[PATCH 4.14 36/61] drm/amdgpu: Check for valid number of registers to read

2019-10-10 Thread Greg Kroah-Hartman
From: Trek [ Upstream commit 73d8e6c7b841d9bf298c8928f228fb433676635c ] Do not try to allocate any amount of memory requested by the user. Instead limit it to 128 registers. Actually the longest series of consecutive allowed registers are 48, mmGB_TILE_MODE0-31 and mmGB_MACROTILE_MODE0-15 (0x264

[PATCH 4.14 34/61] watchdog: aspeed: Add support for AST2600

2019-10-10 Thread Greg Kroah-Hartman
From: Ryan Chen [ Upstream commit b3528b4874480818e38e4da019d655413c233e6a ] The ast2600 can be supported by the same code as the ast2500. Signed-off-by: Ryan Chen Signed-off-by: Joel Stanley Reviewed-by: Guenter Roeck Link: https://lore.kernel.org/r/20190819051738.17370-3-j...@jms.id.au Sig

[PATCH 4.14 14/61] crypto: skcipher - Unmap pages after an external error

2019-10-10 Thread Greg Kroah-Hartman
From: Herbert Xu commit 0ba3c026e685573bd3534c17e27da7c505ac99c4 upstream. skcipher_walk_done may be called with an error by internal or external callers. For those internal callers we shouldn't unmap pages but for external callers we must unmap any pages that are in use. This patch distinguis

[PATCH 4.14 01/61] s390/process: avoid potential reading of freed stack

2019-10-10 Thread Greg Kroah-Hartman
From: Vasily Gorbik commit 8769f610fe6d473e5e8e221709c3ac402037da6c upstream. With THREAD_INFO_IN_TASK (which is selected on s390) task's stack usage is refcounted and should always be protected by get/put when touching other task's stack to avoid race conditions with task's destruction code. F

[PATCH 4.14 00/61] 4.14.149-stable review

2019-10-10 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.14.149 release. There are 61 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat 12 Oct 2019 08:29:51 AM UTC. Anything re

[PATCH 4.14 12/61] tools lib traceevent: Fix "robust" test of do_generate_dynamic_list_file

2019-10-10 Thread Greg Kroah-Hartman
From: Steven Rostedt (VMware) commit 82a2f88458d70704be843961e10b5cef9a6e95d3 upstream. The tools/lib/traceevent/Makefile had a test added to it to detect a failure of the "nm" when making the dynamic list file (whatever that is). The problem is that the test sorts the values "U W w" and some ve

[PATCH 4.14 18/61] usercopy: Avoid HIGHMEM pfn warning

2019-10-10 Thread Greg Kroah-Hartman
From: Kees Cook commit 314eed30ede02fa925990f535652254b5bad6b65 upstream. When running on a system with >512MB RAM with a 32-bit kernel built with: CONFIG_DEBUG_VIRTUAL=y CONFIG_HIGHMEM=y CONFIG_HARDENED_USERCOPY=y all execve()s will fail due to argv copying into kmap()

[PATCH 4.14 42/61] perf build: Add detection of java-11-openjdk-devel package

2019-10-10 Thread Greg Kroah-Hartman
From: Thomas Richter [ Upstream commit 815c1560bf8fd522b8d93a1d727868b910c1cc24 ] With Java 11 there is no seperate JRE anymore. Details: https://coderanch.com/t/701603/java/JRE-JDK Therefore the detection of the JRE needs to be adapted. This change works for s390 and x86. I have not test

[PATCH 4.14 37/61] pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors

2019-10-10 Thread Greg Kroah-Hartman
From: Trond Myklebust [ Upstream commit 9c47b18cf722184f32148784189fca945a7d0561 ] IF the server rejected our layout return with a state error such as NFS4ERR_BAD_STATEID, or even a stale inode error, then we do want to clear out all the remaining layout segments and mark that stateid as invalid

[PATCH 4.14 39/61] thermal: Fix use-after-free when unregistering thermal zone device

2019-10-10 Thread Greg Kroah-Hartman
From: Ido Schimmel [ Upstream commit 1851799e1d2978f68eea5d9dff322e121dcf59c1 ] thermal_zone_device_unregister() cancels the delayed work that polls the thermal zone, but it does not wait for it to finish. This is racy with respect to the freeing of the thermal zone device, which can result in a

[PATCH 4.14 45/61] KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP

2019-10-10 Thread Greg Kroah-Hartman
From: Cédric Le Goater [ Upstream commit 237aed48c642328ff0ab19b63423634340224a06 ] When a vCPU is brought done, the XIVE VP (Virtual Processor) is first disabled and then the event notification queues are freed. When freeing the queues, we check for possible escalation interrupts and free them

[PATCH 4.14 41/61] sched/core: Fix migration to invalid CPU in __set_cpus_allowed_ptr()

2019-10-10 Thread Greg Kroah-Hartman
From: KeMeng Shi [ Upstream commit 714e501e16cd473538b609b3e351b2cc9f7f09ed ] An oops can be triggered in the scheduler when running qemu on arm64: Unable to handle kernel paging request at virtual address 08effe40 Internal error: Oops: 9607 [#1] SMP Process migration/0 (pid: 12,

[PATCH 4.14 38/61] pwm: stm32-lp: Add check in case requested period cannot be achieved

2019-10-10 Thread Greg Kroah-Hartman
From: Fabrice Gasnier [ Upstream commit c91e3234c6035baf5a79763cb4fcd5d23ce75c2b ] LPTimer can use a 32KHz clock for counting. It depends on clock tree configuration. In such a case, PWM output frequency range is limited. Although unlikely, nothing prevents user from requesting a PWM frequency a

[PATCH 4.14 46/61] nbd: fix crash when the blksize is zero

2019-10-10 Thread Greg Kroah-Hartman
From: Xiubo Li [ Upstream commit 553768d1169a48c0cd87c4eb4ab57534ee663415 ] This will allow the blksize to be set zero and then use 1024 as default. Reviewed-by: Josef Bacik Signed-off-by: Xiubo Li [fix to use goto out instead of return in genl_connect] Signed-off-by: Mike Christie Signed-of

[PATCH 4.14 43/61] kernel/elfcore.c: include proper prototypes

2019-10-10 Thread Greg Kroah-Hartman
From: Valdis Kletnieks [ Upstream commit 0f74914071ab7e7b78731ed62bf350e3a344e0a5 ] When building with W=1, gcc properly complains that there's no prototypes: CC kernel/elfcore.o kernel/elfcore.c:7:17: warning: no previous prototype for 'elf_core_extra_phdrs' [-Wmissing-prototypes]

Re: [PATCH] ACPI: PM: Revert "ACPI / PM: Blacklist Low Power S0 Idle _DSM for Dell XPS13 9360"

2019-10-10 Thread Rafael J. Wysocki
On Tue, Oct 8, 2019 at 3:44 AM wrote: > > > On 26.09.19 18:08, Mario Limonciello wrote: > > > This reverts part of > > > commit 71630b7a832f ("ACPI / PM: Blacklist Low Power S0 Idle _DSM for > > > Dell XPS13 9360") to remove the S0ix blacklist for the XPS 9360. > > > > > > The problems with this s

[PATCH 4.14 48/61] nbd: fix max number of supported devs

2019-10-10 Thread Greg Kroah-Hartman
From: Mike Christie [ Upstream commit e9e006f5fcf2bab59149cb38a48a4817c1b538b4 ] This fixes a bug added in 4.10 with commit: commit 9561a7ade0c205bc2ee035a2ac880478dcc1a024 Author: Josef Bacik Date: Tue Nov 22 14:04:40 2016 -0500 nbd: add multi-connection support that limited the numbe

[PATCH 4.14 51/61] tick: broadcast-hrtimer: Fix a race in bc_set_next

2019-10-10 Thread Greg Kroah-Hartman
From: Balasubramani Vivekanandan [ Upstream commit b9023b91dd020ad7e093baa5122b6968c48cc9e0 ] When a cpu requests broadcasting, before starting the tick broadcast hrtimer, bc_set_next() checks if the timer callback (bc_handler) is active using hrtimer_try_to_cancel(). But hrtimer_try_to_cancel()

[PATCH 4.14 47/61] block/ndb: add WQ_UNBOUND to the knbd-recv workqueue

2019-10-10 Thread Greg Kroah-Hartman
From: Dan Melnic [ Upstream commit 2189c97cdbed630d5971ab22f05dc998774e354e ] Add WQ_UNBOUND to the knbd-recv workqueue so we're not bound to a single CPU that is selected at device creation time. Signed-off-by: Dan Melnic Reviewed-by: Josef Bacik Signed-off-by: Jens Axboe Signed-off-by: Sas

[PATCH 4.14 23/61] mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence

2019-10-10 Thread Greg Kroah-Hartman
From: Russell King commit 121bd08b029e03404c451bb237729cdff76eafed upstream. We must not unconditionally set the DMA snoop bit; if the DMA API is assuming that the device is not DMA coherent, and the device snoops the CPU caches, the device can see stale cache lines brought in by speculative pre

[PATCH 4.14 31/61] xen/pci: reserve MCFG areas earlier

2019-10-10 Thread Greg Kroah-Hartman
From: Igor Druzhinin [ Upstream commit a4098bc6eed5e31e0391bcc068e61804c98138df ] If MCFG area is not reserved in E820, Xen by default will defer its usage until Dom0 registers it explicitly after ACPI parser recognizes it as a reserved resource in DSDT. Having it reserved in E820 is not mandato

[PATCH 4.14 30/61] 9p: avoid attaching writeback_fid on mmap with type PRIVATE

2019-10-10 Thread Greg Kroah-Hartman
From: Chengguang Xu [ Upstream commit c87a37ebd40b889178664c2c09cc187334146292 ] Currently on mmap cache policy, we always attach writeback_fid whether mmap type is SHARED or PRIVATE. However, in the use case of kata-container which combines 9p(Guest OS) with overlayfs(Host OS), this behavior wi

[PATCH 4.14 56/61] vfs: Fix EOVERFLOW testing in put_compat_statfs64

2019-10-10 Thread Greg Kroah-Hartman
From: Eric Sandeen commit cc3a7bfe62b947b423fcb2cfe89fcba92bf48fa3 upstream. Today, put_compat_statfs64() disallows nearly any field value over 2^32 if f_bsize is only 32 bits, but that makes no sense. compat_statfs64 is there for the explicit purpose of providing 64-bit fields for f_files, f_ff

[PATCH 4.14 26/61] ieee802154: atusb: fix use-after-free at disconnect

2019-10-10 Thread Greg Kroah-Hartman
From: Johan Hovold commit 7fd25e6fc035f4b04b75bca6d7e8daa069603a76 upstream. The disconnect callback was accessing the hardware-descriptor private data after having having freed it. Fixes: 7490b008d123 ("ieee802154: add support for atusb transceiver") Cc: stable # 4.2 Cc: Alexander Aring

[PATCH 4.14 32/61] ceph: fix directories inode i_blkbits initialization

2019-10-10 Thread Greg Kroah-Hartman
From: Luis Henriques [ Upstream commit 750670341a24cb714e624e0fd7da30900ad93752 ] When filling an inode with info from the MDS, i_blkbits is being initialized using fl_stripe_unit, which contains the stripe unit in bytes. Unfortunately, this doesn't make sense for directories as they have fl_st

[PATCH 4.14 61/61] ASoC: sgtl5000: Improve VAG power and mute control

2019-10-10 Thread Greg Kroah-Hartman
From: Oleksandr Suvorov [ Upstream commit b1f373a11d25fc9a5f7679c9b85799fe09b0dc4a ] VAG power control is improved to fit the manual [1]. This patch fixes as minimum one bug: if customer muxes Headphone to Line-In right after boot, the VAG power remains off that leads to poor sound quality from

[PATCH 4.14 60/61] nl80211: validate beacon head

2019-10-10 Thread Greg Kroah-Hartman
From: Johannes Berg commit f88eb7c0d002a67ef31aeb7850b42ff69abc46dc upstream. We currently don't validate the beacon head, i.e. the header, fixed part and elements that are to go in front of the TIM element. This means that the variable elements there can be malformed, e.g. have a length exceedi

[PATCH 4.14 27/61] cfg80211: initialize on-stack chandefs

2019-10-10 Thread Greg Kroah-Hartman
From: Johannes Berg commit f43e5210c739fe76a4b0ed851559d6902f20ceb1 upstream. In a few places we don't properly initialize on-stack chandefs, resulting in EDMG data to be non-zero, which broke things. Additionally, in a few places we rely on the driver to init the data completely, but perhaps w

[PATCH 4.14 29/61] fs: nfs: Fix possible null-pointer dereferences in encode_attrs()

2019-10-10 Thread Greg Kroah-Hartman
From: Jia-Ju Bai [ Upstream commit e2751463eaa6f9fec8fea80abbdc62dbc487b3c5 ] In encode_attrs(), there is an if statement on line 1145 to check whether label is NULL: if (label && (attrmask[2] & FATTR4_WORD2_SECURITY_LABEL)) When label is NULL, it is used on lines 1178-1181: *p++ = cpu_

[PATCH 4.14 28/61] ima: always return negative code for error

2019-10-10 Thread Greg Kroah-Hartman
From: Sascha Hauer [ Upstream commit f5e1040196dbfe14c77ce3dfe3b7b08d2d961e88 ] integrity_kernel_read() returns the number of bytes read. If this is a short read then this positive value is returned from ima_calc_file_hash_atfm(). Currently this is only indirectly called from ima_calc_file_hash(

Re: [PATCH] staging: qlge: Fix multiple assignments warning by splitting the assignement into two each

2019-10-10 Thread Dan Carpenter
On Wed, Oct 09, 2019 at 09:10:29PM +0100, Jules Irenge wrote: > Fix multiple assignments warning " check > issued by checkpatch.pl tool: > "CHECK: multiple assignments should be avoided". > > Signed-off-by: Jules Irenge > --- > drivers/staging/qlge/qlge_dbg.c | 6 -- > 1 file changed, 4 ins

[PATCH 4.14 58/61] cfg80211: add and use strongly typed element iteration macros

2019-10-10 Thread Greg Kroah-Hartman
From: Johannes Berg commit 0f3b07f027f87a38ebe5c436490095df762819be upstream. Rather than always iterating elements from frames with pure u8 pointers, add a type "struct element" that encapsulates the id/datalen/data format of them. Then, add the element iteration macros * for_each_element *

[PATCH 4.14 25/61] xen/xenbus: fix self-deadlock after killing user process

2019-10-10 Thread Greg Kroah-Hartman
From: Juergen Gross commit a8fabb38525c51a094607768bac3ba46b3f4a9d5 upstream. In case a user process using xenbus has open transactions and is killed e.g. via ctrl-C the following cleanup of the allocated resources might result in a deadlock due to trying to end a transaction in the xenbus worke

[PATCH 4.14 44/61] perf unwind: Fix libunwind build failure on i386 systems

2019-10-10 Thread Greg Kroah-Hartman
From: Arnaldo Carvalho de Melo [ Upstream commit 26acf400d2dcc72c7e713e1f55db47ad92010cc2 ] Naresh Kamboju reported, that on the i386 build pr_err() doesn't get defined properly due to header ordering: perf-in.o: In function `libunwind__x86_reg_id': tools/perf/util/libunwind/../../arch/x86/

[PATCH 4.14 40/61] fuse: fix memleak in cuse_channel_open

2019-10-10 Thread Greg Kroah-Hartman
From: zhengbin [ Upstream commit 9ad09b1976c562061636ff1e01bfc3a57aebe56b ] If cuse_send_init fails, need to fuse_conn_put cc->fc. cuse_channel_open->fuse_conn_init->refcount_set(&fc->count, 1) ->fuse_dev_alloc->fuse_conn_get ->fuse_dev_free->fuse_conn_put Fix

[PATCH 4.14 54/61] perf stat: Reset previous counts on repeat with interval

2019-10-10 Thread Greg Kroah-Hartman
From: Srikar Dronamraju [ Upstream commit b63fd11cced17fcb8e133def29001b0f6aaa5e06 ] When using 'perf stat' with repeat and interval option, it shows wrong values for events. The wrong values will be shown for the first interval on the second and subsequent repetitions. Without the fix: # p

[PATCH 4.14 53/61] perf stat: Fix a segmentation fault when using repeat forever

2019-10-10 Thread Greg Kroah-Hartman
From: Srikar Dronamraju [ Upstream commit 443f2d5ba13d65ccfd879460f77941875159d154 ] Observe a segmentation fault when 'perf stat' is asked to repeat forever with the interval option. Without fix: # perf stat -r 0 -I 5000 -e cycles -a sleep 10 # time counts unit event

[PATCH 4.14 50/61] tools lib traceevent: Do not free tep->cmdlines in add_new_comm() on failure

2019-10-10 Thread Greg Kroah-Hartman
From: Steven Rostedt (VMware) [ Upstream commit e0d2615856b2046c2e8d5bfd6933f37f69703b0b ] If the re-allocation of tep->cmdlines succeeds, then the previous allocation of tep->cmdlines will be freed. If we later fail in add_new_comm(), we must not free cmdlines, and also should assign tep->cmdli

[PATCH 4.14 59/61] cfg80211: Use const more consistently in for_each_element macros

2019-10-10 Thread Greg Kroah-Hartman
From: Jouni Malinen commit 7388afe09143210f555bdd6c75035e9acc1fab96 upstream. Enforce the first argument to be a correct type of a pointer to struct element and avoid unnecessary typecasts from const to non-const pointers (the change in validate_ie_attr() is needed to make this part work). In ad

[PATCH 4.14 55/61] drm/i915/userptr: Acquire the page lock around set_page_dirty()

2019-10-10 Thread Greg Kroah-Hartman
From: Chris Wilson [ Upstream commit cb6d7c7dc7ff8cace666ddec66334117a6068ce2 ] set_page_dirty says: For pages with a mapping this should be done under the page lock for the benefit of asynchronous memory errors who prefer a consistent dirty state. This rule can be broke

[PATCH 4.14 49/61] powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt()

2019-10-10 Thread Greg Kroah-Hartman
From: Gautham R. Shenoy [ Upstream commit c784be435d5dae28d3b03db31753dd7a18733f0c ] The calls to arch_add_memory()/arch_remove_memory() are always made with the read-side cpu_hotplug_lock acquired via memory_hotplug_begin(). On pSeries, arch_add_memory()/arch_remove_memory() eventually call res

Re: [PATCH v2 1/2] dmaengine: avalon: Intel Avalon-MM DMA Interface for PCIe

2019-10-10 Thread Alexander Gordeev
On Wed, Oct 09, 2019 at 09:53:23PM +0300, Dan Carpenter wrote: > > > > + u32 *rd_flags = hw->dma_desc_table_rd.cpu_addr->flags; > > > > + u32 *wr_flags = hw->dma_desc_table_wr.cpu_addr->flags; > > > > + struct avalon_dma_desc *desc; > > > > + struct virt_dma_desc *vdesc; > >

[PATCH 4.14 57/61] coresight: etm4x: Use explicit barriers on enable/disable

2019-10-10 Thread Greg Kroah-Hartman
From: Andrew Murray commit 1004ce4c255fc3eb3ad9145ddd53547d1b7ce327 upstream. Synchronization is recommended before disabling the trace registers to prevent any start or stop points being speculative at the point of disabling the unit (section 7.3.77 of ARM IHI 0064D). Synchronization is also r

[PATCH 4.14 08/61] PM / devfreq: tegra: Fix kHz to Hz conversion

2019-10-10 Thread Greg Kroah-Hartman
From: Dmitry Osipenko commit 62bacb06b9f08965c4ef10e17875450490c948c0 upstream. The kHz to Hz is incorrectly converted in a few places in the code, this results in a wrong frequency being calculated because devfreq core uses OPP frequencies that are given in Hz to clamp the rate, while tegra-dev

[PATCH 4.14 22/61] mmc: sdhci: improve ADMA error reporting

2019-10-10 Thread Greg Kroah-Hartman
From: Russell King commit d1c536e3177390da43d99f20143b810c35433d1f upstream. ADMA errors are potentially data corrupting events; although we print the register state, we do not usefully print the ADMA descriptors. Worse than that, we print them by referencing their virtual address which is meani

[PATCH 4.14 09/61] ASoC: Define a set of DAPM pre/post-up events

2019-10-10 Thread Greg Kroah-Hartman
From: Oleksandr Suvorov commit cfc8f568aada98f9608a0a62511ca18d647613e2 upstream. Prepare to use SND_SOC_DAPM_PRE_POST_PMU definition to reduce coming code size and make it more readable. Cc: sta...@vger.kernel.org Signed-off-by: Oleksandr Suvorov Reviewed-by: Marcel Ziswiler Reviewed-by: Igo

[PATCH 4.14 35/61] netfilter: nf_tables: allow lookups in dynamic sets

2019-10-10 Thread Greg Kroah-Hartman
From: Florian Westphal [ Upstream commit acab713177377d9e0889c46bac7ff0cfb9a90c4d ] This un-breaks lookups in sets that have the 'dynamic' flag set. Given this active example configuration: table filter { set set1 { type ipv4_addr size 64 flags dynamic,timeout timeout 1m }

[PATCH 4.14 33/61] ceph: reconnect connection if session hang in opening state

2019-10-10 Thread Greg Kroah-Hartman
From: Erqi Chen [ Upstream commit 71a228bc8d65900179e37ac309e678f8c523f133 ] If client mds session is evicted in CEPH_MDS_SESSION_OPENING state, mds won't send session msg to client, and delayed_work skip CEPH_MDS_SESSION_OPENING state session, the session hang forever. Allow ceph_con_keepalive

[PATCH 4.14 06/61] KVM: PPC: Book3S HV: Dont lose pending doorbell request on migration on P9

2019-10-10 Thread Greg Kroah-Hartman
From: Paul Mackerras commit ff42df49e75f053a8a6b4c2533100cdcc23afe69 upstream. On POWER9, when userspace reads the value of the DPDES register on a vCPU, it is possible for 0 to be returned although there is a doorbell interrupt pending for the vCPU. This can lead to a doorbell interrupt being

[PATCH 4.14 04/61] s390/cio: avoid calling strlen on null pointer

2019-10-10 Thread Greg Kroah-Hartman
From: Vasily Gorbik commit ea298e6ee8b34b3ed4366be7eb799d0650ebe555 upstream. Fix the following kasan finding: BUG: KASAN: global-out-of-bounds in ccwgroup_create_dev+0x850/0x1140 Read of size 1 at addr by task systemd-udevd.r/561 CPU: 30 PID: 561 Comm: systemd-udevd.r Tainted:

Re: (RESEND) [PATCH] ocfs2: Fix error handling in ocfs2_setattr()

2019-10-10 Thread Joseph Qi
On 19/10/10 16:23, Chengguang Xu wrote: > Should set transfer_to[USRQUOTA/GRPQUOTA] to NULL > on error case before jump to do dqput(). > > Signed-off-by: Chengguang Xu Looks good. Reviewed-by: Joseph Qi > --- > fs/ocfs2/file.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/fs/

[PATCH 4.14 17/61] MIPS: Treat Loongson Extensions as ASEs

2019-10-10 Thread Greg Kroah-Hartman
From: Jiaxun Yang commit d2f965549006acb865c4638f1f030ebcefdc71f6 upstream. Recently, binutils had split Loongson-3 Extensions into four ASEs: MMI, CAM, EXT, EXT2. This patch do the samething in kernel and expose them in cpuinfo so applications can probe supported ASEs at runtime. Signed-off-by

[PATCH 4.14 21/61] drm/omap: fix max fclk divider for omap36xx

2019-10-10 Thread Greg Kroah-Hartman
From: Tomi Valkeinen commit e2c4ed148cf3ec8669a1d90dc66966028e5fad70 upstream. The OMAP36xx and AM/DM37x TRMs say that the maximum divider for DSS fclk (in CM_CLKSEL_DSS) is 32. Experimentation shows that this is not correct, and using divider of 32 breaks DSS with a flood or underflows and sync

[PATCH 4.19 083/114] tools lib traceevent: Do not free tep->cmdlines in add_new_comm() on failure

2019-10-10 Thread Greg Kroah-Hartman
From: Steven Rostedt (VMware) [ Upstream commit e0d2615856b2046c2e8d5bfd6933f37f69703b0b ] If the re-allocation of tep->cmdlines succeeds, then the previous allocation of tep->cmdlines will be freed. If we later fail in add_new_comm(), we must not free cmdlines, and also should assign tep->cmdli

[PATCH 4.19 106/114] vfs: Fix EOVERFLOW testing in put_compat_statfs64

2019-10-10 Thread Greg Kroah-Hartman
From: Eric Sandeen commit cc3a7bfe62b947b423fcb2cfe89fcba92bf48fa3 upstream. Today, put_compat_statfs64() disallows nearly any field value over 2^32 if f_bsize is only 32 bits, but that makes no sense. compat_statfs64 is there for the explicit purpose of providing 64-bit fields for f_files, f_ff

[PATCH 4.19 092/114] arm64: fix SSBS sanitization

2019-10-10 Thread Greg Kroah-Hartman
From: Mark Rutland [ Upstream commit f54dada8274643e3ff4436df0ea124aeedc43cae ] In valid_user_regs() we treat SSBS as a RES0 bit, and consequently it is unexpectedly cleared when we restore a sigframe or fiddle with GPRs via ptrace. This patch fixes valid_user_regs() to account for this, updati

Re: [PATCH 5.3 076/148] mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence

2019-10-10 Thread Russell King - ARM Linux admin
Hi Greg, On 5th October, Christian Zigotzky reported a problem with this on PowerPC (at a guess, it looks like there's a PowerPC user of this where the DT does not mark the device as dma-coherent, but the hardware requires it to be DMA coherent.) However, despite sending a reply to him within mi

[PATCH 4.19 090/114] KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe

2019-10-10 Thread Greg Kroah-Hartman
From: Will Deacon [ Upstream commit 7c36447ae5a090729e7b129f24705bb231a07e0b ] When running without VHE, it is necessary to set SCTLR_EL2.DSSBS if SSBD has been forcefully disabled on the kernel command-line. Acked-by: Christoffer Dall Signed-off-by: Will Deacon Signed-off-by: Catalin Marinas

[PATCH 4.14 11/61] can: mcp251x: mcp251x_hw_reset(): allow more time after a reset

2019-10-10 Thread Greg Kroah-Hartman
From: Marc Kleine-Budde commit d84ea2123f8d27144e3f4d58cd88c9c6ddc799de upstream. Some boards take longer than 5ms to power up after a reset, so allow some retries attempts before giving up. Fixes: ff06d611a31c ("can: mcp251x: Improve mcp251x_hw_reset()") Cc: linux-stable Tested-by: Sean Nyekj

[PATCH 4.19 088/114] riscv: Avoid interrupts being erroneously enabled in handle_exception()

2019-10-10 Thread Greg Kroah-Hartman
From: Vincent Chen [ Upstream commit c82dd6d078a2bb29d41eda032bb96d05699a524d ] When the handle_exception function addresses an exception, the interrupts will be unconditionally enabled after finishing the context save. However, It may erroneously enable the interrupts if the interrupts are disa

[PATCH 4.19 091/114] arm64: docs: Document SSBS HWCAP

2019-10-10 Thread Greg Kroah-Hartman
From: Will Deacon [ Upstream commit ee91176120bd584aa10c564e7e9fdcaf397190a1 ] We advertise the MRS/MSR instructions for toggling SSBS at EL0 using an HWCAP, so document it along with the others. Signed-off-by: Will Deacon Signed-off-by: Catalin Marinas Signed-off-by: Ard Biesheuvel Signed-o

Re: [PATCH] staging: qlge: fix "alignment should match open parenthesis" check

2019-10-10 Thread Greg KH
On Wed, Oct 09, 2019 at 02:59:09PM +0100, Jules Irenge wrote: > Fix "alignment should match open parenthesis" check > issued by checkpatch.pl tool: > "CHECK: Alignment should match open parenthesis". > > Signed-off-by: Jules Irenge > --- > drivers/staging/qlge/qlge_dbg.c | 2 +- > 1 file change

[PATCH 4.19 089/114] arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3

2019-10-10 Thread Greg Kroah-Hartman
From: Will Deacon [ Upstream commit 8f04e8e6e29c93421a95b61cad62e3918425eac7 ] On CPUs with support for PSTATE.SSBS, the kernel can toggle the SSBD state without needing to call into firmware. This patch hooks into the existing SSBD infrastructure so that SSBS is used on CPUs that support it, b

Re: [PATCH] KPC2000: kpc2000_spi.c: Fix style issues (line length)

2019-10-10 Thread Greg KH
On Wed, Oct 09, 2019 at 08:08:57PM -0700, Chandra Annamaneni wrote: > Resoved: "WARNING: line over 80 characters" from checkpatch.pl > > Signed-off-by: Chandra Annamaneni > --- > drivers/staging/kpc2000/kpc2000_spi.c | 20 ++-- > 1 file changed, 10 insertions(+), 10 deletions(-)

[PATCH 4.19 041/114] mmc: sdhci: improve ADMA error reporting

2019-10-10 Thread Greg Kroah-Hartman
From: Russell King commit d1c536e3177390da43d99f20143b810c35433d1f upstream. ADMA errors are potentially data corrupting events; although we print the register state, we do not usefully print the ADMA descriptors. Worse than that, we print them by referencing their virtual address which is meani

[PATCH 4.19 095/114] arm64: enable generic CPU vulnerabilites support

2019-10-10 Thread Greg Kroah-Hartman
From: Mian Yousaf Kaukab [ Upstream commit 61ae1321f06c4489c724c803e9b8363dea576da3 ] Enable CPU vulnerabilty show functions for spectre_v1, spectre_v2, meltdown and store-bypass. Signed-off-by: Mian Yousaf Kaukab Signed-off-by: Jeremy Linton Reviewed-by: Andre Przywara Reviewed-by: Catalin

Re: [PATCH 0/3] eldie generated code for folded p4d/pud

2019-10-10 Thread Kirill A. Shutemov
On Wed, Oct 09, 2019 at 10:26:55PM +, Vineet Gupta wrote: > Hi, > > This series elides extraneous generate code for folded p4d/pud. > This came up when trying to remove __ARCH_USE_5LEVEL_HACK from ARC port. > The code saving are not a while lot, but still worthwhile IMHO. Agreed. Acked-by: K

[PATCH 4.19 074/114] kernel/elfcore.c: include proper prototypes

2019-10-10 Thread Greg Kroah-Hartman
From: Valdis Kletnieks [ Upstream commit 0f74914071ab7e7b78731ed62bf350e3a344e0a5 ] When building with W=1, gcc properly complains that there's no prototypes: CC kernel/elfcore.o kernel/elfcore.c:7:17: warning: no previous prototype for 'elf_core_extra_phdrs' [-Wmissing-prototypes]

[PATCH 4.19 101/114] arm64: add sysfs vulnerability show for speculative store bypass

2019-10-10 Thread Greg Kroah-Hartman
From: Jeremy Linton [ Upstream commit 526e065dbca6df0b5a130b84b836b8b3c9f54e21 ] Return status based on ssbd_state and __ssb_safe. If the mitigation is disabled, or the firmware isn't responding then return the expected machine state based on a whitelist of known good cores. Given a heterogeneo

[PATCH 4.19 077/114] drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed

2019-10-10 Thread Greg Kroah-Hartman
From: Hans de Goede [ Upstream commit 9dbc88d013b79c62bd845cb9e7c0256e660967c5 ] Bail from the pci_driver probe function instead of from the drm_driver load function. This avoid /dev/dri/card0 temporarily getting registered and then unregistered again, sending unwanted add / remove udev events

[PATCH 4.19 103/114] arm64: Force SSBS on context switch

2019-10-10 Thread Greg Kroah-Hartman
From: Marc Zyngier [ Upstream commit cbdf8a189a66001c36007bf0f5c975d0376c5c3a ] On a CPU that doesn't support SSBS, PSTATE[12] is RES0. In a system where only some of the CPUs implement SSBS, we end-up losing track of the SSBS bit across task migration. To address this issue, let's force the S

[PATCH 4.19 076/114] nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs

2019-10-10 Thread Greg Kroah-Hartman
From: Navid Emamdoost [ Upstream commit 8ce39eb5a67aee25d9f05b40b673c95b23502e3e ] In nfp_flower_spawn_vnic_reprs in the loop if initialization or the allocations fail memory is leaked. Appropriate releases are added. Fixes: b94524529741 ("nfp: flower: add per repr private data for LAG offload"

[PATCH 4.19 067/114] libnvdimm/region: Initialize bad block for volatile namespaces

2019-10-10 Thread Greg Kroah-Hartman
From: Aneesh Kumar K.V [ Upstream commit c42adf87e4e7ed77f6ffe288dc90f980d07d68df ] We do check for a bad block during namespace init and that use region bad block list. We need to initialize the bad block for volatile regions for this to work. We also observe a lockdep warning as below because

[PATCH 4.19 069/114] libnvdimm/nfit_test: Fix acpi_handle redefinition

2019-10-10 Thread Greg Kroah-Hartman
From: Nathan Chancellor [ Upstream commit 59f08896f058a92f03a0041b397a1a227c5e8529 ] After commit 62974fc389b3 ("libnvdimm: Enable unit test infrastructure compile checks"), clang warns: In file included from ../drivers/nvdimm/../../tools/testing/nvdimm/test/iomap.c:15: ../drivers/nvdimm/../../

[PATCH 4.19 071/114] sched/membarrier: Fix private expedited registration check

2019-10-10 Thread Greg Kroah-Hartman
From: Mathieu Desnoyers [ Upstream commit fc0d77387cb5ae883fd774fc559e056a8dde024c ] Fix a logic flaw in the way membarrier_register_private_expedited() handles ready state checks for private expedited sync core and private expedited registrations. If a private expedited membarrier registration

[PATCH 4.19 102/114] arm64: ssbs: Dont treat CPUs with SSBS as unaffected by SSB

2019-10-10 Thread Greg Kroah-Hartman
From: Will Deacon [ Upstream commit eb337cdfcd5dd3b10522c2f34140a73a4c285c30 ] SSBS provides a relatively cheap mitigation for SSB, but it is still a mitigation and its presence does not indicate that the CPU is unaffected by the vulnerability. Tweak the mitigation logic so that we report the c

[PATCH 4.19 068/114] fuse: fix memleak in cuse_channel_open

2019-10-10 Thread Greg Kroah-Hartman
From: zhengbin [ Upstream commit 9ad09b1976c562061636ff1e01bfc3a57aebe56b ] If cuse_send_init fails, need to fuse_conn_put cc->fc. cuse_channel_open->fuse_conn_init->refcount_set(&fc->count, 1) ->fuse_dev_alloc->fuse_conn_get ->fuse_dev_free->fuse_conn_put Fix

[PATCH 4.19 098/114] arm64: Advertise mitigation of Spectre-v2, or lack thereof

2019-10-10 Thread Greg Kroah-Hartman
From: Marc Zyngier [ Upstream commit 73f38166095947f3b86b02fbed6bd592223a7ac8 ] We currently have a list of CPUs affected by Spectre-v2, for which we check that the firmware implements ARCH_WORKAROUND_1. It turns out that not all firmwares do implement the required mitigation, and that we fail t

[PATCH 4.19 009/114] KVM: nVMX: handle page fault in vmread fix

2019-10-10 Thread Greg Kroah-Hartman
From: Jack Wang During backport f7eea636c3d5 ("KVM: nVMX: handle page fault in vmread"), there was a mistake the exception reference should be passed to function kvm_write_guest_virt_system, instead of NULL, other wise, we will get NULL pointer deref, eg kvm-unit-test triggered a NULL pointer de

[PATCH 4.19 050/114] ima: fix freeing ongoing ahash_request

2019-10-10 Thread Greg Kroah-Hartman
From: Sascha Hauer [ Upstream commit 4ece3125f21b1d42b84896c5646dbf0e878464e1 ] integrity_kernel_read() can fail in which case we forward to call ahash_request_free() on a currently running request. We have to wait for its completion before we can free the request. This was observed by interrup

[PATCH 4.19 046/114] s390/cio: avoid calling strlen on null pointer

2019-10-10 Thread Greg Kroah-Hartman
From: Vasily Gorbik commit ea298e6ee8b34b3ed4366be7eb799d0650ebe555 upstream. Fix the following kasan finding: BUG: KASAN: global-out-of-bounds in ccwgroup_create_dev+0x850/0x1140 Read of size 1 at addr by task systemd-udevd.r/561 CPU: 30 PID: 561 Comm: systemd-udevd.r Tainted:

[PATCH 4.19 000/114] 4.19.79-stable review

2019-10-10 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.19.79 release. There are 114 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sat 12 Oct 2019 08:29:51 AM UTC. Anything re

Re: [PATCH v6] numa: make node_to_cpumask_map() NUMA_NO_NODE aware

2019-10-10 Thread Peter Zijlstra
On Wed, Oct 09, 2019 at 01:25:14PM +0100, Robin Murphy wrote: > On 2019-10-08 9:38 am, Yunsheng Lin wrote: > > On 2019/9/25 18:41, Peter Zijlstra wrote: > > > On Wed, Sep 25, 2019 at 05:14:20PM +0800, Yunsheng Lin wrote: > > > > From the discussion above, It seems making the node_to_cpumask_map()

[PATCH 4.19 048/114] arm64: cpufeature: Detect SSBS and advertise to userspace

2019-10-10 Thread Greg Kroah-Hartman
From: Will Deacon commit d71be2b6c0e19180b5f80a6d42039cc074a693a2 upstream. Armv8.5 introduces a new PSTATE bit known as Speculative Store Bypass Safe (SSBS) which can be used as a mitigation against Spectre variant 4. Additionally, a CPU may provide instructions to manipulate PSTATE.SSBS direc

[PATCH 4.19 072/114] sched/core: Fix migration to invalid CPU in __set_cpus_allowed_ptr()

2019-10-10 Thread Greg Kroah-Hartman
From: KeMeng Shi [ Upstream commit 714e501e16cd473538b609b3e351b2cc9f7f09ed ] An oops can be triggered in the scheduler when running qemu on arm64: Unable to handle kernel paging request at virtual address 08effe40 Internal error: Oops: 9607 [#1] SMP Process migration/0 (pid: 12,

[PATCH 4.19 054/114] xen/pci: reserve MCFG areas earlier

2019-10-10 Thread Greg Kroah-Hartman
From: Igor Druzhinin [ Upstream commit a4098bc6eed5e31e0391bcc068e61804c98138df ] If MCFG area is not reserved in E820, Xen by default will defer its usage until Dom0 registers it explicitly after ACPI parser recognizes it as a reserved resource in DSDT. Having it reserved in E820 is not mandato

[PATCH 4.19 059/114] drm/amdgpu: Fix KFD-related kernel oops on Hawaii

2019-10-10 Thread Greg Kroah-Hartman
From: Felix Kuehling [ Upstream commit dcafbd50f2e4d5cc964aae409fb5691b743fba23 ] Hawaii needs to flush caches explicitly, submitting an IB in a user VMID from kernel mode. There is no s_fence in this case. Fixes: eb3961a57424 ("drm/amdgpu: remove fence context from the job") Signed-off-by: Fel

[PATCH 4.19 066/114] thermal_hwmon: Sanitize thermal_zone type

2019-10-10 Thread Greg Kroah-Hartman
From: Stefan Mavrodiev [ Upstream commit 8c7aa184281c01fc26f319059efb94725012921d ] When calling thermal_add_hwmon_sysfs(), the device type is sanitized by replacing '-' with '_'. However tz->type remains unsanitized. Thus calling thermal_hwmon_lookup_by_type() returns no device. And if there is

[PATCH 4.19 038/114] drm/msm/dsi: Fix return value check for clk_get_parent

2019-10-10 Thread Greg Kroah-Hartman
From: Sean Paul commit 5fb9b797d5ccf311ae4aba69e86080d47668b5f7 upstream. clk_get_parent returns an error pointer upon failure, not NULL. So the checks as they exist won't catch a failure. This patch changes the checks and the return values to properly handle an error pointer. Fixes: c4d8cfe516

[PATCH 4.19 063/114] x86/purgatory: Disable the stackleak GCC plugin for the purgatory

2019-10-10 Thread Greg Kroah-Hartman
From: Arvind Sankar [ Upstream commit ca14c996afe7228ff9b480cf225211cc17212688 ] Since commit: b059f801a937 ("x86/purgatory: Use CFLAGS_REMOVE rather than reset KBUILD_CFLAGS") kexec breaks if GCC_PLUGIN_STACKLEAK=y is enabled, as the purgatory contains undefined references to stackleak_tra

[PATCH 4.19 058/114] netfilter: nf_tables: allow lookups in dynamic sets

2019-10-10 Thread Greg Kroah-Hartman
From: Florian Westphal [ Upstream commit acab713177377d9e0889c46bac7ff0cfb9a90c4d ] This un-breaks lookups in sets that have the 'dynamic' flag set. Given this active example configuration: table filter { set set1 { type ipv4_addr size 64 flags dynamic,timeout timeout 1m }

Re: [PATCH 3/4] staging: rtl8723bs: Remove comparisons to booleans in conditionals.

2019-10-10 Thread Dan Carpenter
On Thu, Oct 10, 2019 at 06:39:23AM +0300, Wambui Karuga wrote: > if (is_primary_adapter(adapter)) > DBG_871X("IsBtDisabled =%d, IsBtControlLps =%d\n", > hal_btcoex_IsBtDisabled(adapter), hal_btcoex_IsBtControlLps(adapter)); > > - if ((adapter_to_pwrctl(adapter)->bFwCurren

[PATCH 4.19 032/114] timer: Read jiffies once when forwarding base clk

2019-10-10 Thread Greg Kroah-Hartman
From: Li RongQing commit e430d802d6a3aaf61bd3ed03d9404888a29b9bf9 upstream. The timer delayed for more than 3 seconds warning was triggered during testing. Workqueue: events_unbound sched_tick_remote RIP: 0010:sched_tick_remote+0xee/0x100 ... Call Trace: process_one_work+0x18c/0x3a0

[PATCH 4.19 007/114] KVM: PPC: Book3S HV: Dont lose pending doorbell request on migration on P9

2019-10-10 Thread Greg Kroah-Hartman
From: Paul Mackerras commit ff42df49e75f053a8a6b4c2533100cdcc23afe69 upstream. On POWER9, when userspace reads the value of the DPDES register on a vCPU, it is possible for 0 to be returned although there is a doorbell interrupt pending for the vCPU. This can lead to a doorbell interrupt being

[PATCH 4.19 020/114] tools lib traceevent: Fix "robust" test of do_generate_dynamic_list_file

2019-10-10 Thread Greg Kroah-Hartman
From: Steven Rostedt (VMware) commit 82a2f88458d70704be843961e10b5cef9a6e95d3 upstream. The tools/lib/traceevent/Makefile had a test added to it to detect a failure of the "nm" when making the dynamic list file (whatever that is). The problem is that the test sorts the values "U W w" and some ve

[PATCH 4.19 029/114] power: supply: sbs-battery: only return health when battery present

2019-10-10 Thread Greg Kroah-Hartman
From: Michael Nosthoff commit fe55e770327363304c4111423e6f7ff3c650136d upstream. when the battery is set to sbs-mode and no gpio detection is enabled "health" is always returning a value even when the battery is not present. All other fields return "not present". This leads to a scenario where

[PATCH 4.19 022/114] crypto: skcipher - Unmap pages after an external error

2019-10-10 Thread Greg Kroah-Hartman
From: Herbert Xu commit 0ba3c026e685573bd3534c17e27da7c505ac99c4 upstream. skcipher_walk_done may be called with an error by internal or external callers. For those internal callers we shouldn't unmap pages but for external callers we must unmap any pages that are in use. This patch distinguis

[PATCH 4.19 015/114] powerpc/mce: Schedule work from irq_work

2019-10-10 Thread Greg Kroah-Hartman
From: Santosh Sivaraj commit b5bda6263cad9a927e1a4edb7493d542da0c1410 upstream. schedule_work() cannot be called from MCE exception context as MCE can interrupt even in interrupt disabled context. Fixes: 733e4a4c4467 ("powerpc/mce: hookup memory_failure for UE errors") Cc: sta...@vger.kernel.or

[PATCH 4.19 002/114] KVM: s390: Test for bad access register and size at the start of S390_MEM_OP

2019-10-10 Thread Greg Kroah-Hartman
From: Thomas Huth commit a13b03bbb4575b350b46090af4dfd30e735aaed1 upstream. If the KVM_S390_MEM_OP ioctl is called with an access register >= 16, then there is certainly a bug in the calling userspace application. We check for wrong access registers, but only if the vCPU was already in the acces

[PATCH 4.19 003/114] s390/topology: avoid firing events before kobjs are created

2019-10-10 Thread Greg Kroah-Hartman
From: Vasily Gorbik commit f3122a79a1b0a113d3aea748e0ec26f2cb2889de upstream. arch_update_cpu_topology is first called from: kernel_init_freeable->sched_init_smp->sched_init_domains even before cpus has been registered in: kernel_init_freeable->do_one_initcall->s390_smp_init Do not trigger kob

<    1   2   3   4   5   6   7   8   9   10   >