[PATCH 5.10 169/188] RAS/CEC: Correct ce_add_elem()s returned values

2021-04-12 Thread Greg Kroah-Hartman
f-by: Greg Kroah-Hartman --- drivers/ras/cec.c | 15 --- 1 file changed, 12 insertions(+), 3 deletions(-) --- a/drivers/ras/cec.c +++ b/drivers/ras/cec.c @@ -309,11 +309,20 @@ static bool sanity_check(struct ce_array return ret; } +/** + * cec_add_elem - Add an element

[PATCH 5.10 166/188] RDMA/addr: Be strict with gid size

2021-04-12 Thread Greg Kroah-Hartman
From: Leon Romanovsky [ Upstream commit d1c803a9ccd7bd3aff5e989ccfb39ed3b799b975 ] The nla_len() is less than or equal to 16. If it's less than 16 then end of the "gid" buffer is uninitialized. Fixes: ae43f8286730 ("IB/core: Add IP to GID netlink offload") Link: https://lore.kernel.org/r/20210

[PATCH 5.10 167/188] vdpa/mlx5: should exclude header length and fcs from mtu

2021-04-12 Thread Greg Kroah-Hartman
From: Si-Wei Liu [ Upstream commit d084d996aaf53c0cc583dc75a4fc2a67fe485846 ] When feature VIRTIO_NET_F_MTU is negotiated on mlx5_vdpa, 22 extra bytes worth of MTU length is shown in guest. This is because the mlx5_query_port_max_mtu API returns the "hardware" MTU value, which does not just cont

[PATCH 5.10 138/188] RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files

2021-04-12 Thread Greg Kroah-Hartman
From: Md Haris Iqbal [ Upstream commit 7582207b1059129e59eb92026fca2cfc088a74fc ] KASAN detected the following BUG: BUG: KASAN: use-after-free in rtrs_clt_update_wc_stats+0x41/0x100 [rtrs_client] Read of size 8 at addr 88bf2fb4adc0 by task swapper/0/0 CPU: 0 PID: 0 Comm: swapper/0 T

[PATCH 5.10 165/188] i40e: Fix parameters in aq_get_phy_register()

2021-04-12 Thread Greg Kroah-Hartman
From: Grzegorz Siwik [ Upstream commit b2d0efc4be7ed320e33eaa9b6dd6f3f6011ffb8e ] Change parameters order in aq_get_phy_register() due to wrong statistics in PHY reported by ethtool. Previously all PHY statistics were exactly the same for all interfaces Now statistics are reported correctly - di

[PATCH 5.10 164/188] drm/vc4: crtc: Reduce PV fifo threshold on hvs4

2021-04-12 Thread Greg Kroah-Hartman
From: Dom Cobley [ Upstream commit eb9dfdd1ed40357b99a4201c8534c58c562e48c9 ] Experimentally have found PV on hvs4 reports fifo full error with expected settings and does not with one less This appears as: [drm:drm_atomic_helper_wait_for_flip_done] *ERROR* [CRTC:82:crtc-3] flip_done timed out

[PATCH 5.10 160/188] net/mlx5: Fix PBMC register mapping

2021-04-12 Thread Greg Kroah-Hartman
From: Aya Levin [ Upstream commit 534b1204ca4694db1093b15cf3e79a99fcb6a6da ] Add reserved mapping to cover all the register in order to avoid setting arbitrary values to newer FW which implements the reserved fields. Fixes: 50b4a3c23646 ("net/mlx5: PPTB and PBMC register firmware command suppo

[PATCH 5.10 163/188] RDMA/qedr: Fix kernel panic when trying to access recv_cq

2021-04-12 Thread Greg Kroah-Hartman
From: Kamal Heib [ Upstream commit e1ad897b9c738d5550be6762bf3a6ef1672259a4 ] As INI QP does not require a recv_cq, avoid the following null pointer dereference by checking if the qp_type is not INI before trying to extract the recv_cq. BUG: kernel NULL pointer dereference, address: 000

[PATCH 5.10 158/188] net/mlx5: Fix placement of log_max_flow_counter

2021-04-12 Thread Greg Kroah-Hartman
From: Raed Salem [ Upstream commit a14587dfc5ad2312dabdd42a610d80ecd0dc8bea ] The cited commit wrongly placed log_max_flow_counter field of mlx5_ifc_flow_table_prop_layout_bits, align it to the HW spec intended placement. Fixes: 16f1c5bb3ed7 ("net/mlx5: Check device capability for maximum flow

[PATCH 5.10 161/188] RDMA/cxgb4: check for ipv6 address properly while destroying listener

2021-04-12 Thread Greg Kroah-Hartman
From: Potnuri Bharat Teja [ Upstream commit 603c4690b01aaffe3a6c3605a429f6dac39852ae ] ipv6 bit is wrongly set by the below which causes fatal adapter lookup engine errors for ipv4 connections while destroying a listener. Fix it to properly check the local address for ipv6. Fixes: 3408be145a5d

[PATCH 5.10 157/188] net: hns3: clear VF down state bit before request link status

2021-04-12 Thread Greg Kroah-Hartman
From: Guangbin Huang [ Upstream commit ed7bedd2c3ca040f1e8ea02c6590a93116b1ec78 ] Currently, the VF down state bit is cleared after VF sending link status request command. There is problem that when VF gets link status replied from PF, the down state bit may still set as 1. In this case, the lin

[PATCH 5.10 155/188] can: mcp251x: fix support for half duplex SPI host controllers

2021-04-12 Thread Greg Kroah-Hartman
From: Marc Kleine-Budde [ Upstream commit 617085fca6375e2c1667d1fbfc6adc4034c85f04 ] Some SPI host controllers do not support full-duplex SPI transfers. The function mcp251x_spi_trans() does a full duplex transfer. It is used in several places in the driver, where a TX half duplex transfer is s

[PATCH 5.10 156/188] tipc: increment the tmp aead refcnt before attaching it

2021-04-12 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 2a2403ca3add03f542f6b34bef9f74649969b06d ] Li Shuang found a NULL pointer dereference crash in her testing: [] BUG: unable to handle kernel NULL pointer dereference at 0020 [] RIP: 0010:tipc_crypto_rcv_complete+0xc8/0x7e0 [tipc] [] Call Trace:

[PATCH 5.10 137/188] i40e: Fix display statistics for veb_tc

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit c3214de929dbf1b7374add8bbed30ce82b197bbb ] If veb-stats was enabled, the ethtool stats triggered a warning due to invalid size: 'unexpected stat size for veb.tc_%u_tx_packets'. This was due to an incorrect structure definition for the statistics. Structures and

[PATCH 5.10 154/188] iwlwifi: fix 11ax disabled bit in the regulatory capability flags

2021-04-12 Thread Greg Kroah-Hartman
From: Luca Coelho [ Upstream commit 07cc40fec9a85e669ea12e161a438d2cbd76f1ed ] When version 2 of the regulatory capability flags API was implemented, the flag to disable 11ax was defined as bit 13, but this was later changed and the bit remained as bit 10, like in version 1. This was never chan

[PATCH 5.10 153/188] i2c: designware: Adjust bus_freq_hz when refuse high speed mode set

2021-04-12 Thread Greg Kroah-Hartman
From: Andy Shevchenko [ Upstream commit 5e729bc54bda705f64941008b018b4e41a4322bf ] When hardware doesn't support High Speed Mode, we forget bus_freq_hz timing adjustment. This makes the timings and real registers being unsynchronized. Adjust bus_freq_hz when refuse high speed mode set. Fixes: b

[PATCH 5.10 150/188] perf inject: Fix repipe usage

2021-04-12 Thread Greg Kroah-Hartman
From: Adrian Hunter [ Upstream commit 026334a3bb6a3919b42aba9fc11843db2b77fd41 ] Since commit 14d3d54052539a1e ("perf session: Try to read pipe data from file") 'perf inject' has started printing "PERFILE2h" when not processing pipes. The commit exposed perf to the possiblity that the input is

[PATCH 5.10 152/188] openvswitch: fix send of uninitialized stack memory in ct limit reply

2021-04-12 Thread Greg Kroah-Hartman
From: Ilya Maximets [ Upstream commit 4d51419d49930be2701c2633ae271b350397c3ca ] 'struct ovs_zone_limit' has more members than initialized in ovs_ct_limit_get_default_limit(). The rest of the memory is a random kernel stack content that ends up being sent to userspace. Fix that by using design

[PATCH 5.10 151/188] net: openvswitch: conntrack: simplify the return expression of ovs_ct_limit_get_default_limit()

2021-04-12 Thread Greg Kroah-Hartman
From: Zheng Yongjun [ Upstream commit 5e359044c107ecbdc2e9b3fd5ce296006e6de4bc ] Simplify the return expression. Signed-off-by: Zheng Yongjun Reviewed-by: Eelco Chaudron Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/openvswitch/conntrack.c | 6 +- 1 file changed, 1

[PATCH 5.10 149/188] s390/cpcmd: fix inline assembly register clobbering

2021-04-12 Thread Greg Kroah-Hartman
From: Alexander Gordeev [ Upstream commit 7a2f91441b2c1d81b77c1cd816a4659f4abc9cbe ] Register variables initialized using arithmetic. That leads to kasan instrumentaton code corrupting the registers contents. Follow GCC guidlines and use temporary variables for assigning init values to register

[PATCH 5.10 147/188] clk: fix invalid usage of list cursor in unregister

2021-04-12 Thread Greg Kroah-Hartman
From: Lukasz Bartosik [ Upstream commit 7045465500e465b09f09d6e5bdc260a9f1aab97b ] Fix invalid usage of a list_for_each_entry cursor in clk_notifier_unregister(). When list is empty or if the list is completely traversed (without breaking from the loop on one of the entries) then the list cursor

[PATCH 5.10 148/188] workqueue: Move the position of debug_work_activate() in __queue_work()

2021-04-12 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 0687c66b5f666b5ad433f4e94251590d9bc9d10e ] The debug_work_activate() is called on the premise that the work can be inserted, because if wq be in WQ_DRAINING status, insert work may be failed. Fixes: e41e704bc4f4 ("workqueue: improve destroy_workqueue() debuggabili

[PATCH 5.10 146/188] clk: fix invalid usage of list cursor in register

2021-04-12 Thread Greg Kroah-Hartman
From: Lukasz Bartosik [ Upstream commit 8d3c0c01cb2e36b2bf3c06a82b18b228d0c8f5d0 ] Fix invalid usage of a list_for_each_entry cursor in clk_notifier_register(). When list is empty or if the list is completely traversed (without breaking from the loop on one of the entries) then the list cursor d

[PATCH 5.10 145/188] net: macb: restore cmp registers on resume path

2021-04-12 Thread Greg Kroah-Hartman
From: Claudiu Beznea [ Upstream commit a14d273ba15968495896a38b7b3399dba66d0270 ] Restore CMP screener registers on resume path. Fixes: c1e85c6ce57ef ("net: macb: save/restore the remaining registers and features") Signed-off-by: Claudiu Beznea Acked-by: Nicolas Ferre Signed-off-by: David S.

[PATCH 5.10 136/188] soc/fsl: qbman: fix conflicting alignment attributes

2021-04-12 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 040f31196e8b2609613f399793b9225271b79471 ] When building with W=1, gcc points out that the __packed attribute on struct qm_eqcr_entry conflicts with the 8-byte alignment attribute on struct qm_fd inside it: drivers/soc/fsl/qbman/qman.c:189:1: error: alignme

[PATCH 5.10 097/188] regulator: bd9571mwv: Fix AVS and DVFS voltage range

2021-04-12 Thread Greg Kroah-Hartman
From: Geert Uytterhoeven [ Upstream commit 3b6e7088afc919f5b52e4d2de8501ad34d35b09b ] According to Table 30 ("DVFS_MoniVDAC [6:0] Setting Table") in the BD9571MWV-M Datasheet Rev. 002, the valid voltage range is 600..1100 mV (settings 0x3c..0x6e). While the lower limit is taken into account (by

[PATCH 5.10 103/188] ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips

2021-04-12 Thread Greg Kroah-Hartman
From: Shengjiu Wang [ Upstream commit 16b82e75c15a7dbd564ea3654f3feb61df9e1e6f ] The input MCLK is 12.288MHz, the desired output sysclk is 11.2896MHz and sample rate is 44100Hz, with the configuration pllprescale=2, postscale=sysclkdiv=1, some chip may have wrong bclk and lrclk output with pll e

[PATCH 5.10 106/188] i40e: Added Asym_Pause to supported link modes

2021-04-12 Thread Greg Kroah-Hartman
From: Mateusz Palczewski [ Upstream commit 90449e98c265296329446c7abcd2aae3b20c0bc9 ] Add Asym_Pause to supported link modes (it is supported by HW). Lack of Asym_Pause in supported modes can cause several problems, i.e. it won't be possible to turn the autonegotiation on with asymmetric pause s

[PATCH 5.10 102/188] ASoC: SOF: Intel: HDA: fix core status verification

2021-04-12 Thread Greg Kroah-Hartman
From: Guennadi Liakhovetski [ Upstream commit 927280909fa7d8e61596800d82f18047c6cfbbe4 ] When checking for enabled cores it isn't enough to check that some of the requested cores are running, we have to check that all of them are. Fixes: 747503b1813a ("ASoC: SOF: Intel: Add Intel specific HDA D

[PATCH 5.10 105/188] virtchnl: Fix layout of RSS structures

2021-04-12 Thread Greg Kroah-Hartman
From: Norbert Ciosek [ Upstream commit 22f8b5df881e9f1302514bb8649c2051de55 ] Remove padding from RSS structures. Previous layout could lead to unwanted compiler optimizations in loops when iterating over key and lut arrays. Fixes: 65ece6de0114 ("virtchnl: Add missing explicit padding to st

[PATCH 5.10 128/188] net: phy: broadcom: Only advertise EEE for supported modes

2021-04-12 Thread Greg Kroah-Hartman
From: Florian Fainelli [ Upstream commit c056d480b40a68f2520ccc156c7fae672d69d57d ] We should not be advertising EEE for modes that we do not support, correct that oversight by looking at the PHY device supported linkmodes. Fixes: 99cec8a4dda2 ("net: phy: broadcom: Allow enabling or disabling o

[PATCH 5.10 104/188] xfrm: Fix NULL pointer dereference on policy lookup

2021-04-12 Thread Greg Kroah-Hartman
From: Steffen Klassert [ Upstream commit b1e3a5607034aa0a481c6f69a6893049406665fb ] When xfrm interfaces are used in combination with namespaces and ESP offload, we get a dst_entry NULL pointer dereference. This is because we don't have a dst_entry attached in the ESP offloading case and we need

[PATCH 5.10 101/188] esp: delete NETIF_F_SCTP_CRC bit from features for esp offload

2021-04-12 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 154deab6a3ba47792936edf77f2f13a1cbc4351d ] Now in esp4/6_gso_segment(), before calling inner proto .gso_segment, NETIF_F_CSUM_MASK bits are deleted, as HW won't be able to do the csum for inner proto due to the packet encrypted already. So the UDP/TCP packet has

[PATCH 5.10 134/188] net/rds: Fix a use after free in rds_message_map_pages

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit bdc2ab5c61a5c07388f4820ff21e787b4dfd1ced ] In rds_message_map_pages, the rm is freed by rds_message_put(rm). But rm is still used by rm->data.op_sg in return value. My patch assigns ERR_CAST(rm->data.op_sg) to err before the rm is freed to avoid the uaf. Fixe

[PATCH 5.10 132/188] net/mlx5e: Fix ethtool indication of connector type

2021-04-12 Thread Greg Kroah-Hartman
From: Aya Levin [ Upstream commit 3211434dfe7a66fcf55e43961ea524b78336c04c ] Use connector_type read from PTYS register when it's valid, based on corresponding capability bit. Fixes: 5b4793f81745 ("net/mlx5e: Add support for reading connector type from PTYS") Signed-off-by: Aya Levin Reviewed

[PATCH 5.10 133/188] net/mlx5: Dont request more than supported EQs

2021-04-12 Thread Greg Kroah-Hartman
From: Daniel Jurgens [ Upstream commit a7b76002ae78cd230ee652ccdfedf21aa94fcecc ] Calculating the number of compeltion EQs based on the number of available IRQ vectors doesn't work now that all async EQs share one IRQ. Thus the max number of EQs can be exceeded on systems with more than approxim

[PATCH 5.10 130/188] ASoC: sunxi: sun4i-codec: fill ASoC card owner

2021-04-12 Thread Greg Kroah-Hartman
From: Bastian Germann [ Upstream commit 7c0d6e482062eb5c06ecccfab340abc523bdca00 ] card->owner is a required property and since commit 81033c6b584b ("ALSA: core: Warn on empty module") a warning is issued if it is empty. Add it. This fixes following warning observed on Lamobo R1: WARNING: CPU:

[PATCH 5.10 131/188] net/mlx5e: Fix mapping of ct_label zero

2021-04-12 Thread Greg Kroah-Hartman
From: Ariel Levkovich [ Upstream commit d24f847e54214049814b9515771622eaab3f42ab ] ct_label 0 is a default label each flow has and therefore there can be rules that match on ct_label=0 without a prior rule that set the ct_label to this value. The ct_label value is not used directly in the HW ru

[PATCH 5.10 129/188] I2C: JZ4780: Fix bug for Ingenic X1000.

2021-04-12 Thread Greg Kroah-Hartman
From: 周琰杰 (Zhou Yanjie) [ Upstream commit 942bfbecc0281c75db84f744b9b77b0f2396f484 ] Only send "X1000_I2C_DC_STOP" when last byte, or it will cause error when I2C write operation which should look like this: device_addr + w, reg_addr, data; But without this patch, it looks like this: device_a

[PATCH 5.10 127/188] nfp: flower: ignore duplicate merge hints from FW

2021-04-12 Thread Greg Kroah-Hartman
From: Yinjun Zhang [ Upstream commit 2ea538dbee1c79f6f6c24a6f2f82986e4b7ccb78 ] A merge hint message needs some time to process before the merged flow actually reaches the firmware, during which we may get duplicate merge hints if there're more than one packet that hit the pre-merged flow. And p

[PATCH 5.10 100/188] net: xfrm: Localize sequence counter per network namespace

2021-04-12 Thread Greg Kroah-Hartman
From: Ahmed S. Darwish [ Upstream commit e88add19f68191448427a6e4eb059664650a837f ] A sequence counter write section must be serialized or its internal state can get corrupted. The "xfrm_state_hash_generation" seqcount is global, but its write serialization lock (net->xfrm.xfrm_state_lock) is in

[PATCH 5.10 126/188] net: qrtr: Fix memory leak on qrtr_tx_wait failure

2021-04-12 Thread Greg Kroah-Hartman
From: Loic Poulain [ Upstream commit 8a03dd925786bdc3834d56ccc980bb70668efa35 ] qrtr_tx_wait does not check for radix_tree_insert failure, causing the 'flow' object to be unreferenced after qrtr_tx_wait return. Fix that by releasing flow on radix_tree_insert failure. Fixes: 5fdeb0d372ab ("net:

[PATCH 5.10 125/188] net/ncsi: Avoid channel_monitor hrtimer deadlock

2021-04-12 Thread Greg Kroah-Hartman
From: Milton Miller [ Upstream commit 03cb4d05b4ea9a3491674ca40952adb708d549fa ] Calling ncsi_stop_channel_monitor from channel_monitor is a guaranteed deadlock on SMP because stop calls del_timer_sync on the timer that invoked channel_monitor as its timer function. Recognise the inherent race

[PATCH 5.10 124/188] ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces

2021-04-12 Thread Greg Kroah-Hartman
From: Stefan Riedmueller [ Upstream commit f57011e72f5fe0421ec7a812beb1b57bdf4bb47f ] Setting the vmmc supplies is crucial since otherwise the supplying regulators get disabled and the SD interfaces are no longer powered which leads to system failures if the system is booted from that SD interfa

[PATCH 5.10 123/188] net:tipc: Fix a double free in tipc_sk_mcast_rcv

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 6bf24dc0cc0cc43b29ba344b66d78590e687e046 ] In the if(skb_peek(arrvq) == skb) branch, it calls __skb_dequeue(arrvq) to get the skb by skb = skb_peek(arrvq). Then __skb_dequeue() unlinks the skb from arrvq and returns the skb which equals to skb_peek(arrvq). Aft

[PATCH 5.10 120/188] gianfar: Handle error code at MAC address change

2021-04-12 Thread Greg Kroah-Hartman
From: Claudiu Manoil [ Upstream commit bff5b62585123823842833ab20b1c0a7fa437f8c ] Handle return error code of eth_mac_addr(); Fixes: 3d23a05c75c7 ("gianfar: Enable changing mac addr when if up") Signed-off-by: Claudiu Manoil Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- driv

[PATCH 5.10 122/188] cxgb4: avoid collecting SGE_QBASE regs during traffic

2021-04-12 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit 1bfb3dea965ff9f6226fd1709338f227363b6061 ] Accessing SGE_QBASE_MAP[0-3] and SGE_QBASE_INDEX registers can lead to SGE missing doorbells under heavy traffic. So, only collect them when adapter is idle. Also update the regdump range to skip collecting these

[PATCH 5.10 121/188] net: dsa: Fix type was not set for devlink port

2021-04-12 Thread Greg Kroah-Hartman
From: Maxim Kochetkov [ Upstream commit fb6ec87f7229b92baa81b35cbc76f2626d5bfadb ] If PHY is not available on DSA port (described at devicetree but absent or failed to detect) then kernel prints warning after 3700 secs: [ 3707.948771] [ cut here ] [ 3707.948784] Type was

[PATCH 5.10 117/188] can: isotp: fix msg_namelen values depending on CAN_REQUIRED_SIZE

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Hartkopp [ Upstream commit f522d9559b07854c231cf8f0b8cb5a3578f8b44e ] Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939 members") the sockaddr_can has been extended in size and a new CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol specific n

[PATCH 5.10 119/188] ethernet: myri10ge: Fix a use after free in myri10ge_sw_tso

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 63415767a2446136372e777cde5bb351f21ec21d ] In myri10ge_sw_tso, the skb_list_walk_safe macro will set (curr) = (segs) and (next) = (curr)->next. If status!=0 is true, the memory pointed by curr and segs will be free by dev_kfree_skb_any(curr). But later, the seg

[PATCH 5.10 115/188] xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets

2021-04-12 Thread Greg Kroah-Hartman
From: Steffen Klassert [ Upstream commit c7dbf4c08868d9db89b8bfe8f8245ca61b01ed2f ] Commit 94579ac3f6d0 ("xfrm: Fix double ESP trailer insertion in IPsec crypto offload.") added a XFRM_XMIT flag to avoid duplicate ESP trailer insertion on HW offload. This flag is set on the secpath that is share

[PATCH 5.10 116/188] can: bcm/raw: fix msg_namelen values depending on CAN_REQUIRED_SIZE

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Hartkopp [ Upstream commit 9e9714742fb70467464359693a73b911a630226f ] Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939 members") the sockaddr_can has been extended in size and a new CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol specific n

[PATCH 5.10 099/188] ARM: OMAP4: PM: update ROM return address for OSWR and OFF

2021-04-12 Thread Greg Kroah-Hartman
From: Carlos Leija [ Upstream commit b3d09a06d89f474cb52664e016849315a97e09d9 ] We need to add a dummy smc call to the cpuidle wakeup path to force the ROM code to save the return address after MMU is enabled again. This is needed to prevent random hangs on secure devices like droid4. Otherwise

[PATCH 5.10 118/188] mlxsw: spectrum: Fix ECN marking in tunnel decapsulation

2021-04-12 Thread Greg Kroah-Hartman
From: Ido Schimmel [ Upstream commit 66167c310deb4ac1725f81004fb4b504676ad0bf ] Cited commit changed the behavior of the software data path with regards to the ECN marking of decapsulated packets. However, the commit did not change other callers of __INET_ECN_decapsulate(), namely mlxsw. The dri

[PATCH 5.10 112/188] sch_red: fix off-by-one checks in red_check_params()

2021-04-12 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 3a87571f0ffc51ba3bf3ecdb6032861d0154b164 ] This fixes following syzbot report: UBSAN: shift-out-of-bounds in ./include/net/red.h:237:23 shift exponent 32 is too large for 32-bit type 'unsigned int' CPU: 1 PID: 8418 Comm: syz-executor170 Not tainted 5.12.0-r

[PATCH 5.10 111/188] geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply

2021-04-12 Thread Greg Kroah-Hartman
From: Antoine Tenart [ Upstream commit 68c1a943ef37bafde5ea2383e8ca224c7169ee31 ] When the interface is part of a bridge or an Open vSwitch port and a packet exceed a PMTU estimate, an ICMP reply is sent to the sender. When using the external mode (collect metadata) the source and destination ad

[PATCH 5.10 080/188] percpu: make pcpu_nr_empty_pop_pages per chunk type

2021-04-12 Thread Greg Kroah-Hartman
count percpu memory to memory cgroups") Cc: sta...@vger.kernel.org # 5.9+ Signed-off-by: Roman Gushchin Tested-by: Filipe Manana Signed-off-by: Dennis Zhou Signed-off-by: Greg Kroah-Hartman --- mm/percpu-internal.h |2 +- mm/percpu-stats.c|9 +++-- mm/percpu.c

[PATCH 5.10 081/188] i2c: turn recovery error on init to debug

2021-04-12 Thread Greg Kroah-Hartman
Klaus Kudielka Tested-by: Klaus Kudielka Signed-off-by: Wolfram Sang Signed-off-by: Wolfram Sang Cc: sta...@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/i2c/i2c-core-base.c |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/drivers/i2c/i2c-core-base.c +++ b/driver

[PATCH 5.10 082/188] KVM: x86/mmu: change TDP MMU yield function returns to match cond_resched

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit e28a436ca4f65384cceaf3f4da0e00aa74244e6a ] Currently the TDP MMU yield / cond_resched functions either return nothing or return true if the TLBs were not flushed. These are confusing semantics, especially when making control flow decisions in calling functions.

[PATCH 5.10 083/188] KVM: x86/mmu: Merge flush and non-flush tdp_mmu_iter_cond_resched

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit e139a34ef9d5627a41e1c02210229082140d1f92 ] The flushing and non-flushing variants of tdp_mmu_iter_cond_resched have almost identical implementations. Merge the two functions and add a flush parameter. Signed-off-by: Ben Gardon Message-Id: <20210202185734.1680

[PATCH 5.10 075/188] usbip: vudc synchronize sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/vudc_dev.c |1 + drivers/usb/usbip/vudc_sysfs.c |5 + 2 files changed, 6 insertions(+) --- a/drivers/usb/usbip/vudc_dev.c +++ b/drivers/usb/usbip/vudc_dev.c @@ -572,6 +572,7 @@ static int init_vudc_hw(struct vudc *udc

[PATCH 5.10 076/188] usbip: synchronize event handler with sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
.git.sk...@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/usbip_event.c |2 ++ 1 file changed, 2 insertions(+) --- a/drivers/usb/usbip/usbip_event.c +++ b/drivers/usb/usbip/usbip_event.c @@ -70,6 +70,7 @@ static void event_handler(struct work_st while ((ud

[PATCH 5.10 026/188] fs: direct-io: fix missing sdio->boundary

2021-04-12 Thread Greg Kroah-Hartman
d-off-by: Jack Qiu Reviewed-by: Jan Kara Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/direct-io.c |5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/fs/direct-io.c +++ b/fs/direct-io.c @@ -810,6 +810,7 @@ submit_page_secti

[PATCH 5.10 039/188] ice: Use port number instead of PF ID for WoL

2021-04-12 Thread Greg Kroah-Hartman
, ice_is_wol_supported doesn't really need a pointer to the pf struct, but just needs a pointer to the hw instance. Fixes: 769c500dcc1e ("ice: Add advanced power mgmt for WoL") Signed-off-by: Anirudh Venkataramanan Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Gre

[PATCH 5.10 038/188] ice: Fix for dereference of NULL pointer

2021-04-12 Thread Greg Kroah-Hartman
t;ice: Add support for switch filter programming") Signed-off-by: Jacek Bułatek Co-developed-by: Haiyue Wang Signed-off-by: Haiyue Wang Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/ice/ice_switch.c | 12 +++---

[PATCH 5.10 040/188] ice: Cleanup fltr list in case of allocation issues

2021-04-12 Thread Greg Kroah-Hartman
allocated memory. This patch ensures proper memory deallocation in these cases. Fixes: 80d144c9ac82 ("ice: Refactor switch rule management structures and functions") Signed-off-by: Robert Malz Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- d

[PATCH 5.10 036/188] ice: fix memory allocation call

2021-04-12 Thread Greg Kroah-Hartman
d-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/ice/ice_common.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/ethernet/intel/ice/ice_common.c +++ b/drivers/net/ethernet/intel/ice/ice_common.c @@ -71

[PATCH 5.10 037/188] ice: remove DCBNL_DEVRESET bit from PF state

2021-04-12 Thread Greg Kroah-Hartman
Ertman Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/ice/ice.h|1 - drivers/net/ethernet/intel/ice/ice_dcb_nl.c |2 -- drivers/net/ethernet/intel/ice/ice_lib.c|1 - 3 files changed, 4 deletions(-) --

[PATCH 5.10 114/188] arm64: dts: imx8mm/q: Fix pad control of SD1_DATA0

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Stäbler [ Upstream commit 5cfad4f45806f6f898b63b8c77cea7452c704cb3 ] Fix address of the pad control register (IOMUXC_SW_PAD_CTL_PAD_SD1_DATA0) for SD1_DATA0_GPIO2_IO2. This seems to be a typo but it leads to an exception when pinctrl is applied due to wrong memory address access.

[PATCH 5.10 113/188] drivers/net/wan/hdlc_fr: Fix a double free in pvc_xmit

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 1b479fb801602b22512f53c19b1f93a4fc5d5d9d ] In pvc_xmit, if __skb_pad(skb, pad, false) failed, it will free the skb in the first time and goto drop. But the same skb is freed by kfree_skb(skb) in the second time in drop. Maintaining the original function unchan

[PATCH 5.10 107/188] i40e: Fix kernel oops when i40e driver removes VFs

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ] Fix the reason of kernel oops when i40e driver removed VFs. Added new __I40E_VFS_RELEASING state to signalize releasing process by PF, that it makes possible to exit of reset VF procedure. Without this patch, it is pos

[PATCH 5.10 108/188] hostfs: fix memory handling in follow_link()

2021-04-12 Thread Greg Kroah-Hartman
From: Al Viro [ Upstream commit 7f6c411c9b50cfab41cc798e003eff27608c7016 ] 1) argument should not be freed in any case - the caller already has it as ->s_fs_info (and uses it a lot afterwards) 2) allocate readlink buffer with kmalloc() - the caller has no way to tell if it's got that (on absolut

[PATCH 5.10 109/188] amd-xgbe: Update DMA coherency values

2021-04-12 Thread Greg Kroah-Hartman
From: Shyam Sundar S K [ Upstream commit d75135082698140a26a56defe1bbc1b06f26a41f ] Based on the IOMMU configuration, the current cache control settings can result in possible coherency issues. The hardware team has recommended new settings for the PCI device path to eliminate the issue. Fixes:

[PATCH 5.10 110/188] vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply

2021-04-12 Thread Greg Kroah-Hartman
From: Antoine Tenart [ Upstream commit 30a93d2b7d5a7cbb53ac19c9364a256d1aa6c08a ] When the interface is part of a bridge or an Open vSwitch port and a packet exceed a PMTU estimate, an ICMP reply is sent to the sender. When using the external mode (collect metadata) the source and destination ad

[PATCH 5.10 064/188] nl80211: fix potential leak of ACL params

2021-04-12 Thread Greg Kroah-Hartman
probe response support") Link: https://lore.kernel.org/r/20210408142833.d8bc2e2e454a.If290b1ba85789726a671ff0b237726d4851b5b0f@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/nl80211.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)

[PATCH 5.10 063/188] nl80211: fix beacon head validation

2021-04-12 Thread Greg Kroah-Hartman
annes Berg Link: https://lore.kernel.org/r/20210408154518.d9b06d39b4ee.Iff908997b2a4067e8d456b3cb96cab9771d252b8@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/nl80211.c |6 +- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/net/wireless

[PATCH 5.10 065/188] cfg80211: check S1G beacon compat element length

2021-04-12 Thread Greg Kroah-Hartman
/20210408142826.f6f4525012de.I9fdeff0afdc683a6024e5ea49d2daa3cd2459d11@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/scan.c | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) --- a/net/wireless/scan.c +++ b/net/wireless/scan.c @@ -2

[PATCH 5.10 066/188] mac80211: fix time-is-after bug in mlme

2021-04-12 Thread Greg Kroah-Hartman
ned-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/mac80211/mlme.c |5 - 1 file changed, 4 insertions(+), 1 deletion(-) --- a/net/mac80211/mlme.c +++ b/net/mac80211/mlme.c @@ -4660,7 +4660,10 @@ static void ieee80211_sta_conn_mon_timer timeout = sta->rx_

[PATCH 5.10 067/188] mac80211: fix TXQ AC confusion

2021-04-12 Thread Greg Kroah-Hartman
t;tid). Fixes: adf8ed01e4fd ("mac80211: add an optional TXQ for other PS-buffered frames") Acked-by: Toke Høiland-Jørgensen Link: https://lore.kernel.org/r/20210323210500.bf4d50afea4a.I136ffde910486301f8818f5442e3c9bf8670a9c4@changeid Signed-off-by: Johannes Berg Signed-off-by: G

[PATCH 5.10 068/188] net: hsr: Reset MAC header for Tx path

2021-04-12 Thread Greg Kroah-Hartman
make sure that the skb is prepared correctly. Fixes: d346a3fae3ff ("packet: introduce PACKET_QDISC_BYPASS socket option") Signed-off-by: Kurt Kanzenbach Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/hsr/hsr_device.c |1 + net/hs

[PATCH 5.10 059/188] i40e: Fix sparse errors in i40e_txrx.c

2021-04-12 Thread Greg Kroah-Hartman
XDP support for pass and drop actions") Fixes: 2e6893123830 ("i40e: split XDP_TX tail and XDP_REDIRECT map flushing") Signed-off-by: Aleksandr Loktionov Signed-off-by: Arkadiusz Kubalewski Tested-by: Dave Switzer Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- d

[PATCH 5.10 098/188] ARM: OMAP4: Fix PMIC voltage domains for bionic

2021-04-12 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit 30916faa1a6009122e10d0c42338b8db44a36fde ] We are now registering the mpu domain three times instead of registering mpu, core and iva domains like we should. Fixes: d44fa156dcb2 ("ARM: OMAP2+: Configure voltage controller for cpcap") Signed-off-by: Tony Lin

[PATCH 5.10 093/188] ice: Recognize 860 as iSCSI port in CEE mode

2021-04-12 Thread Greg Kroah-Hartman
From: Chinh T Cao [ Upstream commit aeac8ce864d9c0836e12ed5b5cc80f62f3cccb7c ] iSCSI can use both TCP ports 860 and 3260. However, in our current implementation, the ice_aqc_opc_get_cee_dcb_cfg (0x0A07) AQ command doesn't provide a way to communicate the protocol port number to the AQ's caller.

[PATCH 5.10 095/188] xfrm: Use actual socket sk instead of skb socket for xfrm_output_resume

2021-04-12 Thread Greg Kroah-Hartman
From: Evan Nimmo [ Upstream commit 9ab1265d52314fce1b51e8665ea6dbc9ac1a027c ] A situation can occur where the interface bound to the sk is different to the interface bound to the sk attached to the skb. The interface bound to the sk is the correct one however this information is lost inside xfrm

[PATCH 5.10 096/188] remoteproc: qcom: pil_info: avoid 64-bit division

2021-04-12 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 7029e783027706b427bbfbdf8558252c1dac6fa0 ] On 32-bit machines with 64-bit resource_size_t, the driver causes a link failure because of the 64-bit division: arm-linux-gnueabi-ld: drivers/remoteproc/qcom_pil_info.o: in function `qcom_pil_info_store': qcom_pi

[PATCH 5.10 094/188] xfrm: interface: fix ipv4 pmtu check to honor ip header df

2021-04-12 Thread Greg Kroah-Hartman
From: Eyal Birger [ Upstream commit 8fc0e3b6a8666d656923d214e4dc791e9a17164a ] Frag needed should only be sent if the header enables DF. This fix allows packets larger than MTU to pass the xfrm interface and be fragmented after encapsulation, aligning behavior with non-interface xfrm. Fixes: f

[PATCH 5.10 092/188] ice: Refactor DCB related variables out of the ice_port_info struct

2021-04-12 Thread Greg Kroah-Hartman
From: Chinh T Cao [ Upstream commit fc2d1165d4a424dd325ae1f45806565350a58013 ] Refactor the DCB related variables out of the ice_port_info_struct. The goal is to make the ice_port_info struct cleaner. Signed-off-by: Chinh T Cao Co-developed-by: Dave Ertman Signed-off-by: Dave Ertman Tested-b

[PATCH 5.10 089/188] KVM: x86/mmu: Dont allow TDP MMU to yield when recovering NX pages

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit 33a3164161fc86b9cc238f7f2aa2ccb1d5559b1c ] Prevent the TDP MMU from yielding when zapping a gfn range during NX page recovery. If a flush is pending from a previous invocation of the zapping helper, either in the TDP MMU or the legacy MMU, but the TDP

[PATCH 5.10 090/188] KVM: x86/mmu: preserve pending TLB flush across calls to kvm_tdp_mmu_zap_sp

2021-04-12 Thread Greg Kroah-Hartman
From: Paolo Bonzini [ Upstream commit 315f02c60d9425b38eb8ad7f21b8a35e40db23f9 ] Right now, if a call to kvm_tdp_mmu_zap_sp returns false, the caller will skip the TLB flush, which is wrong. There are two ways to fix it: - since kvm_tdp_mmu_zap_sp will not yield and therefore will not flush

[PATCH 5.10 091/188] net: sched: fix err handler in tcf_action_init()

2021-04-12 Thread Greg Kroah-Hartman
From: Vlad Buslov [ Upstream commit b3650bf76a32380d4d80a3e21b5583e7303f216c ] With recent changes that separated action module load from action initialization tcf_action_init() function error handling code was modified to manually release the loaded modules if loading/initialization of any furt

[PATCH 5.10 086/188] KVM: x86/mmu: Yield in TDU MMU iter even if no SPTES changed

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit 1af4a96025b33587ca953c7ef12a1b20c6e70412 ] Given certain conditions, some TDP MMU functions may not yield reliably / frequently enough. For example, if a paging structure was very large but had few, if any writable entries, wrprot_gfn_range could traverse many

[PATCH 5.10 087/188] KVM: x86/mmu: Ensure TLBs are flushed when yielding during GFN range zap

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit a835429cda91621fca915d80672a157b47738afb ] When flushing a range of GFNs across multiple roots, ensure any pending flush from a previous root is honored before yielding while walking the tables of the current root. Note, kvm_tdp_mmu_zap_gfn_range() no

[PATCH 5.10 088/188] KVM: x86/mmu: Ensure TLBs are flushed for TDP MMU during NX zapping

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit 048f49809c526348775425420fb5b8e84fd9a133 ] Honor the "flush needed" return from kvm_tdp_mmu_zap_gfn_range(), which does the flush itself if and only if it yields (which it will never do in this particular scenario), and otherwise expects the caller to

[PATCH 5.10 062/188] net: sched: fix action overwrite reference counting

2021-04-12 Thread Greg Kroah-Hartman
() remove pointers to created actions from actions array before passing it to tcf_action_put_many(). Fixes: cae422f379f3 ("net: sched: use reference counting action init") Reported-by: Kumar Kartikeya Dwivedi Signed-off-by: Vlad Buslov Signed-off-by: David S. Miller Signed-off-by: Greg

[PATCH 5.10 085/188] KVM: x86/mmu: Ensure forward progress when yielding in TDP MMU iter

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit ed5e484b79e8a9b8be714bd85b6fc70bd6dc99a7 ] In some functions the TDP iter risks not making forward progress if two threads livelock yielding to one another. This is possible if two threads are trying to execute wrprot_gfn_range. Each could write protect an entr

[PATCH 5.10 084/188] KVM: x86/mmu: Rename goal_gfn to next_last_level_gfn

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit 74953d3530280dc53256054e1906f58d07bfba44 ] The goal_gfn field in tdp_iter can be misleading as it implies that it is the iterator's final goal. It is really a target for the lowest gfn mapped by the leaf level SPTE the iterator will traverse towards. Change the

[PATCH 5.10 077/188] driver core: Fix locking bug in deferred_probe_timeout_work_func()

2021-04-12 Thread Greg Kroah-Hartman
ed-off-by: Greg Kroah-Hartman --- drivers/base/dd.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/drivers/base/dd.c +++ b/drivers/base/dd.c @@ -292,14 +292,16 @@ int driver_deferred_probe_check_state(st static void deferred_probe_timeout_work_func(struct wo

[PATCH 5.10 078/188] scsi: pm80xx: Fix chip initialization failure

2021-04-12 Thread Greg Kroah-Hartman
5.10+ Link: https://lore.kernel.org/r/20210402054212.17834-1-viswa...@microchip.com.com Reported-and-tested-by: Ash Izat Signed-off-by: Viswas G Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/pm8001/pm8001_hwi.c |8 1 file changed, 4 insertions(+), 4

[PATCH 5.10 079/188] scsi: target: iscsi: Fix zero tag inside a trace event

2021-04-12 Thread Greg Kroah-Hartman
-1-r.bolsha...@yadro.com Cc: sta...@vger.kernel.org # 5.10+ Reviewed-by: Mike Christie Signed-off-by: Roman Bolshakov Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/target/iscsi/iscsi_target.c |3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a

[PATCH 5.10 061/188] net: sched: sch_teql: fix null-pointer dereference

2021-04-12 Thread Greg Kroah-Hartman
create() imediately calls teql_destroy() which does not expect zero master pointer and we get OOPS. Fixes: 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation") Signed-off-by: Pavel Tikhomirov Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartma

<    5   6   7   8   9   10   11   12   13   14   >