mailweb.openeuler.org
Manage this list

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

Kernel

Threads by month
  • ----- 2025 -----
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
kernel@openeuler.org

February 2025

  • 56 participants
  • 330 discussions
[openeuler:OLK-6.6 1924/1924] mm/vmalloc.c:4443: warning: Function parameter or member 'pgoff' not described in 'remap_vmalloc_hugepage_range_partial'
by kernel test robot 14 Feb '25

14 Feb '25
Hi Wang, FYI, the error/warning still remains. tree: https://gitee.com/openeuler/kernel.git OLK-6.6 head: 254b433462607f511039b75693d9314822538f20 commit: 9b1283f2bec2134030e1e099b900579f1f03840e [1924/1924] mm/vmalloc: Extend vmalloc usage about hugepage config: x86_64-allnoconfig (https://download.01.org/0day-ci/archive/20250214/202502141816.L1NkVPgB-lkp@…) compiler: clang version 19.1.3 (https://github.com/llvm/llvm-project ab51eccf88f5321e7c60591c5546b254b6afab99) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250214/202502141816.L1NkVPgB-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202502141816.L1NkVPgB-lkp@intel.com/ All warnings (new ones prefixed by >>): >> mm/vmalloc.c:4443: warning: Function parameter or member 'pgoff' not described in 'remap_vmalloc_hugepage_range_partial' vim +4443 mm/vmalloc.c 4423 4424 /** 4425 * remap_vmalloc_hugepage_range_partial - map vmalloc hugepages 4426 * to userspace 4427 * @vma: vma to cover 4428 * @uaddr: target user address to start at 4429 * @kaddr: virtual address of vmalloc hugepage kernel memory 4430 * @size: size of map area 4431 * 4432 * Returns: 0 for success, -Exxx on failure 4433 * 4434 * This function checks that @kaddr is a valid vmalloc'ed area, 4435 * and that it is big enough to cover the range starting at 4436 * @uaddr in @vma. Will return failure if that criteria isn't 4437 * met. 4438 * 4439 * Similar to remap_pfn_range() (see mm/memory.c) 4440 */ 4441 int remap_vmalloc_hugepage_range_partial(struct vm_area_struct *vma, unsigned long uaddr, 4442 void *kaddr, unsigned long pgoff, unsigned long size) > 4443 { 4444 struct vm_struct *area; 4445 unsigned long off; 4446 unsigned long end_index; 4447 4448 if (check_shl_overflow(pgoff, PMD_SHIFT, &off)) 4449 return -EINVAL; 4450 4451 size = ALIGN(size, PMD_SIZE); 4452 4453 if (!IS_ALIGNED(uaddr, PMD_SIZE) || !IS_ALIGNED((unsigned long)kaddr, PMD_SIZE)) 4454 return -EINVAL; 4455 4456 area = find_vm_area(kaddr); 4457 if (!area) 4458 return -EINVAL; 4459 4460 if (!(area->flags & VM_USERMAP)) 4461 return -EINVAL; 4462 4463 if (check_add_overflow(size, off, &end_index) || 4464 end_index > get_vm_area_size(area)) 4465 return -EINVAL; 4466 kaddr += off; 4467 4468 do { 4469 struct page *page = vmalloc_to_page(kaddr); 4470 int ret; 4471 4472 ret = hugetlb_insert_hugepage_pte_by_pa(vma->vm_mm, uaddr, 4473 vma->vm_page_prot, page_to_phys(page)); 4474 if (ret) 4475 return ret; 4476 4477 uaddr += PMD_SIZE; 4478 kaddr += PMD_SIZE; 4479 size -= PMD_SIZE; 4480 } while (size > 0); 4481 4482 vm_flags_set(vma, VM_DONTEXPAND | VM_DONTDUMP); 4483 4484 return 0; 4485 } 4486 EXPORT_SYMBOL(remap_vmalloc_hugepage_range_partial); 4487 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[PATCH OLK-5.10] usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
by Xia Fukun 14 Feb '25

14 Feb '25
From: Dan Carpenter <dan.carpenter(a)linaro.org> mainline inclusion from mainline-v6.12-rc7 commit 7dd08a0b4193087976db6b3ee7807de7e8316f96 category: bugfix bugzilla: https://gitee.com/src-openeuler/kernel/issues/IB5AV7 CVE: CVE-2024-50268 Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?… -------------------------------- The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as 255 while the size of the uc->updated[] array is UCSI_MAX_ALTMODES (30). The call tree is: ucsi_cmd() // val comes from simple_attr_write_xsigned() -> ucsi_send_command() -> ucsi_send_command_common() -> ucsi_run_command() // calls ucsi->ops->sync_control() -> ucsi_ccg_sync_control() Fixes: 170a6726d0e2 ("usb: typec: ucsi: add support for separate DP altmode devices") Cc: stable <stable(a)kernel.org> Signed-off-by: Dan Carpenter <dan.carpenter(a)linaro.org> Reviewed-by: Heikki Krogerus <heikki.krogerus(a)linux.intel.com> Link: https://lore.kernel.org/r/325102b3-eaa8-4918-a947-22aca1146586@stanley.moun… Signed-off-by: Greg Kroah-Hartman <gregkh(a)linuxfoundation.org> Signed-off-by: Xia Fukun <xiafukun(a)huawei.com> --- drivers/usb/typec/ucsi/ucsi_ccg.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/usb/typec/ucsi/ucsi_ccg.c b/drivers/usb/typec/ucsi/ucsi_ccg.c index 2f2cb3fc85813..83dc13f6ab8c1 100644 --- a/drivers/usb/typec/ucsi/ucsi_ccg.c +++ b/drivers/usb/typec/ucsi/ucsi_ccg.c @@ -436,6 +436,8 @@ static void ucsi_ccg_update_set_new_cam_cmd(struct ucsi_ccg *uc, port = uc->orig; new_cam = UCSI_SET_NEW_CAM_GET_AM(*cmd); + if (new_cam >= ARRAY_SIZE(uc->updated)) + return; new_port = &uc->updated[new_cam]; cam = new_port->linked_idx; enter_new_mode = UCSI_SET_NEW_CAM_ENTER(*cmd); -- 2.34.1
2 1
0 0
[PATCH OLK-5.10] drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
by Xia Fukun 14 Feb '25

14 Feb '25
From: Junlin Li <make24(a)iscas.ac.cn> mainline inclusion from mainline-v6.12-rc5 commit 46d7ebfe6a75a454a5fa28604f0ef1491f9d8d14 category: bugfix bugzilla: https://gitee.com/src-openeuler/kernel/issues/IAYPJG CVE: CVE-2024-47697 Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?… -------------------------------- Ensure index in rtl2830_pid_filter does not exceed 31 to prevent out-of-bounds access. dev->filters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access. Change the boundary check from index > 32 to index >= 32 to resolve this issue. Fixes: df70ddad81b4 ("[media] rtl2830: implement PID filter") Signed-off-by: Junlin Li <make24(a)iscas.ac.cn> Signed-off-by: Hans Verkuil <hverkuil-cisco(a)xs4all.nl> Signed-off-by: Xia Fukun <xiafukun(a)huawei.com> --- drivers/media/dvb-frontends/rtl2830.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/media/dvb-frontends/rtl2830.c b/drivers/media/dvb-frontends/rtl2830.c index e6b8367c8cce4..84c00c6894d3d 100644 --- a/drivers/media/dvb-frontends/rtl2830.c +++ b/drivers/media/dvb-frontends/rtl2830.c @@ -609,7 +609,7 @@ static int rtl2830_pid_filter(struct dvb_frontend *fe, u8 index, u16 pid, int on index, pid, onoff); /* skip invalid PIDs (0x2000) */ - if (pid > 0x1fff || index > 32) + if (pid > 0x1fff || index >= 32) return 0; if (onoff) -- 2.34.1
2 1
0 0
[openeuler:OLK-6.6] BUILD SUCCESS 7173d438401b108861e2baa01501f4dadba16c8b
by kernel test robot 14 Feb '25

14 Feb '25
tree/branch: https://gitee.com/openeuler/kernel.git OLK-6.6 branch HEAD: 7173d438401b108861e2baa01501f4dadba16c8b !15067 irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity() Warning ids grouped by kconfigs: recent_errors |-- arm64-allmodconfig | |-- mm-dynamic_pool.c:warning:variable-ret-is-uninitialized-when-used-here | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-function-memblock_alloc_range_nid_flags |-- arm64-randconfig-001-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-function-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-function-memblock_alloc_range_nid_flags |-- arm64-randconfig-002-20250213 | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags |-- arm64-randconfig-003-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags |-- arm64-randconfig-004-20250213 | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-function-memblock_alloc_range_nid_flags |-- loongarch-allmodconfig | |-- include-trace-stages-init.h:warning:str__bonding__trace_system_name-defined-but-not-used | |-- include-trace-stages-init.h:warning:str__fs__trace_system_name-defined-but-not-used | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags |-- loongarch-randconfig-001-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags |-- loongarch-randconfig-002-20250213 | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | |-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags | `-- mm-memcontrol.c:warning:mem_cgroup_check_swap_for_v1-defined-but-not-used |-- x86_64-allnoconfig | |-- include-linux-sched-signal.h:linux-kabi.h-is-included-more-than-once. | |-- include-net-tcp.h:linux-kabi.h-is-included-more-than-once. | |-- mm-madvise.c:warning:no-previous-prototype-for-function-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-function-memblock_alloc_range_nid_flags |-- x86_64-allyesconfig | |-- mm-dynamic_pool.c:warning:variable-ret-is-uninitialized-when-used-here | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-function-memblock_alloc_range_nid_flags |-- x86_64-buildonly-randconfig-001-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags |-- x86_64-buildonly-randconfig-002-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | |-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags | `-- mm-memcontrol.c:warning:mem_cgroup_check_swap_for_v1-defined-but-not-used |-- x86_64-buildonly-randconfig-003-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-function-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-function-memblock_alloc_range_nid_flags |-- x86_64-buildonly-randconfig-004-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags |-- x86_64-buildonly-randconfig-005-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags |-- x86_64-buildonly-randconfig-006-20250213 | |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma | |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead | `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags `-- x86_64-defconfig |-- mm-madvise.c:warning:no-previous-prototype-for-force_swapin_vma |-- mm-memblock.c:warning:expecting-prototype-for-memblock_alloc_internal().-Prototype-was-for-__memblock_alloc_internal()-instead `-- mm-memblock.c:warning:no-previous-prototype-for-memblock_alloc_range_nid_flags elapsed time: 721m configs tested: 17 configs skipped: 119 The following configs have been built successfully. More configs may be tested in the coming days. tested configs: arm64 allmodconfig clang-18 arm64 randconfig-001-20250213 clang-19 arm64 randconfig-002-20250213 gcc-14.2.0 arm64 randconfig-003-20250213 gcc-14.2.0 arm64 randconfig-004-20250213 clang-21 loongarch allmodconfig gcc-14.2.0 loongarch randconfig-001-20250213 gcc-14.2.0 loongarch randconfig-002-20250213 gcc-14.2.0 x86_64 allnoconfig clang-19 x86_64 allyesconfig clang-19 x86_64 buildonly-randconfig-001-20250213 gcc-11 x86_64 buildonly-randconfig-002-20250213 gcc-12 x86_64 buildonly-randconfig-003-20250213 clang-19 x86_64 buildonly-randconfig-004-20250213 gcc-12 x86_64 buildonly-randconfig-005-20250213 gcc-12 x86_64 buildonly-randconfig-006-20250213 gcc-12 x86_64 defconfig gcc-11 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[PATCH OLK-5.10] kasan: fix incorrect return type of quarantine_put()
by Kaixiong Yu 13 Feb '25

13 Feb '25
hulk inclusion category: bugfix bugzilla: https://gitee.com/src-openeuler/kernel/issues/IBLXYN -------------------------------- The return type of quarantine_put() leads to complie errors. Fix it by changing void type into bool. Fixes: 83271e84716b ("kasan: sanitize objects when metadata doesn't fit") Signed-off-by: Kaixiong Yu <yukaixiong(a)huawei.com> --- mm/kasan/kasan.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index 17d97ffbbdeb..e147b9595ee8 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -195,7 +195,7 @@ bool quarantine_put(struct kmem_cache *cache, void *object); void quarantine_reduce(void); void quarantine_remove_cache(struct kmem_cache *cache); #else -static inline void quarantine_put(struct kmem_cache *cache, void *object) { return false; } +static inline bool quarantine_put(struct kmem_cache *cache, void *object) { return false; } static inline void quarantine_reduce(void) { } static inline void quarantine_remove_cache(struct kmem_cache *cache) { } #endif -- 2.34.1
2 1
0 0
[PATCH V4 openEuler-1.0-LTS 0/1] Fix CVE-2023-52572 in openEuler-1.0-LTS
by Wang Zhaolong 13 Feb '25

13 Feb '25
V1 -> V2: In the compound_send_recv(), correct the credits[i] update condition MID_RESPONSE_RECEIVED to MID_RESPONSE_READY. V2 -> V3: Correct conflicts and Signed-off-by information. V3 -> V4 Correct conflicts information. Zhang Xiaoxu (1): cifs: Fix UAF in cifs_demultiplex_thread() fs/cifs/cifsglob.h | 1 + fs/cifs/connect.c | 3 ++- fs/cifs/transport.c | 32 +++++++++++++++++++++----------- 3 files changed, 24 insertions(+), 12 deletions(-) -- 2.34.3
2 2
0 0
[PATCH V3 openEuler-1.0-LTS 0/1] Fix CVE-2023-52572 in openEuler-1.0-LTS
by Wang Zhaolong 13 Feb '25

13 Feb '25
V1 -> V2: In the compound_send_recv(), correct the credits[i] update condition MID_RESPONSE_RECEIVED to MID_RESPONSE_READY. V2 -> V3: Correct conflicts and Signed-off-by information. Zhang Xiaoxu (1): cifs: Fix UAF in cifs_demultiplex_thread() fs/cifs/cifsglob.h | 1 + fs/cifs/connect.c | 3 ++- fs/cifs/transport.c | 32 +++++++++++++++++++++----------- 3 files changed, 24 insertions(+), 12 deletions(-) -- 2.34.3
2 2
0 0
[PATCH V2 openEuler-1.0-LTS 0/1] Fix CVE-2023-52572 in openEuler-1.0-LTS
by Wang Zhaolong 13 Feb '25

13 Feb '25
V1 -> V2: In the compound_send_recv(), correct the credits[i] update condition MID_RESPONSE_RECEIVED to MID_RESPONSE_READY. Zhang Xiaoxu (1): cifs: Fix UAF in cifs_demultiplex_thread() fs/cifs/cifsglob.h | 1 + fs/cifs/connect.c | 3 ++- fs/cifs/transport.c | 32 +++++++++++++++++++++----------- 3 files changed, 24 insertions(+), 12 deletions(-) -- 2.34.3
2 2
0 0
[PATCH OLK-5.10] kasan: fix incorrect return type of quarantine_put()
by Kaixiong Yu 13 Feb '25

13 Feb '25
Offering: HULK hulk inclusion category: bugfix bugzilla: https://gitee.com/src-openeuler/kernel/issues/IBLXYN -------------------------------- The return type of quarantine_put() leads to complie errors. Fix it by changing void type into bool. Fixes: 83271e84716b ("kasan: sanitize objects when metadata doesn't fit") Signed-off-by: Kaixiong Yu <yukaixiong(a)huawei.com> --- mm/kasan/kasan.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index 17d97ffbbdeb..e147b9595ee8 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -195,7 +195,7 @@ bool quarantine_put(struct kmem_cache *cache, void *object); void quarantine_reduce(void); void quarantine_remove_cache(struct kmem_cache *cache); #else -static inline void quarantine_put(struct kmem_cache *cache, void *object) { return false; } +static inline bool quarantine_put(struct kmem_cache *cache, void *object) { return false; } static inline void quarantine_reduce(void) { } static inline void quarantine_remove_cache(struct kmem_cache *cache) { } #endif -- 2.34.1
2 1
0 0
[PATCH OLK-6.6] fs/proc: fix softlockup in __read_vmcore (part 2)
by Li Huafei 13 Feb '25

13 Feb '25
From: Rik van Riel <riel(a)surriel.com> stable inclusion from stable-v6.6.74 commit a5a2ee8144c3897d37403a69118c3e3dc5713958 category: bugfix bugzilla: https://gitee.com/src-openeuler/kernel/issues/IBLWTG CVE: CVE-2025-21694 Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id… -------------------------------- commit cbc5dde0a461240046e8a41c43d7c3b76d5db952 upstream. Since commit 5cbcb62dddf5 ("fs/proc: fix softlockup in __read_vmcore") the number of softlockups in __read_vmcore at kdump time have gone down, but they still happen sometimes. In a memory constrained environment like the kdump image, a softlockup is not just a harmless message, but it can interfere with things like RCU freeing memory, causing the crashdump to get stuck. The second loop in __read_vmcore has a lot more opportunities for natural sleep points, like scheduling out while waiting for a data write to happen, but apparently that is not always enough. Add a cond_resched() to the second loop in __read_vmcore to (hopefully) get rid of the softlockups. Link: https://lkml.kernel.org/r/20250110102821.2a37581b@fangorn Fixes: 5cbcb62dddf5 ("fs/proc: fix softlockup in __read_vmcore") Signed-off-by: Rik van Riel <riel(a)surriel.com> Reported-by: Breno Leitao <leitao(a)debian.org> Cc: Baoquan He <bhe(a)redhat.com> Cc: Dave Young <dyoung(a)redhat.com> Cc: Vivek Goyal <vgoyal(a)redhat.com> Cc: <stable(a)vger.kernel.org> Signed-off-by: Andrew Morton <akpm(a)linux-foundation.org> Signed-off-by: Greg Kroah-Hartman <gregkh(a)linuxfoundation.org> Signed-off-by: Li Huafei <lihuafei1(a)huawei.com> --- fs/proc/vmcore.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/fs/proc/vmcore.c b/fs/proc/vmcore.c index 8319bcbe3ee3..3303cb04e12c 100644 --- a/fs/proc/vmcore.c +++ b/fs/proc/vmcore.c @@ -404,6 +404,8 @@ static ssize_t __read_vmcore(struct iov_iter *iter, loff_t *fpos) if (!iov_iter_count(iter)) return acc; } + + cond_resched(); } return acc; -- 2.25.1
2 1
0 0
  • ← Newer
  • 1
  • ...
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • ...
  • 33
  • Older →

HyperKitty Powered by HyperKitty