Linux 5.8.13

2020-10-01 Thread Greg Kroah-Hartman
  |   16 +
 fs/io_uring.c |8 
 include/linux/kprobes.h   |5 
 include/linux/mm.h|2 
 include/linux/mmzone.h|   11 -
 include/linux/node.h  |   11 -
 include/linux/pgtable.h   |   10 +
 include/linux/qed/qed_if.h|1 
 init/main.c   |2 
 kernel/bpf/inode.c|4 
 kernel/kprobes.c  |   27 +++
 kernel/trace/trace_events_hist.c  |1 
 kernel/trace/trace_preemptirq.c   |4 
 lib/bootconfig.c  |   38 ++--
 lib/string.c  |   24 ++
 mm/gup.c  |   18 +-
 mm/madvise.c  |2 
 mm/memory_hotplug.c   |5 
 mm/page_alloc.c   |   10 -
 mm/swapfile.c |2 
 net/batman-adv/bridge_loop_avoidance.c|  145 ++
 net/batman-adv/bridge_loop_avoidance.h|4 
 net/batman-adv/multicast.c|   46 -
 net/batman-adv/multicast.h|   15 +
 net/batman-adv/routing.c  |4 
 net/batman-adv/soft-interface.c   |   11 -
 net/core/filter.c |4 
 net/mac80211/mlme.c   |3 
 net/mac80211/util.c   |7 
 net/mac802154/tx.c|8 
 net/netfilter/nf_conntrack_netlink.c  |   22 --
 net/netfilter/nf_conntrack_proto.c|2 
 net/netfilter/nft_meta.c  |4 
 net/sunrpc/svcsock.c  |2 
 net/wireless/Kconfig  |1 
 net/wireless/util.c   |2 
 net/xdp/xdp_umem.c|   17 --
 security/device_cgroup.c  |3 
 sound/pci/asihpi/hpioctl.c|4 
 sound/pci/hda/patch_realtek.c |   13 +
 sound/soc/codecs/pcm3168a.c   |7 
 sound/soc/codecs/wm8994.c |   10 +
 sound/soc/codecs/wm_hubs.c|3 
 sound/soc/codecs/wm_hubs.h|1 
 sound/soc/intel/boards/bytcr_rt5640.c |   10 +
 sound/usb/quirks.c|7 
 tools/lib/bpf/Makefile|2 
 tools/lib/bpf/libbpf.c|2 
 tools/objtool/check.c |2 
 120 files changed, 865 insertions(+), 409 deletions(-)

Amol Grover (1):
  device_cgroup: Fix RCU list debugging warning

Anand Jain (1):
  btrfs: fix put of uninitialized kobject after seed device delete

Bhawanpreet Lakha (2):
  drm/amd/display: Don't use DRM_ERROR() for DTM add topology
  drm/amd/display: Don't log hdcp module warnings in dmesg

Björn Töpel (1):
  xsk: Fix number of pinned pages/umem size discrepancy

Borislav Petkov (1):
  EDAC/ghes: Check whether the driver is on the safe list correctly

Charan Teja Reddy (1):
  dmabuf: fix NULL pointer dereference in dma_buf_release()

Christian Borntraeger (1):
  s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl

Chuck Lever (1):
  SUNRPC: Fix svc_flush_dcache()

Damien Le Moal (1):
  riscv: Fix Kendryte K210 device tree

Dan Carpenter (1):
  PM / devfreq: tegra30: Disable clock on error in probe

Daniel Borkmann (1):
  bpf: Fix clobbering of r2 in bpf_gen_ld_abs

Dennis Li (1):
  drm/amdkfd: fix a memory leak issue

Dexuan Cui (1):
  hv_netvsc: Switch the data path at the right time during hibernation

Dmitry Baryshkov (2):
  regmap: fix page selection for noinc reads
  regmap: fix page selection for noinc writes

Dmitry Bogdanov (3):
  net: qed: Disable aRFS for NPAR and 100G
  net: qede: Disable aRFS for NPAR and 100G
  net: qed: RDMA personality shouldn't fail VF load

Eddie James (1):
  i2c: aspeed: Mask IRQ status to relevant bits

Eelco Chaudron (1):
  netfilter: conntrack: nf_conncount_init is failing with IPv6 disabled

Eric Dumazet (1):
  mac802154: tx: fix use-after-free

Felix Fietkau (1):
  mt76: mt7615: use v1 MCU API on MT7615 to fix issues with adding/removing 
stations

Gao Xiang (1):
  mm, THP, swap: fix allocating cluster for swapfile by mistake

Greg Kroah-Hartman (1):
  Linux 5.8.13

Hans Verkuil (1

Re: Linux 5.8.13

2020-10-01 Thread Greg Kroah-Hartman
diff --git a/Makefile b/Makefile
index d0d40c628dc3..0d81d8cba48b 100644
--- a/Makefile
+++ b/Makefile
@@ -1,7 +1,7 @@
 # SPDX-License-Identifier: GPL-2.0
 VERSION = 5
 PATCHLEVEL = 8
-SUBLEVEL = 12
+SUBLEVEL = 13
 EXTRAVERSION =
 NAME = Kleptomaniac Octopus
 
diff --git a/arch/arm64/include/asm/kvm_emulate.h 
b/arch/arm64/include/asm/kvm_emulate.h
index 4d0f8ea600ba..e1254e55835b 100644
--- a/arch/arm64/include/asm/kvm_emulate.h
+++ b/arch/arm64/include/asm/kvm_emulate.h
@@ -319,7 +319,7 @@ static __always_inline int kvm_vcpu_dabt_get_rd(const 
struct kvm_vcpu *vcpu)
return (kvm_vcpu_get_hsr(vcpu) & ESR_ELx_SRT_MASK) >> ESR_ELx_SRT_SHIFT;
 }
 
-static __always_inline bool kvm_vcpu_dabt_iss1tw(const struct kvm_vcpu *vcpu)
+static __always_inline bool kvm_vcpu_abt_iss1tw(const struct kvm_vcpu *vcpu)
 {
return !!(kvm_vcpu_get_hsr(vcpu) & ESR_ELx_S1PTW);
 }
@@ -327,7 +327,7 @@ static __always_inline bool kvm_vcpu_dabt_iss1tw(const 
struct kvm_vcpu *vcpu)
 static __always_inline bool kvm_vcpu_dabt_iswrite(const struct kvm_vcpu *vcpu)
 {
return !!(kvm_vcpu_get_hsr(vcpu) & ESR_ELx_WNR) ||
-   kvm_vcpu_dabt_iss1tw(vcpu); /* AF/DBM update */
+   kvm_vcpu_abt_iss1tw(vcpu); /* AF/DBM update */
 }
 
 static inline bool kvm_vcpu_dabt_is_cm(const struct kvm_vcpu *vcpu)
@@ -356,6 +356,11 @@ static inline bool kvm_vcpu_trap_is_iabt(const struct 
kvm_vcpu *vcpu)
return kvm_vcpu_trap_get_class(vcpu) == ESR_ELx_EC_IABT_LOW;
 }
 
+static inline bool kvm_vcpu_trap_is_exec_fault(const struct kvm_vcpu *vcpu)
+{
+   return kvm_vcpu_trap_is_iabt(vcpu) && !kvm_vcpu_abt_iss1tw(vcpu);
+}
+
 static __always_inline u8 kvm_vcpu_trap_get_fault(const struct kvm_vcpu *vcpu)
 {
return kvm_vcpu_get_hsr(vcpu) & ESR_ELx_FSC;
@@ -393,6 +398,9 @@ static __always_inline int kvm_vcpu_sys_get_rt(struct 
kvm_vcpu *vcpu)
 
 static inline bool kvm_is_write_fault(struct kvm_vcpu *vcpu)
 {
+   if (kvm_vcpu_abt_iss1tw(vcpu))
+   return true;
+
if (kvm_vcpu_trap_is_iabt(vcpu))
return false;
 
diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c
index ba225e09aaf1..8564742948d3 100644
--- a/arch/arm64/kvm/hyp/switch.c
+++ b/arch/arm64/kvm/hyp/switch.c
@@ -599,7 +599,7 @@ static bool __hyp_text fixup_guest_exit(struct kvm_vcpu 
*vcpu, u64 *exit_code)
kvm_vcpu_trap_get_fault_type(vcpu) == FSC_FAULT &&
kvm_vcpu_dabt_isvalid(vcpu) &&
!kvm_vcpu_dabt_isextabt(vcpu) &&
-   !kvm_vcpu_dabt_iss1tw(vcpu);
+   !kvm_vcpu_abt_iss1tw(vcpu);
 
if (valid) {
int ret = __vgic_v2_perform_cpuif_access(vcpu);
diff --git a/arch/arm64/kvm/mmio.c b/arch/arm64/kvm/mmio.c
index 4e0366759726..07e9b6eab59e 100644
--- a/arch/arm64/kvm/mmio.c
+++ b/arch/arm64/kvm/mmio.c
@@ -146,7 +146,7 @@ int io_mem_abort(struct kvm_vcpu *vcpu, struct kvm_run *run,
}
 
/* Page table accesses IO mem: tell guest to fix its TTBR */
-   if (kvm_vcpu_dabt_iss1tw(vcpu)) {
+   if (kvm_vcpu_abt_iss1tw(vcpu)) {
kvm_inject_dabt(vcpu, kvm_vcpu_get_hfar(vcpu));
return 1;
}
diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c
index d906350d543d..1677107b74de 100644
--- a/arch/arm64/kvm/mmu.c
+++ b/arch/arm64/kvm/mmu.c
@@ -1845,7 +1845,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, 
phys_addr_t fault_ipa,
unsigned long vma_pagesize, flags = 0;
 
write_fault = kvm_is_write_fault(vcpu);
-   exec_fault = kvm_vcpu_trap_is_iabt(vcpu);
+   exec_fault = kvm_vcpu_trap_is_exec_fault(vcpu);
VM_BUG_ON(write_fault && exec_fault);
 
if (fault_status == FSC_PERM && !write_fault && !exec_fault) {
diff --git a/arch/ia64/mm/init.c b/arch/ia64/mm/init.c
index 0b3fb4c7af29..8e7b8c6c576e 100644
--- a/arch/ia64/mm/init.c
+++ b/arch/ia64/mm/init.c
@@ -538,7 +538,7 @@ virtual_memmap_init(u64 start, u64 end, void *arg)
if (map_start < map_end)
memmap_init_zone((unsigned long)(map_end - map_start),
 args->nid, args->zone, page_to_pfn(map_start),
-MEMMAP_EARLY, NULL);
+MEMINIT_EARLY, NULL);
return 0;
 }
 
@@ -547,8 +547,8 @@ memmap_init (unsigned long size, int nid, unsigned long 
zone,
 unsigned long start_pfn)
 {
if (!vmem_map) {
-   memmap_init_zone(size, nid, zone, start_pfn, MEMMAP_EARLY,
-   NULL);
+   memmap_init_zone(size, nid, zone, start_pfn,
+MEMINIT_EARLY, NULL);
} else {
struct page *start;
struct memmap_init_callback_data args;
diff --git a/arch/mips/include/asm/cpu-type.h b/arch/mips/include/asm/cpu-type.h
index 75a7a382da09..3288cef4b168 100644
---