[PATCH 5.11 06/12] xen-blkback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 5a264285ed1cd32e26d9de4f3c8c6855e467fd63 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.11 08/12] xen-scsiback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 7c77474b2d22176d2bfb592ec74e0f2cb71352c9 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.10 01/29] vdpa_sim: remove hard-coded virtq count

2021-02-22 Thread Greg Kroah-Hartman
From: Max Gurtovoy commit 423248d60d2b655321fc49eca1545f95a1bc9d6c upstream. Add a new attribute that will define the number of virt queues to be created for the vdpasim device. Signed-off-by: Max Gurtovoy [sgarzare: replace kmalloc_array() with kcalloc()] Acked-by: Jason Wang Signed-off-by:

[PATCH 5.11 07/12] xen-netback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 3194a1746e8aabe86075fd3c5e7cf1f4632d7f16 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.11 09/12] xen-blkback: fix error handling in xen_blkbk_map()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 871997bc9e423f05c7da7c9178e62dde5df2a7f8 upstream. The function uses a goto-based loop, which may lead to an earlier error getting discarded by a later iteration. Exit this ad-hoc loop when an error was encountered. The out-of-memory error path additionally fails to fil

[PATCH 5.10 15/29] net: fix proc_fs init handling in af_packet and tls

2021-02-22 Thread Greg Kroah-Hartman
From: Yonatan Linik [ Upstream commit a268e0f2455c32653140775662b40c2b1f1b2efa ] proc_fs was used, in af_packet, without a surrounding #ifdef, although there is no hard dependency on proc_fs. That caused the initialization of the af_packet module to fail when CONFIG_PROC_FS=n. Specifically, pro

[PATCH 5.10 11/29] mt76: mt7615: fix rdd mcu cmd endianness

2021-02-22 Thread Greg Kroah-Hartman
From: Lorenzo Bianconi [ Upstream commit 0211c282bc8aaa15343aadbc6e23043e7057f77d ] Similar to mt7915 driver, fix mt7615 radar mcu command endianness Fixes: 2ce73efe0f8e5 ("mt76: mt7615: initialize radar specs from host driver") Fixes: 70911d9638069 ("mt76: mt7615: add radar pattern test knob t

[PATCH 5.10 14/29] net: bridge: Fix a warning when del bridge sysfs

2021-02-22 Thread Greg Kroah-Hartman
From: Wang Hai [ Upstream commit 989a1db06eb18ff605377eec87e18d795e0ec74b ] I got a warining report: br_sysfs_addbr: can't create group bridge4/bridge [ cut here ] sysfs group 'bridge' not found for kobject 'bridge4' WARNING: CPU: 2 PID: 9004 at fs/sysfs/group.c:279 sysf

[PATCH 5.10 13/29] net: openvswitch: fix TTL decrement exception action execution

2021-02-22 Thread Greg Kroah-Hartman
From: Eelco Chaudron [ Upstream commit 09d6217254c004f6237cc2c2bfe604af58e9a8c5 ] Currently, the exception actions are not processed correctly as the wrong dataset is passed. This change fixes this, including the misleading comment. In addition, a check was added to make sure we work on an IPv4

[PATCH 5.10 07/29] net: qrtr: Fix port ID for control messages

2021-02-22 Thread Greg Kroah-Hartman
From: Loic Poulain [ Upstream commit ae068f561baa003d260475c3e441ca454b186726 ] The port ID for control messages was uncorrectly set with broadcast node ID value, causing message to be dropped on remote side since not passing packet filtering (cb->dst_port != QRTR_PORT_CTRL). Fixes: d27e77a3de2

[PATCH 5.10 09/29] net/sched: fix miss init the mru in qdisc_skb_cb

2021-02-22 Thread Greg Kroah-Hartman
From: wenxu [ Upstream commit aadaca9e7c392dbf877af8cefb156199f1a67bbe ] The mru in the qdisc_skb_cb should be init as 0. Only defrag packets in the act_ct will set the value. Fixes: 038ebb1a713d ("net/sched: act_ct: fix miss set mru for ovs after defrag in act_ct") Signed-off-by: wenxu Signe

[PATCH 5.10 08/29] mptcp: skip to next candidate if subflow has unacked data

2021-02-22 Thread Greg Kroah-Hartman
From: Florian Westphal [ Upstream commit 860975c6f80adae9d2c7654bde04a99dd28bc94f ] In case a subflow path is blocked, MPTCP-level retransmit may not take place anymore because such subflow is likely to have unacked data left in its write queue. Ignore subflows that have experienced loss and te

[PATCH 5.10 03/29] vdpa_sim: store parsed MAC address in a buffer

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Garzarella commit cf1a3b35382c10ce315c32bd2b3d7789897fbe13 upstream. As preparation for the next patches, we store the MAC address, parsed during the vdpasim_create(), in a buffer that will be used to fill 'config' together with other configurations. Acked-by: Jason Wang Signed-o

[PATCH 5.10 05/29] vdpa_sim: add get_config callback in vdpasim_dev_attr

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Garzarella commit 65b709586e222fa6ffd4166ac7fdb5d5dad113ee upstream. The get_config callback can be used by the device to fill the config structure. The callback will be invoked in vdpasim_get_config() before copying bytes into caller buffer. Move vDPA-net config updates from vdpa

[PATCH 5.10 22/29] xen-netback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 3194a1746e8aabe86075fd3c5e7cf1f4632d7f16 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.10 29/29] media: pwc: Use correct device for DMA

2021-02-22 Thread Greg Kroah-Hartman
From: Matwey V. Kornilov commit 69c9e825e812ec6d663e64ebf14bd3bc7f37e2c7 upstream. This fixes the following newly introduced warning: [ 15.518253] [ cut here ] [ 15.518941] WARNING: CPU: 0 PID: 246 at kernel/dma/mapping.c:149 dma_map_page_attrs+0x1a8/0x1d0 [ 15.52

[PATCH 5.10 27/29] btrfs: fix backport of 2175bf57dc952 in 5.10.13

2021-02-22 Thread Greg Kroah-Hartman
From: David Sterba There's a mistake in backport of upstream commit 2175bf57dc95 ("btrfs: fix possible free space tree corruption with online conversion") as 5.10.13 commit 2175bf57dc95. The enum value BTRFS_FS_FREE_SPACE_TREE_UNTRUSTED has been added to the wrong enum set, colliding with value

[PATCH 5.10 02/29] vdpa_sim: add struct vdpasim_dev_attr for device attributes

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Garzarella commit 6c6e28fe45794054410ad8cd2770af69fbe0338d upstream. vdpasim_dev_attr will contain device specific attributes. We starting moving the number of virtqueues (i.e. nvqs) to vdpasim_dev_attr. vdpasim_create() creates a new vDPA simulator following the device attributes

[PATCH 5.4 01/13] KVM: SEV: fix double locking due to incorrect backport

2021-02-22 Thread Greg Kroah-Hartman
From: Paolo Bonzini Fix an incorrect line in the 5.4.y and 4.19.y backports of commit 19a23da53932bc ("Fix unsynchronized access to sev members through svm_register_enc_region"), first applied to 5.4.98 and 4.19.176. Fixes: 1e80fdc09d12 ("KVM: SVM: Pin guest memory when SEV is active") Reported-

[PATCH 5.10 20/29] xen/arm: dont ignore return errors from set_phys_to_machine

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Stabellini commit 36bf1dfb8b266e089afa9b7b984217f17027bf35 upstream. set_phys_to_machine can fail due to lack of memory, see the kzalloc call in arch/arm/xen/p2m.c:__set_phys_to_machine_multi. Don't ignore the potential return error in set_foreign_p2m_mapping, returning it to the

[PATCH 5.10 21/29] xen-blkback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 5a264285ed1cd32e26d9de4f3c8c6855e467fd63 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.10 25/29] tty: protect tty_write from odd low-level tty disciplines

2021-02-22 Thread Greg Kroah-Hartman
From: Linus Torvalds commit 3342ff2698e9720f4040cc458a2744b2b32f5c3a upstream. Al root-caused a new warning from syzbot to the ttyprintk tty driver returning a write count larger than the data the tty layer actually gave it. Which confused the tty write code mightily, and with the new iov_iter

[PATCH 5.10 06/29] IB/isert: add module param to set sg_tablesize for IO cmd

2021-02-22 Thread Greg Kroah-Hartman
From: Max Gurtovoy [ Upstream commit dae7a75f1f19bffb579daf148f8d8addd2726772 ] Currently, iser target support max IO size of 16MiB by default. For some adapters, allocating this amount of resources might reduce the total number of possible connections that can be created. For those adapters, it

[PATCH 5.10 00/29] 5.10.18-rc1 review

2021-02-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.10.18 release. There are 29 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 24 Feb 2021 12:07:46 +. Anything rec

[PATCH 5.10 19/29] Xen/gntdev: correct error checking in gntdev_map_grant_pages()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit ebee0eab08594b2bd5db716288a4f1ae5936e9bc upstream. Failure of the kernel part of the mapping operation should also be indicated as an error to the caller, or else it may assume the respective kernel VA is okay to access. Furthermore gnttab_map_refs() failing still requi

[PATCH 5.10 26/29] Bluetooth: btusb: Always fallback to alt 1 for WBS

2021-02-22 Thread Greg Kroah-Hartman
From: Trent Piepho commit 517b693351a2d04f3af1fc0e506ac7e1346094de upstream. When alt mode 6 is not available, fallback to the kernel <= 5.7 behavior of always using alt mode 1. Prior to kernel 5.8, btusb would always use alt mode 1 for WBS (Wide Band Speech aka mSBC aka transparent SCO). In c

[PATCH 5.10 23/29] xen-scsiback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 7c77474b2d22176d2bfb592ec74e0f2cb71352c9 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.10 24/29] xen-blkback: fix error handling in xen_blkbk_map()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 871997bc9e423f05c7da7c9178e62dde5df2a7f8 upstream. The function uses a goto-based loop, which may lead to an earlier error getting discarded by a later iteration. Exit this ad-hoc loop when an error was encountered. The out-of-memory error path additionally fails to fil

[PATCH 5.10 17/29] Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit b512e1b077e5ccdbd6e225b15d934ab12453b70a upstream. We should not set up further state if either mapping failed; paying attention to just the user mapping's status isn't enough. Also use GNTST_okay instead of implying its value (zero). This is part of XSA-361. Signed-o

[PATCH 5.10 16/29] Xen/x86: dont bail early from clear_foreign_p2m_mapping()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit a35f2ef3b7376bfd0a57f7844bd7454389aae1fc upstream. Its sibling (set_foreign_p2m_mapping()) as well as the sibling of its only caller (gnttab_map_refs()) don't clean up after themselves in case of error. Higher level callers are expected to do so. However, in order for th

[PATCH 5.10 12/29] net: sched: incorrect Kconfig dependencies on Netfilter modules

2021-02-22 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso [ Upstream commit 102e2c07239c07144d9c7338ec09b9d47f2e5f79 ] - NET_ACT_CONNMARK and NET_ACT_CTINFO only require conntrack support. - NET_ACT_IPT only requires NETFILTER_XTABLES symbols, not IP_NF_IPTABLES. After this patch, NET_ACT_IPT becomes consistent with NET_EMAT

[PATCH 5.10 18/29] Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit dbe5283605b3bc12ca45def09cc721a0a5c853a2 upstream. We may not skip setting the field in the unmap structure when GNTMAP_device_map is in use - such an unmap would fail to release the respective resources (a page ref in the hypervisor). Otoh the field doesn't need setting

[PATCH 5.10 28/29] btrfs: fix crash after non-aligned direct IO write with O_DSYNC

2021-02-22 Thread Greg Kroah-Hartman
From: Filipe Manana Whenever we attempt to do a non-aligned direct IO write with O_DSYNC, we end up triggering an assertion and crashing. Example reproducer: $ cat test.sh #!/bin/bash DEV=/dev/sdj MNT=/mnt/sdj mkfs.btrfs -f $DEV > /dev/null mount $DEV $MNT # Do a direct IO write

[PATCH 5.10 04/29] vdpa_sim: make config generic and usable for any device type

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Garzarella commit f37cbbc65178e0a45823d281d290c4c02da9631c upstream. Add new 'config_size' attribute in 'vdpasim_dev_attr' and allocates 'config' dynamically to support any device types. Acked-by: Jason Wang Signed-off-by: Stefano Garzarella Link: https://lore.kernel.org/r/20201

[PATCH 5.4 10/13] xen-netback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 3194a1746e8aabe86075fd3c5e7cf1f4632d7f16 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.4 11/13] xen-scsiback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 7c77474b2d22176d2bfb592ec74e0f2cb71352c9 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.4 12/13] xen-blkback: fix error handling in xen_blkbk_map()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 871997bc9e423f05c7da7c9178e62dde5df2a7f8 upstream. The function uses a goto-based loop, which may lead to an earlier error getting discarded by a later iteration. Exit this ad-hoc loop when an error was encountered. The out-of-memory error path additionally fails to fil

[PATCH 5.4 02/13] net: qrtr: Fix port ID for control messages

2021-02-22 Thread Greg Kroah-Hartman
From: Loic Poulain [ Upstream commit ae068f561baa003d260475c3e441ca454b186726 ] The port ID for control messages was uncorrectly set with broadcast node ID value, causing message to be dropped on remote side since not passing packet filtering (cb->dst_port != QRTR_PORT_CTRL). Fixes: d27e77a3de2

[PATCH 5.4 04/13] Xen/x86: dont bail early from clear_foreign_p2m_mapping()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit a35f2ef3b7376bfd0a57f7844bd7454389aae1fc upstream. Its sibling (set_foreign_p2m_mapping()) as well as the sibling of its only caller (gnttab_map_refs()) don't clean up after themselves in case of error. Higher level callers are expected to do so. However, in order for th

[PATCH 5.4 05/13] Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit b512e1b077e5ccdbd6e225b15d934ab12453b70a upstream. We should not set up further state if either mapping failed; paying attention to just the user mapping's status isn't enough. Also use GNTST_okay instead of implying its value (zero). This is part of XSA-361. Signed-o

[PATCH 5.4 06/13] Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit dbe5283605b3bc12ca45def09cc721a0a5c853a2 upstream. We may not skip setting the field in the unmap structure when GNTMAP_device_map is in use - such an unmap would fail to release the respective resources (a page ref in the hypervisor). Otoh the field doesn't need setting

[PATCH 5.4 03/13] net: bridge: Fix a warning when del bridge sysfs

2021-02-22 Thread Greg Kroah-Hartman
From: Wang Hai [ Upstream commit 989a1db06eb18ff605377eec87e18d795e0ec74b ] I got a warining report: br_sysfs_addbr: can't create group bridge4/bridge [ cut here ] sysfs group 'bridge' not found for kobject 'bridge4' WARNING: CPU: 2 PID: 9004 at fs/sysfs/group.c:279 sysf

[PATCH 5.4 09/13] xen-blkback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 5a264285ed1cd32e26d9de4f3c8c6855e467fd63 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 5.4 13/13] media: pwc: Use correct device for DMA

2021-02-22 Thread Greg Kroah-Hartman
From: Matwey V. Kornilov commit 69c9e825e812ec6d663e64ebf14bd3bc7f37e2c7 upstream. This fixes the following newly introduced warning: [ 15.518253] [ cut here ] [ 15.518941] WARNING: CPU: 0 PID: 246 at kernel/dma/mapping.c:149 dma_map_page_attrs+0x1a8/0x1d0 [ 15.52

[PATCH 4.19 13/50] ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL

2021-02-22 Thread Greg Kroah-Hartman
From: Alexandre Belloni [ Upstream commit 5638159f6d93b99ec9743ac7f65563fca3cf413d ] This reverts commit c17e9377aa81664d94b4f2102559fcf2a01ec8e7. The lpc32xx clock driver is not able to actually change the PLL rate as this would require reparenting ARM_CLK, DDRAM_CLK, PERIPH_CLK to SYSCLK, the

[PATCH 4.19 10/50] drm/amd/display: Free atomic state after drm_atomic_commit

2021-02-22 Thread Greg Kroah-Hartman
From: Victor Lu [ Upstream commit 2abaa323d744011982b20b8f3886184d56d23946 ] [why] drm_atomic_commit was changed so that the caller must free their drm_atomic_state reference on successes. [how] Add drm_atomic_commit_put after drm_atomic_commit call in dm_force_atomic_commit. Signed-off-by: Vi

[PATCH 4.19 14/50] ARM: ensure the signal page contains defined contents

2021-02-22 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 9c698bff66ab4914bb3d71da7dc6112519bde23e ] Ensure that the signal page contains our poison instruction to increase the protection against ROP attacks and also contains well defined contents. Acked-by: Will Deacon Signed-off-by: Russell King Signed-off-by:

[PATCH 4.19 18/50] netfilter: xt_recent: Fix attempt to update deleted entry

2021-02-22 Thread Greg Kroah-Hartman
From: Jozsef Kadlecsik [ Upstream commit b1bdde33b72366da20d10770ab7a49fe87b5e190 ] When both --reap and --update flag are specified, there's a code path at which the entry to be updated is reaped beforehand, which then leads to kernel crash. Reap only entries which won't be updated. Fixes kern

[PATCH 4.19 01/50] tracing: Do not count ftrace events in top level enable output

2021-02-22 Thread Greg Kroah-Hartman
From: Steven Rostedt (VMware) commit 256cfdd6fdf70c6fcf0f7c8ddb0ebd73ce8f3bc9 upstream. The file /sys/kernel/tracing/events/enable is used to enable all events by echoing in "1", or disabling all events when echoing in "0". To know if all events are enabled, disabled, or some are enabled but not

[PATCH 4.19 16/50] mt76: dma: fix a possible memory leak in mt76_add_fragment()

2021-02-22 Thread Greg Kroah-Hartman
From: Lorenzo Bianconi [ Upstream commit 93a1d4791c10d443bc67044def7efee2991d48b7 ] Fix a memory leak in mt76_add_fragment routine returning the buffer to the page_frag_cache when we receive a new fragment and the skb_shared_info frag array is full. Fixes: b102f0c522cf6 ("mt76: fix array overfl

[PATCH 4.19 11/50] riscv: virt_addr_valid must check the address belongs to linear mapping

2021-02-22 Thread Greg Kroah-Hartman
From: Alexandre Ghiti [ Upstream commit 2ab543823322b564f205cb15d0f0302803c87d11 ] virt_addr_valid macro checks that a virtual address is valid, ie that the address belongs to the linear mapping and that the corresponding physical page exists. Add the missing check that ensures the virtual add

[PATCH 4.19 17/50] bpf: Check for integer overflow when using roundup_pow_of_two()

2021-02-22 Thread Greg Kroah-Hartman
From: Bui Quang Minh [ Upstream commit 6183f4d3a0a2ad230511987c6c362ca43ec0055f ] On 32-bit architecture, roundup_pow_of_two() can return 0 when the argument has upper most bit set due to resulting 1UL << 32. Add a check for this case. Fixes: d5a3b1f69186 ("bpf: introduce BPF_MAP_TYPE_STACK_TRA

[PATCH 4.19 15/50] ARM: kexec: fix oops after TLB are invalidated

2021-02-22 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 4d62e81b60d4025e2dfcd5ea531cc1394ce9226f ] Giancarlo Ferrari reports the following oops while trying to use kexec: Unable to handle kernel paging request at virtual address 80112f38 pgd = fd7ef03e [80112f38] *pgd=0001141e(bad) Internal error: Oops: 80d [

[PATCH 4.19 12/50] bfq-iosched: Revert "bfq: Fix computation of shallow depth"

2021-02-22 Thread Greg Kroah-Hartman
From: Lin Feng [ Upstream commit 388c705b95f23f317fa43e6abf9ff07b583b721a ] This reverts commit 6d4d273588378c65915acaf7b2ee74e9dd9c130a. bfq.limit_depth passes word_depths[] as shallow_depth down to sbitmap core sbitmap_get_shallow, which uses just the number to limit the scan depth of each bi

[PATCH 5.4 00/13] 5.4.100-rc1 review

2021-02-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.4.100 release. There are 13 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 24 Feb 2021 12:07:46 +. Anything rec

[PATCH 5.4 08/13] xen/arm: dont ignore return errors from set_phys_to_machine

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Stabellini commit 36bf1dfb8b266e089afa9b7b984217f17027bf35 upstream. set_phys_to_machine can fail due to lack of memory, see the kzalloc call in arch/arm/xen/p2m.c:__set_phys_to_machine_multi. Don't ignore the potential return error in set_foreign_p2m_mapping, returning it to the

[PATCH 5.4 07/13] Xen/gntdev: correct error checking in gntdev_map_grant_pages()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit ebee0eab08594b2bd5db716288a4f1ae5936e9bc upstream. Failure of the kernel part of the mapping operation should also be indicated as an error to the caller, or else it may assume the respective kernel VA is okay to access. Furthermore gnttab_map_refs() failing still requi

[PATCH 4.19 20/50] xen/netback: avoid race in xenvif_rx_ring_slots_available()

2021-02-22 Thread Greg Kroah-Hartman
From: Juergen Gross [ Upstream commit ec7d8e7dd3a59528e305a18e93f1cb98f7faf83b ] Since commit 23025393dbeb3b8b3 ("xen/netback: use lateeoi irq binding") xenvif_rx_ring_slots_available() is no longer called only from the rx queue kernel thread, so it needs to access the rx queue with the associat

[PATCH 4.19 22/50] netfilter: conntrack: skip identical origin tuple in same zone only

2021-02-22 Thread Greg Kroah-Hartman
From: Florian Westphal [ Upstream commit 07998281c268592963e1cd623fe6ab0270b65ae4 ] The origin skip check needs to re-test the zone. Else, we might skip a colliding tuple in the reply direction. This only occurs when using 'directional zones' where origin tuples reside in different zones but th

[PATCH 4.19 21/50] net: stmmac: set TxQ mode back to DCB after disabling CBS

2021-02-22 Thread Greg Kroah-Hartman
From: Mohammad Athari Bin Ismail [ Upstream commit f317e2ea8c88737aa36228167b2292baef3f0430 ] When disable CBS, mode_to_use parameter is not updated even the operation mode of Tx Queue is changed to Data Centre Bridging (DCB). Therefore, when tc_setup_cbs() function is called to re-enable CBS, t

[PATCH 4.19 05/50] platform/x86: hp-wmi: Disable tablet-mode reporting by default

2021-02-22 Thread Greg Kroah-Hartman
From: Hans de Goede [ Upstream commit 67fbe02a5cebc3c653610f12e3c0424e58450153 ] Recently userspace has started making more use of SW_TABLET_MODE (when an input-dev reports this). Specifically recent GNOME3 versions will: 1. When SW_TABLET_MODE is reported and is reporting 0: 1.1 Disable acce

[PATCH 4.19 25/50] i2c: stm32f7: fix configuration of the digital filter

2021-02-22 Thread Greg Kroah-Hartman
From: Alain Volmat [ Upstream commit 3d6a3d3a2a7a3a60a824e7c04e95fd50dec57812 ] The digital filter related computation are present in the driver however the programming of the filter within the IP is missing. The maximum value for the DNF is wrong and should be 15 instead of 16. Fixes: aeb068c5

[PATCH 4.19 04/50] arm64: dts: rockchip: Fix PCIe DT properties on rk3399

2021-02-22 Thread Greg Kroah-Hartman
From: Marc Zyngier [ Upstream commit 43f20b1c6140896916f4e91aacc166830a7ba849 ] It recently became apparent that the lack of a 'device_type = "pci"' in the PCIe root complex node for rk3399 is a violation of the PCI binding, as documented in IEEE Std 1275-1994. Changes to the kernel's parsing of

[PATCH 4.19 28/50] usb: dwc3: ulpi: Replace CPU-based busyloop with Protocol-based one

2021-02-22 Thread Greg Kroah-Hartman
From: Serge Semin commit fca3f138105727c3a22edda32d02f91ce1bf11c9 upstream Originally the procedure of the ULPI transaction finish detection has been developed as a simple busy-loop with just decrementing counter and no delays. It's wrong since on different systems the loop will take a different

[PATCH 4.19 06/50] ovl: perform vfs_getxattr() with mounter creds

2021-02-22 Thread Greg Kroah-Hartman
From: Miklos Szeredi [ Upstream commit 554677b97257b0b69378bd74e521edb7e94769ff ] The vfs_getxattr() in ovl_xattr_set() is used to check whether an xattr exist on a lower layer file that is to be removed. If the xattr does not exist, then no need to copy up the file. This call of vfs_getxattr(

[PATCH 4.19 00/50] 4.19.177-rc1 review

2021-02-22 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.19.177 release. There are 50 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 24 Feb 2021 12:07:46 +. Anything re

[PATCH 4.19 30/50] net/vmw_vsock: improve locking in vsock_connect_timeout()

2021-02-22 Thread Greg Kroah-Hartman
From: Norbert Slusarek commit 3d0bc44d39bca615b72637e340317b7899b7f911 upstream. A possible locking issue in vsock_connect_timeout() was recognized by Eric Dumazet which might cause a null pointer dereference in vsock_transport_cancel_pkt(). This patch assures that vsock_transport_cancel_pkt() w

[PATCH 4.19 42/50] Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit dbe5283605b3bc12ca45def09cc721a0a5c853a2 upstream. We may not skip setting the field in the unmap structure when GNTMAP_device_map is in use - such an unmap would fail to release the respective resources (a page ref in the hypervisor). Otoh the field doesn't need setting

[PATCH 4.19 41/50] Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit b512e1b077e5ccdbd6e225b15d934ab12453b70a upstream. We should not set up further state if either mapping failed; paying attention to just the user mapping's status isn't enough. Also use GNTST_okay instead of implying its value (zero). This is part of XSA-361. Signed-o

[PATCH 4.19 03/50] arm/xen: Dont probe xenbus as part of an early initcall

2021-02-22 Thread Greg Kroah-Hartman
From: Julien Grall commit c4295ab0b485b8bc50d2264bcae2acd06f25caaf upstream. After Commit 3499ba8198cad ("xen: Fix event channel callback via INTX/GSI"), xenbus_probe() will be called too early on Arm. This will recent to a guest hang during boot. If the hang wasn't there, we would have ended u

[PATCH 4.19 24/50] firmware_loader: align .builtin_fw to 8

2021-02-22 Thread Greg Kroah-Hartman
From: Fangrui Song [ Upstream commit 793f49a87aae24e5bcf92ad98d764153fc936570 ] arm64 references the start address of .builtin_fw (__start_builtin_fw) with a pair of R_AARCH64_ADR_PREL_PG_HI21/R_AARCH64_LDST64_ABS_LO12_NC relocations. The compiler is allowed to emit the R_AARCH64_LDST64_ABS_LO1

[PATCH 4.19 07/50] cap: fix conversions on getxattr

2021-02-22 Thread Greg Kroah-Hartman
From: Miklos Szeredi [ Upstream commit f2b00be488730522d0fb7a8a5de663febdcefe0a ] If a capability is stored on disk in v2 format cap_inode_getsecurity() will currently return in v2 format unconditionally. This is wrong: v2 cap should be equivalent to a v3 cap with zero rootid, and so the same c

[PATCH 4.19 27/50] usb: dwc3: ulpi: fix checkpatch warning

2021-02-22 Thread Greg Kroah-Hartman
From: Felipe Balbi commit 2a499b45295206e7f3dc76edadde891c06cc4447 upstream no functional changes. Signed-off-by: Felipe Balbi Signed-off-by: Sudip Mukherjee Signed-off-by: Greg Kroah-Hartman --- drivers/usb/dwc3/ulpi.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers

[PATCH 4.19 08/50] ovl: skip getxattr of security labels

2021-02-22 Thread Greg Kroah-Hartman
From: Amir Goldstein [ Upstream commit 03fedf93593c82538b18476d8c4f0e8f8435ea70 ] When inode has no listxattr op of its own (e.g. squashfs) vfs_listxattr calls the LSM inode_listsecurity hooks to list the xattrs that LSMs will intercept in inode_getxattr hooks. When selinux LSM is installed but

[PATCH 4.19 29/50] net: fix iteration for sctp transport seq_files

2021-02-22 Thread Greg Kroah-Hartman
From: NeilBrown commit af8085f3a4712c57d0dd415ad543bac85780375c upstream. The sctp transport seq_file iterators take a reference to the transport in the ->start and ->next functions and releases the reference in the ->show function. The preferred handling for such resources is to release them i

[PATCH 4.19 43/50] Xen/gntdev: correct error checking in gntdev_map_grant_pages()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit ebee0eab08594b2bd5db716288a4f1ae5936e9bc upstream. Failure of the kernel part of the mapping operation should also be indicated as an error to the caller, or else it may assume the respective kernel VA is okay to access. Furthermore gnttab_map_refs() failing still requi

[PATCH 4.19 26/50] h8300: fix PREEMPTION build, TI_PRE_COUNT undefined

2021-02-22 Thread Greg Kroah-Hartman
From: Randy Dunlap [ Upstream commit ade9679c159d5bbe14fb7e59e97daf6062872e2b ] Fix a build error for undefined 'TI_PRE_COUNT' by adding it to asm-offsets.c. h8300-linux-ld: arch/h8300/kernel/entry.o: in function `resume_kernel': (.text+0x29a): undefined reference to `TI_PRE_COUNT' Link: ht

[PATCH 4.19 23/50] net: hns3: add a check for queue_id in hclge_reset_vf_queue()

2021-02-22 Thread Greg Kroah-Hartman
From: Yufeng Mo [ Upstream commit 67a69f84cab60484f02eb8cbc7a76edffbb28a25 ] The queue_id is received from vf, if use it directly, an out-of-bound issue may be caused, so add a check for this queue_id before using it in hclge_reset_vf_queue(). Fixes: 1a426f8b40fc ("net: hns3: fix the VF queue r

[PATCH 4.19 19/50] netfilter: flowtable: fix tcp and udp header checksum update

2021-02-22 Thread Greg Kroah-Hartman
From: Sven Auhagen [ Upstream commit 8d6bca156e47d68551750a384b3ff49384c67be3 ] When updating the tcp or udp header checksum on port nat the function inet_proto_csum_replace2 with the last parameter pseudohdr as true. This leads to an error in the case that GRO is used and packets are split up i

[PATCH 4.19 09/50] drm/amd/display: Fix dc_sink kref count in emulated_link_detect

2021-02-22 Thread Greg Kroah-Hartman
From: Victor Lu [ Upstream commit 3ddc818d9bb877c64f5c649beab97af86c403702 ] [why] prev_sink is not used anywhere else in the function and the reference to it from dc_link is replaced with a new dc_sink. [how] Change dc_sink_retain(prev_sink) to dc_sink_release(prev_sink). Signed-off-by: Victo

[PATCH 4.19 46/50] xen-netback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 3194a1746e8aabe86075fd3c5e7cf1f4632d7f16 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 4.19 50/50] kvm: check tlbs_dirty directly

2021-02-22 Thread Greg Kroah-Hartman
From: Lai Jiangshan commit 88bf56d04bc3564542049ec4ec168a8b60d0b48c upstream In kvm_mmu_notifier_invalidate_range_start(), tlbs_dirty is used as: need_tlb_flush |= kvm->tlbs_dirty; with need_tlb_flush's type being int and tlbs_dirty's type being long. It means that tlbs_dirty is always

[PATCH 4.19 47/50] xen-scsiback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 7c77474b2d22176d2bfb592ec74e0f2cb71352c9 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 4.19 48/50] xen-blkback: fix error handling in xen_blkbk_map()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 871997bc9e423f05c7da7c9178e62dde5df2a7f8 upstream. The function uses a goto-based loop, which may lead to an earlier error getting discarded by a later iteration. Exit this ad-hoc loop when an error was encountered. The out-of-memory error path additionally fails to fil

[PATCH 4.19 45/50] xen-blkback: dont "handle" error by BUG()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit 5a264285ed1cd32e26d9de4f3c8c6855e467fd63 upstream. In particular -ENOMEM may come back here, from set_foreign_p2m_mapping(). Don't make problems worse, the more that handling elsewhere (together with map's status fields now indicating whether a mapping wasn't even attemp

[PATCH 4.19 44/50] xen/arm: dont ignore return errors from set_phys_to_machine

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Stabellini commit 36bf1dfb8b266e089afa9b7b984217f17027bf35 upstream. set_phys_to_machine can fail due to lack of memory, see the kzalloc call in arch/arm/xen/p2m.c:__set_phys_to_machine_multi. Don't ignore the potential return error in set_foreign_p2m_mapping, returning it to the

[PATCH 4.19 02/50] tracing: Check length before giving out the filter buffer

2021-02-22 Thread Greg Kroah-Hartman
From: Steven Rostedt (VMware) commit b220c049d5196dd94d992dd2dc8cba1a5e6123bf upstream. When filters are used by trace events, a page is allocated on each CPU and used to copy the trace event fields to this page before writing to the ring buffer. The reason to use the filter and not write direct

[PATCH 4.19 33/50] vsock: fix locking in vsock_shutdown()

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Garzarella commit 1c5fae9c9a092574398a17facc31c533791ef232 upstream. In vsock_shutdown() we touched some socket fields without holding the socket lock, such as 'state' and 'sk_flags'. Also, after the introduction of multi-transport, we are accessing 'vsk->transport' in vsock_send_

[PATCH 4.19 34/50] net/rds: restrict iovecs length for RDS_CMSG_RDMA_ARGS

2021-02-22 Thread Greg Kroah-Hartman
From: Sabyrzhan Tasbolatov commit a11148e6fcce2ae53f47f0a442d098d860b4f7db upstream. syzbot found WARNING in rds_rdma_extra_size [1] when RDS_CMSG_RDMA_ARGS control message is passed with user-controlled 0x40001 bytes of args->nr_local, causing order >= MAX_ORDER condition. The exact value 0x40

[PATCH 4.19 49/50] scsi: qla2xxx: Fix crash during driver load on big endian machines

2021-02-22 Thread Greg Kroah-Hartman
From: Arun Easi commit 8de309e7299a00b3045fb274f82b326f356404f0 upstream Crash stack: [576544.715489] Unable to handle kernel paging request for data at address 0xdf97 [576544.715497] Faulting instruction address: 0xdf880f64 [576544.715503] Oops: Kern

[PATCH 4.19 36/50] ovl: expand warning in ovl_d_real()

2021-02-22 Thread Greg Kroah-Hartman
From: Miklos Szeredi commit cef4cbff06fbc3be54d6d79ee139edecc2ee8598 upstream. There was a syzbot report with this warning but insufficient information... Signed-off-by: Miklos Szeredi Signed-off-by: Greg Kroah-Hartman --- fs/overlayfs/super.c | 13 - 1 file changed, 8 insertio

[PATCH 4.19 37/50] x86/build: Disable CET instrumentation in the kernel for 32-bit too

2021-02-22 Thread Greg Kroah-Hartman
From: Borislav Petkov commit 256b92af784d5043eeb7d559b6d5963dcc2ecb10 upstream. Commit 20bf2b378729 ("x86/build: Disable CET instrumentation in the kernel") disabled CET instrumentation which gets added by default by the Ubuntu gcc9 and 10 by default, but did that only for 64-bit builds. It

[PATCH 4.19 31/50] net: watchdog: hold device global xmit lock during tx disable

2021-02-22 Thread Greg Kroah-Hartman
From: Edwin Peer commit 3aa6bce9af0e25b735c9c1263739a5639a336ae8 upstream. Prevent netif_tx_disable() running concurrently with dev_watchdog() by taking the device global xmit lock. Otherwise, the recommended: netif_carrier_off(dev); netif_tx_disable(dev); driver shutdown seque

[PATCH 4.19 38/50] KVM: SEV: fix double locking due to incorrect backport

2021-02-22 Thread Greg Kroah-Hartman
From: Paolo Bonzini Fix an incorrect line in the 5.4.y and 4.19.y backports of commit 19a23da53932bc ("Fix unsynchronized access to sev members through svm_register_enc_region"), first applied to 5.4.98 and 4.19.176. Fixes: 1e80fdc09d12 ("KVM: SVM: Pin guest memory when SEV is active") Reported-

[PATCH 4.19 40/50] Xen/x86: dont bail early from clear_foreign_p2m_mapping()

2021-02-22 Thread Greg Kroah-Hartman
From: Jan Beulich commit a35f2ef3b7376bfd0a57f7844bd7454389aae1fc upstream. Its sibling (set_foreign_p2m_mapping()) as well as the sibling of its only caller (gnttab_map_refs()) don't clean up after themselves in case of error. Higher level callers are expected to do so. However, in order for th

[PATCH 4.19 35/50] net/qrtr: restrict user-controlled length in qrtr_tun_write_iter()

2021-02-22 Thread Greg Kroah-Hartman
From: Sabyrzhan Tasbolatov commit 2a80c15812372e554474b1dba0b1d8e467af295d upstream. syzbot found WARNING in qrtr_tun_write_iter [1] when write_iter length exceeds KMALLOC_MAX_SIZE causing order >= MAX_ORDER condition. Additionally, there is no check for 0 length write. [1] WARNING: mm/page_al

[PATCH 4.19 39/50] net: qrtr: Fix port ID for control messages

2021-02-22 Thread Greg Kroah-Hartman
From: Loic Poulain [ Upstream commit ae068f561baa003d260475c3e441ca454b186726 ] The port ID for control messages was uncorrectly set with broadcast node ID value, causing message to be dropped on remote side since not passing packet filtering (cb->dst_port != QRTR_PORT_CTRL). Fixes: d27e77a3de2

Re: [PATCH v2] x86/mce: fix wrong no-return-ip logic in do_machine_check()

2021-02-22 Thread Aili Yao
On Mon, 22 Feb 2021 19:21:46 +0800 Aili Yao wrote: > On Mon, 22 Feb 2021 11:22:06 +0100 > Borislav Petkov wrote: > > > On Mon, Feb 22, 2021 at 06:08:19PM +0800, Aili Yao wrote: > > > So why would intel provide this MCG_STATUS_RIPV flag, it's better to > > > remove it as it will never be set,

[PATCH 4.19 32/50] vsock/virtio: update credit only if socket is not closed

2021-02-22 Thread Greg Kroah-Hartman
From: Stefano Garzarella commit ce7536bc7398e2ae552d2fabb7e0e371a9f1fe46 upstream. If the socket is closed or is being released, some resources used by virtio_transport_space_update() such as 'vsk->trans' may be released. To avoid a use after free bug we should only update the available credit

Re: [PATCH v11 01/13] vfio: VFIO_IOMMU_SET_PASID_TABLE

2021-02-22 Thread Keqian Zhu
Hi Eric, On 2021/2/22 18:53, Auger Eric wrote: > Hi Keqian, > > On 2/2/21 1:34 PM, Keqian Zhu wrote: >> Hi Eric, >> >> On 2020/11/16 19:00, Eric Auger wrote: >>> From: "Liu, Yi L" >>> >>> This patch adds an VFIO_IOMMU_SET_PASID_TABLE ioctl >>> which aims to pass the virtual iommu guest configura

<    3   4   5   6   7   8   9   10   11   12   >