From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.kernel.org ([198.145.29.99]:40598 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965055AbeEXHYq (ORCPT ); Thu, 24 May 2018 03:24:46 -0400 Date: Thu, 24 May 2018 09:24:28 +0200 From: Greg KH To: Fabrizio Castro Cc: Ben Hutchings , Chris Paterson , Biju Das , Jianming Qiao , "stable@vger.kernel.org" Subject: Re: [PATCH] Message-ID: <20180524072428.GA13872@kroah.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: stable-owner@vger.kernel.org List-ID: On Tue, May 22, 2018 at 09:37:39AM +0000, Fabrizio Castro wrote: > Hello Greg, > > Thank you for your feedback. > > > Subject: Re: [PATCH] dmaengine: ensure dmaengine helpers check valid callback > > > > On Mon, May 21, 2018 at 05:56:55PM +0100, Fabrizio Castro wrote: > > > From: Vinod Koul > > > > > > commit 757d12e5849be549076901b0d33c60d5f360269c upstream. > > > > > > dmaengine has various device callbacks and exposes helper > > > functions to invoke these. These helpers should check if channel, > > > device and callback is valid or not before invoking them. > > > > > > Reported-by: Jon Hunter > > > Signed-off-by: Vinod Koul > > > [fabrizio: cherry-pick to 4.4] > > > Signed-off-by: Fabrizio Castro > > > Signed-off-by: Jianming Qiao > > > --- > > > Hello Greg, > > > > > > while backporting commit 757d12e5849be549076901b0d33c60d5f360269c > > > to the CIP kernel Ben recommended to send the same patch to you > > > for 4.4 stable. > > > I hope the format of the commit is the one you expect (reference to > > > the upstream commit, version to cherry-pick the patch to, and > > > Signed-off-by tags). > > > > Format is fine, but why is this needed in the 4.4.y kernel tree? > > We work with the CIP kernel (v4.4), and from time to time we come across bug fixes we feel like stable could benefit from. > Also, since Ben merges the CIP branch with stable, the fixes we make to stable will appear in the CIP kernel too at some point. > If you feel like the patch is not worth considering for stable, it can still be applied to the CIP kernel if required. > Ben has already taken this patch (for v4.4.126-cip22) therefore it's not on our critical path, but it would be nice to have in the stable kernel too. > > > What bug does it solve? > > Without this patch we managed to get the kernel to try and dereference > a NULL pointer while playing around with ttys (basically by having the > wrong tty with /etc/securetty). Really? What tty caused this problem? > Are you happy to take this patch? It does not seem to fix a problem in the tree today, but it feels "safe enough", so I guess I'll queue it up. thanks, greg k-h