[PATCH 4.19 35/79] netfilter: xt_nfacct: Fix alignment mismatch in xt_nfacct_match_info

2019-09-19 Thread Greg Kroah-Hartman
From: Juliana Rodrigueiro [ Upstream commit 89a26cd4b501e9511d3cd3d22327fc76a75a38b3 ] When running a 64-bit kernel with a 32-bit iptables binary, the size of the xt_nfacct_match_info struct diverges. kernel: sizeof(struct xt_nfacct_match_info) : 40 iptables: sizeof(struct xt_nfacct_mat

[PATCH 4.19 33/79] netfilter: ebtables: Fix argument order to ADD_COUNTER

2019-09-19 Thread Greg Kroah-Hartman
From: Todd Seidelmann [ Upstream commit f20faa06d83de440bec8e200870784c3458793c4 ] The ordering of arguments to the x_tables ADD_COUNTER macro appears to be wrong in ebtables (cf. ip_tables.c, ip6_tables.c, and arp_tables.c). This causes data corruption in the ebtables userspace tools because t

[PATCH 4.19 59/79] perf/x86/intel: Restrict period on Nehalem

2019-09-19 Thread Greg Kroah-Hartman
From: Josh Hunt [ Upstream commit 44d3bbb6f5e501b873218142fe08cdf62a4ac1f3 ] We see our Nehalem machines reporting 'perfevents: irq loop stuck!' in some cases when using perf: perfevents: irq loop stuck! WARNING: CPU: 0 PID: 3485 at arch/x86/events/intel/core.c:2282 intel_pmu_handle_irq+0x37b/

[PATCH 4.19 54/79] usb: host: xhci-tegra: Set DMA mask correctly

2019-09-19 Thread Greg Kroah-Hartman
From: Nagarjuna Kristam [ Upstream commit 993cc8753453fccfe060a535bbe21fcf1001b626 ] The Falcon microcontroller that runs the XUSB firmware and which is responsible for exposing the XHCI interface can address only 40 bits of memory. Typically that's not a problem because Tegra devices don't have

[PATCH 4.19 40/79] xdp: unpin xdp umem pages in error path

2019-09-19 Thread Greg Kroah-Hartman
From: Ivan Khoronzhuk [ Upstream commit fb89c39455e4b49881c5a42761bd71f03d3ef888 ] Fix mem leak caused by missed unpin routine for umem pages. Fixes: 8aef7340ae9695 ("xsk: introduce xdp_umem_page") Signed-off-by: Ivan Khoronzhuk Acked-by: Jonathan Lemon Signed-off-by: Daniel Borkmann Signed-

[PATCH 4.19 57/79] sky2: Disable MSI on yet another ASUS boards (P6Xxxx)

2019-09-19 Thread Greg Kroah-Hartman
From: Takashi Iwai [ Upstream commit 189308d5823a089b56e2299cd96589507dac7319 ] A similar workaround for the suspend/resume problem is needed for yet another ASUS machines, P6X models. Like the previous fix, the BIOS doesn't provide the standard DMI_SYS_* entry, so again DMI_BOARD_* entries are

[PATCH 4.19 58/79] i2c: designware: Synchronize IRQs when unregistering slave client

2019-09-19 Thread Greg Kroah-Hartman
From: Jarkko Nikula [ Upstream commit c486dcd2f1bbdd524a1e0149734b79e4ae329650 ] Make sure interrupt handler i2c_dw_irq_handler_slave() has finished before clearing the the dev->slave pointer in i2c_dw_unreg_slave(). There is possibility for a race if i2c_dw_irq_handler_slave() is running on an

[PATCH 4.19 55/79] ARM: 8901/1: add a criteria for pfn_valid of arm

2019-09-19 Thread Greg Kroah-Hartman
From: zhaoyang [ Upstream commit 5b3efa4f1479c91cb8361acef55f9c6662feba57 ] pfn_valid can be wrong when parsing a invalid pfn whose phys address exceeds BITS_PER_LONG as the MSB will be trimed when shifted. The issue originally arise from bellowing call stack, which corresponding to an access o

[PATCH 4.19 66/79] net: seeq: Fix the function used to release some memory in an error handling path

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe JAILLET [ Upstream commit e1e54ec7fb55501c33b117c111cb0a045b8eded2 ] In commit 99cd149efe82 ("sgiseeq: replace use of dma_cache_wback_inv"), a call to 'get_zeroed_page()' has been turned into a call to 'dma_alloc_coherent()'. Only the remove function has been updated to turn the

[PATCH 4.19 68/79] dmaengine: ti: omap-dma: Add cleanup in omap_dma_probe()

2019-09-19 Thread Greg Kroah-Hartman
From: Wenwen Wang [ Upstream commit 962411b05a6d3342aa649e39cda1704c1fc042c6 ] If devm_request_irq() fails to disable all interrupts, no cleanup is performed before retuning the error. To fix this issue, invoke omap_dma_free() to do the cleanup. Signed-off-by: Wenwen Wang Acked-by: Peter Ujfal

[PATCH 4.19 62/79] tools/power x86_energy_perf_policy: Fix "uninitialized variable" warnings at -O2

2019-09-19 Thread Greg Kroah-Hartman
From: Ben Hutchings [ Upstream commit adb8049097a9ec4acd09fbd3aa8636199a78df8a ] x86_energy_perf_policy first uses __get_cpuid() to check the maximum CPUID level and exits if it is too low. It then assumes that later calls will succeed (which I think is architecturally guaranteed). It also ass

[PATCH 4.19 75/79] ovl: fix regression caused by overlapping layers detection

2019-09-19 Thread Greg Kroah-Hartman
From: Amir Goldstein commit 0be0bfd2de9dfdd2098a9c5b14bdd8f739c9165d upstream. Once upon a time, commit 2cac0c00a6cd ("ovl: get exclusive ownership on upper/work dirs") in v4.13 added some sanity checks on overlayfs layers. This change caused a docker regression. The root cause was mount leaks b

[PATCH 4.19 65/79] net: aquantia: fix out of memory condition on rx side

2019-09-19 Thread Greg Kroah-Hartman
From: Dmitry Bogdanov [ Upstream commit be6cef69ba570ebb327eba1ef6438f7af49aaf86 ] On embedded environments with hard memory limits it is a normal although rare case when skb can't be allocated on rx part under high traffic. In such OOM cases napi_complete_done() was not called. So the napi obj

[PATCH 4.19 67/79] dmaengine: ti: dma-crossbar: Fix a memory leak bug

2019-09-19 Thread Greg Kroah-Hartman
From: Wenwen Wang [ Upstream commit 2c231c0c1dec42192aca0f87f2dc68b8f0cbc7d2 ] In ti_dra7_xbar_probe(), 'rsv_events' is allocated through kcalloc(). Then of_property_read_u32_array() is invoked to search for the property. However, if this process fails, 'rsv_events' is not deallocated, leading t

Re: [PATCH] base: soc: Export soc_device_to_device API

2019-09-19 Thread Bjorn Andersson
On Thu 19 Sep 14:58 PDT 2019, Greg KH wrote: > On Thu, Sep 19, 2019 at 02:53:00PM -0700, Bjorn Andersson wrote: > > On Thu 19 Sep 14:32 PDT 2019, Greg KH wrote: > > > > > On Thu, Sep 19, 2019 at 02:13:44PM -0700, Murali Nalajala wrote: > > > > If the soc drivers want to add custom sysfs entries i

[PATCH 4.19 79/79] media: technisat-usb2: break out of loop at end of buffer

2019-09-19 Thread Greg Kroah-Hartman
From: Sean Young commit 0c4df39e504bf925ab666132ac3c98d6cbbe380b upstream. Ensure we do not access the buffer beyond the end if no 0xff byte is encountered. Reported-by: syzbot+eaaaf38a95427be88...@syzkaller.appspotmail.com Signed-off-by: Sean Young Reviewed-by: Kees Cook Signed-off-by: Mauro

[PATCH 4.19 73/79] iommu/amd: Fix race in increase_address_space()

2019-09-19 Thread Greg Kroah-Hartman
From: Joerg Roedel [ Upstream commit 754265bcab78a9014f0f99cd35e0d610fcd7dfa7 ] After the conversion to lock-less dma-api call the increase_address_space() function can be called without any locking. Multiple CPUs could potentially race for increasing the address space, leading to invalid domain

[PATCH 4.19 71/79] keys: Fix missing null pointer check in request_key_auth_describe()

2019-09-19 Thread Greg Kroah-Hartman
From: Hillf Danton [ Upstream commit d41a3effbb53b1bcea41e328d16a4d046a508381 ] If a request_key authentication token key gets revoked, there's a window in which request_key_auth_describe() can see it with a NULL payload - but it makes no check for this and something like the following oops may

[PATCH 4.19 60/79] perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops

2019-09-19 Thread Greg Kroah-Hartman
From: Kim Phillips [ Upstream commit 0f4cd769c410e2285a4e9873a684d90423f03090 ] When counting dispatched micro-ops with cnt_ctl=1, in order to prevent sample bias, IBS hardware preloads the least significant 7 bits of current count (IbsOpCurCnt) with random values, such that, after the interrupt

[PATCH 4.19 46/79] x86/apic: Fix arch_dynirq_lower_bound() bug for DT enabled machines

2019-09-19 Thread Greg Kroah-Hartman
From: Thomas Gleixner [ Upstream commit 3e5bedc2c258341702ddffbd7688c5e6eb01eafa ] Rahul Tanwar reported the following bug on DT systems: > 'ioapic_dynirq_base' contains the virtual IRQ base number. Presently, it is > updated to the end of hardware IRQ numbers but this is done only when IOAPIC

[PATCH 4.19 76/79] floppy: fix usercopy direction

2019-09-19 Thread Greg Kroah-Hartman
From: Jann Horn commit 52f6f9d74f31078964ca1574f7bb612da7877ac8 upstream. As sparse points out, these two copy_from_user() should actually be copy_to_user(). Fixes: 229b53c9bf4e ("take floppy compat ioctls to sodding floppy.c") Cc: sta...@vger.kernel.org Acked-by: Alexander Popov Reviewed-by:

[PATCH 4.19 63/79] tools/power x86_energy_perf_policy: Fix argument parsing

2019-09-19 Thread Greg Kroah-Hartman
From: Zephaniah E. Loss-Cutler-Hull [ Upstream commit 03531482402a2bc4ab93cf6dde46833775e035e9 ] The -w argument in x86_energy_perf_policy currently triggers an unconditional segfault. This is because the argument string reads: "+a:c:dD:E:e:f:m:M:rt:u:vw" and yet the argument handler expects an

[PATCH 4.19 77/79] binfmt_elf: move brk out of mmap when doing direct loader exec

2019-09-19 Thread Greg Kroah-Hartman
From: Kees Cook commit bbdc6076d2e5d07db44e74c11b01a3e27ab90b32 upstream. Commmit eab09532d400 ("binfmt_elf: use ELF_ET_DYN_BASE only for PIE"), made changes in the rare case when the ELF loader was directly invoked (e.g to set a non-inheritable LD_LIBRARY_PATH, testing new versions of the loade

[PATCH 4.19 72/79] iommu/amd: Flush old domains in kdump kernel

2019-09-19 Thread Greg Kroah-Hartman
From: Stuart Hayes [ Upstream commit 36b7200f67dfe75b416b5281ed4ace9927b513bc ] When devices are attached to the amd_iommu in a kdump kernel, the old device table entries (DTEs), which were copied from the crashed kernel, will be overwritten with a new domain number. When the new DTE is written

[PATCH 4.19 64/79] tools/power turbostat: fix buffer overrun

2019-09-19 Thread Greg Kroah-Hartman
From: Naoya Horiguchi [ Upstream commit eeb71c950bc6eee460f2070643ce137e067b234c ] turbostat could be terminated by general protection fault on some latest hardwares which (for example) support 9 levels of C-states and show 18 "tADDED" lines. That bloats the total output and finally causes buffe

[PATCH 4.19 45/79] r8152: Set memory to all 0xFFs on failed reg reads

2019-09-19 Thread Greg Kroah-Hartman
From: Prashant Malani [ Upstream commit f53a7ad189594a112167efaf17ea8d0242b5ac00 ] get_registers() blindly copies the memory written to by the usb_control_msg() call even if the underlying urb failed. This could lead to junk register values being read by the driver, since some indirect callers

[PATCH 4.14 01/59] HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report

2019-09-19 Thread Greg Kroah-Hartman
From: Aaron Armstrong Skomra commit 184eccd40389df29abefab88092c4ff33191fd0c upstream. In the generic code path, HID_DG_CONTACTMAX was previously only read from the second byte of report 0x23. Another report (0x82) has the HID_DG_CONTACTMAX in the higher nibble of the third byte. We should supp

[PATCH 4.14 12/59] tty/serial: atmel: reschedule TX after RX was started

2019-09-19 Thread Greg Kroah-Hartman
From: Razvan Stefanescu commit d2ace81bf902a9f11d52e59e5d232d2255a0e353 upstream. When half-duplex RS485 communication is used, after RX is started, TX tasklet still needs to be scheduled tasklet. This avoids console freezing when more data is to be transmitted, if the serial communication is n

[PATCH 4.14 13/59] mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings

2019-09-19 Thread Greg Kroah-Hartman
From: Wen Huang commit 7caac62ed598a196d6ddf8d9c121e12e082cac3a upstream. mwifiex_update_vs_ie(),mwifiex_set_uap_rates() and mwifiex_set_wmm_params() call memcpy() without checking the destination size.Since the source is given from user-space, this may trigger a heap buffer overflow. Fix them

[PATCH 4.14 11/59] serial: sprd: correct the wrong sequence of arguments

2019-09-19 Thread Greg Kroah-Hartman
From: Chunyan Zhang commit 9c801e313195addaf11c16e155f50789d6ebfd19 upstream. The sequence of arguments which was passed to handle_lsr_errors() didn't match the parameters defined in that function, &lsr was passed to flag and &flag was passed to lsr, this patch fixed that. Fixes: b7396a38fb28 (

[PATCH 4.14 15/59] ARM: OMAP2+: Fix missing SYSC_HAS_RESET_STATUS for dra7 epwmss

2019-09-19 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit afd58b162e48076e3fe66d08a69eefbd6fe71643 ] TRM says PWMSS_SYSCONFIG bit for SOFTRESET changes to zero when reset is completed. Let's configure it as otherwise we get warnings on boot when we check the data against dts provided data. Eventually the legacy pla

[PATCH 4.14 16/59] s390/bpf: fix lcgr instruction encoding

2019-09-19 Thread Greg Kroah-Hartman
From: Ilya Leoshkevich [ Upstream commit bb2d267c448f4bc3a3389d97c56391cb779178ae ] "masking, test in bounds 3" fails on s390, because BPF_ALU64_IMM(BPF_NEG, BPF_REG_2, 0) ignores the top 32 bits of BPF_REG_2. The reason is that JIT emits lcgfr instead of lcgr. The associated comment indicates t

[PATCH 4.14 17/59] ARM: OMAP2+: Fix omap4 errata warning on other SoCs

2019-09-19 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit 45da5e09dd32fa98c32eaafe2513db6bd75e2f4f ] We have errata i688 workaround produce warnings on SoCs other than omap4 and omap5: omap4_sram_init:Unable to allocate sram needed to handle errata I688 omap4_sram_init:Unable to get sram pool needed to handle erra

[PATCH 4.14 28/59] batman-adv: Only read OGM2 tvlv_len after buffer len check

2019-09-19 Thread Greg Kroah-Hartman
From: Sven Eckelmann [ Upstream commit 0ff0f15a32c093381ad1abc06abe85afb561ab28 ] Multiple batadv_ogm2_packet can be stored in an skbuff. The functions batadv_v_ogm_send_to_if() uses batadv_v_ogm_aggr_packet() to check if there is another additional batadv_ogm2_packet in the skb or not before th

[PATCH 4.14 19/59] s390/bpf: use 32-bit index for tail calls

2019-09-19 Thread Greg Kroah-Hartman
From: Ilya Leoshkevich [ Upstream commit 91b4db5313a2c793aabc2143efb8ed0cf0fdd097 ] "p runtime/jit: pass > 32bit index to tail_call" fails when bpf_jit_enable=1, because the tail call is not executed. This in turn is because the generated code assumes index is 64-bit, while it must be 32-bit, a

[PATCH 4.14 20/59] fpga: altera-ps-spi: Fix getting of optional confd gpio

2019-09-19 Thread Greg Kroah-Hartman
From: Phil Reid [ Upstream commit dec43da46f63eb71f519d963ba6832838e4262a3 ] Currently the driver does not handle EPROBE_DEFER for the confd gpio. Use devm_gpiod_get_optional() instead of devm_gpiod_get() and return error codes from altera_ps_probe(). Fixes: 5692fae0742d ("fpga manager: Add alt

[PATCH 4.14 26/59] qed: Add cleanup in qed_slowpath_start()

2019-09-19 Thread Greg Kroah-Hartman
From: Wenwen Wang [ Upstream commit de0e4fd2f07ce3bbdb69dfb8d9426b7227451b69 ] If qed_mcp_send_drv_version() fails, no cleanup is executed, leading to memory leaks. To fix this issue, introduce the label 'err4' to perform the cleanup work before returning the error. Signed-off-by: Wenwen Wang

[PATCH 4.14 25/59] Kconfig: Fix the reference to the IDT77105 Phy driver in the description of ATM_NICSTAR_USE_IDT77105

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe JAILLET [ Upstream commit cd9d4ff9b78fcd0fc4708900ba3e52e71e1a7690 ] This should be IDT77105, not IDT77015. Signed-off-by: Christophe JAILLET Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/atm/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion

[PATCH 4.14 02/59] Input: elan_i2c - remove Lenovo Legion Y7000 PnpID

2019-09-19 Thread Greg Kroah-Hartman
From: Benjamin Tissoires commit 0c043d70d04711fe6c380df9065fdc44192c49bf upstream. Looks like the Bios of the Lenovo Legion Y7000 is using ELAN061B when the actual device is supposed to be used with hid-multitouch. Remove it from the list of the supported device, hoping that no one will complai

[PATCH 4.14 24/59] NFS: Fix initialisation of I/O result struct in nfs_pgio_rpcsetup

2019-09-19 Thread Greg Kroah-Hartman
From: Trond Myklebust [ Upstream commit 17d8c5d14570c581f2a8aa01edc7998582ab ] Initialise the result count to 0 rather than initialising it to the argument count. The reason is that we want to ensure we record the I/O stats correctly in the case where an error is returned (for instance in th

[PATCH 4.14 03/59] powerpc/mm/radix: Use the right page size for vmemmap mapping

2019-09-19 Thread Greg Kroah-Hartman
From: Aneesh Kumar K.V commit 89a3496e0664577043666791ec07fb731d57c950 upstream. We use mmu_vmemmap_psize to find the page size for mapping the vmmemap area. With radix translation, we are suboptimally setting this value to PAGE_SIZE. We do check for 2M page size support and update mmu_vmemap_p

[PATCH 4.14 06/59] media: tm6000: double free if usb disconnect while streaming

2019-09-19 Thread Greg Kroah-Hartman
From: Sean Young commit 699bf94114151aae4dceb2d9dbf1a6312839dcae upstream. The usb_bulk_urb will kfree'd on disconnect, so ensure the pointer is set to NULL after each free. stop stream urb killing urb buffer free tm6000: got start feed request tm6000_start_feed tm6000: got start stream request

[PATCH 4.14 43/59] tools/power x86_energy_perf_policy: Fix "uninitialized variable" warnings at -O2

2019-09-19 Thread Greg Kroah-Hartman
From: Ben Hutchings [ Upstream commit adb8049097a9ec4acd09fbd3aa8636199a78df8a ] x86_energy_perf_policy first uses __get_cpuid() to check the maximum CPUID level and exits if it is too low. It then assumes that later calls will succeed (which I think is architecturally guaranteed). It also ass

[PATCH 4.14 04/59] USB: usbcore: Fix slab-out-of-bounds bug during device reset

2019-09-19 Thread Greg Kroah-Hartman
From: Alan Stern commit 3dd550a2d36596a1b0ee7955da3b611c031d3873 upstream. The syzbot fuzzer provoked a slab-out-of-bounds error in the USB core: BUG: KASAN: slab-out-of-bounds in memcmp+0xa6/0xb0 lib/string.c:904 Read of size 1 at addr 8881d175bed6 by task kworker/0:3/2746 CPU: 0 PID: 274

[PATCH 4.14 09/59] KVM: coalesced_mmio: add bounds checking

2019-09-19 Thread Greg Kroah-Hartman
From: Matt Delco commit b60fe990c6b07ef6d4df67bc0530c7c90a62623a upstream. The first/last indexes are typically shared with a user app. The app can change the 'last' index that the kernel uses to store the next result. This change sanity checks the index before using it for writing to a potenti

[PATCH 4.14 31/59] netfilter: nf_conntrack_ftp: Fix debug output

2019-09-19 Thread Greg Kroah-Hartman
From: Thomas Jarosch [ Upstream commit 3a069024d371125227de3ac8fa74223fcf473520 ] The find_pattern() debug output was printing the 'skip' character. This can be a NULL-byte and messes up further pr_debug() output. Output without the fix: kernel: nf_conntrack_ftp: Pattern matches! kernel: nf_con

[PATCH 4.14 07/59] xen-netfront: do not assume sk_buff_head list is empty in error handling

2019-09-19 Thread Greg Kroah-Hartman
From: Dongli Zhang [ Upstream commit 00b368502d18f790ab715e055869fd4bb7484a9b ] When skb_shinfo(skb) is not able to cache extra fragment (that is, skb_shinfo(skb)->nr_frags >= MAX_SKB_FRAGS), xennet_fill_frags() assumes the sk_buff_head list is already empty. As a result, cons is increased only

[PATCH 4.14 00/59] 4.14.146-stable review

2019-09-19 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.14.146 release. There are 59 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat 21 Sep 2019 09:44:25 PM UTC. Anything re

[PATCH 4.14 44/59] tools/power x86_energy_perf_policy: Fix argument parsing

2019-09-19 Thread Greg Kroah-Hartman
From: Zephaniah E. Loss-Cutler-Hull [ Upstream commit 03531482402a2bc4ab93cf6dde46833775e035e9 ] The -w argument in x86_energy_perf_policy currently triggers an unconditional segfault. This is because the argument string reads: "+a:c:dD:E:e:f:m:M:rt:u:vw" and yet the argument handler expects an

Re: [PATCH v2] clk: imx7ulp: remove IMX7ULP_CLK_MIPI_PLL clock

2019-09-19 Thread Stephen Boyd
Quoting Fancy Fang (2019-09-18 20:10:48) > diff --git a/include/dt-bindings/clock/imx7ulp-clock.h > b/include/dt-bindings/clock/imx7ulp-clock.h > index 6f66f9005c81..a39b0c40cb41 100644 > --- a/include/dt-bindings/clock/imx7ulp-clock.h > +++ b/include/dt-bindings/clock/imx7ulp-clock.h > @@ -49,7 +

[PATCH 4.14 37/59] ARM: 8901/1: add a criteria for pfn_valid of arm

2019-09-19 Thread Greg Kroah-Hartman
From: zhaoyang [ Upstream commit 5b3efa4f1479c91cb8361acef55f9c6662feba57 ] pfn_valid can be wrong when parsing a invalid pfn whose phys address exceeds BITS_PER_LONG as the MSB will be trimed when shifted. The issue originally arise from bellowing call stack, which corresponding to an access o

[PATCH 4.14 56/59] binfmt_elf: move brk out of mmap when doing direct loader exec

2019-09-19 Thread Greg Kroah-Hartman
From: Kees Cook commit bbdc6076d2e5d07db44e74c11b01a3e27ab90b32 upstream. Commmit eab09532d400 ("binfmt_elf: use ELF_ET_DYN_BASE only for PIE"), made changes in the rare case when the ELF loader was directly invoked (e.g to set a non-inheritable LD_LIBRARY_PATH, testing new versions of the loade

[PATCH 4.14 38/59] sky2: Disable MSI on yet another ASUS boards (P6Xxxx)

2019-09-19 Thread Greg Kroah-Hartman
From: Takashi Iwai [ Upstream commit 189308d5823a089b56e2299cd96589507dac7319 ] A similar workaround for the suspend/resume problem is needed for yet another ASUS machines, P6X models. Like the previous fix, the BIOS doesn't provide the standard DMI_SYS_* entry, so again DMI_BOARD_* entries are

[PATCH 4.14 47/59] dmaengine: ti: dma-crossbar: Fix a memory leak bug

2019-09-19 Thread Greg Kroah-Hartman
From: Wenwen Wang [ Upstream commit 2c231c0c1dec42192aca0f87f2dc68b8f0cbc7d2 ] In ti_dra7_xbar_probe(), 'rsv_events' is allocated through kcalloc(). Then of_property_read_u32_array() is invoked to search for the property. However, if this process fails, 'rsv_events' is not deallocated, leading t

[PATCH 4.14 59/59] media: technisat-usb2: break out of loop at end of buffer

2019-09-19 Thread Greg Kroah-Hartman
From: Sean Young commit 0c4df39e504bf925ab666132ac3c98d6cbbe380b upstream. Ensure we do not access the buffer beyond the end if no 0xff byte is encountered. Reported-by: syzbot+eaaaf38a95427be88...@syzkaller.appspotmail.com Signed-off-by: Sean Young Reviewed-by: Kees Cook Signed-off-by: Mauro

[PATCH 4.14 36/59] cifs: Use kzfree() to zero out the password

2019-09-19 Thread Greg Kroah-Hartman
From: Dan Carpenter [ Upstream commit 478228e57f81f6cb60798d54fc02a74ea7dd267e ] It's safer to zero out the password so that it can never be disclosed. Fixes: 0c219f5799c7 ("cifs: set domainName when a domain-key is used in multiuser") Signed-off-by: Dan Carpenter Signed-off-by: Steve French

[PATCH 4.14 52/59] iommu/amd: Flush old domains in kdump kernel

2019-09-19 Thread Greg Kroah-Hartman
From: Stuart Hayes [ Upstream commit 36b7200f67dfe75b416b5281ed4ace9927b513bc ] When devices are attached to the amd_iommu in a kdump kernel, the old device table entries (DTEs), which were copied from the crashed kernel, will be overwritten with a new domain number. When the new DTE is written

[PATCH 4.14 35/59] cifs: set domainName when a domain-key is used in multiuser

2019-09-19 Thread Greg Kroah-Hartman
From: Ronnie Sahlberg [ Upstream commit f2aee329a68f5a907bcff11a109dfe17c0b41aeb ] RHBZ: 1710429 When we use a domain-key to authenticate using multiuser we must also set the domainnmame for the new volume as it will be used and passed to the server in the NTLMSSP Domain-name. Signed-off-by: R

[PATCH 4.14 49/59] x86/uaccess: Dont leak the AC flags into __get_user() argument evaluation

2019-09-19 Thread Greg Kroah-Hartman
From: Peter Zijlstra [ Upstream commit 9b8bd476e78e89c9ea26c3b435ad0201c3d7dbf5 ] Identical to __put_user(); the __get_user() argument evalution will too leak UBSAN crud into the __uaccess_begin() / __uaccess_end() region. While uncommon this was observed to happen for: drivers/xen/gntdev.c:

[PATCH 4.14 54/59] PCI: kirin: Fix section mismatch warning

2019-09-19 Thread Greg Kroah-Hartman
From: Nathan Chancellor commit 6870b673509779195cab300aedc844b352d9cfbc upstream. The PCI kirin driver compilation produces the following section mismatch warning: WARNING: vmlinux.o(.text+0x4758cc): Section mismatch in reference from the function kirin_pcie_probe() to the function .init.text:k

[PATCH 4.14 48/59] dmaengine: ti: omap-dma: Add cleanup in omap_dma_probe()

2019-09-19 Thread Greg Kroah-Hartman
From: Wenwen Wang [ Upstream commit 962411b05a6d3342aa649e39cda1704c1fc042c6 ] If devm_request_irq() fails to disable all interrupts, no cleanup is performed before retuning the error. To fix this issue, invoke omap_dma_free() to do the cleanup. Signed-off-by: Wenwen Wang Acked-by: Peter Ujfal

[PATCH 4.14 34/59] kallsyms: Dont let kallsyms_lookup_size_offset() fail on retrieving the first symbol

2019-09-19 Thread Greg Kroah-Hartman
From: Marc Zyngier [ Upstream commit 2a1a3fa0f29270583f0e6e3100d609e09697add1 ] An arm64 kernel configured with CONFIG_KPROBES=y CONFIG_KALLSYMS=y # CONFIG_KALLSYMS_ALL is not set CONFIG_KALLSYMS_BASE_RELATIVE=y reports the following kprobe failure: [0.032677] kprobes: failed to

[PATCH 4.14 55/59] floppy: fix usercopy direction

2019-09-19 Thread Greg Kroah-Hartman
From: Jann Horn commit 52f6f9d74f31078964ca1574f7bb612da7877ac8 upstream. As sparse points out, these two copy_from_user() should actually be copy_to_user(). Fixes: 229b53c9bf4e ("take floppy compat ioctls to sodding floppy.c") Cc: sta...@vger.kernel.org Acked-by: Alexander Popov Reviewed-by:

[PATCH 4.14 51/59] keys: Fix missing null pointer check in request_key_auth_describe()

2019-09-19 Thread Greg Kroah-Hartman
From: Hillf Danton [ Upstream commit d41a3effbb53b1bcea41e328d16a4d046a508381 ] If a request_key authentication token key gets revoked, there's a window in which request_key_auth_describe() can see it with a NULL payload - but it makes no check for this and something like the following oops may

[PATCH 4.14 32/59] NFSv2: Fix eof handling

2019-09-19 Thread Greg Kroah-Hartman
From: Trond Myklebust [ Upstream commit 71affe9be45a5c60b9772e1b2701710712637274 ] If we received a reply from the server with a zero length read and no error, then that implies we are at eof. Signed-off-by: Trond Myklebust Signed-off-by: Sasha Levin --- fs/nfs/proc.c | 3 ++- 1 file changed

[PATCH 4.9 17/74] genirq: Prevent NULL pointer dereference in resend_irqs()

2019-09-19 Thread Greg Kroah-Hartman
From: Yunfeng Ye commit eddf3e9c7c7e4d0707c68d1bb22cc6ec8aef7d4a upstream. The following crash was observed: Unable to handle kernel NULL pointer dereference at 0158 Internal error: Oops: 9604 [#1] SMP pc : resend_irqs+0x68/0xb0 lr : resend_irqs+0x64/0xb0 ... Call tr

[PATCH 4.9 11/74] tipc: add NULL pointer check before calling kfree_rcu

2019-09-19 Thread Greg Kroah-Hartman
From: Xin Long [ Upstream commit 42dec1dbe38239cf91cc1f4df7830c66276ced37 ] Unlike kfree(p), kfree_rcu(p, rcu) won't do NULL pointer check. When tipc_nametbl_remove_publ returns NULL, the panic below happens: BUG: unable to handle kernel NULL pointer dereference at 0068 RIP: 0

[PATCH 4.9 24/74] mtd: rawnand: mtk: Fix wrongly assigned OOB buffer pointer issue

2019-09-19 Thread Greg Kroah-Hartman
From: Xiaolei Li commit 336d4b138be2dad372b67a2388e42805c48aaa38 upstream. One main goal of the function mtk_nfc_update_ecc_stats is to check whether sectors are all empty. If they are empty, set these sectors's data buffer and OOB buffer as 0xff. But now, the sector OOB buffer pointer is wrong

[PATCH 4.9 19/74] KVM: x86: work around leak of uninitialized stack contents

2019-09-19 Thread Greg Kroah-Hartman
From: Fuqian Huang commit 541ab2aeb28251bf7135c7961f3a6080eebcc705 upstream. Emulation of VMPTRST can incorrectly inject a page fault when passed an operand that points to an MMIO address. The page fault will use uninitialized kernel stack memory as the CR2 and error code. The right behavior wo

[PATCH 4.9 23/74] clk: rockchip: Dont yell about bad mmc phases when getting

2019-09-19 Thread Greg Kroah-Hartman
From: Douglas Anderson commit 6943b839721ad4a31ad2bacf6e71b21f2dfe3134 upstream. At boot time, my rk3288-veyron devices yell with 8 lines that look like this: [0.00] rockchip_mmc_get_phase: invalid clk rate This is because the clock framework at clk_register() time tries to get the ph

[PATCH 4.9 14/74] gpio: fix line flag validation in linehandle_create

2019-09-19 Thread Greg Kroah-Hartman
From: Kent Gibson commit e95fbc130a162ba9ad956311b95aa0da269eea48 upstream. linehandle_create should not allow both GPIOHANDLE_REQUEST_INPUT and GPIOHANDLE_REQUEST_OUTPUT to be set. Fixes: d7c51b47ac11 ("gpio: userspace ABI for reading/writing GPIO lines") Cc: stable Signed-off-by: Kent Gibson

[PATCH 4.14 41/59] perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops

2019-09-19 Thread Greg Kroah-Hartman
From: Kim Phillips [ Upstream commit 0f4cd769c410e2285a4e9873a684d90423f03090 ] When counting dispatched micro-ops with cnt_ctl=1, in order to prevent sample bias, IBS hardware preloads the least significant 7 bits of current count (IbsOpCurCnt) with random values, such that, after the interrupt

[PATCH 4.9 01/74] bridge/mdb: remove wrong use of NLM_F_MULTI

2019-09-19 Thread Greg Kroah-Hartman
From: Nicolas Dichtel [ Upstream commit 94a72b3f024fc7e9ab640897a1e38583a470659d ] NLM_F_MULTI must be used only when a NLMSG_DONE message is sent at the end. In fact, NLMSG_DONE is sent only at the end of a dump. Libraries like libnl will wait forever for NLMSG_DONE. Fixes: 949f1e39a617 ("bri

[PATCH 4.9 21/74] MIPS: VDSO: Prevent use of smp_processor_id()

2019-09-19 Thread Greg Kroah-Hartman
From: Paul Burton commit 351f366245c0fb4636f32edfb4198c8d6b8c upstream. VDSO code should not be using smp_processor_id(), since it is executed in user mode. Introduce a VDSO-specific path which will cause a compile-time or link-time error (depending upon support for __compiletime_error) if t

[PATCH 4.9 12/74] tun: fix use-after-free when register netdev failed

2019-09-19 Thread Greg Kroah-Hartman
From: Yang Yingliang [ Upstream commit 77f22f92dff8e7b45c7786a430626d38071d4670 ] I got a UAF repport in tun driver when doing fuzzy test: [ 466.269490] == [ 466.271792] BUG: KASAN: use-after-free in tun_chr_read_iter+0x2ca/0x2d

[PATCH 4.9 22/74] MIPS: VDSO: Use same -m%-float cflag as the kernel proper

2019-09-19 Thread Greg Kroah-Hartman
From: Paul Burton commit 0648e50e548d881d025b9419a1a168753c8e2bf7 upstream. The MIPS VDSO build currently doesn't provide the -msoft-float flag to the compiler as the kernel proper does. This results in an attempt to use the compiler's default floating point configuration, which can be problemat

[PATCH 4.9 18/74] KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl

2019-09-19 Thread Greg Kroah-Hartman
From: Thomas Huth commit 53936b5bf35e140ae27e4bbf0447a61063f400da upstream. When the userspace program runs the KVM_S390_INTERRUPT ioctl to inject an interrupt, we convert them from the legacy struct kvm_s390_interrupt to the new struct kvm_s390_irq via the s390int_to_s390irq() function. However

[PATCH 4.9 31/74] crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking.

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe Leroy commit 4bbfb839259a9c96a0be872e16f7471b7136aee5 upstream. In that mode, hardware ICV verification is not supported. Signed-off-by: Christophe Leroy Fixes: 7405c8d7ff97 ("crypto: talitos - templates for AEAD using HMAC_SNOOP_NO_AFEU") Signed-off-by: Herbert Xu Signed-of

[PATCH 4.9 08/74] sctp: Fix the link time qualifier of sctp_ctrlsock_exit()

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe JAILLET [ Upstream commit b456d72412ca8797234449c25815e82f4e1426c0 ] The '.exit' functions from 'pernet_operations' structure should be marked as __net_exit, not __net_init. Fixes: 8e2d61e0aed2 ("sctp: fix race on protocol/netns initialization") Signed-off-by: Christophe JAILLE

[PATCH 4.9 26/74] crypto: talitos - check AES key size

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe Leroy commit 1ba34e71e9e56ac29a52e0d42b6290f3dc5bfd90 upstream. Although the HW accepts any size and silently truncates it to the correct length, the extra tests expects EINVAL to be returned when the key size is not valid. Signed-off-by: Christophe Leroy Fixes: 4de9d0b547b9 (

[PATCH 4.9 29/74] crypto: talitos - fix ECB algs ivsize

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe Leroy commit d84cc9c9524ec5973a337533e6d8ccd3e5f05f2b upstream. ECB's ivsize must be 0. Signed-off-by: Christophe Leroy Fixes: 5e75ae1b3cef ("crypto: talitos - add new crypto modes") Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/talitos.c |

[PATCH 4.9 27/74] crypto: talitos - fix CTR alg blocksize

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe Leroy commit b9a05b6041cb9810a291315569b2af0d63c3680a upstream. CTR has a blocksize of 1. Signed-off-by: Christophe Leroy Fixes: 5e75ae1b3cef ("crypto: talitos - add new crypto modes") Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/talitos.c

[PATCH 4.9 04/74] isdn/capi: check message length in capi_write()

2019-09-19 Thread Greg Kroah-Hartman
From: Eric Biggers [ Upstream commit fe163e534e5eecdfd7b5920b0dfd24c458ee85d6 ] syzbot reported: BUG: KMSAN: uninit-value in capi_write+0x791/0xa90 drivers/isdn/capi/capi.c:700 CPU: 0 PID: 10025 Comm: syz-executor379 Not tainted 4.20.0-rc7+ #2 Hardware name: Google Google Compute E

[PATCH 4.9 33/74] nvmem: Use the same permissions for eeprom as for nvmem

2019-09-19 Thread Greg Kroah-Hartman
From: Jean Delvare commit e70d8b287301eb6d7c7761c6171c56af62110ea3 upstream. The compatibility "eeprom" attribute is currently root-only no matter what the configuration says. The "nvmem" attribute does respect the setting of the root_only configuration bit, so do the same for "eeprom". Signed-

[PATCH 4.9 06/74] net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list

2019-09-19 Thread Greg Kroah-Hartman
From: Shmulik Ladkani [ Upstream commit 3dcbdb134f329842a38f0e6797191b885ab00a00 ] Historically, support for frag_list packets entering skb_segment() was limited to frag_list members terminating on exact same gso_size boundaries. This is verified with a BUG_ON since commit 89319d3801d1 ("net: Ad

[PATCH 4.9 32/74] drm/mediatek: mtk_drm_drv.c: Add of_node_put() before goto

2019-09-19 Thread Greg Kroah-Hartman
From: Nishka Dasgupta commit 165d42c012be69900f0e2f8545626cb9e7d4a832 upstream. Each iteration of for_each_child_of_node puts the previous node, but in the case of a goto from the middle of the loop, there is no put, thus causing a memory leak. Hence add an of_node_put before the goto in two pla

[PATCH 4.9 03/74] ipv6: Fix the link time qualifier of ping_v6_proc_exit_net()

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe JAILLET [ Upstream commit d23dbc479a8e813db4161a695d67da0e36557846 ] The '.exit' functions from 'pernet_operations' structure should be marked as __net_exit, not __net_init. Fixes: d862e5461423 ("net: ipv6: Implement /proc/net/icmp6.") Signed-off-by: Christophe JAILLET Signed-

[PATCH 4.9 35/74] USB: usbcore: Fix slab-out-of-bounds bug during device reset

2019-09-19 Thread Greg Kroah-Hartman
From: Alan Stern commit 3dd550a2d36596a1b0ee7955da3b611c031d3873 upstream. The syzbot fuzzer provoked a slab-out-of-bounds error in the USB core: BUG: KASAN: slab-out-of-bounds in memcmp+0xa6/0xb0 lib/string.c:904 Read of size 1 at addr 8881d175bed6 by task kworker/0:3/2746 CPU: 0 PID: 274

[PATCH 4.9 44/74] ARM: OMAP2+: Fix missing SYSC_HAS_RESET_STATUS for dra7 epwmss

2019-09-19 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit afd58b162e48076e3fe66d08a69eefbd6fe71643 ] TRM says PWMSS_SYSCONFIG bit for SOFTRESET changes to zero when reset is completed. Let's configure it as otherwise we get warnings on boot when we check the data against dts provided data. Eventually the legacy pla

[PATCH 4.9 45/74] s390/bpf: fix lcgr instruction encoding

2019-09-19 Thread Greg Kroah-Hartman
From: Ilya Leoshkevich [ Upstream commit bb2d267c448f4bc3a3389d97c56391cb779178ae ] "masking, test in bounds 3" fails on s390, because BPF_ALU64_IMM(BPF_NEG, BPF_REG_2, 0) ignores the top 32 bits of BPF_REG_2. The reason is that JIT emits lcgfr instead of lcgr. The associated comment indicates t

[PATCH 4.9 52/74] ARM: 8874/1: mm: only adjust sections of valid mm structures

2019-09-19 Thread Greg Kroah-Hartman
From: Doug Berger [ Upstream commit c51bc12d06b3a5494fbfcbd788a8e307932a06e9 ] A timing hazard exists when an early fork/exec thread begins exiting and sets its mm pointer to NULL while a separate core tries to update the section information. This commit ensures that the mm pointer is not NULL

[PATCH 4.9 51/74] qed: Add cleanup in qed_slowpath_start()

2019-09-19 Thread Greg Kroah-Hartman
From: Wenwen Wang [ Upstream commit de0e4fd2f07ce3bbdb69dfb8d9426b7227451b69 ] If qed_mcp_send_drv_version() fails, no cleanup is executed, leading to memory leaks. To fix this issue, introduce the label 'err4' to perform the cleanup work before returning the error. Signed-off-by: Wenwen Wang

[PATCH 4.9 36/74] media: tm6000: double free if usb disconnect while streaming

2019-09-19 Thread Greg Kroah-Hartman
From: Sean Young commit 699bf94114151aae4dceb2d9dbf1a6312839dcae upstream. The usb_bulk_urb will kfree'd on disconnect, so ensure the pointer is set to NULL after each free. stop stream urb killing urb buffer free tm6000: got start feed request tm6000_start_feed tm6000: got start stream request

[PATCH 4.9 53/74] batman-adv: Only read OGM2 tvlv_len after buffer len check

2019-09-19 Thread Greg Kroah-Hartman
From: Sven Eckelmann [ Upstream commit 0ff0f15a32c093381ad1abc06abe85afb561ab28 ] Multiple batadv_ogm2_packet can be stored in an skbuff. The functions batadv_v_ogm_send_to_if() uses batadv_v_ogm_aggr_packet() to check if there is another additional batadv_ogm2_packet in the skb or not before th

[PATCH 4.9 57/74] NFSv2: Fix eof handling

2019-09-19 Thread Greg Kroah-Hartman
From: Trond Myklebust [ Upstream commit 71affe9be45a5c60b9772e1b2701710712637274 ] If we received a reply from the server with a zero length read and no error, then that implies we are at eof. Signed-off-by: Trond Myklebust Signed-off-by: Sasha Levin --- fs/nfs/proc.c | 3 ++- 1 file changed

[PATCH 4.9 63/74] perf/x86/intel: Restrict period on Nehalem

2019-09-19 Thread Greg Kroah-Hartman
From: Josh Hunt [ Upstream commit 44d3bbb6f5e501b873218142fe08cdf62a4ac1f3 ] We see our Nehalem machines reporting 'perfevents: irq loop stuck!' in some cases when using perf: perfevents: irq loop stuck! WARNING: CPU: 0 PID: 3485 at arch/x86/events/intel/core.c:2282 intel_pmu_handle_irq+0x37b/

[PATCH 4.9 50/74] Kconfig: Fix the reference to the IDT77105 Phy driver in the description of ATM_NICSTAR_USE_IDT77105

2019-09-19 Thread Greg Kroah-Hartman
From: Christophe JAILLET [ Upstream commit cd9d4ff9b78fcd0fc4708900ba3e52e71e1a7690 ] This should be IDT77105, not IDT77015. Signed-off-by: Christophe JAILLET Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/atm/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion

[PATCH 4.9 55/74] x86/apic: Fix arch_dynirq_lower_bound() bug for DT enabled machines

2019-09-19 Thread Greg Kroah-Hartman
From: Thomas Gleixner [ Upstream commit 3e5bedc2c258341702ddffbd7688c5e6eb01eafa ] Rahul Tanwar reported the following bug on DT systems: > 'ioapic_dynirq_base' contains the virtual IRQ base number. Presently, it is > updated to the end of hardware IRQ numbers but this is done only when IOAPIC

[PATCH 4.9 65/74] tools/power turbostat: fix buffer overrun

2019-09-19 Thread Greg Kroah-Hartman
From: Naoya Horiguchi [ Upstream commit eeb71c950bc6eee460f2070643ce137e067b234c ] turbostat could be terminated by general protection fault on some latest hardwares which (for example) support 9 levels of C-states and show 18 "tADDED" lines. That bloats the total output and finally causes buffe

[PATCH 4.9 62/74] sky2: Disable MSI on yet another ASUS boards (P6Xxxx)

2019-09-19 Thread Greg Kroah-Hartman
From: Takashi Iwai [ Upstream commit 189308d5823a089b56e2299cd96589507dac7319 ] A similar workaround for the suspend/resume problem is needed for yet another ASUS machines, P6X models. Like the previous fix, the BIOS doesn't provide the standard DMI_SYS_* entry, so again DMI_BOARD_* entries are

<    4   5   6   7   8   9   10   11   12   13   >