, please let me know.
--
From: Kees Cook
commit 5c3070890d06ff82eecb808d02d2ca39169533ef upstream
When speculation flaw mitigations are opt-in (via prctl), using seccomp
will automatically opt-in to these protections, since
301 - 400 of 1205 matches
Mail list logo