[PATCH 5.4 31/34] x86/speculation: Add SRBDS vulnerability and mitigation documentation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream Add documentation for the SRBDS vulnerability and its mitigation. [ bp: Massage. jpoimboe: sysfs table strings. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Reviewed-by: Tony Luck Reviewed-by: Josh

[PATCH 5.4 32/34] x86/speculation: Add Ivy Bridge to affected list

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 3798cc4d106e91382bfe016caa2edada27c2bb3f upstream Make the docs match the code. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst | 7

[PATCH 4.19 09/25] USB: serial: usb_wwan: do not resubmit rx urb on fatal errors

2020-06-09 Thread Greg Kroah-Hartman
From: Bin Liu commit 986c1748c84d7727defeaeca74a73b37f7d5cce1 upstream. usb_wwan_indat_callback() shouldn't resubmit rx urb if the previous urb status is a fatal error. Or the usb controller would keep processing the new urbs then run into interrupt storm, and has no chance to recover. Fixes:

[PATCH 5.4 18/34] iio:chemical:pms7003: Fix timestamp alignment and prevent data leak.

2020-06-09 Thread Greg Kroah-Hartman
From: Jonathan Cameron commit 13e945631c2ffb946c0af342812a3cd39227de6e upstream. One of a class of bugs pointed out by Lars in a recent review. iio_push_to_buffers_with_timestamp assumes the buffer used is aligned to the size of the timestamp (8 bytes). This is not guaranteed in this driver

[PATCH 5.4 01/34] devinet: fix memleak in inetdev_init()

2020-06-09 Thread Greg Kroah-Hartman
From: Yang Yingliang [ Upstream commit 1b49cd71b52403822731dc9f283185d1da355f97 ] When devinet_sysctl_register() failed, the memory allocated in neigh_parms_alloc() should be freed. Fixes: 20e61da7ffcf ("ipv4: fail early when creating netdev named all or default") Signed-off-by: Yang

[PATCH 5.4 04/34] net/mlx5: Fix crash upon suspend/resume

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Bloch [ Upstream commit 8fc3e29be9248048f449793502c15af329f35c6e ] Currently a Linux system with the mlx5 NIC always crashes upon hibernation - suspend/resume. Add basic callbacks so the NIC could be suspended and resumed. Fixes: 9603b61de1ee ("mlx5: Move pci device handling from

[PATCH 5.4 20/34] usb: musb: start session in resume for host port

2020-06-09 Thread Greg Kroah-Hartman
From: Bin Liu commit 7f88a5ac393f39319f69b8b20cc8d5759878d1a1 upstream. Commit 17539f2f4f0b ("usb: musb: fix enumeration after resume") replaced musb_start() in musb_resume() to not override softconnect bit, but it doesn't restart the session for host port which was done in musb_start(). The

[PATCH 5.6 01/41] devinet: fix memleak in inetdev_init()

2020-06-09 Thread Greg Kroah-Hartman
From: Yang Yingliang [ Upstream commit 1b49cd71b52403822731dc9f283185d1da355f97 ] When devinet_sysctl_register() failed, the memory allocated in neigh_parms_alloc() should be freed. Fixes: 20e61da7ffcf ("ipv4: fail early when creating netdev named all or default") Signed-off-by: Yang

[PATCH 5.6 00/41] 5.6.18-rc1 review

2020-06-09 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.6.18 release. There are 41 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 11 Jun 2020 17:40:51 +. Anything

Re: [PATCH 01/10] rcu: Directly lock rdp->nocb_lock on nocb code entrypoints

2020-06-09 Thread Paul E. McKenney
On Mon, Jun 08, 2020 at 02:57:17PM +0200, Frederic Weisbecker wrote: > On Thu, Jun 04, 2020 at 09:36:55AM -0700, Paul E. McKenney wrote: > > On Thu, Jun 04, 2020 at 01:41:22PM +0200, Frederic Weisbecker wrote: > > > On Fri, May 22, 2020 at 10:57:39AM -0700, Paul E. McKenney wrote: > > > > On Wed,

[PATCH 5.4 06/34] net: usb: qmi_wwan: add Telit LE910C1-EUX composition

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas [ Upstream commit 591612aa578cd7148b7b9d74869ef40118978389 ] Add support for Telit LE910C1-EUX composition 0x1031: tty, tty, tty, rmnet Signed-off-by: Daniele Palmas Acked-by: Bjørn Mork Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman ---

[PATCH 5.4 02/34] l2tp: add sk_family checks to l2tp_validate_socket

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit d9a81a225277686eb629938986d97629ea102633 ] syzbot was able to trigger a crash after using an ISDN socket and fool l2tp. Fix this by making sure the UDP socket is of the proper family. BUG: KASAN: slab-out-of-bounds in setup_udp_tunnel_sock+0x465/0x540

Re: [RFC PATCH 0/2] TAS2563 DSP Firmware Loader

2020-06-09 Thread Mark Brown
On Tue, Jun 09, 2020 at 12:28:39PM -0500, Dan Murphy wrote: > These programs and configurations are selectable via files under the I2C dev > node. There may be a better way to select this through ALSA controls but I > was > unable to find a good example of this. This is why this is an RFC

[PATCH 5.6 19/41] USB: serial: usb_wwan: do not resubmit rx urb on fatal errors

2020-06-09 Thread Greg Kroah-Hartman
From: Bin Liu commit 986c1748c84d7727defeaeca74a73b37f7d5cce1 upstream. usb_wwan_indat_callback() shouldn't resubmit rx urb if the previous urb status is a fatal error. Or the usb controller would keep processing the new urbs then run into interrupt storm, and has no chance to recover. Fixes:

[PATCH 5.6 08/41] NFC: st21nfca: add missed kfree_skb() in an error path

2020-06-09 Thread Greg Kroah-Hartman
From: Chuhong Yuan [ Upstream commit 3decabdc714ca56c944f4669b4cdec5c2c1cea23 ] st21nfca_tm_send_atr_res() misses to call kfree_skb() in an error path. Add the missed function call to fix it. Fixes: 1892bf844ea0 ("NFC: st21nfca: Adding P2P support to st21nfca in Initiator & Target mode")

[PATCH 5.4 09/34] vsock: fix timeout in vsock_accept()

2020-06-09 Thread Greg Kroah-Hartman
From: Stefano Garzarella [ Upstream commit 7e0afbdfd13d1e708fe96e31c46c4897101a6a43 ] The accept(2) is an "input" socket interface, so we should use SO_RCVTIMEO instead of SO_SNDTIMEO to set the timeout. So this patch replace sock_sndtimeo() with sock_rcvtimeo() to use the right timeout in the

[PATCH 5.4 08/34] nfp: flower: fix used time of merge flow statistics

2020-06-09 Thread Greg Kroah-Hartman
From: Heinrich Kuhn [ Upstream commit 5b186cd60f033110960a3db424ffbd6de4cee528 ] Prior to this change the correct value for the used counter is calculated but not stored nor, therefore, propagated to user-space. In use-cases such as OVS use-case at least this results in active flows being

[PATCH 5.6 25/41] iio:chemical:pms7003: Fix timestamp alignment and prevent data leak.

2020-06-09 Thread Greg Kroah-Hartman
From: Jonathan Cameron commit 13e945631c2ffb946c0af342812a3cd39227de6e upstream. One of a class of bugs pointed out by Lars in a recent review. iio_push_to_buffers_with_timestamp assumes the buffer used is aligned to the size of the timestamp (8 bytes). This is not guaranteed in this driver

[PATCH 5.6 18/41] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc:

[PATCH 5.6 21/41] USB: serial: ch341: add basis for quirk detection

2020-06-09 Thread Greg Kroah-Hartman
From: Michael Hanselmann commit c404bf4aa9236cb4d1068e499ae42acf48a6ff97 upstream. A subset of CH341 devices does not support all features, namely the prescaler is limited to a reduced precision and there is no support for sending a RS232 break condition. This patch adds a detection function

[PATCH 5.6 23/41] iio:chemical:sps30: Fix timestamp alignment

2020-06-09 Thread Greg Kroah-Hartman
From: Jonathan Cameron commit a5bf6fdd19c327bcfd9073a8740fa19ca4525fd4 upstream. One of a class of bugs pointed out by Lars in a recent review. iio_push_to_buffers_with_timestamp assumes the buffer used is aligned to the size of the timestamp (8 bytes). This is not guaranteed in this driver

[PATCH 5.6 26/41] iio: adc: stm32-adc: fix a wrong error message when probing interrupts

2020-06-09 Thread Greg Kroah-Hartman
From: Fabrice Gasnier commit 10134ec3f8cefa6a40fe84987f1795e9e0da9715 upstream. A wrong error message is printed out currently, like on STM32MP15: - stm32-adc-core 48003000.adc: IRQ index 2 not found. This is seen since commit 7723f4c5ecdb ("driver core: platform: Add an error message to

[PATCH 5.6 09/41] nfp: flower: fix used time of merge flow statistics

2020-06-09 Thread Greg Kroah-Hartman
From: Heinrich Kuhn [ Upstream commit 5b186cd60f033110960a3db424ffbd6de4cee528 ] Prior to this change the correct value for the used counter is calculated but not stored nor, therefore, propagated to user-space. In use-cases such as OVS use-case at least this results in active flows being

[PATCH 5.6 27/41] usb: musb: start session in resume for host port

2020-06-09 Thread Greg Kroah-Hartman
From: Bin Liu commit 7f88a5ac393f39319f69b8b20cc8d5759878d1a1 upstream. Commit 17539f2f4f0b ("usb: musb: fix enumeration after resume") replaced musb_start() in musb_resume() to not override softconnect bit, but it doesn't restart the session for host port which was done in musb_start(). The

Re: [PATCH v11 5/6] ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods

2020-06-09 Thread Vaibhav Jain
Thanks Dan for the consideration and taking time to look into this. My responses below: Dan Williams writes: > On Mon, Jun 8, 2020 at 5:16 PM kernel test robot wrote: >> >> Hi Vaibhav, >> >> Thank you for the patch! Perhaps something to improve: >> >> [auto build test WARNING on powerpc/next]

[PATCH 5.4 27/34] x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2

2020-06-09 Thread Greg Kroah-Hartman
From: Tony W Wang-oc commit 1e41a766c98b481400ab8c5a7aa8ea63a1bb03de upstream. New Zhaoxin family 7 CPUs are not affected by SPECTRE_V2. So define a separate cpu_vuln_whitelist bit NO_SPECTRE_V2 and add these CPUs to the cpu vulnerability whitelist. Signed-off-by: Tony W Wang-oc

[PATCH 5.6 28/41] usb: musb: Fix runtime PM imbalance on error

2020-06-09 Thread Greg Kroah-Hartman
From: Dinghao Liu commit e4befc121df03dc8ed2ac1031c98f9538e244bae upstream. When copy_from_user() returns an error code, there is a runtime PM usage counter imbalance. Fix this by moving copy_from_user() to the beginning of this function. Fixes: 7b6c1b4c0e1e ("usb: musb: fix runtime PM in

[PATCH 5.6 33/41] CDC-ACM: heed quirk also in error handling

2020-06-09 Thread Greg Kroah-Hartman
From: Oliver Neukum commit 97fe809934dd2b0b37dfef3a2fc70417f485d7af upstream. If buffers are iterated over in the error case, the lower limits for quirky devices must be heeded. Signed-off-by: Oliver Neukum Reported-by: Jean Rene Dawin Fixes: a4e7279cd1d19 ("cdc-acm: introduce a cool down")

[PATCH 5.6 31/41] tty: hvc_console, fix crashes on parallel open/close

2020-06-09 Thread Greg Kroah-Hartman
From: Jiri Slaby commit 24eb2377f977fe06d84fca558f891f95bc28a449 upstream. hvc_open sets tty->driver_data to NULL when open fails at some point. Typically, the failure happens in hp->ops->notifier_add(). If there is a racing process which tries to open such mangled tty, which was not closed

[PATCH 5.6 34/41] nvmem: qfprom: remove incorrect write support

2020-06-09 Thread Greg Kroah-Hartman
From: Srinivas Kandagatla commit 8d9eb0d6d59a5d7028c80a30831143d3e75515a7 upstream. qfprom has different address spaces for read and write. Reads are always done from corrected address space, where as writes are done on raw address space. Writing to corrected address space is invalid and

[PATCH 5.6 30/41] vt: keyboard: avoid signed integer overflow in k_ascii

2020-06-09 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit b86dab054059b970111b5516ae548efaae5b3aae upstream. When k_ascii is invoked several times in a row there is a potential for signed integer overflow: UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow: 10 * 11 cannot be

[PATCH 5.6 12/41] vsock: fix timeout in vsock_accept()

2020-06-09 Thread Greg Kroah-Hartman
From: Stefano Garzarella [ Upstream commit 7e0afbdfd13d1e708fe96e31c46c4897101a6a43 ] The accept(2) is an "input" socket interface, so we should use SO_RCVTIMEO instead of SO_SNDTIMEO to set the timeout. So this patch replace sock_sndtimeo() with sock_rcvtimeo() to use the right timeout in the

[PATCH v4] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-06-09 Thread Brendan Shanks
Add emulation/spoofing of SLDT and STR for both 32- and 64-bit processes. Wine users have found a small number of Windows apps using SLDT that were crashing when run on UMIP-enabled systems. Reported-by: Andreas Rammhold Originally-by: Ricardo Neri Signed-off-by: Brendan Shanks --- v4: Use

[PATCH 5.6 16/41] net/sched: fix infinite loop in sch_fq_pie

2020-06-09 Thread Greg Kroah-Hartman
From: Davide Caratti [ Upstream commit bb2f930d6dd708469a587dc9ed1efe1ef969c0bf ] this command hangs forever: # tc qdisc add dev eth0 root fq_pie flows 65536 watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [tc:1028] [...] CPU: 1 PID: 1028 Comm: tc Not tainted 5.7.0-rc6+ #167 RIP:

[PATCH 5.6 10/41] sctp: check assoc before SCTP_ADDR_{MADE_PRIM, ADDED} event

2020-06-09 Thread Greg Kroah-Hartman
From: Jonas Falkevik [ Upstream commit 45ebf73ebcec88a34a778f5feaa0b82b1c76069e ] Make sure SCTP_ADDR_{MADE_PRIM,ADDED} are sent only for associations that have been established. These events are described in rfc6458#section-6.1 SCTP_PEER_ADDR_CHANGE: This tag indicates that an address that is

[PATCH 5.6 11/41] virtio_vsock: Fix race condition in virtio_transport_recv_pkt

2020-06-09 Thread Greg Kroah-Hartman
From: Jia He [ Upstream commit 8692cefc433f282228fd44938dd4d26ed38254a2 ] When client on the host tries to connect(SOCK_STREAM, O_NONBLOCK) to the server on the guest, there will be a panic on a ThunderX2 (armv8a server): [ 463.718844] Unable to handle kernel NULL pointer dereference at

[PATCH 5.6 39/41] x86/speculation: Add Ivy Bridge to affected list

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 3798cc4d106e91382bfe016caa2edada27c2bb3f upstream Make the docs match the code. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst | 7

[PATCH 5.6 40/41] uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned

2020-06-09 Thread Greg Kroah-Hartman
From: Oleg Nesterov commit 013b2deba9a6b80ca02f4fafd7dedf875e9b4450 upstream. uprobe_write_opcode() must not cross page boundary; prepare_uprobe() relies on arch_uprobe_analyze_insn() which should validate "vaddr" but some architectures (csky, s390, and sparc) don't do this. We can remove the

[PATCH 5.7 02/24] USB: serial: usb_wwan: do not resubmit rx urb on fatal errors

2020-06-09 Thread Greg Kroah-Hartman
From: Bin Liu commit 986c1748c84d7727defeaeca74a73b37f7d5cce1 upstream. usb_wwan_indat_callback() shouldn't resubmit rx urb if the previous urb status is a fatal error. Or the usb controller would keep processing the new urbs then run into interrupt storm, and has no chance to recover. Fixes:

[PATCH 5.6 41/41] Revert "net/mlx5: Annotate mutex destroy for root ns"

2020-06-09 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 9b035b08e7e5fe7b2e75636324edf41ee30c5f94 which is commit 9ca415399dae133b00273a4283ef31d003a6818d upstream. It was backported incorrectly, Paul writes at: https://lore.kernel.org/r/20200607203425.gd23...@windriver.com I happened to

[PATCH 5.7 11/24] usb: musb: Fix runtime PM imbalance on error

2020-06-09 Thread Greg Kroah-Hartman
From: Dinghao Liu commit e4befc121df03dc8ed2ac1031c98f9538e244bae upstream. When copy_from_user() returns an error code, there is a runtime PM usage counter imbalance. Fix this by moving copy_from_user() to the beginning of this function. Fixes: 7b6c1b4c0e1e ("usb: musb: fix runtime PM in

[PATCH 5.4 23/34] tty: hvc_console, fix crashes on parallel open/close

2020-06-09 Thread Greg Kroah-Hartman
From: Jiri Slaby commit 24eb2377f977fe06d84fca558f891f95bc28a449 upstream. hvc_open sets tty->driver_data to NULL when open fails at some point. Typically, the failure happens in hp->ops->notifier_add(). If there is a racing process which tries to open such mangled tty, which was not closed

[PATCH 5.7 10/24] usb: musb: start session in resume for host port

2020-06-09 Thread Greg Kroah-Hartman
From: Bin Liu commit 7f88a5ac393f39319f69b8b20cc8d5759878d1a1 upstream. Commit 17539f2f4f0b ("usb: musb: fix enumeration after resume") replaced musb_start() in musb_resume() to not override softconnect bit, but it doesn't restart the session for host port which was done in musb_start(). The

[PATCH 5.7 06/24] iio:chemical:sps30: Fix timestamp alignment

2020-06-09 Thread Greg Kroah-Hartman
From: Jonathan Cameron commit a5bf6fdd19c327bcfd9073a8740fa19ca4525fd4 upstream. One of a class of bugs pointed out by Lars in a recent review. iio_push_to_buffers_with_timestamp assumes the buffer used is aligned to the size of the timestamp (8 bytes). This is not guaranteed in this driver

[PATCH 5.7 07/24] iio: vcnl4000: Fix i2c swapped word reading.

2020-06-09 Thread Greg Kroah-Hartman
From: Mathieu Othacehe commit 18dfb5326370991c81a6d1ed6d1aeee055cb8c05 upstream. The bytes returned by the i2c reading need to be swapped unconditionally. Otherwise, on be16 platforms, an incorrect value will be returned. Taking the slow path via next merge window as its been around a while

[PATCH 5.6 04/41] net: check untrusted gso_size at kernel entry

2020-06-09 Thread Greg Kroah-Hartman
From: Willem de Bruijn [ Upstream commit 6dd912f82680761d8fb6b1bb274a69d4c7010988 ] Syzkaller again found a path to a kernel crash through bad gso input: a packet with gso size exceeding len. These packets are dropped in tcp_gso_segment and udp[46]_ufo_fragment. But they may affect gso size

[PATCH 5.6 02/41] l2tp: add sk_family checks to l2tp_validate_socket

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit d9a81a225277686eb629938986d97629ea102633 ] syzbot was able to trigger a crash after using an ISDN socket and fool l2tp. Fix this by making sure the UDP socket is of the proper family. BUG: KASAN: slab-out-of-bounds in setup_udp_tunnel_sock+0x465/0x540

[PATCH 5.7 09/24] iio: adc: stm32-adc: fix a wrong error message when probing interrupts

2020-06-09 Thread Greg Kroah-Hartman
From: Fabrice Gasnier commit 10134ec3f8cefa6a40fe84987f1795e9e0da9715 upstream. A wrong error message is printed out currently, like on STM32MP15: - stm32-adc-core 48003000.adc: IRQ index 2 not found. This is seen since commit 7723f4c5ecdb ("driver core: platform: Add an error message to

Re: [RFC PATCH 1/2] dt-bindings: tas2562: Add firmware support for tas2563

2020-06-09 Thread Mark Brown
On Tue, Jun 09, 2020 at 12:35:50PM -0500, Dan Murphy wrote: > On 6/9/20 12:31 PM, Mark Brown wrote: > > Why not just use a standard name for the firmware? If the firmwares > > vary per-board then building it using the machine compatible (or DMI > > info) could handle that, with a fallback to a

[PATCH 5.6 03/41] l2tp: do not use inet_hash()/inet_unhash()

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 02c71b144c811bcdd865e0a1226d0407d11357e8 ] syzbot recently found a way to crash the kernel [1] Issue here is that inet_hash() & inet_unhash() are currently only meant to be used by TCP & DCCP, since only these protocols provide the needed hashinfo pointer.

[PATCH 5.7 05/24] USB: serial: ch341: fix lockup of devices with limited prescaler

2020-06-09 Thread Greg Kroah-Hartman
From: Johan Hovold commit c432df155919582a3cefa35a8f86256c830fa9a4 upstream. Michael Hanselmann reports that [a] subset of all CH341 devices stop responding to bulk transfers, usually after the third byte, when the highest prescaler bit (0b100) is set. There is one

[PATCH 5.7 13/24] serial: 8250: Enable 16550A variants by default on non-x86

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Triplett commit 15a3f03d5ec0118f1e5db3fc1018686e72744e37 upstream. Some embedded devices still use these serial ports; make sure they're still enabled by default on architectures more likely to have them, to avoid rendering someone's console unavailable. Reported-by: Vladimir Oltean

[PATCH 5.7 14/24] vt: keyboard: avoid signed integer overflow in k_ascii

2020-06-09 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit b86dab054059b970111b5516ae548efaae5b3aae upstream. When k_ascii is invoked several times in a row there is a potential for signed integer overflow: UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow: 10 * 11 cannot be

[PATCH 5.7 23/24] x86/speculation: Add Ivy Bridge to affected list

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 3798cc4d106e91382bfe016caa2edada27c2bb3f upstream Make the docs match the code. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst | 7

[PATCH 5.7 21/24] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED.

[PATCH 5.7 15/24] tty: hvc_console, fix crashes on parallel open/close

2020-06-09 Thread Greg Kroah-Hartman
From: Jiri Slaby commit 24eb2377f977fe06d84fca558f891f95bc28a449 upstream. hvc_open sets tty->driver_data to NULL when open fails at some point. Typically, the failure happens in hp->ops->notifier_add(). If there is a racing process which tries to open such mangled tty, which was not closed

[PATCH 5.6 35/41] x86/cpu: Add a steppings field to struct x86_cpu_id

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit e9d7144597b10ff13ff2264c059f7d4a7fbc89ac upstream Intel uses the same family/model for several CPUs. Sometimes the stepping must be checked to tell them apart. On x86 there can be at most 16 steppings. Add a steppings bitmask to x86_cpu_id and a

[PATCH 5.7 03/24] USB: serial: option: add Telit LE910C1-EUX compositions

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas commit 399ad9477c523f721f8e51d4f824bdf7267f120c upstream. Add Telit LE910C1-EUX compositions: 0x1031: tty, tty, tty, rmnet 0x1033: tty, tty, tty, ecm Signed-off-by: Daniele Palmas Link: https://lore.kernel.org/r/20200525211106.27338-1-dnl...@gmail.com Cc:

[PATCH 5.7 12/24] usb: musb: jz4740: Prevent lockup when CONFIG_SMP is set

2020-06-09 Thread Greg Kroah-Hartman
From: Paul Cercueil commit 685f5f24108a5f3481da70ee75a1b18b9de34257 upstream. The function dma_controller_irq() locks up the exact same spinlock we locked before calling it, which obviously resulted in a deadlock when CONFIG_SMP was enabled. This flew under the radar as none of the boards

[PATCH 5.6 24/41] iio: vcnl4000: Fix i2c swapped word reading.

2020-06-09 Thread Greg Kroah-Hartman
From: Mathieu Othacehe commit 18dfb5326370991c81a6d1ed6d1aeee055cb8c05 upstream. The bytes returned by the i2c reading need to be swapped unconditionally. Otherwise, on be16 platforms, an incorrect value will be returned. Taking the slow path via next merge window as its been around a while

[PATCH 5.7 17/24] CDC-ACM: heed quirk also in error handling

2020-06-09 Thread Greg Kroah-Hartman
From: Oliver Neukum commit 97fe809934dd2b0b37dfef3a2fc70417f485d7af upstream. If buffers are iterated over in the error case, the lower limits for quirky devices must be heeded. Signed-off-by: Oliver Neukum Reported-by: Jean Rene Dawin Fixes: a4e7279cd1d19 ("cdc-acm: introduce a cool down")

[PATCH 5.7 16/24] staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK

2020-06-09 Thread Greg Kroah-Hartman
From: Pascal Terjan commit 15ea976a1f12b5fd76b1bd6ff3eb5132fd28047f upstream. The value in shared headers was fixed 9 years ago in commit 8d661f1e462d ("ieee80211: correct IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK macro") and while looking at using shared headers for other duplicated constants I

[PATCH 5.6 15/41] mptcp: fix unblocking connect()

2020-06-09 Thread Greg Kroah-Hartman
From: Paolo Abeni [ Upstream commit 41be81a8d3d09acb9033799938306349328861f9 ] Currently unblocking connect() on MPTCP sockets fails frequently. If mptcp_stream_connect() is invoked to complete a previously attempted unblocking connection, it will still try to create the first subflow via

Re: [PATCH] KVM: nVMX: Wrap VM-Fail valid path in generic VM-Fail helper

2020-06-09 Thread Jim Mattson
On Mon, Jun 8, 2020 at 6:56 PM Sean Christopherson wrote: > > Add nested_vmx_fail() to wrap VM-Fail paths that _may_ result in VM-Fail > Valid to make it clear at the call sites that the Valid flavor isn't > guaranteed. > > Suggested-by: Vitaly Kuznetsov > Signed-off-by: Sean Christopherson

[PATCH 5.6 07/41] net: usb: qmi_wwan: add Telit LE910C1-EUX composition

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas [ Upstream commit 591612aa578cd7148b7b9d74869ef40118978389 ] Add support for Telit LE910C1-EUX composition 0x1031: tty, tty, tty, rmnet Signed-off-by: Daniele Palmas Acked-by: Bjørn Mork Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman ---

[PATCH 5.6 14/41] net: dsa: felix: send VLANs on CPU port as egress-tagged

2020-06-09 Thread Greg Kroah-Hartman
From: Vladimir Oltean [ Upstream commit 183be6f967fe37c3154bfac39e913c3bafe89d1b ] As explained in other commits before (b9cd75e66895 and 87b0f983f66f), ocelot switches have a single egress-untagged VLAN per port, and the driver would deny adding a second one while an egress-untagged VLAN

Re: [PATCH v3 1/7] Documentation: dynamic-debug: Add description of level bitmask

2020-06-09 Thread Joe Perches
On Tue, 2020-06-09 at 18:42 +0100, Edward Cree wrote: > On 09/06/2020 17:58, Joe Perches wrote: > > On Tue, 2020-06-09 at 13:16 +0200, Greg Kroah-Hartman wrote: > > > What is wrong with the existing control of dynamic > > > debug messages that you want to add another type of arbitrary grouping > >

[PATCH 5.7 19/24] x86/cpu: Add a steppings field to struct x86_cpu_id

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit e9d7144597b10ff13ff2264c059f7d4a7fbc89ac upstream Intel uses the same family/model for several CPUs. Sometimes the stepping must be checked to tell them apart. On x86 there can be at most 16 steppings. Add a steppings bitmask to x86_cpu_id and a

[PATCH 5.7 20/24] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov

[PATCH 5.7 18/24] nvmem: qfprom: remove incorrect write support

2020-06-09 Thread Greg Kroah-Hartman
From: Srinivas Kandagatla commit 8d9eb0d6d59a5d7028c80a30831143d3e75515a7 upstream. qfprom has different address spaces for read and write. Reads are always done from corrected address space, where as writes are done on raw address space. Writing to corrected address space is invalid and

[PATCH 5.7 08/24] iio:chemical:pms7003: Fix timestamp alignment and prevent data leak.

2020-06-09 Thread Greg Kroah-Hartman
From: Jonathan Cameron commit 13e945631c2ffb946c0af342812a3cd39227de6e upstream. One of a class of bugs pointed out by Lars in a recent review. iio_push_to_buffers_with_timestamp assumes the buffer used is aligned to the size of the timestamp (8 bytes). This is not guaranteed in this driver

[PATCH 5.7 04/24] USB: serial: ch341: add basis for quirk detection

2020-06-09 Thread Greg Kroah-Hartman
From: Michael Hanselmann commit c404bf4aa9236cb4d1068e499ae42acf48a6ff97 upstream. A subset of CH341 devices does not support all features, namely the prescaler is limited to a reduced precision and there is no support for sending a RS232 break condition. This patch adds a detection function

[PATCH 5.7 01/24] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc:

[PATCH 5.7 00/24] 5.7.2-rc1 review

2020-06-09 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.7.2 release. There are 24 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 11 Jun 2020 17:41:38 +. Anything

[PATCH 5.7 24/24] uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned

2020-06-09 Thread Greg Kroah-Hartman
From: Oleg Nesterov commit 013b2deba9a6b80ca02f4fafd7dedf875e9b4450 upstream. uprobe_write_opcode() must not cross page boundary; prepare_uprobe() relies on arch_uprobe_analyze_insn() which should validate "vaddr" but some architectures (csky, s390, and sparc) don't do this. We can remove the

[PATCH 5.7 22/24] x86/speculation: Add SRBDS vulnerability and mitigation documentation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream Add documentation for the SRBDS vulnerability and its mitigation. [ bp: Massage. jpoimboe: sysfs table strings. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Reviewed-by: Tony Luck Reviewed-by: Josh

[PATCH 5.6 38/41] x86/speculation: Add SRBDS vulnerability and mitigation documentation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream Add documentation for the SRBDS vulnerability and its mitigation. [ bp: Massage. jpoimboe: sysfs table strings. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Reviewed-by: Tony Luck Reviewed-by: Josh

[PATCH 5.6 32/41] staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK

2020-06-09 Thread Greg Kroah-Hartman
From: Pascal Terjan commit 15ea976a1f12b5fd76b1bd6ff3eb5132fd28047f upstream. The value in shared headers was fixed 9 years ago in commit 8d661f1e462d ("ieee80211: correct IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK macro") and while looking at using shared headers for other duplicated constants I

[PATCH 5.6 13/41] net: be more gentle about silly gso requests coming from user

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 7c6d2ecbda83150b2036a2b36b21381ad4667762 ] Recent change in virtio_net_hdr_to_skb() broke some packetdrill tests. When --mss=XXX option is set, packetdrill always provide gso_type & gso_size for its inbound packets, regardless of packet size. if

[PATCH 5.6 37/41] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED.

[PATCH 5.6 36/41] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov

[PATCH 5.6 06/41] net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a

2020-06-09 Thread Greg Kroah-Hartman
From: Fugang Duan [ Upstream commit f2fb6b6275eba9d312957ca44c487bd780da6169 ] For rx filter 'HWTSTAMP_FILTER_PTP_V2_EVENT', it should be PTP v2/802.AS1, any layer, any kind of event packet, but HW only take timestamp snapshot for below PTP message: sync, Pdelay_req, Pdelay_resp. Then it

[PATCH 5.6 20/41] USB: serial: option: add Telit LE910C1-EUX compositions

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas commit 399ad9477c523f721f8e51d4f824bdf7267f120c upstream. Add Telit LE910C1-EUX compositions: 0x1031: tty, tty, tty, rmnet 0x1033: tty, tty, tty, ecm Signed-off-by: Daniele Palmas Link: https://lore.kernel.org/r/20200525211106.27338-1-dnl...@gmail.com Cc:

[PATCH 5.6 05/41] net/mlx5: Fix crash upon suspend/resume

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Bloch [ Upstream commit 8fc3e29be9248048f449793502c15af329f35c6e ] Currently a Linux system with the mlx5 NIC always crashes upon hibernation - suspend/resume. Add basic callbacks so the NIC could be suspended and resumed. Fixes: 9603b61de1ee ("mlx5: Move pci device handling from

Re: [PATCH v6 6/6] blktrace: fix debugfs use after free

2020-06-09 Thread Luis Chamberlain
On Tue, Jun 09, 2020 at 10:32:18AM -0700, Christoph Hellwig wrote: > On Tue, Jun 09, 2020 at 05:29:22PM +, Luis Chamberlain wrote: > > Is scsi-generic is the only unwanted ugly child blktrace has to deal > > with? For some reason I thought drivers/md/md.c was one but it seems > > like it is

[PATCH 5.6 17/41] net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta()

2020-06-09 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso [ Upstream commit a683012a8e77675a1947cc8f11f97cdc1d5bb769 ] The drivers reports EINVAL to userspace through netlink on invalid meta match. This is confusing since EINVAL is usually reserved for malformed netlink messages. Replace it by more meaningful codes. Fixes:

[PATCH 5.6 29/41] serial: 8250: Enable 16550A variants by default on non-x86

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Triplett commit 15a3f03d5ec0118f1e5db3fc1018686e72744e37 upstream. Some embedded devices still use these serial ports; make sure they're still enabled by default on architectures more likely to have them, to avoid rendering someone's console unavailable. Reported-by: Vladimir Oltean

[PATCH 5.6 22/41] USB: serial: ch341: fix lockup of devices with limited prescaler

2020-06-09 Thread Greg Kroah-Hartman
From: Johan Hovold commit c432df155919582a3cefa35a8f86256c830fa9a4 upstream. Michael Hanselmann reports that [a] subset of all CH341 devices stop responding to bulk transfers, usually after the third byte, when the highest prescaler bit (0b100) is set. There is one

[PATCH 5.4 21/34] usb: musb: Fix runtime PM imbalance on error

2020-06-09 Thread Greg Kroah-Hartman
From: Dinghao Liu commit e4befc121df03dc8ed2ac1031c98f9538e244bae upstream. When copy_from_user() returns an error code, there is a runtime PM usage counter imbalance. Fix this by moving copy_from_user() to the beginning of this function. Fixes: 7b6c1b4c0e1e ("usb: musb: fix runtime PM in

[PATCH 5.4 15/34] USB: serial: ch341: add basis for quirk detection

2020-06-09 Thread Greg Kroah-Hartman
From: Michael Hanselmann commit c404bf4aa9236cb4d1068e499ae42acf48a6ff97 upstream. A subset of CH341 devices does not support all features, namely the prescaler is limited to a reduced precision and there is no support for sending a RS232 break condition. This patch adds a detection function

[PATCH 5.4 19/34] iio: adc: stm32-adc: fix a wrong error message when probing interrupts

2020-06-09 Thread Greg Kroah-Hartman
From: Fabrice Gasnier commit 10134ec3f8cefa6a40fe84987f1795e9e0da9715 upstream. A wrong error message is printed out currently, like on STM32MP15: - stm32-adc-core 48003000.adc: IRQ index 2 not found. This is seen since commit 7723f4c5ecdb ("driver core: platform: Add an error message to

[PATCH 5.4 34/34] Revert "net/mlx5: Annotate mutex destroy for root ns"

2020-06-09 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 3f4f034a8676e366857861e76c3ad11ae059b2fb which is commit 9ca415399dae133b00273a4283ef31d003a6818d upstream. It was backported incorrectly, Paul writes at: https://lore.kernel.org/r/20200607203425.gd23...@windriver.com I happened to

[PATCH 5.4 29/34] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov

[PATCH 5.4 24/34] staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK

2020-06-09 Thread Greg Kroah-Hartman
From: Pascal Terjan commit 15ea976a1f12b5fd76b1bd6ff3eb5132fd28047f upstream. The value in shared headers was fixed 9 years ago in commit 8d661f1e462d ("ieee80211: correct IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK macro") and while looking at using shared headers for other duplicated constants I

[PATCH 5.4 30/34] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED.

[PATCH 5.4 17/34] iio: vcnl4000: Fix i2c swapped word reading.

2020-06-09 Thread Greg Kroah-Hartman
From: Mathieu Othacehe commit 18dfb5326370991c81a6d1ed6d1aeee055cb8c05 upstream. The bytes returned by the i2c reading need to be swapped unconditionally. Otherwise, on be16 platforms, an incorrect value will be returned. Taking the slow path via next merge window as its been around a while

[PATCH 5.4 33/34] uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned

2020-06-09 Thread Greg Kroah-Hartman
From: Oleg Nesterov commit 013b2deba9a6b80ca02f4fafd7dedf875e9b4450 upstream. uprobe_write_opcode() must not cross page boundary; prepare_uprobe() relies on arch_uprobe_analyze_insn() which should validate "vaddr" but some architectures (csky, s390, and sparc) don't do this. We can remove the

[PATCH 5.4 22/34] vt: keyboard: avoid signed integer overflow in k_ascii

2020-06-09 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit b86dab054059b970111b5516ae548efaae5b3aae upstream. When k_ascii is invoked several times in a row there is a potential for signed integer overflow: UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow: 10 * 11 cannot be

Re: [PATCH 1/1] tools: testing: ftrace: trigger: fix spelling mistake

2020-06-09 Thread Steven Rostedt
On Tue, 9 Jun 2020 18:38:53 +0200 Flavio Suligoi wrote: > Fix typo: "tigger" --> "trigger" Acked-by: Steven Rostedt (VMware) Shuah, want to take this patch? -- Steve > > Signed-off-by: Flavio Suligoi > --- > tools/testing/selftests/ftrace/test.d/trigger/trigger-hist.tc | 2 +- >

[PATCH 5.4 12/34] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc:

<    2   3   4   5   6   7   8   9   10   11   >