[PATCH 4.9 13/62] arm64: kasan: avoid bad virt_to_pfn()

2019-05-06 Thread Greg Kroah-Hartman
From: Mark Rutland commit b0de0ccc8b9edd8846828e0ecdc35deacdf186b0 upstream. Booting a v4.11-rc1 kernel with DEBUG_VIRTUAL and KASAN enabled produces the following splat (trimmed for brevity): [0.00] virt_to_phys used for non-linear address: 2808 (0x2808) [

[PATCH 4.9 16/62] kasan: remove redundant initialization of variable real_size

2019-05-06 Thread Greg Kroah-Hartman
From: Colin Ian King commit 48c232395431c23d35cf3b4c5a090bd793316578 upstream. Variable real_size is initialized with a value that is never read, it is re-assigned a new value later on, hence the initialization is redundant and can be removed. Cleans up clang warning:

[PATCH 4.14 50/75] net: hns: fix ICMP6 neighbor solicitation messages discard problem

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit f058e46855dcbc28edb2ed4736f38a71fd19cadb ] ICMP6 neighbor solicitation messages will be discard by the Hip06 chips, because of not setting forwarding pool. Enable promisc mode has the same problem. This patch fix the wrong forwarding table configs for the multicast vague

[PATCH 4.14 51/75] net: hns: Fix WARNING when remove HNS driver with SMMU enabled

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 8601a99d7c0256b7a7fdd1ab14cf6c1f1dfcadc6 ] When enable SMMU, remove HNS driver will cause a WARNING: [ 141.924177] WARNING: CPU: 36 PID: 2708 at drivers/iommu/dma-iommu.c:443 __iommu_dma_unmap+0xc0/0xc8 [ 141.954673] Modules linked in: hns_enet_drv(-) [ 141.963615] CPU: 36

[PATCH 4.9 10/62] kasan: rework Kconfig settings

2019-05-06 Thread Greg Kroah-Hartman
From: Arnd Bergmann commit e7c52b84fb18f08ce49b6067ae6285aca79084a8 upstream. We get a lot of very large stack frames using gcc-7.0.1 with the default -fsanitize-address-use-after-scope --param asan-stack=1 options, which can easily cause an overflow of the kernel stack, e.g.

[PATCH 4.14 46/75] scsi: storvsc: Fix calculation of sub-channel count

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 382e06d11e075a40b4094b6ef809f8d4bcc7ab2a ] When the number of sub-channels offered by Hyper-V is >= the number of CPUs in the VM, calculate the correct number of sub-channels. The current code produces one too many. This scenario arises only when the number of CPUs is

[PATCH 4.14 48/75] net: hns: Use NAPI_POLL_WEIGHT for hns driver

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit acb1ce15a61154aa501891d67ebf79bc9ea26818 ] When the HNS driver loaded, always have an error print: "netif_napi_add() called with weight 256" This is because the kernel checks the NAPI polling weights requested by drivers and it prints an error message if a driver requests a

[PATCH 4.14 47/75] net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw()

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 3a39a12ad364a9acd1038ba8da67cd8430f30de4 ] This patch is trying to fix the issue due to: [27237.844750] BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x708/0xa18[hns_enet_drv] After hnae_queue_xmit() in hns_nic_net_xmit_hw(), can be interrupted by interruptions, and than

[PATCH 4.14 73/75] clk: x86: Add system specific quirk to mark clocks as critical

2019-05-06 Thread Greg Kroah-Hartman
From: David Müller commit 7c2e07130090ae001a97a6b65597830d6815e93e upstream. Since commit 648e921888ad ("clk: x86: Stop marking clocks as CLK_IS_CRITICAL"), the pmc_plt_clocks of the Bay Trail SoC are unconditionally gated off. Unfortunately this will break systems where these clocks are used

[PATCH 4.14 45/75] scsi: core: add new RDAC LENOVO/DE_Series device

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 1cb1d2c64e812928fe0a40b8f7e74523d0283dbe ] Blacklist "Universal Xport" LUN. It's used for in-band storage array management. Also add model to the rdac dh family. Cc: Martin Wilck Cc: Hannes Reinecke Cc: NetApp RDAC team Cc: Christophe Varoqui Cc: James E.J. Bottomley Cc:

[PATCH 4.14 67/75] IB/core: Destroy QP if XRC QP fails

2019-05-06 Thread Greg Kroah-Hartman
From: Yuval Avnery commit 535005ca8e5e71918d64074032f4b9d4fef8981e upstream. The open-coded variant missed destroy of SELinux created QP, reuse already existing ib_detroy_qp() call and use this opportunity to clean ib_create_qp() from double prints and unclear exit paths. Reported-by: Parav

[PATCH 4.14 66/75] IB/core: Fix potential memory leak while creating MAD agents

2019-05-06 Thread Greg Kroah-Hartman
From: Daniel Jurgens commit 6e88e672b69f0e627acdae74a527b730ea224b6b upstream. If the MAD agents isn't allowed to manage the subnet, or fails to register for the LSM notifier, the security context is leaked. Free the context in these cases. Fixes: 47a2b338fe63 ("IB/core: Enforce security on

[PATCH 4.14 64/75] ASoC: stm32: fix sai driver name initialisation

2019-05-06 Thread Greg Kroah-Hartman
From: Arnaud Pouliquen commit 17d3069ccf06970e2db3f7cbf4335f207524279e upstream. This patch fixes the sai driver structure overwriting which results in a cpu dai name equal NULL. Fixes: 3e086ed ("ASoC: stm32: add SAI driver") Signed-off-by: Arnaud Pouliquen Signed-off-by: Mark Brown

[PATCH 4.14 68/75] Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ

2019-05-06 Thread Greg Kroah-Hartman
From: Anson Huang commit bf2a7ca39fd3ab47ef71c621a7ee69d1813b1f97 upstream. SNVS IRQ is requested before necessary driver data initialized, if there is a pending IRQ during driver probe phase, kernel NULL pointer panic will occur in IRQ handler. To avoid such scenario, just initialize necessary

[PATCH 4.14 62/75] staging: iio: adt7316: fix the dac write calculation

2019-05-06 Thread Greg Kroah-Hartman
From: Jeremy Fertic commit 78accaea117c1ae878774974fab91ac4a0b0e2b0 upstream. The lsb calculation is not masking the correct bits from the user input. Subtract 1 from (1 << offset) to correctly set up the mask to be applied to user input. The lsb register stores its value starting at the bit 7

[PATCH 4.14 60/75] staging: iio: adt7316: allow adt751x to use internal vref for all dacs

2019-05-06 Thread Greg Kroah-Hartman
From: Jeremy Fertic commit 10bfe7cc1739c22f0aa296b39e53f61e9e3f4d99 upstream. With adt7516/7/9, internal vref is available for dacs a and b, dacs c and d, or all dacs. The driver doesn't currently support internal vref for all dacs. Change the else if to an if so both bits are checked rather

[PATCH 4.14 57/75] ARM: iop: dont use using 64-bit DMA masks

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 2125801ccce19249708ca3245d48998e70569ab8 ] clang warns about statically defined DMA masks from the DMA_BIT_MASK macro with length 64: arch/arm/mach-iop13xx/setup.c:303:35: error: shift count >= width of type [-Werror,-Wshift-count-overflow] static u64 iop13xx_adma_dmamask =

[PATCH 4.14 53/75] hugetlbfs: fix memory leak for resv_map

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 58b6e5e8f1addd44583d61b0a03c0f5519527e35 ] When mknod is used to create a block special file in hugetlbfs, it will allocate an inode and kmalloc a 'struct resv_map' via resv_map_alloc(). inode->i_mapping->private_data will point the newly allocated resv_map. However, when the

[PATCH 4.14 54/75] sh: fix multiple function definition build errors

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit acaf892ecbf5be7710ae05a61fd43c668f68ad95 ] Many of the sh CPU-types have their own plat_irq_setup() and arch_init_clk_ops() functions, so these same (empty) functions in arch/sh/boards/of-generic.c are not needed and cause build errors. If there is some case where these empty

[PATCH 4.14 56/75] ARM: orion: dont use using 64-bit DMA masks

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit cd92d74d67c811dc22544430b9ac3029f5bd64c5 ] clang warns about statically defined DMA masks from the DMA_BIT_MASK macro with length 64: arch/arm/plat-orion/common.c:625:29: error: shift count >= width of type [-Werror,-Wshift-count-overflow] .coherent_dma_mask

[PATCH 4.14 07/75] bnxt_en: Improve multicast address setup logic.

2019-05-06 Thread Greg Kroah-Hartman
From: Michael Chan [ Upstream commit b4e30e8e7ea1d1e35ffd64ca46f7d9a7f227b4bf ] The driver builds a list of multicast addresses and sends it to the firmware when the driver's ndo_set_rx_mode() is called. In rare cases, the firmware can fail this call if internal resources to add multicast

[PATCH 4.14 06/75] packet: validate msg_namelen in send directly

2019-05-06 Thread Greg Kroah-Hartman
From: Willem de Bruijn [ Upstream commit 486efdc8f6ce802b27e15921d2353cc740c55451 ] Packet sockets in datagram mode take a destination address. Verify its length before passing to dev_hard_header. Prior to 2.6.14-rc3, the send code ignored sll_halen. This is established behavior. Directly

[PATCH 4.14 09/75] rxrpc: Fix net namespace cleanup

2019-05-06 Thread Greg Kroah-Hartman
From: David Howells [ Upstream commit b13023421b5179413421333f602850914f6a7ad8 ] In rxrpc_destroy_all_calls(), there are two phases: (1) make sure the ->calls list is empty, emitting error messages if not, and (2) wait for the RCU cleanup to happen on outstanding calls (ie. ->nr_calls becomes

[PATCH 4.14 44/75] vfio/pci: use correct format characters

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 426b046b748d1f47e096e05bdcc6fb4172791307 ] When compiling with -Wformat, clang emits the following warnings: drivers/vfio/pci/vfio_pci.c:1601:5: warning: format specifies type 'unsigned short' but the argument has type 'unsigned int' [-Wformat]

[PATCH 4.14 42/75] rtc: da9063: set uie_unsupported when relevant

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 882c5e552ffd06856de42261460f46e18319d259 ] The DA9063AD doesn't support alarms on any seconds and its granularity is the minute. Set uie_unsupported in that case. Reported-by: Wolfram Sang Reported-by: Geert Uytterhoeven Reviewed-by: Wolfram Sang Tested-by: Wolfram Sang

[PATCH 4.14 35/75] bonding: show full hw address in sysfs for slave entries

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 18bebc6dd3281955240062655a4df35eef2c46b3 ] Bond expects ethernet hwaddr for its slave, but it can be longer than 6 bytes - infiniband interface for example. # cat /sys/devices//net/ib0/address 80:00:02:08:fe:80:00:00:00:00:00:00:7c:fe:90:03:00:be:5d:e1 # cat

[PATCH 4.14 33/75] igb: Fix WARN_ONCE on runtime suspend

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit dabb8338be533c18f50255cf39ff4f66d4dabdbe ] The runtime_suspend device callbacks are not supposed to save configuration state or change the power state. Commit fb29f76cc566 ("igb: Fix an issue that PME is not enabled during runtime suspend") changed the driver to not save

[PATCH 4.14 31/75] batman-adv: Reduce tt_global hash refcnt only for removed entry

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit f131a56880d10932931e74773fb8702894a94a75 ] The batadv_hash_remove is a function which searches the hashtable for an entry using a needle, a hashtable bucket selection function and a compare function. It will lock the bucket list and delete an entry when the compare function

[PATCH 4.14 39/75] net: stmmac: dont log oversized frames

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 057a0c5642a2ff2db7c421cdcde34294a23bf37b ] This is log is harmful as it can trigger multiple times per packet. Delete it. Signed-off-by: Aaro Koskinen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/stmicro/stmmac/norm_desc.c | 2 -- 1

[PATCH 4.14 04/75] ipv6: invert flowlabel sharing check in process and user mode

2019-05-06 Thread Greg Kroah-Hartman
From: Willem de Bruijn [ Upstream commit 95c169251bf734aa555a1e8043e4d88ec97a04ec ] A request for a flowlabel fails in process or user exclusive mode must fail if the caller pid or uid does not match. Invert the test. Previously, the test was unsafe wrt PID recycling, but indeed tested for

[PATCH 4.14 03/75] ipv6/flowlabel: wait rcu grace period before put_pid()

2019-05-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 6c0afef5fb0c27758f4d52b2210c61b6bd8b4470 ] syzbot was able to catch a use-after-free read in pid_nr_ns() [1] ip6fl_seq_show() seems to use RCU protection, dereferencing fl->owner.pid but fl_free() releases fl->owner.pid before rcu grace period is started.

[PATCH 4.14 37/75] net: stmmac: dont overwrite discard_frame status

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 1b746ce8b397e58f9e40ce5c63b7198de6930482 ] If we have error bits set, the discard_frame status will get overwritten by checksum bit checks, which might set the status back to good one. Fix by checking the COE status only if the frame is good. Signed-off-by: Aaro Koskinen

[PATCH 4.14 29/75] batman-adv: Reduce claim hash refcnt only for removed entry

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 4ba104f468bbfc27362c393815d03aa18fb7a20f ] The batadv_hash_remove is a function which searches the hashtable for an entry using a needle, a hashtable bucket selection function and a compare function. It will lock the bucket list and delete an entry when the compare function

[PATCH 4.14 28/75] rtc: sh: Fix invalid alarm warning for non-enabled alarm

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 15d82d22498784966df8e4696174a16b02cc1052 ] When no alarm has been programmed on RSK-RZA1, an error message is printed during boot: rtc rtc0: invalid alarm value: 2019-03-14T255:255:255 sh_rtc_read_alarm_value() returns 0xff when querying a hardware alarm field that is not

[PATCH 4.14 22/75] USB: core: Fix unterminated string returned by usb_string()

2019-05-06 Thread Greg Kroah-Hartman
From: Alan Stern commit c01c348ecdc66085e44912c97368809612231520 upstream. Some drivers (such as the vub300 MMC driver) expect usb_string() to return a properly NUL-terminated string, even when an error occurs. (In fact, vub300's probe routine doesn't bother to check the return code from

[PATCH 4.14 21/75] usb: usbip: fix isoc packet num validation in get_pipe

2019-05-06 Thread Greg Kroah-Hartman
From: Malte Leip commit c409ca3be3c6ff3a1eeb303b191184e80d412862 upstream. Change the validation of number_of_packets in get_pipe to compare the number of packets to a fixed maximum number of packets allowed, set to be 1024. This number was chosen due to it being used by other drivers as well,

[PATCH 4.14 02/75] ipv4: ip_do_fragment: Preserve skb_iif during fragmentation

2019-05-06 Thread Greg Kroah-Hartman
From: Shmulik Ladkani [ Upstream commit d2f0c961148f65bc73eda72b9fa3a4e80973cb49 ] Previously, during fragmentation after forwarding, skb->skb_iif isn't preserved, i.e. 'ip_copy_metadata' does not copy skb_iif from given 'from' skb. As a result, ip_do_fragment's creates fragments with zero

[PATCH 4.14 20/75] USB: w1 ds2490: Fix bug caused by improper use of altsetting array

2019-05-06 Thread Greg Kroah-Hartman
From: Alan Stern commit c114944d7d67f24e71562fcfc18d550ab787e4d4 upstream. The syzkaller USB fuzzer spotted a slab-out-of-bounds bug in the ds2490 driver. This bug is caused by improper use of the altsetting array in the usb_interface structure (the array's entries are not always stored in

[PATCH 4.14 26/75] HID: logitech: check the return value of create_singlethread_workqueue

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 6c44b15e1c9076d925d5236ddadf1318b0a25ce2 ] create_singlethread_workqueue may fail and return NULL. The fix checks if it is NULL to avoid NULL pointer dereference. Also, the fix moves the call of create_singlethread_workqueue earlier to avoid resource-release issues.

[PATCH 4.14 14/75] arm64: Fix single stepping in kernel traps

2019-05-06 Thread Greg Kroah-Hartman
From: Julien Thierry commit 6436b5721a8e906e9eabf866f12d04470437 upstream. Software Step exception is missing after stepping a trapped instruction. Ensure SPSR.SS gets set to 0 after emulating/skipping a trapped instruction before doing ERET. Cc: Catalin Marinas Cc: Mark Rutland

[PATCH 4.14 16/75] caif: reduce stack size with KASAN

2019-05-06 Thread Greg Kroah-Hartman
From: Arnd Bergmann commit ce6289661b14a8b391d90db918c91b6d6da6540a upstream. When CONFIG_KASAN is set, we can use relatively large amounts of kernel stack space: net/caif/cfctrl.c:555:1: warning: the frame size of 1600 bytes is larger than 1280 bytes [-Wframe-larger-than=] This adds

[PATCH 4.14 11/75] net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc

2019-05-06 Thread Greg Kroah-Hartman
From: Dan Carpenter [ Upstream commit f949a12fd697479f68d99dc65e9bbab68ee49043 ] The "fs->location" is a u32 that comes from the user in ethtool_set_rxnfc(). We can't pass unclamped values to test_bit() or it results in an out of bounds access beyond the end of the bitmap. Fixes: 7318166cacad

[PATCH 4.19 91/99] mac80211: Honor SW_CRYPTO_CONTROL for unicast keys in AP VLAN mode

2019-05-06 Thread Greg Kroah-Hartman
From: Alexander Wetzel commit 78ad2341521d5ea96cb936244ed4c4c4ef9ec13b upstream. Restore SW_CRYPTO_CONTROL operation on AP_VLAN interfaces for unicast keys, the original override was intended to be done for group keys as those are treated specially by mac80211 and would always have been

[PATCH 4.14 12/75] kasan: remove redundant initialization of variable real_size

2019-05-06 Thread Greg Kroah-Hartman
From: Colin Ian King commit 48c232395431c23d35cf3b4c5a090bd793316578 upstream. Variable real_size is initialized with a value that is never read, it is re-assigned a new value later on, hence the initialization is redundant and can be removed. Cleans up clang warning:

[PATCH 4.19 66/99] fs: stream_open - opener for stream-like files so that read and write can run simultaneously without deadlock

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 10dce8af34226d90fa56746a934f8da5dcdba3df ] Commit 9c225f2655e3 ("vfs: atomic f_pos accesses as per POSIX") added locking for file.f_pos access and in particular made concurrent read and write not possible - now both those functions take f_pos lock for the whole run, and so if

[PATCH 4.19 63/99] hugetlbfs: fix memory leak for resv_map

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 58b6e5e8f1addd44583d61b0a03c0f5519527e35 ] When mknod is used to create a block special file in hugetlbfs, it will allocate an inode and kmalloc a 'struct resv_map' via resv_map_alloc(). inode->i_mapping->private_data will point the newly allocated resv_map. However, when the

[PATCH 4.19 65/99] xsysace: Fix error handling in ace_setup

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 47b16820c490149c2923e8474048f2c6e7557cab ] If xace hardware reports a bad version number, the error handling code in ace_setup() calls put_disk(), followed by queue cleanup. However, since the disk data structure has the queue pointer set, put_disk() also cleans and releases the

[PATCH 4.19 87/99] Input: stmfts - acknowledge that setting brightness is a blocking call

2019-05-06 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit 937c4e552fd1174784045684740edfcea536159d upstream. We need to turn regulators on and off when switching brightness, and that may block, therefore we have to set stmfts_brightness_set() as LED's brightness_set_blocking() method. Fixes: 78bcac7b2ae1 ("Input: add

[PATCH 4.19 62/99] kmemleak: powerpc: skip scanning holes in the .bss section

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 298a32b132087550d3fa80641ca58323c5dfd4d9 ] Commit 2d4f567103ff ("KVM: PPC: Introduce kvm_tmp framework") adds kvm_tmp[] into the .bss section and then free the rest of unused spaces back to the page allocator. kernel_init kvm_guest_init kvm_free_tmp

[PATCH 4.19 90/99] selinux: never allow relabeling on context mounts

2019-05-06 Thread Greg Kroah-Hartman
From: Ondrej Mosnacek commit a83d6ddaebe541570291205cb538e35ad4ff94f9 upstream. In the SECURITY_FS_USE_MNTPOINT case we never want to allow relabeling files/directories, so we should never set the SBLABEL_MNT flag. The 'special handling' in selinux_is_sblabel_mnt() is only intended for when the

[PATCH 4.19 95/99] x86/mm/KASLR: Fix the size of the direct mapping section

2019-05-06 Thread Greg Kroah-Hartman
From: Baoquan He commit ec3937107ab43f3e8b2bc9dad95710043c462ff7 upstream. kernel_randomize_memory() uses __PHYSICAL_MASK_SHIFT to calculate the maximum amount of system RAM supported. The size of the direct mapping section is obtained from the smaller one of the below two values: (actual

[PATCH 4.19 96/99] x86/mm: Fix a crash with kmemleak_scan()

2019-05-06 Thread Greg Kroah-Hartman
From: Qian Cai commit 0d02113b31b2017dd349ec9df2314e798a90fa6e upstream. The first kmemleak_scan() call after boot would trigger the crash below because this callpath: kernel_init free_initmem mem_encrypt_free_decrypted_mem free_init_pages unmaps memory inside the .bss

[PATCH 4.19 98/99] i2c: i2c-stm32f7: Fix SDADEL minimum formula

2019-05-06 Thread Greg Kroah-Hartman
From: Nicolas Le Bayon commit c86da50cfd840edf223a242580913692acddbcf6 upstream. It conforms with Reference Manual I2C timing section. Fixes: aeb068c57214 ("i2c: i2c-stm32f7: add driver") Signed-off-by: Nicolas Le Bayon Signed-off-by: Bich Hemon Reviewed-by: Pierre-Yves MORDRET

[PATCH 4.19 94/99] clk: x86: Add system specific quirk to mark clocks as critical

2019-05-06 Thread Greg Kroah-Hartman
From: David Müller commit 7c2e07130090ae001a97a6b65597830d6815e93e upstream. Since commit 648e921888ad ("clk: x86: Stop marking clocks as CLK_IS_CRITICAL"), the pmc_plt_clocks of the Bay Trail SoC are unconditionally gated off. Unfortunately this will break systems where these clocks are used

[PATCH 4.19 86/99] Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ

2019-05-06 Thread Greg Kroah-Hartman
From: Anson Huang commit bf2a7ca39fd3ab47ef71c621a7ee69d1813b1f97 upstream. SNVS IRQ is requested before necessary driver data initialized, if there is a pending IRQ during driver probe phase, kernel NULL pointer panic will occur in IRQ handler. To avoid such scenario, just initialize necessary

[PATCH 4.19 79/99] ASoC: wm_adsp: Correct handling of compressed streams that restart

2019-05-06 Thread Greg Kroah-Hartman
From: Charles Keepax commit 639e5eb3c7d67e407f2a71fccd95323751398f6f upstream. Previously support was added to allow streams to be stopped and started again without the DSP being power cycled and this was done by clearing the buffer state in trigger start. Another supported use-case is using

[PATCH 4.19 80/99] ASoC: stm32: fix sai driver name initialisation

2019-05-06 Thread Greg Kroah-Hartman
From: Arnaud Pouliquen commit 17d3069ccf06970e2db3f7cbf4335f207524279e upstream. This patch fixes the sai driver structure overwriting which results in a cpu dai name equal NULL. Fixes: 3e086ed ("ASoC: stm32: add SAI driver") Signed-off-by: Arnaud Pouliquen Signed-off-by: Mark Brown

[PATCH 4.19 83/99] IB/core: Unregister notifier before freeing MAD security

2019-05-06 Thread Greg Kroah-Hartman
From: Daniel Jurgens commit d60667fc398ed34b3c7456b020481c55c760e503 upstream. If the notifier runs after the security context is freed an access of freed memory can occur. Fixes: 47a2b338fe63 ("IB/core: Enforce security on management datagrams") Signed-off-by: Daniel Jurgens Reviewed-by:

[PATCH 4.19 85/99] IB/core: Destroy QP if XRC QP fails

2019-05-06 Thread Greg Kroah-Hartman
From: Yuval Avnery commit 535005ca8e5e71918d64074032f4b9d4fef8981e upstream. The open-coded variant missed destroy of SELinux created QP, reuse already existing ib_detroy_qp() call and use this opportunity to clean ib_create_qp() from double prints and unclear exit paths. Reported-by: Parav

[PATCH 4.19 84/99] IB/core: Fix potential memory leak while creating MAD agents

2019-05-06 Thread Greg Kroah-Hartman
From: Daniel Jurgens commit 6e88e672b69f0e627acdae74a527b730ea224b6b upstream. If the MAD agents isn't allowed to manage the subnet, or fails to register for the LSM notifier, the security context is leaked. Free the context in these cases. Fixes: 47a2b338fe63 ("IB/core: Enforce security on

[PATCH 4.19 59/99] net: hns: Fix WARNING when remove HNS driver with SMMU enabled

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 8601a99d7c0256b7a7fdd1ab14cf6c1f1dfcadc6 ] When enable SMMU, remove HNS driver will cause a WARNING: [ 141.924177] WARNING: CPU: 36 PID: 2708 at drivers/iommu/dma-iommu.c:443 __iommu_dma_unmap+0xc0/0xc8 [ 141.954673] Modules linked in: hns_enet_drv(-) [ 141.963615] CPU: 36

[PATCH 4.19 72/99] Bluetooth: mediatek: fix up an error path to restore bdev->tx_state

2019-05-06 Thread Greg Kroah-Hartman
From: Sean Wang commit 77f328dbc6cf42f22c691a164958a5452142a542 upstream. Restore bdev->tx_state with clearing bit BTMTKUART_TX_WAIT_VND_EVT when there is an error on waiting for the corresponding event. Fixes: 7237c4c9ec92 ("Bluetooth: mediatek: Add protocol support for MediaTek serial

[PATCH 4.19 76/99] staging: iio: adt7316: fix the dac write calculation

2019-05-06 Thread Greg Kroah-Hartman
From: Jeremy Fertic commit 78accaea117c1ae878774974fab91ac4a0b0e2b0 upstream. The lsb calculation is not masking the correct bits from the user input. Subtract 1 from (1 << offset) to correctly set up the mask to be applied to user input. The lsb register stores its value starting at the bit 7

[PATCH 4.19 70/99] perf/x86/amd: Update generic hardware cache events for Family 17h

2019-05-06 Thread Greg Kroah-Hartman
From: Kim Phillips commit 0e3b74e26280f2cf8753717a950b97d424da6046 upstream. Add a new amd_hw_cache_event_ids_f17h assignment structure set for AMD families 17h and above, since a lot has changed. Specifically: L1 Data Cache The data cache access counter remains the same on Family 17h. For

[PATCH 4.19 73/99] clk: qcom: Add missing freq for usb30_master_clk on 8998

2019-05-06 Thread Greg Kroah-Hartman
From: Jeffrey Hugo commit 0c8ff62504e3a667387e87889a259632c3199a86 upstream. The usb30_master_clk supports a 60Mhz frequency, but that is missing from the table of supported frequencies. Add it. Fixes: b5f5f525c547 (clk: qcom: Add MSM8998 Global Clock Control (GCC) driver) Signed-off-by:

[PATCH 4.19 27/99] batman-adv: Reduce tt_local hash refcnt only for removed entry

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 3d65b9accab4a7ed5038f6df403fbd5e298398c7 ] The batadv_hash_remove is a function which searches the hashtable for an entry using a needle, a hashtable bucket selection function and a compare function. It will lock the bucket list and delete an entry when the compare function

[PATCH 4.19 67/99] ARM: orion: dont use using 64-bit DMA masks

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit cd92d74d67c811dc22544430b9ac3029f5bd64c5 ] clang warns about statically defined DMA masks from the DMA_BIT_MASK macro with length 64: arch/arm/plat-orion/common.c:625:29: error: shift count >= width of type [-Werror,-Wshift-count-overflow] .coherent_dma_mask

[PATCH 4.19 20/99] efi: Fix debugobjects warning on efi_rts_work

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit ef1491e791308317bb9851a0ad380c4a68b58d54 ] The following commit: 9dbbedaa6171 ("efi: Make efi_rts_work accessible to efi page fault handler") converted 'efi_rts_work' from an auto variable to a global variable. However, when submitting the work, INIT_WORK_ONSTACK() was still

[PATCH 4.19 24/99] rtc: cros-ec: Fail suspend/resume if wake IRQ cant be configured

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit d6752e185c3168771787a02dc6a55f32260943cc ] If we encounter a failure during suspend where this RTC was programmed to wakeup the system from suspend, but that wakeup couldn't be configured because the system didn't support wakeup interrupts, we'll run into the following warning:

[PATCH 4.19 56/99] net: hns: Use NAPI_POLL_WEIGHT for hns driver

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit acb1ce15a61154aa501891d67ebf79bc9ea26818 ] When the HNS driver loaded, always have an error print: "netif_napi_add() called with weight 256" This is because the kernel checks the NAPI polling weights requested by drivers and it prints an error message if a driver requests a

[PATCH 4.19 51/99] scsi: core: add new RDAC LENOVO/DE_Series device

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 1cb1d2c64e812928fe0a40b8f7e74523d0283dbe ] Blacklist "Universal Xport" LUN. It's used for in-band storage array management. Also add model to the rdac dh family. Cc: Martin Wilck Cc: Hannes Reinecke Cc: NetApp RDAC team Cc: Christophe Varoqui Cc: James E.J. Bottomley Cc:

[PATCH 4.19 55/99] net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw()

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 3a39a12ad364a9acd1038ba8da67cd8430f30de4 ] This patch is trying to fix the issue due to: [27237.844750] BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x708/0xa18[hns_enet_drv] After hnae_queue_xmit() in hns_nic_net_xmit_hw(), can be interrupted by interruptions, and than

[PATCH 4.19 25/99] rtc: sh: Fix invalid alarm warning for non-enabled alarm

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 15d82d22498784966df8e4696174a16b02cc1052 ] When no alarm has been programmed on RSK-RZA1, an error message is printed during boot: rtc rtc0: invalid alarm value: 2019-03-14T255:255:255 sh_rtc_read_alarm_value() returns 0xff when querying a hardware alarm field that is not

[PATCH 4.19 53/99] arm/mach-at91/pm : fix possible object reference leak

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit ba5e60c9b75dec92d4c695b928f69300b17d7686 ] of_find_device_by_node() takes a reference to the struct device when it finds a match via get_device. When returning error we should call put_device. Reviewed-by: Mukesh Ojha Signed-off-by: Peng Hao Signed-off-by: Ludovic Desroches

[PATCH 4.19 52/99] scsi: storvsc: Fix calculation of sub-channel count

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 382e06d11e075a40b4094b6ef809f8d4bcc7ab2a ] When the number of sub-channels offered by Hyper-V is >= the number of CPUs in the VM, calculate the correct number of sub-channels. The current code produces one too many. This scenario arises only when the number of CPUs is

[PATCH 4.19 26/99] batman-adv: Reduce claim hash refcnt only for removed entry

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 4ba104f468bbfc27362c393815d03aa18fb7a20f ] The batadv_hash_remove is a function which searches the hashtable for an entry using a needle, a hashtable bucket selection function and a compare function. It will lock the bucket list and delete an entry when the compare function

[PATCH 4.19 47/99] block: use blk_free_flush_queue() to free hctx->fq in blk_mq_init_hctx

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit b9a1ff504b9492ad6beb7d5606e0e3365d4d8499 ] kfree() can leak the hctx->fq->flush_rq field. Reviewed-by: Ming Lei Signed-off-by: Shenghui Wang Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- block/blk-mq.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

[PATCH 4.19 46/99] mfd: twl-core: Disable IRQ while suspended

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 20bb907f7dc82ecc9e135ad7067ac7eb69c81222 ] Since commit 6e2bd956936 ("i2c: omap: Use noirq system sleep pm ops to idle device for suspend") on gta04 we have handle_twl4030_pih() called in situations where pm_runtime_get() in i2c-omap.c returns -EACCES. [ 86.474365] Freezing

[PATCH 4.19 45/99] debugfs: fix use-after-free on symlink traversal

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 93b919da64c15b90953f96a536e5e61df896ca57 ] symlink body shouldn't be freed without an RCU delay. Switch debugfs to ->destroy_inode() and use of call_rcu(); free both the inode and symlink body in the callback. Similar to solution for bpf, only here it's even more obvious that

[PATCH 4.19 49/99] HID: input: add mapping for Assistant key

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit ce856634af8cda3490947df8ac1ef5843e6356af ] According to HUTRR89 usage 0x1cb from the consumer page was assigned to allow launching desktop-aware assistant application, so let's add the mapping. Signed-off-by: Dmitry Torokhov Signed-off-by: Jiri Kosina Signed-off-by: Sasha

[PATCH 4.19 22/99] HID: logitech: check the return value of create_singlethread_workqueue

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 6c44b15e1c9076d925d5236ddadf1318b0a25ce2 ] create_singlethread_workqueue may fail and return NULL. The fix checks if it is NULL to avoid NULL pointer dereference. Also, the fix moves the call of create_singlethread_workqueue earlier to avoid resource-release issues.

[PATCH 4.19 39/99] net: stmmac: ratelimit RX error logs

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 972c9be784e077bc56472c78243e0326e525b689 ] Ratelimit RX error logs. Signed-off-by: Aaro Koskinen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 14 -- 1 file changed, 8 insertions(+), 6

[PATCH v2 0/3] staging: vchiq: use interruptible waits

2019-05-06 Thread Nicolas Saenz Julienne
Hi, this series tries to address an issue that came up in Raspbian's kernel tree [1] and upstream distros [2][3]. We adopted some changes that moved wait calls from a custom implementation to the more standard killable family of functions. Users complained that all the VCHIQ threads showed up in

[PATCH 4.19 37/99] bonding: show full hw address in sysfs for slave entries

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 18bebc6dd3281955240062655a4df35eef2c46b3 ] Bond expects ethernet hwaddr for its slave, but it can be longer than 6 bytes - infiniband interface for example. # cat /sys/devices//net/ib0/address 80:00:02:08:fe:80:00:00:00:00:00:00:7c:fe:90:03:00:be:5d:e1 # cat

[PATCH 4.19 35/99] net: hns3: fix compile error

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 669efc76b317b3aa550ffbf0b79d064cb00a5f96 ] Currently, the rules for configuring search paths in Kbuild have changed, this will lead some erros when compiling hns3 with the following command: make O=DIR M=drivers/net/ethernet/hisilicon/hns3

[PATCH 4.19 32/99] igb: Fix WARN_ONCE on runtime suspend

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit dabb8338be533c18f50255cf39ff4f66d4dabdbe ] The runtime_suspend device callbacks are not supposed to save configuration state or change the power state. Commit fb29f76cc566 ("igb: Fix an issue that PME is not enabled during runtime suspend") changed the driver to not save

[PATCH 4.19 33/99] riscv: fix accessing 8-byte variable from RV32

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit dbee9c9c45846f003ec2f819710c2f4835630a6a ] A memory save operation to 8-byte variable in RV32 is divided into two sw instructions in the put_user macro. The current fixup returns execution flow to the second sw instead of the one after it. This patch fixes this fixup code

[PATCH 4.19 09/99] i2c: Prevent runtime suspend of adapter when Host Notify is required

2019-05-06 Thread Greg Kroah-Hartman
From: Jarkko Nikula commit 72bfcee11cf89509795c56b0e40a3785ab00bbdd upstream. Multiple users have reported their Synaptics touchpad has stopped working between v4.20.1 and v4.20.2 when using SMBus interface. The culprit for this appeared to be commit c5eb1190074c ("PCI / PM: Allow runtime PM

[PATCH 4.19 16/99] usb: usbip: fix isoc packet num validation in get_pipe

2019-05-06 Thread Greg Kroah-Hartman
From: Malte Leip commit c409ca3be3c6ff3a1eeb303b191184e80d412862 upstream. Change the validation of number_of_packets in get_pipe to compare the number of packets to a fixed maximum number of packets allowed, set to be 1024. This number was chosen due to it being used by other drivers as well,

[PATCH 4.19 05/99] i2c: imx: correct the method of getting private data in notifier_call

2019-05-06 Thread Greg Kroah-Hartman
From: Anson Huang commit d386bb9042f4629bf62cdc5952ea8aab225f24a7 upstream. The way of getting private imx_i2c_struct in i2c_imx_clk_notifier_call() is incorrect, should use clk_change_nb element to get correct address and avoid below kernel dump during POST_RATE_CHANGE notify by clk framework:

[PATCH 4.19 18/99] USB: core: Fix bug caused by duplicate interface PM usage counter

2019-05-06 Thread Greg Kroah-Hartman
From: Alan Stern commit c2b71462d294cf517a0bc6e4fd6424d7cee5596f upstream. The syzkaller fuzzer reported a bug in the USB hub driver which turned out to be caused by a negative runtime-PM usage counter. This allowed a hub to be runtime suspended at a time when the driver did not expect it.

[PATCH 4.19 21/99] arm64: dts: rockchip: fix rk3328-roc-cc gmac2io tx/rx_delay

2019-05-06 Thread Greg Kroah-Hartman
[ Upstream commit 924726888f660b2a86382a5dd051ec9ca1b18190 ] The rk3328-roc-cc board exhibits tx stability issues with large packets, as does the rock64 board, which was fixed with this patch https://patchwork.kernel.org/patch/10178969/ A similar patch was merged for the rk3328-roc-cc here

[PATCH 4.19 07/99] i2c: Clear client->irq in i2c_device_remove

2019-05-06 Thread Greg Kroah-Hartman
From: Charles Keepax commit 6f108dd70d3010c391c1e9f56f3f20d1f9e75450 upstream. The IRQ will be mapped in i2c_device_probe only if client->irq is zero and i2c_device_remove does not clear this. When rebinding an I2C device, whos IRQ provider has also been rebound this means that an IRQ mapping

[PATCH 4.19 03/99] mac80211: dont attempt to rename ERR_PTR() debugfs dirs

2019-05-06 Thread Greg Kroah-Hartman
From: Johannes Berg commit 517879147493a5e1df6b89a50f708f1133fcaddb upstream. We need to dereference the directory to get its parent to be able to rename it, so it's clearly not safe to try to do this with ERR_PTR() pointers. Skip in this case. It seems that this is most likely what was

[PATCH 4.19 04/99] i2c: synquacer: fix enumeration of slave devices

2019-05-06 Thread Greg Kroah-Hartman
From: Ard Biesheuvel commit 95e0cf3caeb11e1b0398c747b5cfa12828263824 upstream. The I2C host driver for SynQuacer fails to populate the of_node and ACPI companion fields of the struct i2c_adapter it instantiates, resulting in enumeration of the subordinate I2C bus to fail. Fixes: 0d676a6c4390

[PATCH 5.0 107/122] IB/core: Fix potential memory leak while creating MAD agents

2019-05-06 Thread Greg Kroah-Hartman
From: Daniel Jurgens commit 6e88e672b69f0e627acdae74a527b730ea224b6b upstream. If the MAD agents isn't allowed to manage the subnet, or fails to register for the LSM notifier, the security context is leaked. Free the context in these cases. Fixes: 47a2b338fe63 ("IB/core: Enforce security on

[PATCH 4.19 11/99] ALSA: hda/realtek - Fixed Dell AIO speaker noise

2019-05-06 Thread Greg Kroah-Hartman
From: Kailang Yang commit 0700d3d117a7f110bd83873e13652f69c54b upstream. Fixed Dell AIO speaker noise. spec->gen.auto_mute_via_amp = 1, this option was solved speaker white noise at boot. codec->power_save_node = 0, this option was solved speaker noise at resume back. Fixes: 9226665159f0

[PATCH 4.19 14/99] USB: w1 ds2490: Fix bug caused by improper use of altsetting array

2019-05-06 Thread Greg Kroah-Hartman
From: Alan Stern commit c114944d7d67f24e71562fcfc18d550ab787e4d4 upstream. The syzkaller USB fuzzer spotted a slab-out-of-bounds bug in the ds2490 driver. This bug is caused by improper use of the altsetting array in the usb_interface structure (the array's entries are not always stored in

[PATCH 5.0 099/122] ASoC: stm32: fix sai driver name initialisation

2019-05-06 Thread Greg Kroah-Hartman
From: Arnaud Pouliquen commit 17d3069ccf06970e2db3f7cbf4335f207524279e upstream. This patch fixes the sai driver structure overwriting which results in a cpu dai name equal NULL. Fixes: 3e086ed ("ASoC: stm32: add SAI driver") Signed-off-by: Arnaud Pouliquen Signed-off-by: Mark Brown

[PATCH 5.0 108/122] IB/core: Destroy QP if XRC QP fails

2019-05-06 Thread Greg Kroah-Hartman
From: Yuval Avnery commit 535005ca8e5e71918d64074032f4b9d4fef8981e upstream. The open-coded variant missed destroy of SELinux created QP, reuse already existing ib_detroy_qp() call and use this opportunity to clean ib_create_qp() from double prints and unclear exit paths. Reported-by: Parav

<    4   5   6   7   8   9   10   11   12   13   >