Re: WTF: patch "[PATCH] x86/xen: allow userspace access during hypercalls" was seriously submitted to be applied to the 4.12-stable tree?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jul 25, 2017 at 02:09:55AM +0200, Marek Marczykowski-Górecki wrote:
> On Mon, Jul 24, 2017 at 04:45:02PM -0700, gregkh@xxxxxxxxxxxxxxxxxxx wrote:
> > The patch below was submitted to be applied to the 4.12-stable tree.
> > 
> > I fail to see how this patch meets the stable kernel rules as found at
> > Documentation/process/stable_kernel_rules.rst.
> > 
> > I could be totally wrong, and if so, please respond to 
> > <stable@xxxxxxxxxxxxxxx> and let me know why this patch should be
> > applied.  Otherwise, it is now dropped from my patch queues, never to be
> > seen again.
> 
> This is a fix for -EFAULT on (any?) usage of /dev/xen/privcmd from
> inside of Xen HVM guest with SMAP enabled. Details in this thread:
> http://markmail.org/message/b6wxaipxbjyhiueg

Why wasn't that information in the changelog itself?  As it is it lookes
like a "here's a new feature" type of patch...

I'll go queue this up now, thanks.

greg k-h



[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]