[PATCH 5.10 20/25] block: dont ignore REQ_NOWAIT for direct IO

2021-04-15 Thread Greg Kroah-Hartman
From: Pavel Begunkov [ Upstream commit f8b78caf21d5bc3fcfc40c18898f9d52ed1451a5 ] If IOCB_NOWAIT is set on submission, then that needs to get propagated to REQ_NOWAIT on the block side. Otherwise we completely lose this information, and any issuer of IOCB_NOWAIT IO will potentially end up

[PATCH 5.10 02/25] gfs2: Flag a withdraw if init_threads() fails

2021-04-15 Thread Greg Kroah-Hartman
From: Andrew Price [ Upstream commit 62dd0f98a0e5668424270b47a0c2e973795faba7 ] Interrupting mount with ^C quickly enough can cause the kthread_run() calls in gfs2's init_threads() to fail and the error path leads to a deadlock on the s_umount rwsem. The abridged chain of events is: [mount

[PATCH 5.10 19/25] riscv,entry: fix misaligned base for excp_vect_table

2021-04-15 Thread Greg Kroah-Hartman
From: Zihao Yu [ Upstream commit ac8d0b901f0033b783156ab2dc1a0e73ec42409b ] In RV64, the size of each entry in excp_vect_table is 8 bytes. If the base of the table is not 8-byte aligned, loading an entry in the table will raise a misaligned exception. Although such exception will be handled by

[PATCH 5.10 18/25] io_uring: dont mark S_ISBLK async work as unbounded

2021-04-15 Thread Greg Kroah-Hartman
From: Jens Axboe [ Upstream commit 4b982bd0f383db9132e892c0c5144117359a6289 ] S_ISBLK is marked as unbounded work for async preparation, because it doesn't match S_ISREG. That is incorrect, as any read/write to a block device is also a bounded operation. Fix it up and ensure that S_ISBLK isn't

[PATCH 5.10 17/25] null_blk: fix command timeout completion handling

2021-04-15 Thread Greg Kroah-Hartman
From: Damien Le Moal [ Upstream commit de3510e52b0a398261271455562458003b8eea62 ] Memory backed or zoned null block devices may generate actual request timeout errors due to the submission path being blocked on memory allocation or zone locking. Unlike fake timeouts or injected timeouts, the

[PATCH 5.10 14/25] radix tree test suite: Register the main thread with the RCU library

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 1bb4bd266cf39fd2fa711f2d265c558b92df1119 ] Several test runners register individual worker threads with the RCU library, but neglect to register the main thread, which can lead to objects being freed while the main thread is in what appears to be

[PATCH 5.10 16/25] idr test suite: Create anchor before launching throbber

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 094ffbd1d8eaa27ed426feb8530cb1456348b018 ] The throbber could race with creation of the anchor entry and cause the IDR to have zero entries in it, which would cause the test to fail. Signed-off-by: Matthew Wilcox (Oracle) Signed-off-by: Sasha

[PATCH 5.10 15/25] idr test suite: Take RCU read lock in idr_find_test_1

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 703586410da69eb40062e64d413ca33bd735917a ] When run on a single CPU, this test would frequently access already-freed memory. Due to timing, this bug never showed up on multi-CPU tests. Reported-by: Chris von Recklinghausen Signed-off-by:

[PATCH 5.10 13/25] block: only update parent bi_status when bio fail

2021-04-15 Thread Greg Kroah-Hartman
From: Yufen Yu [ Upstream commit 3edf5346e4f2ce2fa0c94651a90a8dda169565ee ] For multiple split bios, if one of the bio is fail, the whole should return error to application. But we found there is a race between bio_integrity_verify_fn and bio complete, which return io success to application

[PATCH 5.10 12/25] radix tree test suite: Fix compilation

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 7487de534dcbe143e6f41da751dd3ffcf93b00ee ] Commit 4bba4c4bb09a added tools/include/linux/compiler_types.h which includes linux/compiler-gcc.h. Unfortunately, we had our own (empty) compiler_types.h which overrode the one added by that commit, and

[PATCH 5.10 11/25] XArray: Fix splitting to non-zero orders

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 3012110d71f41410932924e1d188f9eb57f1f824 ] Splitting an order-4 entry into order-2 entries would leave the array containing pointers to 40008000c000 instead of . This is a one-character fix, but enhance the test suite to check

[PATCH 5.10 10/25] gpu: host1x: Use different lock classes for each client

2021-04-15 Thread Greg Kroah-Hartman
From: Mikko Perttunen [ Upstream commit a24f98176d1efae2c37d3438c57a624d530d9c33 ] To avoid false lockdep warnings, give each client lock a different lock class, passed from the initialization site by macro. Signed-off-by: Mikko Perttunen Signed-off-by: Thierry Reding Signed-off-by: Sasha

[PATCH 5.10 01/25] interconnect: core: fix error return code of icc_link_destroy()

2021-04-15 Thread Greg Kroah-Hartman
From: Jia-Ju Bai [ Upstream commit 715ea61532e731c62392221238906704e63d75b6 ] When krealloc() fails and new is NULL, no error return code of icc_link_destroy() is assigned. To fix this bug, ret is assigned with -ENOMEM hen new is NULL. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Link:

[PATCH 5.4 12/18] block: dont ignore REQ_NOWAIT for direct IO

2021-04-15 Thread Greg Kroah-Hartman
From: Pavel Begunkov [ Upstream commit f8b78caf21d5bc3fcfc40c18898f9d52ed1451a5 ] If IOCB_NOWAIT is set on submission, then that needs to get propagated to REQ_NOWAIT on the block side. Otherwise we completely lose this information, and any issuer of IOCB_NOWAIT IO will potentially end up

[PATCH 5.4 18/18] xen/events: fix setting irq affinity

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/xen/events/events_base.c +++ b/drivers/xen/events/events_base.c @@ -1783,7 +1783,7 @@ static void lateeoi_ack_dynirq

[PATCH 5.4 17/18] perf map: Tighten snprintf() string precision to pass gcc check on some 32-bit arches

2021-04-15 Thread Greg Kroah-Hartman
a_arg_pack ()); |~ cc1: all warnings being treated as errors Since we have the lenghts for what lands in that place, use it to give the compiler more info and make it happy. Signed-off-by: Arnaldo Carvalho de Melo Cc: Anders Roxell Signed-off-by: Greg Kroah-Hartman --- tools/perf/

[PATCH 5.4 16/18] perf tools: Use %zd for size_t printf formats on 32-bit

2021-04-15 Thread Greg Kroah-Hartman
: Peter Zijlstra Link: http://lore.kernel.org/lkml/20200820212501.24421-1-ch...@chris-wilson.co.uk Signed-off-by: Arnaldo Carvalho de Melo Cc: Anders Roxell Signed-off-by: Greg Kroah-Hartman --- tools/perf/util/session.c |2 +- tools/perf/util/zstd.c|2 +- 2 files changed, 2

[PATCH 5.4 14/18] driver core: Fix locking bug in deferred_probe_timeout_work_func()

2021-04-15 Thread Greg Kroah-Hartman
f-by: Greg Kroah-Hartman --- drivers/base/dd.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/drivers/base/dd.c +++ b/drivers/base/dd.c @@ -300,14 +300,16 @@ int driver_deferred_probe_check_state_co static void deferred_probe_timeout_work_func(struct work_st

[PATCH 5.4 15/18] perf tools: Use %define api.pure full instead of %pure-parser

2021-04-15 Thread Greg Kroah-Hartman
ff-by: Jiri Olsa Cc: Adrian Hunter Cc: Clark Williams Cc: Jiri Olsa Cc: Namhyung Kim Cc: Ravi Bangoria Cc: Thomas Gleixner Link: http://lore.kernel.org/lkml/20200112192259.GA35080@krava Signed-off-by: Arnaldo Carvalho de Melo Cc: Anders Roxell Signed-off-by: Greg Kroah-Hartman --- to

[PATCH 4.19 09/13] staging: m57621-mmc: delete driver from the tree.

2021-04-15 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman [ Upstream commit 441bf7332d55c4d34afae9ffc3bbec621093f4d1 ] The license text in this driver is "interesting" and not really obvious that it is supposed to be able to be distributed in the kernel source tree. Yes, the MODULE_LICENSE() text says GPL, so it's p

[PATCH 5.4 10/18] idr test suite: Create anchor before launching throbber

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 094ffbd1d8eaa27ed426feb8530cb1456348b018 ] The throbber could race with creation of the anchor entry and cause the IDR to have zero entries in it, which would cause the test to fail. Signed-off-by: Matthew Wilcox (Oracle) Signed-off-by: Sasha

[PATCH 5.4 06/18] drm/tegra: dc: Dont set PLL clock to 0Hz

2021-04-15 Thread Greg Kroah-Hartman
From: Dmitry Osipenko [ Upstream commit f8fb97c915954fc6de6513cdf277103b5c6df7b3 ] RGB output doesn't allow to change parent clock rate of the display and PCLK rate is set to 0Hz in this case. The tegra_dc_commit_state() shall not set the display clock to 0Hz since this change propagates to the

[PATCH 5.4 00/18] 5.4.113-rc1 review

2021-04-15 Thread Greg Kroah-Hartman
linux-5.4.y and the diffstat can be found below. thanks, greg k-h - Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.4.113-rc1 Juergen Gross xen/events: fix setting irq affinity Arnaldo Carvalho de Melo perf map: Tighten snprintf() string precision to pass

[PATCH 5.4 13/18] netfilter: x_tables: fix compat match/target pad out-of-bound write

2021-04-15 Thread Greg Kroah-Hartman
+cfc0247ac173f597a...@syzkaller.appspotmail.com Reported-by: Andy Nguyen Fixes: 9fa492cdc160c ("[NETFILTER]: x_tables: simplify compat API") Signed-off-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/ipv4/netfilter/arp_tables.c |2 ++

[PATCH 4.14 50/68] net: mac802154: Fix general protection fault

2021-04-15 Thread Greg Kroah-Hartman
-by: Pavel Skripkin Reported-by: syzbot+9ec037722d2603a9f...@syzkaller.appspotmail.com Acked-by: Alexander Aring Link: https://lore.kernel.org/r/20210304152125.1052825-1-paskrip...@gmail.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/mac802154/llsec.c |2 +- 1 file

[PATCH 4.14 68/68] xen/events: fix setting irq affinity

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/xen/events/events_base.c +++ b/drivers/xen/events/events_base.c @@ -1782,7 +1782,7 @@ static void lateeoi_ack_dynirq

[PATCH 5.4 09/18] idr test suite: Take RCU read lock in idr_find_test_1

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 703586410da69eb40062e64d413ca33bd735917a ] When run on a single CPU, this test would frequently access already-freed memory. Due to timing, this bug never showed up on multi-CPU tests. Reported-by: Chris von Recklinghausen Signed-off-by:

[PATCH 4.14 66/68] netfilter: x_tables: fix compat match/target pad out-of-bound write

2021-04-15 Thread Greg Kroah-Hartman
+cfc0247ac173f597a...@syzkaller.appspotmail.com Reported-by: Andy Nguyen Fixes: 9fa492cdc160c ("[NETFILTER]: x_tables: simplify compat API") Signed-off-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/ipv4/netfilter/arp_tables.c |2 ++

[PATCH 5.4 08/18] radix tree test suite: Register the main thread with the RCU library

2021-04-15 Thread Greg Kroah-Hartman
From: Matthew Wilcox (Oracle) [ Upstream commit 1bb4bd266cf39fd2fa711f2d265c558b92df1119 ] Several test runners register individual worker threads with the RCU library, but neglect to register the main thread, which can lead to objects being freed while the main thread is in what appears to be

[PATCH 5.4 07/18] block: only update parent bi_status when bio fail

2021-04-15 Thread Greg Kroah-Hartman
From: Yufen Yu [ Upstream commit 3edf5346e4f2ce2fa0c94651a90a8dda169565ee ] For multiple split bios, if one of the bio is fail, the whole should return error to application. But we found there is a race between bio_integrity_verify_fn and bio complete, which return io success to application

[PATCH 5.4 03/18] KVM: arm64: Disable guest access to trace filter controls

2021-04-15 Thread Greg Kroah-Hartman
From: Suzuki K Poulose [ Upstream commit a354a64d91eec3e0f8ef0eed575b480fd75b999c ] Disable guest access to the Trace Filter control registers. We do not advertise the Trace filter feature to the guest (ID_AA64DFR0_EL1: TRACE_FILT is cleared) already, but the guest can still access the

[PATCH 5.4 04/18] drm/imx: imx-ldb: fix out of bounds array access warning

2021-04-15 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 33ce7f2f95cabb5834cf0906308a5cb6103976da ] When CONFIG_OF is disabled, building with 'make W=1' produces warnings about out of bounds array access: drivers/gpu/drm/imx/imx-ldb.c: In function 'imx_ldb_set_clock.constprop':

[PATCH 5.4 05/18] gfs2: report "already frozen/thawed" errors

2021-04-15 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit ff132c5f93c06bd4432bbab5c369e468653bdec4 ] Before this patch, gfs2's freeze function failed to report an error when the target file system was already frozen as it should (and as generic vfs function freeze_super does. Similarly, gfs2's thaw function failed

[PATCH 5.4 11/18] riscv,entry: fix misaligned base for excp_vect_table

2021-04-15 Thread Greg Kroah-Hartman
From: Zihao Yu [ Upstream commit ac8d0b901f0033b783156ab2dc1a0e73ec42409b ] In RV64, the size of each entry in excp_vect_table is 8 bytes. If the base of the table is not 8-byte aligned, loading an entry in the table will raise a misaligned exception. Although such exception will be handled by

[PATCH 5.4 02/18] KVM: arm64: Hide system instruction access to Trace registers

2021-04-15 Thread Greg Kroah-Hartman
From: Suzuki K Poulose [ Upstream commit 1d676673d665fd2162e7e466dcfbe5373bfdb73e ] Currently we advertise the ID_AA6DFR0_EL1.TRACEVER for the guest, when the trace register accesses are trapped (CPTR_EL2.TTA == 1). So, the guest will get an undefined instruction, if trusts the ID registers and

[PATCH 5.4 01/18] interconnect: core: fix error return code of icc_link_destroy()

2021-04-15 Thread Greg Kroah-Hartman
From: Jia-Ju Bai [ Upstream commit 715ea61532e731c62392221238906704e63d75b6 ] When krealloc() fails and new is NULL, no error return code of icc_link_destroy() is assigned. To fix this bug, ret is assigned with -ENOMEM hen new is NULL. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Link:

[PATCH 4.19 00/13] 4.19.188-rc1 review

2021-04-15 Thread Greg Kroah-Hartman
-rc.git linux-4.19.y and the diffstat can be found below. thanks, greg k-h - Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.19.188-rc1 Juergen Gross xen/events: fix setting irq affinity Arnaldo Carvalho de Melo perf map: Tighten snprintf() string precision

[PATCH 4.19 08/13] net: phy: broadcom: Only advertise EEE for supported modes

2021-04-15 Thread Greg Kroah-Hartman
From: Florian Fainelli commit c056d480b40a68f2520ccc156c7fae672d69d57d upstream We should not be advertising EEE for modes that we do not support, correct that oversight by looking at the PHY device supported linkmodes. Fixes: 99cec8a4dda2 ("net: phy: broadcom: Allow enabling or disabling of

[PATCH 4.19 07/13] riscv,entry: fix misaligned base for excp_vect_table

2021-04-15 Thread Greg Kroah-Hartman
From: Zihao Yu [ Upstream commit ac8d0b901f0033b783156ab2dc1a0e73ec42409b ] In RV64, the size of each entry in excp_vect_table is 8 bytes. If the base of the table is not 8-byte aligned, loading an entry in the table will raise a misaligned exception. Although such exception will be handled by

[PATCH 4.19 06/13] block: only update parent bi_status when bio fail

2021-04-15 Thread Greg Kroah-Hartman
From: Yufen Yu [ Upstream commit 3edf5346e4f2ce2fa0c94651a90a8dda169565ee ] For multiple split bios, if one of the bio is fail, the whole should return error to application. But we found there is a race between bio_integrity_verify_fn and bio complete, which return io success to application

[PATCH 4.19 02/13] KVM: arm64: Disable guest access to trace filter controls

2021-04-15 Thread Greg Kroah-Hartman
From: Suzuki K Poulose [ Upstream commit a354a64d91eec3e0f8ef0eed575b480fd75b999c ] Disable guest access to the Trace Filter control registers. We do not advertise the Trace filter feature to the guest (ID_AA64DFR0_EL1: TRACE_FILT is cleared) already, but the guest can still access the

[PATCH 4.19 05/13] drm/tegra: dc: Dont set PLL clock to 0Hz

2021-04-15 Thread Greg Kroah-Hartman
From: Dmitry Osipenko [ Upstream commit f8fb97c915954fc6de6513cdf277103b5c6df7b3 ] RGB output doesn't allow to change parent clock rate of the display and PCLK rate is set to 0Hz in this case. The tegra_dc_commit_state() shall not set the display clock to 0Hz since this change propagates to the

[PATCH 4.19 03/13] drm/imx: imx-ldb: fix out of bounds array access warning

2021-04-15 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 33ce7f2f95cabb5834cf0906308a5cb6103976da ] When CONFIG_OF is disabled, building with 'make W=1' produces warnings about out of bounds array access: drivers/gpu/drm/imx/imx-ldb.c: In function 'imx_ldb_set_clock.constprop':

[PATCH 4.19 04/13] gfs2: report "already frozen/thawed" errors

2021-04-15 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit ff132c5f93c06bd4432bbab5c369e468653bdec4 ] Before this patch, gfs2's freeze function failed to report an error when the target file system was already frozen as it should (and as generic vfs function freeze_super does. Similarly, gfs2's thaw function failed

[PATCH 4.19 10/13] netfilter: x_tables: fix compat match/target pad out-of-bound write

2021-04-15 Thread Greg Kroah-Hartman
+cfc0247ac173f597a...@syzkaller.appspotmail.com Reported-by: Andy Nguyen Fixes: 9fa492cdc160c ("[NETFILTER]: x_tables: simplify compat API") Signed-off-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/ipv4/netfilter/arp_tables.c |2 ++

[PATCH 4.19 13/13] xen/events: fix setting irq affinity

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/xen/events/events_base.c +++ b/drivers/xen/events/events_base.c @@ -1782,7 +1782,7 @@ static void lateeoi_ack_dynirq

[PATCH 4.19 12/13] perf map: Tighten snprintf() string precision to pass gcc check on some 32-bit arches

2021-04-15 Thread Greg Kroah-Hartman
a_arg_pack ()); |~ cc1: all warnings being treated as errors Since we have the lenghts for what lands in that place, use it to give the compiler more info and make it happy. Signed-off-by: Arnaldo Carvalho de Melo Cc: Anders Roxell Signed-off-by: Greg Kroah-Hartman --- tools/perf/

[PATCH 4.19 11/13] driver core: Fix locking bug in deferred_probe_timeout_work_func()

2021-04-15 Thread Greg Kroah-Hartman
f-by: Greg Kroah-Hartman --- drivers/base/dd.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/drivers/base/dd.c +++ b/drivers/base/dd.c @@ -254,14 +254,16 @@ int driver_deferred_probe_check_state(st static void deferred_probe_timeout_work_func(struct work_st

[PATCH 4.14 65/68] net: phy: broadcom: Only advertise EEE for supported modes

2021-04-15 Thread Greg Kroah-Hartman
From: Florian Fainelli commit c056d480b40a68f2520ccc156c7fae672d69d57d upstream We should not be advertising EEE for modes that we do not support, correct that oversight by looking at the PHY device supported linkmodes. Fixes: 99cec8a4dda2 ("net: phy: broadcom: Allow enabling or disabling of

[PATCH 4.19 01/13] KVM: arm64: Hide system instruction access to Trace registers

2021-04-15 Thread Greg Kroah-Hartman
From: Suzuki K Poulose [ Upstream commit 1d676673d665fd2162e7e466dcfbe5373bfdb73e ] Currently we advertise the ID_AA6DFR0_EL1.TRACEVER for the guest, when the trace register accesses are trapped (CPTR_EL2.TTA == 1). So, the guest will get an undefined instruction, if trusts the ID registers and

[PATCH 4.14 67/68] perf map: Tighten snprintf() string precision to pass gcc check on some 32-bit arches

2021-04-15 Thread Greg Kroah-Hartman
a_arg_pack ()); |~ cc1: all warnings being treated as errors Since we have the lenghts for what lands in that place, use it to give the compiler more info and make it happy. Signed-off-by: Arnaldo Carvalho de Melo Cc: Anders Roxell Signed-off-by: Greg Kroah-Hartman --- tools/perf/

[PATCH 4.14 36/68] net/mlx5: Fix placement of log_max_flow_counter

2021-04-15 Thread Greg Kroah-Hartman
From: Raed Salem [ Upstream commit a14587dfc5ad2312dabdd42a610d80ecd0dc8bea ] The cited commit wrongly placed log_max_flow_counter field of mlx5_ifc_flow_table_prop_layout_bits, align it to the HW spec intended placement. Fixes: 16f1c5bb3ed7 ("net/mlx5: Check device capability for maximum flow

[PATCH 4.14 27/68] net:tipc: Fix a double free in tipc_sk_mcast_rcv

2021-04-15 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 6bf24dc0cc0cc43b29ba344b66d78590e687e046 ] In the if(skb_peek(arrvq) == skb) branch, it calls __skb_dequeue(arrvq) to get the skb by skb = skb_peek(arrvq). Then __skb_dequeue() unlinks the skb from arrvq and returns the skb which equals to skb_peek(arrvq).

[PATCH 4.14 35/68] s390/cpcmd: fix inline assembly register clobbering

2021-04-15 Thread Greg Kroah-Hartman
From: Alexander Gordeev [ Upstream commit 7a2f91441b2c1d81b77c1cd816a4659f4abc9cbe ] Register variables initialized using arithmetic. That leads to kasan instrumentaton code corrupting the registers contents. Follow GCC guidlines and use temporary variables for assigning init values to register

[PATCH 4.14 34/68] workqueue: Move the position of debug_work_activate() in __queue_work()

2021-04-15 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 0687c66b5f666b5ad433f4e94251590d9bc9d10e ] The debug_work_activate() is called on the premise that the work can be inserted, because if wq be in WQ_DRAINING status, insert work may be failed. Fixes: e41e704bc4f4 ("workqueue: improve destroy_workqueue()

[PATCH 4.14 33/68] clk: fix invalid usage of list cursor in unregister

2021-04-15 Thread Greg Kroah-Hartman
From: Lukasz Bartosik [ Upstream commit 7045465500e465b09f09d6e5bdc260a9f1aab97b ] Fix invalid usage of a list_for_each_entry cursor in clk_notifier_unregister(). When list is empty or if the list is completely traversed (without breaking from the loop on one of the entries) then the list

[PATCH 4.14 64/68] block: only update parent bi_status when bio fail

2021-04-15 Thread Greg Kroah-Hartman
From: Yufen Yu [ Upstream commit 3edf5346e4f2ce2fa0c94651a90a8dda169565ee ] For multiple split bios, if one of the bio is fail, the whole should return error to application. But we found there is a race between bio_integrity_verify_fn and bio complete, which return io success to application

[PATCH 4.14 63/68] gfs2: report "already frozen/thawed" errors

2021-04-15 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit ff132c5f93c06bd4432bbab5c369e468653bdec4 ] Before this patch, gfs2's freeze function failed to report an error when the target file system was already frozen as it should (and as generic vfs function freeze_super does. Similarly, gfs2's thaw function failed

[PATCH 4.14 32/68] clk: fix invalid usage of list cursor in register

2021-04-15 Thread Greg Kroah-Hartman
From: Lukasz Bartosik [ Upstream commit 8d3c0c01cb2e36b2bf3c06a82b18b228d0c8f5d0 ] Fix invalid usage of a list_for_each_entry cursor in clk_notifier_register(). When list is empty or if the list is completely traversed (without breaking from the loop on one of the entries) then the list cursor

[PATCH 4.14 31/68] soc/fsl: qbman: fix conflicting alignment attributes

2021-04-15 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 040f31196e8b2609613f399793b9225271b79471 ] When building with W=1, gcc points out that the __packed attribute on struct qm_eqcr_entry conflicts with the 8-byte alignment attribute on struct qm_fd inside it: drivers/soc/fsl/qbman/qman.c:189:1: error:

[PATCH 4.14 61/68] KVM: arm64: Disable guest access to trace filter controls

2021-04-15 Thread Greg Kroah-Hartman
From: Suzuki K Poulose [ Upstream commit a354a64d91eec3e0f8ef0eed575b480fd75b999c ] Disable guest access to the Trace Filter control registers. We do not advertise the Trace filter feature to the guest (ID_AA64DFR0_EL1: TRACE_FILT is cleared) already, but the guest can still access the

[PATCH 4.14 60/68] KVM: arm64: Hide system instruction access to Trace registers

2021-04-15 Thread Greg Kroah-Hartman
From: Suzuki K Poulose [ Upstream commit 1d676673d665fd2162e7e466dcfbe5373bfdb73e ] Currently we advertise the ID_AA6DFR0_EL1.TRACEVER for the guest, when the trace register accesses are trapped (CPTR_EL2.TTA == 1). So, the guest will get an undefined instruction, if trusts the ID registers and

[PATCH 4.14 62/68] drm/imx: imx-ldb: fix out of bounds array access warning

2021-04-15 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 33ce7f2f95cabb5834cf0906308a5cb6103976da ] When CONFIG_OF is disabled, building with 'make W=1' produces warnings about out of bounds array access: drivers/gpu/drm/imx/imx-ldb.c: In function 'imx_ldb_set_clock.constprop':

[PATCH 4.14 59/68] Revert "cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb->prepath."

2021-04-15 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit ad48c641e7c344ae7aba243d3056a22eaba71bfd which is commit a738c93fb1c17e386a09304b517b1c6b2a6a5a8b upstream. It is reported to cause problems in older kernels, so revert it for now until we can figure it out... Reported-by: Salvatore Bonaccorso Link

[PATCH 4.14 58/68] net: ieee802154: stop dump llsec params for monitors

2021-04-15 Thread Greg Kroah-Hartman
...@syzkaller.appspotmail.com Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210405003054.256017-16-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |5 + 1 file changed, 5 insertions(+) --- a/net/ieee802154/nl802154.c +++ b/net

[PATCH 4.14 57/68] net: ieee802154: forbid monitor for del llsec seclevel

2021-04-15 Thread Greg Kroah-Hartman
...@syzkaller.appspotmail.com Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210405003054.256017-15-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 +++ 1 file changed, 3 insertions(+) --- a/net/ieee802154/nl802154.c

[PATCH 4.14 30/68] ASoC: sunxi: sun4i-codec: fill ASoC card owner

2021-04-15 Thread Greg Kroah-Hartman
From: Bastian Germann [ Upstream commit 7c0d6e482062eb5c06ecccfab340abc523bdca00 ] card->owner is a required property and since commit 81033c6b584b ("ALSA: core: Warn on empty module") a warning is issued if it is empty. Add it. This fixes following warning observed on Lamobo R1: WARNING: CPU:

[PATCH 4.14 56/68] net: ieee802154: forbid monitor for set llsec params

2021-04-15 Thread Greg Kroah-Hartman
://lore.kernel.org/r/20210405003054.256017-3-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 +++ 1 file changed, 3 insertions(+) --- a/net/ieee802154/nl802154.c +++ b/net/ieee802154/nl802154.c @@ -1402,6 +1402,9 @@ static int

[PATCH 4.14 55/68] net: ieee802154: fix nl802154 del llsec devkey

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-4-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b

[PATCH 4.14 54/68] net: ieee802154: fix nl802154 add llsec key

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-3-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b/net

[PATCH 4.14 53/68] net: ieee802154: fix nl802154 del llsec dev

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-2-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b

[PATCH 4.14 52/68] net: ieee802154: fix nl802154 del llsec key

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-1-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b/net

[PATCH 4.14 45/68] usbip: fix vudc usbip_sockfd_store races leading to gpf

2021-04-15 Thread Greg Kroah-Hartman
203.git.sk...@linuxfoundation.org Signed-off-by: Tom Seewald Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/vudc_sysfs.c | 42 + 1 file changed, 34 insertions(+), 8 deletions(-) --- a/drivers/usb/usbip/vudc_sysfs.c +++ b/drivers/usb/usbip/vu

[PATCH 4.14 49/68] drivers: net: fix memory leak in peak_usb_create_dev

2021-04-15 Thread Greg Kroah-Hartman
vel Skripkin Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/usb/peak_usb/pcan_usb_core.c |6 +- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/drivers/net/can/usb/peak_usb/pcan_usb_core.c +++ b/drivers/net/can/usb/peak_usb/pcan_usb_c

[PATCH 4.14 51/68] net: ieee802154: nl-mac: fix check on panid

2021-04-15 Thread Greg Kroah-Hartman
-by: Alexander Aring Link: https://lore.kernel.org/r/20210228151817.95700-4-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl-mac.c |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/net/ieee802154/nl-mac.c +++ b/net

[PATCH 4.14 48/68] drivers: net: fix memory leak in atusb_probe

2021-04-15 Thread Greg Kroah-Hartman
-by: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ieee802154/atusb.c |1 + 1 file changed, 1 insertion(+) --- a/drivers/net/ieee802154/atusb.c +++ b/drivers/net/ieee802154/atusb.c @@ -346,6 +346,7 @@ static int atusb_alloc_urbs(struct atusb

[PATCH 4.14 47/68] net: tun: set tun->dev->addr_len during TUNSETLINK processing

2021-04-15 Thread Greg Kroah-Hartman
ed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/tun.c | 48 1 file changed, 48 insertions(+) --- a/drivers/net/tun.c +++ b/drivers/net/tun.c @@ -75,6 +75,14 @@ #include #include #include +#include +#include +#i

[PATCH 4.14 29/68] net/ncsi: Avoid channel_monitor hrtimer deadlock

2021-04-15 Thread Greg Kroah-Hartman
From: Milton Miller [ Upstream commit 03cb4d05b4ea9a3491674ca40952adb708d549fa ] Calling ncsi_stop_channel_monitor from channel_monitor is a guaranteed deadlock on SMP because stop calls del_timer_sync on the timer that invoked channel_monitor as its timer function. Recognise the inherent race

[PATCH 4.14 46/68] cfg80211: remove WARN_ON() in cfg80211_sme_connect

2021-04-15 Thread Greg Kroah-Hartman
Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/sme.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/wireless/sme.c +++ b/net/wireless/sme.c @@ -530,7 +530,7 @@ static int cfg80211_sme_connect(struct w cfg80211_sme_free(wdev); } -

[PATCH 4.14 42/68] net/ncsi: Add generic netlink family

2021-04-15 Thread Greg Kroah-Hartman
or package/channel combination to be set as the preferred choice, and NCSI_CMD_CLEAR_INTERFACE which clears any preferred setting. Signed-off-by: Samuel Mendoza-Jonas Signed-off-by: David S. Miller Cc: Guenter Roeck Signed-off-by: Greg Kroah-Hartman --- include/uapi/linux/ncsi.h | 115

[PATCH 4.14 44/68] net/ncsi: Avoid GFP_KERNEL in response handler

2021-04-15 Thread Greg Kroah-Hartman
ss_one_work) from [<80134328>] (worker_thread+0x48/0x558) [ 43.033070] [<80134328>] (worker_thread) from [<8013ba80>] (kthread+0x130/0x174) [ 43.040506] [<8013ba80>] (kthread) from [<80102950>] (ret_from_fork+0x14/0x24) Fixes: 062b3e1b6d4f ("net/ncsi: Refacto

[PATCH 4.14 43/68] net/ncsi: Refactor MAC, VLAN filters

2021-04-15 Thread Greg Kroah-Hartman
fc fc fc [ 115.265639] == Reported-by: Joel Stanley Signed-off-by: Samuel Mendoza-Jonas Signed-off-by: David S. Miller Cc: Guenter Roeck Signed-off-by: Greg Kroah-Hartman --- net/ncsi/internal.h | 34 +++ net/ncsi/n

[PATCH 4.14 41/68] net/ncsi: Dont return error on normal response

2021-04-15 Thread Greg Kroah-Hartman
we told it to enable it, and it's possible that the feature has been enabled previously. Signed-off-by: Samuel Mendoza-Jonas Signed-off-by: David S. Miller Cc: Guenter Roeck Signed-off-by: Greg Kroah-Hartman --- net/ncsi/ncsi-rsp.c | 31 ++- 1 file changed, 14

[PATCH 4.14 39/68] net/ncsi: Make local function ncsi_get_filter() static

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- net/ncsi/ncsi-manage.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/ncsi/ncsi-manage.c +++ b/net/ncsi/ncsi-manage.c @@ -38,7 +38,7 @@ static inline int ncsi_filter_size(int t return sizes[table]; } -u32 *ncsi_get_filter

[PATCH 4.14 00/68] 4.14.231-rc1 review

2021-04-15 Thread Greg Kroah-Hartman
-rc.git linux-4.14.y and the diffstat can be found below. thanks, greg k-h - Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.14.231-rc1 Juergen Gross xen/events: fix setting irq affinity Arnaldo Carvalho de Melo perf map: Tighten snprintf() string precision

[PATCH 4.14 40/68] net/ncsi: Improve general state logging

2021-04-15 Thread Greg Kroah-Hartman
out certain errors more visibly. Signed-off-by: Samuel Mendoza-Jonas Signed-off-by: David S. Miller Cc: Guenter Roeck Signed-off-by: Greg Kroah-Hartman --- net/ncsi/ncsi-aen.c| 15 + net/ncsi/ncsi-manage.c | 76 - net/ncsi/ncsi

[PATCH 4.14 37/68] RDMA/cxgb4: check for ipv6 address properly while destroying listener

2021-04-15 Thread Greg Kroah-Hartman
From: Potnuri Bharat Teja [ Upstream commit 603c4690b01aaffe3a6c3605a429f6dac39852ae ] ipv6 bit is wrongly set by the below which causes fatal adapter lookup engine errors for ipv4 connections while destroying a listener. Fix it to properly check the local address for ipv6. Fixes:

[PATCH 4.14 09/68] ia64: fix user_stack_pointer() for ptrace()

2021-04-15 Thread Greg Kroah-Hartman
https://bugs.gentoo.org/769614 [1] Link: https://lkml.kernel.org/r/20210331084447.2561532-1-sly...@gentoo.org Signed-off-by: Sergei Trofimovich Reported-by: Dmitry V. Levin Cc: Oleg Nesterov Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- arch/ia64/i

[PATCH 4.14 38/68] clk: socfpga: fix iomem pointer cast on 64-bit

2021-04-15 Thread Greg Kroah-Hartman
09.32599-1-krzysztof.kozlow...@canonical.com Signed-off-by: Stephen Boyd Signed-off-by: Greg Kroah-Hartman --- drivers/clk/socfpga/clk-gate.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/clk/socfpga/clk-gate.c +++ b/drivers/clk/socfpga/clk-gate.c @@ -107,7 +107,7 @@ static uns

[PATCH 4.14 08/68] net: ipv6: check for validity before dereferencing cfg->fc_nlinfo.nlh

2021-04-15 Thread Greg Kroah-Hartman
-Coverity: ("NULL pointer dereference") Signed-off-by: Muhammad Usama Anjum Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/route.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -3283,9 +3283,11

[PATCH 4.14 05/68] nfc: fix memory leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
urs. fix CVE-2020-25672 Fixes: d646960f7986 ("NFC: Initial LLCP support") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.3 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/

[PATCH 4.14 28/68] ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces

2021-04-15 Thread Greg Kroah-Hartman
From: Stefan Riedmueller [ Upstream commit f57011e72f5fe0421ec7a812beb1b57bdf4bb47f ] Setting the vmmc supplies is crucial since otherwise the supplying regulators get disabled and the SD interfaces are no longer powered which leads to system failures if the system is booted from that SD

[PATCH 4.14 24/68] amd-xgbe: Update DMA coherency values

2021-04-15 Thread Greg Kroah-Hartman
From: Shyam Sundar S K [ Upstream commit d75135082698140a26a56defe1bbc1b06f26a41f ] Based on the IOMMU configuration, the current cache control settings can result in possible coherency issues. The hardware team has recommended new settings for the PCI device path to eliminate the issue.

[PATCH 4.14 07/68] xen/evtchn: Change irq_info lock to raw_spinlock_t

2021-04-15 Thread Greg Kroah-Hartman
luca.fance...@arm.com Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c | 10 +- drivers/xen/events/events_internal.h |2 +- 2 files changed, 6 insertions(+), 6 deletions(-) --- a/drivers/xen/events/events_base.c +++ b/drivers/

[PATCH 4.14 26/68] gianfar: Handle error code at MAC address change

2021-04-15 Thread Greg Kroah-Hartman
From: Claudiu Manoil [ Upstream commit bff5b62585123823842833ab20b1c0a7fa437f8c ] Handle return error code of eth_mac_addr(); Fixes: 3d23a05c75c7 ("gianfar: Enable changing mac addr when if up") Signed-off-by: Claudiu Manoil Signed-off-by: David S. Miller Signed-off-by: Sasha Levin ---

[PATCH 4.14 04/68] nfc: fix refcount leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25671 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signe

[PATCH 4.14 06/68] nfc: Avoid endless loops caused by repeated llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
ot;) Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.11 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/nfc/llcp_sock.c |4 1 file changed, 4 insertions(+) --- a/net/nfc/ll

[PATCH 4.14 03/68] nfc: fix refcount leak in llcp_sock_bind()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25670 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by

[PATCH 4.14 25/68] sch_red: fix off-by-one checks in red_check_params()

2021-04-15 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 3a87571f0ffc51ba3bf3ecdb6032861d0154b164 ] This fixes following syzbot report: UBSAN: shift-out-of-bounds in ./include/net/red.h:237:23 shift exponent 32 is too large for 32-bit type 'unsigned int' CPU: 1 PID: 8418 Comm: syz-executor170 Not tainted

[PATCH 4.14 22/68] regulator: bd9571mwv: Fix AVS and DVFS voltage range

2021-04-15 Thread Greg Kroah-Hartman
From: Geert Uytterhoeven [ Upstream commit 3b6e7088afc919f5b52e4d2de8501ad34d35b09b ] According to Table 30 ("DVFS_MoniVDAC [6:0] Setting Table") in the BD9571MWV-M Datasheet Rev. 002, the valid voltage range is 600..1100 mV (settings 0x3c..0x6e). While the lower limit is taken into account

<    1   2   3   4   5   6   7   8   9   10   >