[PATCH AUTOSEL 4.19 02/68] iio: cros_ec_accel_legacy: Fix incorrect channel setting

2019-08-13 Thread Sasha Levin
From: Gwendal Grignou [ Upstream commit 6cdff99c9f7d7d28b87cf05dd464f7c7736332ae ] INFO_SCALE is set both for each channel and all channels. iio is using all channel setting, so the error was not user visible. Signed-off-by: Gwendal Grignou Cc: Signed-off-by: Jonathan Cameron Signed-off-by:

[PATCH AUTOSEL 4.19 09/68] bonding: Force slave speed check after link state recovery for 802.3ad

2019-08-13 Thread Sasha Levin
From: Thomas Falcon [ Upstream commit 12185dfe44360f814ac4ead9d22ad2af7511b2e9 ] The following scenario was encountered during testing of logical partition mobility on pseries partitions with bonded ibmvnic adapters in LACP mode. 1. Driver receives a signal that the device has been swapped,

[PATCH AUTOSEL 4.19 05/68] mips: fix cacheinfo

2019-08-13 Thread Sasha Levin
From: Vladimir Kondratiev [ Upstream commit b8bea8a5e5d942e62203416ab41edecaed4fda02 ] Because CONFIG_OF defined for MIPS, cacheinfo attempts to fill information from DT, ignoring data filled by architecture routine. This leads to error reported cacheinfo: Unable to detect cache hierarchy for

[PATCH AUTOSEL 4.19 06/68] netfilter: ebtables: fix a memory leak bug in compat

2019-08-13 Thread Sasha Levin
From: Wenwen Wang [ Upstream commit 15a78ba1844a8e052c1226f930133de4cef4e7ad ] In compat_do_replace(), a temporary buffer is allocated through vmalloc() to hold entries copied from the user space. The buffer address is firstly saved to 'newinfo->entries', and later on assigned to 'entries_tmp'.

[PATCH AUTOSEL 4.19 19/68] ASoC: rockchip: Fix mono capture

2019-08-13 Thread Sasha Levin
From: Cheng-Yi Chiang [ Upstream commit 789e162a6255325325bd321ab0cd51dc7e285054 ] This reverts commit db51707b9c9aeedd310ebce60f15d5bb006567e0. Revert "ASoC: rockchip: i2s: Support mono capture" Previous discussion in https://patchwork.kernel.org/patch/10147153/ explains the issue of the

[PATCH AUTOSEL 4.19 14/68] can: mcp251x: add error check when wq alloc failed

2019-08-13 Thread Sasha Levin
From: Weitao Hou [ Upstream commit 375f755899b8fc21196197e02aab26257df26e85 ] add error check when workqueue alloc failed, and remove redundant code to make it clear. Fixes: e163e30e ("can: Driver for the Microchip MCP251x SPI CAN controllers") Signed-off-by: Weitao Hou Acked-by: Willem

[PATCH AUTOSEL 4.19 23/68] isdn: mISDN: hfcsusb: Fix possible null-pointer dereferences in start_isoc_chain()

2019-08-13 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit a0d57a552b836206ad7705a1060e6e1ce5a38203 ] In start_isoc_chain(), usb_alloc_urb() on line 1392 may fail and return NULL. At this time, fifo->iso[i].urb is assigned to NULL. Then, fifo->iso[i].urb is used at some places, such as: LINE 1405:

[PATCH AUTOSEL 4.19 20/68] ASoC: ti: davinci-mcasp: Correct slot_width posed constraint

2019-08-13 Thread Sasha Levin
From: Peter Ujfalusi [ Upstream commit 1e112c35e3c96db7c8ca6ddaa96574f00c06e7db ] The slot_width is a property for the bus while the constraint for SNDRV_PCM_HW_PARAM_SAMPLE_BITS is for the in memory format. Applying slot_width constraint to sample_bits works most of the time, but it will

[PATCH AUTOSEL 4.19 15/68] can: gw: Fix error path of cgw_module_init

2019-08-13 Thread Sasha Levin
From: YueHaibing [ Upstream commit b7a14297f102b6e2ce6f16feffebbb9bde1e9b55 ] This patch add error path for cgw_module_init to avoid possible crash if some error occurs. Fixes: c1aabdf379bc ("can-gw: add netlink based CAN routing") Signed-off-by: YueHaibing Acked-by: Oliver Hartkopp

[PATCH AUTOSEL 4.19 16/68] ASoC: Fail card instantiation if DAI format setup fails

2019-08-13 Thread Sasha Levin
From: Ricard Wanderlof [ Upstream commit 40aa5383e393d72f6aa3943a4e7b1aae25a1e43b ] If the DAI format setup fails, there is no valid communication format between CPU and CODEC, so fail card instantiation, rather than continue with a card that will most likely not function properly.

[PATCH AUTOSEL 4.19 22/68] qed: RDMA - Fix the hw_ver returned in device attributes

2019-08-13 Thread Sasha Levin
From: Michal Kalderon [ Upstream commit 81af04b432fdfabcdbd2c06be2ee647e3ca41a22 ] The hw_ver field was initialized to zero. Return the chip revision. This is relevant for rdma driver. Signed-off-by: Michal Kalderon Signed-off-by: David S. Miller Signed-off-by: Sasha Levin ---

[PATCH AUTOSEL 4.19 25/68] netfilter: ipset: Actually allow destination MAC address for hash:ip,mac sets too

2019-08-13 Thread Sasha Levin
From: Stefano Brivio [ Upstream commit b89d15480d0cacacae1a0fe0b3da01b529f2914f ] In commit 8cc4ccf58379 ("ipset: Allow matching on destination MAC address for mac and ipmac sets"), ipset.git commit 1543514c46a7, I removed the KADT check that prevents matching on destination MAC addresses for

[PATCH AUTOSEL 4.19 27/68] netfilter: ipset: Fix rename concurrency with listing

2019-08-13 Thread Sasha Levin
From: Jozsef Kadlecsik [ Upstream commit 6c1f7e2c1b96ab9b09ac97c4df2bd9dc327206f6 ] Shijie Luo reported that when stress-testing ipset with multiple concurrent create, rename, flush, list, destroy commands, it can result ipset : Broken LIST kernel message: missing DATA part! error messages

[PATCH AUTOSEL 4.19 35/68] Input: kbtab - sanity check for endpoint type

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit c88090dfc84254fa149174eb3e6a8458de1912c4 ] The driver should check whether the endpoint it uses has the correct type. Reported-by: syzbot+c7df50363aaff50aa...@syzkaller.appspotmail.com Signed-off-by: Oliver Neukum Signed-off-by: Dmitry Torokhov

[PATCH AUTOSEL 4.19 29/68] rxrpc: Fix potential deadlock

2019-08-13 Thread Sasha Levin
From: David Howells [ Upstream commit 60034d3d146b11922ab1db613bce062dddc0327a ] There is a potential deadlock in rxrpc_peer_keepalive_dispatch() whereby rxrpc_put_peer() is called with the peer_hash_lock held, but if it reduces the peer's refcount to 0, rxrpc_put_peer() calls

[PATCH AUTOSEL 4.19 31/68] driver core: Fix use-after-free and double free on glue directory

2019-08-13 Thread Sasha Levin
From: Muchun Song [ Upstream commit ac43432cb1f5c2950408534987e57c2071e24d8f ] There is a race condition between removing glue directory and adding a new device under the glue dir. It can be reproduced in following test: CPU1: CPU2: device_add()

[PATCH AUTOSEL 4.19 36/68] net: usb: pegasus: fix improper read if get_registers() fail

2019-08-13 Thread Sasha Levin
From: Denis Kirjanov [ Upstream commit 224c04973db1125fcebefffd86115f99f50f8277 ] get_registers() may fail with -ENOMEM and in this case we can read a garbage from the status variable tmp. Reported-by: syzbot+3499a83b2d062ae40...@syzkaller.appspotmail.com Signed-off-by: Denis Kirjanov

[PATCH AUTOSEL 4.19 37/68] can: sja1000: force the string buffer NULL-terminated

2019-08-13 Thread Sasha Levin
From: Wang Xiayang [ Upstream commit cd28aa2e056cd1ea79fc5f24eed0ce868c6cab5c ] strncpy() does not ensure NULL-termination when the input string size equals to the destination buffer size IFNAMSIZ. The output string 'name' is passed to dev_info which relies on NULL-termination. Use strlcpy()

[PATCH AUTOSEL 4.19 40/68] NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim()

2019-08-13 Thread Sasha Levin
From: Trond Myklebust [ Upstream commit c77e22834ae9a11891cb613bd9a551be1b94f2bc ] John Hubbard reports seeing the following stack trace: nfs4_do_reclaim rcu_read_lock /* we are now in_atomic() and must not sleep */ nfs4_purge_state_owners nfs4_free_state_owner

[PATCH AUTOSEL 4.19 43/68] HID: holtek: test for sanity of intfdata

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit 01ec0a5f19c8c82960a07f6c7410fc9e01d7fb51 ] The ioctl handler uses the intfdata of a second interface, which may not be present in a broken or malicious device, hence the intfdata needs to be checked for NULL. [jkos...@suse.cz: fix newly added spurious

[PATCH AUTOSEL 4.19 38/68] can: peak_usb: force the string buffer NULL-terminated

2019-08-13 Thread Sasha Levin
From: Wang Xiayang [ Upstream commit e787f19373b8a5fa24087800ed78314fd17b984a ] strncpy() does not ensure NULL-termination when the input string size equals to the destination buffer size IFNAMSIZ. The output string is passed to dev_info() which relies on the NULL-termination. Use strlcpy()

[PATCH AUTOSEL 4.19 42/68] HID: quirks: Set the INCREMENT_USAGE_ON_DUPLICATE quirk on Saitek X52

2019-08-13 Thread Sasha Levin
From: István Váradi [ Upstream commit 7bc74853fd61432ec59f812a40425bf6d8c986a4 ] The Saitek X52 joystick has a pair of axes that are originally (by the Windows driver) used as mouse pointer controls. The corresponding usage->hid values are 0x50024 and 0x50026. Thus they are handled as unknown

[PATCH AUTOSEL 4.19 44/68] HID: input: fix a4tech horizontal wheel custom usage

2019-08-13 Thread Sasha Levin
From: Nicolas Saenz Julienne [ Upstream commit 1c703b53e5bfb5c2205c30f0fb157ce271fd42fb ] Some a4tech mice use the 'GenericDesktop.00b8' usage to inform whether the previous wheel report was horizontal or vertical. Before c01908a14bf73 ("HID: input: add mapping for "Toggle Display" key") this

[PATCH AUTOSEL 4.19 55/68] net: hisilicon: make hip04_tx_reclaim non-reentrant

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit 1a2c070ae805910a853b4a14818481ed2e17c727 ] If hip04_tx_reclaim is interrupted while it is running and then __napi_schedule continues to execute hip04_rx_poll->hip04_tx_reclaim, reentrancy occurs and oops is generated. So you need to mask the interrupt

[PATCH AUTOSEL 4.19 46/68] SMB3: Fix potential memory leak when processing compound chain

2019-08-13 Thread Sasha Levin
From: Pavel Shilovsky [ Upstream commit 3edeb4a4146dc3b54d6fa71b7ee0585cb52ebfdf ] When a reconnect happens in the middle of processing a compound chain the code leaks a buffer from the memory pool. Fix this by properly checking for a return code and freeing buffers in case of error. Also

[PATCH AUTOSEL 4.14 44/44] selftests: kvm: Adding config fragments

2019-08-13 Thread Sasha Levin
From: Naresh Kamboju [ Upstream commit c096397c78f766db972f923433031f2dec01cae0 ] selftests kvm test cases need pre-required kernel configs for the test to get pass. Signed-off-by: Naresh Kamboju Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- tools/testing/selftests/kvm/config

[PATCH AUTOSEL 4.19 57/68] net: hisilicon: Fix dma_map_single failed on arm64

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit 96a50c0d907ac8f5c3d6b051031a19eb8a2b53e3 ] On the arm64 platform, executing "ifconfig eth0 up" will fail, returning "ifconfig: SIOCSIFFLAGS: Input/output error." ndev->dev is not initialized, dma_map_single->get_dma_ops-> dummy_dma_ops->__dummy_map_page

[PATCH AUTOSEL 4.19 58/68] libata: have ata_scsi_rw_xlat() fail invalid passthrough requests

2019-08-13 Thread Sasha Levin
From: Jens Axboe [ Upstream commit 2d7271501720038381d45fb3dcbe4831228fc8cc ] For passthrough requests, libata-scsi takes what the user passes in as gospel. This can be problematic if the user fills in the CDB incorrectly. One example of that is in request sizes. For read/write commands, the

[PATCH AUTOSEL 4.9 01/33] HID: Add 044f:b320 ThrustMaster, Inc. 2 in 1 DT

2019-08-13 Thread Sasha Levin
From: Ilya Trukhanov [ Upstream commit 65f11c72780fa9d598df88def045ccb6a885cf80 ] Enable force feedback for the Thrustmaster Dual Trigger 2 in 1 Rumble Force gamepad. Compared to other Thrustmaster devices, left and right rumble motors here are swapped. Signed-off-by: Ilya Trukhanov

[PATCH AUTOSEL 4.9 05/33] bonding: Force slave speed check after link state recovery for 802.3ad

2019-08-13 Thread Sasha Levin
From: Thomas Falcon [ Upstream commit 12185dfe44360f814ac4ead9d22ad2af7511b2e9 ] The following scenario was encountered during testing of logical partition mobility on pseries partitions with bonded ibmvnic adapters in LACP mode. 1. Driver receives a signal that the device has been swapped,

[PATCH AUTOSEL 4.9 06/33] can: dev: call netif_carrier_off() in register_candev()

2019-08-13 Thread Sasha Levin
From: Rasmus Villemoes [ Upstream commit c63845609c4700488e5eacd6ab4d06d5d420e5ef ] CONFIG_CAN_LEDS is deprecated. When trying to use the generic netdev trigger as suggested, there's a small inconsistency with the link property: The LED is on initially, stays on when the device is brought up,

[PATCH AUTOSEL 4.4 01/28] HID: Add 044f:b320 ThrustMaster, Inc. 2 in 1 DT

2019-08-13 Thread Sasha Levin
From: Ilya Trukhanov [ Upstream commit 65f11c72780fa9d598df88def045ccb6a885cf80 ] Enable force feedback for the Thrustmaster Dual Trigger 2 in 1 Rumble Force gamepad. Compared to other Thrustmaster devices, left and right rumble motors here are swapped. Signed-off-by: Ilya Trukhanov

[PATCH AUTOSEL 4.9 07/33] ASoC: Fail card instantiation if DAI format setup fails

2019-08-13 Thread Sasha Levin
From: Ricard Wanderlof [ Upstream commit 40aa5383e393d72f6aa3943a4e7b1aae25a1e43b ] If the DAI format setup fails, there is no valid communication format between CPU and CODEC, so fail card instantiation, rather than continue with a card that will most likely not function properly.

[PATCH AUTOSEL 4.9 10/33] ASoC: ti: davinci-mcasp: Correct slot_width posed constraint

2019-08-13 Thread Sasha Levin
From: Peter Ujfalusi [ Upstream commit 1e112c35e3c96db7c8ca6ddaa96574f00c06e7db ] The slot_width is a property for the bus while the constraint for SNDRV_PCM_HW_PARAM_SAMPLE_BITS is for the in memory format. Applying slot_width constraint to sample_bits works most of the time, but it will

[PATCH AUTOSEL 4.9 02/33] MIPS: kernel: only use i8253 clocksource with periodic clockevent

2019-08-13 Thread Sasha Levin
From: Thomas Bogendoerfer [ Upstream commit a07e3324538a989b7cdbf2c679be6a7f9df2544f ] i8253 clocksource needs a free running timer. This could only be used, if i8253 clockevent is set up as periodic. Signed-off-by: Thomas Bogendoerfer Signed-off-by: Paul Burton Cc: Ralf Baechle Cc: James

[PATCH AUTOSEL 4.9 11/33] net: usb: qmi_wwan: Add the BroadMobi BM818 card

2019-08-13 Thread Sasha Levin
From: Bob Ham [ Upstream commit 9a07406b00cdc6ec689dc142540739575c717f3c ] The BroadMobi BM818 M.2 card uses the QMI protocol Signed-off-by: Bob Ham Signed-off-by: Angus Ainslie (Purism) Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/usb/qmi_wwan.c | 1 + 1 file

[PATCH AUTOSEL 4.4 03/28] netfilter: ebtables: fix a memory leak bug in compat

2019-08-13 Thread Sasha Levin
From: Wenwen Wang [ Upstream commit 15a78ba1844a8e052c1226f930133de4cef4e7ad ] In compat_do_replace(), a temporary buffer is allocated through vmalloc() to hold entries copied from the user space. The buffer address is firstly saved to 'newinfo->entries', and later on assigned to 'entries_tmp'.

[PATCH AUTOSEL 4.4 08/28] st_nci_hci_connectivity_event_received: null check the allocation

2019-08-13 Thread Sasha Levin
From: Navid Emamdoost [ Upstream commit 3008e06fdf0973770370f97d5f1fba3701d8281d ] devm_kzalloc may fail and return NULL. So the null check is needed. Signed-off-by: Navid Emamdoost Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/nfc/st-nci/se.c | 2 ++ 1 file

[PATCH AUTOSEL 4.4 05/28] can: dev: call netif_carrier_off() in register_candev()

2019-08-13 Thread Sasha Levin
From: Rasmus Villemoes [ Upstream commit c63845609c4700488e5eacd6ab4d06d5d420e5ef ] CONFIG_CAN_LEDS is deprecated. When trying to use the generic netdev trigger as suggested, there's a small inconsistency with the link property: The LED is on initially, stays on when the device is brought up,

[PATCH AUTOSEL 4.4 12/28] isdn: hfcsusb: Fix mISDN driver crash caused by transfer buffer on the stack

2019-08-13 Thread Sasha Levin
From: Juliana Rodrigueiro [ Upstream commit d8a1de3d5bb881507602bc02e004904828f88711 ] Since linux 4.9 it is not possible to use buffers on the stack for DMA transfers. During usb probe the driver crashes with "transfer buffer is on stack" message. This fix k-allocates a buffer to be used on

[PATCH AUTOSEL 4.4 02/28] MIPS: kernel: only use i8253 clocksource with periodic clockevent

2019-08-13 Thread Sasha Levin
From: Thomas Bogendoerfer [ Upstream commit a07e3324538a989b7cdbf2c679be6a7f9df2544f ] i8253 clocksource needs a free running timer. This could only be used, if i8253 clockevent is set up as periodic. Signed-off-by: Thomas Bogendoerfer Signed-off-by: Paul Burton Cc: Ralf Baechle Cc: James

[PATCH AUTOSEL 4.4 18/28] NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim()

2019-08-13 Thread Sasha Levin
From: Trond Myklebust [ Upstream commit c77e22834ae9a11891cb613bd9a551be1b94f2bc ] John Hubbard reports seeing the following stack trace: nfs4_do_reclaim rcu_read_lock /* we are now in_atomic() and must not sleep */ nfs4_purge_state_owners nfs4_free_state_owner

[PATCH AUTOSEL 4.4 21/28] HID: hiddev: do cleanup in failure of opening a device

2019-08-13 Thread Sasha Levin
From: Hillf Danton [ Upstream commit 6d4472d7bec39917b54e4e80245784ea5d60ce49 ] Undo what we did for opening before releasing the memory slice. Reported-by: syzbot Cc: Andrey Konovalov Signed-off-by: Hillf Danton Signed-off-by: Jiri Kosina Signed-off-by: Sasha Levin ---

[PATCH AUTOSEL 4.4 24/28] net: hisilicon: make hip04_tx_reclaim non-reentrant

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit 1a2c070ae805910a853b4a14818481ed2e17c727 ] If hip04_tx_reclaim is interrupted while it is running and then __napi_schedule continues to execute hip04_rx_poll->hip04_tx_reclaim, reentrancy occurs and oops is generated. So you need to mask the interrupt

[PATCH AUTOSEL 4.4 22/28] Input: iforce - add sanity checks

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit 849f5ae3a513c550cad741c68dd3d7eb2bcc2a2c ] The endpoint type should also be checked before a device is accepted. Reported-by: syzbot+5efc10c005014d061...@syzkaller.appspotmail.com Signed-off-by: Oliver Neukum Signed-off-by: Dmitry Torokhov Signed-off-by:

[PATCH AUTOSEL 4.4 19/28] HID: holtek: test for sanity of intfdata

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit 01ec0a5f19c8c82960a07f6c7410fc9e01d7fb51 ] The ioctl handler uses the intfdata of a second interface, which may not be present in a broken or malicious device, hence the intfdata needs to be checked for NULL. [jkos...@suse.cz: fix newly added spurious

[PATCH AUTOSEL 4.4 16/28] can: sja1000: force the string buffer NULL-terminated

2019-08-13 Thread Sasha Levin
From: Wang Xiayang [ Upstream commit cd28aa2e056cd1ea79fc5f24eed0ce868c6cab5c ] strncpy() does not ensure NULL-termination when the input string size equals to the destination buffer size IFNAMSIZ. The output string 'name' is passed to dev_info which relies on NULL-termination. Use strlcpy()

[PATCH AUTOSEL 4.4 27/28] libata: add SG safety checks in SFF pio transfers

2019-08-13 Thread Sasha Levin
From: Jens Axboe [ Upstream commit 752ead44491e8c91e14d7079625c5916b30921c5 ] Abort processing of a command if we run out of mapped data in the SG list. This should never happen, but a previous bug caused it to be possible. Play it safe and attempt to abort nicely if we don't have more SG

[PATCH AUTOSEL 4.4 17/28] can: peak_usb: force the string buffer NULL-terminated

2019-08-13 Thread Sasha Levin
From: Wang Xiayang [ Upstream commit e787f19373b8a5fa24087800ed78314fd17b984a ] strncpy() does not ensure NULL-termination when the input string size equals to the destination buffer size IFNAMSIZ. The output string is passed to dev_info() which relies on the NULL-termination. Use strlcpy()

[PATCH AUTOSEL 4.4 15/28] net: usb: pegasus: fix improper read if get_registers() fail

2019-08-13 Thread Sasha Levin
From: Denis Kirjanov [ Upstream commit 224c04973db1125fcebefffd86115f99f50f8277 ] get_registers() may fail with -ENOMEM and in this case we can read a garbage from the status variable tmp. Reported-by: syzbot+3499a83b2d062ae40...@syzkaller.appspotmail.com Signed-off-by: Denis Kirjanov

[PATCH AUTOSEL 4.9 33/33] selftests: kvm: Adding config fragments

2019-08-13 Thread Sasha Levin
From: Naresh Kamboju [ Upstream commit c096397c78f766db972f923433031f2dec01cae0 ] selftests kvm test cases need pre-required kernel configs for the test to get pass. Signed-off-by: Naresh Kamboju Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- tools/testing/selftests/kvm/config

[PATCH AUTOSEL 4.4 28/28] selftests: kvm: Adding config fragments

2019-08-13 Thread Sasha Levin
From: Naresh Kamboju [ Upstream commit c096397c78f766db972f923433031f2dec01cae0 ] selftests kvm test cases need pre-required kernel configs for the test to get pass. Signed-off-by: Naresh Kamboju Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- tools/testing/selftests/kvm/config

[PATCH AUTOSEL 4.4 23/28] net: cxgb3_main: Fix a resource leak in a error path in 'init_one()'

2019-08-13 Thread Sasha Levin
From: Christophe JAILLET [ Upstream commit debea2cd3193ac868289e8893c3a719c265b0612 ] A call to 'kfree_skb()' is missing in the error handling path of 'init_one()'. This is already present in 'remove_one()' but is missing here. Signed-off-by: Christophe JAILLET Signed-off-by: David S. Miller

[PATCH AUTOSEL 4.4 26/28] net: hisilicon: Fix dma_map_single failed on arm64

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit 96a50c0d907ac8f5c3d6b051031a19eb8a2b53e3 ] On the arm64 platform, executing "ifconfig eth0 up" will fail, returning "ifconfig: SIOCSIFFLAGS: Input/output error." ndev->dev is not initialized, dma_map_single->get_dma_ops-> dummy_dma_ops->__dummy_map_page

[PATCH AUTOSEL 4.4 07/28] st21nfca_connectivity_event_received: null check the allocation

2019-08-13 Thread Sasha Levin
From: Navid Emamdoost [ Upstream commit 9891d06836e67324c9e9c4675ed90fc8b8110034 ] devm_kzalloc may fail and return null. So the null check is needed. Signed-off-by: Navid Emamdoost Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/nfc/st21nfca/se.c | 2 ++ 1 file

[PATCH AUTOSEL 4.4 06/28] ASoC: Fail card instantiation if DAI format setup fails

2019-08-13 Thread Sasha Levin
From: Ricard Wanderlof [ Upstream commit 40aa5383e393d72f6aa3943a4e7b1aae25a1e43b ] If the DAI format setup fails, there is no valid communication format between CPU and CODEC, so fail card instantiation, rather than continue with a card that will most likely not function properly.

[PATCH AUTOSEL 4.4 11/28] isdn: mISDN: hfcsusb: Fix possible null-pointer dereferences in start_isoc_chain()

2019-08-13 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit a0d57a552b836206ad7705a1060e6e1ce5a38203 ] In start_isoc_chain(), usb_alloc_urb() on line 1392 may fail and return NULL. At this time, fifo->iso[i].urb is assigned to NULL. Then, fifo->iso[i].urb is used at some places, such as: LINE 1405:

[PATCH AUTOSEL 4.4 20/28] HID: hiddev: avoid opening a disconnected device

2019-08-13 Thread Sasha Levin
From: Hillf Danton [ Upstream commit 9c09b214f30e3c11f9b0b03f89442df03643794d ] syzbot found the following crash on: HEAD commit:e96407b4 usb-fuzzer: main usb gadget fuzzer driver git tree: https://github.com/google/kasan.git usb-fuzzer console output:

[PATCH AUTOSEL 4.4 10/28] net: usb: qmi_wwan: Add the BroadMobi BM818 card

2019-08-13 Thread Sasha Levin
From: Bob Ham [ Upstream commit 9a07406b00cdc6ec689dc142540739575c717f3c ] The BroadMobi BM818 M.2 card uses the QMI protocol Signed-off-by: Bob Ham Signed-off-by: Angus Ainslie (Purism) Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/usb/qmi_wwan.c | 1 + 1 file

[PATCH AUTOSEL 4.4 04/28] bonding: Force slave speed check after link state recovery for 802.3ad

2019-08-13 Thread Sasha Levin
From: Thomas Falcon [ Upstream commit 12185dfe44360f814ac4ead9d22ad2af7511b2e9 ] The following scenario was encountered during testing of logical partition mobility on pseries partitions with bonded ibmvnic adapters in LACP mode. 1. Driver receives a signal that the device has been swapped,

[PATCH AUTOSEL 4.4 09/28] ASoC: ti: davinci-mcasp: Correct slot_width posed constraint

2019-08-13 Thread Sasha Levin
From: Peter Ujfalusi [ Upstream commit 1e112c35e3c96db7c8ca6ddaa96574f00c06e7db ] The slot_width is a property for the bus while the constraint for SNDRV_PCM_HW_PARAM_SAMPLE_BITS is for the in memory format. Applying slot_width constraint to sample_bits works most of the time, but it will

[PATCH AUTOSEL 4.4 25/28] net: hisilicon: fix hip04-xmit never return TX_BUSY

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit f2243b82785942be519016067ee6c55a063bbfe2 ] TX_DESC_NUM is 256, in tx_count, the maximum value of mod(TX_DESC_NUM - 1) is 254, the variable "count" in the hip04_mac_start_xmit function is never equal to (TX_DESC_NUM - 1), so hip04_mac_start_xmit never

[PATCH AUTOSEL 4.4 13/28] perf bench numa: Fix cpu0 binding

2019-08-13 Thread Sasha Levin
From: Jiri Olsa [ Upstream commit 6bbfe4e602691b90ac866712bd4c43c51e546a60 ] Michael reported an issue with perf bench numa failing with binding to cpu0 with '-0' option. # perf bench numa mem -p 3 -t 1 -P 512 -s 100 -zZcm0 --thp 1 -M 1 -ddd # Running 'numa/mem' benchmark: # Running

[PATCH AUTOSEL 4.4 14/28] Input: kbtab - sanity check for endpoint type

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit c88090dfc84254fa149174eb3e6a8458de1912c4 ] The driver should check whether the endpoint it uses has the correct type. Reported-by: syzbot+c7df50363aaff50aa...@syzkaller.appspotmail.com Signed-off-by: Oliver Neukum Signed-off-by: Dmitry Torokhov

[PATCH AUTOSEL 4.9 15/33] Input: kbtab - sanity check for endpoint type

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit c88090dfc84254fa149174eb3e6a8458de1912c4 ] The driver should check whether the endpoint it uses has the correct type. Reported-by: syzbot+c7df50363aaff50aa...@syzkaller.appspotmail.com Signed-off-by: Oliver Neukum Signed-off-by: Dmitry Torokhov

[PATCH AUTOSEL 4.9 12/33] isdn: mISDN: hfcsusb: Fix possible null-pointer dereferences in start_isoc_chain()

2019-08-13 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit a0d57a552b836206ad7705a1060e6e1ce5a38203 ] In start_isoc_chain(), usb_alloc_urb() on line 1392 may fail and return NULL. At this time, fifo->iso[i].urb is assigned to NULL. Then, fifo->iso[i].urb is used at some places, such as: LINE 1405:

[PATCH AUTOSEL 4.9 13/33] isdn: hfcsusb: Fix mISDN driver crash caused by transfer buffer on the stack

2019-08-13 Thread Sasha Levin
From: Juliana Rodrigueiro [ Upstream commit d8a1de3d5bb881507602bc02e004904828f88711 ] Since linux 4.9 it is not possible to use buffers on the stack for DMA transfers. During usb probe the driver crashes with "transfer buffer is on stack" message. This fix k-allocates a buffer to be used on

[PATCH AUTOSEL 4.9 21/33] HID: input: fix a4tech horizontal wheel custom usage

2019-08-13 Thread Sasha Levin
From: Nicolas Saenz Julienne [ Upstream commit 1c703b53e5bfb5c2205c30f0fb157ce271fd42fb ] Some a4tech mice use the 'GenericDesktop.00b8' usage to inform whether the previous wheel report was horizontal or vertical. Before c01908a14bf73 ("HID: input: add mapping for "Toggle Display" key") this

[PATCH AUTOSEL 4.9 18/33] can: peak_usb: force the string buffer NULL-terminated

2019-08-13 Thread Sasha Levin
From: Wang Xiayang [ Upstream commit e787f19373b8a5fa24087800ed78314fd17b984a ] strncpy() does not ensure NULL-termination when the input string size equals to the destination buffer size IFNAMSIZ. The output string is passed to dev_info() which relies on the NULL-termination. Use strlcpy()

[PATCH AUTOSEL 4.9 27/33] net: hisilicon: fix hip04-xmit never return TX_BUSY

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit f2243b82785942be519016067ee6c55a063bbfe2 ] TX_DESC_NUM is 256, in tx_count, the maximum value of mod(TX_DESC_NUM - 1) is 254, the variable "count" in the hip04_mac_start_xmit function is never equal to (TX_DESC_NUM - 1), so hip04_mac_start_xmit never

[PATCH AUTOSEL 4.9 24/33] Input: iforce - add sanity checks

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit 849f5ae3a513c550cad741c68dd3d7eb2bcc2a2c ] The endpoint type should also be checked before a device is accepted. Reported-by: syzbot+5efc10c005014d061...@syzkaller.appspotmail.com Signed-off-by: Oliver Neukum Signed-off-by: Dmitry Torokhov Signed-off-by:

[PATCH AUTOSEL 4.9 29/33] libata: add SG safety checks in SFF pio transfers

2019-08-13 Thread Sasha Levin
From: Jens Axboe [ Upstream commit 752ead44491e8c91e14d7079625c5916b30921c5 ] Abort processing of a command if we run out of mapped data in the SG list. This should never happen, but a previous bug caused it to be possible. Play it safe and attempt to abort nicely if we don't have more SG

[PATCH AUTOSEL 4.9 32/33] perf pmu-events: Fix missing "cpu_clk_unhalted.core" event

2019-08-13 Thread Sasha Levin
From: Jin Yao [ Upstream commit 8e6e5bea2e34c61291d00cb3f47560341aa84bc3 ] The events defined in pmu-events JSON are parsed and added into perf tool. For fixed counters, we handle the encodings between JSON and perf by using a static array fixed[]. But the fixed[] has missed an important event

[PATCH AUTOSEL 4.9 30/33] x86/lib/cpu: Address missing prototypes warning

2019-08-13 Thread Sasha Levin
From: Valdis Klētnieks [ Upstream commit 04f5bda84b0712d6f172556a7e8dca9ded5e73b9 ] When building with W=1, warnings about missing prototypes are emitted: CC arch/x86/lib/cpu.o arch/x86/lib/cpu.c:5:14: warning: no previous prototype for 'x86_family' [-Wmissing-prototypes] 5 |

[PATCH AUTOSEL 4.9 20/33] HID: holtek: test for sanity of intfdata

2019-08-13 Thread Sasha Levin
From: Oliver Neukum [ Upstream commit 01ec0a5f19c8c82960a07f6c7410fc9e01d7fb51 ] The ioctl handler uses the intfdata of a second interface, which may not be present in a broken or malicious device, hence the intfdata needs to be checked for NULL. [jkos...@suse.cz: fix newly added spurious

[PATCH AUTOSEL 4.9 19/33] NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim()

2019-08-13 Thread Sasha Levin
From: Trond Myklebust [ Upstream commit c77e22834ae9a11891cb613bd9a551be1b94f2bc ] John Hubbard reports seeing the following stack trace: nfs4_do_reclaim rcu_read_lock /* we are now in_atomic() and must not sleep */ nfs4_purge_state_owners nfs4_free_state_owner

[PATCH AUTOSEL 4.9 31/33] drm/vmwgfx: fix memory leak when too many retries have occurred

2019-08-13 Thread Sasha Levin
From: Colin Ian King [ Upstream commit 6b7c3b86f0b63134b2ab56508921a0853ffa687a ] Currently when too many retries have occurred there is a memory leak on the allocation for reply on the error return path. Fix this by kfree'ing reply before returning. Addresses-Coverity: ("Resource leak")

[PATCH AUTOSEL 4.9 25/33] net: cxgb3_main: Fix a resource leak in a error path in 'init_one()'

2019-08-13 Thread Sasha Levin
From: Christophe JAILLET [ Upstream commit debea2cd3193ac868289e8893c3a719c265b0612 ] A call to 'kfree_skb()' is missing in the error handling path of 'init_one()'. This is already present in 'remove_one()' but is missing here. Signed-off-by: Christophe JAILLET Signed-off-by: David S. Miller

[PATCH AUTOSEL 4.9 28/33] net: hisilicon: Fix dma_map_single failed on arm64

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit 96a50c0d907ac8f5c3d6b051031a19eb8a2b53e3 ] On the arm64 platform, executing "ifconfig eth0 up" will fail, returning "ifconfig: SIOCSIFFLAGS: Input/output error." ndev->dev is not initialized, dma_map_single->get_dma_ops-> dummy_dma_ops->__dummy_map_page

Re: [PATCH 2/2] riscv: defconfig: Update the defconfig

2019-08-13 Thread Paul Walmsley
On Tue, 13 Aug 2019, Alistair Francis wrote: > Update the defconfig: > - Add CONFIG_HW_RANDOM=y and CONFIG_HW_RANDOM_VIRTIO=y to enable >VirtIORNG when running on QEMU > > Signed-off-by: Alistair Francis Thanks, queued for v5.3-rc. - Paul

[PATCH AUTOSEL 4.9 26/33] net: hisilicon: make hip04_tx_reclaim non-reentrant

2019-08-13 Thread Sasha Levin
From: Jiangfeng Xiao [ Upstream commit 1a2c070ae805910a853b4a14818481ed2e17c727 ] If hip04_tx_reclaim is interrupted while it is running and then __napi_schedule continues to execute hip04_rx_poll->hip04_tx_reclaim, reentrancy occurs and oops is generated. So you need to mask the interrupt

Re: [PATCH 1/2] riscv: rv32_defconfig: Update the defconfig

2019-08-13 Thread Paul Walmsley
On Tue, 13 Aug 2019, Alistair Francis wrote: > Update the rv32_defconfig: > - Add 'CONFIG_DEVTMPFS_MOUNT=y' to match the RISC-V defconfig > - Add CONFIG_HW_RANDOM=y and CONFIG_HW_RANDOM_VIRTIO=y to enable >VirtIORNG when running on QEMU > > Signed-off-by: Alistair Francis Thanks, queued

[PATCH AUTOSEL 4.9 17/33] can: sja1000: force the string buffer NULL-terminated

2019-08-13 Thread Sasha Levin
From: Wang Xiayang [ Upstream commit cd28aa2e056cd1ea79fc5f24eed0ce868c6cab5c ] strncpy() does not ensure NULL-termination when the input string size equals to the destination buffer size IFNAMSIZ. The output string 'name' is passed to dev_info which relies on NULL-termination. Use strlcpy()

[PATCH AUTOSEL 4.9 22/33] HID: hiddev: avoid opening a disconnected device

2019-08-13 Thread Sasha Levin
From: Hillf Danton [ Upstream commit 9c09b214f30e3c11f9b0b03f89442df03643794d ] syzbot found the following crash on: HEAD commit:e96407b4 usb-fuzzer: main usb gadget fuzzer driver git tree: https://github.com/google/kasan.git usb-fuzzer console output:

[PATCH AUTOSEL 4.9 14/33] perf bench numa: Fix cpu0 binding

2019-08-13 Thread Sasha Levin
From: Jiri Olsa [ Upstream commit 6bbfe4e602691b90ac866712bd4c43c51e546a60 ] Michael reported an issue with perf bench numa failing with binding to cpu0 with '-0' option. # perf bench numa mem -p 3 -t 1 -P 512 -s 100 -zZcm0 --thp 1 -M 1 -ddd # Running 'numa/mem' benchmark: # Running

[PATCH AUTOSEL 4.9 04/33] ASoC: dapm: Fix handling of custom_stop_condition on DAPM graph walks

2019-08-13 Thread Sasha Levin
From: Charles Keepax [ Upstream commit 8dd26dff00c0636b1d8621acaeef3f6f3a39dd77 ] DPCM uses snd_soc_dapm_dai_get_connected_widgets to build a list of the widgets connected to a specific front end DAI so it can search through this list for available back end DAIs. The custom_stop_condition was

[PATCH AUTOSEL 4.9 08/33] st21nfca_connectivity_event_received: null check the allocation

2019-08-13 Thread Sasha Levin
From: Navid Emamdoost [ Upstream commit 9891d06836e67324c9e9c4675ed90fc8b8110034 ] devm_kzalloc may fail and return null. So the null check is needed. Signed-off-by: Navid Emamdoost Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/nfc/st21nfca/se.c | 2 ++ 1 file

[PATCH AUTOSEL 4.19 62/68] block, bfq: handle NULL return value by bfq_init_rq()

2019-08-13 Thread Sasha Levin
From: Paolo Valente [ Upstream commit fd03177c33b287c6541f4048f1d67b7b45a1abc9 ] As reported in [1], the call bfq_init_rq(rq) may return NULL in case of OOM (in particular, if rq->elv.icq is NULL because memory allocation failed in failed in ioc_create_icq()). This commit handles this

[PATCH AUTOSEL 4.19 47/68] SMB3: Kernel oops mounting a encryptData share with CONFIG_DEBUG_VIRTUAL

2019-08-13 Thread Sasha Levin
From: Sebastien Tisserant [ Upstream commit ee9d66182392695535cc9fccfcb40c16f72de2a9 ] Fix kernel oops when mounting a encryptData CIFS share with CONFIG_DEBUG_VIRTUAL Signed-off-by: Sebastien Tisserant Reviewed-by: Pavel Shilovsky Signed-off-by: Steve French Signed-off-by: Sasha Levin ---

[PATCH AUTOSEL 4.9 09/33] st_nci_hci_connectivity_event_received: null check the allocation

2019-08-13 Thread Sasha Levin
From: Navid Emamdoost [ Upstream commit 3008e06fdf0973770370f97d5f1fba3701d8281d ] devm_kzalloc may fail and return NULL. So the null check is needed. Signed-off-by: Navid Emamdoost Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/nfc/st-nci/se.c | 2 ++ 1 file

[PATCH AUTOSEL 4.19 63/68] perf ftrace: Fix failure to set cpumask when only one cpu is present

2019-08-13 Thread Sasha Levin
From: He Zhe [ Upstream commit cf30ae726c011e0372fd4c2d588466c8b50a8907 ] The buffer containing the string used to set cpumask is overwritten at the end of the string later in cpu_map__snprint_mask due to not enough memory space, when there is only one cpu. And thus causes the following

[PATCH AUTOSEL 4.19 59/68] libata: add SG safety checks in SFF pio transfers

2019-08-13 Thread Sasha Levin
From: Jens Axboe [ Upstream commit 752ead44491e8c91e14d7079625c5916b30921c5 ] Abort processing of a command if we run out of mapped data in the SG list. This should never happen, but a previous bug caused it to be possible. Play it safe and attempt to abort nicely if we don't have more SG

[PATCH AUTOSEL 4.9 03/33] netfilter: ebtables: fix a memory leak bug in compat

2019-08-13 Thread Sasha Levin
From: Wenwen Wang [ Upstream commit 15a78ba1844a8e052c1226f930133de4cef4e7ad ] In compat_do_replace(), a temporary buffer is allocated through vmalloc() to hold entries copied from the user space. The buffer address is firstly saved to 'newinfo->entries', and later on assigned to 'entries_tmp'.

[PATCH AUTOSEL 4.14 02/44] HID: Add 044f:b320 ThrustMaster, Inc. 2 in 1 DT

2019-08-13 Thread Sasha Levin
From: Ilya Trukhanov [ Upstream commit 65f11c72780fa9d598df88def045ccb6a885cf80 ] Enable force feedback for the Thrustmaster Dual Trigger 2 in 1 Rumble Force gamepad. Compared to other Thrustmaster devices, left and right rumble motors here are swapped. Signed-off-by: Ilya Trukhanov

[PATCH AUTOSEL 4.14 10/44] st21nfca_connectivity_event_received: null check the allocation

2019-08-13 Thread Sasha Levin
From: Navid Emamdoost [ Upstream commit 9891d06836e67324c9e9c4675ed90fc8b8110034 ] devm_kzalloc may fail and return null. So the null check is needed. Signed-off-by: Navid Emamdoost Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/nfc/st21nfca/se.c | 2 ++ 1 file

[PATCH AUTOSEL 4.14 13/44] net: usb: qmi_wwan: Add the BroadMobi BM818 card

2019-08-13 Thread Sasha Levin
From: Bob Ham [ Upstream commit 9a07406b00cdc6ec689dc142540739575c717f3c ] The BroadMobi BM818 M.2 card uses the QMI protocol Signed-off-by: Bob Ham Signed-off-by: Angus Ainslie (Purism) Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/usb/qmi_wwan.c | 1 + 1 file

[PATCH AUTOSEL 4.14 18/44] driver core: Fix use-after-free and double free on glue directory

2019-08-13 Thread Sasha Levin
From: Muchun Song [ Upstream commit ac43432cb1f5c2950408534987e57c2071e24d8f ] There is a race condition between removing glue directory and adding a new device under the glue dir. It can be reproduced in following test: CPU1: CPU2: device_add()

[PATCH AUTOSEL 4.14 05/44] netfilter: ebtables: fix a memory leak bug in compat

2019-08-13 Thread Sasha Levin
From: Wenwen Wang [ Upstream commit 15a78ba1844a8e052c1226f930133de4cef4e7ad ] In compat_do_replace(), a temporary buffer is allocated through vmalloc() to hold entries copied from the user space. The buffer address is firstly saved to 'newinfo->entries', and later on assigned to 'entries_tmp'.

Re: [PATCH 1/2] riscv: Add memmove string operation.

2019-08-13 Thread Paul Walmsley
On Tue, 13 Aug 2019, Palmer Dabbelt wrote: > On Mon, 12 Aug 2019 08:04:46 PDT (-0700), Christoph Hellwig wrote: > > On Wed, Aug 07, 2019 at 03:19:14PM +0800, Nick Hu wrote: > > > There are some features which need this string operation for compilation, > > > like KASAN. So the purpose of this

[PATCH AUTOSEL 4.14 08/44] can: dev: call netif_carrier_off() in register_candev()

2019-08-13 Thread Sasha Levin
From: Rasmus Villemoes [ Upstream commit c63845609c4700488e5eacd6ab4d06d5d420e5ef ] CONFIG_CAN_LEDS is deprecated. When trying to use the generic netdev trigger as suggested, there's a small inconsistency with the link property: The LED is on initially, stays on when the device is brought up,

<    1   2   3   4   5   6   7   8   9   10   >