ki
Tested-by: Dave Switzer
Signed-off-by: Tony Nguyen
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/ethernet/intel/i40e/i40e_main.c |3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
--- a/drivers/net/ethernet/intel/i40e/i40e_main.c
+++ b/drivers/net/ethernet/intel/i40e/i40e_main.c
@@ -25
abend
Signed-off-by: Daniel Borkmann
Link:
https://lore.kernel.org/bpf/161731441904.68884.15593917809745631972.stgit@john-XPS-13-9370
Signed-off-by: Greg Kroah-Hartman
---
include/linux/skmsg.h |7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
--- a/include/linux/skmsg.h
+++ b/in
'
Fixes: 4ff0ee1af0169 ("i40e: Introduce recovery mode support")
Signed-off-by: Aleksandr Loktionov
Signed-off-by: Arkadiusz Kubalewski
Tested-by: Dave Switzer
Signed-off-by: Tony Nguyen
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/ethernet/intel/i40e/i40e_main.c |8 ++
ff-by: Daniel Borkmann
Link:
https://lore.kernel.org/bpf/161731444013.68884.4021114312848535993.stgit@john-XPS-13-9370
Signed-off-by: Greg Kroah-Hartman
---
net/core/skmsg.c | 12 +---
1 file changed, 5 insertions(+), 7 deletions(-)
--- a/net/core/skmsg.c
+++ b/net/core/skmsg.c
@@ -488,6 +48
tarovoitov
Link: https://lore.kernel.org/bpf/20210331061218.1647-4-ciara.lof...@intel.com
Signed-off-by: Greg Kroah-Hartman
---
tools/lib/bpf/xsk.c | 13 +++--
1 file changed, 11 insertions(+), 2 deletions(-)
--- a/tools/lib/bpf/xsk.c
+++ b/tools/lib/bpf/xsk.c
@@ -54,6 +54,8 @@ struc
b82a38 ("bpf: Introduce helper bpf_get_task_stack()")
Signed-off-by: Dave Marchevsky
Signed-off-by: Alexei Starovoitov
Acked-by: Song Liu
Link: https://lore.kernel.org/bpf/20210401000747.3648767-1-davemarchev...@fb.com
Signed-off-by: Greg Kroah-Hartman
---
kernel/bpf/stackmap.c | 12
xes: bcf0cafab44fd ("nfp: split out common control message handling code")
Signed-off-by: Lv Yunlong
Reviewed-by: Jakub Kicinski
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/ethernet/netronome/nfp/bpf/cmsg.c |1 +
1 file changed, 1 insertion(+)
ueues and devices")
Signed-off-by: Ciara Loftus
Signed-off-by: Alexei Starovoitov
Acked-by: Magnus Karlsson
Link: https://lore.kernel.org/bpf/20210331061218.1647-2-ciara.lof...@intel.com
Signed-off-by: Greg Kroah-Hartman
---
tools/lib/bpf/xsk.c |3 +++
1 file changed, 3 insertions(+)
--- a
ueues and devices")
Signed-off-by: Ciara Loftus
Signed-off-by: Alexei Starovoitov
Link: https://lore.kernel.org/bpf/20210331061218.1647-3-ciara.lof...@intel.com
Signed-off-by: Greg Kroah-Hartman
---
tools/lib/bpf/xsk.c | 41 +++--
1 file changed, 23 inserti
https://bugs.gentoo.org/769614 [1]
Link: https://lkml.kernel.org/r/20210331084447.2561532-1-sly...@gentoo.org
Signed-off-by: Sergei Trofimovich
Reported-by: Dmitry V. Levin
Cc: Oleg Nesterov
Cc:
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
Signed-off-by: Greg Kroah-Hartman
---
arch/ia64/i
-Jørgensen
Signed-off-by: Daniel Borkmann
Acked-by: Martin KaFai Lau
Link: https://lore.kernel.org/bpf/20210326100314.121853-1-t...@redhat.com
Signed-off-by: Greg Kroah-Hartman
---
kernel/bpf/verifier.c |5 +
1 file changed, 5 insertions(+)
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/
Signed-off-by: Greg Kroah-Hartman
---
kernel/bpf/inode.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/kernel/bpf/inode.c
+++ b/kernel/bpf/inode.c
@@ -546,7 +546,7 @@ int bpf_obj_get_user(const char __user *
else if (type == BPF_TYPE_MAP)
ret = bpf_map
: 72dc1c096c705 ("HSO: add option hso driver")
Reported-by: syzbot+c49fe6089f295a05e...@syzkaller.appspotmail.com
Tested-by: syzbot+c49fe6089f295a05e...@syzkaller.appspotmail.com
Reviewed-by: Greg Kroah-Hartman
Signed-off-by: Anirudh Rayabharam
Signed-off-by: David S. Miller
Signed-off-by:
5.138750-1-pctamm...@mojatatu.com
Signed-off-by: Greg Kroah-Hartman
---
tools/lib/bpf/ringbuf.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/tools/lib/bpf/ringbuf.c
+++ b/tools/lib/bpf/ringbuf.c
@@ -227,7 +227,7 @@ static int ringbuf_process_ring(struct r
Cc: [5.4+]
Signed-off-by: Greg Kroah-Hartman
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
---
kernel/gcov/clang.c | 29 +++--
1 file changed, 19 insertions(+), 10 deletions(-)
--- a/kernel/gcov/clang.c
+++ b/kernel/gcov/clang.c
@@ -70,7 +70,9
Fixes: ed0022da8bd9 ("iwlwifi: pcie: set LTR on more devices")
Signed-off-by: Luca Coelho
Signed-off-by: Kalle Valo
Link:
https://lore.kernel.org/r/iwlwifi.20210326125611.675486178ed1.Ib61463aba6920645059e366dcdca4c4c77f0ff58@changeid
Signed-off-by: Greg Kroah-Hartman
---
drivers/ne
] worker_thread+0x221/0x3f0
[<bb2b556b>] kthread+0x14c/0x170
[<ad2cf1cd>] ret_from_fork+0x1f/0x30
Fixes: 769c500dcc1e ("ice: Add advanced power mgmt for WoL")
Signed-off-by: Yongxin Liu
Tested-by: Tony Brelinski
Signed-off-by: Tony Nguyen
Signed-off
io Pricoco
Tested-by: Tony Brelinski
Signed-off-by: Tony Nguyen
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/ethernet/intel/ice/ice_controlq.h |4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--- a/drivers/net/ethernet/intel/ice/ice_controlq.h
+++ b/drivers/net/ethernet
Krzysztof Goreczny
Tested-by: Tony Brelinski
Signed-off-by: Tony Nguyen
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/ethernet/intel/ice/ice.h |1 +
drivers/net/ethernet/intel/ice/ice_lib.c |4 ++--
drivers/net/ethernet/intel/ice/ice_main.c | 28 +++
Reported-by: syzbot
Tested-by: syzbot
Signed-off-by: Tetsuo Handa
Fixes: ced72933a5e8ab52 ("batman-adv: use CRC32C instead of CRC16 in TT code")
Fixes: 7ea7b4a142758dea ("batman-adv: make the TT CRC logic VLAN specific")
Acked-by: Sven Eckelmann
Signed-off-by: David S. Mi
@intel.com
[4] https://lore.kernel.org/r/20210315131512.133720-2-jacopo+rene...@jmondi.org
Cc: Liam Beguin
Cc: Helge Deller
Cc: sta...@vger.kernel.org # v5.8+
Signed-off-by: Gao Xiang
Signed-off-by: Helge Deller
Signed-off-by: Greg Kroah-Hartman
---
arch/parisc/include/asm/cmpxchg.h |2 +
, the user
will not be able to update the NVM. So do not fail probe on link/PHY
errors.
Fixes: 1a3571b5938c ("ice: restore PHY settings on media insertion")
Signed-off-by: Anirudh Venkataramanan
Tested-by: Tony Brelinski
Signed-off-by: Tony Nguyen
Signed-off-by: Greg Kroah-Hartman
---
d
Reviewed-by: Andrew Lunn
Signed-off-by: Gregory CLEMENT
Signed-off-by: Greg Kroah-Hartman
---
arch/arm/boot/dts/armada-385-turris-omnia.dts |1 +
1 file changed, 1 insertion(+)
--- a/arch/arm/boot/dts/armada-385-turris-omnia.dts
+++ b/arch/arm/boot/dts/armada-385-turris-omnia.
-2020-25670
Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when
creating a socket")
Reported-by: "kiyin(尹亮)"
Link: https://www.openwall.com/lists/oss-security/2020/11/01/1
Cc: #v3.6
Signed-off-by: Xiaoming Ni
Signed-off-by: David S. Miller
Signed-off-by
-rc.git
linux-5.10.y
and the diffstat can be found below.
thanks,
greg k-h
-
Pseudo-Shortlog of commits:
Greg Kroah-Hartman
Linux 5.10.30-rc1
Vlad Buslov
Revert "net: sched: bump refcount for new action in ACT replace mode"
Alexander Aring
net: ieee802154: stop
: Brown
Fixes: 161aff1d93ab "LOOKUP_MOUNTPOINT: fold path_mountpointat() into
path_lookupat()"
Cc: sta...@vger.kernel.org # v5.7+
Signed-off-by: Al Viro
Signed-off-by: Greg Kroah-Hartman
---
fs/namei.c |8
1 file changed, 4 insertions(+), 4 deletions(-)
--- a/fs/namei.
urs.
fix CVE-2020-25672
Fixes: d646960f7986 ("NFC: Initial LLCP support")
Reported-by: "kiyin(尹亮)"
Link: https://www.openwall.com/lists/oss-security/2020/11/01/1
Cc: #v3.3
Signed-off-by: Xiaoming Ni
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
net/
ot;)
Reported-by: "kiyin(尹亮)"
Link: https://www.openwall.com/lists/oss-security/2020/11/01/1
Cc: #v3.11
Signed-off-by: Xiaoming Ni
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
net/nfc/llcp_sock.c |4
1 file changed, 4 insertions(+)
--- a/net/nfc/ll
-2020-25671
Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when
creating a socket")
Reported-by: "kiyin(尹亮)"
Link: https://www.openwall.com/lists/oss-security/2020/11/01/1
Cc: #v3.6
Signed-off-by: Xiaoming Ni
Signed-off-by: David S. Miller
Signe
ink: https://lore.kernel.org/r/20210324132711.216152-2-hdego...@redhat.com
Signed-off-by: Mark Brown
Signed-off-by: Greg Kroah-Hartman
---
sound/soc/intel/atom/sst-mfld-platform-pcm.c |6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
--- a/sound/soc/intel/atom/sst-mfld-platform-p
Kroah-Hartman
---
sound/pci/hda/patch_realtek.c | 16
1 file changed, 16 insertions(+)
--- a/sound/pci/hda/patch_realtek.c
+++ b/sound/pci/hda/patch_realtek.c
@@ -3927,6 +3927,15 @@ static void alc271_fixup_dmic(struct hda
snd_hda_sequence_write(codec, verbs
/show_bug.cgi?id=212407
Cc:
Link: https://lore.kernel.org/r/20210401171314.667-1-ti...@suse.de
Signed-off-by: Takashi Iwai
Signed-off-by: Greg Kroah-Hartman
---
sound/pci/hda/patch_conexant.c |1 +
1 file changed, 1 insertion(+)
--- a/sound/pci/hda/patch_conexant.c
+++ b/sound/pci/hda
() will not queue the events properly.
Signed-off-by: Jonas Holmberg
Reviewed-by: Jaroslav Kysela
Cc:
Link: https://lore.kernel.org/r/20210407075428.2666787-1-jona...@axis.com
Signed-off-by: Takashi Iwai
Signed-off-by: Greg Kroah-Hartman
---
sound/drivers/aloop.c | 11 ---
1 file
exporting it instead is better.
Reported-by: kernel test robot
Fixes: 8c182bd7 ("CPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead()")
Cc: # 5.10+
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: Rafael J. Wysocki
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include
cgi?id=1184074
Cc:
Signed-off-by: Takashi Iwai
Signed-off-by: Ville Syrjälä
Link:
https://patchwork.freedesktop.org/patch/msgid/20210402082317.871-1-ti...@suse.de
(cherry picked from commit 337d7a1621c7f02af867229990ac67c97da1b53a)
Signed-off-by: Rodrigo Vivi
Signed-off-by: Greg Kroah-Hart
("net: dsa: lantiq_gswip: Let GSWIP automatically set the
xMII clock")
Cc: sta...@vger.kernel.org
Acked-by: Hauke Mehrtens
Reviewed-by: Andrew Lunn
Signed-off-by: Martin Blumenstingl
Reviewed-by: Florian Fainelli
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
--
e Mehrtens
Signed-off-by: Martin Blumenstingl
Reviewed-by: Florian Fainelli
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/dsa/lantiq_gswip.c | 19 ---
1 file changed, 16 insertions(+), 3 deletions(-)
--- a/drivers/net/dsa/lantiq_gswip.c
+++
From: Lukasz Bartosik
[ Upstream commit 7045465500e465b09f09d6e5bdc260a9f1aab97b ]
Fix invalid usage of a list_for_each_entry cursor in
clk_notifier_unregister(). When list is empty or if the list
is completely traversed (without breaking from the loop on one
of the entries) then the list
From: Alexander Gordeev
[ Upstream commit 7a2f91441b2c1d81b77c1cd816a4659f4abc9cbe ]
Register variables initialized using arithmetic. That leads to
kasan instrumentaton code corrupting the registers contents.
Follow GCC guidlines and use temporary variables for assigning
init values to register
From: Zqiang
[ Upstream commit 0687c66b5f666b5ad433f4e94251590d9bc9d10e ]
The debug_work_activate() is called on the premise that
the work can be inserted, because if wq be in WQ_DRAINING
status, insert work may be failed.
Fixes: e41e704bc4f4 ("workqueue: improve destroy_workqueue()
From: Aya Levin
[ Upstream commit 3211434dfe7a66fcf55e43961ea524b78336c04c ]
Use connector_type read from PTYS register when it's valid, based on
corresponding capability bit.
Fixes: 5b4793f81745 ("net/mlx5e: Add support for reading connector type from
PTYS")
Signed-off-by: Aya Levin
From: Daniel Jurgens
[ Upstream commit a7b76002ae78cd230ee652ccdfedf21aa94fcecc ]
Calculating the number of compeltion EQs based on the number of
available IRQ vectors doesn't work now that all async EQs share one IRQ.
Thus the max number of EQs can be exceeded on systems with more than
From: Yinjun Zhang
[ Upstream commit 2ea538dbee1c79f6f6c24a6f2f82986e4b7ccb78 ]
A merge hint message needs some time to process before the merged
flow actually reaches the firmware, during which we may get duplicate
merge hints if there're more than one packet that hit the pre-merged
flow. And
From: Rahul Lakkireddy
[ Upstream commit 1bfb3dea965ff9f6226fd1709338f227363b6061 ]
Accessing SGE_QBASE_MAP[0-3] and SGE_QBASE_INDEX registers can lead
to SGE missing doorbells under heavy traffic. So, only collect them
when adapter is idle. Also update the regdump range to skip collecting
From: Stefan Riedmueller
[ Upstream commit f57011e72f5fe0421ec7a812beb1b57bdf4bb47f ]
Setting the vmmc supplies is crucial since otherwise the supplying
regulators get disabled and the SD interfaces are no longer powered
which leads to system failures if the system is booted from that SD
03654.3911-1-wen.gang.w...@oracle.com
Signed-off-by: Wengang Wang
Reviewed-by: Joseph Qi
Cc: Mark Fasheh
Cc: Joel Becker
Cc: Junxiao Bi
Cc: Changwei Ge
Cc: Gang He
Cc: Jun Piao
Cc:
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
Signed-off-by: Greg Kroah-Hartman
---
fs/ocfs2/a
tiq / Intel DSA driver for vrx200")
Signed-off-by: Martin Blumenstingl
Reviewed-by: Florian Fainelli
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/dsa/lantiq_gswip.c |9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
--- a/drivers/net/dsa/
luca.fance...@arm.com
Signed-off-by: Boris Ostrovsky
Signed-off-by: Greg Kroah-Hartman
---
drivers/xen/events/events_base.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
--- a/drivers/xen/events/events_base.c
+++ b/drivers/xen/events/events_base.c
@@ -108,7 +108,7 @@ struc
-Coverity: ("NULL pointer dereference")
Signed-off-by: Muhammad Usama Anjum
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
net/ipv6/route.c |8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
--- a/net/ipv6/route.c
+++ b/net/ipv6/route.c
@@ -5203,9 +5203,11
kernel.org
Fixes: 1b8b31a2e612 ("selinux: convert policy read-write lock to RCU")
Signed-off-by: Ondrej Mosnacek
Signed-off-by: Paul Moore
Signed-off-by: Greg Kroah-Hartman
---
security/selinux/ss/services.c | 157 +++--
security/selinux/ss/sidtab.c |
ff-by: Dmitry Safonov
Signed-off-by: Steffen Klassert
Signed-off-by: Greg Kroah-Hartman
---
net/xfrm/xfrm_compat.c | 12 +---
1 file changed, 9 insertions(+), 3 deletions(-)
--- a/net/xfrm/xfrm_compat.c
+++ b/net/xfrm/xfrm_compat.c
@@ -216,7 +216,7 @@ static struct nlmsghdr *
or 3 to just two slots instead of 4, which
makes the sequence more consistent.
Cc: sta...@vger.kernel.org
Fixes: c7c556f1e81b ("selinux: refactor changing booleans")
Signed-off-by: Ondrej Mosnacek
Signed-off-by: Paul Moore
Signed-off-by: Greg Kroah-Hartman
---
security/selinux/
htable when it's not allocated.
Cc: sta...@vger.kernel.org
Signed-off-by: Ondrej Mosnacek
Signed-off-by: Paul Moore
Signed-off-by: Greg Kroah-Hartman
---
security/selinux/ss/avtab.c | 21 +++--
1 file changed, 11 insertions(+), 10 deletions(-)
--- a/security/selinux/ss/avtab.c
for
Fixes: 9d3de3c58347 ("dt-bindings: net: Add YAML schemas for the generic
Ethernet options")
Signed-off-by: Rafał Miłecki
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
Documentation/devicetree/bindings/net/ethernet-controller.yaml |2 +-
1 file change
From: Zheng Yongjun
[ Upstream commit 5e359044c107ecbdc2e9b3fd5ce296006e6de4bc ]
Simplify the return expression.
Signed-off-by: Zheng Yongjun
Reviewed-by: Eelco Chaudron
Signed-off-by: David S. Miller
Signed-off-by: Sasha Levin
---
net/openvswitch/conntrack.c | 6 +-
1 file changed, 1
09.32599-1-krzysztof.kozlow...@canonical.com
Signed-off-by: Stephen Boyd
Signed-off-by: Greg Kroah-Hartman
---
drivers/clk/socfpga/clk-gate.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/drivers/clk/socfpga/clk-gate.c
+++ b/drivers/clk/socfpga/clk-gate.c
@@ -99,7 +99,7 @@ static uns
f-by: Greg Kroah-Hartman
---
drivers/ras/cec.c | 15 ---
1 file changed, 12 insertions(+), 3 deletions(-)
--- a/drivers/ras/cec.c
+++ b/drivers/ras/cec.c
@@ -309,11 +309,20 @@ static bool sanity_check(struct ce_array
return ret;
}
+/**
+ * cec_add_elem - Add an element
From: Leon Romanovsky
[ Upstream commit d1c803a9ccd7bd3aff5e989ccfb39ed3b799b975 ]
The nla_len() is less than or equal to 16. If it's less than 16 then end
of the "gid" buffer is uninitialized.
Fixes: ae43f8286730 ("IB/core: Add IP to GID netlink offload")
Link:
From: Potnuri Bharat Teja
[ Upstream commit 603c4690b01aaffe3a6c3605a429f6dac39852ae ]
ipv6 bit is wrongly set by the below which causes fatal adapter lookup
engine errors for ipv4 connections while destroying a listener. Fix it to
properly check the local address for ipv6.
Fixes:
From: Aya Levin
[ Upstream commit 534b1204ca4694db1093b15cf3e79a99fcb6a6da ]
Add reserved mapping to cover all the register in order to avoid setting
arbitrary values to newer FW which implements the reserved fields.
Fixes: 50b4a3c23646 ("net/mlx5: PPTB and PBMC register firmware command
...@syzkaller.appspotmail.com
Signed-off-by: Alexander Aring
Link: https://lore.kernel.org/r/20210405003054.256017-16-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl802154.c |5 +
1 file changed, 5 insertions(+)
--- a/net/ieee802154/nl802154.c
+++ b/net
From: Greg Kroah-Hartman
This reverts commit a2c5e4a083a7e24b35b3eb808b760af6de15bac2 which is
commit a738c93fb1c17e386a09304b517b1c6b2a6a5a8b upstream.
It is reported to cause problems in older kernels, so revert it for now
until we can figure it out...
Reported-by: Salvatore Bonaccorso
Link
From: Raed Salem
[ Upstream commit a14587dfc5ad2312dabdd42a610d80ecd0dc8bea ]
The cited commit wrongly placed log_max_flow_counter field of
mlx5_ifc_flow_table_prop_layout_bits, align it to the HW spec intended
placement.
Fixes: 16f1c5bb3ed7 ("net/mlx5: Check device capability for maximum flow
://lore.kernel.org/r/20210405003054.256017-3-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl802154.c |3 +++
1 file changed, 3 insertions(+)
--- a/net/ieee802154/nl802154.c
+++ b/net/ieee802154/nl802154.c
@@ -1400,6 +1400,9 @@ static int
...@syzkaller.appspotmail.com
Signed-off-by: Alexander Aring
Link: https://lore.kernel.org/r/20210405003054.256017-15-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl802154.c |3 +++
1 file changed, 3 insertions(+)
--- a/net/ieee802154/nl802154.c
From: Guangbin Huang
[ Upstream commit ed7bedd2c3ca040f1e8ea02c6590a93116b1ec78 ]
Currently, the VF down state bit is cleared after VF sending
link status request command. There is problem that when VF gets
link status replied from PF, the down state bit may still set
as 1. In this case, the
Signed-off-by: Alexander Aring
Link: https://lore.kernel.org/r/20210221174321.14210-4-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl802154.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
--- a/net/ieee802154/nl802154.c
+++ b
Signed-off-by: Alexander Aring
Link: https://lore.kernel.org/r/20210221174321.14210-3-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl802154.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
--- a/net/ieee802154/nl802154.c
+++ b/net
Signed-off-by: Alexander Aring
Link: https://lore.kernel.org/r/20210221174321.14210-2-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl802154.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
--- a/net/ieee802154/nl802154.c
+++ b
Signed-off-by: Alexander Aring
Link: https://lore.kernel.org/r/20210221174321.14210-1-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl802154.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
--- a/net/ieee802154/nl802154.c
+++ b/net
-by: Alexander Aring
Link: https://lore.kernel.org/r/20210228151817.95700-4-aahri...@redhat.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/ieee802154/nl-mac.c |7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
--- a/net/ieee802154/nl-mac.c
+++ b/net
vel Skripkin
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/can/usb/peak_usb/pcan_usb_core.c |6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
--- a/drivers/net/can/usb/peak_usb/pcan_usb_core.c
+++ b/drivers/net/can/usb/peak_usb/pcan_usb_c
-by: Pavel Skripkin
Reported-by: syzbot+9ec037722d2603a9f...@syzkaller.appspotmail.com
Acked-by: Alexander Aring
Link: https://lore.kernel.org/r/20210304152125.1052825-1-paskrip...@gmail.com
Signed-off-by: Stefan Schmidt
Signed-off-by: Greg Kroah-Hartman
---
net/mac802154/llsec.c |2 +-
1 file
-by: Pavel Skripkin
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/ieee802154/atusb.c |1 +
1 file changed, 1 insertion(+)
--- a/drivers/net/ieee802154/atusb.c
+++ b/drivers/net/ieee802154/atusb.c
@@ -365,6 +365,7 @@ static int atusb_alloc_urbs(struct atusb
ed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
drivers/net/tun.c | 48
1 file changed, 48 insertions(+)
--- a/drivers/net/tun.c
+++ b/drivers/net/tun.c
@@ -68,6 +68,14 @@
#include
#include
#include
+#include
+#include
+#i
ya Dwivedi
Signed-off-by: David S. Miller
Signed-off-by: Greg Kroah-Hartman
---
net/sched/act_api.c |3 +++
1 file changed, 3 insertions(+)
--- a/net/sched/act_api.c
+++ b/net/sched/act_api.c
@@ -935,6 +935,9 @@ struct tc_action *tcf_action_init_1(stru
if (err != ACT
Johannes Berg
Signed-off-by: Greg Kroah-Hartman
---
net/wireless/sme.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/net/wireless/sme.c
+++ b/net/wireless/sme.c
@@ -530,7 +530,7 @@ static int cfg80211_sme_connect(struct w
cfg80211_sme_free(wdev);
}
-
From: Eric Dumazet
[ Upstream commit 3a87571f0ffc51ba3bf3ecdb6032861d0154b164 ]
This fixes following syzbot report:
UBSAN: shift-out-of-bounds in ./include/net/red.h:237:23
shift exponent 32 is too large for 32-bit type 'unsigned int'
CPU: 1 PID: 8418 Comm: syz-executor170 Not tainted
From: Payal Kshirsagar
[ Upstream commit 805a23de2657c10c2ca96588a309a42df947bb36 ]
Remove unnecessary parentheses around the right hand side of an assignment
and align the code.
Signed-off-by: Payal Kshirsagar
Signed-off-by: Pierre-Louis Bossart
Reviewed-by: Ranjani Sridharan
Reviewed-by:
From: Ilya Maximets
[ Upstream commit 4d51419d49930be2701c2633ae271b350397c3ca ]
'struct ovs_zone_limit' has more members than initialized in
ovs_ct_limit_get_default_limit(). The rest of the memory is a random
kernel stack content that ends up being sent to userspace.
Fix that by using
From: Andy Shevchenko
[ Upstream commit b58c4e96192ee7c47d5c67853b1557306cfa0e7f ]
Improve readability and maintainability by replacing a hardcoded string
allocation and formatting by the use of the kasprintf() helper.
Signed-off-by: Andy Shevchenko
Signed-off-by: Richard Weinberger
From: Eryk Rybak
[ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ]
Fix the reason of kernel oops when i40e driver removed VFs.
Added new __I40E_VFS_RELEASING state to signalize releasing
process by PF, that it makes possible to exit of reset VF procedure.
Without this patch, it is
From: Al Viro
[ Upstream commit 7f6c411c9b50cfab41cc798e003eff27608c7016 ]
1) argument should not be freed in any case - the caller already has
it as ->s_fs_info (and uses it a lot afterwards)
2) allocate readlink buffer with kmalloc() - the caller has no way
to tell if it's got that (on
From: Can Guo
[ Upstream commit 4b42d557a8add52b9a9924fb31e40a218aab7801 ]
In __ufshcd_issue_tm_cmd(), it is not correct to use hba->nutrs + req->tag
as the Task Tag in a TMR UPIU. Directly use req->tag as the Task Tag.
Fixes: e293313262d3 ("scsi: ufs: Fix broken task management command
From: Lukasz Bartosik
[ Upstream commit 8d3c0c01cb2e36b2bf3c06a82b18b228d0c8f5d0 ]
Fix invalid usage of a list_for_each_entry cursor in
clk_notifier_register(). When list is empty or if the list
is completely traversed (without breaking from the loop on one
of the entries) then the list cursor
From: Mateusz Palczewski
[ Upstream commit 90449e98c265296329446c7abcd2aae3b20c0bc9 ]
Add Asym_Pause to supported link modes (it is supported by HW).
Lack of Asym_Pause in supported modes can cause several problems,
i.e. it won't be possible to turn the autonegotiation on
with asymmetric pause
From: Adrian Hunter
[ Upstream commit 026334a3bb6a3919b42aba9fc11843db2b77fd41 ]
Since commit 14d3d54052539a1e ("perf session: Try to read pipe data from
file") 'perf inject' has started printing "PERFILE2h" when not processing
pipes.
The commit exposed perf to the possiblity that the input is
From: Claudiu Beznea
[ Upstream commit a14d273ba15968495896a38b7b3399dba66d0270 ]
Restore CMP screener registers on resume path.
Fixes: c1e85c6ce57ef ("net: macb: save/restore the remaining registers and
features")
Signed-off-by: Claudiu Beznea
Acked-by: Nicolas Ferre
Signed-off-by: David
From: Can Guo
[ Upstream commit 1235fc569e0bf541ddda0a1224d4c6fa6d914890 ]
ufshcd_tmc_handler() calls blk_mq_tagset_busy_iter(fn = ufshcd_compl_tm()),
but since blk_mq_tagset_busy_iter() only iterates over all reserved tags
and requests which are not in IDLE state, ufshcd_compl_tm() never gets
From: Shyam Sundar S K
[ Upstream commit d75135082698140a26a56defe1bbc1b06f26a41f ]
Based on the IOMMU configuration, the current cache control settings can
result in possible coherency issues. The hardware team has recommended
new settings for the PCI device path to eliminate the issue.
From: Venkat Gopalakrishnan
[ Upstream commit 9333d77573485c827b4c0fc960c840df3e5ce719 ]
Return IRQ_HANDLED only if the irq is really handled, this will help in
catching spurious interrupts that go unhandled.
Link:
From: Bart Van Assche
[ Upstream commit 7252a3603015f1fd04363956f4b72a537c9f9c42 ]
Instead of tracking which tags are in use in the ufs_hba.lrb_in_use
bitmask, rely on the block layer tag allocation mechanism. This patch
removes the following busy-waiting loop if ufshcd_issue_devman_upiu_cmd()
From: Bart Van Assche
[ Upstream commit 69a6c269c097d780a2db320ecd47f7a62fafd92e ]
Manage TMF tags with blk_{get,put}_request() instead of
ufshcd_get_tm_free_slot() / ufshcd_put_tm_slot(). Store a per-request
completion pointer in request.end_io_data instead of using a waitqueue to
report TMF
From: Steffen Klassert
[ Upstream commit b1e3a5607034aa0a481c6f69a6893049406665fb ]
When xfrm interfaces are used in combination with namespaces
and ESP offload, we get a dst_entry NULL pointer dereference.
This is because we don't have a dst_entry attached in the ESP
offloading case and we
From: Norman Maurer
[ Upstream commit 98184612aca0a9ee42b8eb0262a49900ee9eef0d ]
Support for UDP_GRO was added in the past but the implementation for
getsockopt was missed which did lead to an error when we tried to
retrieve the setting for UDP_GRO. This patch adds the missing switch
case for
From: Stephen Boyd
[ Upstream commit 5620b135aea49a8f41c86aaecfcb1598a7774121 ]
We should set the platform device's driver data to NULL here so that
code doesn't assume the struct drm_device pointer is valid when it could
have been destroyed. The lifetime of this pointer is managed by a kref
From: Lv Yunlong
[ Upstream commit bdc2ab5c61a5c07388f4820ff21e787b4dfd1ced ]
In rds_message_map_pages, the rm is freed by rds_message_put(rm).
But rm is still used by rm->data.op_sg in return value.
My patch assigns ERR_CAST(rm->data.op_sg) to err before the rm is
freed to avoid the uaf.
From: Arnd Bergmann
[ Upstream commit 040f31196e8b2609613f399793b9225271b79471 ]
When building with W=1, gcc points out that the __packed attribute
on struct qm_eqcr_entry conflicts with the 8-byte alignment
attribute on struct qm_fd inside it:
drivers/soc/fsl/qbman/qman.c:189:1: error:
From: Eryk Rybak
[ Upstream commit c3214de929dbf1b7374add8bbed30ce82b197bbb ]
If veb-stats was enabled, the ethtool stats triggered a warning
due to invalid size: 'unexpected stat size for veb.tc_%u_tx_packets'.
This was due to an incorrect structure definition for the statistics.
Structures
From: Bastian Germann
[ Upstream commit 7c0d6e482062eb5c06ecccfab340abc523bdca00 ]
card->owner is a required property and since commit 81033c6b584b ("ALSA:
core: Warn on empty module") a warning is issued if it is empty. Add it.
This fixes following warning observed on Lamobo R1:
WARNING: CPU:
1001 - 1100 of 239926 matches
Mail list logo