|
[PATCH 4.4-cip 10/23] drm/radeon: don't include RADEON_HPD_NONE in HPD IRQ enable bitsets
From: Nicolai Stange <nicstange@...>
commit b2c0cbd657173f024138d6421774007690ceeffd upstream.
The values of all but the RADEON_HPD_NONE members of the radeon_hpd_id
enum transform 1:1 into
From: Nicolai Stange <nicstange@...>
commit b2c0cbd657173f024138d6421774007690ceeffd upstream.
The values of all but the RADEON_HPD_NONE members of the radeon_hpd_id
enum transform 1:1 into
|
By
Ben Hutchings <ben.hutchings@...>
·
#111
·
|
|
[PATCH 4.4-cip 09/23] perf/x86/amd: Set the size of event map array to PERF_COUNT_HW_MAX
From: Adam Borowski <kilobyte@...>
commit 0a25556f84d5f79e68e9502bb1f32a43377ab2bf upstream.
The entry for PERF_COUNT_HW_REF_CPU_CYCLES is not used on AMD, but is
referenced by
From: Adam Borowski <kilobyte@...>
commit 0a25556f84d5f79e68e9502bb1f32a43377ab2bf upstream.
The entry for PERF_COUNT_HW_REF_CPU_CYCLES is not used on AMD, but is
referenced by
|
By
Ben Hutchings <ben.hutchings@...>
·
#110
·
|
|
[PATCH 4.4-cip 08/23] mm/filemap: generic_file_read_iter(): check for zero reads unconditionally
From: Nicolai Stange <nicstange@...>
commit e7080a439a6f507abbc860847c33efc39b5c1c6d upstream.
If
- generic_file_read_iter() gets called with a zero read length,
- the read offset is at a
From: Nicolai Stange <nicstange@...>
commit e7080a439a6f507abbc860847c33efc39b5c1c6d upstream.
If
- generic_file_read_iter() gets called with a zero read length,
- the read offset is at a
|
By
Ben Hutchings <ben.hutchings@...>
·
#109
·
|
|
[PATCH 4.4-cip 07/23] ubsan: fix tree-wide -Wmaybe-uninitialized false positives
From: Andrey Ryabinin <aryabinin@...>
commit dde5cf39d4d2cce71f2997c37210dd624d0e4bf6 upstream.
-fsanitize=* options makes GCC less smart than usual and increase number
of
From: Andrey Ryabinin <aryabinin@...>
commit dde5cf39d4d2cce71f2997c37210dd624d0e4bf6 upstream.
-fsanitize=* options makes GCC less smart than usual and increase number
of
|
By
Ben Hutchings <ben.hutchings@...>
·
#108
·
|
|
[PATCH 4.4-cip 06/23] perf/core: Fix Undefined behaviour in rb_alloc()
From: Peter Zijlstra <peterz@...>
commit 8184059e93c200757f5c0805dae0f14e880eab5d upstream.
Sasha reported:
[ 3494.030114] UBSAN: Undefined behaviour in
From: Peter Zijlstra <peterz@...>
commit 8184059e93c200757f5c0805dae0f14e880eab5d upstream.
Sasha reported:
[ 3494.030114] UBSAN: Undefined behaviour in
|
By
Ben Hutchings <ben.hutchings@...>
·
#107
·
|
|
[PATCH 4.4-cip 05/23] mm/page-writeback: fix dirty_ratelimit calculation
From: Andrey Ryabinin <aryabinin@...>
commit d59b1087a98e402ed9a7cc577f4da435f9a555f5 upstream.
Calculation of dirty_ratelimit sometimes is not correct. E.g. initial
values of
From: Andrey Ryabinin <aryabinin@...>
commit d59b1087a98e402ed9a7cc577f4da435f9a555f5 upstream.
Calculation of dirty_ratelimit sometimes is not correct. E.g. initial
values of
|
By
Ben Hutchings <ben.hutchings@...>
·
#106
·
|
|
[PATCH 4.4-cip 04/23] x86/microcode/intel: Change checksum variables to u32
From: Chris Bainbridge <chris.bainbridge@...>
commit bc864af13f34d19c911f5691d87bdacc9ce109f5 upstream.
Microcode checksum verification should be done using unsigned 32-bit
values otherwise
From: Chris Bainbridge <chris.bainbridge@...>
commit bc864af13f34d19c911f5691d87bdacc9ce109f5 upstream.
Microcode checksum verification should be done using unsigned 32-bit
values otherwise
|
By
Ben Hutchings <ben.hutchings@...>
·
#105
·
|
|
[PATCH 4.4-cip 03/23] PM / sleep: declare __tracedata symbols as char[] rather than char
From: Eric Biggers <ebiggers3@...>
commit f97238373b8662a6d580e204df2e7bcbfa43e27a upstream.
Accessing more than one byte from a symbol declared simply 'char' is undefined
behavior, as
From: Eric Biggers <ebiggers3@...>
commit f97238373b8662a6d580e204df2e7bcbfa43e27a upstream.
Accessing more than one byte from a symbol declared simply 'char' is undefined
behavior, as
|
By
Ben Hutchings <ben.hutchings@...>
·
#104
·
|
|
[PATCH 4.4-cip 02/23] ubsan: cosmetic fix to Kconfig text
From: Yang Shi <yang.shi@...>
commit 7707535ab95e2231b6d7f2bfb4f27558e83c4dc2 upstream.
When enabling UBSAN_SANITIZE_ALL, the kernel image size gets increased
significantly (~3x). So, it
From: Yang Shi <yang.shi@...>
commit 7707535ab95e2231b6d7f2bfb4f27558e83c4dc2 upstream.
When enabling UBSAN_SANITIZE_ALL, the kernel image size gets increased
significantly (~3x). So, it
|
By
Ben Hutchings <ben.hutchings@...>
·
#103
·
|
|
[PATCH 4.4-cip 01/23] UBSAN: run-time undefined behavior sanity checker
From: Andrey Ryabinin <aryabinin@...>
commit c6d308534aef6c99904bf5862066360ae067abc4 upstream.
UBSAN uses compile-time instrumentation to catch undefined behavior
(UB). Compiler inserts
From: Andrey Ryabinin <aryabinin@...>
commit c6d308534aef6c99904bf5862066360ae067abc4 upstream.
UBSAN uses compile-time instrumentation to catch undefined behavior
(UB). Compiler inserts
|
By
Ben Hutchings <ben.hutchings@...>
·
#102
·
|
|
[PATCH 4.4-cip 00/23] Undefined Behaviour Sanititizer support
This is a backport of changes in 4.5 to add support for GCC's Undefined
Behaviour Sanitizer (UBSAN), and fixes for undefined behaviour that it
has found (that are not already in 4.4.30).
UBSAN
This is a backport of changes in 4.5 to add support for GCC's Undefined
Behaviour Sanitizer (UBSAN), and fixes for undefined behaviour that it
has found (that are not already in 4.4.30).
UBSAN
|
By
Ben Hutchings <ben.hutchings@...>
·
#101
·
|
|
[PATCH 4.4-cip 5/5] mm/page_poisoning.c: allow for zero poisoning
From: Laura Abbott <labbott@...>
commit 1414c7f4f7d72d138fff35f00151d15749b5beda upstream.
By default, page poisoning uses a poison value (0xaa) on free. If this
is changed to 0, the
From: Laura Abbott <labbott@...>
commit 1414c7f4f7d72d138fff35f00151d15749b5beda upstream.
By default, page poisoning uses a poison value (0xaa) on free. If this
is changed to 0, the
|
By
Ben Hutchings <ben.hutchings@...>
·
#100
·
|
|
[PATCH 4.4-cip 4/5] mm/page_poison.c: enable PAGE_POISONING as a separate option
From: Laura Abbott <labbott@...>
commit 8823b1dbc05fab1a8bec275eeae4709257c2661d upstream.
Page poisoning is currently set up as a feature if architectures don't
have architecture
From: Laura Abbott <labbott@...>
commit 8823b1dbc05fab1a8bec275eeae4709257c2661d upstream.
Page poisoning is currently set up as a feature if architectures don't
have architecture
|
By
Ben Hutchings <ben.hutchings@...>
·
#99
·
|
|
[PATCH 4.4-cip 3/5] mm/slab: clean up DEBUG_PAGEALLOC processing code
From: Joonsoo Kim <iamjoonsoo.kim@...>
commit 40b44137971c2e5865a78f9f7de274449983ccb5 upstream.
Currently, open code for checking DEBUG_PAGEALLOC cache is spread to
some sites. It makes code
From: Joonsoo Kim <iamjoonsoo.kim@...>
commit 40b44137971c2e5865a78f9f7de274449983ccb5 upstream.
Currently, open code for checking DEBUG_PAGEALLOC cache is spread to
some sites. It makes code
|
By
Ben Hutchings <ben.hutchings@...>
·
#98
·
|
|
[PATCH 4.4-cip 2/5] mm/slab: use more appropriate condition check for debug_pagealloc
From: Joonsoo Kim <iamjoonsoo.kim@...>
commit 40323278b557a5909bbecfa181c91a3af7afbbe3 upstream.
debug_pagealloc debugging is related to SLAB_POISON flag rather than
FORCED_DEBUG option,
From: Joonsoo Kim <iamjoonsoo.kim@...>
commit 40323278b557a5909bbecfa181c91a3af7afbbe3 upstream.
debug_pagealloc debugging is related to SLAB_POISON flag rather than
FORCED_DEBUG option,
|
By
Ben Hutchings <ben.hutchings@...>
·
#97
·
|
|
[PATCH 4.4-cip 1/5] mm/slab: activate debug_pagealloc in SLAB when it is actually enabled
From: Joonsoo Kim <iamjoonsoo.kim@...>
commit a307ebd468e0b97c203f5a99a56a6017e4d1991a upstream.
Signed-off-by: Joonsoo Kim <iamjoonsoo.kim@...>
Acked-by: Christoph Lameter
From: Joonsoo Kim <iamjoonsoo.kim@...>
commit a307ebd468e0b97c203f5a99a56a6017e4d1991a upstream.
Signed-off-by: Joonsoo Kim <iamjoonsoo.kim@...>
Acked-by: Christoph Lameter
|
By
Ben Hutchings <ben.hutchings@...>
·
#96
·
|
|
[PATCH 4.4-cip 0/5] Faster page poisoning for security
This is a backport of changes in 4.6 to add new config options to page
poisoning. Page poisoning was originally intended a debug feature for
finding use-after-free bugs in the kernel, but it can also
This is a backport of changes in 4.6 to add new config options to page
poisoning. Page poisoning was originally intended a debug feature for
finding use-after-free bugs in the kernel, but it can also
|
By
Ben Hutchings <ben.hutchings@...>
·
#95
·
|
|
[PATCH 4.4-cip 6/6] mm: ASLR: use get_random_long()
From: Daniel Cashman <dcashman@...>
commit 5ef11c35ce86b94bfb878b684de4cdaf96f54b2f upstream.
Replace calls to get_random_int() followed by a cast to (unsigned long)
with calls to
From: Daniel Cashman <dcashman@...>
commit 5ef11c35ce86b94bfb878b684de4cdaf96f54b2f upstream.
Replace calls to get_random_int() followed by a cast to (unsigned long)
with calls to
|
By
Ben Hutchings <ben.hutchings@...>
·
#94
·
|
|
[PATCH 4.4-cip 5/6] drivers: char: random: add get_random_long()
Daniel Cashman <dcashman@...>
commit ec9ee4acd97c0039a61c0ae4f12705767ae62153 upstream.
Commit d07e22597d1d ("mm: mmap: add new /proc tunable for mmap_base
ASLR") added the ability to choose
Daniel Cashman <dcashman@...>
commit ec9ee4acd97c0039a61c0ae4f12705767ae62153 upstream.
Commit d07e22597d1d ("mm: mmap: add new /proc tunable for mmap_base
ASLR") added the ability to choose
|
By
Ben Hutchings <ben.hutchings@...>
·
#93
·
|
|
[PATCH 4.4-cip 4/6] x86: mm: support ARCH_MMAP_RND_BITS
From: Daniel Cashman <dcashman@...>
commit 9e08f57d684ac2f40685f55f659564bfd91a971e upstream.
x86: arch_mmap_rnd() uses hard-coded values, 8 for 32-bit and 28 for
64-bit, to generate the
From: Daniel Cashman <dcashman@...>
commit 9e08f57d684ac2f40685f55f659564bfd91a971e upstream.
x86: arch_mmap_rnd() uses hard-coded values, 8 for 32-bit and 28 for
64-bit, to generate the
|
By
Ben Hutchings <ben.hutchings@...>
·
#92
·
|