Lost pull requests...

David Miller davem at davemloft.net
Tue Jan 16 05:25:56 AEDT 2018


I've noticed for a while now that various pull requests are not
being recognized by patchwork.ozlabs.org and therefore don't
end up in the patchwork queue.

Even ones I send myself are having this problem.  All I am doing
is putting the contents of "git request-pull ..." into an email
and adding some other informative text to the beginning.

I attach two examples of pull requests that patchwork at ozlabs
didn't queue up.

Thanks!
-------------- next part --------------
Subject: [GIT] Networking
From:   David Miller <davem at davemloft.net>
To:     torvalds at linux-foundation.org
CC:     akpm at linux-foundation.org, netdev at vger.kernel.org,
        linux-kernel at vger.kernel.org
Date:   Wed, 10 Jan 2018 17:21:11 -0500 (EST)
Sender: netdev-owner at vger.kernel.org
X-Mailer: Mew version 6.7 on Emacs 25.3 / Mule 6.0 (HANACHIRUSATO)


1) BPF speculation prevention and BPF_JIT_ALWAYS_ON, from Alexei
   Starovoitov.

2) Revert dev_get_random_name() changes as adjust the error code returns
   seen by userspace definitely breaks stuff.

3) Fix TX DMA map/unmap on older iwlwifi devices, from Emmanuel
   Grumbach.

4) From wrong AF family when requesting sock diag modules, from
   Andrii Vladyka.

5) Don't add new ipv6 routes attached to the null_entry, from Wei
   Wang.

6) Some SCTP sockopt length fixes from Marcelo Ricardo Leitner.

7) Don't leak when removing VLAN ID 0, from Cong Wang.

8) Hey there's a potential leak in ipv6_make_skb() too, from Eric
   Dumazet.

Please pull, thanks a lot.

The following changes since commit ef7f8cec80a0ba7bd00ece46844c8994117dc910:

  Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net (2018-01-08 20:21:39 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/davem/net 

for you to fetch changes up to ccc12b11c5332c84442ef120dcd631523be75089:

  ipv6: sr: fix TLVs not being copied using setsockopt (2018-01-10 16:03:55 -0500)

----------------------------------------------------------------
Alexei Starovoitov (3):
      selftests/bpf: fix test_align
      bpf: prevent out-of-bounds speculation
      bpf: introduce BPF_JIT_ALWAYS_ON config

Andrii Vladyka (1):
      net: core: fix module type in sock_diag_bind

Cong Wang (1):
      8021q: fix a memory leak for VLAN 0 device

Daniel Borkmann (1):
      bpf: avoid false sharing of map refcount with max_entries

David S. Miller (5):
      Merge branch 'Ether-fixes-for-the-SolutionEngine771x-boards'
      Merge git://git.kernel.org/.../bpf/bpf
      Merge branch 'sctp-Some-sockopt-optlen-fixes'
      Merge tag 'wireless-drivers-for-davem-2018-01-09' of git://git.kernel.org/.../kvalo/wireless-drivers
      Merge branch 'mlxsw-couple-of-fixes'

Emmanuel Grumbach (1):
      iwlwifi: pcie: fix DMA memory mapping / unmapping

Eric Dumazet (1):
      ipv6: fix possible mem leaks in ipv6_make_skb()

Jakub Kicinski (1):
      nfp: always unmask aux interrupts at init

Jiri Pirko (1):
      mlxsw: spectrum_qdisc: Don't use variable array in mlxsw_sp_tclass_congestion_enable

John Fastabend (1):
      bpf: sockmap missing NULL psock check

Kalle Valo (1):
      Merge ath-current from git://git.kernel.org/.../kvalo/ath.git

Kornilios Kourtis (1):
      doc: clarification about setting SO_ZEROCOPY

Loic Poulain (1):
      wcn36xx: Fix dynamic power saving

Madalin Bucur (1):
      of_mdio: avoid MDIO bus removal when a PHY is missing

Marcelo Ricardo Leitner (3):
      sctp: GFP_ATOMIC is not needed in sctp_setsockopt_events
      sctp: add a ceiling to optlen in some sockopts
      sctp: make use of pre-calculated len

Mathieu Xhonneux (1):
      ipv6: sr: fix TLVs not being copied using setsockopt

Mike Rapoport (1):
      docs-rst: networking: wire up msg_zerocopy

Nicolai Stange (1):
      net: ipv4: emulate READ_ONCE() on ->hdrincl bit-field in raw_sendmsg()

Sergei Shtylyov (2):
      SolutionEngine771x: fix Ether platform data
      SolutionEngine771x: add Ether TSU resource

Wei Wang (1):
      ipv6: remove null_entry before adding default route

Xiongfeng Wang (2):
      net: caif: use strlcpy() instead of strncpy()
      caif_usb: use strlcpy() instead of strncpy()

Yangbo Lu (1):
      net: gianfar_ptp: move set_fipers() to spinlock protecting area

Yuval Mintz (1):
      mlxsw: pci: Wait after reset before accessing HW

 Documentation/networking/index.rst                   |  2 +-
 Documentation/networking/msg_zerocopy.rst            |  4 ++++
 arch/sh/boards/mach-se/770x/setup.c                  | 24 ++++++++++++++++++++----
 arch/sh/include/mach-se/mach/se.h                    |  1 +
 drivers/net/ethernet/freescale/gianfar_ptp.c         |  3 +--
 drivers/net/ethernet/mellanox/mlxsw/pci.c            |  7 ++++++-
 drivers/net/ethernet/mellanox/mlxsw/pci_hw.h         |  1 +
 drivers/net/ethernet/mellanox/mlxsw/spectrum_qdisc.c |  7 ++++---
 drivers/net/ethernet/netronome/nfp/nfp_net_common.c  |  2 ++
 drivers/net/wireless/ath/wcn36xx/main.c              | 23 ++++++++++++-----------
 drivers/net/wireless/ath/wcn36xx/pmc.c               |  6 ++++--
 drivers/net/wireless/intel/iwlwifi/pcie/internal.h   | 10 +++++++---
 drivers/net/wireless/intel/iwlwifi/pcie/tx-gen2.c    | 11 +++--------
 drivers/net/wireless/intel/iwlwifi/pcie/tx.c         |  8 ++++----
 drivers/of/of_mdio.c                                 |  9 +++++++--
 include/linux/bpf.h                                  | 26 ++++++++++++++++++--------
 init/Kconfig                                         |  7 +++++++
 kernel/bpf/arraymap.c                                | 47 ++++++++++++++++++++++++++++++++++++-----------
 kernel/bpf/core.c                                    | 19 +++++++++++++++++++
 kernel/bpf/sockmap.c                                 | 11 +++++++++--
 kernel/bpf/verifier.c                                | 36 ++++++++++++++++++++++++++++++++++++
 lib/test_bpf.c                                       | 11 +++++++----
 net/8021q/vlan.c                                     |  7 +------
 net/caif/caif_dev.c                                  |  5 ++---
 net/caif/caif_usb.c                                  |  4 +---
 net/caif/cfcnfg.c                                    | 10 ++++------
 net/caif/cfctrl.c                                    |  4 ++--
 net/core/filter.c                                    |  6 ++----
 net/core/sock_diag.c                                 |  2 +-
 net/core/sysctl_net_core.c                           |  6 ++++++
 net/ipv4/raw.c                                       |  4 +++-
 net/ipv6/exthdrs.c                                   |  9 +++++++++
 net/ipv6/ip6_fib.c                                   | 38 +++++++++++++++++++++++++++++---------
 net/ipv6/ip6_output.c                                |  5 +++--
 net/sctp/socket.c                                    | 28 +++++++++++++++++++++-------
 net/socket.c                                         |  9 +++++++++
 tools/testing/selftests/bpf/test_align.c             | 22 +---------------------
 37 files changed, 303 insertions(+), 131 deletions(-)
-------------- next part --------------
Subject: pull request: bluetooth-next 2018-01-11
From: Johan Hedberg <johan.hedberg at gmail.com>
To: davem at davemloft.net
Cc: linux-bluetooth at vger.kernel.org, netdev at vger.kernel.org
Date: Thu, 11 Jan 2018 10:24:34 +0200
User-Agent: Mutt/1.9.2 (2017-12-15)
Mail-Followup-To: davem at davemloft.net, linux-bluetooth at vger.kernel.org,	netdev at vger.kernel.org
X-Mew: <body> No his/her public key: ID = 0xF9A8D412

Hi Dave,

Here's likely the last bluetooth-next pull request for the 4.16 kernel.

 - Added support for Bluetooth on 2015+ MacBook (Pro)
 - Fix to QCA Rome suspend/resume handling
 - Two new QCA_ROME USB IDs in btusb
 - A few other minor fixes

Please let me know if there are any issues pulling. Thanks.

Johan

---
The following changes since commit 18feb87105c3c16dc01e6981a6aafb175679b997:

  enic: add wq clean up budget (2017-12-26 13:10:07 -0500)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git for-upstream

for you to fetch changes up to ff8759609d021c0e85945fcc4a148a0e55ace70f:

  Bluetooth: btbcm: Fix sleep mode struct ordering (2018-01-10 19:00:14 +0100)

----------------------------------------------------------------
AceLan Kao (1):
      Bluetooth: btusb: Add support for 0cf3:e010

Arnd Bergmann (1):
      Bluetooth: hciuart: add nvmem dependency

Colin Ian King (2):
      Bluetooth: bpa10x: make array 'req' static, shrinks object size
      Bluetooth: btintel: make array 'param' static, shrinks object size

Hans de Goede (1):
      Bluetooth: btusb: Restore QCA Rome suspend/resume fix with a "rewritten" version

Ioan Moldovan (1):
      Bluetooth: Add a new 04ca:3015 QCA_ROME device

Kai-Heng Feng (1):
      Revert "Bluetooth: btusb: fix QCA Rome suspend/resume"

Lukas Wunner (15):
      Bluetooth: Avoid WARN splat due to missing GPIOLIB
      Bluetooth: hci_bcm: Streamline runtime PM code
      Bluetooth: Depend on rather than select GPIOLIB
      Bluetooth: hci_bcm: Mandate presence of shutdown and device wake GPIO
      Bluetooth: hci_bcm: Clean up unnecessary #ifdef
      Bluetooth: hci_bcm: Fix race on close
      Bluetooth: hci_bcm: Fix unbalanced pm_runtime_disable()
      Bluetooth: hci_bcm: Invalidate IRQ on request failure
      Bluetooth: hci_bcm: Document struct bcm_device
      Bluetooth: hci_bcm: Add callbacks to toggle GPIOs
      Bluetooth: hci_bcm: Handle errors properly
      Bluetooth: hci_bcm: Support Apple GPIO handling
      Bluetooth: hci_bcm: Silence IRQ printk
      Bluetooth: hci_bcm: Sleep instead of spinning
      Bluetooth: btbcm: Fix sleep mode struct ordering

Ronald Tschalär (1):
      Bluetooth: hci_bcm: Validate IRQ before using it

 drivers/bluetooth/Kconfig   |   4 +
 drivers/bluetooth/bpa10x.c  |   2 +-
 drivers/bluetooth/btbcm.h   |   2 +-
 drivers/bluetooth/btintel.c |   2 +-
 drivers/bluetooth/btusb.c   |  22 ++--
 drivers/bluetooth/hci_bcm.c | 239 +++++++++++++++++++++++++++++++++++---------
 6 files changed, 207 insertions(+), 64 deletions(-)


More information about the Patchwork mailing list