[PATCH 4.9 055/128] media: si2157: Better check for running tuner in init

2020-06-19 Thread Greg Kroah-Hartman
From: Brad Love [ Upstream commit e955f959ac52e145f27ff2be9078b646d0352af0 ] Getting the Xtal trim property to check if running is less error prone. Reset if_frequency if state is unknown. Replaces the previous "garbage check". Signed-off-by: Brad Love Signed-off-by: Sean Young

[PATCH 4.9 098/128] mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()

2020-06-19 Thread Greg Kroah-Hartman
From: Andrea Arcangeli commit c444eb564fb16645c172d550359cb3d75fe8a040 upstream. Write protect anon page faults require an accurate mapcount to decide if to break the COW or not. This is implemented in the THP path with reuse_swap_page() ->

[PATCH 4.9 099/128] ima: Fix ima digest hash table key calculation

2020-06-19 Thread Greg Kroah-Hartman
From: Krzysztof Struczynski commit 1129d31b55d509f15e72dc68e4b5c3a4d7b4da8d upstream. Function hash_long() accepts unsigned long, while currently only one byte is passed from ima_hash_key(), which calculates a key for ima_htable. Given that hashing the digest does not give clear benefits

[PATCH 4.9 102/128] ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max

2020-06-19 Thread Greg Kroah-Hartman
From: Harshad Shirwadkar commit c36a71b4e35ab35340facdd6964a00956b9fef0a upstream. If eh->eh_max is 0, EXT_MAX_EXTENT/INDEX would evaluate to unsigned (-1) resulting in illegal memory accesses. Although there is no consistent repro, we see that generic/019 sometimes crashes because of this bug.

[PATCH 4.9 108/128] carl9170: remove P2P_GO support

2020-06-19 Thread Greg Kroah-Hartman
From: Christian Lamparter commit b14fba7ebd04082f7767a11daea7f12f3593de22 upstream. This patch follows up on a bug-report by Frank Schäfer that discovered P2P GO wasn't working with wpa_supplicant. This patch removes part of the broken P2P GO support but keeps the vif switchover code in place.

[PATCH 4.9 101/128] evm: Fix possible memory leak in evm_calc_hmac_or_hash()

2020-06-19 Thread Greg Kroah-Hartman
From: Roberto Sassu commit 0c4395fb2aa77341269ea619c5419ea48171883f upstream. Don't immediately return if the signature is portable and security.ima is not present. Just set error so that memory allocated is freed before returning from evm_calc_hmac_or_hash(). Fixes: 50b977481fce9 ("EVM: Add

[PATCH 4.9 111/128] b43: Fix connection problem with WPA3

2020-06-19 Thread Greg Kroah-Hartman
From: Larry Finger commit 75d057bda1fbca6ade21378aa45db712e5f7d962 upstream. Since the driver was first introduced into the kernel, it has only handled the ciphers associated with WEP, WPA, and WPA2. It fails with WPA3 even though mac80211 can handle those additional ciphers in software, b43

Re: [PATCHv2 0/2] SBS battery PEC support

2020-06-19 Thread Sebastian Reichel
Hi, On Mon, Jun 08, 2020 at 08:23:05AM +0200, Marek Szyprowski wrote: > Hi Sebastian, > > On 06.06.2020 01:06, Sebastian Reichel wrote: > > Second try to enable PEC for SBS battery. Mainline currently > > has 3 different platforms using sbs-battery with an I2C driver > > not implementing

[PATCH 4.9 118/128] kernel/cpu_pm: Fix uninitted local in cpu_pm

2020-06-19 Thread Greg Kroah-Hartman
From: Douglas Anderson commit b5945214b76a1f22929481724ffd448000ede914 upstream. cpu_pm_notify() is basically a wrapper of notifier_call_chain(). notifier_call_chain() doesn't initialize *nr_calls to 0 before it starts incrementing it--presumably it's up to the callers to do this.

[PATCH 4.9 115/128] pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs

2020-06-19 Thread Greg Kroah-Hartman
From: Jonathan Bakker commit f354157a7d184db430c1a564c506434e33b1bec5 upstream. Currently, for EINT_TYPE GPIOs, the CON and FLTCON registers are saved and restored over a suspend/resume cycle. However, the EINT_MASK registers are not. On S5PV210 at the very least, these registers are not

[PATCH 4.9 116/128] sparc32: fix register window handling in genregs32_[gs]et()

2020-06-19 Thread Greg Kroah-Hartman
From: Al Viro commit cf51e129b96847f969bfb8af1ee1516a01a70b39 upstream. It needs access_process_vm() if the traced process does not share mm with the caller. Solution is similar to what sparc64 does. Note that genregs32_set() is only ever called with pos being 0 or 32 * sizeof(u32) (the latter

[PATCH 4.9 089/128] macvlan: Skip loopback packets in RX handler

2020-06-19 Thread Greg Kroah-Hartman
From: Alexander Sverdlin [ Upstream commit 81f3dc9349ce0bf7b8447f147f45e70f0a5b36a6 ] Ignore loopback-originatig packets soon enough and don't try to process L2 header where it doesn't exist. The very similar br_handle_frame() in bridge code performs exactly the same check. This is an example

[PATCH 4.9 117/128] sparc64: fix misuses of access_process_vm() in genregs32_[sg]et()

2020-06-19 Thread Greg Kroah-Hartman
From: Al Viro commit 142cd25293f6a7ecbdff4fb0af17de6438d46433 upstream. We do need access_process_vm() to access the target's reg_window. However, access to caller's memory (storing the result in genregs32_get(), fetching the new values in case of genregs32_set()) should be done by normal

[PATCH 4.9 105/128] blk-mq: move blk_mq_update_nr_hw_queues synchronize_rcu call

2020-06-19 Thread Greg Kroah-Hartman
From: Giuliano Procida This fixes the 4.9 backport commit f530afb974c2e82047bd6220303a2dbe30eff304 which was upstream commit f5e4d63577026f908a809f22f5fd5a90ea1f. The upstream commit added a call to synchronize_rcu to _blk_mq_update_nr_hw_queues, just after freezing queues. In the backport

[PATCH 4.9 094/128] mmc: sdhci-esdhc-imx: fix the mask for tuning start point

2020-06-19 Thread Greg Kroah-Hartman
From: Haibo Chen [ Upstream commit 1194be8c949b8190b2882ad8335a5d98aa50c735 ] According the RM, the bit[6~0] of register ESDHC_TUNING_CTRL is TUNING_START_TAP, bit[7] of this register is to disable the command CRC check for standard tuning. So fix it here. Fixes: d87fc9663688 ("mmc:

[PATCH 4.9 092/128] staging: greybus: sdio: Respect the cmd->busy_timeout from the mmc core

2020-06-19 Thread Greg Kroah-Hartman
From: Ulf Hansson [ Upstream commit a389087ee9f195fcf2f31cd771e9ec5f02c16650 ] Using a fixed 1s timeout for all commands is a bit problematic. For some commands it means waiting longer than needed for the timeout to expire, which may not a big issue, but still. For other commands, like for an

[PATCH 4.9 093/128] ixgbe: fix signed-integer-overflow warning

2020-06-19 Thread Greg Kroah-Hartman
From: Xie XiuQi [ Upstream commit 3b70683fc4d68f5d915d9dc7e5ba72c732c7315c ] ubsan report this warning, fix it by adding a unsigned suffix. UBSAN: signed-integer-overflow in drivers/net/ethernet/intel/ixgbe/ixgbe_common.c:2246:26 65535 * 65537 cannot be represented in type 'int' CPU: 21 PID: 7

[PATCH 4.9 087/128] x86/mm: Stop printing BRK addresses

2020-06-19 Thread Greg Kroah-Hartman
From: Arvind Sankar [ Upstream commit 67d631b7c05eff955ccff4139327f0f92a5117e5 ] This currently leaks kernel physical addresses into userspace. Signed-off-by: Arvind Sankar Signed-off-by: Borislav Petkov Acked-by: Kees Cook Acked-by: Dave Hansen Link:

[PATCH 4.9 095/128] spi: dw: Return any value retrieved from the dma_transfer callback

2020-06-19 Thread Greg Kroah-Hartman
From: Serge Semin [ Upstream commit f0410bbf7d0fb80149e3b17d11d31f5b5197873e ] DW APB SSI DMA-part of the driver may need to perform the requested SPI-transfer synchronously. In that case the dma_transfer() callback will return 0 as a marker of the SPI transfer being finished so the SPI core

Re: [PATCH v7 13/36] drm: msm: fix common struct sg_table related issues

2020-06-19 Thread Rob Clark
On Fri, Jun 19, 2020 at 3:37 AM Marek Szyprowski wrote: > > The Documentation/DMA-API-HOWTO.txt states that the dma_map_sg() function > returns the number of the created entries in the DMA address space. > However the subsequent calls to the dma_sync_sg_for_{device,cpu}() and > dma_unmap_sg must

[PATCH 4.9 127/128] perf probe: Do not show the skipped events

2020-06-19 Thread Greg Kroah-Hartman
From: Masami Hiramatsu commit f41ebe9defacddeae96a872a33f0f22ced0bfcef upstream. When a probe point is expanded to several places (like inlined) and if some of them are skipped because of blacklisted or __init function, those trace_events has no event name. It must be skipped while showing

Re: [PATCH] Ability to read the MKTME status from userspace

2020-06-19 Thread Greg Kroah-Hartman
On Fri, Jun 19, 2020 at 05:33:39PM +0100, Richard Hughes wrote: > On Fri, 19 Jun 2020 at 17:10, Borislav Petkov wrote: > > - do you just want to display feature support? > > Yes. I want to show the user *why* TME is not available. So even if it is "available" that's fine, even if it is not

[PATCH 4.9 128/128] perf symbols: Fix debuginfo search for Ubuntu

2020-06-19 Thread Greg Kroah-Hartman
From: Adrian Hunter commit 85afd35575a3c1a3a905722dde5ee70b49282e70 upstream. Reportedly, from 19.10 Ubuntu has begun mixing up the location of some debug symbol files, putting files expected to be in /usr/lib/debug/usr/lib into /usr/lib/debug/lib instead. Fix by adding another dso_binary_type.

[PATCH 4.9 125/128] mtd: rawnand: pasemi: Fix the probe error path

2020-06-19 Thread Greg Kroah-Hartman
From: Miquel Raynal commit f51466901c07e6930435d30b02a21f0841174f61 upstream. nand_cleanup() is supposed to be called on error after a successful call to nand_scan() to free all NAND resources. There is no real Fixes tag applying here as the use of nand_release() in this driver predates by far

[RFC PATCH 1/1] Add DM_CRYPT_FORCE_INLINE flag to dm-crypt target

2020-06-19 Thread Ignat Korchagin
Sometimes extra thread offloading imposed by dm-crypt hurts IO latency. This is especially visible on busy systems with many processes/threads. Moreover, most Crypto API implementaions are async, that is they offload crypto operations on their own, so this dm-crypt offloading is excessive. This

[PATCH 4.9 124/128] mtd: rawnand: brcmnand: fix hamming oob layout

2020-06-19 Thread Greg Kroah-Hartman
From: Álvaro Fernández Rojas commit 130bbde4809b011faf64f99dddc14b4b01f440c3 upstream. First 2 bytes are used in large-page nand. Fixes: ef5eeea6e911 ("mtd: nand: brcm: switch to mtd_ooblayout_ops") Cc: sta...@vger.kernel.org Signed-off-by: Álvaro Fernández Rojas Signed-off-by: Miquel Raynal

[PATCH 4.14 001/190] ipv6: fix IPV6_ADDRFORM operation logic

2020-06-19 Thread Greg Kroah-Hartman
From: Hangbin Liu [ Upstream commit 79a1f0ccdbb4ad700590f61b00525b390cb53905 ] Socket option IPV6_ADDRFORM supports UDP/UDPLITE and TCP at present. Previously the checking logic looks like: if (sk->sk_protocol == IPPROTO_UDP || sk->sk_protocol == IPPROTO_UDPLITE) do_some_check; else if

[PATCH 4.14 011/190] sched/fair: Dont NUMA balance for kthreads

2020-06-19 Thread Greg Kroah-Hartman
From: Jens Axboe [ Upstream commit 18f855e574d9799a0e7489f8ae6fd8447d0dd74a ] Stefano reported a crash with using SQPOLL with io_uring: BUG: kernel NULL pointer dereference, address: 03b0 CPU: 2 PID: 1307 Comm: io_uring-sq Not tainted 5.7.0-rc7 #11 RIP:

[RFC PATCH 0/1] dm-crypt excessive overhead

2020-06-19 Thread Ignat Korchagin
This is a follow up from the long-forgotten [1], but with some more convincing evidence. Consider the following script: #!/bin/bash -e # create 4G ramdisk sudo modprobe brd rd_nr=1 rd_size=4194304 # create a dm-crypt device with NULL cipher on top of /dev/ram0 echo '0 8388608 crypt

[PATCH 4.14 010/190] ARM: 8977/1: ptrace: Fix mask for thumb breakpoint hook

2020-06-19 Thread Greg Kroah-Hartman
From: Fredrik Strupe [ Upstream commit 3866f217aaa81bf7165c7f27362eee5d7919c496 ] call_undef_hook() in traps.c applies the same instr_mask for both 16-bit and 32-bit thumb instructions. If instr_mask then is only 16 bits wide (0x as opposed to 0x), the first half-word of 32-bit

[PATCH 4.9 123/128] sunrpc: clean up properly in gss_mech_unregister()

2020-06-19 Thread Greg Kroah-Hartman
From: NeilBrown commit 24c5efe41c29ee3e55bcf5a1c9f61ca8709622e8 upstream. gss_mech_register() calls svcauth_gss_register_pseudoflavor() for each flavour, but gss_mech_unregister() does not call auth_domain_put(). This is unbalanced and makes it impossible to reload the module. Change

[PATCH 4.14 014/190] powerpc/xive: Clear the page tables for the ESB IO mapping

2020-06-19 Thread Greg Kroah-Hartman
From: Cédric Le Goater [ Upstream commit a101950fcb78b0ba20cd487be6627dea58d55c2b ] Commit 1ca3dec2b2df ("powerpc/xive: Prevent page fault issues in the machine crash handler") fixed an issue in the FW assisted dump of machines using hash MMU and the XIVE interrupt mode under the POWER

[PATCH 4.14 003/190] make user_access_begin() do access_ok()

2020-06-19 Thread Greg Kroah-Hartman
From: Linus Torvalds commit 594cc251fdd0d231d342d88b2fdff4bc42fb0690 upstream. Originally, the rule used to be that you'd have to do access_ok() separately, and then user_access_begin() before actually doing the direct (optimized) user access. But experience has shown that people then decide

[PATCH 4.14 015/190] ath9k_htc: Silence undersized packet warnings

2020-06-19 Thread Greg Kroah-Hartman
From: Masashi Honma [ Upstream commit 450edd2805982d14ed79733a82927d2857b27cac ] Some devices like TP-Link TL-WN722N produces this kind of messages frequently. kernel: ath: phy0: Short RX data len, dropping (dlen: 4) This warning is useful for developers to recognize that the device (Wi-Fi

Re: [PATCH 4.4 000/101] 4.4.228-rc1 review

2020-06-19 Thread Guenter Roeck
On Fri, Jun 19, 2020 at 04:31:49PM +0200, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.4.228 release. > There are 101 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me

[tip: x86/urgent] x86/asm/64: Align start of __clear_user() loop to 16-bytes

2020-06-19 Thread tip-bot2 for Matt Fleming
The following commit has been merged into the x86/urgent branch of tip: Commit-ID: bb5570ad3b54e7930997aec76ab68256d5236d94 Gitweb: https://git.kernel.org/tip/bb5570ad3b54e7930997aec76ab68256d5236d94 Author:Matt Fleming AuthorDate:Thu, 18 Jun 2020 11:20:02 +01:00

[PATCH 4.14 019/190] x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs

2020-06-19 Thread Greg Kroah-Hartman
From: Xiaochun Lee commit 1574051e52cb4b5b7f7509cfd729b76ca1117808 upstream. The Intel C620 Platform Controller Hub has MROM functions that have non-PCI registers (undocumented in the public spec) where BAR 0 is supposed to be, which results in messages like this: pci :00:11.0: [Firmware

[PATCH 4.14 016/190] perf probe: Accept the instance number of kretprobe event

2020-06-19 Thread Greg Kroah-Hartman
From: Masami Hiramatsu [ Upstream commit c6aab66a728b6518772c74bd9dff66e1a1c652fd ] Since the commit 6a13a0d7b4d1 ("ftrace/kprobe: Show the maxactive number on kprobe_events") introduced to show the instance number of kretprobe events, the length of the 1st format of the kprobe event will not

[PATCH 4.14 007/190] lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user()

2020-06-19 Thread Greg Kroah-Hartman
From: Christophe Leroy commit ab10ae1c3bef56c29bac61e1201c752221b87b41 upstream. The range passed to user_access_begin() by strncpy_from_user() and strnlen_user() starts at 'src' and goes up to the limit of userspace although reads will be limited by the 'count' param. On 32 bits powerpc

[PATCH 4.14 005/190] arch/openrisc: Fix issues with access_ok()

2020-06-19 Thread Greg Kroah-Hartman
From: Stafford Horne commit 9cb2feb4d21d97386eb25c7b67e2793efcc1e70a upstream. The commit 594cc251fdd0 ("make 'user_access_begin()' do 'access_ok()'") exposed incorrect implementations of access_ok() macro in several architectures. This change fixes 2 issues found in OpenRISC. OpenRISC was

[PATCH 4.14 042/190] x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.

2020-06-19 Thread Greg Kroah-Hartman
From: Anthony Steinhauser [ Upstream commit 4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf ] Currently, it is possible to enable indirect branch speculation even after it was force-disabled using the PR_SPEC_FORCE_DISABLE option. Moreover, the PR_GET_SPECULATION_CTRL command gives afterwards an

[PATCH 4.14 041/190] x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.

2020-06-19 Thread Greg Kroah-Hartman
From: Anthony Steinhauser [ Upstream commit 21998a351512eba4ed5969006f0c55882d995ada ] When STIBP is unavailable or enhanced IBRS is available, Linux force-disables the IBPB mitigation of Spectre-BTB even when simultaneous multithreading is disabled. While attempts to enable IBPB using

[PATCH 4.14 008/190] serial: imx: Fix handling of TC irq in combination with DMA

2020-06-19 Thread Greg Kroah-Hartman
From: Uwe Kleine-König commit 1866541492641c02874bf51f9d8712b5510f2c64 upstream. When using RS485 half duplex the Transmitter Complete irq is needed to determine the moment when the transmitter can be disabled. When using DMA this irq must only be enabled when DMA has completed to transfer all

[PATCH 4.14 025/190] ALSA: usb-audio: Fix inconsistent card PM state after resume

2020-06-19 Thread Greg Kroah-Hartman
From: Takashi Iwai commit 862b2509d157c629dd26d7ac6c6cdbf043d332eb upstream. When a USB-audio interface gets runtime-suspended via auto-pm feature, the driver suspends all functionality and increment chip->num_suspended_intf. Later on, when the system gets suspended to S3, the driver

[PATCH 4.14 036/190] kvm: x86: Fix L1TF mitigation for shadow MMU

2020-06-19 Thread Greg Kroah-Hartman
From: Kai Huang [ Upstream commit 61455bf26236e7f3d72705382a6437fdfd1bd0af ] Currently KVM sets 5 most significant bits of physical address bits reported by CPUID (boot_cpu_data.x86_phys_bits) for nonpresent or reserved bits SPTE to mitigate L1TF attack from guest when using shadow MMU. However

Re: [PATCH 1/2] net: qrtr: Migrate nameservice to kernel from userspace

2020-06-19 Thread Manivannan Sadhasivam
Hi, On 17 June 2020 12:18:06 AM IST, Qais Yousef wrote: >Hi Manivannan, David > >On 02/13/20 14:44, Manivannan Sadhasivam wrote: > >[...] > >> +trace_printk("advertising new server [%d:%x]@[%d:%d]\n", >> + srv->service, srv->instance, srv->node, srv->port); > >I can't tell

[PATCH 4.14 039/190] x86/speculation: Change misspelled STIPB to STIBP

2020-06-19 Thread Greg Kroah-Hartman
From: Waiman Long [ Upstream commit aa77bfb354c495fc4361199e63fc5765b9e1e783 ] STIBP stands for Single Thread Indirect Branch Predictors. The acronym, however, can be easily mis-spelled as STIPB. It is perhaps due to the presence of another related term - IBPB (Indirect Branch Predictor

[PATCH 4.14 043/190] spi: dw: fix possible race condition

2020-06-19 Thread Greg Kroah-Hartman
[ Upstream commit 66b19d762378785d1568b5650935205edfeb0503 ] It is possible to get an interrupt as soon as it is requested. dw_spi_irq does spi_controller_get_devdata(master) and expects it to be different than NULL. However, spi_controller_set_devdata() is called after request_irq(), resulting

[PATCH 4.14 027/190] ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()

2020-06-19 Thread Greg Kroah-Hartman
From: Qiushi Wu commit 4d8be4bc94f74bb7d096e1c2e44457b530d5a170 upstream. kobject_init_and_add() takes reference even when it fails. If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Previous commit "b8eb718348b8" fixed a

[PATCH 4.14 038/190] KVM: x86: only do L1TF workaround on affected processors

2020-06-19 Thread Greg Kroah-Hartman
From: Paolo Bonzini [ Upstream commit d43e2675e96fc6ae1a633b6a69d296394448cc32 ] KVM stores the gfn in MMIO SPTEs as a caching optimization. These are split in two parts, as in "[high 1 low]", to thwart any attempt to use these bits in an L1TF attack. This works as long as there are 5

[PATCH 4.14 047/190] spi: pxa2xx: Fix controller unregister order

2020-06-19 Thread Greg Kroah-Hartman
From: Lukas Wunner [ Upstream commit 32e5b57232c0411e7dea96625c415510430ac079 ] The PXA2xx SPI driver uses devm_spi_register_controller() on bind. As a consequence, on unbind, __device_release_driver() first invokes pxa2xx_spi_remove() before unregistering the SPI controller via

[PATCH 4.14 049/190] crypto: virtio: Fix use-after-free in virtio_crypto_skcipher_finalize_req()

2020-06-19 Thread Greg Kroah-Hartman
From: Longpeng(Mike) [ Upstream commit 8c855f0720ff006d75d0a2512c7f6c4f60ff60ee ] The system'll crash when the users insmod crypto/tcrypto.ko with mode=155 ( testing "authenc(hmac(sha1),cbc(aes))" ). It's caused by reuse the memory of request structure. In crypto_authenc_init_tfm(), the

[PATCH 4.14 028/190] ACPI: GED: add support for _Exx / _Lxx handler methods

2020-06-19 Thread Greg Kroah-Hartman
From: Ard Biesheuvel commit ea6f3af4c5e63f6981c0b0ab8ebec438e2d5ef40 upstream. Per the ACPI spec, interrupts in the range [0, 255] may be handled in AML using individual methods whose naming is based on the format _Exx or _Lxx, where xx is the hex representation of the interrupt index. Add

[PATCH 4.14 053/190] ovl: initialize error in ovl_copy_xattr

2020-06-19 Thread Greg Kroah-Hartman
From: Yuxuan Shui commit 520da69d265a91c6536c63851cbb8a53946974f0 upstream. In ovl_copy_xattr, if all the xattrs to be copied are overlayfs private xattrs, the copy loop will terminate without assigning anything to the error variable, thus returning an uninitialized value. If ovl_copy_xattr is

[PATCH 4.14 045/190] spi: No need to assign dummy value in spi_unregister_controller()

2020-06-19 Thread Greg Kroah-Hartman
From: Andy Shevchenko [ Upstream commit ebc37af5e0a134355ea2b62ed4141458bdbd5389 ] The device_for_each_child() doesn't require the returned value to be checked. Thus, drop the dummy variable completely and have no warning anymore: drivers/spi/spi.c: In function ‘spi_unregister_controller’:

[PATCH 4.14 054/190] proc: Use new_inode not new_inode_pseudo

2020-06-19 Thread Greg Kroah-Hartman
From: Eric W. Biederman commit ef1548adada51a2f32ed7faef50aa465e1b4c5da upstream. Recently syzbot reported that unmounting proc when there is an ongoing inotify watch on the root directory of proc could result in a use after free when the watch is removed after the unmount of proc when the

[PATCH 4.14 032/190] spi: bcm2835aux: Fix controller unregister order

2020-06-19 Thread Greg Kroah-Hartman
From: Lukas Wunner commit b9dd3f6d417258ad0beeb292a1bc74200149f15d upstream. The BCM2835aux SPI driver uses devm_spi_register_master() on bind. As a consequence, on unbind, __device_release_driver() first invokes bcm2835aux_spi_remove() before unregistering the SPI controller via

[PATCH 4.14 056/190] KVM: nSVM: fix condition for filtering async PF

2020-06-19 Thread Greg Kroah-Hartman
From: Paolo Bonzini commit a3535be731c2a343912578465021f50937f7b099 upstream. Async page faults have to be trapped in the host (L1 in this case), since the APF reason was passed from L0 to L1 and stored in the L1 APF data page. This was completely reversed: the page faults were passed to the

[PATCH 4.14 069/190] perf: Add cond_resched() to task_function_call()

2020-06-19 Thread Greg Kroah-Hartman
From: Barret Rhoden commit 2ed6edd33a214bca02bd2b45e3fc3038a059436b upstream. Under rare circumstances, task_function_call() can repeatedly fail and cause a soft lockup. There is a slight race where the process is no longer running on the cpu we targeted by the time remote_function() runs.

[PATCH 4.14 035/190] ALSA: pcm: disallow linking stream to itself

2020-06-19 Thread Greg Kroah-Hartman
From: Michał Mirosław commit 951e2736f4b11b58dc44d41964fa17c3527d882a upstream. Prevent SNDRV_PCM_IOCTL_LINK linking stream to itself - the code can't handle it. Fixed commit is not where bug was introduced, but changes the context significantly. Cc: sta...@vger.kernel.org Fixes: 0888c321de70

Re: [PATCH v2 1/3] docs: IOMMU user API

2020-06-19 Thread Alex Williamson
On Fri, 19 Jun 2020 03:30:24 + "Liu, Yi L" wrote: > Hi Alex, > > > From: Alex Williamson > > Sent: Friday, June 19, 2020 10:55 AM > > > > On Fri, 19 Jun 2020 02:15:36 + > > "Liu, Yi L" wrote: > > > > > Hi Alex, > > > > > > > From: Alex Williamson > > > > Sent: Friday, June 19,

[PATCH 4.14 029/190] ACPI: PM: Avoid using power resources if there are none for D0

2020-06-19 Thread Greg Kroah-Hartman
From: Rafael J. Wysocki commit 956ad9d98b73f59e442cc119c98ba1e04e94fe6d upstream. As recently reported, some platforms provide a list of power resources for device power state D3hot, through the _PR3 object, but they do not provide a list of power resources for device power state D0. Among

[PATCH 4.14 071/190] mmc: sdhci-msm: Clear tuning done flag while hs400 tuning

2020-06-19 Thread Greg Kroah-Hartman
From: Veerabhadrarao Badiganti commit 9253d71011c349d5f5cc0cebdf68b4a80811b92d upstream. Clear tuning_done flag while executing tuning to ensure vendor specific HS400 settings are applied properly when the controller is re-initialized in HS400 mode. Without this, re-initialization of the qcom

[PATCH 4.14 058/190] KVM: nVMX: Consult only the "basic" exit reason when routing nested exit

2020-06-19 Thread Greg Kroah-Hartman
From: Sean Christopherson commit 2ebac8bb3c2d35f5135466490fc8eeaf3f3e2d37 upstream. Consult only the basic exit reason, i.e. bits 15:0 of vmcs.EXIT_REASON, when determining whether a nested VM-Exit should be reflected into L1 or handled by KVM in L0. For better or worse, the switch statement

[PATCH 4.14 030/190] cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages

2020-06-19 Thread Greg Kroah-Hartman
From: Tejun Heo commit 9b0eb69b75bccada2d341d7e7ca342f0cb1c9a6a upstream. btrfs is going to use css_put() and wbc helpers to improve cgroup writeback support. Add dummy css_get() definition and export wbc helpers to prepare for module and !CONFIG_CGROUP builds. [only backport the export of

[PATCH 4.14 026/190] ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile()

2020-06-19 Thread Greg Kroah-Hartman
From: Qiushi Wu commit 6e6c25283dff866308c87b49434c7dbad4774cc0 upstream. kobject_init_and_add() takes reference even when it fails. Thus, when kobject_init_and_add() returns an error, kobject_put() must be called to properly clean up the kobject. Fixes: 3f8055c35836 ("ACPI / hotplug:

[PATCH 4.14 070/190] agp/intel: Reinforce the barrier after GTT updates

2020-06-19 Thread Greg Kroah-Hartman
From: Chris Wilson commit f30d3ced9fafa03e4855508929b5b6334907f45e upstream. After changing the timing between GTT updates and execution on the GPU, we started seeing sporadic failures on Ironlake. These were narrowed down to being an insufficiently strong enough barrier/delay after updating

[PATCH 4.14 061/190] KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts

2020-06-19 Thread Greg Kroah-Hartman
From: Marc Zyngier commit 3204be4109ad681523e3461ce64454c79278450a upstream. AArch32 CP1x registers are overlayed on their AArch64 counterparts in the vcpu struct. This leads to an interesting problem as they are stored in their CPU-local format, and thus a CP1x register doesn't "hit" the lower

[PATCH 4.14 082/190] spi: dw: Zero DMA Tx and Rx configurations on stack

2020-06-19 Thread Greg Kroah-Hartman
From: Andy Shevchenko [ Upstream commit 3cb97e223d277f84171cc4ccecab31e08b2ee7b5 ] Some DMA controller drivers do not tolerate non-zero values in the DMA configuration structures. Zero them to avoid issues with such DMA controller drivers. Even despite above this is a good practice per se.

[PATCH 4.14 078/190] media: si2157: Better check for running tuner in init

2020-06-19 Thread Greg Kroah-Hartman
From: Brad Love [ Upstream commit e955f959ac52e145f27ff2be9078b646d0352af0 ] Getting the Xtal trim property to check if running is less error prone. Reset if_frequency if state is unknown. Replaces the previous "garbage check". Signed-off-by: Brad Love Signed-off-by: Sean Young

[PATCH 4.14 062/190] ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx

2020-06-19 Thread Greg Kroah-Hartman
From: Qiujun Huang commit abeaa85054ff8cfe8b99aafc5c70ea067e5d0908 upstream. Free wmi later after cmd urb has been killed, as urb cb will access wmi. the case reported by syzbot: https://lore.kernel.org/linux-usb/0002fc05a1d61...@google.com BUG: KASAN: use-after-free in

[PATCH 4.14 079/190] objtool: Ignore empty alternatives

2020-06-19 Thread Greg Kroah-Hartman
From: Julien Thierry [ Upstream commit 7170cf47d16f1ba29eca07fd818870b7af0a93a5 ] The .alternatives section can contain entries with no original instructions. Objtool will currently crash when handling such an entry. Just skip that entry, but still give a warning to discourage useless entries.

[PATCH 4.14 090/190] btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums

2020-06-19 Thread Greg Kroah-Hartman
From: Filipe Manana [ Upstream commit 7e4a3f7ed5d54926ec671bbb13e171cfe179cc50 ] We are currently treating any non-zero return value from btrfs_next_leaf() the same way, by going to the code that inserts a new checksum item in the tree. However if btrfs_next_leaf() returns an error (a value <

[PATCH 4.14 083/190] ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K

2020-06-19 Thread Greg Kroah-Hartman
From: Jesper Dangaard Brouer [ Upstream commit 88eb0ee17b2ece64fcf6689a4557a5c2e7a89c4b ] The ixgbe driver have another memory model when compiled on archs with PAGE_SIZE above 4096 bytes. In this mode it doesn't split the page in two halves, but instead increment rx_buffer->page_offset by

[PATCH 4.14 064/190] ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb

2020-06-19 Thread Greg Kroah-Hartman
From: Qiujun Huang commit 19d6c375d671ce9949a864fb9a03e19f5487b4d3 upstream. Add barrier to accessing the stack array skb_pool. The case reported by syzbot: https://lore.kernel.org/linux-usb/3d7c1505a2168...@google.com BUG: KASAN: stack-out-of-bounds in ath9k_hif_usb_rx_stream

[PATCH 4.14 089/190] clocksource: dw_apb_timer_of: Fix missing clockevent timers

2020-06-19 Thread Greg Kroah-Hartman
From: Serge Semin [ Upstream commit 6d2e16a3181bafb77b535095c39ad1c8b9558c8c ] Commit 100214889973 ("clocksource: dw_apb_timer_of: use clocksource_of_init") replaced a publicly available driver initialization method with one called by the timer_probe() method available after CLKSRC_OF. In

[PATCH 4.14 063/190] ath9k: Fix use-after-free Write in ath9k_htc_rx_msg

2020-06-19 Thread Greg Kroah-Hartman
From: Qiujun Huang commit e4ff08a4d727146bb6717a39a8d399d834654345 upstream. Write out of slab bounds. We should check epid. The case reported by syzbot: https://lore.kernel.org/linux-usb/6ac55b05a1c05...@google.com BUG: KASAN: use-after-free in htc_process_conn_rsp

[PATCH 4.14 084/190] MIPS: Loongson: Build ATI Radeon GPU driver as module

2020-06-19 Thread Greg Kroah-Hartman
From: Tiezhu Yang [ Upstream commit a44de7497f91834df0b8b6d459e259788ba66794 ] When ATI Radeon GPU driver has been compiled directly into the kernel instead of as a module, we should make sure the firmware for the model (check available ones in /lib/firmware/radeon) is built-in to the kernel as

[PATCH 4.14 107/190] lib/mpi: Fix 64-bit MIPS build with Clang

2020-06-19 Thread Greg Kroah-Hartman
From: Nathan Chancellor [ Upstream commit 18f1ca46858eac22437819937ae44aa9a8f9f2fa ] When building 64r6_defconfig with CONFIG_MIPS32_O32 disabled and CONFIG_CRYPTO_RSA enabled: lib/mpi/generic_mpih-mul1.c:37:24: error: invalid use of a cast in a inline asm context requiring an l-value: remove

[PATCH 4.14 092/190] spi: dw: Fix Rx-only DMA transfers

2020-06-19 Thread Greg Kroah-Hartman
From: Serge Semin [ Upstream commit 46164fde6b7890e7a3982d54549947c8394c0192 ] Tx-only DMA transfers are working perfectly fine since in this case the code just ignores the Rx FIFO overflow interrupts. But it turns out the SPI Rx-only transfers are broken since nothing pushing any data to the

[PATCH v4] hwmon:(adm1275) Enable adm1278 ADM1278_TEMP1_EN

2020-06-19 Thread Manikandan Elumalai
The adm1278 temp attribute need it for openbmc platform . This feature not enabled by default, so PMON_CONFIG needs to enable it. v4: --- Reported-by: kernel test robot v3: fix invalid signed-off. removed checkpath warnings. write ADM1278_TEMP1_EN and ADM1278_VOUT_EN conf in single line

[PATCH 4.14 093/190] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit

2020-06-19 Thread Greg Kroah-Hartman
From: Jon Doron [ Upstream commit f7d31e65368aeef973fab788aa22c4f1d5a6af66 ] The problem the patch is trying to address is the fact that 'struct kvm_hyperv_exit' has different layout on when compiling in 32 and 64 bit modes. In 64-bit mode the default alignment boundary is 64 bits thus forcing

[PATCH 4.14 102/190] media: platform: fcp: Set appropriate DMA parameters

2020-06-19 Thread Greg Kroah-Hartman
From: Kieran Bingham [ Upstream commit dd844fb8e50b12e65bbdc5746c9876c6735500df ] Enabling CONFIG_DMA_API_DEBUG=y and CONFIG_DMA_API_DEBUG_SG=y will enable extra validation on DMA operations ensuring that the size restraints are met. When using the FCP in conjunction with the VSP1/DU, and

[PATCH 4.14 106/190] net: bcmgenet: set Rx mode before starting netif

2020-06-19 Thread Greg Kroah-Hartman
From: Doug Berger [ Upstream commit 72f96347628e73dbb61b307f18dd19293cc6792a ] This commit explicitly calls the bcmgenet_set_rx_mode() function when the network interface is started. This function is normally called by ndo_set_rx_mode when the flags are changed, but apparently not when the

Re: [RESEND PATCH v27 11/15] leds: lp55xx: Add multicolor framework support to lp55xx

2020-06-19 Thread Dan Murphy
Jacek On 6/18/20 6:26 PM, Jacek Anaszewski wrote: On 6/19/20 12:09 AM, Jacek Anaszewski wrote: Dan, On 6/18/20 11:44 PM, Dan Murphy wrote: Jacek On 6/18/20 4:21 PM, Jacek Anaszewski wrote: Dan, On 6/18/20 12:33 AM, Dan Murphy wrote: Jacek On 6/17/20 4:41 PM, Jacek Anaszewski wrote:

[PATCH 4.14 067/190] mm/slub: fix a memory leak in sysfs_slab_add()

2020-06-19 Thread Greg Kroah-Hartman
From: Wang Hai commit dde3c6b72a16c2db826f54b2d49bdea26c3534a2 upstream. syzkaller reports for memory leak when kobject_init_and_add() returns an error in the function sysfs_slab_add() [1] When this happened, the function kobject_put() is not called for the corresponding kobject, which

[PATCH 4.14 104/190] audit: fix a net reference leak in audit_list_rules_send()

2020-06-19 Thread Greg Kroah-Hartman
From: Paul Moore [ Upstream commit 3054d06719079388a543de6adb812638675ad8f5 ] If audit_list_rules_send() fails when trying to create a new thread to send the rules it also fails to cleanup properly, leaking a reference to a net structure. This patch fixes the error patch and renames

Re: [PATCH] Ability to read the MKTME status from userspace

2020-06-19 Thread Dave Hansen
On 6/19/20 7:36 AM, Richard Hughes wrote: > On Fri, 19 Jun 2020 at 15:23, Dave Hansen wrote: >> Last night, I asked my kids if they brushed their teeth. They said: >> "Dad, my toothbrush was available." They argued that mere availability >> was a better situation than not *having* a toothbrush.

Re: [PATCH v6 07/19] mm: memcg/slab: allocate obj_cgroups for non-root slab pages

2020-06-19 Thread Shakeel Butt
On Mon, Jun 8, 2020 at 4:07 PM Roman Gushchin wrote: > > Allocate and release memory to store obj_cgroup pointers for each > non-root slab page. Reuse page->mem_cgroup pointer to store a pointer > to the allocated space. > > To distinguish between obj_cgroups and memcg pointers in case > when

[PATCH 4.14 087/190] spi: dw: Enable interrupts in accordance with DMA xfer mode

2020-06-19 Thread Greg Kroah-Hartman
From: Serge Semin [ Upstream commit 43dba9f3f98c2b184a19f856f06fe22817bfd9e0 ] It's pointless to track the Tx overrun interrupts if Rx-only SPI transfer is issued. Similarly there is no need in handling the Rx overrun/underrun interrupts if Tx-only SPI transfer is executed. So lets unmask the

[PATCH 4.14 121/190] rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup()

2020-06-19 Thread Greg Kroah-Hartman
From: Dan Carpenter [ Upstream commit beb12813bc75d4a23de43b85ad1c7cb28d27631e ] Seven years ago we tried to fix a leak but actually introduced a double free instead. It was an understandable mistake because the code was a bit confusing and the free was done in the wrong place. The "skb"

[PATCH 4.14 122/190] mwifiex: Fix memory corruption in dump_station

2020-06-19 Thread Greg Kroah-Hartman
From: Pali Rohár [ Upstream commit 3aa42bae9c4d1641aeb36f1a8585cd1d506cf471 ] The mwifiex_cfg80211_dump_station() uses static variable for iterating over a linked list of all associated stations (when the driver is in UAP role). This has a race condition if .dump_station is called in parallel

[PATCH 4.14 091/190] ARM: 8978/1: mm: make act_mm() respect THREAD_SIZE

2020-06-19 Thread Greg Kroah-Hartman
From: Linus Walleij [ Upstream commit e1de94380af588bdf6ad6f0cc1f75004c35bc096 ] Recent work with KASan exposed the folling hard-coded bitmask in arch/arm/mm/proc-macros.S: bic rd, sp, #8128 bic rd, rd, #63 This forms the bitmask 0x1FFF that is coinciding with (PAGE_SIZE <<

[PATCH 4.14 094/190] net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss()

2020-06-19 Thread Greg Kroah-Hartman
From: Jia-Ju Bai [ Upstream commit 3e1c6846b9e108740ef8a37be80314053f5dd52a ] The value adapter->rss_conf is stored in DMA memory, and it is assigned to rssConf, so rssConf->indTableSize can be modified at anytime by malicious hardware. Because rssConf->indTableSize is assigned to n, buffer

[PATCH 4.14 095/190] staging: android: ion: use vmap instead of vm_map_ram

2020-06-19 Thread Greg Kroah-Hartman
From: Christoph Hellwig [ Upstream commit 5bf9917452112694b2c774465ee4dbe441c84b77 ] vm_map_ram can keep mappings around after the vm_unmap_ram. Using that with non-PAGE_KERNEL mappings can lead to all kinds of aliasing issues. Signed-off-by: Christoph Hellwig Signed-off-by: Andrew Morton

[PATCH 4.14 119/190] net: qed*: Reduce RX and TX default ring count when running inside kdump kernel

2020-06-19 Thread Greg Kroah-Hartman
From: Bhupesh Sharma [ Upstream commit 73e030977f7884dbe1be0018bab517e8d02760f8 ] Normally kdump kernel(s) run under severe memory constraint with the basic idea being to save the crashdump vmcore reliably when the primary kernel panics/hangs. Currently the qed* ethernet driver ends up

[PATCH 4.14 103/190] MIPS: Make sparse_init() using top-down allocation

2020-06-19 Thread Greg Kroah-Hartman
From: Tiezhu Yang [ Upstream commit 269b3a9ac538c4ae87f84be640b9fa89914a2489 ] In the current code, if CONFIG_SWIOTLB is set, when failed to get IO TLB memory from the low pages by plat_swiotlb_setup(), it may lead to the boot process failed with kernel panic. (1) On the Loongson and SiByte

[PATCH 4.14 113/190] Crypto/chcr: fix for ccm(aes) failed test

2020-06-19 Thread Greg Kroah-Hartman
From: Devulapally Shiva Krishna [ Upstream commit 10b0c75d7bc19606fa9a62c8ab9180e95c0e0385 ] The ccm(aes) test fails when req->assoclen > ~240bytes. The problem is the value assigned to auth_offset is wrong. As auth_offset is unsigned char, it can take max value as 255. So fix it by making it

[PATCH 4.14 114/190] MIPS: Truncate link address into 32bit for 32bit kernel

2020-06-19 Thread Greg Kroah-Hartman
From: Jiaxun Yang [ Upstream commit ff487d41036035376e47972c7c522490b839ab37 ] LLD failed to link vmlinux with 64bit load address for 32bit ELF while bfd will strip 64bit address into 32bit silently. To fix LLD build, we should truncate load address provided by platform into 32bit for 32bit

[PATCH 4.14 111/190] net: allwinner: Fix use correct return type for ndo_start_xmit()

2020-06-19 Thread Greg Kroah-Hartman
From: Yunjian Wang [ Upstream commit 09f6c44aaae0f1bdb8b983d7762676d5018c53bc ] The method ndo_start_xmit() returns a value of type netdev_tx_t. Fix the ndo function to use the correct type. And emac_start_xmit() can leak one skb if 'channel' == 3. Signed-off-by: Yunjian Wang Signed-off-by:

<    2   3   4   5   6   7   8   9   10   11   >