[PATCH 4.15 43/60] x86/spectre: Report get_user mitigation for spectre_v1

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams dan.j.willi...@intel.com commit edfbae53dab8348fca778531be9f4855d2ca0360 Reflect the presence of get_user(), __get_user(), and 'syscall' protections in sysfs. The expectation is th

[PATCH 4.15 17/60] x86/speculation: Simplify indirect_branch_prediction_barrier()

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Borislav Petkov b...@suse.de commit 64e16720ea0879f8ab4547e3b9758936d483909b Make it all a function which does the WRMSR instead of having a hairy inline asm. [dwmw2: export it, fix CONFIG_RET

[PATCH 4.15 44/60] x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Colin Ian King colin.k...@canonical.com commit e698dcdfcda41efd0984de539767b4cddd235f1e Trivial fix to spelling mistake in pr_err error message text. Signed-off-by: Colin Ian King Signed-off-

[RFC 04/12] KVM/VMX: Use the new host mapping API for pi_desc_page

2018-02-05 Thread KarimAllah Ahmed
For nested guests the pi_desc_page was mapped to the host kernel using kvm_vcpu_gpa_to_page which assumes that all guest memory is backed by a "struct page". This breaks guests that have their memory outside the kernel control. Switch to the new host mapping API which takes care of this use-case a

[PATCH 4.15 45/60] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Woodhouse d...@amazon.co.uk commit 7fcae1118f5fd44a862aa5c3525248e35ee67c3b Despite the fact that all the other code there seems to be doing it, just using set_cpu_cap() in early_intel_in

[RFC 01/12] KVM: Introduce helper functions to map/unmap guest memory

2018-02-05 Thread KarimAllah Ahmed
Introduce helper functions to map and unmap guest memory into host kernel memory. These helper functions support mapping guest memory both that are managed by the host kernel (i.e. have a "struct page") and the ones that are not managed by the kernel (i.e. does not have a "struct page"). Cc: Paolo

[RFC 06/12] KVM/VMX: Use the new host mapping API for handle_vmptrld

2018-02-05 Thread KarimAllah Ahmed
Cc: Paolo Bonzini Cc: Radim Krčmář Cc: k...@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/vmx.c | 16 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 9e45bd1..9544df0

[RFC 08/12] KVM/VMX: Use the new host mapping API for mapping nested PML

2018-02-05 Thread KarimAllah Ahmed
For nested guests the PML page was mapped to the host kernel using kvm_vcpu_gpa_to_page which assumes that all guest memory is backed by a "struct page". This breaks guests that have their memory outside the kernel control. Switch to the new host mapping API which takes care of this use-case as we

[RFC 12/12] KVM/VMX: Remove kvm_vcpu_gpa_to_page as it is now unused

2018-02-05 Thread KarimAllah Ahmed
Cc: Paolo Bonzini Cc: Radim Krčmář Cc: k...@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: KarimAllah Ahmed --- include/linux/kvm_host.h | 6 -- 1 file changed, 6 deletions(-) diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 45d2854..44db14a 100644 --

[RFC 05/12] KVM/VMX: Use the new host mapping API for mapping nested vmptr

2018-02-05 Thread KarimAllah Ahmed
For nested guests the vmptr was mapped to the host kernel using kvm_vcpu_gpa_to_page which assumes that all guest memory is backed by a "struct page". This breaks guests that have their memory outside the kernel control. Switch to the new host mapping API which takes care of this use-case as well.

[RFC 02/12] KVM/VMX: Use the new host mapping API for apic_access_page

2018-02-05 Thread KarimAllah Ahmed
For nested guests the apic_access_page was mapped to the host kernel using kvm_vcpu_gpa_to_page which assumes that all guest memory is backed by a "struct page". This breaks guests that have their memory outside the kernel control. Switch to the new host mapping API which takes care of this use-ca

[RFC 00/12] KVM/X86: Introduce a new guest mapping API

2018-02-05 Thread KarimAllah Ahmed
Guest memory can either be directly managed by the kernel (i.e. have a "struct page") or they can simply live outside kernel control (i.e. do not have a "struct page"). KVM mostly support these two modes, except in a few places where the code seems to assume that guest memory must have a "struct pa

[RFC 10/12] KVM/VMX: Use the new host mapping API for synic_clear_sint_msg_pending

2018-02-05 Thread KarimAllah Ahmed
Cc: Paolo Bonzini Cc: Radim Krčmář Cc: k...@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/hyperv.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c index dc97f25..40

[RFC 03/12] KVM/VMX: Use the new host mapping API for virtual_apic_page

2018-02-05 Thread KarimAllah Ahmed
For nested guests the virtual_apic_page was mapped to the host kernel using kvm_vcpu_gpa_to_page which assumes that all guest memory is backed by a "struct page". This breaks guests that have their memory outside the kernel control. Switch to the new host mapping API which takes care of this use-c

[RFC 09/12] KVM/VMX: Use the new host mapping API for cmpxchg_emulated

2018-02-05 Thread KarimAllah Ahmed
Cc: Paolo Bonzini Cc: Radim Krčmář Cc: k...@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/x86.c | 12 +--- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index ac38143..db0fd24 100

[RFC 11/12] KVM/VMX: Use the new host mapping API for synic_deliver_msg

2018-02-05 Thread KarimAllah Ahmed
Cc: Paolo Bonzini Cc: Radim Krčmář Cc: k...@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/hyperv.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c index 408428a..be

[RFC 07/12] KVM/VMX: Use the new host mapping API for mapping L12 MSR bitmap

2018-02-05 Thread KarimAllah Ahmed
For nested guests the L12 MSR bitmap was mapped to the host kernel using kvm_vcpu_gpa_to_page which assumes that all guest memory is backed by a "struct page". This breaks guests that have their memory outside the kernel control. Switch to the new host mapping API which takes care of this use-case

[PATCH 4.15 21/60] ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Chan commit 0cab20cec0b663b7be8e2be5998d5a4113647f86 upstream. This change resolves a new compile-time warning when built as a loadable module: WARNING: modpost: missing MODULE_LICENSE(

[PATCH 4.15 48/60] KVM: VMX: make MSR bitmaps per-VCPU

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Bonzini pbonz...@redhat.com commit 904e14fb7cb96401a7dc803ca2863fd5ba32ffe6 Place the MSR bitmap in struct loaded_vmcs, and update it in place every time the x2apic or APICv state can cha

Re: [PATCH 1/3] x86/entry: Clear extra registers beyond syscall arguments for 64bit kernels

2018-02-05 Thread Brian Gerst
On Mon, Feb 5, 2018 at 1:29 PM, Ingo Molnar wrote: > > * Andy Lutomirski wrote: > >> [...] Clearing R10 is mostly useless in the syscall path because we'll just >> unconditionally reload it in do_syscall_64(). > > AFAICS do_syscall_64() doesn't touch R10 at all. So how does it reload R10? > > In

[PATCH 4.15 51/60] x86/spectre: Simplify spectre_v2 command line parsing

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: KarimAllah Ahmed karah...@amazon.de commit 9005c6834c0ffdfe46afa76656bd9276cca864f6 [dwmw2: Use ARRAY_SIZE] Signed-off-by: KarimAllah Ahmed Signed-off-by: David Woodhouse Signed-off-by: Thom

[PATCH 4.15 52/60] x86/pti: Mark constant arrays as __initconst

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Arnd Bergmann a...@arndb.de commit 4bf5d56d429cbc96c23d809a08f63cd29e1a702e I'm seeing build failures from the two newly introduced arrays that are marked 'const' and '__initdata', which are mu

[PATCH 4.15 53/60] x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Darren Kenny darren.ke...@oracle.com commit af189c95a371b59f493dbe0f50c0a09724868881 Fixes: 117cc7a908c83 ("x86/retpoline: Fill return stack buffer on vmexit") Signed-off-by: Darren Kenny Sign

Re: clang warning: implicit conversion in intel_ddi.c:1481

2018-02-05 Thread Ruben Safir
> > We are interested who is we?

[PATCH 4.15 57/60] KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: KarimAllah Ahmed karah...@amazon.de commit d28b387fb74da95d69d2615732f50cceb38e9a4d [ Based on a patch from Ashok Raj ] Add direct access to MSR_IA32_SPEC_CTRL for guests. This is needed for

[PATCH 4.15 58/60] KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: KarimAllah Ahmed karah...@amazon.de commit b2ac58f90540e39324e7a29a7ad471407ae0bf48 [ Based on a patch from Paolo Bonzini ] ... basically doing exactly what we do for VMX: - Passthrough SPEC

[PATCH 4.15 59/60] serial: core: mark port as initialized after successful IRQ change

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Sebastian Andrzej Siewior commit 44117a1d1732c513875d5a163f10d9adbe866c08 upstream. setserial changes the IRQ via uart_set_info(). It invokes uart_shutdown() which free the current used IRQ an

[PATCH 4.15 50/60] x86/retpoline: Avoid retpolines for built-in __init functions

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Woodhouse d...@amazon.co.uk commit 66f793099a636862a71c59d4a6ba91387b155e0c There's no point in building init code with retpolines, since it runs before any potentially hostile userspace

[PATCH 3.18 01/36] Input: do not emit unneeded EV_SYN when suspending

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Dmitry Torokhov commit 00159f19a5057cb779146afce1cceede692af346 upstream. Do not emit EV_SYN/SYN_REPORT on suspend if there were no keys that are still pressed as we are suspending the device

Re: [PATCH v5 3/3] KVM: nVMX: Fix mmu context after VMLAUNCH/VMRESUME failure

2018-02-05 Thread Jim Mattson
I realize now that this fix isn't quite right, since it loads vmcs12->host_cr3 rather than reverting to the CR3 that was loaded at the time of VMLAUNCH/VMRESUME. In the case of VMfailValid(VM entry with invalid VMX-control field(s)), none of the VMCS12 host state fields should be loaded. See the ps

[PATCH 3.18 13/36] mac80211: fix the update of path metric for RANN frame

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Chun-Yeow Yeoh [ Upstream commit fbbdad5edf0bb59786a51b94a9d006bc8c2da9a2 ] The previous path metric update from RANN frame has not considered the own link metric toward the transmitting mesh

Re: [PATCH] libnvdimm: remove redundant assignment to pointer 'dev'

2018-02-05 Thread Dan Williams
On Mon, Feb 5, 2018 at 10:20 AM, Ross Zwisler wrote: > On Mon, Feb 05, 2018 at 02:08:52PM +, Colin King wrote: >> From: Colin Ian King >> >> Pointer dev is being assigned a value that is never read, it is being >> re-assigned the same value later on, hence the initialization is redundant >> a

[PATCH 3.18 17/36] nfsd: check for use of the closed special stateid

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Andrew Elble [ Upstream commit ae254dac721d44c0bfebe2795df87459e2e88219 ] Prevent the use of the closed (invalid) special stateid by clients. Signed-off-by: Andrew Elble Signed-off-by: J. B

[PATCH 3.18 15/36] xen-netfront: remove warning when unloading module

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Eduardo Otubo [ Upstream commit 5b5971df3bc2775107ddad164018a8a8db633b81 ] v2: * Replace busy wait with wait_event()/wake_up_all() * Cannot garantee that at the time xennet_remove is called

[PATCH 3.18 16/36] nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0)

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Trond Myklebust [ Upstream commit fb500a7cfee7f2f447d2bbf30cb59629feab6ac1 ] Signed-off-by: Trond Myklebust Signed-off-by: J. Bruce Fields Signed-off-by: Sasha Levin Signed-off-by: Greg Kr

[PATCH 3.18 18/36] hwmon: (pmbus) Use 64bit math for DIRECT format values

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Robert Lippert [ Upstream commit bd467e4eababe4c04272c1e646f066db02734c79 ] Power values in the 100s of watt range can easily blow past 32bit math limits when processing everything in microwa

Re: [GIT PULL REQUEST] watchdog - v4.16 merge window

2018-02-05 Thread Guenter Roeck
On Mon, Feb 05, 2018 at 09:50:54AM -0800, Linus Torvalds wrote: > On Mon, Feb 5, 2018 at 2:20 AM, Wim Van Sebroeck wrote: > > > > git://www.linux-watchdog.org/linux-watchdog.git > > Hmm. I really want to know why I should pull this. You have the > shortlog and the diffstat, but you don't actual

[PATCH 3.18 19/36] net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Geert Uytterhoeven [ Upstream commit 15bfe05c8d6386f1a90e9340d15336e85e32aad6 ] On 64-bit (e.g. powerpc64/allmodconfig): drivers/net/ethernet/xilinx/ll_temac_main.c: In function 'temac_

[PATCH 3.18 02/36] um: link vmlinux with -no-pie

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Meyer commit 883354afbc109c57f925ccc19840055193da0cc0 upstream. Debian's gcc defaults to pie. The global Makefile already defines the -fno-pie option. Link UML dynamic kernel image als

[PATCH 3.18 21/36] scsi: ufs: ufshcd: fix potential NULL pointer dereference in ufshcd_config_vreg

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: "Gustavo A. R. Silva" [ Upstream commit 727535903bea924c4f73abb202c4b3e85fff0ca4 ] _vreg_ is being dereferenced before it is null checked, hence there is a potential null pointer dereference.

[PATCH 3.18 22/36] media: usbtv: add a new usbid

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Icenowy Zheng [ Upstream commit 04226916d2360f56d57ad00bc48d2d1854d1e0b0 ] A new usbid of UTV007 is found in a newly bought device. The usbid is 1f71:3301. The ID on the chip is: UTV007 A89

[PATCH 3.18 20/36] quota: Check for register_shrinker() failure.

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Tetsuo Handa [ Upstream commit 88bc0ede8d35edc969350852894dc864a2dc1859 ] register_shrinker() might return -ENOMEM error since Linux 3.12. Call panic() as with other failure checks in this fu

[PATCH 3.18 23/36] usb: gadget: dont dereference g until after it has been null checked

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Colin Ian King [ Upstream commit b2fc059fa549fe6881d4c1f8d698b0f50bcd16ec ] Avoid dereferencing pointer g until after g has been sanity null checked; move the assignment of cdev much later wh

[PATCH 3.18 24/36] staging: rtl8188eu: Fix incorrect response to SIOCGIWESSID

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Larry Finger [ Upstream commit b77992d2df9e47144354d1b25328b180afa33442 ] When not associated with an AP, wifi device drivers should respond to the SIOCGIWESSID ioctl with a zero-length strin

RE: [PATCH] arc: dts: use 'atmel' as manufacturer for at24 in axs10x_mb

2018-02-05 Thread Alexey Brodkin
Hi Bartosz, all, > -Original Message- > From: Bartosz Golaszewski [mailto:b...@bgdev.pl] > Sent: Thursday, January 25, 2018 12:40 AM > To: Rob Herring ; Mark Rutland ; > Russell King ; Alexey > Brodkin ; Vineet Gupta > > Cc: devicet...@vger.kernel.org; linux-kernel@vger.kernel.org; > l

[PATCH 3.18 27/36] CDC-ACM: apply quirk for card reader

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Oliver Neukum commit df1cc78a52491f71d8170d513d0f6f114faa1bda upstream. This devices drops random bytes from messages if you talk to it too fast. Signed-off-by: Oliver Neukum Signed-off-by:

[PATCH 3.18 28/36] USB: serial: io_edgeport: fix possible sleep-in-atomic

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Jia-Ju Bai commit c7b8f77872c73f69a16528a9eb87afefcccdc18b upstream. According to drivers/usb/serial/io_edgeport.c, the driver may sleep under a spinlock. The function call path is: edge_bulk_

[PATCH 3.18 26/36] USB: cdc-acm: Do not log urb submission errors on disconnect

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Hans de Goede commit f0386c083c2ce85284dc0b419d7b89c8e567c09f upstream. When disconnected sometimes the cdc-acm driver logs errors like these: [20278.039417] cdc_acm 2-2:2.1: urb 9 failed sub

[PATCH 3.18 03/36] um: Stop abusing __KERNEL__

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Richard Weinberger commit 298e20ba8c197e8d429a6c8671550c41c7919033 upstream. Currently UML is abusing __KERNEL__ to distinguish between kernel and host code (os-Linux). It is better to use a c

[PATCH 3.18 29/36] usbip: prevent bind loops on devices attached to vhci_hcd

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Shuah Khan commit ef54cf0c600fb8f5737fb001a9e357edda1a1de8 upstream. usbip host binds to devices attached to vhci_hcd on the same server when user does attach over localhost or specifies the s

[PATCH 3.18 30/36] usbip: list: dont list devices attached to vhci_hcd

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Shuah Khan commit ef824501f50846589f02173d73ce3fe6021a9d2a upstream. usbip host lists devices attached to vhci_hcd on the same server when user does attach over localhost or specifies the serv

[PATCH 3.18 04/36] um: Remove copy&paste code from init.h

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Richard Weinberger commit 30b11ee9ae23d78de66b9ae315880af17a64ba83 upstream. As we got rid of the __KERNEL__ abuse, we can directly include linux/compiler.h now. This also allows gcc 5 to buil

[PATCH 3.18 06/36] ALSA: seq: Make ioctls race-free

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Takashi Iwai commit b3defb791b26ea0683a93a4f49c77ec45ec96f10 upstream. The ALSA sequencer ioctls have no protection against racy calls while the concurrent operations may lead to interfere wit

[PATCH 3.18 07/36] gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Chan commit 97b03136e1b637d7a9d2274c099e44ecf23f1103 upstream. This change resolves a new compile-time warning when built as a loadable module: WARNING: modpost: missing MODULE_LICENSE(

[PATCH 3.18 08/36] igb: Free IRQs when device is hotplugged

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Lyude Paul commit 888f22931478a05bc81ceb7295c626e1292bf0ed upstream. Recently I got a Caldigit TS3 Thunderbolt 3 dock, and noticed that upon hotplugging my kernel would immediately crash due t

Re: [PATCH v3 14/21] fpga: dfl: add fpga manager platform driver for FME

2018-02-05 Thread Luebbers, Enno
Hi Hao, On Sun, Feb 04, 2018 at 05:37:06PM +0800, Wu Hao wrote: > On Fri, Feb 02, 2018 at 04:26:26PM -0800, Luebbers, Enno wrote: > > Hi Hao, Alan, > > > > On Fri, Feb 02, 2018 at 05:42:13PM +0800, Wu Hao wrote: > > > On Thu, Feb 01, 2018 at 04:00:36PM -0600, Alan Tull wrote: > > > > On Mon, Nov

[PATCH 3.18 35/36] spi: imx: do not access registers while clocks disabled

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Stefan Agner commit d593574aff0ab846136190b1729c151c736727ec upstream. Since clocks are disabled except during message transfer clocks are also disabled when spi_imx_remove gets called. Access

Re: [RFC][PATCH] : fix end_name_hash() for 64bit long

2018-02-05 Thread Linus Torvalds
On Mon, Feb 5, 2018 at 10:35 AM, Amir Goldstein wrote: > > But my patch doesn't add any __hash_32() call. It was already there. Oh, duh. My bad. It was indeed there already. Let me go back and look at the history of this thing, it's changed several times, and it looks like George Spelvin (not hi

[PATCH 3.18 00/36] 3.18.94-stable review

2018-02-05 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 3.18.94 release. There are 36 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed Feb 7 18:23:41 UTC 2018. Anything receiv

[PATCH 3.18 36/36] ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Chan commit 0cab20cec0b663b7be8e2be5998d5a4113647f86 upstream. This change resolves a new compile-time warning when built as a loadable module: WARNING: modpost: missing MODULE_LICENSE(

[PATCH 3.18 32/36] usb: f_fs: Prevent gadget unbind if it is already unbound

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Hemant Kumar commit ce5bf9a50daf2d9078b505aca1cea22e88ecb94a upstream. Upon usb composition switch there is possibility of ep0 file release happening after gadget driver bind. In case of compo

[PATCH 3.18 33/36] usb: uas: unconditionally bring back host after reset

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Oliver Neukum commit cbeef22fd611c4f47c494b821b2b105b8af970bb upstream. Quoting Hans: If we return 1 from our post_reset handler, then our disconnect handler will be called immediately afterw

[PATCH 3.18 34/36] selinux: general protection fault in sock_has_perm

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Mark Salyzyn In the absence of commit a4298e4522d6 ("net: add SOCK_RCU_FREE socket flag") and all the associated infrastructure changes to take advantage of a RCU grace period before freeing, t

[PATCH 3.18 31/36] USB: serial: simple: add Motorola Tetra driver

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Johan Hovold commit 46fe895e22ab3845515ec06b01eaf1282b342e29 upstream. Add new Motorola Tetra (simple) driver for Motorola Solutions TETRA PEI devices. D: Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot

Re: hid-sensor-accel-3d: Delete an error message for a failed memory allocation in hid_accel_3d_probe()

2018-02-05 Thread SF Markus Elfring
> If making changes like this I would suggest only sending one until > you have have a response from the relevant maintainer. The corresponding feedback can become more positive for such a transformation pattern after a while, can't it? > It would save you time as often these sorts of changes ar

Re: [RFC][PATCH] : fix end_name_hash() for 64bit long

2018-02-05 Thread Amir Goldstein
On Mon, Feb 5, 2018 at 7:57 PM, Linus Torvalds wrote: > On Mon, Feb 5, 2018 at 9:51 AM, Amir Goldstein wrote: >> >> and hash_32_generic() is just __hash_32() with zero shift. > > Right. But that __hash_32() is very expensive and doesn't help. > > So the patch as-is doesn't seem to buy anything, a

[PATCH 4.15 24/60] objtool: Improve retpoline alternative handling

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Josh Poimboeuf jpoim...@redhat.com commit a845c7cf4b4cb5e9e3b2823867892b27646f3a98 Currently objtool requires all retpolines to be: a) patched in with alternatives; and b) annotated with

Re: [PATCH for 4.16 00/11] membarrier updates for 4.16

2018-02-05 Thread Ingo Molnar
* Linus Torvalds wrote: > On Mon, Feb 5, 2018 at 8:33 AM, Ingo Molnar wrote: > > > > Yeah, I wanted to apply these bits later today with some minor edits - > > unless you > > are going to pull it directly. > > I have not pulled yet, I wanted to check. But I do want to get it merged. > > It g

Re: [PATCH] pvcalls-back: do not return error on inet_accept EAGAIN

2018-02-05 Thread Boris Ostrovsky
On 02/05/2018 01:01 PM, Stefano Stabellini wrote: > On Sun, 4 Feb 2018, Boris Ostrovsky wrote: >> On 02/02/2018 08:34 PM, Stefano Stabellini wrote: >>> When the client sends a regular blocking accept request, the backend is >>> expected to return only when the accept is completed, simulating a >>>

Re: B43 driver no longer works in Linux 4.15 (bisected)

2018-02-05 Thread James Hogan
Hi Adric, On Mon, Feb 05, 2018 at 01:23:31PM -0500, Adric Blake wrote: > In the time between Linux 4.15-rc8 and -rc9, my wireless driver, b43, > would no longer load automatically. When I modprobe the b43 (and ssb) > modules, the device still didn't appear in NetworkManager. Comparing > the kernel

[PATCH 3.18 12/36] bcache: check return value of register_shrinker

2018-02-05 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Michael Lyle [ Upstream commit 6c4ca1e36cdc1a0a7a84797804b87920ccbebf51 ] register_shrinker is now __must_check, so check it to kill a warning. Caller of bch_btree_cache_alloc in super.c appr

Re: [PATCH 1/3] x86/entry: Clear extra registers beyond syscall arguments for 64bit kernels

2018-02-05 Thread Ingo Molnar
* Andy Lutomirski wrote: > [...] Clearing R10 is mostly useless in the syscall path because we'll just > unconditionally reload it in do_syscall_64(). AFAICS do_syscall_64() doesn't touch R10 at all. So how does it reload R10? In fact do_syscall_64() as a C function does not touch R10, R11, R

[PATCH 4.15 55/60] KVM/x86: Add IBPB support

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Ashok Raj ashok@intel.com commit 15d45071523d89b3fb7372e2135fbd72f6af9506 The Indirect Branch Predictor Barrier (IBPB) is an indirect branch control mechanism. It keeps earlier branches fro

[PATCH 4.15 56/60] KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: KarimAllah Ahmed karah...@amazon.de commit 28c1c9fabf48d6ad596273a11c46e0d0da3e14cd Intel processors use MSR_IA32_ARCH_CAPABILITIES MSR to indicate RDCL_NO (bit 0) and IBRS_ALL (bit 1). This is

[PATCH 4.15 19/60] iio: adc/accel: Fix up module licenses

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Linus Walleij commit 9a0ebbc93547d88f422905c34dcceebe928f3e9e upstream. The module license checker complains about these two so just fix it up. They are both GPLv2, both written by me or using

[PATCH 4.15 60/60] fpga: region: release of_parse_phandle nodes after use

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Ian Abbott commit 0f5eb1545907edeea7672a9c1652c4231150ff22 upstream. Both fpga_region_get_manager() and fpga_region_get_bridges() call of_parse_phandle(), but nothing calls of_node_put() on th

[PATCH 4.15 23/60] KVM: VMX: introduce alloc_loaded_vmcs

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Bonzini pbonz...@redhat.com commit f21f165ef922c2146cc5bdc620f542953c41714b Group together the calls to alloc_vmcs and loaded_vmcs_init. Soon we'll also allocate an MSR bitmap there. Cc

[PATCH 4.15 20/60] pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Chan commit 0b9335cbd38e3bd2025bcc23b5758df4ac035f75 upstream. This change resolves a new compile-time warning when built as a loadable module: WARNING: modpost: missing MODULE_LICENSE(

[PATCH 4.15 18/60] auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Jesse Chan commit 09c479f7f1fbfaf848e5813996793966cd50be81 upstream. This change resolves a new compile-time warning when built as a loadable module: WARNING: modpost: missing MODULE_LICENSE(

[PATCH 4.15 49/60] x86/kvm: Update spectre-v1 mitigation

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams dan.j.willi...@intel.com commit 085331dfc6bbe3501fb936e657331ca943827600 Commit 75f139aaf896 "KVM: x86: Add memory barrier on vmcs field lookup" added a raw 'asm("lfence");' to pre

[PATCH 4.15 47/60] x86/paravirt: Remove noreplace-paravirt cmdline option

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Josh Poimboeuf jpoim...@redhat.com commit 12c69f1e94c89d40696e83804dd2f0965b5250cd The 'noreplace-paravirt' option disables paravirt patching, leaving the original pv indirect calls in place.

[PATCH 4.15 39/60] x86/get_user: Use pointer masking to limit speculation

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams dan.j.willi...@intel.com commit c7f631cb07e7da06ac1d231ca178452339e32a94 Quoting Linus: I do think that it would be a good idea to very expressly document the fact that it

[PATCH 4.15 36/60] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams dan.j.willi...@intel.com commit b3bbfb3fb5d25776b8e3f361d2eedaabb0b496cd For __get_user() paths, do not allow the kernel to speculate on the value of a user controlled pointer. In

[PATCH 4.15 34/60] x86: Implement array_index_mask_nospec

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams dan.j.willi...@intel.com commit babdde2698d482b6c0de1eab4f697cf5856c5859 array_index_nospec() uses a mask to sanitize user controllable array indexes, i.e. generate a 0 mask if 'in

[PATCH 4.15 16/60] x86/retpoline: Simplify vmexit_fill_RSB()

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Borislav Petkov b...@alien8.de commit 1dde7415e99933bb7293d6b2843752cbdb43ec11 Simplify it to call an asm-function instead of pasting 41 insn bytes at every call site. Also, add alignment to th

[PATCH 4.15 31/60] x86/asm: Move status from thread_struct to thread_info

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Andy Lutomirski l...@kernel.org commit 37a8f7c38339b22b69876d6f5a0ab851565284e3 The TS_COMPAT bit is very hot and is accessed from code paths that mostly also touch thread_info::flags. Move it

[PATCH 4.15 30/60] x86/entry/64: Push extra regs right away

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Andy Lutomirski l...@kernel.org commit d1f7732009e0549eedf8ea1db948dc37be77fd46 With the fast path removed there is no point in splitting the push of the normal and the extra register set. Just

[PATCH 4.15 32/60] Documentation: Document array_index_nospec

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Mark Rutland mark.rutl...@arm.com commit f84a56f73dddaeac1dba8045b007f742f61cd2da Document the rationale and usage of the new array_index_nospec() helper. Signed-off-by: Mark Rutland Signed-o

[PATCH 4.15 33/60] array_index_nospec: Sanitize speculative array de-references

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams dan.j.willi...@intel.com commit f3804203306e098dae9ca51540fcd5eb700d7f40 array_index_nospec() is proposed as a generic mechanism to mitigate against Spectre-variant-1 attacks, i.e.

[PATCH 4.15 25/60] objtool: Add support for alternatives at the end of a section

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Josh Poimboeuf jpoim...@redhat.com commit 17bc33914bcc98ba3c6b426fd1c49587a25c0597 Now that the previous patch gave objtool the ability to read retpoline alternatives, it shows a new warning:

[PATCH 4.15 27/60] x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: William Grant william.gr...@canonical.com commit 55f49fcb879fbeebf2a8c1ac7c9e6d90df55f798 Since commit 92a0f81d8957 ("x86/cpu_entry_area: Move it out of the fixmap"), i386's CPU_ENTRY_AREA has

[PATCH 4.15 15/60] x86/cpufeatures: Clean up Spectre v2 related CPUID flags

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Woodhouse d...@amazon.co.uk commit 2961298efe1ea1b6fc0d7ee8b76018fa6c0bcef2 We want to expose the hardware features simply in /proc/cpuinfo as "ibrs", "ibpb" and "stibp". Since AMD has se

[PATCH 4.15 05/60] x86/cpufeatures: Add Intel feature bits for Speculation Control

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Woodhouse d...@amazon.co.uk commit fc67dd70adb711a45d2ef34e12d1a8be75edde61 Add three feature bits exposed by new microcode on Intel CPUs for speculation control. Signed-off-by: David Wo

[PATCH 4.15 03/60] module/retpoline: Warn about missing retpoline in module

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Andi Kleen a...@linux.intel.com commit caf7501a1b4ec964190f31f9c3f163de252273b8 There's a risk that a kernel which has full retpoline mitigations becomes vulnerable when a module gets loaded th

[PATCH 4.15 11/60] x86/alternative: Print unadorned pointers

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Borislav Petkov b...@suse.de commit 0e6c16c652cadaffd25a6bb326ec10da5bcec6b4 After commit ad67b74d2469 ("printk: hash addresses printed with %p") pointers are being hashed when printed. However

[PATCH 4.15 02/60] KVM: VMX: Make indirect call speculation safe

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Peter Zijlstra pet...@infradead.org commit c940a3fb1e2e9b7d03228ab28f375fb5a47ff699 Replace indirect call with CALL_NOSPEC. Signed-off-by: Peter Zijlstra (Intel) Signed-off-by: Thomas Gleixne

[PATCH 4.15 01/60] KVM: x86: Make indirect calls in emulator speculation safe

2018-02-05 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Peter Zijlstra pet...@infradead.org commit 1a29b5b7f347a1a9230c1e0af5b37e3e571588ab Replace the indirect calls with CALL_NOSPEC. Signed-off-by: Peter Zijlstra (Intel) Signed-off-by: Thomas Gl

[PATCH 4.14 64/64] fpga: region: release of_parse_phandle nodes after use

2018-02-05 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Ian Abbott commit 0f5eb1545907edeea7672a9c1652c4231150ff22 upstream. Both fpga_region_get_manager() and fpga_region_get_bridges() call of_parse_phandle(), but nothing calls of_node_put() on th

[PATCH 4.14 42/64] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec

2018-02-05 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Dan Williams dan.j.willi...@intel.com commit 304ec1b050310548db33063e567123fae8fd0301 Quoting Linus: I do think that it would be a good idea to very expressly document the fact that it

[PATCH 4.14 55/64] x86/spectre: Simplify spectre_v2 command line parsing

2018-02-05 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: KarimAllah Ahmed karah...@amazon.de commit 9005c6834c0ffdfe46afa76656bd9276cca864f6 [dwmw2: Use ARRAY_SIZE] Signed-off-by: KarimAllah Ahmed Signed-off-by: David Woodhouse Signed-off-by: Thom

<    1   2   3   4   5   6   7   8   9   >