Re: [PATCH v4 net-next 2/2] udp: allow forwarding of plain (non-fraglisted) UDP GRO packets

2021-01-22 Thread Willem de Bruijn
On Fri, Jan 22, 2021 at 1:20 PM Alexander Lobakin wrote: > > Commit 9fd1ff5d2ac7 ("udp: Support UDP fraglist GRO/GSO.") actually > not only added a support for fraglisted UDP GRO, but also tweaked > some logics the way that non-fraglisted UDP GRO started to work for > forwarding too. > Commit 2e4e

Re: [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability

2021-01-22 Thread Tyler Hicks
On 2021-01-19 17:22:03, Miklos Szeredi wrote: > Prior to commit 7c03e2cda4a5 ("vfs: move cap_convert_nscap() call into > vfs_setxattr()") the translation of nscap->rootid did not take stacked > filesystems (overlayfs and ecryptfs) into account. > > That patch fixed the overlay case, but made the e

Re: [PATCH 12/24] kvm: x86/kvm: RCU dereference tdp mmu page table links

2021-01-22 Thread Sean Christopherson
On Tue, Jan 12, 2021, Ben Gardon wrote: > In order to protect TDP MMU PT memory with RCU, ensure that page table > links are properly rcu_derefenced. > > Reviewed-by: Peter Feiner > > Signed-off-by: Ben Gardon > --- > arch/x86/kvm/mmu/tdp_iter.c | 6 +- > 1 file changed, 5 insertions(+), 1

[PATCH BUGFIX/IMPROVEMENT 0/6] block, bfq: first bath of fixes and improvements

2021-01-22 Thread Paolo Valente
Hi, about nine months ago, Jan (Kara, SUSE) reported a throughput regression with BFQ. That was the beginning of a fruitful dev&testing collaboration, which led to 18 new commits. Part are fixes, part are actual performance improvements. Jia Cheng Hu (1): block, bfq: set next_rq to waker_bfqq->

[PATCH v4 net-next 2/2] udp: allow forwarding of plain (non-fraglisted) UDP GRO packets

2021-01-22 Thread Alexander Lobakin
Commit 9fd1ff5d2ac7 ("udp: Support UDP fraglist GRO/GSO.") actually not only added a support for fraglisted UDP GRO, but also tweaked some logics the way that non-fraglisted UDP GRO started to work for forwarding too. Commit 2e4ef10f5850 ("net: add GSO UDP L4 and GSO fraglists to the list of softwa

[PATCH v4 net-next 1/2] net: introduce a netdev feature for UDP GRO forwarding

2021-01-22 Thread Alexander Lobakin
Introduce a new netdev feature, NETIF_F_GRO_UDP_FWD, to allow user to turn UDP GRO on and off for forwarding. Defaults to off to not change current datapath. Suggested-by: Paolo Abeni Signed-off-by: Alexander Lobakin --- include/linux/netdev_features.h | 4 +++- net/ethtool/common.c

[PATCH] regulator: core: Avoid debugfs: Directory ... already present! error

2021-01-22 Thread Hans de Goede
Sometimes regulator_get() gets called twice for the same supply on the same device. This may happen e.g. when a framework / library is used which uses the regulator; and the driver itself also needs to enable the regulator in some cases where the framework will not enable it. Commit ff268b56ce8c (

[PATCH v4 net-next 0/2] udp: allow forwarding of plain (non-fraglisted) UDP GRO packets

2021-01-22 Thread Alexander Lobakin
This series allows to form UDP GRO packets in cases without sockets (for forwarding). To not change the current datapath, this is performed only when the new corresponding netdev feature is enabled via Ethtool (and fraglisted GRO is disabled). Prior to this point, only fraglisted UDP GRO was availa

Re: [PATCH 1/4] ARM: dts: qcom: msm8974: add gpu support

2021-01-22 Thread Bjorn Andersson
On Wed 30 Dec 09:51 CST 2020, Iskren Chernev wrote: > From: Brian Masney > > Add support for the a3xx GPU > > Signed-off-by: Brian Masney As discussed on IRC I'm waiting for a respin of this with your S-o-b added after Brian's. Thanks, Bjorn > --- > arch/arm/boot/dts/qcom-msm8974.dtsi | 45

Re: [PATCH 2/2] dm crypt: support using trusted keys

2021-01-22 Thread Jarkko Sakkinen
On Fri, Jan 22, 2021 at 08:05:51PM +0200, Jarkko Sakkinen wrote: > On Fri, Jan 22, 2021 at 09:43:21AM +0100, Ahmad Fatoum wrote: > > Commit 27f5411a718c ("dm crypt: support using encrypted keys") extended > > dm-crypt to allow use of "encrypted" keys along with "user" and "logon". > > > > Along th

[PATCH v5 3/4] certs: Add ability to preload revocation certs

2021-01-22 Thread Eric Snowberg
Add a new Kconfig option called SYSTEM_REVOCATION_KEYS. If set, this option should be the filename of a PEM-formated file containing X.509 certificates to be included in the default blacklist keyring. Signed-off-by: Eric Snowberg Acked-by: Jarkko Sakkinen --- certs/Kconfig |

Re: [net-next PATCH v4 09/15] device property: Introduce fwnode_get_id()

2021-01-22 Thread Rafael J. Wysocki
On Fri, Jan 22, 2021 at 4:46 PM Calvin Johnson wrote: > > Using fwnode_get_id(), get the reg property value for DT node > or get the _ADR object value for ACPI node. > > Signed-off-by: Calvin Johnson > --- > > Changes in v4: > - Improve code structure to handle all cases > > Changes in v3: > - Mo

[PATCH 5.4 13/33] netxen_nic: fix MSI/MSI-x interrupts

2021-01-22 Thread Greg Kroah-Hartman
From: Manish Chopra [ Upstream commit a2bc221b972db91e4be1970e776e98f16aa87904 ] For all PCI functions on the netxen_nic adapter, interrupt mode (INTx or MSI) configuration is dependent on what has been configured by the PCI function zero in the shared interrupt register, as these adapters do no

Re: [net-next PATCH v4 09/15] device property: Introduce fwnode_get_id()

2021-01-22 Thread Rafael J. Wysocki
On Fri, Jan 22, 2021 at 6:12 PM Andy Shevchenko wrote: > > On Fri, Jan 22, 2021 at 05:40:41PM +0100, Rafael J. Wysocki wrote: > > On Fri, Jan 22, 2021 at 4:46 PM Calvin Johnson > > wrote: > > > > > > Using fwnode_get_id(), get the reg property value for DT node > > > or get the _ADR object value

[PATCH 5.4 02/33] compiler.h: Raise minimum version of GCC to 5.1 for arm64

2021-01-22 Thread Greg Kroah-Hartman
From: Will Deacon commit dca5244d2f5b94f1809f0c02a549edf41ccd5493 upstream. GCC versions >= 4.9 and < 5.1 have been shown to emit memory references beyond the stack pointer, resulting in memory corruption if an interrupt is taken after the stack pointer has been adjusted but before the reference

[PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries

2021-01-22 Thread Eric Snowberg
This is the fifth patch series for adding support for EFI_CERT_X509_GUID entries [1]. It has been expanded to not only include dbx entries but also entries in the mokx. Additionally my series to preload these certificate [2] has also been included. This series is based on v5.11-rc4. [1] https

Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys

2021-01-22 Thread Jarkko Sakkinen
On Thu, Jan 21, 2021 at 05:23:45PM +0100, Jerome Forissier wrote: > > > On 1/21/21 4:24 PM, Jarkko Sakkinen wrote: > > On Thu, Jan 21, 2021 at 05:07:42PM +0200, Jarkko Sakkinen wrote: > >> On Thu, Jan 21, 2021 at 09:44:07AM +0100, Jerome Forissier wrote: > >>> > >>> > >>> On 1/21/21 1:02 AM, Jark

Re: [PATCH v5 0/5] mm: clean up names and parameters of memmap_init_xxxx functions

2021-01-22 Thread Mike Rapoport
On Fri, Jan 22, 2021 at 09:59:51PM +0800, Baoquan He wrote: > This patchset is correcting inappropriate function names of > memmap_init_xxx, and simplify parameters of functions in the code flow. > And also fix a prototype warning reported by lkp. > > This is based on the latest next/master. > >

[PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries

2021-01-22 Thread Eric Snowberg
This fixes CVE-2020-26541. The Secure Boot Forbidden Signature Database, dbx, contains a list of now revoked signatures and keys previously approved to boot with UEFI Secure Boot enabled. The dbx is capable of containing any number of EFI_CERT_X509_SHA256_GUID, EFI_CERT_SHA256_GUID, and EFI_CERT_

[PATCH 4.19 18/22] tipc: fix NULL deref in tipc_link_xmit()

2021-01-22 Thread Greg Kroah-Hartman
From: Hoang Le [ Upstream commit b77413446408fdd256599daf00d5be72b5f3e7c6 ] The buffer list can have zero skb as following path: tipc_named_node_up()->tipc_node_xmit()->tipc_link_xmit(), so we need to check the list before casting an &sk_buff. Fault report: [] tipc: Bulk publication failure [

[PATCH 4.19 19/22] net: introduce skb_list_walk_safe for skb segment walking

2021-01-22 Thread Greg Kroah-Hartman
From: Jason A. Donenfeld commit dcfea72e79b0aa7a057c8f6024169d86a1bbc84b upstream. As part of the continual effort to remove direct usage of skb->next and skb->prev, this patch adds a helper for iterating through the singly-linked variant of skb lists, which are used for lists of GSO packet. The

[PATCH 5.4 11/33] bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback

2021-01-22 Thread Greg Kroah-Hartman
From: Mircea Cirjaliu commit 301a33d51880619d0c5a581b5a48d3a5248fa84b upstream. I assume this was obtained by copy/paste. Point it to bpf_map_peek_elem() instead of bpf_map_pop_elem(). In practice it may have been less likely hit when under JIT given shielded via 84430d4232c3 ("bpf, verifier: av

[PATCH 5.4 10/33] bpf: Dont leak memory in bpf getsockopt when optlen == 0

2021-01-22 Thread Greg Kroah-Hartman
From: Stanislav Fomichev commit 4be34f3d0731b38a1b24566b37fbb39500aaf3a2 upstream. optlen == 0 indicates that the kernel should ignore BPF buffer and use the original one from the user. We, however, forget to free the temporary buffer that we've allocated for BPF. Fixes: d8fe449a9c51 ("bpf: Don

[PATCH 5.4 01/33] usb: ohci: Make distrust_firmware param default to false

2021-01-22 Thread Greg Kroah-Hartman
From: Hamish Martin commit c4005a8f65edc55fb1700dfc5c1c3dc58be80209 upstream. The 'distrust_firmware' module parameter dates from 2004 and the USB subsystem is a lot more mature and reliable now than it was then. Alter the default to false now. Suggested-by: Alan Stern Acked-by: Alan Stern Si

[PATCH 4.19 09/22] rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request

2021-01-22 Thread Greg Kroah-Hartman
From: Andrey Zhizhikin [ Upstream commit e56b3d94d939f52d46209b9e1b6700c5bfff3123 ] MSFT ActiveSync implementation requires that the size of the response for incoming query is to be provided in the request input length. Failure to set the input size proper results in failed request transfer, whe

[PATCH 4.19 07/22] netxen_nic: fix MSI/MSI-x interrupts

2021-01-22 Thread Greg Kroah-Hartman
From: Manish Chopra [ Upstream commit a2bc221b972db91e4be1970e776e98f16aa87904 ] For all PCI functions on the netxen_nic adapter, interrupt mode (INTx or MSI) configuration is dependent on what has been configured by the PCI function zero in the shared interrupt register, as these adapters do no

[PATCH 4.19 11/22] net: dcb: Validate netlink message in DCB handler

2021-01-22 Thread Greg Kroah-Hartman
From: Petr Machata [ Upstream commit 826f328e2b7e8854dd42ea44e6519cd75018e7b1 ] DCB uses the same handler function for both RTM_GETDCB and RTM_SETDCB messages. dcb_doit() bounces RTM_SETDCB mesasges if the user does not have the CAP_NET_ADMIN capability. However, the operation to be performed i

[PATCH 4.19 10/22] esp: avoid unneeded kmap_atomic call

2021-01-22 Thread Greg Kroah-Hartman
From: Willem de Bruijn [ Upstream commit 9bd6b629c39e3fa9e14243a6d8820492be1a5b2e ] esp(6)_output_head uses skb_page_frag_refill to allocate a buffer for the esp trailer. It accesses the page with kmap_atomic to handle highmem. But skb_page_frag_refill can return compound pages, of which kmap_a

[PATCH 4.19 02/22] compiler.h: Raise minimum version of GCC to 5.1 for arm64

2021-01-22 Thread Greg Kroah-Hartman
From: Will Deacon commit dca5244d2f5b94f1809f0c02a549edf41ccd5493 upstream. GCC versions >= 4.9 and < 5.1 have been shown to emit memory references beyond the stack pointer, resulting in memory corruption if an interrupt is taken after the stack pointer has been adjusted but before the reference

[PATCH 4.19 14/22] net: stmmac: Fixed mtu channged by cache aligned

2021-01-22 Thread Greg Kroah-Hartman
From: David Wu [ Upstream commit 5b55299eed78538cc4746e50ee97103a1643249c ] Since the original mtu is not used when the mtu is updated, the mtu is aligned with cache, this will get an incorrect. For example, if you want to configure the mtu to be 1500, but mtu 1536 is configured in fact. Fixed:

[PATCH 4.19 17/22] rxrpc: Fix handling of an unsupported token type in rxrpc_read()

2021-01-22 Thread Greg Kroah-Hartman
From: David Howells [ Upstream commit d52e419ac8b50c8bef41b398ed13528e75d7ad48 ] Clang static analysis reports the following: net/rxrpc/key.c:657:11: warning: Assigned value is garbage or undefined toksize = toksizes[tok++]; ^ ~~~ rxrpc_read(

[PATCH 4.19 22/22] spi: cadence: cache reference clock rate during probe

2021-01-22 Thread Greg Kroah-Hartman
From: Michael Hennerich commit 4d163ad79b155c71bf30366dc38f8d2502f78844 upstream. The issue is that using SPI from a callback under the CCF lock will deadlock, since this code uses clk_get_rate(). Fixes: c474b38665463 ("spi: Add driver for Cadence SPI controller") Signed-off-by: Michael Henneri

[PATCH 4.19 05/22] nfsd4: readdirplus shouldnt return parent of export

2021-01-22 Thread Greg Kroah-Hartman
From: J. Bruce Fields commit 51b2ee7d006a736a9126e8111d1f24e4fd0afaa6 upstream. If you export a subdirectory of a filesystem, a READDIRPLUS on the root of that export will return the filehandle of the parent with the ".." entry. The filehandle is optional, so let's just not return the filehandl

[PATCH 4.19 00/22] 4.19.170-rc1 review

2021-01-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.19.170 release. There are 22 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun, 24 Jan 2021 13:57:23 +. Anything re

[PATCH 4.19 03/22] dm integrity: fix flush with external metadata device

2021-01-22 Thread Greg Kroah-Hartman
From: Mikulas Patocka commit 9b5948267adc9e689da609eb61cf7ed49cae5fa8 upstream. With external metadata device, flush requests are not passed down to the data device. Fix this by submitting the flush request in dm_integrity_flush_buffers. In order to not degrade performance, we overlap the data

[PATCH 4.14 39/50] net: dcb: Validate netlink message in DCB handler

2021-01-22 Thread Greg Kroah-Hartman
From: Petr Machata [ Upstream commit 826f328e2b7e8854dd42ea44e6519cd75018e7b1 ] DCB uses the same handler function for both RTM_GETDCB and RTM_SETDCB messages. dcb_doit() bounces RTM_SETDCB mesasges if the user does not have the CAP_NET_ADMIN capability. However, the operation to be performed i

[PATCH 4.19 20/22] net: skbuff: disambiguate argument and member for skb_list_walk_safe helper

2021-01-22 Thread Greg Kroah-Hartman
From: Jason A. Donenfeld commit 5eee7bd7e245914e4e050c413dfe864e31805207 upstream. This worked before, because we made all callers name their next pointer "next". But in trying to be more "drop-in" ready, the silliness here is revealed. This commit fixes the problem by making the macro argument

[PATCH 4.19 06/22] udp: Prevent reuseport_select_sock from reading uninitialized socks

2021-01-22 Thread Greg Kroah-Hartman
From: Baptiste Lepers [ Upstream commit fd2ddef043592e7de80af53f47fa46fd3573086e ] reuse->socks[] is modified concurrently by reuseport_add_sock. To prevent reading values that have not been fully initialized, only read the array up until the last known safe index instead of incorrectly re-readi

Re: [PATCH 1/3] kvfree_rcu: Allocate a page for a single argument

2021-01-22 Thread Uladzislau Rezki
> On 2021-01-21 13:38:34 [+0100], Uladzislau Rezki wrote: > > __get_free_page() returns "unsigned long" whereas a bnode is a pointer > > to kvfree_rcu_bulk_data struct, without a casting the compiler will > > emit a warning. > > Yes, learned about it, sorry. > > > >> You think that a CPU migratio

[PATCH 4.19 21/22] net: ipv6: Validate GSO SKB before finish IPv6 processing

2021-01-22 Thread Greg Kroah-Hartman
From: Aya Levin [ Upstream commit b210de4f8c97d57de051e805686248ec4c6cfc52 ] There are cases where GSO segment's length exceeds the egress MTU: - Forwarding of a TCP GRO skb, when DF flag is not set. - Forwarding of an skb that arrived on a virtualisation interface (virtio-net/vhost/tap) wi

[PATCH 4.14 40/50] net: dcb: Accept RTM_GETDCB messages carrying set-like DCB commands

2021-01-22 Thread Greg Kroah-Hartman
From: Petr Machata [ Upstream commit df85bc140a4d6cbaa78d8e9c35154e1a2f0622c7 ] In commit 826f328e2b7e ("net: dcb: Validate netlink message in DCB handler"), Linux started rejecting RTM_GETDCB netlink messages if they contained a set-like DCB_CMD_ command. The reason was that privileges were on

[PATCH 4.14 31/50] ALSA: fireface: Fix integer overflow in transmit_midi_msg()

2021-01-22 Thread Greg Kroah-Hartman
From: Geert Uytterhoeven commit e7c22eeaff8565d9a8374f320238c251ca31480b upstream. As snd_ff.rx_bytes[] is unsigned int, and NSEC_PER_SEC is 10L, the second multiplication in ff->rx_bytes[port] * 8 * NSEC_PER_SEC / 31250 always overflows on 32-bit platforms, truncating the result.

Re: [net-next PATCH v4 09/15] device property: Introduce fwnode_get_id()

2021-01-22 Thread Rafael J. Wysocki
On Fri, Jan 22, 2021 at 7:13 PM Rafael J. Wysocki wrote: > > On Fri, Jan 22, 2021 at 4:46 PM Calvin Johnson > wrote: > > > > Using fwnode_get_id(), get the reg property value for DT node > > or get the _ADR object value for ACPI node. This is not accurate AFAICS, because if the "reg" property is

[PATCH 4.14 37/50] rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request

2021-01-22 Thread Greg Kroah-Hartman
From: Andrey Zhizhikin [ Upstream commit e56b3d94d939f52d46209b9e1b6700c5bfff3123 ] MSFT ActiveSync implementation requires that the size of the response for incoming query is to be provided in the request input length. Failure to set the input size proper results in failed request transfer, whe

[PATCH 4.14 50/50] spi: cadence: cache reference clock rate during probe

2021-01-22 Thread Greg Kroah-Hartman
From: Michael Hennerich commit 4d163ad79b155c71bf30366dc38f8d2502f78844 upstream. The issue is that using SPI from a callback under the CCF lock will deadlock, since this code uses clk_get_rate(). Fixes: c474b38665463 ("spi: Add driver for Cadence SPI controller") Signed-off-by: Michael Henneri

[PATCH 4.14 47/50] net: introduce skb_list_walk_safe for skb segment walking

2021-01-22 Thread Greg Kroah-Hartman
From: Jason A. Donenfeld commit dcfea72e79b0aa7a057c8f6024169d86a1bbc84b upstream. As part of the continual effort to remove direct usage of skb->next and skb->prev, this patch adds a helper for iterating through the singly-linked variant of skb lists, which are used for lists of GSO packet. The

[PATCH 4.14 33/50] usb: ohci: Make distrust_firmware param default to false

2021-01-22 Thread Greg Kroah-Hartman
From: Hamish Martin commit c4005a8f65edc55fb1700dfc5c1c3dc58be80209 upstream. The 'distrust_firmware' module parameter dates from 2004 and the USB subsystem is a lot more mature and reliable now than it was then. Alter the default to false now. Suggested-by: Alan Stern Acked-by: Alan Stern Si

[PATCH 4.14 38/50] esp: avoid unneeded kmap_atomic call

2021-01-22 Thread Greg Kroah-Hartman
From: Willem de Bruijn [ Upstream commit 9bd6b629c39e3fa9e14243a6d8820492be1a5b2e ] esp(6)_output_head uses skb_page_frag_refill to allocate a buffer for the esp trailer. It accesses the page with kmap_atomic to handle highmem. But skb_page_frag_refill can return compound pages, of which kmap_a

[PATCH 4.14 34/50] compiler.h: Raise minimum version of GCC to 5.1 for arm64

2021-01-22 Thread Greg Kroah-Hartman
From: Will Deacon commit dca5244d2f5b94f1809f0c02a549edf41ccd5493 upstream. GCC versions >= 4.9 and < 5.1 have been shown to emit memory references beyond the stack pointer, resulting in memory corruption if an interrupt is taken after the stack pointer has been adjusted but before the reference

[PATCH 4.14 48/50] net: skbuff: disambiguate argument and member for skb_list_walk_safe helper

2021-01-22 Thread Greg Kroah-Hartman
From: Jason A. Donenfeld commit 5eee7bd7e245914e4e050c413dfe864e31805207 upstream. This worked before, because we made all callers name their next pointer "next". But in trying to be more "drop-in" ready, the silliness here is revealed. This commit fixes the problem by making the macro argument

[PATCH 4.14 49/50] net: ipv6: Validate GSO SKB before finish IPv6 processing

2021-01-22 Thread Greg Kroah-Hartman
From: Aya Levin [ Upstream commit b210de4f8c97d57de051e805686248ec4c6cfc52 ] There are cases where GSO segment's length exceeds the egress MTU: - Forwarding of a TCP GRO skb, when DF flag is not set. - Forwarding of an skb that arrived on a virtualisation interface (virtio-net/vhost/tap) wi

[PATCH 4.14 26/50] RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp

2021-01-22 Thread Greg Kroah-Hartman
From: Dinghao Liu commit a306aba9c8d869b1fdfc8ad9237f1ed718ea55e6 upstream. If usnic_ib_qp_grp_create() fails at the first call, dev_list will not be freed on error, which leads to memleak. Fixes: e3cf00d0a87f ("IB/usnic: Add Cisco VIC low-level hardware driver") Link: https://lore.kernel.org/r

[PATCH 4.14 23/50] pNFS: Mark layout for return if return-on-close was not sent

2021-01-22 Thread Greg Kroah-Hartman
From: Trond Myklebust commit 67bbceedc9bb8ad48993a8bd6486054756d711f4 upstream. If the layout return-on-close failed because the layoutreturn was never sent, then we should mark the layout for return again. Fixes: 9c47b18cf722 ("pNFS: Ensure we do clear the return-on-close layout stateid on fa

[PATCH 4.14 04/50] MIPS: relocatable: fix possible boot hangup with KASLR enabled

2021-01-22 Thread Greg Kroah-Hartman
From: Alexander Lobakin commit 69e976831cd53f9ba304fd20305b2025ecc78eab upstream. LLVM-built Linux triggered a boot hangup with KASLR enabled. arch/mips/kernel/relocate.c:get_random_boot() uses linux_banner, which is a string constant, as a random seed, but accesses it as an array of unsigned l

[PATCH 4.14 27/50] mm, slub: consider rest of partial list if acquire_slab() fails

2021-01-22 Thread Greg Kroah-Hartman
From: Jann Horn commit 8ff60eb052eeba95cfb3efe16b08c9199f8121cf upstream. acquire_slab() fails if there is contention on the freelist of the page (probably because some other CPU is concurrently freeing an object from the page). In that case, it might make sense to look for a different page (si

[PATCH 4.14 30/50] ALSA: firewire-tascam: Fix integer overflow in midi_port_work()

2021-01-22 Thread Greg Kroah-Hartman
From: Geert Uytterhoeven commit 9f65df9c589f249435255da37a5dd11f1bc86f4d upstream. As snd_fw_async_midi_port.consume_bytes is unsigned int, and NSEC_PER_SEC is 10L, the second multiplication in port->consume_bytes * 8 * NSEC_PER_SEC / 31250 always overflows on 32-bit platforms, tru

[PATCH 4.14 05/50] ACPI: scan: Harden acpi_device_add() against device ID overflows

2021-01-22 Thread Greg Kroah-Hartman
From: Dexuan Cui commit a58015d638cd4e4555297b04bec9b49028369075 upstream. Linux VM on Hyper-V crashes with the latest mainline: [4.069624] detected buffer overflow in strcpy [4.077733] kernel BUG at lib/string.c:1149! .. [4.085819] RIP: 0010:fortify_panic+0xf/0x11 ... [4.085819

[PATCH 4.14 06/50] mm/hugetlb: fix potential missing huge page size info

2021-01-22 Thread Greg Kroah-Hartman
From: Miaohe Lin commit 0eb98f1588c2cc7a79816d84ab18a55d254f481c upstream. The huge page size is encoded for VM_FAULT_HWPOISON errors only. So if we return VM_FAULT_HWPOISON, huge page size would just be ignored. Link: https://lkml.kernel.org/r/20210107123449.38481-1-linmia...@huawei.com Fixes

[PATCH 4.14 08/50] r8152: Add Lenovo Powered USB-C Travel Hub

2021-01-22 Thread Greg Kroah-Hartman
From: Leon Schuermann commit cb82a54904a99df9e8f9e9d282046055dae5a730 upstream. This USB-C Hub (17ef:721e) based on the Realtek RTL8153B chip used to use the cdc_ether driver. However, using this driver, with the system suspended the device constantly sends pause-frames as soon as the receive bu

[PATCH 4.14 41/50] net: stmmac: Fixed mtu channged by cache aligned

2021-01-22 Thread Greg Kroah-Hartman
From: David Wu [ Upstream commit 5b55299eed78538cc4746e50ee97103a1643249c ] Since the original mtu is not used when the mtu is updated, the mtu is aligned with cache, this will get an incorrect. For example, if you want to configure the mtu to be 1500, but mtu 1536 is configured in fact. Fixed:

[PATCH 4.14 19/50] ARM: picoxcell: fix missing interrupt-parent properties

2021-01-22 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit bac717171971176b78c72d15a8b6961764ab197f ] dtc points out that the interrupts for some devices are not parsable: picoxcell-pc3x2.dtsi:45.19-49.5: Warning (interrupts_property): /paxi/gem@3: Missing interrupt-parent picoxcell-pc3x2.dtsi:51.21-55.5: Warn

[PATCH 4.14 29/50] dm: eliminate potential source of excessive kernel log noise

2021-01-22 Thread Greg Kroah-Hartman
From: Mike Snitzer commit 0378c625afe80eb3f212adae42cc33c9f6f31abf upstream. There wasn't ever a real need to log an error in the kernel log for ioctls issued with insufficient permissions. Simply return an error and if an admin/user is sufficiently motivated they can enable DM's dynamic debuggi

[PATCH v5 4/4] integrity: Load mokx variables into the blacklist keyring

2021-01-22 Thread Eric Snowberg
During boot the Secure Boot Forbidden Signature Database, dbx, is loaded into the blacklist keyring. Systems booted with shim have an equivalent Forbidden Signature Database called mokx. Currently mokx is only used by shim and grub, the contents are ignored by the kernel. Add the ability to load

[PATCH 5.4 12/33] udp: Prevent reuseport_select_sock from reading uninitialized socks

2021-01-22 Thread Greg Kroah-Hartman
From: Baptiste Lepers [ Upstream commit fd2ddef043592e7de80af53f47fa46fd3573086e ] reuse->socks[] is modified concurrently by reuseport_add_sock. To prevent reading values that have not been fully initialized, only read the array up until the last known safe index instead of incorrectly re-readi

[PATCH 4.19 08/22] net: mvpp2: Remove Pause and Asym_Pause support

2021-01-22 Thread Greg Kroah-Hartman
From: Stefan Chulski [ Upstream commit 6f83802a1a06e74eafbdbc9b52c05516d3083d02 ] Packet Processor hardware not connected to MAC flow control unit and cannot support TX flow control. This patch disable flow control support. Fixes: 3f518509dedc ("ethernet: Add new driver for Marvell Armada 375 n

[PATCH 4.14 32/50] netfilter: conntrack: fix reading nf_conntrack_buckets

2021-01-22 Thread Greg Kroah-Hartman
From: Jesper Dangaard Brouer commit f6351c3f1c27c80535d76cac2299aec44c36291e upstream. The old way of changing the conntrack hashsize runtime was through changing the module param via file /sys/module/nf_conntrack/parameters/hashsize. This was extended to sysctl change in commit 3183ab8997a4 ("n

[PATCH] Revert "mm: memcontrol: avoid workload stalls when lowering memory.high"

2021-01-22 Thread Johannes Weiner
This reverts commit 536d3bf261a2fc3b05b3e91e7eef7383443015cf, as it can cause writers to memory.high to get stuck in the kernel forever, performing page reclaim and consuming excessive amounts of CPU cycles. Before the patch, a write to memory.high would first put the new limit in place for the wo

Re: [PATCH bpf-next v3 3/3] xsk: build skb by page

2021-01-22 Thread Alexander Lobakin
From: Magnus Karlsson Date: Fri, 22 Jan 2021 19:37:06 +0100 > On Fri, Jan 22, 2021 at 6:26 PM Alexander Lobakin wrote: > > > > From: Xuan Zhuo > > Date: Fri, 22 Jan 2021 23:39:15 +0800 > > > > > On Fri, 22 Jan 2021 13:55:14 +0100, Magnus Karlsson > > > wrote: > > > > On Fri, Jan 22, 2021 at 1

[PATCH v9 15/20] dlb: add queue map, unmap, and pending unmap operations

2021-01-22 Thread Mike Ximing Chen
Add the high-level code for queue map, unmap, and pending unmap query ioctl commands and argument verification -- with stubs for the low-level register accesses and the queue map/unmap state machine, to be filled in a later commit. The queue map/unmap in this commit refers to link/unlink between D

[PATCH v9 14/20] dlb: add start domain ioctl

2021-01-22 Thread Mike Ximing Chen
Add ioctl to start a domain. Once a scheduling domain and its resources have been configured, this ioctl is called to allow the domain's ports to begin enqueueing to the device. Once started, the domain's resources cannot be configured again until after the domain is reset. This ioctl instructs th

Re: [PATCH] checkpatch: add warning for avoiding .L prefix symbols in assembly files

2021-01-22 Thread Joe Perches
On Fri, 2021-01-22 at 18:48 +0530, Aditya wrote: > On 21/1/21 12:13 am, Joe Perches wrote: > > I believe the test should be: > > > > if ($realfile =~ /\.S$/ && > > $line =~ /^\+\s*SYM_[A-Z]+_(?:START|END)(?:_[A-Z_]+)?\s*\(\s*\.L/) { > > Joe, with this regex, we won't be able to match

Re: [PATCH] sched/fair: Rate limit calls to update_blocked_averages() for NOHZ

2021-01-22 Thread Joel Fernandes
Hi Vincent, Thanks for reply. Please see the replies below: On Fri, Jan 22, 2021 at 05:56:22PM +0100, Vincent Guittot wrote: > On Fri, 22 Jan 2021 at 16:46, Joel Fernandes (Google) > wrote: > > > > On an octacore ARM64 device running ChromeOS Linux kernel v5.4, I found > > that there are a lot o

Re: [PATCH v4 8/8] mm: Mark anonymous struct field of 'struct vm_fault' as 'const'

2021-01-22 Thread Nick Desaulniers
On Thu, Jan 21, 2021 at 1:28 PM Will Deacon wrote: > > On Thu, Jan 21, 2021 at 11:24:36AM -0800, Nick Desaulniers wrote: > > On Thu, Jan 21, 2021 at 5:11 AM Will Deacon wrote: > > > > > > On Wed, Jan 20, 2021 at 11:02:06AM -0800, Linus Torvalds wrote: > > > > On Wed, Jan 20, 2021 at 10:27 AM Nick

[PATCH v9 13/20] dlb: add port mmap support

2021-01-22 Thread Mike Ximing Chen
Once a port is created, the application can mmap the corresponding DMA memory and MMIO into user-space. This allows user-space applications to do (performance-sensitive) enqueue and dequeue independent of the kernel driver. The mmap callback is only available through special port files: a producer

[PATCH 4.14 25/50] ext4: fix superblock checksum failure when setting password salt

2021-01-22 Thread Greg Kroah-Hartman
From: Jan Kara commit dfd56c2c0c0dbb11be939b804ddc8d5395ab3432 upstream. When setting password salt in the superblock, we forget to recompute the superblock checksum so it will not match until the next superblock modification which recomputes the checksum. Fix it. CC: Michael Halcrow Reported-

[PATCH 4.14 28/50] net: sunrpc: interpret the return value of kstrtou32 correctly

2021-01-22 Thread Greg Kroah-Hartman
From: j.nixd...@avm.de commit 86b53fbf08f48d353a86a06aef537e78e82ba721 upstream. A return value of 0 means success. This is documented in lib/kstrtox.c. This was found by trying to mount an NFS share from a link-local IPv6 address with the interface specified by its index: mount("[fe80::1%1]

[PATCH 4.14 00/50] 4.14.217-rc1 review

2021-01-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.14.217 release. There are 50 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun, 24 Jan 2021 13:57:23 +. Anything re

[PATCH 4.14 42/50] net: sit: unregister_netdevice on newlinks error path

2021-01-22 Thread Greg Kroah-Hartman
From: Jakub Kicinski [ Upstream commit 47e4bb147a96f1c9b4e7691e7e994e53838bfff8 ] We need to unregister the netdevice if config failed. .ndo_uninit takes care of most of the heavy lifting. This was uncovered by recent commit c269a24ce057 ("net: make free_netdev() more lenient with unregistering

[PATCH 4.14 44/50] rxrpc: Fix handling of an unsupported token type in rxrpc_read()

2021-01-22 Thread Greg Kroah-Hartman
From: David Howells [ Upstream commit d52e419ac8b50c8bef41b398ed13528e75d7ad48 ] Clang static analysis reports the following: net/rxrpc/key.c:657:11: warning: Assigned value is garbage or undefined toksize = toksizes[tok++]; ^ ~~~ rxrpc_read(

Re: [PATCH v9 01/17] Documentation: PCI: Add specification for the *PCI NTB* function device

2021-01-22 Thread Kishon Vijay Abraham I
Hi Bjorn, On 20/01/21 12:04 am, Bjorn Helgaas wrote: > On Mon, Jan 04, 2021 at 08:58:53PM +0530, Kishon Vijay Abraham I wrote: >> Add specification for the *PCI NTB* function device. The endpoint function >> driver and the host PCI driver should be created based on this >> specification. >> >> Sig

[PATCH 4.14 46/50] net: use skb_list_del_init() to remove from RX sublists

2021-01-22 Thread Greg Kroah-Hartman
From: Edward Cree [ Upstream commit 22f6bbb7bcfcef0b373b0502a7ff390275c575dd ] list_del() leaves the skb->next pointer poisoned, which can then lead to a crash in e.g. OVS forwarding. For example, setting up an OVS VXLAN forwarding bridge on sfc as per: $ ovs-vsctl show 5dfd9c47-f04

[PATCH 4.14 45/50] tipc: fix NULL deref in tipc_link_xmit()

2021-01-22 Thread Greg Kroah-Hartman
From: Hoang Le [ Upstream commit b77413446408fdd256599daf00d5be72b5f3e7c6 ] The buffer list can have zero skb as following path: tipc_named_node_up()->tipc_node_xmit()->tipc_link_xmit(), so we need to check the list before casting an &sk_buff. Fault report: [] tipc: Bulk publication failure [

[PATCH 4.14 35/50] nfsd4: readdirplus shouldnt return parent of export

2021-01-22 Thread Greg Kroah-Hartman
From: J. Bruce Fields commit 51b2ee7d006a736a9126e8111d1f24e4fd0afaa6 upstream. If you export a subdirectory of a filesystem, a READDIRPLUS on the root of that export will return the filehandle of the parent with the ".." entry. The filehandle is optional, so let's just not return the filehandl

[PATCH 4.14 36/50] netxen_nic: fix MSI/MSI-x interrupts

2021-01-22 Thread Greg Kroah-Hartman
From: Manish Chopra [ Upstream commit a2bc221b972db91e4be1970e776e98f16aa87904 ] For all PCI functions on the netxen_nic adapter, interrupt mode (INTx or MSI) configuration is dependent on what has been configured by the PCI function zero in the shared interrupt register, as these adapters do no

[PATCH 4.19 12/22] net: dcb: Accept RTM_GETDCB messages carrying set-like DCB commands

2021-01-22 Thread Greg Kroah-Hartman
From: Petr Machata [ Upstream commit df85bc140a4d6cbaa78d8e9c35154e1a2f0622c7 ] In commit 826f328e2b7e ("net: dcb: Validate netlink message in DCB handler"), Linux started rejecting RTM_GETDCB netlink messages if they contained a set-like DCB_CMD_ command. The reason was that privileges were on

[PATCH 4.19 01/22] usb: ohci: Make distrust_firmware param default to false

2021-01-22 Thread Greg Kroah-Hartman
From: Hamish Martin commit c4005a8f65edc55fb1700dfc5c1c3dc58be80209 upstream. The 'distrust_firmware' module parameter dates from 2004 and the USB subsystem is a lot more mature and reliable now than it was then. Alter the default to false now. Suggested-by: Alan Stern Acked-by: Alan Stern Si

[PATCH 4.19 04/22] crypto: x86/crc32c - fix building with clang ias

2021-01-22 Thread Greg Kroah-Hartman
From: Arnd Bergmann commit 44623b2818f4a442726639572f44fd9b6d0ef68c upstream. The clang integrated assembler complains about movzxw: arch/x86/crypto/crc32c-pcl-intel-asm_64.S:173:2: error: invalid instruction mnemonic 'movzxw' It seems that movzwq is the mnemonic that it expects instead, and

[PATCH 4.19 13/22] rxrpc: Call state should be read with READ_ONCE() under some circumstances

2021-01-22 Thread Greg Kroah-Hartman
From: Baptiste Lepers [ Upstream commit a95d25dd7b94a5ba18246da09b4218f132fed60e ] The call state may be changed at any time by the data-ready routine in response to received packets, so if the call state is to be read and acted upon several times in a function, READ_ONCE() must be used unless t

Re: [net-next PATCH v4 09/15] device property: Introduce fwnode_get_id()

2021-01-22 Thread Rafael J. Wysocki
On Fri, Jan 22, 2021 at 7:11 PM Rafael J. Wysocki wrote: > > On Fri, Jan 22, 2021 at 6:12 PM Andy Shevchenko > wrote: > > > > On Fri, Jan 22, 2021 at 05:40:41PM +0100, Rafael J. Wysocki wrote: > > > On Fri, Jan 22, 2021 at 4:46 PM Calvin Johnson > > > wrote: > > > > > > > > Using fwnode_get_id()

[PATCH BUGFIX/IMPROVEMENT 1/6] block, bfq: use half slice_idle as a threshold to check short ttime

2021-01-22 Thread Paolo Valente
The value of the I/O plugging (idling) timeout is used also as the think-time threshold to decide whether a process has a short think time. In this respect, a good value of this timeout for rotational drives is un the order of several ms. Yet, this is often too long a time interval to be effective

[PATCH BUGFIX/IMPROVEMENT 2/6] block, bfq: set next_rq to waker_bfqq->next_rq in waker injection

2021-01-22 Thread Paolo Valente
From: Jia Cheng Hu Since commit c5089591c3ba ("block, bfq: detect wakers and unconditionally inject their I/O"), when the in-service bfq_queue, say Q, is temporarily empty, BFQ checks whether there are I/O requests to inject (also) from the waker bfq_queue for Q. To this goal, the value pointed b

[PATCH BUGFIX/IMPROVEMENT 3/6] block, bfq: increase time window for waker detection

2021-01-22 Thread Paolo Valente
Tests on slower machines showed current window to be way too small. This commit increases it. Tested-by: Jan Kara Signed-off-by: Paolo Valente --- block/bfq-iosched.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/block/bfq-iosched.c b/block/bfq-iosched.c index fdc5e163b2fe

[PATCH v9 12/20] dlb: add register operations for port management

2021-01-22 Thread Mike Ximing Chen
Add the low-level code for configuring a new port, programming the device-wide poll mode setting, and resetting a port. The low-level port configuration functions program the device based on the user-supplied ioctl arguments. These arguments are first verified, e.g. to ensure that the port's CQ ba

[PATCH v9 11/20] dlb: add ioctl to configure ports and query poll mode

2021-01-22 Thread Mike Ximing Chen
Add high-level code for port configuration and poll-mode query ioctl commands, argument verification, and placeholder functions for the low-level register accesses. A subsequent commit will add the low-level logic. The port is a core's interface to the DLB, and it consists of an MMIO page (the "pr

[GIT PULL] arm64 fixes for 5.11-rc5

2021-01-22 Thread Catalin Marinas
Hi Linus, Please pull the arm64 fixes below. Thanks. The following changes since commit 3a57a643a851dbb1c4a1819394ca009e3bfa4813: arm64: selftests: Fix spelling of 'Mismatch' (2021-01-15 10:05:27 +) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/a

[PATCH v9 08/20] dlb: add runtime power-management support

2021-01-22 Thread Mike Ximing Chen
Implemented a power-management policy of putting the device in D0 when in use (when there are any open device files or memory mappings, or there are any virtual devices), and D3Hot otherwise. Add resume/suspend callbacks; when the device resumes, reset the hardware to a known good state. Signed-o

[PATCH v9 07/20] dlb: add low-level register reset operations

2021-01-22 Thread Mike Ximing Chen
Program all registers used to configure the domain's resources back to their reset values during scheduling domain reset. This ensures the device is in a known good state if/when it is configured again in the future. Additional work is required if a resource is in-use (e.g. a queue is non-empty) a

[PATCH v9 06/20] dlb: add domain software reset

2021-01-22 Thread Mike Ximing Chen
Add operation to reset a domain's resource's software state when its reference count reaches zero, and re-inserts those resources in their respective available-resources linked lists, for use by future scheduling domains. Signed-off-by: Gage Eads Signed-off-by: Mike Ximing Chen Reviewed-by: Magn

[PATCH v9 05/20] dlb: add scheduling domain configuration

2021-01-22 Thread Mike Ximing Chen
Add support for configuring a scheduling domain, creating the domain fd, and reserving the domain's resources. A scheduling domain serves as a container of DLB resources -- e.g. ports, queues, and credits -- with the property that a port can only enqueue to and dequeue from queues within its domai

[PATCH v9 19/20] dlb: add queue unmap register operations

2021-01-22 Thread Mike Ximing Chen
Add the "dynamic" unmap procedure and associated register operations. Unmapping a load-balanced queue from a port removes that port from the queue's load-balancing candidates. If a queue unmap is requested after the domain is started, the driver must disable the requested queue and wait for it to q

<    5   6   7   8   9   10   11   12   13   14   >