[PATCH 5.1 17/98] vxlan: Dont assume linear buffers in error handler

2019-06-20 Thread Greg Kroah-Hartman
From: Stefano Brivio [ Upstream commit 8399a6930d12f5965230f4ff058228a4cc80c0b9 ] In commit c3a43b9fec8a ("vxlan: ICMP error lookup handler") I wrongly assumed buffers from icmp_socket_deliver() would be linear. This is not the case: icmp_socket_deliver() only guarantees we have 8 bytes of linea

[PATCH 5.1 62/98] net: aquantia: fix LRO with FCS error

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit eaeb3b7494ba9159323814a8ce8af06a9277d99b ] Driver stops producing skbs on ring if a packet with FCS error was coalesced into LRO session. Ring gets hang forever. Thats a logical error in driver processing descriptors: When rx_stat indicates MAC Error, next pointer and eop flags

[PATCH 5.1 44/98] powerpc/powernv: Return for invalid IMC domain

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit b59bd3527fe3c1939340df558d7f9d568fc9f882 ] Currently init_imc_pmu() can fail either because we try to register an IMC unit with an invalid domain (i.e an IMC node not supported by the kernel) or something went wrong while registering a valid IMC unit. In both the cases kernel pro

[PATCH 5.1 58/98] net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE()

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 3e66b7cc50ef921121babc91487e1fb98af1ba6e ] Building with Clang reports the redundant use of MODULE_DEVICE_TABLE(): drivers/net/ethernet/dec/tulip/de4x5.c:2110:1: error: redefinition of '__mod_eisa__de4x5_eisa_ids_device_table' MODULE_DEVICE_TABLE(eisa, de4x5_eisa_ids); ^ ./incl

[PATCH 5.1 70/98] ia64: fix build errors by exporting paddr_to_nid()

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 9a626c4a6326da4433a0d4d4a8a7d1571caf1ed3 ] Fix build errors on ia64 when DISCONTIGMEM=y and NUMA=y by exporting paddr_to_nid(). Fixes these build errors: ERROR: "paddr_to_nid" [sound/core/snd-pcm.ko] undefined! ERROR: "paddr_to_nid" [net/sunrpc/sunrpc.ko] undefined! ERROR: "pad

[PATCH 5.1 66/98] perf data: Fix strncat may truncate build failure with recent gcc

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 97acec7df172cd1e450f81f5e293c0aa145a2797 ] This strncat() is safe because the buffer was allocated with zalloc(), however gcc doesn't know that. Since the string always has 4 non-null bytes, just use memcpy() here. CC /home/shawn/linux/tools/perf/util/data-convert-bt.o

[PATCH 5.1 64/98] ALSA: hda - Force polling mode on CNL for fixing codec communication

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit fa763f1b2858752e615046886a1b7faffc82 ] We observed the same issue as reported by commit a8d7bde23e7130686b7662 ("ALSA: hda - Force polling mode on CFL for fixing codec communication") We don't have a better solution. So apply the same workaround to CNL. Signed-off-by: Bard L

[PATCH 5.1 68/98] perf namespace: Protect reading threads namespace

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 6584140ba9e6762dd7ec73795243289b914f31f9 ] It seems that the current code lacks holding the namespace lock in thread__namespaces(). Otherwise it can see inconsistent results. Signed-off-by: Namhyung Kim Cc: Hari Bathini Cc: Jiri Olsa Cc: Krister Johansen Link: http://lkml.k

[PATCH 5.1 67/98] s390/zcrypt: Fix wrong dispatching for control domain CPRBs

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 7379e652797c0b9b5f6caea1576f2dff9ce6a708 ] The zcrypt device driver does not handle CPRBs which address a control domain correctly. This fix introduces a workaround: The domain field of the request CPRB is checked if there is a valid domain value in there. If this is true and the

[PATCH 5.1 69/98] perf record: Fix s390 missing module symbol and warning for non-root users

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 6738028dd57df064b969d8392c943ef3b3ae705d ] Command 'perf record' and 'perf report' on a system without kernel debuginfo packages uses /proc/kallsyms and /proc/modules to find addresses for kernel and module symbols. On x86 this works for root and non-root users. On s390, when in

[PATCH 5.1 48/98] perf/ring_buffer: Fix exposing a temporarily decreased data_head

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1b038c6e05ff70a1e66e3e571c2e6106bdb75f53 ] In perf_output_put_handle(), an IRQ/NMI can happen in below location and write records to the same ring buffer: ... local_dec_and_test(&rb->nest) ... <-- an IRQ/NMI can happen here

Re: [PATCH] pstore: no need to check return value of debugfs_create functions

2019-06-20 Thread Kees Cook
On Wed, Jun 12, 2019 at 05:20:33PM +0200, Greg Kroah-Hartman wrote: > When calling debugfs functions, there is no need to ever check the > return value. The function can work or not, but the code logic should > never do something different based on this. > > Cc: Kees Cook > Cc: Anton Vorontsov

[PATCH 5.1 47/98] x86/CPU/AMD: Dont force the CPB cap when running under a hypervisor

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 2ac44ab608705948564791ce1d15d43ba81a1e38 ] For F17h AMD CPUs, the CPB capability ('Core Performance Boost') is forcibly set, because some versions of that chip incorrectly report that they do not have it. However, a hypervisor may filter out the CPB capability, for good reasons

[PATCH 5.1 75/98] KVM: PPC: Book3S HV: Use new mutex to synchronize MMU setup

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 0d4ee88d92884c661fcafd5576da243aa943dc24 ] Currently the HV KVM code uses kvm->lock in conjunction with a flag, kvm->arch.mmu_ready, to synchronize MMU setup and hold off vcpu execution until the MMU-related data structures are ready. However, this means that kvm->lock is being

[PATCH 5.1 77/98] KVM: PPC: Book3S HV: Dont take kvm->lock around kvm_for_each_vcpu

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 5a3f49364c3ffa1107bd88f8292406e98c5d206c ] Currently the HV KVM code takes the kvm->lock around calls to kvm_for_each_vcpu() and kvm_get_vcpu_by_id() (which can call kvm_for_each_vcpu() internally). However, that leads to a lock order inversion problem, because these are called

[PATCH 5.1 50/98] perf/ring-buffer: Always use {READ,WRITE}_ONCE() for rb->user_page data

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 4d839dd9e4356bbacf3eb0ab13a549b83b008c21 ] We must use {READ,WRITE}_ONCE() on rb->user_page data such that concurrent usage will see whole values. A few key sites were missing this. Suggested-by: Yabin Cui Signed-off-by: Peter Zijlstra (Intel) Cc: Alexander Shishkin Cc: Arnal

[PATCH 5.1 51/98] gpio: fix gpio-adp5588 build errors

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit e9646f0f5bb62b7d43f0968f39d536cfe7123b53 ] The gpio-adp5588 driver uses interfaces that are provided by GPIOLIB_IRQCHIP, so select that symbol in its Kconfig entry. Fixes these build errors: ../drivers/gpio/gpio-adp5588.c: In function ‘adp5588_irq_handler’: ../drivers/gpio/gpio

[PATCH 5.1 52/98] net: stmmac: update rx tail pointer register to fix rx dma hang issue.

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 4523a5611526709ec9b4e2574f1bb7818212651e ] Currently we will not update the receive descriptor tail pointer in stmmac_rx_refill. Rx dma will think no available descriptors and stop once received packets exceed DMA_RX_SIZE, so that the rx only test will fail. Update the receive t

[PATCH 5.1 45/98] usb: xhci: Fix a potential null pointer dereference in xhci_debugfs_create_endpoint()

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 5bce256f0b528624a34fe907db385133bb7be33e ] In xhci_debugfs_create_slot(), kzalloc() can fail and dev->debugfs_private will be NULL. In xhci_debugfs_create_endpoint(), dev->debugfs_private is used without any null-pointer check, and can cause a null pointer dereference. To fix th

[PATCH 5.1 96/98] nvme-tcp: fix possible null deref on a timed out io queue connect

2019-06-20 Thread Greg Kroah-Hartman
From: Sagi Grimberg commit f34e25898a608380a60135288019c4cb6013bec8 upstream. If I/O queue connect times out, we might have freed the queue socket already, so check for that on the error path in nvme_tcp_start_queue. Signed-off-by: Sagi Grimberg Signed-off-by: Christoph Hellwig Signed-off-by:

[PATCH 5.1 93/98] ocfs2: fix error path kobject memory leak

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit b9fba67b3806e21b98bd5a98dc3921a8e9b42d61 ] If a call to kobject_init_and_add() fails we should call kobject_put() otherwise we leak memory. Add call to kobject_put() in the error path of call to kobject_init_and_add(). Please note, this has the side effect that the release meth

[PATCH 5.1 87/98] net: phy: dp83867: Set up RGMII TX delay

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 2b892649254fec01678c64f16427622b41fa27f4 ] PHY_INTERFACE_MODE_RGMII_RXID is less then TXID so code to set tx delay is never called. Fixes: 2a10154abcb75 ("net: phy: dp83867: Add TI dp83867 phy") Signed-off-by: Max Uvarov Cc: Florian Fainelli Reviewed-by: Florian Fainelli Sign

[PATCH 5.1 86/98] net: phy: dp83867: increase SGMII autoneg timer duration

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1a97a477e666cbdededab93bd3754e508f0c09d7 ] After reset SGMII Autoneg timer is set to 2us (bits 6 and 5 are 01). That is not enough to finalize autonegatiation on some devices. Increase this timer duration to maximum supported 16ms. Signed-off-by: Max Uvarov Cc: Heiner Kallweit

[PATCH 5.1 88/98] scsi: libcxgbi: add a check for NULL pointer in cxgbi_check_route()

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit cc555759117e8349088e0c5d19f2f2a500bafdbd ] ip_dev_find() can return NULL so add a check for NULL pointer. Signed-off-by: Varun Prakash Signed-off-by: Martin K. Petersen Signed-off-by: Sasha Levin --- drivers/scsi/cxgbi/libcxgbi.c | 4 1 file changed, 4 insertions(+) di

[PATCH 5.1 78/98] ALSA: fireface: Use ULL suffixes for 64-bit constants

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 6954158a16404e7091cea494cd0a435ca2f90388 ] With gcc 4.1: sound/firewire/fireface/ff-protocol-latter.c: In function ‘latter_switch_fetching_mode’: sound/firewire/fireface/ff-protocol-latter.c:97: warning: integer constant is too large for ‘long’ type sound/firewire/

[PATCH 5.1 82/98] net: sh_eth: fix mdio access in sh_eth_close() for R-Car Gen2 and RZ/A1 SoCs

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 315ca92dd863fecbffc0bb52ae0ac11e0398726a ] The sh_eth_close() resets the MAC and then calls phy_stop() so that mdio read access result is incorrect without any error according to kernel trace like below: ifconfig-216 [003] .n.. 109.133124: mdio_access: ee70.ethernet-

[PATCH 5.1 81/98] arm64: use the correct function type for __arm64_sys_ni_syscall

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1e29ab3186e33c77dbb2d7566172a205b59fa390 ] Calling sys_ni_syscall through a syscall_fn_t pointer trips indirect call Control-Flow Integrity checking due to a function type mismatch. Use SYSCALL_DEFINE0 for __arm64_sys_ni_syscall instead and remove the now unnecessary casts. Sign

[PATCH 5.1 89/98] scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1d94f06e7f5df4064ef336b7b710f50143b64a53 ] When SME is enabled, the smartpqi driver won't work on the HP DL385 G10 machine, which causes the failure of kernel boot because it fails to allocate pqi error buffer. Please refer to the kernel log: [9.431749] usbcore: register

[PATCH 5.1 79/98] arm64: fix syscall_fn_t type

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 8ef8f368ce72b5e17f7c1f1ef15c38dcfd0fef64 ] Syscall wrappers in use const struct pt_regs * as the argument type. Use const in syscall_fn_t as well to fix indirect call type mismatches with Control-Flow Integrity checking. Signed-off-by: Sami Tolvanen Reviewed-by: Mark Rutland

[PATCH 5.1 90/98] scsi: scsi_dh_alua: Fix possible null-ptr-deref

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 12e750bc62044de096ab9a95201213fd912b9994 ] If alloc_workqueue fails in alua_init, it should return -ENOMEM, otherwise it will trigger null-ptr-deref while unloading module which calls destroy_workqueue dereference wq->lock like this: BUG: KASAN: null-ptr-deref in __lock_acquire+

[PATCH 5.1 91/98] scsi: libsas: delete sas port if expander discover failed

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 3b0541791453fbe7f42867e310e0c9eb6295364d ] The sas_port(phy->port) allocated in sas_ex_discover_expander() will not be deleted when the expander failed to discover. This will cause resource leak and a further issue of kernel BUG like below: [159785.843156] port-2:17:29: trying

[PATCH 5.1 85/98] net: phy: dp83867: fix speed 10 in sgmii mode

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 333061b924539c0de081339643f45514f5f1c1e6 ] For supporting 10Mps speed in SGMII mode DP83867_10M_SGMII_RATE_ADAPT bit of DP83867_10M_SGMII_CFG register has to be cleared by software. That does not affect speeds 100 and 1000 so can be done on init. Signed-off-by: Max Uvarov Cc: H

[PATCH 5.1 84/98] net: phylink: ensure consistent phy interface mode

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit c678726305b9425454be7c8a7624290b602602fc ] Ensure that we supply the same phy interface mode to mac_link_down() as we did for the corresponding mac_link_up() call. This ensures that MAC drivers that use the phy interface mode in these methods can depend on mac_link_down() always

[PATCH 5.1 92/98] mlxsw: spectrum: Prevent force of 56G

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 275e928f19117d22f6d26dee94548baf4041b773 ] Force of 56G is not supported by hardware in Ethernet devices. This configuration fails with a bad parameter error from firmware. Add check of this case. Instead of trying to set 56G with autoneg off, return a meaningful error. Fixes:

[PATCH 5.1 98/98] coredump: fix race condition between collapse_huge_page() and core dumping

2019-06-20 Thread Greg Kroah-Hartman
From: Andrea Arcangeli commit 59ea6d06cfa9247b586a695c21f94afa7183af74 upstream. When fixing the race conditions between the coredump and the mmap_sem holders outside the context of the process, we focused on mmget_not_zero()/get_task_mm() callers in 04f5866e41fb70 ("coredump: fix race condition

[PATCH 5.1 80/98] arm64: use the correct function type in SYSCALL_DEFINE0

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 0e358bd7b7ebd27e491dabed938eae254c17fe3b ] Although a syscall defined using SYSCALL_DEFINE0 doesn't accept parameters, use the correct function type to avoid indirect call type mismatches with Control-Flow Integrity checking. Signed-off-by: Sami Tolvanen Signed-off-by: Will Dea

[PATCH 5.1 83/98] blk-mq: Fix memory leak in error handling

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 41de54c64811bf087c8464fdeb43c6ad8be2686b ] If blk_mq_init_allocated_queue() fails, make sure to free the poll stat callback struct allocated. Signed-off-by: Jes Sorensen Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- block/blk-mq.c | 5 - 1 file changed, 4 inse

[PATCH 5.1 76/98] KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1659e27d2bc1ef47b6d031abe01b467f18cb72d9 ] Currently the Book 3S KVM code uses kvm->lock to synchronize access to the kvm->arch.rtas_tokens list. Because this list is scanned inside kvmppc_rtas_hcall(), which is called with the vcpu mutex held, taking kvm->lock cause a lock inve

[PATCH 5.1 57/98] dpaa2-eth: Use PTR_ERR_OR_ZERO where appropriate

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit bd8460fa4de46e9d6177af4fe33bf0763a7af4b7 ] Use PTR_ERR_OR_ZERO instead of PTR_ERR in cases where zero is a valid input. Reported by smatch. Signed-off-by: Ioana Radulescu Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/freescale/dpaa2/dpaa2

[PATCH 5.1 65/98] configfs: Fix use-after-free when accessing sd->s_dentry

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit f6122ed2a4f9c9c1c073ddf6308d1b2ac10e0781 ] In the vfs_statx() context, during path lookup, the dentry gets added to sd->s_dentry via configfs_attach_attr(). In the end, vfs_statx() kills the dentry by calling path_put(), which invokes configfs_d_iput(). Ideally, this dentry must

[PATCH 5.1 60/98] drm/etnaviv: lock MMU while dumping core

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1396500d673bd027683a0609ff84dca7eb6ea2e7 ] The devcoredump needs to operate on a stable state of the MMU while it is writing the MMU state to the coredump. The missing lock allowed both the userspace submit, as well as the GPU job finish paths to mutate the MMU state while a core

[PATCH 5.1 53/98] net: stmmac: fix csr_clk cant be zero issue

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 5e7f7fc538d894b2d9aa41876b8dcf35f5fe11e6 ] The specific clk_csr value can be zero, and stmmac_clk is necessary for MDC clock which can be set dynamically. So, change the condition from plat->clk_csr to plat->stmmac_clk to fix clk_csr can't be zero issue. Fixes: cd7201f477b9 ("st

[PATCH 5.1 72/98] xen/pvcalls: Remove set but not used variable

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 41349672e3cbc2e8349831f21253509c3415aa2b ] Fixes gcc '-Wunused-but-set-variable' warning: drivers/xen/pvcalls-front.c: In function pvcalls_front_sendmsg: drivers/xen/pvcalls-front.c:543:25: warning: variable bedata set but not used [-Wunused-but-set-variable] drivers/xen/pvcall

[PATCH 5.1 94/98] mm: mmu_gather: remove __tlb_reset_range() for force flush

2019-06-20 Thread Greg Kroah-Hartman
From: Yang Shi commit 7a30df49f63ad92318ddf1f7498d1129a77dd4bd upstream. A few new fields were added to mmu_gather to make TLB flush smarter for huge page by telling what level of page table is changed. __tlb_reset_range() is used to reset all these page table state to unchanged, which is calle

[PATCH 5.1 73/98] xenbus: Avoid deadlock during suspend due to open transactions

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit d10e0cc113c9e1b64b5c6e3db37b5c839794f3df ] During a suspend/resume, the xenwatch thread waits for all outstanding xenstore requests and transactions to complete. This does not work correctly for transactions started by userspace because it waits for them to complete after freezin

[PATCH 5.1 71/98] dpaa_eth: use only online CPU portals

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 7aae703f8096d21e34ce5f34f16715587bc30902 ] Make sure only the portals for the online CPUs are used. Without this change, there are issues when someone boots with maxcpus=n, with n < actual number of cores available as frames either received or corresponding to the transmit confir

[PATCH 5.1 54/98] net: stmmac: dwmac-mediatek: modify csr_clk value to fix mdio read/write fail

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit f4ca7a9260dfe700f2a16f0881825de625067515 ] 1. the frequency of csr clock is 66.5MHz, so the csr_clk value should be 0 other than 5. 2. the csr_clk can be got from device tree, so remove initialization here. Fixes: 9992f37e346b ("stmmac: dwmac-mediatek: add support for mt2712") S

[PATCH 5.1 74/98] dfs_cache: fix a wrong use of kfree in flush_cache_ent()

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 50fbc13dc12666f3604dc2555a47fc8c4e29162b ] In flush_cache_ent(), 'ce->ce_path' is allocated by kstrdup_const(). It should be freed by kfree_const(), rather than kfree(). Signed-off-by: Gen Zhang Reviewed-by: Paulo Alcantara Signed-off-by: Steve French Signed-off-by: Sasha Lev

[PATCH 5.1 56/98] dpaa2-eth: Fix potential spectre issue

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 5a20a093d965560f632b2ec325f8876918f78165 ] Smatch reports a potential spectre vulnerability in the dpaa2-eth driver, where the value of rxnfc->fs.location (which is provided from user-space) is used as index in an array. Add a call to array_index_nospec() to sanitize the access.

Re: [PATCH] mips: Remove q-accessors from non-64bit platforms

2019-06-20 Thread Maciej W. Rozycki
On Thu, 20 Jun 2019, Paul Burton wrote: > So this seems pretty reasonable. Build testing all our defconfigs only > showed up one issue for decstation_defconfig & decstation_r4k_defconfig: > > drivers/net/fddi/defza.c: In function 'fza_reads': > drivers/net/fddi/defza.c:88:17: error: implicit

[PATCH 5.1 95/98] nvme-tcp: rename function to have nvme_tcp prefix

2019-06-20 Thread Greg Kroah-Hartman
From: Sagi Grimberg commit efb973b19b88642bb7e08b8ce8e03b0bbd2a7e2a upstream. usually nvme_ prefix is for core functions. While we're cleaning up, remove redundant empty lines Signed-off-by: Sagi Grimberg Reviewed-by: Minwoo Im Signed-off-by: Christoph Hellwig Signed-off-by: Greg Kroah-Hartm

[PATCH 5.1 49/98] perf/ring_buffer: Add ordering to rb->nest increment

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 3f9fbe9bd86c534eba2faf5d840fd44c6049f50e ] Similar to how decrementing rb->next too early can cause data_head to (temporarily) be observed to go backward, so too can this happen when we increment too late. This barrier() ensures the rb->head load happens after the increment, bot

[PATCH 5.1 21/98] net: dsa: microchip: Dont try to read stats for unused ports

2019-06-20 Thread Greg Kroah-Hartman
From: Robert Hancock [ Upstream commit 6bb9e376c2a4cc5120c3bf5fd3048b9a0a6ec1f8 ] If some of the switch ports were not listed in the device tree, due to being unused, the ksz_mib_read_work function ended up accessing a NULL dp->slave pointer and causing an oops. Skip checking statistics for any

[PATCH 5.1 18/98] geneve: Dont assume linear buffers in error handler

2019-06-20 Thread Greg Kroah-Hartman
From: Stefano Brivio [ Upstream commit eccc73a6b2cb6c04bfbc40a0769f3c428dfba232 ] In commit a07966447f39 ("geneve: ICMP error lookup handler") I wrongly assumed buffers from icmp_socket_deliver() would be linear. This is not the case: icmp_socket_deliver() only guarantees we have 8 bytes of line

[PATCH 5.1 19/98] net: mvpp2: prs: Fix parser range for VID filtering

2019-06-20 Thread Greg Kroah-Hartman
From: Maxime Chevallier [ Upstream commit 46b0090a6636cf34c0e856f15dd03e15ba4cdda6 ] VID filtering is implemented in the Header Parser, with one range of 11 vids being assigned for each no-loopback port. Make sure we use the per-port range when looking for existing entries in the Parser. Since

[PATCH 5.1 46/98] mISDN: make sure device name is NUL terminated

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit ccfb62f27beb295103e9392462b20a6ed807d0ea ] The user can change the device_name with the IMSETDEVNAME ioctl, but we need to ensure that the user's name is NUL terminated. Otherwise it could result in a buffer overflow when we copy the name back to the user with IMGETDEVINFO ioctl

[PATCH 5.1 40/98] netfilter: nft_fib: Fix existence check support

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit e633508a95289489d28faacb68b32c3e7e68ef6f ] NFTA_FIB_F_PRESENT flag was not always honored since eval functions did not call nft_fib_store_result in all cases. Given that in all callsites there is a struct net_device pointer available which holds the interface data to be stored i

[PATCH 5.1 16/98] net/mlx5: Avoid reloading already removed devices

2019-06-20 Thread Greg Kroah-Hartman
From: Alaa Hleihel Prior to reloading a device we must first verify that it was not already removed. Otherwise, the attempt to remove the device will do nothing, and in that case we will end up proceeding with adding an new device that no one was expecting to remove, leaving behind used resources

[PATCH 5.1 31/98] net/mlx5e: Avoid detaching non-existing netdev under switchdev mode

2019-06-20 Thread Greg Kroah-Hartman
From: Alaa Hleihel After introducing dedicated uplink representor, the netdev instance set over the esw manager vport (PF) became no longer in use, so it was removed in the cited commit once we're on switchdev mode. However, the mlx5e_detach function was not updated accordingly, and it still trie

[PATCH 5.1 32/98] iio: imu: mpu6050: Fix FIFO layout for ICM20602

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1615fe41a1959a2ee2814ba62736b2bb54e9802a ] The MPU6050 driver has recently gained support for the ICM20602 IMU, which is very similar to MPU6xxx. However, the ICM20602's FIFO data specifically includes temperature readings, which were not present on MPU6xxx parts. As a result, th

[PATCH 5.1 43/98] clk: ti: clkctrl: Fix clkdm_clk handling

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1cc54078d104f5b4d7e9f8d55362efa5a8daffdb ] We need to always call clkdm_clk_enable() and clkdm_clk_disable() even the clkctrl clock(s) enabled for the domain do not have any gate register bits. Otherwise clockdomains may never get enabled except when devices get probed with the l

[PATCH 5.1 39/98] netfilter: nf_queue: fix reinject verdict handling

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 946c0d8e6ed43dae6527e878d0077c1e11015db0 ] This patch fixes netfilter hook traversal when there are more than 1 hooks returning NF_QUEUE verdict. When the first queue reinjects the packet, 'nf_reinject' starts traversing hooks with a proper hook_index. However, if it again receiv

[PATCH 5.1 00/98] 5.1.13-stable review

2019-06-20 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.1.13 release. There are 98 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat 22 Jun 2019 05:42:15 PM UTC. Anything rece

[PATCH 5.1 14/98] tipc: purge deferredq list for each grp member in tipc_group_delete

2019-06-20 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 5cf02612b33f104fe1015b2dfaf1758ad3675588 ] Syzbot reported a memleak caused by grp members' deferredq list not purged when the grp is be deleted. The issue occurs when more(msg_grp_bc_seqno(hdr), m->bc_rcv_nxt) in tipc_group_filter_msg() and the skb will stay in

[PATCH 5.1 23/98] net/mlx5: Update pci error handler entries and command translation

2019-06-20 Thread Greg Kroah-Hartman
From: Edward Srouji Add missing entries for create/destroy UCTX and UMEM commands. This could get us wrong "unknown FW command" error in flows where we unbind the device or reset the driver. Also the translation of these commands from opcodes to string was missing. Fixes: 6e3722baac04 ("IB/mlx5

[PATCH 5.1 08/98] net: dsa: rtl8366: Fix up VLAN filtering

2019-06-20 Thread Greg Kroah-Hartman
From: Linus Walleij [ Upstream commit 760c80b70bed2cd01630e8595d1bbde910339f31 ] We get this regression when using RTL8366RB as part of a bridge with OpenWrt: WARNING: CPU: 0 PID: 1347 at net/switchdev/switchdev.c:291 switchdev_port_attr_set_now+0x80/0xa4 lan0: Commit of attribute (id=

[PATCH 5.1 24/98] mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead

2019-06-20 Thread Greg Kroah-Hartman
From: Ido Schimmel The driver tries to periodically refresh neighbours that are used to reach nexthops. This is done by periodically calling neigh_event_send(). However, if the neighbour becomes dead, there is nothing we can do to return it to a connected state and the above function call is bas

[PATCH 5.1 03/98] be2net: Fix number of Rx queues used for flow hashing

2019-06-20 Thread Greg Kroah-Hartman
From: Ivan Vecera [ Upstream commit 718f4a2537089ea41903bf357071306163bc7c04 ] Number of Rx queues used for flow hashing returned by the driver is incorrect and this bug prevents user to use the last Rx queue in indirection table. Let's say we have a NIC with 6 combined queues: [root@sm-03 ~]#

[PATCH 5.1 06/98] lapb: fixed leak of control-blocks.

2019-06-20 Thread Greg Kroah-Hartman
From: Jeremy Sowden [ Upstream commit 6be8e297f9bcea666ea85ac7a6cd9d52d6deaf92 ] lapb_register calls lapb_create_cb, which initializes the control- block's ref-count to one, and __lapb_insert_cb, which increments it when adding the new block to the list of blocks. lapb_unregister calls __lapb_r

[PATCH 5.1 11/98] nfc: Ensure presence of required attributes in the deactivate_target handler

2019-06-20 Thread Greg Kroah-Hartman
From: Young Xiao <92siuy...@gmail.com> [ Upstream commit 385097a3675749cbc9e97c085c0e5dfe4269ca51 ] Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to accessing them. This prevents potential unhandled NULL pointer der

[PATCH 4.19 45/61] xenbus: Avoid deadlock during suspend due to open transactions

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit d10e0cc113c9e1b64b5c6e3db37b5c839794f3df ] During a suspend/resume, the xenwatch thread waits for all outstanding xenstore requests and transactions to complete. This does not work correctly for transactions started by userspace because it waits for them to complete after freezin

[PATCH 4.19 47/61] KVM: PPC: Book3S HV: Dont take kvm->lock around kvm_for_each_vcpu

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 5a3f49364c3ffa1107bd88f8292406e98c5d206c ] Currently the HV KVM code takes the kvm->lock around calls to kvm_for_each_vcpu() and kvm_get_vcpu_by_id() (which can call kvm_for_each_vcpu() internally). However, that leads to a lock order inversion problem, because these are called

[PATCH 5.1 01/98] netfilter: nat: fix udp checksum corruption

2019-06-20 Thread Greg Kroah-Hartman
From: Florian Westphal commit 6bac76db1da3cb162c425d58ae421486f8e43955 upstream. Due to copy&paste error nf_nat_mangle_udp_packet passes IPPROTO_TCP, resulting in incorrect udp checksum when payload had to be mangled. Fixes: dac3fe72596f9 ("netfilter: nat: remove csum_recalc hook") Reported-by:

[PATCH 4.19 55/61] scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1d94f06e7f5df4064ef336b7b710f50143b64a53 ] When SME is enabled, the smartpqi driver won't work on the HP DL385 G10 machine, which causes the failure of kernel boot because it fails to allocate pqi error buffer. Please refer to the kernel log: [9.431749] usbcore: register

[PATCH 4.19 15/61] net: mvpp2: prs: Fix parser range for VID filtering

2019-06-20 Thread Greg Kroah-Hartman
From: Maxime Chevallier [ Upstream commit 46b0090a6636cf34c0e856f15dd03e15ba4cdda6 ] VID filtering is implemented in the Header Parser, with one range of 11 vids being assigned for each no-loopback port. Make sure we use the per-port range when looking for existing entries in the Parser. Since

[PATCH 4.19 57/61] scsi: libsas: delete sas port if expander discover failed

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 3b0541791453fbe7f42867e310e0c9eb6295364d ] The sas_port(phy->port) allocated in sas_ex_discover_expander() will not be deleted when the expander failed to discover. This will cause resource leak and a further issue of kernel BUG like below: [159785.843156] port-2:17:29: trying

[PATCH 4.19 58/61] mlxsw: spectrum: Prevent force of 56G

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 275e928f19117d22f6d26dee94548baf4041b773 ] Force of 56G is not supported by hardware in Ethernet devices. This configuration fails with a bad parameter error from firmware. Add check of this case. Instead of trying to set 56G with autoneg off, return a meaningful error. Fixes:

[PATCH 4.19 50/61] arm64: use the correct function type for __arm64_sys_ni_syscall

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 1e29ab3186e33c77dbb2d7566172a205b59fa390 ] Calling sys_ni_syscall through a syscall_fn_t pointer trips indirect call Control-Flow Integrity checking due to a function type mismatch. Use SYSCALL_DEFINE0 for __arm64_sys_ni_syscall instead and remove the now unnecessary casts. Sign

[PATCH] Revert "ARM: dts: rockchip: add startup delay to rk3288-veyron panel-regulators"

2019-06-20 Thread Douglas Anderson
This reverts commit 1f45e8c6d0161f044d679f242fe7514e2625af4a. This 100 ms mystery delay is not on downstream kernels and no longer seems needed on upstream kernels either [1]. Presumably something in the meantime has made things better. A few possibilities for patches that have landed in the mea

[PATCH 4.19 60/61] coredump: fix race condition between collapse_huge_page() and core dumping

2019-06-20 Thread Greg Kroah-Hartman
From: Andrea Arcangeli commit 59ea6d06cfa9247b586a695c21f94afa7183af74 upstream. When fixing the race conditions between the coredump and the mmap_sem holders outside the context of the process, we focused on mmget_not_zero()/get_task_mm() callers in 04f5866e41fb70 ("coredump: fix race condition

[PATCH 4.19 59/61] ocfs2: fix error path kobject memory leak

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit b9fba67b3806e21b98bd5a98dc3921a8e9b42d61 ] If a call to kobject_init_and_add() fails we should call kobject_put() otherwise we leak memory. Add call to kobject_put() in the error path of call to kobject_init_and_add(). Please note, this has the side effect that the release meth

[PATCH 4.19 53/61] net: phy: dp83867: Set up RGMII TX delay

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 2b892649254fec01678c64f16427622b41fa27f4 ] PHY_INTERFACE_MODE_RGMII_RXID is less then TXID so code to set tx delay is never called. Fixes: 2a10154abcb75 ("net: phy: dp83867: Add TI dp83867 phy") Signed-off-by: Max Uvarov Cc: Florian Fainelli Reviewed-by: Florian Fainelli Sign

[PATCH 4.19 09/61] nfc: Ensure presence of required attributes in the deactivate_target handler

2019-06-20 Thread Greg Kroah-Hartman
From: Young Xiao <92siuy...@gmail.com> [ Upstream commit 385097a3675749cbc9e97c085c0e5dfe4269ca51 ] Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to accessing them. This prevents potential unhandled NULL pointer der

[PATCH 4.14 26/45] ALSA: hda - Force polling mode on CNL for fixing codec communication

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit fa763f1b2858752e615046886a1b7faffc82 ] We observed the same issue as reported by commit a8d7bde23e7130686b7662 ("ALSA: hda - Force polling mode on CFL for fixing codec communication") We don't have a better solution. So apply the same workaround to CNL. Signed-off-by: Bard L

[PATCH 4.19 19/61] netfilter: nf_queue: fix reinject verdict handling

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 946c0d8e6ed43dae6527e878d0077c1e11015db0 ] This patch fixes netfilter hook traversal when there are more than 1 hooks returning NF_QUEUE verdict. When the first queue reinjects the packet, 'nf_reinject' starts traversing hooks with a proper hook_index. However, if it again receiv

[PATCH 4.14 30/45] ia64: fix build errors by exporting paddr_to_nid()

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 9a626c4a6326da4433a0d4d4a8a7d1571caf1ed3 ] Fix build errors on ia64 when DISCONTIGMEM=y and NUMA=y by exporting paddr_to_nid(). Fixes these build errors: ERROR: "paddr_to_nid" [sound/core/snd-pcm.ko] undefined! ERROR: "paddr_to_nid" [net/sunrpc/sunrpc.ko] undefined! ERROR: "pad

[PATCH 4.19 33/61] ACPI/PCI: PM: Add missing wakeup.flags.valid checks

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit 9a51c6b1f9e0239a9435db036b212498a2a3b75c ] Both acpi_pci_need_resume() and acpi_dev_needs_resume() check if the current ACPI wakeup configuration of the device matches what is expected as far as system wakeup from sleep states is concerned, as reflected by the device_may_wakeup()

[PATCH 4.19 12/61] tipc: purge deferredq list for each grp member in tipc_group_delete

2019-06-20 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 5cf02612b33f104fe1015b2dfaf1758ad3675588 ] Syzbot reported a memleak caused by grp members' deferredq list not purged when the grp is be deleted. The issue occurs when more(msg_grp_bc_seqno(hdr), m->bc_rcv_nxt) in tipc_group_filter_msg() and the skb will stay in

[PATCH 4.19 14/61] net/mlx5: Avoid reloading already removed devices

2019-06-20 Thread Greg Kroah-Hartman
From: Alaa Hleihel Prior to reloading a device we must first verify that it was not already removed. Otherwise, the attempt to remove the device will do nothing, and in that case we will end up proceeding with adding an new device that no one was expecting to remove, leaving behind used resources

[PATCH 4.19 03/61] hv_netvsc: Set probe mode to sync

2019-06-20 Thread Greg Kroah-Hartman
From: Haiyang Zhang [ Upstream commit 9a33629ba6b26caebd73e3c581ba1e6068c696a7 ] For better consistency of synthetic NIC names, we set the probe mode to PROBE_FORCE_SYNCHRONOUS. So the names can be aligned with the vmbus channel offer sequence. Fixes: af0a5646cb8d ("use the new async probing fe

Re: [PATCH v2 01/22] ABI: sysfs-bus-pci-devices-aer_stats uses an invalid tag

2019-06-20 Thread Bjorn Helgaas
On Thu, Jun 20, 2019 at 12:23 PM Mauro Carvalho Chehab wrote: > > According with Documentation/ABI/, the right tag to describe > an ABI symbol is "What:", and not "Where:". > > Signed-off-by: Mauro Carvalho Chehab Acked-by: Bjorn Helgaas I assume somebody else will merge this series as a whole

[PATCH 4.19 30/61] gpio: fix gpio-adp5588 build errors

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit e9646f0f5bb62b7d43f0968f39d536cfe7123b53 ] The gpio-adp5588 driver uses interfaces that are provided by GPIOLIB_IRQCHIP, so select that symbol in its Kconfig entry. Fixes these build errors: ../drivers/gpio/gpio-adp5588.c: In function ‘adp5588_irq_handler’: ../drivers/gpio/gpio

[PATCH 4.19 16/61] net: mvpp2: prs: Use the correct helpers when removing all VID filters

2019-06-20 Thread Greg Kroah-Hartman
From: Maxime Chevallier [ Upstream commit 6b7a3430c163455cf8a514d636bda52b04654972 ] When removing all VID filters, the mvpp2_prs_vid_entry_remove would be called with the TCAM id incorrectly used as a VID, causing the wrong TCAM entries to be invalidated. Fix this by directly invalidating entr

[PATCH 4.14 35/45] scsi: libcxgbi: add a check for NULL pointer in cxgbi_check_route()

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit cc555759117e8349088e0c5d19f2f2a500bafdbd ] ip_dev_find() can return NULL so add a check for NULL pointer. Signed-off-by: Varun Prakash Signed-off-by: Martin K. Petersen Signed-off-by: Sasha Levin --- drivers/scsi/cxgbi/libcxgbi.c | 4 1 file changed, 4 insertions(+) di

[PATCH 4.19 36/61] net: aquantia: fix LRO with FCS error

2019-06-20 Thread Greg Kroah-Hartman
[ Upstream commit eaeb3b7494ba9159323814a8ce8af06a9277d99b ] Driver stops producing skbs on ring if a packet with FCS error was coalesced into LRO session. Ring gets hang forever. Thats a logical error in driver processing descriptors: When rx_stat indicates MAC Error, next pointer and eop flags

[PATCH 4.14 42/45] HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact

2019-06-20 Thread Greg Kroah-Hartman
From: Jason Gerecke commit fe7f8d73d1af19b678171170e4e5384deb57833d upstream. The Bluetooth reports from the 2nd-gen Intuos Pro have separate bits for indicating if the tip or eraser is in contact with the tablet. At the moment, only the tip contact bit controls the state of the BTN_TOUCH event.

[PATCH 4.14 40/45] HID: wacom: Dont set tool type until were in range

2019-06-20 Thread Greg Kroah-Hartman
From: Jason Gerecke commit 2cc08800a6b9fcda7c7afbcf2da1a6e8808da725 upstream. The serial number and tool type information that is reported by the tablet while a pen is merely "in prox" instead of fully "in range" can be stale and cause us to report incorrect tool information. Serial number, tool

[PATCH v2 1/3] net: fddi: skfp: Rename PCI_REV_ID to PCI_REVISION_ID

2019-06-20 Thread Puranjay Mohan
Rename the PCI_REV_ID define to PCI_REVISION_ID in skfbi.h and drvfbi.c to make it compatible with the pci_regs.h which defines it as PCI_REVISION_ID. Signed-off-by: Puranjay Mohan --- drivers/net/fddi/skfp/drvfbi.c | 2 +- drivers/net/fddi/skfp/h/skfbi.h | 2 +- 2 files changed, 2 insertions(+

[PATCH v2 2/3] net: fddi: skfp: Include generic PCI definitions

2019-06-20 Thread Puranjay Mohan
Include the uapi/linux/pci_regs.h header file which contains the generic PCI defines. Signed-off-by: Puranjay Mohan --- drivers/net/fddi/skfp/drvfbi.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/fddi/skfp/drvfbi.c b/drivers/net/fddi/skfp/drvfbi.c index b324c1a

[PATCH 4.14 07/45] net: openvswitch: do not free vport if register_netdevice() is failed.

2019-06-20 Thread Greg Kroah-Hartman
From: Taehee Yoo [ Upstream commit 309b66970ee2abf721ecd0876a48940fa0b99a35 ] In order to create an internal vport, internal_dev_create() is used and that calls register_netdevice() internally. If register_netdevice() fails, it calls dev->priv_destructor() to free private data of netdev. actuall

<    4   5   6   7   8   9   10   11   12   13   >