From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 81AE9C76194 for ; Thu, 25 Jul 2019 06:59:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 4F9282081B for ; Thu, 25 Jul 2019 06:59:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564037955; bh=uQuQ96hVzj6wwcH5JvjI2+Q5onAAbFJiJ6TWsAXNvWg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=nju0aXdA81+mD+eSwfIaKI8xDj79ZIJX9B2ZSDHxXaDNYS087i6Jg0h/BSvmxnny4 H40F3PxiiW2GoPqFYvd4lB/i+v6+dIUSMmw9zGE/IjF1bRg2tCw+/0Whte+0+5VciE Zuse2S/ZAqYki0z+T7G6WFp1aOsAMq8pNGlcawug= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729213AbfGYG7O (ORCPT ); Thu, 25 Jul 2019 02:59:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:33136 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726479AbfGYG7N (ORCPT ); Thu, 25 Jul 2019 02:59:13 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E01E12070B; Thu, 25 Jul 2019 06:59:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564037953; bh=uQuQ96hVzj6wwcH5JvjI2+Q5onAAbFJiJ6TWsAXNvWg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=nG572jkH/2I9ooGy82VphpyM/IcVtwRZqH3fCLtpnFXuMT7L3OnVFMFMLuC9hG7HE ux6yXy/e6aUqdbcVwMeJI1i2pjCe1DdxZaFg+vdJAp2UsRyqWWSsC1+vWyU7BFvWGC B/Cz+xHq1wJYe/1Nljny0kpMm2zvvGKvlKmWYX6U= Date: Thu, 25 Jul 2019 08:20:21 +0200 From: Greg Kroah-Hartman To: Steve French Cc: LKML , Stable , Namjae Jeon , "Eric W. Biederman" , Sasha Levin , Jeff Layton Subject: Re: [PATCH 5.2 038/413] signal/cifs: Fix cifs_put_tcp_session to call send_sig instead of force_sig Message-ID: <20190725062021.GC31256@kroah.com> References: <20190724191735.096702571@linuxfoundation.org> <20190724191738.345725184@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 24, 2019 at 03:49:32PM -0500, Steve French wrote: > Note that this patch causes a regression (removing cifs module fails, > due to unmount leaking a thread with this change). > > We are testing a workaround to cifs.ko which would be needed if this > patch were to be backported. I've now dropped this from all of the stable queues. If you all figure this out, please let us know and we will be glad to queue this up, along with the fix. thanks, greg k-h