]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
drop fuse patch from 4.9, 4.14, and 4.19
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 7 Nov 2022 15:39:42 +0000 (16:39 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 7 Nov 2022 15:39:42 +0000 (16:39 +0100)
queue-4.14/fuse-add-file_modified-to-fallocate.patch [deleted file]
queue-4.14/series
queue-4.19/fuse-add-file_modified-to-fallocate.patch [deleted file]
queue-4.19/series
queue-4.9/fuse-add-file_modified-to-fallocate.patch [deleted file]
queue-4.9/series

diff --git a/queue-4.14/fuse-add-file_modified-to-fallocate.patch b/queue-4.14/fuse-add-file_modified-to-fallocate.patch
deleted file mode 100644 (file)
index bc869e5..0000000
+++ /dev/null
@@ -1,33 +0,0 @@
-From 4a6f278d4827b59ba26ceae0ff4529ee826aa258 Mon Sep 17 00:00:00 2001
-From: Miklos Szeredi <mszeredi@redhat.com>
-Date: Fri, 28 Oct 2022 14:25:20 +0200
-Subject: fuse: add file_modified() to fallocate
-
-From: Miklos Szeredi <mszeredi@redhat.com>
-
-commit 4a6f278d4827b59ba26ceae0ff4529ee826aa258 upstream.
-
-Add missing file_modified() call to fuse_file_fallocate().  Without this
-fallocate on fuse failed to clear privileges.
-
-Fixes: 05ba1f082300 ("fuse: add FALLOCATE operation")
-Cc: <stable@vger.kernel.org>
-Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- fs/fuse/file.c |    4 ++++
- 1 file changed, 4 insertions(+)
-
---- a/fs/fuse/file.c
-+++ b/fs/fuse/file.c
-@@ -3008,6 +3008,10 @@ static long fuse_file_fallocate(struct f
-                       goto out;
-       }
-+      err = file_modified(file);
-+      if (err)
-+              goto out;
-+
-       if (!(mode & FALLOC_FL_KEEP_SIZE))
-               set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
index 859df3ff0bce91e6b6c438d128a0f864ca3a7a64..50bec060e75b05717484dfa494f9c23d52dee639 100644 (file)
@@ -25,4 +25,3 @@ block-bfq-protect-bfqd-queued-by-bfqd-lock.patch
 btrfs-fix-type-of-parameter-generation-in-btrfs_get_dentry.patch
 tcp-udp-make-early_demux-back-namespacified.patch
 capabilities-fix-potential-memleak-on-error-path-from-vfs_getxattr_alloc.patch
-fuse-add-file_modified-to-fallocate.patch
diff --git a/queue-4.19/fuse-add-file_modified-to-fallocate.patch b/queue-4.19/fuse-add-file_modified-to-fallocate.patch
deleted file mode 100644 (file)
index 9991d5d..0000000
+++ /dev/null
@@ -1,33 +0,0 @@
-From 4a6f278d4827b59ba26ceae0ff4529ee826aa258 Mon Sep 17 00:00:00 2001
-From: Miklos Szeredi <mszeredi@redhat.com>
-Date: Fri, 28 Oct 2022 14:25:20 +0200
-Subject: fuse: add file_modified() to fallocate
-
-From: Miklos Szeredi <mszeredi@redhat.com>
-
-commit 4a6f278d4827b59ba26ceae0ff4529ee826aa258 upstream.
-
-Add missing file_modified() call to fuse_file_fallocate().  Without this
-fallocate on fuse failed to clear privileges.
-
-Fixes: 05ba1f082300 ("fuse: add FALLOCATE operation")
-Cc: <stable@vger.kernel.org>
-Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- fs/fuse/file.c |    4 ++++
- 1 file changed, 4 insertions(+)
-
---- a/fs/fuse/file.c
-+++ b/fs/fuse/file.c
-@@ -3012,6 +3012,10 @@ static long fuse_file_fallocate(struct f
-                       goto out;
-       }
-+      err = file_modified(file);
-+      if (err)
-+              goto out;
-+
-       if (!(mode & FALLOC_FL_KEEP_SIZE))
-               set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
index c030cef1469f5036633ad6642b52db137377a354..7e6f7b4625fd9ca0fa5bdd567eb0842a39a729f0 100644 (file)
@@ -34,4 +34,3 @@ tcp-udp-make-early_demux-back-namespacified.patch
 kprobe-reverse-kp-flags-when-arm_kprobe-failed.patch
 tracing-histogram-update-document-for-keys_max-size.patch
 capabilities-fix-potential-memleak-on-error-path-from-vfs_getxattr_alloc.patch
-fuse-add-file_modified-to-fallocate.patch
diff --git a/queue-4.9/fuse-add-file_modified-to-fallocate.patch b/queue-4.9/fuse-add-file_modified-to-fallocate.patch
deleted file mode 100644 (file)
index c5fce1e..0000000
+++ /dev/null
@@ -1,33 +0,0 @@
-From 4a6f278d4827b59ba26ceae0ff4529ee826aa258 Mon Sep 17 00:00:00 2001
-From: Miklos Szeredi <mszeredi@redhat.com>
-Date: Fri, 28 Oct 2022 14:25:20 +0200
-Subject: fuse: add file_modified() to fallocate
-
-From: Miklos Szeredi <mszeredi@redhat.com>
-
-commit 4a6f278d4827b59ba26ceae0ff4529ee826aa258 upstream.
-
-Add missing file_modified() call to fuse_file_fallocate().  Without this
-fallocate on fuse failed to clear privileges.
-
-Fixes: 05ba1f082300 ("fuse: add FALLOCATE operation")
-Cc: <stable@vger.kernel.org>
-Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- fs/fuse/file.c |    4 ++++
- 1 file changed, 4 insertions(+)
-
---- a/fs/fuse/file.c
-+++ b/fs/fuse/file.c
-@@ -2995,6 +2995,10 @@ static long fuse_file_fallocate(struct f
-                       goto out;
-       }
-+      err = file_modified(file);
-+      if (err)
-+              goto out;
-+
-       if (!(mode & FALLOC_FL_KEEP_SIZE))
-               set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
index bc2c6212c50f98d7c94ae5b40e6b3af70b4abb72..a2ef289a52e437d656f7d5f06d421eed14473458 100644 (file)
@@ -19,4 +19,3 @@ media-dvb-frontends-drxk-initialize-err-to-0.patch
 i2c-xiic-add-platform-module-alias.patch
 bluetooth-l2cap-fix-attempting-to-access-uninitialized-memory.patch
 btrfs-fix-type-of-parameter-generation-in-btrfs_get_dentry.patch
-fuse-add-file_modified-to-fallocate.patch