[PATCH 4.14 37/68] RDMA/cxgb4: check for ipv6 address properly while destroying listener

2021-04-15 Thread Greg Kroah-Hartman
From: Potnuri Bharat Teja [ Upstream commit 603c4690b01aaffe3a6c3605a429f6dac39852ae ] ipv6 bit is wrongly set by the below which causes fatal adapter lookup engine errors for ipv4 connections while destroying a listener. Fix it to properly check the local address for ipv6. Fixes: 3408be145a5d

[PATCH 4.14 09/68] ia64: fix user_stack_pointer() for ptrace()

2021-04-15 Thread Greg Kroah-Hartman
itially. Link: https://bugs.gentoo.org/769614 [1] Link: https://lkml.kernel.org/r/20210331084447.2561532-1-sly...@gentoo.org Signed-off-by: Sergei Trofimovich Reported-by: Dmitry V. Levin Cc: Oleg Nesterov Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman -

[PATCH 4.14 38/68] clk: socfpga: fix iomem pointer cast on 64-bit

2021-04-15 Thread Greg Kroah-Hartman
09.32599-1-krzysztof.kozlow...@canonical.com Signed-off-by: Stephen Boyd Signed-off-by: Greg Kroah-Hartman --- drivers/clk/socfpga/clk-gate.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/clk/socfpga/clk-gate.c +++ b/drivers/clk/socfpga/clk-gate.c @@ -107,7 +107,7 @@ static uns

[PATCH 4.14 08/68] net: ipv6: check for validity before dereferencing cfg->fc_nlinfo.nlh

2021-04-15 Thread Greg Kroah-Hartman
-Coverity: ("NULL pointer dereference") Signed-off-by: Muhammad Usama Anjum Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/route.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -3283,9 +3283,11

[PATCH 4.14 05/68] nfc: fix memory leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
urs. fix CVE-2020-25672 Fixes: d646960f7986 ("NFC: Initial LLCP support") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.3 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/

[PATCH 4.14 28/68] ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces

2021-04-15 Thread Greg Kroah-Hartman
From: Stefan Riedmueller [ Upstream commit f57011e72f5fe0421ec7a812beb1b57bdf4bb47f ] Setting the vmmc supplies is crucial since otherwise the supplying regulators get disabled and the SD interfaces are no longer powered which leads to system failures if the system is booted from that SD interfa

[PATCH 4.14 24/68] amd-xgbe: Update DMA coherency values

2021-04-15 Thread Greg Kroah-Hartman
From: Shyam Sundar S K [ Upstream commit d75135082698140a26a56defe1bbc1b06f26a41f ] Based on the IOMMU configuration, the current cache control settings can result in possible coherency issues. The hardware team has recommended new settings for the PCI device path to eliminate the issue. Fixes:

[PATCH 4.14 07/68] xen/evtchn: Change irq_info lock to raw_spinlock_t

2021-04-15 Thread Greg Kroah-Hartman
5.10141-1-luca.fance...@arm.com Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c | 10 +- drivers/xen/events/events_internal.h |2 +- 2 files changed, 6 insertions(+), 6 deletions(-) --- a/drivers/xen/events/events_base.c +++

[PATCH 4.14 26/68] gianfar: Handle error code at MAC address change

2021-04-15 Thread Greg Kroah-Hartman
From: Claudiu Manoil [ Upstream commit bff5b62585123823842833ab20b1c0a7fa437f8c ] Handle return error code of eth_mac_addr(); Fixes: 3d23a05c75c7 ("gianfar: Enable changing mac addr when if up") Signed-off-by: Claudiu Manoil Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- driv

[PATCH 4.14 04/68] nfc: fix refcount leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25671 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signe

[PATCH 4.14 06/68] nfc: Avoid endless loops caused by repeated llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
ot;) Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.11 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/nfc/llcp_sock.c |4 1 file changed, 4 insertions(+) --- a/net/nfc/ll

[PATCH 4.14 03/68] nfc: fix refcount leak in llcp_sock_bind()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25670 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by

[PATCH 4.14 25/68] sch_red: fix off-by-one checks in red_check_params()

2021-04-15 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 3a87571f0ffc51ba3bf3ecdb6032861d0154b164 ] This fixes following syzbot report: UBSAN: shift-out-of-bounds in ./include/net/red.h:237:23 shift exponent 32 is too large for 32-bit type 'unsigned int' CPU: 1 PID: 8418 Comm: syz-executor170 Not tainted 5.12.0-r

[PATCH 4.14 22/68] regulator: bd9571mwv: Fix AVS and DVFS voltage range

2021-04-15 Thread Greg Kroah-Hartman
From: Geert Uytterhoeven [ Upstream commit 3b6e7088afc919f5b52e4d2de8501ad34d35b09b ] According to Table 30 ("DVFS_MoniVDAC [6:0] Setting Table") in the BD9571MWV-M Datasheet Rev. 002, the valid voltage range is 600..1100 mV (settings 0x3c..0x6e). While the lower limit is taken into account (by

[PATCH 4.14 23/68] ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips

2021-04-15 Thread Greg Kroah-Hartman
From: Shengjiu Wang [ Upstream commit 16b82e75c15a7dbd564ea3654f3feb61df9e1e6f ] The input MCLK is 12.288MHz, the desired output sysclk is 11.2896MHz and sample rate is 44100Hz, with the configuration pllprescale=2, postscale=sysclkdiv=1, some chip may have wrong bclk and lrclk output with pll e

[PATCH 4.14 21/68] i2c: turn recovery error on init to debug

2021-04-15 Thread Greg Kroah-Hartman
Klaus Kudielka Tested-by: Klaus Kudielka Signed-off-by: Wolfram Sang Signed-off-by: Wolfram Sang Cc: sta...@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/i2c/i2c-core-base.c |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/drivers/i2c/i2c-core-base.c +++ b/driver

[PATCH 4.14 20/68] usbip: synchronize event handler with sysfs code paths

2021-04-15 Thread Greg Kroah-Hartman
.git.sk...@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/usbip_event.c |2 ++ 1 file changed, 2 insertions(+) --- a/drivers/usb/usbip/usbip_event.c +++ b/drivers/usb/usbip/usbip_event.c @@ -84,6 +84,7 @@ static void event_handler(struct work_st while ((ud

[PATCH 4.14 18/68] usbip: add sysfs_lock to synchronize sysfs code paths

2021-04-15 Thread Greg Kroah-Hartman
...@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/usbip_common.h |3 +++ drivers/usb/usbip/vhci_hcd.c |1 + drivers/usb/usbip/vhci_sysfs.c | 30 +- 3 files changed, 29 insertions(+), 5 deletions(-) --- a/drivers/usb/usbip

[PATCH 4.14 02/68] ASoC: intel: atom: Stop advertising non working S24LE support

2021-04-15 Thread Greg Kroah-Hartman
ans de Goede Link: https://lore.kernel.org/r/20210324132711.216152-2-hdego...@redhat.com Signed-off-by: Mark Brown Signed-off-by: Greg Kroah-Hartman --- sound/soc/intel/atom/sst-mfld-platform-pcm.c |6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/sound/soc/intel/atom/sst-

[PATCH 4.14 19/68] usbip: stub-dev synchronize sysfs code paths

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/stub_dev.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) --- a/drivers/usb/usbip/stub_dev.c +++ b/drivers/usb/usbip/stub_dev.c @@ -77,6 +77,7 @@ static ssize_t store_sockfd(struct devic dev_info(dev

[PATCH 4.14 17/68] net: sched: sch_teql: fix null-pointer dereference

2021-04-15 Thread Greg Kroah-Hartman
create() imediately calls teql_destroy() which does not expect zero master pointer and we get OOPS. Fixes: 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation") Signed-off-by: Pavel Tikhomirov Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartma

[PATCH 4.14 15/68] batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field

2021-04-15 Thread Greg Kroah-Hartman
58b9bdbe9d Reported-by: syzbot Tested-by: syzbot Signed-off-by: Tetsuo Handa Fixes: ced72933a5e8ab52 ("batman-adv: use CRC32C instead of CRC16 in TT code") Fixes: 7ea7b4a142758dea ("batman-adv: make the TT CRC logic VLAN specific") Acked-by: Sven Eckelmann Signed-off-by: D

[PATCH 4.14 16/68] net: ensure mac header is set in virtio_net_hdr_to_skb()

2021-04-15 Thread Greg Kroah-Hartman
s Nemeth Cc: Willem de Bruijn Reported-by: syzbot Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/linux/virtio_net.h |2 ++ 1 file changed, 2 insertions(+) --- a/include/linux/virtio_net.h +++ b/include/linux/virtio_net.h @@ -62,6 +62,8 @@ static inline int v

[PATCH 4.14 14/68] ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin

2021-04-15 Thread Greg Kroah-Hartman
erra Reviewed-by: Andrew Lunn Signed-off-by: Gregory CLEMENT Signed-off-by: Greg Kroah-Hartman --- arch/arm/boot/dts/armada-385-turris-omnia.dts |1 + 1 file changed, 1 insertion(+) --- a/arch/arm/boot/dts/armada-385-turris-omnia.dts +++ b/arch/arm/boot/dts/armada-385-turris-o

[PATCH 4.14 13/68] parisc: avoid a warning on u8 cast for cmpxchg on u8 pointers

2021-04-15 Thread Greg Kroah-Hartman
@intel.com [4] https://lore.kernel.org/r/20210315131512.133720-2-jacopo+rene...@jmondi.org Cc: Liam Beguin Cc: Helge Deller Cc: sta...@vger.kernel.org # v5.8+ Signed-off-by: Gao Xiang Signed-off-by: Helge Deller Signed-off-by: Greg Kroah-Hartman --- arch/parisc/include/asm/cmpxchg.h |2 +

[PATCH 4.14 12/68] parisc: parisc-agp requires SBA IOMMU driver

2021-04-15 Thread Greg Kroah-Hartman
er Signed-off-by: Greg Kroah-Hartman --- drivers/char/agp/Kconfig |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/char/agp/Kconfig +++ b/drivers/char/agp/Kconfig @@ -125,7 +125,7 @@ config AGP_HP_ZX1 config AGP_PARISC tristate "HP Quicksilver AGP support&q

[PATCH 4.14 10/68] ocfs2: fix deadlock between setattr and dio_end_io_write

2021-04-15 Thread Greg Kroah-Hartman
54.3911-1-wen.gang.w...@oracle.com Signed-off-by: Wengang Wang Reviewed-by: Joseph Qi Cc: Mark Fasheh Cc: Joel Becker Cc: Junxiao Bi Cc: Changwei Ge Cc: Gang He Cc: Jun Piao Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/ocfs2/a

[PATCH 4.14 11/68] fs: direct-io: fix missing sdio->boundary

2021-04-15 Thread Greg Kroah-Hartman
d-off-by: Jack Qiu Reviewed-by: Jan Kara Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/direct-io.c |5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/fs/direct-io.c +++ b/fs/direct-io.c @@ -857,6 +857,7 @@ submit_page_secti

[PATCH 4.14 01/68] ALSA: aloop: Fix initialization of controls

2021-04-15 Thread Greg Kroah-Hartman
() will not queue the events properly. Signed-off-by: Jonas Holmberg Reviewed-by: Jaroslav Kysela Cc: Link: https://lore.kernel.org/r/20210407075428.2666787-1-jona...@axis.com Signed-off-by: Takashi Iwai Signed-off-by: Greg Kroah-Hartman --- sound/drivers/aloop.c | 11 --- 1 file

[PATCH 4.9 27/47] mm: add cond_resched() in gather_pte_stats()

2021-04-15 Thread Greg Kroah-Hartman
: Andrew Morton Signed-off-by: Linus Torvalds Reported-by: Chen si Signed-off-by: Baoyou Xie Signed-off-by: Wen Yang Signed-off-by: Zijiang Huang Signed-off-by: Greg Kroah-Hartman --- fs/proc/task_mmu.c |1 + 1 file changed, 1 insertion(+) --- a/fs/proc/task_mmu.c +++ b/fs/proc/task_mmu.c

[PATCH 4.9 36/47] net: ieee802154: fix nl802154 del llsec dev

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-2-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b

[PATCH 4.9 35/47] net: ieee802154: fix nl802154 del llsec key

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-1-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b/net

[PATCH 4.9 32/47] drivers: net: fix memory leak in peak_usb_create_dev

2021-04-15 Thread Greg Kroah-Hartman
y: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/usb/peak_usb/pcan_usb_core.c |6 +- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/drivers/net/can/usb/peak_usb/pcan_usb_core.c +++ b/drivers/net/can/usb/peak_usb/pcan_

[PATCH 4.9 34/47] net: ieee802154: nl-mac: fix check on panid

2021-04-15 Thread Greg Kroah-Hartman
: Alexander Aring Link: https://lore.kernel.org/r/20210228151817.95700-4-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl-mac.c |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/net/ieee802154/nl-mac.c +++ b/net

[PATCH 4.9 33/47] net: mac802154: Fix general protection fault

2021-04-15 Thread Greg Kroah-Hartman
: Pavel Skripkin Reported-by: syzbot+9ec037722d2603a9f...@syzkaller.appspotmail.com Acked-by: Alexander Aring Link: https://lore.kernel.org/r/20210304152125.1052825-1-paskrip...@gmail.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/mac802154/llsec.c |2 +- 1 file

[PATCH 4.9 31/47] drivers: net: fix memory leak in atusb_probe

2021-04-15 Thread Greg Kroah-Hartman
: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ieee802154/atusb.c |1 + 1 file changed, 1 insertion(+) --- a/drivers/net/ieee802154/atusb.c +++ b/drivers/net/ieee802154/atusb.c @@ -341,6 +341,7 @@ static int atusb_alloc_urbs(struct atusb

[PATCH 4.9 37/47] net: ieee802154: fix nl802154 add llsec key

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-3-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b/net

[PATCH 4.9 28/47] usbip: fix vudc usbip_sockfd_store races leading to gpf

2021-04-15 Thread Greg Kroah-Hartman
60.1615171203.git.sk...@linuxfoundation.org Signed-off-by: Tom Seewald Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/vudc_sysfs.c | 42 + 1 file changed, 34 insertions(+), 8 deletions(-) --- a/drivers/usb/usbip/vudc_sysfs.c +++ b/drivers/us

[PATCH 4.9 09/47] xen/evtchn: Change irq_info lock to raw_spinlock_t

2021-04-15 Thread Greg Kroah-Hartman
5.10141-1-luca.fance...@arm.com Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c | 10 +- drivers/xen/events/events_internal.h |2 +- 2 files changed, 6 insertions(+), 6 deletions(-) --- a/drivers/xen/events/events_base.c +++

[PATCH 4.9 00/47] 4.9.267-rc1 review

2021-04-15 Thread Greg Kroah-Hartman
linux-4.9.y and the diffstat can be found below. thanks, greg k-h - Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.267-rc1 Juergen Gross xen/events: fix setting irq affinity Arnaldo Carvalho de Melo perf map: Tighten snprintf() string precision to pass

[PATCH 4.9 08/47] nfc: Avoid endless loops caused by repeated llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
ot;) Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.11 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/nfc/llcp_sock.c |4 1 file changed, 4 insertions(+) --- a/net/nfc/ll

[PATCH 4.9 29/47] cfg80211: remove WARN_ON() in cfg80211_sme_connect

2021-04-15 Thread Greg Kroah-Hartman
Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/sme.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/wireless/sme.c +++ b/net/wireless/sme.c @@ -512,7 +512,7 @@ static int cfg80211_sme_connect(struct w cfg80211_sme_free(wdev); } -

[PATCH 4.9 30/47] net: tun: set tun->dev->addr_len during TUNSETLINK processing

2021-04-15 Thread Greg Kroah-Hartman
off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/tun.c | 48 1 file changed, 48 insertions(+) --- a/drivers/net/tun.c +++ b/drivers/net/tun.c @@ -72,6 +72,14 @@ #include #include #include +#include +#include +#i

[PATCH 4.9 47/47] xen/events: fix setting irq affinity

2021-04-15 Thread Greg Kroah-Hartman
el 5.11. Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/xen/events/events_base.c +++ b/drivers/xen/events/events_base.c @@ -1780,7 +1780,7 @@ static void lateeoi_

[PATCH 4.9 46/47] perf map: Tighten snprintf() string precision to pass gcc check on some 32-bit arches

2021-04-15 Thread Greg Kroah-Hartman
__bos (__s), __fmt, __va_arg_pack ()); |~ cc1: all warnings being treated as errors Since we have the lenghts for what lands in that place, use it to give the compiler more info and make it happy. Signed-off-by: Arnaldo Carvalho de Melo Cc: Anders Roxell Signed-off-by: Greg K

[PATCH 4.9 45/47] netfilter: x_tables: fix compat match/target pad out-of-bound write

2021-04-15 Thread Greg Kroah-Hartman
by: syzbot+cfc0247ac173f597a...@syzkaller.appspotmail.com Reported-by: Andy Nguyen Fixes: 9fa492cdc160c ("[NETFILTER]: x_tables: simplify compat API") Signed-off-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/ipv4/netfilter/arp_tables.c

[PATCH 4.9 44/47] gfs2: report "already frozen/thawed" errors

2021-04-15 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit ff132c5f93c06bd4432bbab5c369e468653bdec4 ] Before this patch, gfs2's freeze function failed to report an error when the target file system was already frozen as it should (and as generic vfs function freeze_super does. Similarly, gfs2's thaw function failed t

[PATCH 4.9 42/47] Revert "cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb->prepath."

2021-04-15 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 742300e32db00f008e944acafaeba9a12730eff0 which is commit a738c93fb1c17e386a09304b517b1c6b2a6a5a8b upstream. It is reported to cause problems in older kernels, so revert it for now until we can figure it out... Reported-by: Salvatore Bonaccorso Link

[PATCH 4.9 43/47] drm/imx: imx-ldb: fix out of bounds array access warning

2021-04-15 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 33ce7f2f95cabb5834cf0906308a5cb6103976da ] When CONFIG_OF is disabled, building with 'make W=1' produces warnings about out of bounds array access: drivers/gpu/drm/imx/imx-ldb.c: In function 'imx_ldb_set_clock.constprop': drivers/gpu/drm/imx/imx-ldb.c:186:8

[PATCH 4.9 41/47] net: ieee802154: stop dump llsec params for monitors

2021-04-15 Thread Greg Kroah-Hartman
81a8e5f317...@syzkaller.appspotmail.com Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210405003054.256017-16-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |5 + 1 file changed, 5 insertions(+) --- a/net/ieee802154/nl802154.c

[PATCH 4.9 40/47] net: ieee802154: forbid monitor for del llsec seclevel

2021-04-15 Thread Greg Kroah-Hartman
1a819824e0...@syzkaller.appspotmail.com Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210405003054.256017-15-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 +++ 1 file changed, 3 insertions(+) --- a/net/ieee802154/

[PATCH 4.9 39/47] net: ieee802154: forbid monitor for set llsec params

2021-04-15 Thread Greg Kroah-Hartman
https://lore.kernel.org/r/20210405003054.256017-3-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 +++ 1 file changed, 3 insertions(+) --- a/net/ieee802154/nl802154.c +++ b/net/ieee802154/nl802154.c @@ -1417,6 +1417,9 @@ stati

[PATCH 4.9 38/47] net: ieee802154: fix nl802154 del llsec devkey

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-4-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b

[PATCH 4.9 07/47] nfc: fix memory leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
urs. fix CVE-2020-25672 Fixes: d646960f7986 ("NFC: Initial LLCP support") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.3 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/

[PATCH 4.9 06/47] nfc: fix refcount leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25671 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signe

[PATCH 4.9 04/47] ASoC: intel: atom: Stop advertising non working S24LE support

2021-04-15 Thread Greg Kroah-Hartman
ans de Goede Link: https://lore.kernel.org/r/20210324132711.216152-2-hdego...@redhat.com Signed-off-by: Mark Brown Signed-off-by: Greg Kroah-Hartman --- sound/soc/intel/atom/sst-mfld-platform-pcm.c |6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/sound/soc/intel/atom/sst-

[PATCH 4.9 05/47] nfc: fix refcount leak in llcp_sock_bind()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25670 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by

[PATCH 4.9 03/47] ALSA: aloop: Fix initialization of controls

2021-04-15 Thread Greg Kroah-Hartman
() will not queue the events properly. Signed-off-by: Jonas Holmberg Reviewed-by: Jaroslav Kysela Cc: Link: https://lore.kernel.org/r/20210407075428.2666787-1-jona...@axis.com Signed-off-by: Takashi Iwai Signed-off-by: Greg Kroah-Hartman --- sound/drivers/aloop.c | 11 --- 1 file

[PATCH 4.9 26/47] clk: socfpga: fix iomem pointer cast on 64-bit

2021-04-15 Thread Greg Kroah-Hartman
09.32599-1-krzysztof.kozlow...@canonical.com Signed-off-by: Stephen Boyd Signed-off-by: Greg Kroah-Hartman --- drivers/clk/socfpga/clk-gate.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/clk/socfpga/clk-gate.c +++ b/drivers/clk/socfpga/clk-gate.c @@ -107,7 +107,7 @@ static uns

[PATCH 4.9 25/47] RDMA/cxgb4: check for ipv6 address properly while destroying listener

2021-04-15 Thread Greg Kroah-Hartman
From: Potnuri Bharat Teja [ Upstream commit 603c4690b01aaffe3a6c3605a429f6dac39852ae ] ipv6 bit is wrongly set by the below which causes fatal adapter lookup engine errors for ipv4 connections while destroying a listener. Fix it to properly check the local address for ipv6. Fixes: 3408be145a5d

[PATCH 4.9 23/47] workqueue: Move the position of debug_work_activate() in __queue_work()

2021-04-15 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 0687c66b5f666b5ad433f4e94251590d9bc9d10e ] The debug_work_activate() is called on the premise that the work can be inserted, because if wq be in WQ_DRAINING status, insert work may be failed. Fixes: e41e704bc4f4 ("workqueue: improve destroy_workqueue() debuggabili

[PATCH 4.9 24/47] s390/cpcmd: fix inline assembly register clobbering

2021-04-15 Thread Greg Kroah-Hartman
From: Alexander Gordeev [ Upstream commit 7a2f91441b2c1d81b77c1cd816a4659f4abc9cbe ] Register variables initialized using arithmetic. That leads to kasan instrumentaton code corrupting the registers contents. Follow GCC guidlines and use temporary variables for assigning init values to register

[PATCH 4.9 22/47] clk: fix invalid usage of list cursor in unregister

2021-04-15 Thread Greg Kroah-Hartman
From: Lukasz Bartosik [ Upstream commit 7045465500e465b09f09d6e5bdc260a9f1aab97b ] Fix invalid usage of a list_for_each_entry cursor in clk_notifier_unregister(). When list is empty or if the list is completely traversed (without breaking from the loop on one of the entries) then the list cursor

[PATCH 4.9 21/47] soc/fsl: qbman: fix conflicting alignment attributes

2021-04-15 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 040f31196e8b2609613f399793b9225271b79471 ] When building with W=1, gcc points out that the __packed attribute on struct qm_eqcr_entry conflicts with the 8-byte alignment attribute on struct qm_fd inside it: drivers/soc/fsl/qbman/qman.c:189:1: error: alignme

[PATCH 4.9 20/47] net:tipc: Fix a double free in tipc_sk_mcast_rcv

2021-04-15 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 6bf24dc0cc0cc43b29ba344b66d78590e687e046 ] In the if(skb_peek(arrvq) == skb) branch, it calls __skb_dequeue(arrvq) to get the skb by skb = skb_peek(arrvq). Then __skb_dequeue() unlinks the skb from arrvq and returns the skb which equals to skb_peek(arrvq). Aft

[PATCH 4.9 02/47] iio: hid-sensor-prox: Fix scale not correct issue

2021-04-15 Thread Greg Kroah-Hartman
t;iio: hid-sensors: Added Proximity Sensor Driver") Signed-off-by: Ye Xiang Link: https://lore.kernel.org/r/20210130102530.31064-1-xiang...@intel.com Cc: Signed-off-by: Jonathan Cameron [sudip: adjust context] Signed-off-by: Sudip Mukherjee Signed-off-by: Greg Kroah-Hartman --- drivers

[PATCH 4.9 19/47] gianfar: Handle error code at MAC address change

2021-04-15 Thread Greg Kroah-Hartman
From: Claudiu Manoil [ Upstream commit bff5b62585123823842833ab20b1c0a7fa437f8c ] Handle return error code of eth_mac_addr(); Fixes: 3d23a05c75c7 ("gianfar: Enable changing mac addr when if up") Signed-off-by: Claudiu Manoil Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- driv

[PATCH 4.9 17/47] net: sched: sch_teql: fix null-pointer dereference

2021-04-15 Thread Greg Kroah-Hartman
create() imediately calls teql_destroy() which does not expect zero master pointer and we get OOPS. Fixes: 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation") Signed-off-by: Pavel Tikhomirov Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartma

[PATCH 4.9 18/47] sch_red: fix off-by-one checks in red_check_params()

2021-04-15 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 3a87571f0ffc51ba3bf3ecdb6032861d0154b164 ] This fixes following syzbot report: UBSAN: shift-out-of-bounds in ./include/net/red.h:237:23 shift exponent 32 is too large for 32-bit type 'unsigned int' CPU: 1 PID: 8418 Comm: syz-executor170 Not tainted 5.12.0-r

[PATCH 4.9 16/47] batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field

2021-04-15 Thread Greg Kroah-Hartman
58b9bdbe9d Reported-by: syzbot Tested-by: syzbot Signed-off-by: Tetsuo Handa Fixes: ced72933a5e8ab52 ("batman-adv: use CRC32C instead of CRC16 in TT code") Fixes: 7ea7b4a142758dea ("batman-adv: make the TT CRC logic VLAN specific") Acked-by: Sven Eckelmann Signed-off-by: D

[PATCH 4.9 15/47] parisc: avoid a warning on u8 cast for cmpxchg on u8 pointers

2021-04-15 Thread Greg Kroah-Hartman
@intel.com [4] https://lore.kernel.org/r/20210315131512.133720-2-jacopo+rene...@jmondi.org Cc: Liam Beguin Cc: Helge Deller Cc: sta...@vger.kernel.org # v5.8+ Signed-off-by: Gao Xiang Signed-off-by: Helge Deller Signed-off-by: Greg Kroah-Hartman --- arch/parisc/include/asm/cmpxchg.h |2 +

[PATCH 4.9 14/47] parisc: parisc-agp requires SBA IOMMU driver

2021-04-15 Thread Greg Kroah-Hartman
er Signed-off-by: Greg Kroah-Hartman --- drivers/char/agp/Kconfig |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/char/agp/Kconfig +++ b/drivers/char/agp/Kconfig @@ -124,7 +124,7 @@ config AGP_HP_ZX1 config AGP_PARISC tristate "HP Quicksilver AGP support&q

[PATCH 4.9 13/47] fs: direct-io: fix missing sdio->boundary

2021-04-15 Thread Greg Kroah-Hartman
d-off-by: Jack Qiu Reviewed-by: Jan Kara Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/direct-io.c |5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/fs/direct-io.c +++ b/fs/direct-io.c @@ -793,6 +793,7 @@ submit_page_secti

[PATCH 4.9 12/47] ocfs2: fix deadlock between setattr and dio_end_io_write

2021-04-15 Thread Greg Kroah-Hartman
54.3911-1-wen.gang.w...@oracle.com Signed-off-by: Wengang Wang Reviewed-by: Joseph Qi Cc: Mark Fasheh Cc: Joel Becker Cc: Junxiao Bi Cc: Changwei Ge Cc: Gang He Cc: Jun Piao Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/ocfs2/a

[PATCH 4.9 10/47] net: ipv6: check for validity before dereferencing cfg->fc_nlinfo.nlh

2021-04-15 Thread Greg Kroah-Hartman
-Coverity: ("NULL pointer dereference") Signed-off-by: Muhammad Usama Anjum Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/route.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -3069,9 +3069,11

[PATCH 4.9 01/47] ARM: 8723/2: always assume the "unified" syntax for assembly code

2021-04-15 Thread Greg Kroah-Hartman
Russell King [nathan: Resolve small conflict on 4.9 due to a lack of 494609701e06a] Signed-off-by: Nathan Chancellor Signed-off-by: Greg Kroah-Hartman --- arch/arm/Kconfig |7 --- arch/arm/Makefile |6 ++- arch/arm/include/asm/unified.h | 77 +--

[PATCH 4.9 11/47] ia64: fix user_stack_pointer() for ptrace()

2021-04-15 Thread Greg Kroah-Hartman
itially. Link: https://bugs.gentoo.org/769614 [1] Link: https://lkml.kernel.org/r/20210331084447.2561532-1-sly...@gentoo.org Signed-off-by: Sergei Trofimovich Reported-by: Dmitry V. Levin Cc: Oleg Nesterov Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman -

[PATCH 4.4 27/38] net: ieee802154: nl-mac: fix check on panid

2021-04-15 Thread Greg Kroah-Hartman
: Alexander Aring Link: https://lore.kernel.org/r/20210228151817.95700-4-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl-mac.c |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/net/ieee802154/nl-mac.c +++ b/net

[PATCH 4.4 34/38] net: ieee802154: stop dump llsec params for monitors

2021-04-15 Thread Greg Kroah-Hartman
81a8e5f317...@syzkaller.appspotmail.com Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210405003054.256017-16-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |5 + 1 file changed, 5 insertions(+) --- a/net/ieee802154/nl802154.c

[PATCH 4.4 35/38] drm/imx: imx-ldb: fix out of bounds array access warning

2021-04-15 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 33ce7f2f95cabb5834cf0906308a5cb6103976da ] When CONFIG_OF is disabled, building with 'make W=1' produces warnings about out of bounds array access: drivers/gpu/drm/imx/imx-ldb.c: In function 'imx_ldb_set_clock.constprop': drivers/gpu/drm/imx/imx-ldb.c:186:8

[PATCH 4.4 36/38] netfilter: x_tables: fix compat match/target pad out-of-bound write

2021-04-15 Thread Greg Kroah-Hartman
by: syzbot+cfc0247ac173f597a...@syzkaller.appspotmail.com Reported-by: Andy Nguyen Fixes: 9fa492cdc160c ("[NETFILTER]: x_tables: simplify compat API") Signed-off-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/ipv4/netfilter/arp_tables.c

[PATCH 4.4 33/38] net: ieee802154: forbid monitor for del llsec seclevel

2021-04-15 Thread Greg Kroah-Hartman
1a819824e0...@syzkaller.appspotmail.com Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210405003054.256017-15-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 +++ 1 file changed, 3 insertions(+) --- a/net/ieee802154/

[PATCH 4.4 32/38] net: ieee802154: forbid monitor for set llsec params

2021-04-15 Thread Greg Kroah-Hartman
https://lore.kernel.org/r/20210405003054.256017-3-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 +++ 1 file changed, 3 insertions(+) --- a/net/ieee802154/nl802154.c +++ b/net/ieee802154/nl802154.c @@ -1367,6 +1367,9 @@ stati

[PATCH 4.4 31/38] net: ieee802154: fix nl802154 del llsec devkey

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-4-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b

[PATCH 4.4 29/38] net: ieee802154: fix nl802154 del llsec dev

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-2-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b

[PATCH 4.4 30/38] net: ieee802154: fix nl802154 add llsec key

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-3-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b/net

[PATCH 4.4 38/38] xen/events: fix setting irq affinity

2021-04-15 Thread Greg Kroah-Hartman
el 5.11. Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/xen/events/events_base.c +++ b/drivers/xen/events/events_base.c @@ -1779,7 +1779,7 @@ static void lateeoi_

[PATCH 4.4 37/38] perf map: Tighten snprintf() string precision to pass gcc check on some 32-bit arches

2021-04-15 Thread Greg Kroah-Hartman
__bos (__s), __fmt, __va_arg_pack ()); |~ cc1: all warnings being treated as errors Since we have the lenghts for what lands in that place, use it to give the compiler more info and make it happy. Signed-off-by: Arnaldo Carvalho de Melo Cc: Anders Roxell Signed-off-by: Greg K

[PATCH 4.4 28/38] net: ieee802154: fix nl802154 del llsec key

2021-04-15 Thread Greg Kroah-Hartman
Signed-off-by: Alexander Aring Link: https://lore.kernel.org/r/20210221174321.14210-1-aahri...@redhat.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/ieee802154/nl802154.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/ieee802154/nl802154.c +++ b/net

[PATCH 4.4 00/38] 4.4.267-rc1 review

2021-04-15 Thread Greg Kroah-Hartman
linux-4.4.y and the diffstat can be found below. thanks, greg k-h - Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.4.267-rc1 Juergen Gross xen/events: fix setting irq affinity Arnaldo Carvalho de Melo perf map: Tighten snprintf() string precision to pass

[PATCH 4.4 09/38] ia64: fix user_stack_pointer() for ptrace()

2021-04-15 Thread Greg Kroah-Hartman
itially. Link: https://bugs.gentoo.org/769614 [1] Link: https://lkml.kernel.org/r/20210331084447.2561532-1-sly...@gentoo.org Signed-off-by: Sergei Trofimovich Reported-by: Dmitry V. Levin Cc: Oleg Nesterov Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman -

[PATCH 4.4 08/38] net: ipv6: check for validity before dereferencing cfg->fc_nlinfo.nlh

2021-04-15 Thread Greg Kroah-Hartman
-Coverity: ("NULL pointer dereference") Signed-off-by: Muhammad Usama Anjum Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/route.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -2980,9 +2980,11

[PATCH 4.4 07/38] xen/evtchn: Change irq_info lock to raw_spinlock_t

2021-04-15 Thread Greg Kroah-Hartman
5.10141-1-luca.fance...@arm.com Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c | 10 +- drivers/xen/events/events_internal.h |2 +- 2 files changed, 6 insertions(+), 6 deletions(-) --- a/drivers/xen/events/events_base.c +++

[PATCH 4.4 06/38] nfc: Avoid endless loops caused by repeated llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
ot;) Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.11 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/nfc/llcp_sock.c |4 1 file changed, 4 insertions(+) --- a/net/nfc/ll

[PATCH 4.4 05/38] nfc: fix memory leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
urs. fix CVE-2020-25672 Fixes: d646960f7986 ("NFC: Initial LLCP support") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.3 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/

[PATCH 4.4 04/38] nfc: fix refcount leak in llcp_sock_connect()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25671 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signe

[PATCH 4.4 26/38] net: mac802154: Fix general protection fault

2021-04-15 Thread Greg Kroah-Hartman
: Pavel Skripkin Reported-by: syzbot+9ec037722d2603a9f...@syzkaller.appspotmail.com Acked-by: Alexander Aring Link: https://lore.kernel.org/r/20210304152125.1052825-1-paskrip...@gmail.com Signed-off-by: Stefan Schmidt Signed-off-by: Greg Kroah-Hartman --- net/mac802154/llsec.c |2 +- 1 file

[PATCH 4.4 03/38] nfc: fix refcount leak in llcp_sock_bind()

2021-04-15 Thread Greg Kroah-Hartman
-2020-25670 Fixes: c7aa12252f51 ("NFC: Take a reference on the LLCP local pointer when creating a socket") Reported-by: "kiyin(尹亮)" Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 Cc: #v3.6 Signed-off-by: Xiaoming Ni Signed-off-by: David S. Miller Signed-off-by

[PATCH 4.4 25/38] drivers: net: fix memory leak in peak_usb_create_dev

2021-04-15 Thread Greg Kroah-Hartman
y: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/usb/peak_usb/pcan_usb_core.c |6 +- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/drivers/net/can/usb/peak_usb/pcan_usb_core.c +++ b/drivers/net/can/usb/peak_usb/pcan_

[PATCH 4.4 24/38] drivers: net: fix memory leak in atusb_probe

2021-04-15 Thread Greg Kroah-Hartman
: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ieee802154/atusb.c |1 + 1 file changed, 1 insertion(+) --- a/drivers/net/ieee802154/atusb.c +++ b/drivers/net/ieee802154/atusb.c @@ -340,6 +340,7 @@ static int atusb_alloc_urbs(struct atusb

<    1   2   3   4   5   6   7   8   9   10   >