[PATCH 5.11 184/210] RDMA/qedr: Fix kernel panic when trying to access recv_cq

2021-04-12 Thread Greg Kroah-Hartman
From: Kamal Heib [ Upstream commit e1ad897b9c738d5550be6762bf3a6ef1672259a4 ] As INI QP does not require a recv_cq, avoid the following null pointer dereference by checking if the qp_type is not INI before trying to extract the recv_cq. BUG: kernel NULL pointer dereference, address:

[PATCH 5.11 183/210] perf report: Fix wrong LBR block sorting

2021-04-12 Thread Greg Kroah-Hartman
From: Jin Yao [ Upstream commit f2013278ae40b89cc27916366c407ce5261815ef ] When '--total-cycles' is specified, it supports sorting for all blocks by 'Sampled Cycles%'. This is useful to concentrate on the globally hottest blocks. 'Sampled Cycles%' - block sampled cycles aggregation / total

[PATCH 5.11 181/210] net/mlx5: Fix PBMC register mapping

2021-04-12 Thread Greg Kroah-Hartman
From: Aya Levin [ Upstream commit 534b1204ca4694db1093b15cf3e79a99fcb6a6da ] Add reserved mapping to cover all the register in order to avoid setting arbitrary values to newer FW which implements the reserved fields. Fixes: 50b4a3c23646 ("net/mlx5: PPTB and PBMC register firmware command

[PATCH 5.11 162/210] Revert "arm64: dts: marvell: armada-cp110: Switch to per-port SATA interrupts"

2021-04-12 Thread Greg Kroah-Hartman
From: Gregory CLEMENT [ Upstream commit 967ff33eb0efcd48e4df11ab9aee51c41e0f44d0 ] The driver part of this support was not merged which leads to break AHCI on all Marvell Armada 7k8k / CN913x platforms as it was reported by Marcin Wojtas. So for now let's remove it in order to fix the issue

[PATCH 5.11 182/210] RDMA/cxgb4: check for ipv6 address properly while destroying listener

2021-04-12 Thread Greg Kroah-Hartman
From: Potnuri Bharat Teja [ Upstream commit 603c4690b01aaffe3a6c3605a429f6dac39852ae ] ipv6 bit is wrongly set by the below which causes fatal adapter lookup engine errors for ipv4 connections while destroying a listener. Fix it to properly check the local address for ipv6. Fixes:

[PATCH 5.11 165/210] net: macb: restore cmp registers on resume path

2021-04-12 Thread Greg Kroah-Hartman
From: Claudiu Beznea [ Upstream commit a14d273ba15968495896a38b7b3399dba66d0270 ] Restore CMP screener registers on resume path. Fixes: c1e85c6ce57ef ("net: macb: save/restore the remaining registers and features") Signed-off-by: Claudiu Beznea Acked-by: Nicolas Ferre Signed-off-by: David

[PATCH 5.11 174/210] can: mcp251x: fix support for half duplex SPI host controllers

2021-04-12 Thread Greg Kroah-Hartman
From: Marc Kleine-Budde [ Upstream commit 617085fca6375e2c1667d1fbfc6adc4034c85f04 ] Some SPI host controllers do not support full-duplex SPI transfers. The function mcp251x_spi_trans() does a full duplex transfer. It is used in several places in the driver, where a TX half duplex transfer is

[PATCH 5.11 126/210] can: bcm/raw: fix msg_namelen values depending on CAN_REQUIRED_SIZE

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Hartkopp [ Upstream commit 9e9714742fb70467464359693a73b911a630226f ] Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939 members") the sockaddr_can has been extended in size and a new CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol specific

[PATCH 5.11 130/210] ethernet: myri10ge: Fix a use after free in myri10ge_sw_tso

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 63415767a2446136372e777cde5bb351f21ec21d ] In myri10ge_sw_tso, the skb_list_walk_safe macro will set (curr) = (segs) and (next) = (curr)->next. If status!=0 is true, the memory pointed by curr and segs will be free by dev_kfree_skb_any(curr). But later, the

[PATCH 5.11 131/210] gianfar: Handle error code at MAC address change

2021-04-12 Thread Greg Kroah-Hartman
From: Claudiu Manoil [ Upstream commit bff5b62585123823842833ab20b1c0a7fa437f8c ] Handle return error code of eth_mac_addr(); Fixes: 3d23a05c75c7 ("gianfar: Enable changing mac addr when if up") Signed-off-by: Claudiu Manoil Signed-off-by: David S. Miller Signed-off-by: Sasha Levin ---

[PATCH 5.11 163/210] ARM: dts: turris-omnia: fix hardware buffer management

2021-04-12 Thread Greg Kroah-Hartman
From: Rui Salvaterra [ Upstream commit 5b2c7e0ae762fff2b172caf16b2766cc3e1ad859 ] Hardware buffer management has never worked on the Turris Omnia, as the required MBus window hadn't been reserved. Fix thusly. Fixes: 018b88eee1a2 ("ARM: dts: turris-omnia: enable HW buffer management")

[PATCH 5.11 161/210] drm/msm/disp/dpu1: program 3d_merge only if block is attached

2021-04-12 Thread Greg Kroah-Hartman
From: Kalyan Thota [ Upstream commit 12aca1ce9ee33af3751aec5e55a5900747cbdd4b ] Update the 3d merge as active in the data path only if the hw block is selected in the configuration. Reported-by: Stephen Boyd Fixes: 73bfb790ac78 ("msm:disp:dpu1: setup display datapath for SC7180 target")

[PATCH 5.11 158/210] scsi: ufs: core: Fix task management request completion timeout

2021-04-12 Thread Greg Kroah-Hartman
From: Can Guo [ Upstream commit 1235fc569e0bf541ddda0a1224d4c6fa6d914890 ] ufshcd_tmc_handler() calls blk_mq_tagset_busy_iter(fn = ufshcd_compl_tm()), but since blk_mq_tagset_busy_iter() only iterates over all reserved tags and requests which are not in IDLE state, ufshcd_compl_tm() never gets

[PATCH 5.11 154/210] drm/msm: Set drvdata to NULL when msm_drm_init() fails

2021-04-12 Thread Greg Kroah-Hartman
From: Stephen Boyd [ Upstream commit 5620b135aea49a8f41c86aaecfcb1598a7774121 ] We should set the platform device's driver data to NULL here so that code doesn't assume the struct drm_device pointer is valid when it could have been destroyed. The lifetime of this pointer is managed by a kref

[PATCH 5.11 155/210] net: udp: Add support for getsockopt(..., ..., UDP_GRO, ..., ...);

2021-04-12 Thread Greg Kroah-Hartman
From: Norman Maurer [ Upstream commit 98184612aca0a9ee42b8eb0262a49900ee9eef0d ] Support for UDP_GRO was added in the past but the implementation for getsockopt was missed which did lead to an error when we tried to retrieve the setting for UDP_GRO. This patch adds the missing switch case for

[PATCH 5.11 129/210] mlxsw: spectrum: Fix ECN marking in tunnel decapsulation

2021-04-12 Thread Greg Kroah-Hartman
From: Ido Schimmel [ Upstream commit 66167c310deb4ac1725f81004fb4b504676ad0bf ] Cited commit changed the behavior of the software data path with regards to the ECN marking of decapsulated packets. However, the commit did not change other callers of __INET_ECN_decapsulate(), namely mlxsw. The

[PATCH 5.11 156/210] mptcp: forbit mcast-related sockopt on MPTCP sockets

2021-04-12 Thread Greg Kroah-Hartman
From: Paolo Abeni [ Upstream commit 86581852d7710990d8af9dadfe9a661f0abf2114 ] Unrolling mcast state at msk dismantel time is bug prone, as syzkaller reported: == WARNING: possible circular locking dependency detected 5.11.0-syzkaller #0 Not

[PATCH 5.11 152/210] i40e: Fix display statistics for veb_tc

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit c3214de929dbf1b7374add8bbed30ce82b197bbb ] If veb-stats was enabled, the ethtool stats triggered a warning due to invalid size: 'unexpected stat size for veb.tc_%u_tx_packets'. This was due to an incorrect structure definition for the statistics. Structures

[PATCH 5.11 153/210] RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files

2021-04-12 Thread Greg Kroah-Hartman
From: Md Haris Iqbal [ Upstream commit 7582207b1059129e59eb92026fca2cfc088a74fc ] KASAN detected the following BUG: BUG: KASAN: use-after-free in rtrs_clt_update_wc_stats+0x41/0x100 [rtrs_client] Read of size 8 at addr 88bf2fb4adc0 by task swapper/0/0 CPU: 0 PID: 0 Comm: swapper/0

[PATCH 5.11 151/210] i40e: fix receiving of single packets in xsk zero-copy mode

2021-04-12 Thread Greg Kroah-Hartman
From: Magnus Karlsson [ Upstream commit 528060ef3e1105c5c3eba66ffbfc80e0825e2cce ] Fix so that single packets are received immediately instead of in batches of 8. If you sent 1 pps to a system, you received 8 packets every 8 seconds instead of 1 packet every second. The problem behind this was

[PATCH 5.11 147/210] net/mlx5e: Guarantee room for XSK wakeup NOP on async ICOSQ

2021-04-12 Thread Greg Kroah-Hartman
From: Tariq Toukan [ Upstream commit 3ff3874fa0b261ef74f2bfb008a82ab1601c11eb ] XSK wakeup flow triggers an IRQ by posting a NOP WQE and hitting the doorbell on the async ICOSQ. It maintains its state so that it doesn't issue another NOP WQE if it has an outstanding one already. For this flow

[PATCH 5.11 148/210] net/rds: Fix a use after free in rds_message_map_pages

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit bdc2ab5c61a5c07388f4820ff21e787b4dfd1ced ] In rds_message_map_pages, the rm is freed by rds_message_put(rm). But rm is still used by rm->data.op_sg in return value. My patch assigns ERR_CAST(rm->data.op_sg) to err before the rm is freed to avoid the uaf.

[PATCH 5.11 149/210] xdp: fix xdp_return_frame() kernel BUG throw for page_pool memory model

2021-04-12 Thread Greg Kroah-Hartman
From: Ong Boon Leong [ Upstream commit 622d13694b5f048c01caa7ba548498d9880d4cb0 ] xdp_return_frame() may be called outside of NAPI context to return xdpf back to page_pool. xdp_return_frame() calls __xdp_return() with napi_direct = false. For page_pool memory model, __xdp_return() calls

[PATCH 5.11 150/210] soc/fsl: qbman: fix conflicting alignment attributes

2021-04-12 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 040f31196e8b2609613f399793b9225271b79471 ] When building with W=1, gcc points out that the __packed attribute on struct qm_eqcr_entry conflicts with the 8-byte alignment attribute on struct qm_fd inside it: drivers/soc/fsl/qbman/qman.c:189:1: error:

[PATCH 5.11 128/210] can: uapi: can.h: mark union inside struct can_frame packed

2021-04-12 Thread Greg Kroah-Hartman
From: Marc Kleine-Budde [ Upstream commit f5076c6ba02e8e24c61c40bbf48078929bc0fc79 ] In commit ea7800565a12 ("can: add optional DLC element to Classical CAN frame structure") the struct can_frame::can_dlc was put into an anonymous union with another u8 variable. For various reasons some

[PATCH 5.11 146/210] net/mlx5: Dont request more than supported EQs

2021-04-12 Thread Greg Kroah-Hartman
From: Daniel Jurgens [ Upstream commit a7b76002ae78cd230ee652ccdfedf21aa94fcecc ] Calculating the number of compeltion EQs based on the number of available IRQ vectors doesn't work now that all async EQs share one IRQ. Thus the max number of EQs can be exceeded on systems with more than

[PATCH 5.11 144/210] net/mlx5: Delete auxiliary bus driver eth-rep first

2021-04-12 Thread Greg Kroah-Hartman
From: Maor Dickman [ Upstream commit 1f90aedfb496f862c7b7c0889af20c2fc61a ] Delete auxiliary bus drivers flow deletes the eth driver first and then the eth-reps driver but eth-reps devices resources are depend on eth device. Fixed by changing the delete order of auxiliary bus drivers to

[PATCH 5.11 145/210] net/mlx5e: Fix ethtool indication of connector type

2021-04-12 Thread Greg Kroah-Hartman
From: Aya Levin [ Upstream commit 3211434dfe7a66fcf55e43961ea524b78336c04c ] Use connector_type read from PTYS register when it's valid, based on corresponding capability bit. Fixes: 5b4793f81745 ("net/mlx5e: Add support for reading connector type from PTYS") Signed-off-by: Aya Levin

[PATCH 5.11 137/210] net/ncsi: Avoid channel_monitor hrtimer deadlock

2021-04-12 Thread Greg Kroah-Hartman
From: Milton Miller [ Upstream commit 03cb4d05b4ea9a3491674ca40952adb708d549fa ] Calling ncsi_stop_channel_monitor from channel_monitor is a guaranteed deadlock on SMP because stop calls del_timer_sync on the timer that invoked channel_monitor as its timer function. Recognise the inherent race

[PATCH 5.11 140/210] net: phy: broadcom: Only advertise EEE for supported modes

2021-04-12 Thread Greg Kroah-Hartman
From: Florian Fainelli [ Upstream commit c056d480b40a68f2520ccc156c7fae672d69d57d ] We should not be advertising EEE for modes that we do not support, correct that oversight by looking at the PHY device supported linkmodes. Fixes: 99cec8a4dda2 ("net: phy: broadcom: Allow enabling or disabling

[PATCH 5.11 127/210] can: isotp: fix msg_namelen values depending on CAN_REQUIRED_SIZE

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Hartkopp [ Upstream commit f522d9559b07854c231cf8f0b8cb5a3578f8b44e ] Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939 members") the sockaddr_can has been extended in size and a new CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol specific

[PATCH 5.11 138/210] net: qrtr: Fix memory leak on qrtr_tx_wait failure

2021-04-12 Thread Greg Kroah-Hartman
From: Loic Poulain [ Upstream commit 8a03dd925786bdc3834d56ccc980bb70668efa35 ] qrtr_tx_wait does not check for radix_tree_insert failure, causing the 'flow' object to be unreferenced after qrtr_tx_wait return. Fix that by releasing flow on radix_tree_insert failure. Fixes: 5fdeb0d372ab ("net:

[PATCH 5.11 097/210] KVM: x86/mmu: Ensure TLBs are flushed for TDP MMU during NX zapping

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit 048f49809c526348775425420fb5b8e84fd9a133 ] Honor the "flush needed" return from kvm_tdp_mmu_zap_gfn_range(), which does the flush itself if and only if it yields (which it will never do in this particular scenario), and otherwise expects the caller to

[PATCH 5.11 092/210] KVM: x86/mmu: Merge flush and non-flush tdp_mmu_iter_cond_resched

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit e139a34ef9d5627a41e1c02210229082140d1f92 ] The flushing and non-flushing variants of tdp_mmu_iter_cond_resched have almost identical implementations. Merge the two functions and add a flush parameter. Signed-off-by: Ben Gardon Message-Id:

[PATCH 5.11 094/210] KVM: x86/mmu: Ensure forward progress when yielding in TDP MMU iter

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit ed5e484b79e8a9b8be714bd85b6fc70bd6dc99a7 ] In some functions the TDP iter risks not making forward progress if two threads livelock yielding to one another. This is possible if two threads are trying to execute wrprot_gfn_range. Each could write protect an

[PATCH 5.11 093/210] KVM: x86/mmu: Rename goal_gfn to next_last_level_gfn

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit 74953d3530280dc53256054e1906f58d07bfba44 ] The goal_gfn field in tdp_iter can be misleading as it implies that it is the iterator's final goal. It is really a target for the lowest gfn mapped by the leaf level SPTE the iterator will traverse towards. Change

[PATCH 5.11 095/210] KVM: x86/mmu: Yield in TDU MMU iter even if no SPTES changed

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit 1af4a96025b33587ca953c7ef12a1b20c6e70412 ] Given certain conditions, some TDP MMU functions may not yield reliably / frequently enough. For example, if a paging structure was very large but had few, if any writable entries, wrprot_gfn_range could traverse many

[PATCH 5.11 096/210] KVM: x86/mmu: Ensure TLBs are flushed when yielding during GFN range zap

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit a835429cda91621fca915d80672a157b47738afb ] When flushing a range of GFNs across multiple roots, ensure any pending flush from a previous root is honored before yielding while walking the tables of the current root. Note, kvm_tdp_mmu_zap_gfn_range()

[PATCH 5.11 124/210] arm64: dts: imx8mm/q: Fix pad control of SD1_DATA0

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Stäbler [ Upstream commit 5cfad4f45806f6f898b63b8c77cea7452c704cb3 ] Fix address of the pad control register (IOMUXC_SW_PAD_CTL_PAD_SD1_DATA0) for SD1_DATA0_GPIO2_IO2. This seems to be a typo but it leads to an exception when pinctrl is applied due to wrong memory address access.

[PATCH 5.11 122/210] sch_red: fix off-by-one checks in red_check_params()

2021-04-12 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 3a87571f0ffc51ba3bf3ecdb6032861d0154b164 ] This fixes following syzbot report: UBSAN: shift-out-of-bounds in ./include/net/red.h:237:23 shift exponent 32 is too large for 32-bit type 'unsigned int' CPU: 1 PID: 8418 Comm: syz-executor170 Not tainted

[PATCH 5.11 125/210] xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets

2021-04-12 Thread Greg Kroah-Hartman
From: Steffen Klassert [ Upstream commit c7dbf4c08868d9db89b8bfe8f8245ca61b01ed2f ] Commit 94579ac3f6d0 ("xfrm: Fix double ESP trailer insertion in IPsec crypto offload.") added a XFRM_XMIT flag to avoid duplicate ESP trailer insertion on HW offload. This flag is set on the secpath that is

[PATCH 5.11 123/210] drivers/net/wan/hdlc_fr: Fix a double free in pvc_xmit

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 1b479fb801602b22512f53c19b1f93a4fc5d5d9d ] In pvc_xmit, if __skb_pad(skb, pad, false) failed, it will free the skb in the first time and goto drop. But the same skb is freed by kfree_skb(skb) in the second time in drop. Maintaining the original function

[PATCH 5.11 121/210] geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply

2021-04-12 Thread Greg Kroah-Hartman
From: Antoine Tenart [ Upstream commit 68c1a943ef37bafde5ea2383e8ca224c7169ee31 ] When the interface is part of a bridge or an Open vSwitch port and a packet exceed a PMTU estimate, an ICMP reply is sent to the sender. When using the external mode (collect metadata) the source and destination

[PATCH 5.11 119/210] amd-xgbe: Update DMA coherency values

2021-04-12 Thread Greg Kroah-Hartman
From: Shyam Sundar S K [ Upstream commit d75135082698140a26a56defe1bbc1b06f26a41f ] Based on the IOMMU configuration, the current cache control settings can result in possible coherency issues. The hardware team has recommended new settings for the PCI device path to eliminate the issue.

[PATCH 5.11 120/210] vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply

2021-04-12 Thread Greg Kroah-Hartman
From: Antoine Tenart [ Upstream commit 30a93d2b7d5a7cbb53ac19c9364a256d1aa6c08a ] When the interface is part of a bridge or an Open vSwitch port and a packet exceed a PMTU estimate, an ICMP reply is sent to the sender. When using the external mode (collect metadata) the source and destination

[PATCH 5.11 091/210] KVM: x86/mmu: change TDP MMU yield function returns to match cond_resched

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit e28a436ca4f65384cceaf3f4da0e00aa74244e6a ] Currently the TDP MMU yield / cond_resched functions either return nothing or return true if the TLBs were not flushed. These are confusing semantics, especially when making control flow decisions in calling

[PATCH 5.11 118/210] hostfs: fix memory handling in follow_link()

2021-04-12 Thread Greg Kroah-Hartman
From: Al Viro [ Upstream commit 7f6c411c9b50cfab41cc798e003eff27608c7016 ] 1) argument should not be freed in any case - the caller already has it as ->s_fs_info (and uses it a lot afterwards) 2) allocate readlink buffer with kmalloc() - the caller has no way to tell if it's got that (on

[PATCH 5.11 117/210] i40e: Fix kernel oops when i40e driver removes VFs

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ] Fix the reason of kernel oops when i40e driver removed VFs. Added new __I40E_VFS_RELEASING state to signalize releasing process by PF, that it makes possible to exit of reset VF procedure. Without this patch, it is

[PATCH 5.11 114/210] xfrm: Fix NULL pointer dereference on policy lookup

2021-04-12 Thread Greg Kroah-Hartman
From: Steffen Klassert [ Upstream commit b1e3a5607034aa0a481c6f69a6893049406665fb ] When xfrm interfaces are used in combination with namespaces and ESP offload, we get a dst_entry NULL pointer dereference. This is because we don't have a dst_entry attached in the ESP offloading case and we

[PATCH 5.11 115/210] virtchnl: Fix layout of RSS structures

2021-04-12 Thread Greg Kroah-Hartman
From: Norbert Ciosek [ Upstream commit 22f8b5df881e9f1302514bb8649c2051de55 ] Remove padding from RSS structures. Previous layout could lead to unwanted compiler optimizations in loops when iterating over key and lut arrays. Fixes: 65ece6de0114 ("virtchnl: Add missing explicit padding to

[PATCH 5.11 116/210] i40e: Added Asym_Pause to supported link modes

2021-04-12 Thread Greg Kroah-Hartman
From: Mateusz Palczewski [ Upstream commit 90449e98c265296329446c7abcd2aae3b20c0bc9 ] Add Asym_Pause to supported link modes (it is supported by HW). Lack of Asym_Pause in supported modes can cause several problems, i.e. it won't be possible to turn the autonegotiation on with asymmetric pause

[PATCH 5.11 113/210] ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips

2021-04-12 Thread Greg Kroah-Hartman
From: Shengjiu Wang [ Upstream commit 16b82e75c15a7dbd564ea3654f3feb61df9e1e6f ] The input MCLK is 12.288MHz, the desired output sysclk is 11.2896MHz and sample rate is 44100Hz, with the configuration pllprescale=2, postscale=sysclkdiv=1, some chip may have wrong bclk and lrclk output with pll

[PATCH 5.11 112/210] ASoC: SOF: Intel: HDA: fix core status verification

2021-04-12 Thread Greg Kroah-Hartman
From: Guennadi Liakhovetski [ Upstream commit 927280909fa7d8e61596800d82f18047c6cfbbe4 ] When checking for enabled cores it isn't enough to check that some of the requested cores are running, we have to check that all of them are. Fixes: 747503b1813a ("ASoC: SOF: Intel: Add Intel specific HDA

[PATCH 5.11 106/210] regulator: bd9571mwv: Fix AVS and DVFS voltage range

2021-04-12 Thread Greg Kroah-Hartman
From: Geert Uytterhoeven [ Upstream commit 3b6e7088afc919f5b52e4d2de8501ad34d35b09b ] According to Table 30 ("DVFS_MoniVDAC [6:0] Setting Table") in the BD9571MWV-M Datasheet Rev. 002, the valid voltage range is 600..1100 mV (settings 0x3c..0x6e). While the lower limit is taken into account

[PATCH 5.11 110/210] net: xfrm: Localize sequence counter per network namespace

2021-04-12 Thread Greg Kroah-Hartman
From: Ahmed S. Darwish [ Upstream commit e88add19f68191448427a6e4eb059664650a837f ] A sequence counter write section must be serialized or its internal state can get corrupted. The "xfrm_state_hash_generation" seqcount is global, but its write serialization lock (net->xfrm.xfrm_state_lock) is

[PATCH 5.11 111/210] esp: delete NETIF_F_SCTP_CRC bit from features for esp offload

2021-04-12 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 154deab6a3ba47792936edf77f2f13a1cbc4351d ] Now in esp4/6_gso_segment(), before calling inner proto .gso_segment, NETIF_F_CSUM_MASK bits are deleted, as HW won't be able to do the csum for inner proto due to the packet encrypted already. So the UDP/TCP packet

[PATCH 5.11 109/210] remoteproc: pru: Fix firmware loading crashes on K3 SoCs

2021-04-12 Thread Greg Kroah-Hartman
From: Suman Anna [ Upstream commit 9afeefcf06fc7b4bdab06a6e2cb06745bded34dd ] The K3 PRUs are 32-bit processors and in general have some limitations in using the standard ARMv8 memcpy function for loading firmware segments, so the driver already uses a custom memcpy implementation. This added

[PATCH 5.11 107/210] ARM: OMAP4: Fix PMIC voltage domains for bionic

2021-04-12 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit 30916faa1a6009122e10d0c42338b8db44a36fde ] We are now registering the mpu domain three times instead of registering mpu, core and iva domains like we should. Fixes: d44fa156dcb2 ("ARM: OMAP2+: Configure voltage controller for cpcap") Signed-off-by: Tony

[PATCH 5.11 108/210] ARM: OMAP4: PM: update ROM return address for OSWR and OFF

2021-04-12 Thread Greg Kroah-Hartman
From: Carlos Leija [ Upstream commit b3d09a06d89f474cb52664e016849315a97e09d9 ] We need to add a dummy smc call to the cpuidle wakeup path to force the ROM code to save the return address after MMU is enabled again. This is needed to prevent random hangs on secure devices like droid4.

[PATCH 5.11 104/210] xfrm: Use actual socket sk instead of skb socket for xfrm_output_resume

2021-04-12 Thread Greg Kroah-Hartman
From: Evan Nimmo [ Upstream commit 9ab1265d52314fce1b51e8665ea6dbc9ac1a027c ] A situation can occur where the interface bound to the sk is different to the interface bound to the sk attached to the skb. The interface bound to the sk is the correct one however this information is lost inside

[PATCH 5.11 090/210] powerpc/ptrace: Dont return error when getting/setting FP regs without CONFIG_PPC_FPU_REGS

2021-04-12 Thread Greg Kroah-Hartman
l Ellerman Link: https://lore.kernel.org/r/9121a44a2d50ba1af18d8aa5ada06c9a3bea8afd.1617200085.git.christophe.le...@csgroup.eu Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/kernel/ptrace/Makefile |4 ++-- arch/powerpc/kernel/ptrace/ptrace-decl.h | 14 -- arch/powe

[PATCH 5.11 105/210] remoteproc: qcom: pil_info: avoid 64-bit division

2021-04-12 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 7029e783027706b427bbfbdf8558252c1dac6fa0 ] On 32-bit machines with 64-bit resource_size_t, the driver causes a link failure because of the 64-bit division: arm-linux-gnueabi-ld: drivers/remoteproc/qcom_pil_info.o: in function `qcom_pil_info_store':

[PATCH 5.11 101/210] ice: Refactor DCB related variables out of the ice_port_info struct

2021-04-12 Thread Greg Kroah-Hartman
From: Chinh T Cao [ Upstream commit fc2d1165d4a424dd325ae1f45806565350a58013 ] Refactor the DCB related variables out of the ice_port_info_struct. The goal is to make the ice_port_info struct cleaner. Signed-off-by: Chinh T Cao Co-developed-by: Dave Ertman Signed-off-by: Dave Ertman

[PATCH 5.11 102/210] ice: Recognize 860 as iSCSI port in CEE mode

2021-04-12 Thread Greg Kroah-Hartman
From: Chinh T Cao [ Upstream commit aeac8ce864d9c0836e12ed5b5cc80f62f3cccb7c ] iSCSI can use both TCP ports 860 and 3260. However, in our current implementation, the ice_aqc_opc_get_cee_dcb_cfg (0x0A07) AQ command doesn't provide a way to communicate the protocol port number to the AQ's caller.

[PATCH 5.11 103/210] xfrm: interface: fix ipv4 pmtu check to honor ip header df

2021-04-12 Thread Greg Kroah-Hartman
From: Eyal Birger [ Upstream commit 8fc0e3b6a8666d656923d214e4dc791e9a17164a ] Frag needed should only be sent if the header enables DF. This fix allows packets larger than MTU to pass the xfrm interface and be fragmented after encapsulation, aligning behavior with non-interface xfrm. Fixes:

[PATCH 5.11 100/210] net: sched: fix err handler in tcf_action_init()

2021-04-12 Thread Greg Kroah-Hartman
From: Vlad Buslov [ Upstream commit b3650bf76a32380d4d80a3e21b5583e7303f216c ] With recent changes that separated action module load from action initialization tcf_action_init() function error handling code was modified to manually release the loaded modules if loading/initialization of any

[PATCH 5.11 099/210] KVM: x86/mmu: preserve pending TLB flush across calls to kvm_tdp_mmu_zap_sp

2021-04-12 Thread Greg Kroah-Hartman
From: Paolo Bonzini [ Upstream commit 315f02c60d9425b38eb8ad7f21b8a35e40db23f9 ] Right now, if a call to kvm_tdp_mmu_zap_sp returns false, the caller will skip the TLB flush, which is wrong. There are two ways to fix it: - since kvm_tdp_mmu_zap_sp will not yield and therefore will not flush

[PATCH 5.11 098/210] KVM: x86/mmu: Dont allow TDP MMU to yield when recovering NX pages

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit 33a3164161fc86b9cc238f7f2aa2ccb1d5559b1c ] Prevent the TDP MMU from yielding when zapping a gfn range during NX page recovery. If a flush is pending from a previous invocation of the zapping helper, either in the TDP MMU or the legacy MMU, but the

[PATCH 5.11 089/210] powerpc/vdso: Make sure vdso_wrapper.o is rebuilt everytime vdso.so is rebuilt

2021-04-12 Thread Greg Kroah-Hartman
essary rebuilds of vgettimeofday.o") Cc: sta...@vger.kernel.org Signed-off-by: Christophe Leroy Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/8bb015bc98c51d8ced581415b7e3d157e18da7c9.1617181918.git.christophe.le...@csgroup.eu Signed-off-by: Greg Kroah-Hartman --- arch/pow

[PATCH 5.11 050/210] net: hso: fix null-ptr-deref during tty device unregistration

2021-04-12 Thread Greg Kroah-Hartman
: 72dc1c096c705 ("HSO: add option hso driver") Reported-by: syzbot+c49fe6089f295a05e...@syzkaller.appspotmail.com Tested-by: syzbot+c49fe6089f295a05e...@syzkaller.appspotmail.com Reviewed-by: Greg Kroah-Hartman Signed-off-by: Anirudh Rayabharam Signed-off-by: David S. Miller Signed-off-by:

[PATCH 5.11 059/210] bpf, sockmap: Fix sk->prot unhash op reset

2021-04-12 Thread Greg Kroah-Hartman
abend Signed-off-by: Daniel Borkmann Link: https://lore.kernel.org/bpf/161731441904.68884.15593917809745631972.stgit@john-XPS-13-9370 Signed-off-by: Greg Kroah-Hartman --- include/linux/skmsg.h |7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/include/linux/skmsg.h +++ b/in

[PATCH 5.11 058/210] bpf: Refcount task stack in bpf_get_task_stack

2021-04-12 Thread Greg Kroah-Hartman
b82a38 ("bpf: Introduce helper bpf_get_task_stack()") Signed-off-by: Dave Marchevsky Signed-off-by: Alexei Starovoitov Acked-by: Song Liu Link: https://lore.kernel.org/bpf/20210401000747.3648767-1-davemarchev...@fb.com Signed-off-by: Greg Kroah-Hartman --- kernel/bpf/stackmap.c | 12

[PATCH 5.11 057/210] libbpf: Only create rx and tx XDP rings when necessary

2021-04-12 Thread Greg Kroah-Hartman
tarovoitov Link: https://lore.kernel.org/bpf/20210331061218.1647-4-ciara.lof...@intel.com Signed-off-by: Greg Kroah-Hartman --- tools/lib/bpf/xsk.c | 13 +++-- 1 file changed, 11 insertions(+), 2 deletions(-) --- a/tools/lib/bpf/xsk.c +++ b/tools/lib/bpf/xsk.c @@ -54,6 +54,8 @@ struc

[PATCH 5.11 056/210] libbpf: Restore umem state after socket create failure

2021-04-12 Thread Greg Kroah-Hartman
ueues and devices") Signed-off-by: Ciara Loftus Signed-off-by: Alexei Starovoitov Link: https://lore.kernel.org/bpf/20210331061218.1647-3-ciara.lof...@intel.com Signed-off-by: Greg Kroah-Hartman --- tools/lib/bpf/xsk.c | 41 +++-- 1 file changed, 23 inserti

[PATCH 5.11 054/210] ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx

2021-04-12 Thread Greg Kroah-Hartman
xes: bcf0cafab44fd ("nfp: split out common control message handling code") Signed-off-by: Lv Yunlong Reviewed-by: Jakub Kicinski Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/netronome/nfp/bpf/cmsg.c |1 + 1 file changed, 1 insertion(+)

[PATCH 5.11 055/210] libbpf: Ensure umem pointer is non-NULL before dereferencing

2021-04-12 Thread Greg Kroah-Hartman
ueues and devices") Signed-off-by: Ciara Loftus Signed-off-by: Alexei Starovoitov Acked-by: Magnus Karlsson Link: https://lore.kernel.org/bpf/20210331061218.1647-2-ciara.lof...@intel.com Signed-off-by: Greg Kroah-Hartman --- tools/lib/bpf/xsk.c |3 +++ 1 file changed, 3 insertions(+) --- a

[PATCH 5.11 087/210] percpu: make pcpu_nr_empty_pop_pages per chunk type

2021-04-12 Thread Greg Kroah-Hartman
count percpu memory to memory cgroups") Cc: sta...@vger.kernel.org # 5.9+ Signed-off-by: Roman Gushchin Tested-by: Filipe Manana Signed-off-by: Dennis Zhou Signed-off-by: Greg Kroah-Hartman --- mm/percpu-internal.h |2 +- mm/percpu-stats.c|9 +++-- mm/percpu.c

[PATCH 5.11 085/210] scsi: pm80xx: Fix chip initialization failure

2021-04-12 Thread Greg Kroah-Hartman
5.10+ Link: https://lore.kernel.org/r/20210402054212.17834-1-viswa...@microchip.com.com Reported-and-tested-by: Ash Izat Signed-off-by: Viswas G Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/pm8001/pm8001_hwi.c |8 1 file changed, 4 insertions(+), 4

[PATCH 5.11 086/210] scsi: target: iscsi: Fix zero tag inside a trace event

2021-04-12 Thread Greg Kroah-Hartman
-1-r.bolsha...@yadro.com Cc: sta...@vger.kernel.org # 5.10+ Reviewed-by: Mike Christie Signed-off-by: Roman Bolshakov Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/target/iscsi/iscsi_target.c |3 +-- 1 file changed, 1 insertion(+), 2 deletions

[PATCH 5.11 084/210] driver core: Fix locking bug in deferred_probe_timeout_work_func()

2021-04-12 Thread Greg Kroah-Hartman
f-by: Greg Kroah-Hartman --- drivers/base/dd.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/drivers/base/dd.c +++ b/drivers/base/dd.c @@ -292,14 +292,16 @@ int driver_deferred_probe_check_state(st static void deferred_probe_timeout_work_func(struct work_st

[PATCH 5.11 083/210] usbip: synchronize event handler with sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
.git.sk...@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/usbip_event.c |2 ++ 1 file changed, 2 insertions(+) --- a/drivers/usb/usbip/usbip_event.c +++ b/drivers/usb/usbip/usbip_event.c @@ -70,6 +70,7 @@ static void event_handler(struct work_st while ((ud

[PATCH 5.11 082/210] usbip: vudc synchronize sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/vudc_dev.c |1 + drivers/usb/usbip/vudc_sysfs.c |5 + 2 files changed, 6 insertions(+) --- a/drivers/usb/usbip/vudc_dev.c +++ b/drivers/usb/usbip/vudc_dev.c @@ -572,6 +572,7 @@ static int init_vudc_hw(struct vudc *udc

[PATCH 5.11 081/210] usbip: stub-dev synchronize sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/stub_dev.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) --- a/drivers/usb/usbip/stub_dev.c +++ b/drivers/usb/usbip/stub_dev.c @@ -63,6 +63,7 @@ static ssize_t usbip_sockfd_store(struct dev_info(dev

[PATCH 5.11 080/210] usbip: add sysfs_lock to synchronize sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
...@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/usbip_common.h |3 +++ drivers/usb/usbip/vhci_hcd.c |1 + drivers/usb/usbip/vhci_sysfs.c | 30 +- 3 files changed, 29 insertions(+), 5 deletions(-) --- a/drivers/usb/usbip

[PATCH 5.11 078/210] thunderbolt: Fix a leak in tb_retimer_add()

2021-04-12 Thread Greg Kroah-Hartman
in a memory leak. Fixes: dacb12877d92 ("thunderbolt: Add support for on-board retimers") Cc: sta...@vger.kernel.org Signed-off-by: Dan Carpenter Reviewed-by: Jason Gunthorpe Signed-off-by: Mika Westerberg Signed-off-by: Greg Kroah-Hartman --- drivers/thunderbolt/retimer.c |2 +- 1 fi

[PATCH 5.11 079/210] thunderbolt: Fix off by one in tb_port_find_retimer()

2021-04-12 Thread Greg Kroah-Hartman
;) Cc: sta...@vger.kernel.org Signed-off-by: Dan Carpenter Signed-off-by: Mika Westerberg Signed-off-by: Greg Kroah-Hartman --- drivers/thunderbolt/retimer.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/thunderbolt/retimer.c +++ b/drivers/thunderbolt/retimer.c @@ -40

[PATCH 5.11 053/210] bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- kernel/bpf/inode.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/kernel/bpf/inode.c +++ b/kernel/bpf/inode.c @@ -546,7 +546,7 @@ int bpf_obj_get_user(const char __user * else if (type == BPF_TYPE_MAP) ret = bpf_map

[PATCH 5.11 077/210] net: let skb_orphan_partial wake-up waiters.

2021-04-12 Thread Greg Kroah-Hartman
ewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/net/sock.h |9 + net/core/sock.c| 12 +++- 2 files changed, 12 insertions(+), 9 deletions(-) --- a/include/net/sock.h +++ b/include/net/sock.h @@ -2215,6 +2215,15 @@ stati

[PATCH 5.11 076/210] net-ipv6: bugfix - raw & sctp - switch to ipv6_can_nonlocal_bind()

2021-04-12 Thread Greg Kroah-Hartman
off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/raw.c |2 +- net/sctp/ipv6.c |7 +++ 2 files changed, 4 insertions(+), 5 deletions(-) --- a/net/ipv6/raw.c +++ b/net/ipv6/raw.c @@ -298,7 +298,7 @@ static int rawv6_bind(struct sock *sk, s */

[PATCH 5.11 073/210] mac80211: fix time-is-after bug in mlme

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/mac80211/mlme.c |5 - 1 file changed, 4 insertions(+), 1 deletion(-) --- a/net/mac80211/mlme.c +++ b/net/mac80211/mlme.c @@ -4707,7 +4707,10 @@ static void ieee80211_sta_conn_mon_timer timeout = sta->rx_

[PATCH 5.11 075/210] net: hsr: Reset MAC header for Tx path

2021-04-12 Thread Greg Kroah-Hartman
sure that the skb is prepared correctly. Fixes: d346a3fae3ff ("packet: introduce PACKET_QDISC_BYPASS socket option") Signed-off-by: Kurt Kanzenbach Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/hsr/hsr_device.c |1 + net/hsr/hsr

[PATCH 5.11 074/210] mac80211: fix TXQ AC confusion

2021-04-12 Thread Greg Kroah-Hartman
"mac80211: add an optional TXQ for other PS-buffered frames") Acked-by: Toke Høiland-Jørgensen Link: https://lore.kernel.org/r/20210323210500.bf4d50afea4a.I136ffde910486301f8818f5442e3c9bf8670a9c4@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/ma

[PATCH 5.11 052/210] bpf: Enforce that struct_ops programs be GPL-only

2021-04-12 Thread Greg Kroah-Hartman
-Jørgensen Signed-off-by: Daniel Borkmann Acked-by: Martin KaFai Lau Link: https://lore.kernel.org/bpf/20210326100314.121853-1-t...@redhat.com Signed-off-by: Greg Kroah-Hartman --- kernel/bpf/verifier.c |5 + 1 file changed, 5 insertions(+) --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/

[PATCH 5.11 072/210] cfg80211: check S1G beacon compat element length

2021-04-12 Thread Greg Kroah-Hartman
0408142826.f6f4525012de.I9fdeff0afdc683a6024e5ea49d2daa3cd2459d11@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/scan.c | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) --- a/net/wireless/scan.c +++ b/net/wireless/scan.c @@ -2352,1

[PATCH 5.11 071/210] nl80211: fix potential leak of ACL params

2021-04-12 Thread Greg Kroah-Hartman
probe response support") Link: https://lore.kernel.org/r/20210408142833.d8bc2e2e454a.If290b1ba85789726a671ff0b237726d4851b5b0f@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/nl80211.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)

[PATCH 5.11 069/210] net: sched: fix action overwrite reference counting

2021-04-12 Thread Greg Kroah-Hartman
inters to created actions from actions array before passing it to tcf_action_put_many(). Fixes: cae422f379f3 ("net: sched: use reference counting action init") Reported-by: Kumar Kartikeya Dwivedi Signed-off-by: Vlad Buslov Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman

[PATCH 5.11 070/210] nl80211: fix beacon head validation

2021-04-12 Thread Greg Kroah-Hartman
annes Berg Link: https://lore.kernel.org/r/20210408154518.d9b06d39b4ee.Iff908997b2a4067e8d456b3cb96cab9771d252b8@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/nl80211.c |6 +- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/net/wireless

[PATCH 5.11 067/210] vdpa/mlx5: Fix suspend/resume index restoration

2021-04-12 Thread Greg Kroah-Hartman
-by: Eli Cohen Link: https://lore.kernel.org/r/20210408091047.4269-6-e...@nvidia.com Signed-off-by: Michael S. Tsirkin Acked-by: Jason Wang Signed-off-by: Greg Kroah-Hartman --- drivers/vdpa/mlx5/net/mlx5_vnet.c | 21 - 1 file changed, 8 insertions(+), 13 deletions(-) --- a/d

[PATCH 5.11 068/210] net: sched: sch_teql: fix null-pointer dereference

2021-04-12 Thread Greg Kroah-Hartman
create() imediately calls teql_destroy() which does not expect zero master pointer and we get OOPS. Fixes: 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation") Signed-off-by: Pavel Tikhomirov Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartma

[PATCH 5.11 066/210] i40e: Fix sparse errors in i40e_txrx.c

2021-04-12 Thread Greg Kroah-Hartman
pport for pass and drop actions") Fixes: 2e6893123830 ("i40e: split XDP_TX tail and XDP_REDIRECT map flushing") Signed-off-by: Aleksandr Loktionov Signed-off-by: Arkadiusz Kubalewski Tested-by: Dave Switzer Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net

<    3   4   5   6   7   8   9   10   11   12   >