[PATCH 4.4 16/19] SMB3: Honor persistent/resilient handle flags for multiuser mounts

2020-07-07 Thread Greg Kroah-Hartman
From: Paul Aurich commit 00dfbc2f9c61185a2e662f27c45a0bb29b2a134f upstream. Without this: - persistent handles will only be enabled for per-user tcons if the server advertises the 'Continuous Availabity' capability - resilient handles would never be enabled for per-user tcons Signed-off-by:

Re: [PATCH 1/4] dma-mapping: add a new dma_need_sync API

2020-07-07 Thread Jonathan Lemon
On Tue, Jul 07, 2020 at 08:47:30AM +0200, Christoph Hellwig wrote: > On Mon, Jul 06, 2020 at 12:42:27PM -0700, Jonathan Lemon wrote: > > On Mon, Jun 29, 2020 at 03:03:56PM +0200, Christoph Hellwig wrote: > > > Add a new API to check if calls to dma_sync_single_for_{device,cpu} are > > > required fo

[PATCH 4.4 18/19] MIPS: Add missing EHB in mtc0 -> mfc0 sequence for DSPen

2020-07-07 Thread Greg Kroah-Hartman
From: Hauke Mehrtens commit fcec538ef8cca0ad0b84432235dccd9059c8e6f8 upstream. This resolves the hazard between the mtc0 in the change_c0_status() and the mfc0 in configure_exception_vector(). Without resolving this hazard configure_exception_vector() could read an old value and would restore th

[PATCH 4.4 08/19] crypto: af_alg - fix use-after-free in af_alg_accept() due to bh_lock_sock()

2020-07-07 Thread Greg Kroah-Hartman
From: Herbert Xu commit 34c86f4c4a7be3b3e35aa48bd18299d4c756064d upstream. The locking in af_alg_release_parent is broken as the BH socket lock can only be taken if there is a code-path to handle the case where the lock is owned by process-context. Instead of adding such handling, we can fix th

[PATCH 4.4 04/19] EDAC/amd64: Read back the scrub rate PCI register on F15h

2020-07-07 Thread Greg Kroah-Hartman
From: Borislav Petkov [ Upstream commit ee470bb25d0dcdf126f586ec0ae6dca66cb340a4 ] Commit: da92110dfdfa ("EDAC, amd64_edac: Extend scrub rate support to F15hM60h") added support for F15h, model 0x60 CPUs but in doing so, missed to read back SCRCTRL PCI config register on F15h CPUs which are

[PATCH 4.4 07/19] kgdb: Avoid suspicious RCU usage warning

2020-07-07 Thread Greg Kroah-Hartman
From: Douglas Anderson [ Upstream commit 440ab9e10e2e6e5fd677473ee6f9e3af0f6904d6 ] At times when I'm using kgdb I see a splat on my console about suspicious RCU usage. I managed to come up with a case that could reproduce this that looked like this: WARNING: suspicious RCU usage 5.7.0-rc4

[PATCH 4.4 00/19] 4.4.230-rc1 review

2020-07-07 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.4.230 release. There are 19 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 09 Jul 2020 14:57:34 +. Anything rec

Re: [PATCH v2 07/15] tools lib traceevent: Optimize pretty_print() function

2020-07-07 Thread Namhyung Kim
On Fri, Jul 3, 2020 at 3:57 AM Steven Rostedt wrote: > > From: "Tzvetomir Stoyanov (VMware)" > > Each time the pretty_print() function is called to print an event, > the event's format string is parsed. As this format string does not > change, this parsing can be done only once - when the event s

[PATCH 4.4 06/19] usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect

2020-07-07 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 28ebeb8db77035e058a510ce9bd17c2b9a009dba ] BUG: memory leak unreferenced object 0x888055046e00 (size 256): comm "kworker/2:9", pid 2570, jiffies 4294942129 (age 1095.500s) hex dump (first 32 bytes): 00 70 04 55 80 88 ff ff 18 bb 5a 81 ff ff ff ff .p.U.

[PATCH 4.4 12/19] virtio-blk: free vblk-vqs in error path of virtblk_probe()

2020-07-07 Thread Greg Kroah-Hartman
From: Hou Tao [ Upstream commit e7eea44eefbdd5f0345a0a8b80a3ca1c21030d06 ] Else there will be memory leak if alloc_disk() fails. Fixes: 6a27b656fc02 ("block: virtio-blk: support multi virt queues per virtio-blk device") Signed-off-by: Hou Tao Reviewed-by: Stefano Garzarella Reviewed-by: Ming

Re: [PATCH] drm/radeon: fix double free

2020-07-07 Thread Alex Deucher
Applied. Thanks! Alex On Mon, Jul 6, 2020 at 8:29 AM wrote: > > From: Tom Rix > > clang static analysis flags this error > > drivers/gpu/drm/radeon/ci_dpm.c:5652:9: warning: Use of memory after it is > freed [unix.Malloc] > kfree(rdev->pm.dpm.ps[i].ps_priv); >

[PATCH 4.4 02/19] btrfs: fix data block group relocation failure due to concurrent scrub

2020-07-07 Thread Greg Kroah-Hartman
From: Filipe Manana [ Upstream commit 432cd2a10f1c10cead91fe706ff5dc52f06d642a ] When running relocation of a data block group while scrub is running in parallel, it is possible that the relocation will fail and abort the current transaction with an -EINVAL error: [134243.988595] BTRFS info

INFO: rcu detected stall in sys_clock_adjtime

2020-07-07 Thread syzbot
Hello, syzbot found the following crash on: HEAD commit:7cc2a8ea Merge tag 'block-5.8-2020-07-01' of git://git.ker.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1204932f10 kernel config: https://syzkaller.appspot.com/x/.config?x=183dd243398ba7ec das

[PATCH 4.9 11/24] crypto: af_alg - fix use-after-free in af_alg_accept() due to bh_lock_sock()

2020-07-07 Thread Greg Kroah-Hartman
From: Herbert Xu commit 34c86f4c4a7be3b3e35aa48bd18299d4c756064d upstream. The locking in af_alg_release_parent is broken as the BH socket lock can only be taken if there is a code-path to handle the case where the lock is owned by process-context. Instead of adding such handling, we can fix th

[PATCH 4.9 12/24] sched/rt: Show the sched_rr_timeslice SCHED_RR timeslice tuning knob in milliseconds

2020-07-07 Thread Greg Kroah-Hartman
From: Shile Zhang [ Upstream commit 975e155ed8732cb81f55c021c441ae662dd040b5 ] We added the 'sched_rr_timeslice_ms' SCHED_RR tuning knob in this commit: ce0d30ae ("sched/rt: Add a tuning knob to allow changing SCHED_RR timeslice") ... which name suggests to users that it's in millisecon

[PATCH 4.9 13/24] cxgb4: parse TC-U32 key values and masks natively

2020-07-07 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit 27f78cb245abdb86735529c13b0a579f57829e71 ] TC-U32 passes all keys values and masks in __be32 format. The parser already expects this and hence pass the value and masks in __be32 natively to the parser. Fixes following sparse warnings in several places: c

Re: [PATCH 4.4 14/19] Revert "ALSA: usb-audio: Improve frames size computation"

2020-07-07 Thread Takashi Iwai
On Tue, 07 Jul 2020 17:10:17 +0200, Greg Kroah-Hartman wrote: > > From: Greg Kroah-Hartman > > This reverts commit 02c56650f3c118d3752122996d96173d26bb13aa which is > commit f0bd62b64016508938df9babe47f65c2c727d25c upstream. > > It causes a number of reported issues and a fix for it has not hit

[PATCH 4.9 00/24] 4.9.230-rc1 review

2020-07-07 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.9.230 release. There are 24 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 09 Jul 2020 14:57:34 +. Anything rec

[PATCH 4.9 17/24] i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665

2020-07-07 Thread Greg Kroah-Hartman
From: Chris Packham [ Upstream commit cd217f2300793a106b49c7dfcbfb26e348bc7593 ] The PCA9665 datasheet says that I2CSTA = 78h indicates that SCL is stuck low, this differs to the PCA9564 which uses 90h for this indication. Treat either 0x78 or 0x90 as an indication that the SCL line is stuck. B

[PATCH 4.9 15/24] hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add()

2020-07-07 Thread Greg Kroah-Hartman
From: Misono Tomohiro [ Upstream commit 8b97f9922211c44a739c5cbd9502ecbb9f17f6d1 ] Although it rarely happens, we should call free_capabilities() if error happens after read_capabilities() to free allocated strings. Fixes: de584afa5e188 ("hwmon driver for ACPI 4.0 power meters") Signed-off-by:

[PATCH 4.9 05/24] EDAC/amd64: Read back the scrub rate PCI register on F15h

2020-07-07 Thread Greg Kroah-Hartman
From: Borislav Petkov [ Upstream commit ee470bb25d0dcdf126f586ec0ae6dca66cb340a4 ] Commit: da92110dfdfa ("EDAC, amd64_edac: Extend scrub rate support to F15hM60h") added support for F15h, model 0x60 CPUs but in doing so, missed to read back SCRCTRL PCI config register on F15h CPUs which are

[PATCH 4.9 24/24] efi: Make it possible to disable efivar_ssdt entirely

2020-07-07 Thread Greg Kroah-Hartman
From: Peter Jones commit 435d1a471598752446a72ad1201b3c980526d869 upstream. In most cases, such as CONFIG_ACPI_CUSTOM_DSDT and CONFIG_ACPI_TABLE_UPGRADE, boot-time modifications to firmware tables are tied to specific Kconfig options. Currently this is not the case for modifying the ACPI SSDT v

[PATCH 4.9 22/24] MIPS: Add missing EHB in mtc0 -> mfc0 sequence for DSPen

2020-07-07 Thread Greg Kroah-Hartman
From: Hauke Mehrtens commit fcec538ef8cca0ad0b84432235dccd9059c8e6f8 upstream. This resolves the hazard between the mtc0 in the change_c0_status() and the mfc0 in configure_exception_vector(). Without resolving this hazard configure_exception_vector() could read an old value and would restore th

[PATCH 4.9 23/24] netfilter: nf_conntrack_h323: lost .data_len definition for Q.931/ipv6

2020-07-07 Thread Greg Kroah-Hartman
From: Vasily Averin Could you please push this patch into stable@? it fixes memory corruption in kernels v3.5 .. v4.10 Lost .data_len definition leads to write beyond end of struct nf_ct_h323_master. Usually it corrupts following struct nf_conn_nat, however if nat is not loaded it corrupts foll

[PATCH 4.9 20/24] SMB3: Honor persistent/resilient handle flags for multiuser mounts

2020-07-07 Thread Greg Kroah-Hartman
From: Paul Aurich commit 00dfbc2f9c61185a2e662f27c45a0bb29b2a134f upstream. Without this: - persistent handles will only be enabled for per-user tcons if the server advertises the 'Continuous Availabity' capability - resilient handles would never be enabled for per-user tcons Signed-off-by:

[PATCH 4.9 06/24] usbnet: smsc95xx: Fix use-after-free after removal

2020-07-07 Thread Greg Kroah-Hartman
From: Tuomas Tynkkynen [ Upstream commit b835a71ef64a61383c414d6bf2896d2c0161deca ] Syzbot reports an use-after-free in workqueue context: BUG: KASAN: use-after-free in mutex_unlock+0x19/0x40 kernel/locking/mutex.c:737 mutex_unlock+0x19/0x40 kernel/locking/mutex.c:737 __smsc95xx_mdio_read dri

[PATCH 4.9 18/24] Revert "ALSA: usb-audio: Improve frames size computation"

2020-07-07 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 5ef30e443e6d3654cccecec99cf481a69a0a6d3b which is commit f0bd62b64016508938df9babe47f65c2c727d25c upstream. It causes a number of reported issues and a fix for it has not hit Linus's tree yet. Revert this to resolve those problems. Cc: Alexander Tso

[PATCH 4.9 09/24] usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect

2020-07-07 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 28ebeb8db77035e058a510ce9bd17c2b9a009dba ] BUG: memory leak unreferenced object 0x888055046e00 (size 256): comm "kworker/2:9", pid 2570, jiffies 4294942129 (age 1095.500s) hex dump (first 32 bytes): 00 70 04 55 80 88 ff ff 18 bb 5a 81 ff ff ff ff .p.U.

[PATCH 4.9 01/24] btrfs: fix a block group ref counter leak after failure to remove block group

2020-07-07 Thread Greg Kroah-Hartman
From: Filipe Manana [ Upstream commit 9fecd13202f520f3f25d5b1c313adb740fe19773 ] When removing a block group, if we fail to delete the block group's item from the extent tree, we jump to the 'out' label and end up decrementing the block group's reference count once only (by 1), resulting in a co

[PATCH 4.9 19/24] SMB3: Honor seal flag for multiuser mounts

2020-07-07 Thread Greg Kroah-Hartman
From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons

[PATCH 4.9 21/24] cifs: Fix the target file was deleted when rename failed.

2020-07-07 Thread Greg Kroah-Hartman
From: Zhang Xiaoxu commit 9ffad9263b467efd8f8dc7ae1941a0a655a2bab2 upstream. When xfstest generic/035, we found the target file was deleted if the rename return -EACESS. In cifs_rename2, we unlink the positive target dentry if rename failed with EACESS or EEXIST, even if the target dentry is po

[PATCH 4.9 10/24] kgdb: Avoid suspicious RCU usage warning

2020-07-07 Thread Greg Kroah-Hartman
From: Douglas Anderson [ Upstream commit 440ab9e10e2e6e5fd677473ee6f9e3af0f6904d6 ] At times when I'm using kgdb I see a splat on my console about suspicious RCU usage. I managed to come up with a case that could reproduce this that looked like this: WARNING: suspicious RCU usage 5.7.0-rc4

[PATCH 4.9 07/24] mm/slub.c: fix corrupted freechain in deactivate_slab()

2020-07-07 Thread Greg Kroah-Hartman
From: Dongli Zhang [ Upstream commit 52f23478081ae0dcdb95d1650ea1e7d52d586829 ] The slub_debug is able to fix the corrupted slab freelist/page. However, alloc_debug_processing() only checks the validity of current and next freepointer during allocation path. As a result, once some objects have

[PATCH 4.9 08/24] mm/slub: fix stack overruns with SLUB_STATS

2020-07-07 Thread Greg Kroah-Hartman
From: Qian Cai [ Upstream commit a68ee0573991e90af2f1785db309206408bad3e5 ] There is no need to copy SLUB_STATS items from root memcg cache to new memcg cache copies. Doing so could result in stack overruns because the store function only accepts 0 to clear the stat and returns an error for eve

Re: [PATCH 1/4] dma-mapping: add a new dma_need_sync API

2020-07-07 Thread Christoph Hellwig
On Tue, Jul 07, 2020 at 08:11:09AM -0700, Jonathan Lemon wrote: > > You need to check every mapping. E.g. this API pairs with a > > dma_map_single/page call. For S/G mappings you'd need to call it for > > each entry, although if you have a use case for that we really should > > add a dma_sg_need_

[PATCH 4.9 04/24] mm: fix swap cache node allocation mask

2020-07-07 Thread Greg Kroah-Hartman
From: Hugh Dickins [ Upstream commit 243bce09c91b0145aeaedd5afba799d81841c030 ] Chris Murphy reports that a slightly overcommitted load, testing swap and zram along with i915, splats and keeps on splatting, when it had better fail less noisily: gnome-shell: page allocation failure: order:0,

[PATCH 4.9 16/24] virtio-blk: free vblk-vqs in error path of virtblk_probe()

2020-07-07 Thread Greg Kroah-Hartman
From: Hou Tao [ Upstream commit e7eea44eefbdd5f0345a0a8b80a3ca1c21030d06 ] Else there will be memory leak if alloc_disk() fails. Fixes: 6a27b656fc02 ("block: virtio-blk: support multi virt queues per virtio-blk device") Signed-off-by: Hou Tao Reviewed-by: Stefano Garzarella Reviewed-by: Ming

[PATCH 4.14 10/27] kgdb: Avoid suspicious RCU usage warning

2020-07-07 Thread Greg Kroah-Hartman
From: Douglas Anderson [ Upstream commit 440ab9e10e2e6e5fd677473ee6f9e3af0f6904d6 ] At times when I'm using kgdb I see a splat on my console about suspicious RCU usage. I managed to come up with a case that could reproduce this that looked like this: WARNING: suspicious RCU usage 5.7.0-rc4

[PATCH 4.9 02/24] btrfs: cow_file_range() num_bytes and disk_num_bytes are same

2020-07-07 Thread Greg Kroah-Hartman
From: Anand Jain [ Upstream commit 3752d22fcea160cc2493e34f5e0e41cdd7fdd921 ] This patch deletes local variable disk_num_bytes as its value is same as num_bytes in the function cow_file_range(). Signed-off-by: Anand Jain Reviewed-by: Nikolay Borisov Reviewed-by: David Sterba Signed-off-by: D

Re: [PATCH v7 00/12] Multiple fixes in PCIe qcom driver

2020-07-07 Thread Lorenzo Pieralisi
On Mon, Jun 15, 2020 at 11:05:56PM +0200, Ansuel Smith wrote: > This contains multiple fix for PCIe qcom driver. > Some optional reset and clocks were missing. > Fix a problem with no PARF programming that cause kernel lock on load. > Add support to force gen 1 speed if needed. (due to hardware lim

[PATCH 4.9 03/24] btrfs: fix data block group relocation failure due to concurrent scrub

2020-07-07 Thread Greg Kroah-Hartman
From: Filipe Manana [ Upstream commit 432cd2a10f1c10cead91fe706ff5dc52f06d642a ] When running relocation of a data block group while scrub is running in parallel, it is possible that the relocation will fail and abort the current transaction with an -EINVAL error: [134243.988595] BTRFS info

Re: [PATCH v2 02/15] perf ftrace: add option '-F/--funcs' to list available functions

2020-07-07 Thread Changbin Du
On Fri, Jul 03, 2020 at 02:58:19PM +0900, Namhyung Kim wrote: > On Sat, Jun 27, 2020 at 10:37 PM Changbin Du wrote: > > > > This adds an option '-F/--funcs' to list all available functions to trace, > > which is read from tracing file 'available_filter_functions'. > > > > $ sudo ./perf ftrace -F |

Re: [PATCH v3 4/4] io_uring: add support for zone-append

2020-07-07 Thread Kanchan Joshi
On Mon, Jul 06, 2020 at 03:32:08PM +0100, Matthew Wilcox wrote: On Mon, Jul 06, 2020 at 08:27:17AM -0600, Jens Axboe wrote: On 7/6/20 8:10 AM, Matthew Wilcox wrote: > On Sun, Jul 05, 2020 at 03:12:50PM -0600, Jens Axboe wrote: >> On 7/5/20 3:09 PM, Matthew Wilcox wrote: >>> On Sun, Jul 05, 2020

[PATCH 4.9 14/24] hwmon: (max6697) Make sure the OVERT mask is set correctly

2020-07-07 Thread Greg Kroah-Hartman
From: Chu Lin [ Upstream commit 016983d138cbe99a5c0aaae0103ee88f5300beb3 ] Per the datasheet for max6697, OVERT mask and ALERT mask are different. For example, the 7th bit of OVERT is the local channel but for alert mask, the 6th bit is the local channel. Therefore, we can't apply the same mask

[PATCH 4.14 14/27] hwmon: (max6697) Make sure the OVERT mask is set correctly

2020-07-07 Thread Greg Kroah-Hartman
From: Chu Lin [ Upstream commit 016983d138cbe99a5c0aaae0103ee88f5300beb3 ] Per the datasheet for max6697, OVERT mask and ALERT mask are different. For example, the 7th bit of OVERT is the local channel but for alert mask, the 6th bit is the local channel. Therefore, we can't apply the same mask

[PATCH 4.14 12/27] cxgb4: use unaligned conversion for fetching timestamp

2020-07-07 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit 589b1c9c166dce120e27b32a83a78f55464a7ef9 ] Use get_unaligned_be64() to fetch the timestamp needed for ns_to_ktime() conversion. Fixes following sparse warning: sge.c:3282:43: warning: cast to restricted __be64 Fixes: a456950445a0 ("cxgb4: time stamping

[PATCH 4.14 11/27] crypto: af_alg - fix use-after-free in af_alg_accept() due to bh_lock_sock()

2020-07-07 Thread Greg Kroah-Hartman
From: Herbert Xu commit 34c86f4c4a7be3b3e35aa48bd18299d4c756064d upstream. The locking in af_alg_release_parent is broken as the BH socket lock can only be taken if there is a code-path to handle the case where the lock is owned by process-context. Instead of adding such handling, we can fix th

[PATCH 4.14 13/27] cxgb4: parse TC-U32 key values and masks natively

2020-07-07 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit 27f78cb245abdb86735529c13b0a579f57829e71 ] TC-U32 passes all keys values and masks in __be32 format. The parser already expects this and hence pass the value and masks in __be32 natively to the parser. Fixes following sparse warnings in several places: c

[PATCH 4.14 16/27] drm: sun4i: hdmi: Remove extra HPD polling

2020-07-07 Thread Greg Kroah-Hartman
From: Chen-Yu Tsai [ Upstream commit bda8eaa6dee7525f4dac950810a85a88bf6c2ba0 ] The HPD sense mechanism in Allwinner's old HDMI encoder hardware is more or less an input-only GPIO. Other GPIO-based HPD implementations directly return the current state, instead of polling for a specific state and

[PATCH 4.14 08/27] mm/slub: fix stack overruns with SLUB_STATS

2020-07-07 Thread Greg Kroah-Hartman
From: Qian Cai [ Upstream commit a68ee0573991e90af2f1785db309206408bad3e5 ] There is no need to copy SLUB_STATS items from root memcg cache to new memcg cache copies. Doing so could result in stack overruns because the store function only accepts 0 to clear the stat and returns an error for eve

[PATCH 4.14 25/27] irqchip/gic: Atomically update affinity

2020-07-07 Thread Greg Kroah-Hartman
From: Marc Zyngier commit 005c34ae4b44f085120d7f371121ec7ded677761 upstream. The GIC driver uses a RMW sequence to update the affinity, and relies on the gic_lock_irqsave/gic_unlock_irqrestore sequences to update it atomically. But these sequences only expand into anything meaningful if the BL_

[PATCH 4.14 24/27] MIPS: Add missing EHB in mtc0 -> mfc0 sequence for DSPen

2020-07-07 Thread Greg Kroah-Hartman
From: Hauke Mehrtens commit fcec538ef8cca0ad0b84432235dccd9059c8e6f8 upstream. This resolves the hazard between the mtc0 in the change_c0_status() and the mfc0 in configure_exception_vector(). Without resolving this hazard configure_exception_vector() could read an old value and would restore th

[PATCH 4.14 03/27] btrfs: fix data block group relocation failure due to concurrent scrub

2020-07-07 Thread Greg Kroah-Hartman
From: Filipe Manana [ Upstream commit 432cd2a10f1c10cead91fe706ff5dc52f06d642a ] When running relocation of a data block group while scrub is running in parallel, it is possible that the relocation will fail and abort the current transaction with an -EINVAL error: [134243.988595] BTRFS info

[PATCH 4.14 26/27] dm zoned: assign max_io_len correctly

2020-07-07 Thread Greg Kroah-Hartman
From: Hou Tao commit 7b2377486767503d47265e4d487a63c651f6b55d upstream. The unit of max_io_len is sector instead of byte (spotted through code review), so fix it. Fixes: 3b1a94c88b79 ("dm zoned: drive-managed zoned block device target") Cc: sta...@vger.kernel.org Signed-off-by: Hou Tao Reviewe

[PATCH 4.14 02/27] btrfs: cow_file_range() num_bytes and disk_num_bytes are same

2020-07-07 Thread Greg Kroah-Hartman
From: Anand Jain [ Upstream commit 3752d22fcea160cc2493e34f5e0e41cdd7fdd921 ] This patch deletes local variable disk_num_bytes as its value is same as num_bytes in the function cow_file_range(). Signed-off-by: Anand Jain Reviewed-by: Nikolay Borisov Reviewed-by: David Sterba Signed-off-by: D

[PATCH 4.14 18/27] i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665

2020-07-07 Thread Greg Kroah-Hartman
From: Chris Packham [ Upstream commit cd217f2300793a106b49c7dfcbfb26e348bc7593 ] The PCA9665 datasheet says that I2CSTA = 78h indicates that SCL is stuck low, this differs to the PCA9564 which uses 90h for this indication. Treat either 0x78 or 0x90 as an indication that the SCL line is stuck. B

[PATCH 4.14 17/27] virtio-blk: free vblk-vqs in error path of virtblk_probe()

2020-07-07 Thread Greg Kroah-Hartman
From: Hou Tao [ Upstream commit e7eea44eefbdd5f0345a0a8b80a3ca1c21030d06 ] Else there will be memory leak if alloc_disk() fails. Fixes: 6a27b656fc02 ("block: virtio-blk: support multi virt queues per virtio-blk device") Signed-off-by: Hou Tao Reviewed-by: Stefano Garzarella Reviewed-by: Ming

[PATCH 4.14 19/27] nfsd: apply umask on fs without ACL support

2020-07-07 Thread Greg Kroah-Hartman
From: J. Bruce Fields commit 22cf8419f1319ff87ec759d0ebdff4cbafaee832 upstream. The server is failing to apply the umask when creating new objects on filesystems without ACL support. To reproduce this, you need to use NFSv4.2 and a client and server recent enough to support umask, and you need

[PATCH 4.14 04/27] mm: fix swap cache node allocation mask

2020-07-07 Thread Greg Kroah-Hartman
From: Hugh Dickins [ Upstream commit 243bce09c91b0145aeaedd5afba799d81841c030 ] Chris Murphy reports that a slightly overcommitted load, testing swap and zram along with i915, splats and keeps on splatting, when it had better fail less noisily: gnome-shell: page allocation failure: order:0,

[PATCH 4.14 27/27] efi: Make it possible to disable efivar_ssdt entirely

2020-07-07 Thread Greg Kroah-Hartman
From: Peter Jones commit 435d1a471598752446a72ad1201b3c980526d869 upstream. In most cases, such as CONFIG_ACPI_CUSTOM_DSDT and CONFIG_ACPI_TABLE_UPGRADE, boot-time modifications to firmware tables are tied to specific Kconfig options. Currently this is not the case for modifying the ACPI SSDT v

[PATCH 4.14 07/27] mm/slub.c: fix corrupted freechain in deactivate_slab()

2020-07-07 Thread Greg Kroah-Hartman
From: Dongli Zhang [ Upstream commit 52f23478081ae0dcdb95d1650ea1e7d52d586829 ] The slub_debug is able to fix the corrupted slab freelist/page. However, alloc_debug_processing() only checks the validity of current and next freepointer during allocation path. As a result, once some objects have

[PATCH 4.14 23/27] cifs: Fix the target file was deleted when rename failed.

2020-07-07 Thread Greg Kroah-Hartman
From: Zhang Xiaoxu commit 9ffad9263b467efd8f8dc7ae1941a0a655a2bab2 upstream. When xfstest generic/035, we found the target file was deleted if the rename return -EACESS. In cifs_rename2, we unlink the positive target dentry if rename failed with EACESS or EEXIST, even if the target dentry is po

[PATCH 4.14 05/27] EDAC/amd64: Read back the scrub rate PCI register on F15h

2020-07-07 Thread Greg Kroah-Hartman
From: Borislav Petkov [ Upstream commit ee470bb25d0dcdf126f586ec0ae6dca66cb340a4 ] Commit: da92110dfdfa ("EDAC, amd64_edac: Extend scrub rate support to F15hM60h") added support for F15h, model 0x60 CPUs but in doing so, missed to read back SCRCTRL PCI config register on F15h CPUs which are

[PATCH 4.14 20/27] Revert "ALSA: usb-audio: Improve frames size computation"

2020-07-07 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 99703c921864a318e3e8aae74fde071b1ff35bea which is commit f0bd62b64016508938df9babe47f65c2c727d25c upstream. It causes a number of reported issues and a fix for it has not hit Linus's tree yet. Revert this to resolve those problems. Cc: Alexander Tso

[PATCH 4.14 00/27] 4.14.188-rc1 review

2020-07-07 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.14.188 release. There are 27 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 09 Jul 2020 14:57:34 +. Anything re

[PATCH 4.14 22/27] SMB3: Honor persistent/resilient handle flags for multiuser mounts

2020-07-07 Thread Greg Kroah-Hartman
From: Paul Aurich commit 00dfbc2f9c61185a2e662f27c45a0bb29b2a134f upstream. Without this: - persistent handles will only be enabled for per-user tcons if the server advertises the 'Continuous Availabity' capability - resilient handles would never be enabled for per-user tcons Signed-off-by:

[PATCH 4.14 15/27] hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add()

2020-07-07 Thread Greg Kroah-Hartman
From: Misono Tomohiro [ Upstream commit 8b97f9922211c44a739c5cbd9502ecbb9f17f6d1 ] Although it rarely happens, we should call free_capabilities() if error happens after read_capabilities() to free allocated strings. Fixes: de584afa5e188 ("hwmon driver for ACPI 4.0 power meters") Signed-off-by:

[PATCH 4.14 01/27] btrfs: fix a block group ref counter leak after failure to remove block group

2020-07-07 Thread Greg Kroah-Hartman
From: Filipe Manana [ Upstream commit 9fecd13202f520f3f25d5b1c313adb740fe19773 ] When removing a block group, if we fail to delete the block group's item from the extent tree, we jump to the 'out' label and end up decrementing the block group's reference count once only (by 1), resulting in a co

[PATCH 4.14 09/27] usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect

2020-07-07 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 28ebeb8db77035e058a510ce9bd17c2b9a009dba ] BUG: memory leak unreferenced object 0x888055046e00 (size 256): comm "kworker/2:9", pid 2570, jiffies 4294942129 (age 1095.500s) hex dump (first 32 bytes): 00 70 04 55 80 88 ff ff 18 bb 5a 81 ff ff ff ff .p.U.

Re: [PATCH 4.4 14/19] Revert "ALSA: usb-audio: Improve frames size computation"

2020-07-07 Thread Greg Kroah-Hartman
On Tue, Jul 07, 2020 at 05:13:59PM +0200, Takashi Iwai wrote: > On Tue, 07 Jul 2020 17:10:17 +0200, > Greg Kroah-Hartman wrote: > > > > From: Greg Kroah-Hartman > > > > This reverts commit 02c56650f3c118d3752122996d96173d26bb13aa which is > > commit f0bd62b64016508938df9babe47f65c2c727d25c upstr

[PATCH 4.14 21/27] SMB3: Honor seal flag for multiuser mounts

2020-07-07 Thread Greg Kroah-Hartman
From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons

[PATCH 4.14 06/27] usbnet: smsc95xx: Fix use-after-free after removal

2020-07-07 Thread Greg Kroah-Hartman
From: Tuomas Tynkkynen [ Upstream commit b835a71ef64a61383c414d6bf2896d2c0161deca ] Syzbot reports an use-after-free in workqueue context: BUG: KASAN: use-after-free in mutex_unlock+0x19/0x40 kernel/locking/mutex.c:737 mutex_unlock+0x19/0x40 kernel/locking/mutex.c:737 __smsc95xx_mdio_read dri

[PATCH 4.19 11/36] nvme-multipath: fix deadlock between ana_work and scan_work

2020-07-07 Thread Greg Kroah-Hartman
From: Anton Eidelman [ Upstream commit 489dd102a2c7c94d783a35f9412eb085b8da1aa4 ] When scan_work calls nvme_mpath_add_disk() this holds ana_lock and invokes nvme_parse_ana_log(), which may issue IO in device_add_disk() and hang waiting for an accessible path. While nvme_mpath_set_live() only cal

[PATCH 4.19 21/36] drm: sun4i: hdmi: Remove extra HPD polling

2020-07-07 Thread Greg Kroah-Hartman
From: Chen-Yu Tsai [ Upstream commit bda8eaa6dee7525f4dac950810a85a88bf6c2ba0 ] The HPD sense mechanism in Allwinner's old HDMI encoder hardware is more or less an input-only GPIO. Other GPIO-based HPD implementations directly return the current state, instead of polling for a specific state and

[PATCH 4.19 02/36] mm: fix swap cache node allocation mask

2020-07-07 Thread Greg Kroah-Hartman
From: Hugh Dickins [ Upstream commit 243bce09c91b0145aeaedd5afba799d81841c030 ] Chris Murphy reports that a slightly overcommitted load, testing swap and zram along with i915, splats and keeps on splatting, when it had better fail less noisily: gnome-shell: page allocation failure: order:0,

[PATCH 4.19 15/36] cxgb4: use unaligned conversion for fetching timestamp

2020-07-07 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit 589b1c9c166dce120e27b32a83a78f55464a7ef9 ] Use get_unaligned_be64() to fetch the timestamp needed for ns_to_ktime() conversion. Fixes following sparse warning: sge.c:3282:43: warning: cast to restricted __be64 Fixes: a456950445a0 ("cxgb4: time stamping

[PATCH 4.19 03/36] EDAC/amd64: Read back the scrub rate PCI register on F15h

2020-07-07 Thread Greg Kroah-Hartman
From: Borislav Petkov [ Upstream commit ee470bb25d0dcdf126f586ec0ae6dca66cb340a4 ] Commit: da92110dfdfa ("EDAC, amd64_edac: Extend scrub rate support to F15hM60h") added support for F15h, model 0x60 CPUs but in doing so, missed to read back SCRCTRL PCI config register on F15h CPUs which are

[PATCH 4.19 20/36] hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add()

2020-07-07 Thread Greg Kroah-Hartman
From: Misono Tomohiro [ Upstream commit 8b97f9922211c44a739c5cbd9502ecbb9f17f6d1 ] Although it rarely happens, we should call free_capabilities() if error happens after read_capabilities() to free allocated strings. Fixes: de584afa5e188 ("hwmon driver for ACPI 4.0 power meters") Signed-off-by:

[PATCH 4.19 17/36] cxgb4: use correct type for all-mask IP address comparison

2020-07-07 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit f286dd8eaad5a2758750f407ab079298e0bcc8a5 ] Use correct type to check for all-mask exact match IP addresses. Fixes following sparse warnings due to big endian value checks against 0x in is_addr_all_mask(): cxgb4_filter.c:977:25: warning: restricte

[PATCH 4.19 12/36] kgdb: Avoid suspicious RCU usage warning

2020-07-07 Thread Greg Kroah-Hartman
From: Douglas Anderson [ Upstream commit 440ab9e10e2e6e5fd677473ee6f9e3af0f6904d6 ] At times when I'm using kgdb I see a splat on my console about suspicious RCU usage. I managed to come up with a case that could reproduce this that looked like this: WARNING: suspicious RCU usage 5.7.0-rc4

[PATCH 4.19 14/36] drm/msm/dpu: fix error return code in dpu_encoder_init

2020-07-07 Thread Greg Kroah-Hartman
From: Chen Tao [ Upstream commit aa472721c8dbe1713cf510f56ffbc56ae9e14247 ] Fix to return negative error code -ENOMEM with the use of ERR_PTR from dpu_encoder_init. Fixes: 25fdd5933e4c ("drm/msm: Add SDM845 DPU support") Signed-off-by: Chen Tao Signed-off-by: Rob Clark Signed-off-by: Sasha Le

[PATCH 4.19 18/36] cxgb4: fix SGE queue dump destination buffer context

2020-07-07 Thread Greg Kroah-Hartman
From: Rahul Lakkireddy [ Upstream commit 1992ded5d111997877a9a25205976d8d03c46814 ] The data in destination buffer is expected to be be parsed in big endian. So, use the right context. Fixes following sparse warning: cudbg_lib.c:2041:44: warning: incorrect type in assignment (different base typ

[PATCH 4.19 22/36] virtio-blk: free vblk-vqs in error path of virtblk_probe()

2020-07-07 Thread Greg Kroah-Hartman
From: Hou Tao [ Upstream commit e7eea44eefbdd5f0345a0a8b80a3ca1c21030d06 ] Else there will be memory leak if alloc_disk() fails. Fixes: 6a27b656fc02 ("block: virtio-blk: support multi virt queues per virtio-blk device") Signed-off-by: Hou Tao Reviewed-by: Stefano Garzarella Reviewed-by: Ming

[PATCH 4.19 04/36] usbnet: smsc95xx: Fix use-after-free after removal

2020-07-07 Thread Greg Kroah-Hartman
From: Tuomas Tynkkynen [ Upstream commit b835a71ef64a61383c414d6bf2896d2c0161deca ] Syzbot reports an use-after-free in workqueue context: BUG: KASAN: use-after-free in mutex_unlock+0x19/0x40 kernel/locking/mutex.c:737 mutex_unlock+0x19/0x40 kernel/locking/mutex.c:737 __smsc95xx_mdio_read dri

[PATCH 4.19 00/36] 4.19.132-rc1 review

2020-07-07 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.19.132 release. There are 36 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 09 Jul 2020 14:57:34 +. Anything re

Re: [PATCH v2 09/15] perf ftrace: add support for tracing option 'func_stack_trace'

2020-07-07 Thread Changbin Du
On Fri, Jul 03, 2020 at 03:30:32PM +0900, Namhyung Kim wrote: > On Sat, Jun 27, 2020 at 10:38 PM Changbin Du wrote: > > > > This adds support to display call trace for function tracer. To do this, > > just specify a '--func-call-graph' option. > > What if it's used with -G option? Also it might

[PATCH 4.19 26/36] i2c: mlxcpld: check correct size of maximum RECV_LEN packet

2020-07-07 Thread Greg Kroah-Hartman
From: Wolfram Sang [ Upstream commit 597911287fcd13c3a4b4aa3e0a52b33d431e0a8e ] I2C_SMBUS_BLOCK_MAX defines already the maximum number as defined in the SMBus 2.0 specs. I don't see a reason to add 1 here. Also, fix the errno to what is suggested for this error. Fixes: c9bfdc7c16cb ("i2c: mlxcp

[PATCH 4.19 07/36] usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect

2020-07-07 Thread Greg Kroah-Hartman
From: Zqiang [ Upstream commit 28ebeb8db77035e058a510ce9bd17c2b9a009dba ] BUG: memory leak unreferenced object 0x888055046e00 (size 256): comm "kworker/2:9", pid 2570, jiffies 4294942129 (age 1095.500s) hex dump (first 32 bytes): 00 70 04 55 80 88 ff ff 18 bb 5a 81 ff ff ff ff .p.U.

[PATCH 4.19 08/36] s390/debug: avoid kernel warning on too large number of pages

2020-07-07 Thread Greg Kroah-Hartman
From: Christian Borntraeger [ Upstream commit 827c4913923e0b441ba07ba4cc41e01181102303 ] When specifying insanely large debug buffers a kernel warning is printed. The debug code does handle the error gracefully, though. Instead of duplicating the check let us silence the warning to avoid crashes

[PATCH 4.19 10/36] nvme: fix possible deadlock when I/O is blocked

2020-07-07 Thread Greg Kroah-Hartman
From: Sagi Grimberg [ Upstream commit 3b4b19721ec652ad2c4fe51dfbe5124212b5f581 ] Revert fab7772bfbcf ("nvme-multipath: revalidate nvme_ns_head gendisk in nvme_validate_ns") When adding a new namespace to the head disk (via nvme_mpath_set_live) we will see partition scan which triggers I/O on th

[PATCH 4.19 25/36] i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665

2020-07-07 Thread Greg Kroah-Hartman
From: Chris Packham [ Upstream commit cd217f2300793a106b49c7dfcbfb26e348bc7593 ] The PCA9665 datasheet says that I2CSTA = 78h indicates that SCL is stuck low, this differs to the PCA9564 which uses 90h for this indication. Treat either 0x78 or 0x90 as an indication that the SCL line is stuck. B

[PATCH 4.19 32/36] cifs: Fix the target file was deleted when rename failed.

2020-07-07 Thread Greg Kroah-Hartman
From: Zhang Xiaoxu commit 9ffad9263b467efd8f8dc7ae1941a0a655a2bab2 upstream. When xfstest generic/035, we found the target file was deleted if the rename return -EACESS. In cifs_rename2, we unlink the positive target dentry if rename failed with EACESS or EEXIST, even if the target dentry is po

[PATCH 4.19 28/36] Revert "ALSA: usb-audio: Improve frames size computation"

2020-07-07 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 2d50acd7dbd0682a56968ad9551341d7fc5b6eaf which is commit f0bd62b64016508938df9babe47f65c2c727d25c upstream. It causes a number of reported issues and a fix for it has not hit Linus's tree yet. Revert this to resolve those problems. Cc: Alexander Tso

[PATCH 4.19 31/36] SMB3: Honor lease disabling for multiuser mounts

2020-07-07 Thread Greg Kroah-Hartman
From: Paul Aurich commit ad35f169db6cd5a4c5c0a5a42fb0cad3efeccb83 upstream. Fixes: 3e7a02d47872 ("smb3: allow disabling requesting leases") Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c

[PATCH 4.19 24/36] nvme: fix a crash in nvme_mpath_add_disk

2020-07-07 Thread Greg Kroah-Hartman
From: Christoph Hellwig [ Upstream commit 72d447113bb751ded97b2e2c38f886e4a4139082 ] For private namespaces ns->head_disk is NULL, so add a NULL check before updating the BDI capabilities. Fixes: b2ce4d90690b ("nvme-multipath: set bdi capabilities once") Reported-by: Avinash M N Signed-off-by:

[PATCH 5.4 00/65] 5.4.51-rc1 review

2020-07-07 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.4.51 release. There are 65 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 09 Jul 2020 14:57:34 +. Anything rece

[PATCH 4.19 35/36] dm zoned: assign max_io_len correctly

2020-07-07 Thread Greg Kroah-Hartman
From: Hou Tao commit 7b2377486767503d47265e4d487a63c651f6b55d upstream. The unit of max_io_len is sector instead of byte (spotted through code review), so fix it. Fixes: 3b1a94c88b79 ("dm zoned: drive-managed zoned block device target") Cc: sta...@vger.kernel.org Signed-off-by: Hou Tao Reviewe

[PATCH 4.19 33/36] MIPS: Add missing EHB in mtc0 -> mfc0 sequence for DSPen

2020-07-07 Thread Greg Kroah-Hartman
From: Hauke Mehrtens commit fcec538ef8cca0ad0b84432235dccd9059c8e6f8 upstream. This resolves the hazard between the mtc0 in the change_c0_status() and the mfc0 in configure_exception_vector(). Without resolving this hazard configure_exception_vector() could read an old value and would restore th

[PATCH 4.19 27/36] nfsd: apply umask on fs without ACL support

2020-07-07 Thread Greg Kroah-Hartman
From: J. Bruce Fields commit 22cf8419f1319ff87ec759d0ebdff4cbafaee832 upstream. The server is failing to apply the umask when creating new objects on filesystems without ACL support. To reproduce this, you need to use NFSv4.2 and a client and server recent enough to support umask, and you need

[PATCH 4.19 30/36] SMB3: Honor persistent/resilient handle flags for multiuser mounts

2020-07-07 Thread Greg Kroah-Hartman
From: Paul Aurich commit 00dfbc2f9c61185a2e662f27c45a0bb29b2a134f upstream. Without this: - persistent handles will only be enabled for per-user tcons if the server advertises the 'Continuous Availabity' capability - resilient handles would never be enabled for per-user tcons Signed-off-by:

<    1   2   3   4   5   6   7   8   9   10   >