|
Re: [PATCH 4.4-cip 0/6] Extend user-space ASLR range
Hi,
Please do so.
--
Agustin Benito Bethencourt
Principal Consultant - FOSS at Codethink
agustin.benito@...
Hi,
Please do so.
--
Agustin Benito Bethencourt
Principal Consultant - FOSS at Codethink
agustin.benito@...
|
By
Agustin Benito Bethencourt <agustin.benito@...>
·
#133
·
|
|
4.4 LTS basic info
Hi,
in the previous CIP Members meeting a question was made related with the 4.4 LTS kernel EOL (end of life).
I have added to the wiki basic links that answers this question.
Link:
Hi,
in the previous CIP Members meeting a question was made related with the 4.4 LTS kernel EOL (end of life).
I have added to the wiki basic links that answers this question.
Link:
|
By
Agustin Benito Bethencourt <agustin.benito@...>
·
#132
·
|
|
Re: [PATCH 4.4-cip 0/6] Extend user-space ASLR range
[Sorry for the delay; I haven't been feeling well.]
I would normally cc the upstream developers, but I was hesitant to do so
for CIP because this is not related to an official stable branch.
Perhaps
[Sorry for the delay; I haven't been feeling well.]
I would normally cc the upstream developers, but I was hesitant to do so
for CIP because this is not related to an official stable branch.
Perhaps
|
By
Ben Hutchings <ben.hutchings@...>
·
#131
·
|
|
CIP Developer update
As before we're including outstanding problems as gitlab
issues - read them for more information!
CIP
- build artifacts - we're still unable to retrieve these.
We have manually
As before we're including outstanding problems as gitlab
issues - read them for more information!
CIP
- build artifacts - we're still unable to retrieve these.
We have manually
|
By
Robert Marshall <robert.marshall@...>
·
#130
·
|
|
Re: [PATCH 4.4-cip 0/6] Extend user-space ASLR range
I've chatted with Elena over this last week, and she talked to Kees who
pointed out that the Android people are also doing KSPP backports to 4.4
(thanks, folks!). I didn't check any details, just a
I've chatted with Elena over this last week, and she talked to Kees who
pointed out that the Android people are also doing KSPP backports to 4.4
(thanks, folks!). I didn't check any details, just a
|
By
Jan Kiszka
·
#129
·
|
|
CIP Developer update
CIP developer update, we're including outstanding problems as gitlab
issues and there's more information at the issue links.
CIP
- On retrieving build artifacts - we still have issues here.
CIP developer update, we're including outstanding problems as gitlab
issues and there's more information at the issue links.
CIP
- On retrieving build artifacts - we still have issues here.
|
By
Robert Marshall <robert.marshall@...>
·
#128
·
|
|
Update week 49
Hi,
this is an overview of what is happening at CIP. Feel free to answer this mail with your bits.
++ Meetings
* Members meeting on Mon Nov 28th
** The next f2f meeting will take place at ELC in
Hi,
this is an overview of what is happening at CIP. Feel free to answer this mail with your bits.
++ Meetings
* Members meeting on Mon Nov 28th
** The next f2f meeting will take place at ELC in
|
By
Agustin Benito Bethencourt <agustin.benito@...>
·
#127
·
|
|
Re: [PATCH 4.4-cip 0/6] Extend user-space ASLR range
Did you try to discuss the back-port topic with the KSPP folks or other
key persons involved in these patches? In the ideal case, the authors
can be CC'ed, do not get annoyed by "these crazy people
Did you try to discuss the back-port topic with the KSPP folks or other
key persons involved in these patches? In the ideal case, the authors
can be CC'ed, do not get annoyed by "these crazy people
|
By
Jan Kiszka
·
#126
·
|
|
[PATCH 4.4-cip 23/23] mlx4: remove unused fields
From: David Decotigny <decot@...>
commit 5038056e6bd45788235e97e3bcfc43f96c52ca84 upstream.
This also can address following UBSAN warnings:
[ 36.640343]
From: David Decotigny <decot@...>
commit 5038056e6bd45788235e97e3bcfc43f96c52ca84 upstream.
This also can address following UBSAN warnings:
[ 36.640343]
|
By
Ben Hutchings <ben.hutchings@...>
·
#124
·
|
|
[PATCH 4.4-cip 22/23] net: get rid of an signed integer overflow in ip_idents_reserve()
From: Eric Dumazet <edumazet@...>
commit adb03115f4590baa280ddc440a8eff08a6be0cb7 upstream.
Jiri Pirko reported an UBSAN warning happening in ip_idents_reserve()
[] UBSAN: Undefined
From: Eric Dumazet <edumazet@...>
commit adb03115f4590baa280ddc440a8eff08a6be0cb7 upstream.
Jiri Pirko reported an UBSAN warning happening in ip_idents_reserve()
[] UBSAN: Undefined
|
By
Ben Hutchings <ben.hutchings@...>
·
#123
·
|
|
[PATCH 4.4-cip 21/23] xfs: fix signed integer overflow
From: Xie XiuQi <xiexiuqi@...>
commit 79c350e45ebc5a718cc2d7114b45ad560069423d upstream.
Use 1U for unsigned int to avoid a overflow warning from UBSAN.
[ 31.910858] UBSAN: Undefined
From: Xie XiuQi <xiexiuqi@...>
commit 79c350e45ebc5a718cc2d7114b45ad560069423d upstream.
Use 1U for unsigned int to avoid a overflow warning from UBSAN.
[ 31.910858] UBSAN: Undefined
|
By
Ben Hutchings <ben.hutchings@...>
·
#122
·
|
|
[PATCH 4.4-cip 20/23] drm: fix signed integer overflow
From: Xie XiuQi <xiexiuqi@...>
commit ae0119f5f73b1e9cf7177fbbeea68d74c5751def upstream.
Use 1UL for unsigned long, or we'll meet a overflow issue with UBSAN.
[ 15.589489] UBSAN: Undefined
From: Xie XiuQi <xiexiuqi@...>
commit ae0119f5f73b1e9cf7177fbbeea68d74c5751def upstream.
Use 1UL for unsigned long, or we'll meet a overflow issue with UBSAN.
[ 15.589489] UBSAN: Undefined
|
By
Ben Hutchings <ben.hutchings@...>
·
#121
·
|
|
[PATCH 4.4-cip 19/23] pwm: samsung: Fix to use lowest div for large enough modulation bits
From: Seung-Woo Kim <sw0312.kim@...>
commit 04d68dea26b0a409d44e87ea573a131b6dc67e78 upstream.
From pwm_samsung_calc_tin(), there is routine to find the lowest divider
possible to generate
From: Seung-Woo Kim <sw0312.kim@...>
commit 04d68dea26b0a409d44e87ea573a131b6dc67e78 upstream.
From pwm_samsung_calc_tin(), there is routine to find the lowest divider
possible to generate
|
By
Ben Hutchings <ben.hutchings@...>
·
#120
·
|
|
[PATCH 4.4-cip 18/23] time: Avoid undefined behaviour in ktime_add_safe()
From: Vegard Nossum <vegard.nossum@...>
commit 979515c5645830465739254abc1b1648ada41518 upstream.
I ran into this:
From: Vegard Nossum <vegard.nossum@...>
commit 979515c5645830465739254abc1b1648ada41518 upstream.
I ran into this:
|
By
Ben Hutchings <ben.hutchings@...>
·
#119
·
|
|
[PATCH 4.4-cip 17/23] rhashtable: fix shift by 64 when shrinking
From: Vegard Nossum <vegard.nossum@...>
commit 12311959ecf8a3a64676c01b62ce67a0c5f0fd49 upstream.
I got this:
From: Vegard Nossum <vegard.nossum@...>
commit 12311959ecf8a3a64676c01b62ce67a0c5f0fd49 upstream.
I got this:
|
By
Ben Hutchings <ben.hutchings@...>
·
#118
·
|
|
[PATCH 4.4-cip 16/23] UBSAN: fix typo in format string
From: Nicolas Iooss <nicolas.iooss_linux@...>
commit 901d805c33fc4c029fc6b2d94ee5fb7d30278045 upstream.
handle_object_size_mismatch() used %pk to format a kernel pointer with
pr_err(). This
From: Nicolas Iooss <nicolas.iooss_linux@...>
commit 901d805c33fc4c029fc6b2d94ee5fb7d30278045 upstream.
handle_object_size_mismatch() used %pk to format a kernel pointer with
pr_err(). This
|
By
Ben Hutchings <ben.hutchings@...>
·
#117
·
|
|
[PATCH 4.4-cip 15/23] mmc: dw_mmc: remove UBSAN warning in dw_mci_setup_bus()
From: Seung-Woo Kim <sw0312.kim@...>
commit 65257a0deed5aee66b4e3708944f0be62a64cabc upstream.
This patch removes following UBSAN warnings in dw_mci_setup_bus().
UBSAN: Undefined
From: Seung-Woo Kim <sw0312.kim@...>
commit 65257a0deed5aee66b4e3708944f0be62a64cabc upstream.
This patch removes following UBSAN warnings in dw_mci_setup_bus().
UBSAN: Undefined
|
By
Ben Hutchings <ben.hutchings@...>
·
#116
·
|
|
[PATCH 4.4-cip 14/23] signal: move the "sig < SIGRTMIN" check into siginmask(sig)
From: Oleg Nesterov <oleg@...>
commit 5c8ccefdf46c5f87d87b694c7fbc04941c2c99a5 upstream.
All the users of siginmask() must ensure that sig < SIGRTMIN. sig_fatal()
doesn't and this is
From: Oleg Nesterov <oleg@...>
commit 5c8ccefdf46c5f87d87b694c7fbc04941c2c99a5 upstream.
All the users of siginmask() must ensure that sig < SIGRTMIN. sig_fatal()
doesn't and this is
|
By
Ben Hutchings <ben.hutchings@...>
·
#115
·
|
|
[PATCH 4.4-cip 13/23] batman-adv: Fix integer overflow in batadv_iv_ogm_calc_tq
From: Sven Eckelmann <sven.eckelmann@...>
commit d285f52cc0f23564fd61976d43fd5b991b4828f6 upstream.
The undefined behavior sanatizer detected an signed integer overflow in a
setup with
From: Sven Eckelmann <sven.eckelmann@...>
commit d285f52cc0f23564fd61976d43fd5b991b4828f6 upstream.
The undefined behavior sanatizer detected an signed integer overflow in a
setup with
|
By
Ben Hutchings <ben.hutchings@...>
·
#114
·
|
|
[PATCH 4.4-cip 12/23] blk-mq: fix undefined behaviour in order_to_size()
From: Bartlomiej Zolnierkiewicz <b.zolnierkie@...>
commit b3a834b1596ac668df206aa2bb1f191c31f5f5e4 upstream.
When this_order variable in blk_mq_init_rq_map() becomes zero
the code
From: Bartlomiej Zolnierkiewicz <b.zolnierkie@...>
commit b3a834b1596ac668df206aa2bb1f191c31f5f5e4 upstream.
When this_order variable in blk_mq_init_rq_map() becomes zero
the code
|
By
Ben Hutchings <ben.hutchings@...>
·
#113
·
|