[PATCH 5.10 149/188] s390/cpcmd: fix inline assembly register clobbering

2021-04-12 Thread Greg Kroah-Hartman
From: Alexander Gordeev [ Upstream commit 7a2f91441b2c1d81b77c1cd816a4659f4abc9cbe ] Register variables initialized using arithmetic. That leads to kasan instrumentaton code corrupting the registers contents. Follow GCC guidlines and use temporary variables for assigning init values to register

[PATCH 5.10 147/188] clk: fix invalid usage of list cursor in unregister

2021-04-12 Thread Greg Kroah-Hartman
From: Lukasz Bartosik [ Upstream commit 7045465500e465b09f09d6e5bdc260a9f1aab97b ] Fix invalid usage of a list_for_each_entry cursor in clk_notifier_unregister(). When list is empty or if the list is completely traversed (without breaking from the loop on one of the entries) then the list

[PATCH 5.10 148/188] workqueue: Move the position of debug_work_activate() in __queue_work()

2021-04-12 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 0687c66b5f666b5ad433f4e94251590d9bc9d10e ] The debug_work_activate() is called on the premise that the work can be inserted, because if wq be in WQ_DRAINING status, insert work may be failed. Fixes: e41e704bc4f4 ("workqueue: improve destroy_workqueue()

[PATCH 5.10 146/188] clk: fix invalid usage of list cursor in register

2021-04-12 Thread Greg Kroah-Hartman
From: Lukasz Bartosik [ Upstream commit 8d3c0c01cb2e36b2bf3c06a82b18b228d0c8f5d0 ] Fix invalid usage of a list_for_each_entry cursor in clk_notifier_register(). When list is empty or if the list is completely traversed (without breaking from the loop on one of the entries) then the list cursor

[PATCH 5.10 145/188] net: macb: restore cmp registers on resume path

2021-04-12 Thread Greg Kroah-Hartman
From: Claudiu Beznea [ Upstream commit a14d273ba15968495896a38b7b3399dba66d0270 ] Restore CMP screener registers on resume path. Fixes: c1e85c6ce57ef ("net: macb: save/restore the remaining registers and features") Signed-off-by: Claudiu Beznea Acked-by: Nicolas Ferre Signed-off-by: David

[PATCH 5.10 136/188] soc/fsl: qbman: fix conflicting alignment attributes

2021-04-12 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 040f31196e8b2609613f399793b9225271b79471 ] When building with W=1, gcc points out that the __packed attribute on struct qm_eqcr_entry conflicts with the 8-byte alignment attribute on struct qm_fd inside it: drivers/soc/fsl/qbman/qman.c:189:1: error:

[PATCH 5.10 097/188] regulator: bd9571mwv: Fix AVS and DVFS voltage range

2021-04-12 Thread Greg Kroah-Hartman
From: Geert Uytterhoeven [ Upstream commit 3b6e7088afc919f5b52e4d2de8501ad34d35b09b ] According to Table 30 ("DVFS_MoniVDAC [6:0] Setting Table") in the BD9571MWV-M Datasheet Rev. 002, the valid voltage range is 600..1100 mV (settings 0x3c..0x6e). While the lower limit is taken into account

[PATCH 5.10 103/188] ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips

2021-04-12 Thread Greg Kroah-Hartman
From: Shengjiu Wang [ Upstream commit 16b82e75c15a7dbd564ea3654f3feb61df9e1e6f ] The input MCLK is 12.288MHz, the desired output sysclk is 11.2896MHz and sample rate is 44100Hz, with the configuration pllprescale=2, postscale=sysclkdiv=1, some chip may have wrong bclk and lrclk output with pll

[PATCH 5.10 106/188] i40e: Added Asym_Pause to supported link modes

2021-04-12 Thread Greg Kroah-Hartman
From: Mateusz Palczewski [ Upstream commit 90449e98c265296329446c7abcd2aae3b20c0bc9 ] Add Asym_Pause to supported link modes (it is supported by HW). Lack of Asym_Pause in supported modes can cause several problems, i.e. it won't be possible to turn the autonegotiation on with asymmetric pause

[PATCH 5.10 102/188] ASoC: SOF: Intel: HDA: fix core status verification

2021-04-12 Thread Greg Kroah-Hartman
From: Guennadi Liakhovetski [ Upstream commit 927280909fa7d8e61596800d82f18047c6cfbbe4 ] When checking for enabled cores it isn't enough to check that some of the requested cores are running, we have to check that all of them are. Fixes: 747503b1813a ("ASoC: SOF: Intel: Add Intel specific HDA

[PATCH 5.10 105/188] virtchnl: Fix layout of RSS structures

2021-04-12 Thread Greg Kroah-Hartman
From: Norbert Ciosek [ Upstream commit 22f8b5df881e9f1302514bb8649c2051de55 ] Remove padding from RSS structures. Previous layout could lead to unwanted compiler optimizations in loops when iterating over key and lut arrays. Fixes: 65ece6de0114 ("virtchnl: Add missing explicit padding to

[PATCH 5.10 128/188] net: phy: broadcom: Only advertise EEE for supported modes

2021-04-12 Thread Greg Kroah-Hartman
From: Florian Fainelli [ Upstream commit c056d480b40a68f2520ccc156c7fae672d69d57d ] We should not be advertising EEE for modes that we do not support, correct that oversight by looking at the PHY device supported linkmodes. Fixes: 99cec8a4dda2 ("net: phy: broadcom: Allow enabling or disabling

[PATCH 5.10 104/188] xfrm: Fix NULL pointer dereference on policy lookup

2021-04-12 Thread Greg Kroah-Hartman
From: Steffen Klassert [ Upstream commit b1e3a5607034aa0a481c6f69a6893049406665fb ] When xfrm interfaces are used in combination with namespaces and ESP offload, we get a dst_entry NULL pointer dereference. This is because we don't have a dst_entry attached in the ESP offloading case and we

[PATCH 5.10 101/188] esp: delete NETIF_F_SCTP_CRC bit from features for esp offload

2021-04-12 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 154deab6a3ba47792936edf77f2f13a1cbc4351d ] Now in esp4/6_gso_segment(), before calling inner proto .gso_segment, NETIF_F_CSUM_MASK bits are deleted, as HW won't be able to do the csum for inner proto due to the packet encrypted already. So the UDP/TCP packet

[PATCH 5.10 134/188] net/rds: Fix a use after free in rds_message_map_pages

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit bdc2ab5c61a5c07388f4820ff21e787b4dfd1ced ] In rds_message_map_pages, the rm is freed by rds_message_put(rm). But rm is still used by rm->data.op_sg in return value. My patch assigns ERR_CAST(rm->data.op_sg) to err before the rm is freed to avoid the uaf.

[PATCH 5.10 132/188] net/mlx5e: Fix ethtool indication of connector type

2021-04-12 Thread Greg Kroah-Hartman
From: Aya Levin [ Upstream commit 3211434dfe7a66fcf55e43961ea524b78336c04c ] Use connector_type read from PTYS register when it's valid, based on corresponding capability bit. Fixes: 5b4793f81745 ("net/mlx5e: Add support for reading connector type from PTYS") Signed-off-by: Aya Levin

[PATCH 5.10 133/188] net/mlx5: Dont request more than supported EQs

2021-04-12 Thread Greg Kroah-Hartman
From: Daniel Jurgens [ Upstream commit a7b76002ae78cd230ee652ccdfedf21aa94fcecc ] Calculating the number of compeltion EQs based on the number of available IRQ vectors doesn't work now that all async EQs share one IRQ. Thus the max number of EQs can be exceeded on systems with more than

[PATCH 5.10 130/188] ASoC: sunxi: sun4i-codec: fill ASoC card owner

2021-04-12 Thread Greg Kroah-Hartman
From: Bastian Germann [ Upstream commit 7c0d6e482062eb5c06ecccfab340abc523bdca00 ] card->owner is a required property and since commit 81033c6b584b ("ALSA: core: Warn on empty module") a warning is issued if it is empty. Add it. This fixes following warning observed on Lamobo R1: WARNING: CPU:

[PATCH 5.10 131/188] net/mlx5e: Fix mapping of ct_label zero

2021-04-12 Thread Greg Kroah-Hartman
From: Ariel Levkovich [ Upstream commit d24f847e54214049814b9515771622eaab3f42ab ] ct_label 0 is a default label each flow has and therefore there can be rules that match on ct_label=0 without a prior rule that set the ct_label to this value. The ct_label value is not used directly in the HW

[PATCH 5.10 129/188] I2C: JZ4780: Fix bug for Ingenic X1000.

2021-04-12 Thread Greg Kroah-Hartman
From: 周琰杰 (Zhou Yanjie) [ Upstream commit 942bfbecc0281c75db84f744b9b77b0f2396f484 ] Only send "X1000_I2C_DC_STOP" when last byte, or it will cause error when I2C write operation which should look like this: device_addr + w, reg_addr, data; But without this patch, it looks like this:

[PATCH 5.10 127/188] nfp: flower: ignore duplicate merge hints from FW

2021-04-12 Thread Greg Kroah-Hartman
From: Yinjun Zhang [ Upstream commit 2ea538dbee1c79f6f6c24a6f2f82986e4b7ccb78 ] A merge hint message needs some time to process before the merged flow actually reaches the firmware, during which we may get duplicate merge hints if there're more than one packet that hit the pre-merged flow. And

[PATCH 5.10 100/188] net: xfrm: Localize sequence counter per network namespace

2021-04-12 Thread Greg Kroah-Hartman
From: Ahmed S. Darwish [ Upstream commit e88add19f68191448427a6e4eb059664650a837f ] A sequence counter write section must be serialized or its internal state can get corrupted. The "xfrm_state_hash_generation" seqcount is global, but its write serialization lock (net->xfrm.xfrm_state_lock) is

[PATCH 5.10 126/188] net: qrtr: Fix memory leak on qrtr_tx_wait failure

2021-04-12 Thread Greg Kroah-Hartman
From: Loic Poulain [ Upstream commit 8a03dd925786bdc3834d56ccc980bb70668efa35 ] qrtr_tx_wait does not check for radix_tree_insert failure, causing the 'flow' object to be unreferenced after qrtr_tx_wait return. Fix that by releasing flow on radix_tree_insert failure. Fixes: 5fdeb0d372ab ("net:

[PATCH 5.10 125/188] net/ncsi: Avoid channel_monitor hrtimer deadlock

2021-04-12 Thread Greg Kroah-Hartman
From: Milton Miller [ Upstream commit 03cb4d05b4ea9a3491674ca40952adb708d549fa ] Calling ncsi_stop_channel_monitor from channel_monitor is a guaranteed deadlock on SMP because stop calls del_timer_sync on the timer that invoked channel_monitor as its timer function. Recognise the inherent race

[PATCH 5.10 124/188] ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces

2021-04-12 Thread Greg Kroah-Hartman
From: Stefan Riedmueller [ Upstream commit f57011e72f5fe0421ec7a812beb1b57bdf4bb47f ] Setting the vmmc supplies is crucial since otherwise the supplying regulators get disabled and the SD interfaces are no longer powered which leads to system failures if the system is booted from that SD

[PATCH 5.10 123/188] net:tipc: Fix a double free in tipc_sk_mcast_rcv

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 6bf24dc0cc0cc43b29ba344b66d78590e687e046 ] In the if(skb_peek(arrvq) == skb) branch, it calls __skb_dequeue(arrvq) to get the skb by skb = skb_peek(arrvq). Then __skb_dequeue() unlinks the skb from arrvq and returns the skb which equals to skb_peek(arrvq).

[PATCH 5.10 120/188] gianfar: Handle error code at MAC address change

2021-04-12 Thread Greg Kroah-Hartman
From: Claudiu Manoil [ Upstream commit bff5b62585123823842833ab20b1c0a7fa437f8c ] Handle return error code of eth_mac_addr(); Fixes: 3d23a05c75c7 ("gianfar: Enable changing mac addr when if up") Signed-off-by: Claudiu Manoil Signed-off-by: David S. Miller Signed-off-by: Sasha Levin ---

[PATCH 5.10 122/188] cxgb4: avoid collecting SGE_QBASE regs during traffic

2021-04-12 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit 1bfb3dea965ff9f6226fd1709338f227363b6061 ] Accessing SGE_QBASE_MAP[0-3] and SGE_QBASE_INDEX registers can lead to SGE missing doorbells under heavy traffic. So, only collect them when adapter is idle. Also update the regdump range to skip collecting

[PATCH 5.10 121/188] net: dsa: Fix type was not set for devlink port

2021-04-12 Thread Greg Kroah-Hartman
From: Maxim Kochetkov [ Upstream commit fb6ec87f7229b92baa81b35cbc76f2626d5bfadb ] If PHY is not available on DSA port (described at devicetree but absent or failed to detect) then kernel prints warning after 3700 secs: [ 3707.948771] [ cut here ] [ 3707.948784] Type

[PATCH 5.10 117/188] can: isotp: fix msg_namelen values depending on CAN_REQUIRED_SIZE

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Hartkopp [ Upstream commit f522d9559b07854c231cf8f0b8cb5a3578f8b44e ] Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939 members") the sockaddr_can has been extended in size and a new CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol specific

[PATCH 5.10 119/188] ethernet: myri10ge: Fix a use after free in myri10ge_sw_tso

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 63415767a2446136372e777cde5bb351f21ec21d ] In myri10ge_sw_tso, the skb_list_walk_safe macro will set (curr) = (segs) and (next) = (curr)->next. If status!=0 is true, the memory pointed by curr and segs will be free by dev_kfree_skb_any(curr). But later, the

[PATCH 5.10 115/188] xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets

2021-04-12 Thread Greg Kroah-Hartman
From: Steffen Klassert [ Upstream commit c7dbf4c08868d9db89b8bfe8f8245ca61b01ed2f ] Commit 94579ac3f6d0 ("xfrm: Fix double ESP trailer insertion in IPsec crypto offload.") added a XFRM_XMIT flag to avoid duplicate ESP trailer insertion on HW offload. This flag is set on the secpath that is

[PATCH 5.10 116/188] can: bcm/raw: fix msg_namelen values depending on CAN_REQUIRED_SIZE

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Hartkopp [ Upstream commit 9e9714742fb70467464359693a73b911a630226f ] Since commit f5223e9eee65 ("can: extend sockaddr_can to include j1939 members") the sockaddr_can has been extended in size and a new CAN_REQUIRED_SIZE macro has been introduced to calculate the protocol specific

[PATCH 5.10 099/188] ARM: OMAP4: PM: update ROM return address for OSWR and OFF

2021-04-12 Thread Greg Kroah-Hartman
From: Carlos Leija [ Upstream commit b3d09a06d89f474cb52664e016849315a97e09d9 ] We need to add a dummy smc call to the cpuidle wakeup path to force the ROM code to save the return address after MMU is enabled again. This is needed to prevent random hangs on secure devices like droid4.

[PATCH 5.10 118/188] mlxsw: spectrum: Fix ECN marking in tunnel decapsulation

2021-04-12 Thread Greg Kroah-Hartman
From: Ido Schimmel [ Upstream commit 66167c310deb4ac1725f81004fb4b504676ad0bf ] Cited commit changed the behavior of the software data path with regards to the ECN marking of decapsulated packets. However, the commit did not change other callers of __INET_ECN_decapsulate(), namely mlxsw. The

[PATCH 5.10 112/188] sch_red: fix off-by-one checks in red_check_params()

2021-04-12 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 3a87571f0ffc51ba3bf3ecdb6032861d0154b164 ] This fixes following syzbot report: UBSAN: shift-out-of-bounds in ./include/net/red.h:237:23 shift exponent 32 is too large for 32-bit type 'unsigned int' CPU: 1 PID: 8418 Comm: syz-executor170 Not tainted

[PATCH 5.10 111/188] geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply

2021-04-12 Thread Greg Kroah-Hartman
From: Antoine Tenart [ Upstream commit 68c1a943ef37bafde5ea2383e8ca224c7169ee31 ] When the interface is part of a bridge or an Open vSwitch port and a packet exceed a PMTU estimate, an ICMP reply is sent to the sender. When using the external mode (collect metadata) the source and destination

[PATCH 5.10 080/188] percpu: make pcpu_nr_empty_pop_pages per chunk type

2021-04-12 Thread Greg Kroah-Hartman
count percpu memory to memory cgroups") Cc: sta...@vger.kernel.org # 5.9+ Signed-off-by: Roman Gushchin Tested-by: Filipe Manana Signed-off-by: Dennis Zhou Signed-off-by: Greg Kroah-Hartman --- mm/percpu-internal.h |2 +- mm/percpu-stats.c|9 +++-- mm/percpu.c

[PATCH 5.10 081/188] i2c: turn recovery error on init to debug

2021-04-12 Thread Greg Kroah-Hartman
Kudielka Tested-by: Klaus Kudielka Signed-off-by: Wolfram Sang Signed-off-by: Wolfram Sang Cc: sta...@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/i2c/i2c-core-base.c |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/drivers/i2c/i2c-core-base.c +++ b/drivers/i2c

[PATCH 5.10 082/188] KVM: x86/mmu: change TDP MMU yield function returns to match cond_resched

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit e28a436ca4f65384cceaf3f4da0e00aa74244e6a ] Currently the TDP MMU yield / cond_resched functions either return nothing or return true if the TLBs were not flushed. These are confusing semantics, especially when making control flow decisions in calling

[PATCH 5.10 083/188] KVM: x86/mmu: Merge flush and non-flush tdp_mmu_iter_cond_resched

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit e139a34ef9d5627a41e1c02210229082140d1f92 ] The flushing and non-flushing variants of tdp_mmu_iter_cond_resched have almost identical implementations. Merge the two functions and add a flush parameter. Signed-off-by: Ben Gardon Message-Id:

[PATCH 5.10 075/188] usbip: vudc synchronize sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/vudc_dev.c |1 + drivers/usb/usbip/vudc_sysfs.c |5 + 2 files changed, 6 insertions(+) --- a/drivers/usb/usbip/vudc_dev.c +++ b/drivers/usb/usbip/vudc_dev.c @@ -572,6 +572,7 @@ static int init_vudc_hw(struct vudc *udc

[PATCH 5.10 076/188] usbip: synchronize event handler with sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
.git.sk...@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/usbip_event.c |2 ++ 1 file changed, 2 insertions(+) --- a/drivers/usb/usbip/usbip_event.c +++ b/drivers/usb/usbip/usbip_event.c @@ -70,6 +70,7 @@ static void event_handler(struct work_st while ((ud

[PATCH 5.10 026/188] fs: direct-io: fix missing sdio->boundary

2021-04-12 Thread Greg Kroah-Hartman
-by: Jack Qiu Reviewed-by: Jan Kara Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/direct-io.c |5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/fs/direct-io.c +++ b/fs/direct-io.c @@ -810,6 +810,7 @@ submit_page_section(st

[PATCH 5.10 039/188] ice: Use port number instead of PF ID for WoL

2021-04-12 Thread Greg Kroah-Hartman
, ice_is_wol_supported doesn't really need a pointer to the pf struct, but just needs a pointer to the hw instance. Fixes: 769c500dcc1e ("ice: Add advanced power mgmt for WoL") Signed-off-by: Anirudh Venkataramanan Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kro

[PATCH 5.10 038/188] ice: Fix for dereference of NULL pointer

2021-04-12 Thread Greg Kroah-Hartman
t;ice: Add support for switch filter programming") Signed-off-by: Jacek Bułatek Co-developed-by: Haiyue Wang Signed-off-by: Haiyue Wang Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/ice/ice_switch.c | 12 +++---

[PATCH 5.10 040/188] ice: Cleanup fltr list in case of allocation issues

2021-04-12 Thread Greg Kroah-Hartman
allocated memory. This patch ensures proper memory deallocation in these cases. Fixes: 80d144c9ac82 ("ice: Refactor switch rule management structures and functions") Signed-off-by: Robert Malz Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- d

[PATCH 5.10 036/188] ice: fix memory allocation call

2021-04-12 Thread Greg Kroah-Hartman
d-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/ice/ice_common.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/ethernet/intel/ice/ice_common.c +++ b/drivers/net/ethernet/intel/ice/ice_common.c @@ -71

[PATCH 5.10 037/188] ice: remove DCBNL_DEVRESET bit from PF state

2021-04-12 Thread Greg Kroah-Hartman
an Tested-by: Tony Brelinski Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/ice/ice.h|1 - drivers/net/ethernet/intel/ice/ice_dcb_nl.c |2 -- drivers/net/ethernet/intel/ice/ice_lib.c|1 - 3 files changed, 4 deletions(-) --- a/d

[PATCH 5.10 114/188] arm64: dts: imx8mm/q: Fix pad control of SD1_DATA0

2021-04-12 Thread Greg Kroah-Hartman
From: Oliver Stäbler [ Upstream commit 5cfad4f45806f6f898b63b8c77cea7452c704cb3 ] Fix address of the pad control register (IOMUXC_SW_PAD_CTL_PAD_SD1_DATA0) for SD1_DATA0_GPIO2_IO2. This seems to be a typo but it leads to an exception when pinctrl is applied due to wrong memory address access.

[PATCH 5.10 113/188] drivers/net/wan/hdlc_fr: Fix a double free in pvc_xmit

2021-04-12 Thread Greg Kroah-Hartman
From: Lv Yunlong [ Upstream commit 1b479fb801602b22512f53c19b1f93a4fc5d5d9d ] In pvc_xmit, if __skb_pad(skb, pad, false) failed, it will free the skb in the first time and goto drop. But the same skb is freed by kfree_skb(skb) in the second time in drop. Maintaining the original function

[PATCH 5.10 107/188] i40e: Fix kernel oops when i40e driver removes VFs

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ] Fix the reason of kernel oops when i40e driver removed VFs. Added new __I40E_VFS_RELEASING state to signalize releasing process by PF, that it makes possible to exit of reset VF procedure. Without this patch, it is

[PATCH 5.10 108/188] hostfs: fix memory handling in follow_link()

2021-04-12 Thread Greg Kroah-Hartman
From: Al Viro [ Upstream commit 7f6c411c9b50cfab41cc798e003eff27608c7016 ] 1) argument should not be freed in any case - the caller already has it as ->s_fs_info (and uses it a lot afterwards) 2) allocate readlink buffer with kmalloc() - the caller has no way to tell if it's got that (on

[PATCH 5.10 109/188] amd-xgbe: Update DMA coherency values

2021-04-12 Thread Greg Kroah-Hartman
From: Shyam Sundar S K [ Upstream commit d75135082698140a26a56defe1bbc1b06f26a41f ] Based on the IOMMU configuration, the current cache control settings can result in possible coherency issues. The hardware team has recommended new settings for the PCI device path to eliminate the issue.

[PATCH 5.10 110/188] vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply

2021-04-12 Thread Greg Kroah-Hartman
From: Antoine Tenart [ Upstream commit 30a93d2b7d5a7cbb53ac19c9364a256d1aa6c08a ] When the interface is part of a bridge or an Open vSwitch port and a packet exceed a PMTU estimate, an ICMP reply is sent to the sender. When using the external mode (collect metadata) the source and destination

[PATCH 5.10 064/188] nl80211: fix potential leak of ACL params

2021-04-12 Thread Greg Kroah-Hartman
probe response support") Link: https://lore.kernel.org/r/20210408142833.d8bc2e2e454a.If290b1ba85789726a671ff0b237726d4851b5b0f@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/nl80211.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)

[PATCH 5.10 063/188] nl80211: fix beacon head validation

2021-04-12 Thread Greg Kroah-Hartman
annes Berg Link: https://lore.kernel.org/r/20210408154518.d9b06d39b4ee.Iff908997b2a4067e8d456b3cb96cab9771d252b8@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/nl80211.c |6 +- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/net/wireless

[PATCH 5.10 065/188] cfg80211: check S1G beacon compat element length

2021-04-12 Thread Greg Kroah-Hartman
0408142826.f6f4525012de.I9fdeff0afdc683a6024e5ea49d2daa3cd2459d11@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/scan.c | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) --- a/net/wireless/scan.c +++ b/net/wireless/scan.c @@ -2351,1

[PATCH 5.10 066/188] mac80211: fix time-is-after bug in mlme

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/mac80211/mlme.c |5 - 1 file changed, 4 insertions(+), 1 deletion(-) --- a/net/mac80211/mlme.c +++ b/net/mac80211/mlme.c @@ -4660,7 +4660,10 @@ static void ieee80211_sta_conn_mon_timer timeout = sta->rx_

[PATCH 5.10 067/188] mac80211: fix TXQ AC confusion

2021-04-12 Thread Greg Kroah-Hartman
"mac80211: add an optional TXQ for other PS-buffered frames") Acked-by: Toke Høiland-Jørgensen Link: https://lore.kernel.org/r/20210323210500.bf4d50afea4a.I136ffde910486301f8818f5442e3c9bf8670a9c4@changeid Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/ma

[PATCH 5.10 068/188] net: hsr: Reset MAC header for Tx path

2021-04-12 Thread Greg Kroah-Hartman
sure that the skb is prepared correctly. Fixes: d346a3fae3ff ("packet: introduce PACKET_QDISC_BYPASS socket option") Signed-off-by: Kurt Kanzenbach Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/hsr/hsr_device.c |1 + net/hsr/hsr

[PATCH 5.10 059/188] i40e: Fix sparse errors in i40e_txrx.c

2021-04-12 Thread Greg Kroah-Hartman
pport for pass and drop actions") Fixes: 2e6893123830 ("i40e: split XDP_TX tail and XDP_REDIRECT map flushing") Signed-off-by: Aleksandr Loktionov Signed-off-by: Arkadiusz Kubalewski Tested-by: Dave Switzer Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net

[PATCH 5.10 098/188] ARM: OMAP4: Fix PMIC voltage domains for bionic

2021-04-12 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit 30916faa1a6009122e10d0c42338b8db44a36fde ] We are now registering the mpu domain three times instead of registering mpu, core and iva domains like we should. Fixes: d44fa156dcb2 ("ARM: OMAP2+: Configure voltage controller for cpcap") Signed-off-by: Tony

[PATCH 5.10 093/188] ice: Recognize 860 as iSCSI port in CEE mode

2021-04-12 Thread Greg Kroah-Hartman
From: Chinh T Cao [ Upstream commit aeac8ce864d9c0836e12ed5b5cc80f62f3cccb7c ] iSCSI can use both TCP ports 860 and 3260. However, in our current implementation, the ice_aqc_opc_get_cee_dcb_cfg (0x0A07) AQ command doesn't provide a way to communicate the protocol port number to the AQ's caller.

[PATCH 5.10 095/188] xfrm: Use actual socket sk instead of skb socket for xfrm_output_resume

2021-04-12 Thread Greg Kroah-Hartman
From: Evan Nimmo [ Upstream commit 9ab1265d52314fce1b51e8665ea6dbc9ac1a027c ] A situation can occur where the interface bound to the sk is different to the interface bound to the sk attached to the skb. The interface bound to the sk is the correct one however this information is lost inside

[PATCH 5.10 096/188] remoteproc: qcom: pil_info: avoid 64-bit division

2021-04-12 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 7029e783027706b427bbfbdf8558252c1dac6fa0 ] On 32-bit machines with 64-bit resource_size_t, the driver causes a link failure because of the 64-bit division: arm-linux-gnueabi-ld: drivers/remoteproc/qcom_pil_info.o: in function `qcom_pil_info_store':

[PATCH 5.10 094/188] xfrm: interface: fix ipv4 pmtu check to honor ip header df

2021-04-12 Thread Greg Kroah-Hartman
From: Eyal Birger [ Upstream commit 8fc0e3b6a8666d656923d214e4dc791e9a17164a ] Frag needed should only be sent if the header enables DF. This fix allows packets larger than MTU to pass the xfrm interface and be fragmented after encapsulation, aligning behavior with non-interface xfrm. Fixes:

[PATCH 5.10 092/188] ice: Refactor DCB related variables out of the ice_port_info struct

2021-04-12 Thread Greg Kroah-Hartman
From: Chinh T Cao [ Upstream commit fc2d1165d4a424dd325ae1f45806565350a58013 ] Refactor the DCB related variables out of the ice_port_info_struct. The goal is to make the ice_port_info struct cleaner. Signed-off-by: Chinh T Cao Co-developed-by: Dave Ertman Signed-off-by: Dave Ertman

[PATCH 5.10 089/188] KVM: x86/mmu: Dont allow TDP MMU to yield when recovering NX pages

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit 33a3164161fc86b9cc238f7f2aa2ccb1d5559b1c ] Prevent the TDP MMU from yielding when zapping a gfn range during NX page recovery. If a flush is pending from a previous invocation of the zapping helper, either in the TDP MMU or the legacy MMU, but the

[PATCH 5.10 090/188] KVM: x86/mmu: preserve pending TLB flush across calls to kvm_tdp_mmu_zap_sp

2021-04-12 Thread Greg Kroah-Hartman
From: Paolo Bonzini [ Upstream commit 315f02c60d9425b38eb8ad7f21b8a35e40db23f9 ] Right now, if a call to kvm_tdp_mmu_zap_sp returns false, the caller will skip the TLB flush, which is wrong. There are two ways to fix it: - since kvm_tdp_mmu_zap_sp will not yield and therefore will not flush

[PATCH 5.10 091/188] net: sched: fix err handler in tcf_action_init()

2021-04-12 Thread Greg Kroah-Hartman
From: Vlad Buslov [ Upstream commit b3650bf76a32380d4d80a3e21b5583e7303f216c ] With recent changes that separated action module load from action initialization tcf_action_init() function error handling code was modified to manually release the loaded modules if loading/initialization of any

[PATCH 5.10 086/188] KVM: x86/mmu: Yield in TDU MMU iter even if no SPTES changed

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit 1af4a96025b33587ca953c7ef12a1b20c6e70412 ] Given certain conditions, some TDP MMU functions may not yield reliably / frequently enough. For example, if a paging structure was very large but had few, if any writable entries, wrprot_gfn_range could traverse many

[PATCH 5.10 087/188] KVM: x86/mmu: Ensure TLBs are flushed when yielding during GFN range zap

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit a835429cda91621fca915d80672a157b47738afb ] When flushing a range of GFNs across multiple roots, ensure any pending flush from a previous root is honored before yielding while walking the tables of the current root. Note, kvm_tdp_mmu_zap_gfn_range()

[PATCH 5.10 088/188] KVM: x86/mmu: Ensure TLBs are flushed for TDP MMU during NX zapping

2021-04-12 Thread Greg Kroah-Hartman
From: Sean Christopherson [ Upstream commit 048f49809c526348775425420fb5b8e84fd9a133 ] Honor the "flush needed" return from kvm_tdp_mmu_zap_gfn_range(), which does the flush itself if and only if it yields (which it will never do in this particular scenario), and otherwise expects the caller to

[PATCH 5.10 062/188] net: sched: fix action overwrite reference counting

2021-04-12 Thread Greg Kroah-Hartman
inters to created actions from actions array before passing it to tcf_action_put_many(). Fixes: cae422f379f3 ("net: sched: use reference counting action init") Reported-by: Kumar Kartikeya Dwivedi Signed-off-by: Vlad Buslov Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman

[PATCH 5.10 085/188] KVM: x86/mmu: Ensure forward progress when yielding in TDP MMU iter

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit ed5e484b79e8a9b8be714bd85b6fc70bd6dc99a7 ] In some functions the TDP iter risks not making forward progress if two threads livelock yielding to one another. This is possible if two threads are trying to execute wrprot_gfn_range. Each could write protect an

[PATCH 5.10 084/188] KVM: x86/mmu: Rename goal_gfn to next_last_level_gfn

2021-04-12 Thread Greg Kroah-Hartman
From: Ben Gardon [ Upstream commit 74953d3530280dc53256054e1906f58d07bfba44 ] The goal_gfn field in tdp_iter can be misleading as it implies that it is the iterator's final goal. It is really a target for the lowest gfn mapped by the leaf level SPTE the iterator will traverse towards. Change

[PATCH 5.10 077/188] driver core: Fix locking bug in deferred_probe_timeout_work_func()

2021-04-12 Thread Greg Kroah-Hartman
f-by: Greg Kroah-Hartman --- drivers/base/dd.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/drivers/base/dd.c +++ b/drivers/base/dd.c @@ -292,14 +292,16 @@ int driver_deferred_probe_check_state(st static void deferred_probe_timeout_work_func(struct work_st

[PATCH 5.10 078/188] scsi: pm80xx: Fix chip initialization failure

2021-04-12 Thread Greg Kroah-Hartman
5.10+ Link: https://lore.kernel.org/r/20210402054212.17834-1-viswa...@microchip.com.com Reported-and-tested-by: Ash Izat Signed-off-by: Viswas G Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/pm8001/pm8001_hwi.c |8 1 file changed, 4 insertions(+), 4

[PATCH 5.10 079/188] scsi: target: iscsi: Fix zero tag inside a trace event

2021-04-12 Thread Greg Kroah-Hartman
-1-r.bolsha...@yadro.com Cc: sta...@vger.kernel.org # 5.10+ Reviewed-by: Mike Christie Signed-off-by: Roman Bolshakov Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/target/iscsi/iscsi_target.c |3 +-- 1 file changed, 1 insertion(+), 2 deletions

[PATCH 5.10 061/188] net: sched: sch_teql: fix null-pointer dereference

2021-04-12 Thread Greg Kroah-Hartman
create() imediately calls teql_destroy() which does not expect zero master pointer and we get OOPS. Fixes: 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation") Signed-off-by: Pavel Tikhomirov Reviewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartma

[PATCH 5.10 071/188] thunderbolt: Fix a leak in tb_retimer_add()

2021-04-12 Thread Greg Kroah-Hartman
in a memory leak. Fixes: dacb12877d92 ("thunderbolt: Add support for on-board retimers") Cc: sta...@vger.kernel.org Signed-off-by: Dan Carpenter Reviewed-by: Jason Gunthorpe Signed-off-by: Mika Westerberg Signed-off-by: Greg Kroah-Hartman --- drivers/thunderbolt/retimer.c |2 +- 1 fi

[PATCH 5.10 060/188] vdpa/mlx5: Fix suspend/resume index restoration

2021-04-12 Thread Greg Kroah-Hartman
-by: Eli Cohen Link: https://lore.kernel.org/r/20210408091047.4269-6-e...@nvidia.com Signed-off-by: Michael S. Tsirkin Acked-by: Jason Wang Signed-off-by: Greg Kroah-Hartman --- drivers/vdpa/mlx5/net/mlx5_vnet.c | 21 - 1 file changed, 8 insertions(+), 13 deletions(-) --- a/d

[PATCH 5.10 028/188] of: property: fw_devlink: do not link ".*,nr-gpios"

2021-04-12 Thread Greg Kroah-Hartman
off-by: Rob Herring Signed-off-by: Greg Kroah-Hartman --- drivers/of/property.c | 11 ++- 1 file changed, 10 insertions(+), 1 deletion(-) --- a/drivers/of/property.c +++ b/drivers/of/property.c @@ -1308,7 +1308,16 @@ DEFINE_SIMPLE_PROP(pinctrl7, "pinctrl-7" DEFINE_SIMPLE_PRO

[PATCH 5.10 072/188] thunderbolt: Fix off by one in tb_port_find_retimer()

2021-04-12 Thread Greg Kroah-Hartman
;) Cc: sta...@vger.kernel.org Signed-off-by: Dan Carpenter Signed-off-by: Mika Westerberg Signed-off-by: Greg Kroah-Hartman --- drivers/thunderbolt/retimer.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/thunderbolt/retimer.c +++ b/drivers/thunderbolt/retimer.c @@ -40

[PATCH 5.10 073/188] usbip: add sysfs_lock to synchronize sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
...@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/usbip_common.h |3 +++ drivers/usb/usbip/vhci_hcd.c |1 + drivers/usb/usbip/vhci_sysfs.c | 30 +- 3 files changed, 29 insertions(+), 5 deletions(-) --- a/drivers/usb/usbip

[PATCH 5.10 069/188] net-ipv6: bugfix - raw & sctp - switch to ipv6_can_nonlocal_bind()

2021-04-12 Thread Greg Kroah-Hartman
off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/raw.c |2 +- net/sctp/ipv6.c |7 +++ 2 files changed, 4 insertions(+), 5 deletions(-) --- a/net/ipv6/raw.c +++ b/net/ipv6/raw.c @@ -298,7 +298,7 @@ static int rawv6_bind(struct sock *sk, s */

[PATCH 5.10 074/188] usbip: stub-dev synchronize sysfs code paths

2021-04-12 Thread Greg Kroah-Hartman
Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/stub_dev.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) --- a/drivers/usb/usbip/stub_dev.c +++ b/drivers/usb/usbip/stub_dev.c @@ -63,6 +63,7 @@ static ssize_t usbip_sockfd_store(struct dev_info(dev

[PATCH 5.10 070/188] net: let skb_orphan_partial wake-up waiters.

2021-04-12 Thread Greg Kroah-Hartman
ewed-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/net/sock.h |9 + net/core/sock.c| 12 +++- 2 files changed, 12 insertions(+), 9 deletions(-) --- a/include/net/sock.h +++ b/include/net/sock.h @@ -2197,6 +2197,15 @@ stati

[PATCH 5.10 027/188] ethtool: fix incorrect datatype in set_eee ops

2021-04-12 Thread Greg Kroah-Hartman
") Cc: # 5.10.x Cc: Michal Kubecek Signed-off-by: Wong Vee Khee Reviewed-by: Jakub Kicinski Reviewed-by: Michal Kubecek Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ethtool/eee.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/net/ethtool/e

[PATCH 5.10 029/188] parisc: parisc-agp requires SBA IOMMU driver

2021-04-12 Thread Greg Kroah-Hartman
er Signed-off-by: Greg Kroah-Hartman --- drivers/char/agp/Kconfig |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/char/agp/Kconfig +++ b/drivers/char/agp/Kconfig @@ -125,7 +125,7 @@ config AGP_HP_ZX1 config AGP_PARISC tristate "HP Quicksilver AGP support&q

[PATCH 5.10 020/188] IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS

2021-04-12 Thread Greg Kroah-Hartman
ttps://lore.kernel.org/r/1617025700-31865-4-git-send-email-dennis.dalessan...@cornelisnetworks.com Cc: sta...@vger.kernel.org Signed-off-by: Mike Marciniszyn Signed-off-by: Dennis Dalessandro Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/h

[PATCH 5.10 058/188] i40e: Fix sparse error: uninitialized symbol ring

2021-04-12 Thread Greg Kroah-Hartman
: 44ea803e2fa7 ("i40e: introduce new dump desc XDP command") Signed-off-by: Aleksandr Loktionov Signed-off-by: Arkadiusz Kubalewski Tested-by: Dave Switzer Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/i40e/i40e_debugfs.c |3 +++ 1 file

[PATCH 5.10 024/188] nds32: flush_dcache_page: use page_mapping_file to avoid races with swapoff

2021-04-12 Thread Greg Kroah-Hartman
x races between swapoff and flush dcache") Signed-off-by: Mike Rapoport Reviewed-by: Matthew Wilcox (Oracle) Acked-by: Greentime Hu Cc: Huang Ying Cc: Nick Hu Cc: Vincent Chen Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- arch/n

[PATCH 5.10 025/188] ocfs2: fix deadlock between setattr and dio_end_io_write

2021-04-12 Thread Greg Kroah-Hartman
03654.3911-1-wen.gang.w...@oracle.com Signed-off-by: Wengang Wang Reviewed-by: Joseph Qi Cc: Mark Fasheh Cc: Joel Becker Cc: Junxiao Bi Cc: Changwei Ge Cc: Gang He Cc: Jun Piao Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/ocfs2/a

[PATCH 5.10 054/188] net: ensure mac header is set in virtio_net_hdr_to_skb()

2021-04-12 Thread Greg Kroah-Hartman
s Nemeth Cc: Willem de Bruijn Reported-by: syzbot Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/linux/virtio_net.h |2 ++ 1 file changed, 2 insertions(+) --- a/include/linux/virtio_net.h +++ b/include/linux/virtio_net.h @@ -62,6 +62,8 @@ static inline int v

[PATCH 5.10 055/188] virtio_net: Do not pull payload in skb->head

2021-04-12 Thread Greg Kroah-Hartman
ric Dumazet Cc: "Michael S. Tsirkin" Cc: Jason Wang Cc: virtualizat...@lists.linux-foundation.org Acked-by: Jason Wang Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/virtio_net.c | 10 +++--- include/linux/virtio_net.h | 14 +-

[PATCH 5.10 057/188] i40e: Fix sparse error: vsi->netdev could be null

2021-04-12 Thread Greg Kroah-Hartman
ki Tested-by: Dave Switzer Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/i40e/i40e_main.c |3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/drivers/net/ethernet/intel/i40e/i40e_main.c +++ b/drivers/net/ethernet/intel/i40e/i40e_main.c @@ -25

[PATCH 5.10 052/188] bpf, sockmap: Fix sk->prot unhash op reset

2021-04-12 Thread Greg Kroah-Hartman
abend Signed-off-by: Daniel Borkmann Link: https://lore.kernel.org/bpf/161731441904.68884.15593917809745631972.stgit@john-XPS-13-9370 Signed-off-by: Greg Kroah-Hartman --- include/linux/skmsg.h |7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/include/linux/skmsg.h +++ b/in

[PATCH 5.10 056/188] i40e: Fix sparse warning: missing error code err

2021-04-12 Thread Greg Kroah-Hartman
' Fixes: 4ff0ee1af0169 ("i40e: Introduce recovery mode support") Signed-off-by: Aleksandr Loktionov Signed-off-by: Arkadiusz Kubalewski Tested-by: Dave Switzer Signed-off-by: Tony Nguyen Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/i40e/i40e_main.c |8 ++

<    5   6   7   8   9   10   11   12   13   14   >